Saturday, May 23, 2020

Beloved Poet, Shel Silverstein - 680 Words

Do you remember reading comical poetry such as The Giving Tree during your childhood? Its author, Shel Silverstein, was one of the most recognizable children’s poets and poetry icons that has ever lived. He holds a household name due to the fact that despite his past he is able to help form a future in language, poetry, and the arts for the innovators of tomorrow. Silverstein’s works captured the essence of a person’s childhood and changed poetry and children’s literature forever. Sheldon Allan Silverstein was not always the literature icon he quickly became in the mid 20th century. Born on September 25, 1930 in Chicago, Illinois during the Great Depression. He was not a very sociable child. His hobbies included drawing cartoons and writing. As a result, his professional drawing and writing career began with cartooning and writing for Playboy Magazine, in 1952. He was also not popular with girls during his teenage year, which motivated him to write more mature poetry in the future about love. Silverstein wanted to reach out to all age groups and express that his talent was not only used for the entertainment of children, but for everyone. Silverstein didn’t write to impress others â€Å"†¦ he did â€Å"hope that people no matter what age, would find something to identify†¦ and experience a personal sense of discovery†.† in his poetry (Shel Silverstein 1999). Silverstein was divorced and had one daughter, who died in her childhood . He served in the armed forces during the 1950’s, andShow MoreRelatedThe Giving Tree by Shel Silverstein1308 Words   |  5 PagesFor example, Shel Silverstein is not only a unique author but quirky and fun, he paints wild pictures through the words of his story and takes his readers on an adventure of a lifetime. By reading and analyzing the work of an author you can connect with not only the work but the author themselves, you gain a better understanding and through this understanding you can connect the piece to your own life. Shel Silverstein once said, â€Å"If you’re a dreamer come on in† (Shel Silverstein Quotes)a quote

Monday, May 11, 2020

Allegory of a Modern Day Cave - 1013 Words

Allegory of the Modern Day Cave â€Å"Plato’s Allegory of the Cave† was the philosophical story of people who lived in this cave, and never left. They were bound to one spot, and could never move. The only light was this fire in the middle of the cave, that was on the other side of a wall that separated the fire from the cave dwellers. There were also other people who carried objects above their heads on the fire side of the wall. This made shadows on the actual cave walls, which were the only things that the bound people knew to be true. One day one of the dwellers got to be freed from his position and was about to make discoveries of a new world. When people have no clue what is going on in the world around them, this is exactly what I got†¦show more content†¦People will believe what they want to believe in a matter of time, and gradual adjusting. This brings me back to my earlier subject of gay rights. Right now, there are people in our country that strongly do not support gay rights. I honestly believe that this is because the idea of people being comfortable with homosexuality is a generally new concept. I think that in a matter of time more and more people will be comfortable with the idea. As of right now it still is at the stage of someone discovering â€Å"the light† and trying to persuade the rest of the â€Å"cave dwellers† that there is something out there besides the shadows that are in front of them. On the other side, there is still the possibility of remission back to the non-socially acceptable ideas. It would be like the man going back down into the cave, â€Å"his eyes – coming suddenly out of the sun like that – [being] filled with darkness.†6 A remission is almost bound to happen if we can’t find â€Å"the light† to our problems. We need toShow MoreRelated The Cave and the Matrix Essay993 Words   |  4 PagesThe Cave and the Matrix Movie critics and philosophers alike agree that the movie â€Å"The Matrix† is indeed based upon certain Platonic themes from Book VII of The Republic. In this story entitled The Allegory of the Cave, he describes a dark underground cave where a group of people are sitting in one long row with their backs to the caves entrance. Chained to their chairs from an early age, all the humans can see is the distant cave wall in from of them. The shadows of statues held by unseenRead MoreThe Allegory of the Cave907 Words   |  4 Pagesman follow the law, and how do implications of society affect our behavior. The most interesting topic from the Republic is from Book VII, the allegory of the cave. With the allegory of the cave Plato gives us the power to break the chains that bind us down and leads us to see the light. In the allegory of the cave Plato sets the scene with humans in a cave that have been chained since childhood so they are restricted from moving and looking around the room. These people only see the shadows castedRead MoreComparison of the Matrix and the Allegory of the Cave Essay1240 Words   |  5 PagesThe Matrix and the Allegory of the Cave What if one were living through life completely bound and facing a reality that doesnt even exist? The prisoners in Platos Allegory of the Cave are blind from true reality as well as the people in the movie The Matrix. They are given false images and they accept what their senses are telling them. They believe what they are experiencing is not all that really exists. Plato, the ancient Greek philosopher wrote The Allegory of the Cave, to explain theRead MoreThe Allegory Of The Cave982 Words   |  4 PagesIn Book 7 of Plato’s Republic, The Allegory of the Cave† is a symbolic story of which there are prisoners in a cave with a fire that is located behind them. They have always faced the wall of the cave and have only seen what was outside of the cave from the shadows. They believe that the shadows of the objects carried are real, but in reality, it s just a shadow of the truth. The prisoners play a game where they guess what the shadows are and end up believing that it is the truth. However, whenRead MorePlatos 4 Analogies Of The Republic Analysis1579 Words   |  7 PagesIn Books VI and VII of the The Republic, Plato uses the four analogies to represent his theory of justice in the ideal state. The four analogies include the ship, the sun, the divided line, and the cave. The analogies of the ship, and the cave are used by Plato to represent the people of the state and proving his argument that philosophers are the true rulers of the state. The divided line and the sun analogies also supports Plato’s point about philosophers obtaining intellectual knowledge apposedRead MorePlatos Allegory of the Cave and the Condition of Mankind1147 Words   |  5 Pagesdistinction between truth and knowledge is effectively highlighted in Plato’s allegory of the cave, which illustrates the great limitations faced by philosophers in discovering the ultimate nature of reality. Nevertheless regarding the theory of knowledge, the parable itself is high ly symbolic and asserts that any knowledge gained through perceptual awareness is an illusion and are mere reflections of the highest truths. This allegory can be interpreted in many ways; however in the context of platonic epistemologyRead More Allegory of the Cave vs The Matrix Essay1473 Words   |  6 Pagesfacing a reality that doesn’t even exist. The prisoners in Plato’s â€Å"Allegory of the Cave† are blind from true reality as well as the people in the movie â€Å"The Matrix† written and directed by the Wachowski brothers. They are given false images and they accept what their senses are telling them, and they believe what they are experiencing is all that really exists. Plato the ancient Greek philosopher wrote â€Å"The Allegory of the Cave†, to explain the process of enlightenment and what true reality mayRead MoreThe Allegory of the Cave in the Movie The Matrix Essay1290 Words   |  6 Pagesthe modern day telling of Othello. Sometime s, though, these older themes are not as obvious, especially when they represent complex thoughts first uttered centuries ago. With the focus in recent years on a return to the classics, it should not be surprising to find allusions to our more famous Greek philosophers represented in popular films and shows. Andy and Larry Wachowski’s movie The Matrix shows a strong resemblance in its central theme to that of Plato’s The Allegory of the Cave. Read MoreThe Allegory Of The Cave Essay828 Words   |  4 Pageslifestyle. In today’s modern world, we depend too much on technology. Most of us spend most of the day using our cellphones, playing video games or on our laptop, never taking a glimpse of the world around us. Especially, those who use the whole day to watch television or play video games since they are participating in a fantasy and never realizing they are missing out of reality. Such as Aristotle, a philosopher who is the student of Plato, explains in h is allegory of the cave. In Plato’s RepublicRead MoreThe Allegory of the Cave700 Words   |  3 Pageswrote â€Å"The Allegory of the Cave† in the early 300 B.C. This parable has left many scholars dumbfounded throughout centuries because of the insight Plato fills the pages within the story. It is a story of prisoners trapped in a cave, but specifically about a mans journey from ignorance to knowledge. This is the worldly take on the story—in a biblical point of view it is still a journey from ignorance to knowledge, but in a very different context. The journey from the darkness of the cave into the light

Wednesday, May 6, 2020

Computers and computer networks Free Essays

Introduction OSI layers 1. Physical – Data unit: bit The Physical Layer defines electrical and physical specifications for devices. It defines the relationship between a device and net, example cable (copper or optical ), pins, hubs, repeaters, network adapters and more. We will write a custom essay sample on Computers and computer networks or any similar topic only for you Order Now 2. Data Link – Data unit: frame The Data Link Layer provides the means to transfer data between network device and to detect and possibly correct errors that may occur in the Physical Layer. 3. Network – Data unit: packet The Network Layer provides the means of transferring data sequences from a host on one network to a destination on a different network, while maintaining the quality of service. 4. Transport – Data unit: segments The Transport Layer provides transfer of data between end users, providing reliable data transfer services to the upper layers. 5. Session – Data unit: data The Session Layer controls the connections between computers. It provides for full-duplex, half-duplex, or simplex operation. 6. Presentation – Data unit: data The Presentation Layer establishes context between Application Layer entities, in which the higher-layer entities may use different syntax and semantics if the presentation service provides a mapping between them. 7. Application – Data unit: data Network process to application The Application Layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. Regenerative repeater Regenerative repeater is a device which regenerates incoming digital signals and then retransmits these signals on an outgoing circuit. This device is useful because signals in twisted pair cable is degrading then moving long distances. If I am correct than after 100 meters signal is degraded beyond repair, so it is necessary to put router, switch or regenerating repeater. Switches and routers are more important than to give a boost to the signal. Their also are more expensive. Repeater uses transport layer. It is different from other components because it is not doing anything difficult. It receives signal, boost it and send it forward. It is used then there is long cable and signal can seriously degrade. Bridge Computer has two different memory types, slow and fast. Fast is managed in upper part of motherboard, and slower – lower part. Both memory managers have special chip where their memory is configured/used accordingly. Between them is bridge. It is very important part which is to ensure computers work. Bridge connects processing memory with storage memory what computer processes could be done. It uses physical layer. It differs from other components because it is just connection between two memory „managersâ€Å". Situation with this component is impossible. It is necessary to computer work. Hub Hub is a device for connecting multiple devices together and making them act as a LAN. It is just like network switch, but this is the older version. The device is a form of multiport repeater. Hubs was before the switches and there are not good enough anymore. Then hub receives a data packet it isn’t send to computer for witch it belongs, but it is send to all computers, whose are connected to computer. The right one takes it, the others ignores it. If two computers send data at the same time, then collision occur. In other words better use switches, hubs are old and not reliable. It is using physical layer. It different from other components because it is used to connect computers and other devices together into network. The availability of low-priced network switches has largely rendered hubs obsolete but they are still seen in older installations and more specialized applications. To pass data through the repeater in a usable fashion from one segment to the next, the packe ts and the Logical Link Control (LLC) protocols must be the same on the each segment. Router A router is a device that chooses path for data packets across computer networks. Network between end-users is a giant net, where all joint spots are routers. ISP routers usually exchange routing information using the Border Gateway Protocol (BGP). Also called a Provider Edge router, is placed at the edge of an ISP network. The router uses External BGP to EBGP protocol routers in other ISPs. This device is different from other because it is created to ensure data packet travel across network. It is considered a network layer device. Charlie and Lola a) Files must be kept in order at all times. Keeping them spread is not good idea because then needed, they can be hard to find around other files there. And desktop is not a place for â€Å"secret† files. C:/Documents and Settings/Charlie/MySecretFiles/TopSecret.odt When he press â€Å"Save As†, it depends where was his last save. When he has to navigate to his â€Å"special† file he have several options. There suppose to be quick buttons which will move directly to My Documents or My Computer. If My Documents is used, then you need to open MySecretFiles folder and than save your file. If My Computer used, then you need to open Local Disk (C:), then Documents and Settings, after that folder Charlie, after that My Documents and finally MySecretFiles. Then you can save your file. I don’t fink what folder MySecretFiles and file TopSecret.odt is so secret after all. When you have something secret don’t call it secret. b) This question is tricky one. It depends where is Mary. Because if he would be on the same LAN than Mary can make his printer accessible through LAN and Charlie would be able to print his file from his home. Just he need to order printing through Mary’s printer. But then anyone could print through that printer. Well Charlie’s out of luck. Mary’s is on other LAN, but that is not a problem. To send file to someone else is not very hard. There is several ways to do it: Skype. This program can be used to talk to someone, to write messages and to send files. E-mail. Using your mail to create new message, you can attach a file and send it with a message. It is secure because email sites like Yahoo uses secure connection. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. c) Well the message start from Charlie’s PC to his wireless device, which forwards it to router. Then it will move across network to Mary’s PC. It will use lots of different network protocols: ARP – Address Resolution Protocol RARP – Reverse Address Resolution Protocol L2F – Layer 2 Forwarding Protocol L2TP – Layer 2 Tunneling Protocol LLDP – Link Layer Discovery Protocol MTP – Message Transfer Part IPv6 – Internet Protocol version 6 RIP – Routing Information Protocol NFS – Network File System DNS – Domain Name System FTP – File Transfer Protocol HTTP – Hypertext Transfer Protocol There is a lot more protocols which will be used at some times but there is no way to name them all. Now I explain the main of these. Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP) which was designed to succeed his predecessor Internet Protocol version 4 (IPv4). The Internet operates by transferring data packets that are guided across networks as specified by the Internet Protocol. The Domain Name System (DNS) is a naming system built on a database, or any resource connected to the Internet or a private network. Most importantly, it translates domain names known to users into the IP addresses for the purpose of locating and addressing these devices worldwide. File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a Transmission Control Protocol based network, such as the Internet. The Hypertext Transfer Protocol (HTTP) is a networking protocol for using information systems. HTTP is the foundation of data communication for the World Wide Web. These four protocols is the main ones to let Charlie’s message to reach Mary. The Hypertext Transfer Protocol will enable Charlie to use internet. Domain Name System protocol will found email site Charlie’s using. File Transfer Protocol will ensure files movement from host to host. That can be Charlie to Mary, or Charlie to email site and email site to Mary. Internet Protocol version 6 guides data packets across network. Charlie’s file will newer be send like it is. It will be divine in several (or thousands) data packets and send to destination. d) Lora and Lotta are not hackers. Then it comes to intercept data transfer there three levels of security. Highest level is fiber wire. Light comes through it so to hack it you have to cut it and it will be detected. The middle level of security is twisted pair cable. The little device can be attached to cable and it will read all data coming through. The lowest security is wireless LAN or WLAN, or wireless local area network. When transmission is send through air anyone can access it (with high hacking skills and extremely expensive equipment). Lotta is very good with computers, what about hacking and network. Neither of girls don’t have skills. And normally messages are encrypted due to use of HTTPS. He can also put a password on a file (if possible). Or he can compress file to archive with password (rar, zip, 7z). e) Well first of all Soren Lorensen is IMAGINARY. He can’t do anything. He knows what Lora knows. If he will try to help Lora just keep pressing random buttons he shows and she definitely end up formatting her hard drive. She better have imaginary friend Smarty Hacker. REFERENCES JAVVIN network management security (no date) OSI 7 layers Model of Network Communication [Online]. Available from: http://www.javvin.com/osimodel.html [Accessed 06th April 2011] Internet Society (no date) IPv6 [Online]. Available from: http://www.isoc.org/internet/issues/ipv6.shtml [Accessed 06th April 2011] Webopedia (no date) What is DNS[Online]. Available from: http://www.webopedia.com/TERM/D/DNS.html [Accessed 06th April 2011] Webopedia (no date) What is HTTP[Online]. Available from: http://www.webopedia.com/TERM/H/HTTP.html [Accessed 06th April 2011] About.com Personal Web Pages (no date) FTP – What Is It and How Do I Use It [Online]. Available from: http://personalweb.about.com/od/ftpfileuploadprograms/a/01ftp.htm [Accessed 06th April 2011] How to cite Computers and computer networks, Essay examples