Friday, November 29, 2019

My Posse Dont Do Homework Essays - Critical Pedagogy,

My Posse Don't Do Homework Johnson's My Posse Don't Do Homework is an excellent book in the way that it describes the looked over and ignored kids of schools around the nation. My Posse Don't Do Homework shows us how important it is to nurture and care for students and tell each and everyone of those students how important they are and they, too, can make a difference. When Ms. Johnson had the class on the first day of school, the students were all prepared to "work" their way through yet another substitute or permanent teacher. According to the book My Posse Don't Do Homework, when Ms. Johnson had asked about Miss Shepard, the group of student's former teacher, one girl replied that she "had been ?psyched out'" (19). "Miss Shepard had thrown down her book and rushed out of the classroom in tears the previous Friday. The kids weren't surprised that she hadn't returned. They were obviously proud of their handiwork..." (19). Moments later a dictionary was flung at her head and she then proceeded to leave the classroom. After the dictionary incident she spoke with a colleague, Hal Gray. After a brief discussion with him, she went back to the class where she was inspired by her former drill instructor, Petty Officer Hawk's, presence and confronted the student who threw the dictionary at her. After getting in the boy's face, he gave into her demand of sitting down. After introducing herself and telling them about her Marine and Navy background, she gained the advantage and some of their respect from fear that she could kill them with her bare hands. The book is not suggesting that every teacher that has a difficult group of students should let them think that he or she, meaning the teacher, is going to violent if they do not cooperate in class. However, with this group of kids Ms. Johnson thought that it would be most effective to intimidate her new students. After gaining his or her respect, she started to care about each student. She went above and beyond what is to be expected from the average teacher. She truly cared about each of students and did her best to get to know each of them on a personal basis. She even proves in her book, My Posse Don't Do Homework, that this is an effective way of teaching these students who have been told that they are not important and that they would not achieve to be much. Most of the students in her classes were passing with average and above average grades. The same students were doing below average or failing other classes that were instructed by teachers who did not put much to any effort in showing these students any affection. James A. Banks states in his book An Introduction to Multicultural Education: "I think we have to create a caring community in the classroom. We have to create what psychologists call a superordinate group in the classroom" (93). He goes on later discusses and somewhat defines a super ordinate groups. Banks states, "Allport's theory of group contact suggests ways to create a sense of community. In order to create a sense of community, we first need to create a group within the group not cooperation. Second, we need to create equal-status situations for the groups" (94). It is imperative that we teach our students in a fair and caring way. Teachers have to be sure that he or she is doing everything in their power to help their students achieve their goals. Isn't that the purpose of teaching, to help assist the students and do almost anything within their power to see that their student is learning? One option to helping students better themselves and give more of the much-needed affection is to reduce class size. Johnson states in the introduction to her book, "When classes are small enough to allow individual student-teacher interaction, a minor miracle occurs: Teachers teach and students learn" (2). When teachers gain a positive rapport with their students because of smaller class sizes, fewer students have a chance to fall through the cracks. LouAnne Johnson stated, "The Junior Advanis and Attiba Macks break my heart, but for every student who slips through the cracks, a dozen--or two dozen--step over the cracks and walk out of high school with a diploma in one hand and a dream in another. It's these kids--the ones you don't read about in the newspapers because good news doesn't sell--who keep me coming back every year to

Monday, November 25, 2019

Definition and Examples of Rhetorical Schemes

Definition and Examples of Rhetorical Schemes Scheme is a term in classical rhetoric for any one of the figures of speech: a deviation from conventional word order. Here are examples of scheme in use by famous authors, as well as definitions from other texts: Examples and Observations Schemes include such devices as alliteration and assonance (that purposefully arrange sounds, as in The Leith police dismisseth us) and antithesis, chiasmus, climax, and anticlimax (that arrange words for effect, as in the cross-over phrasing One for all and all for one).(Tom McArthur, The Oxford Companion to the English Language. Oxford Univ. Press, 1992)There is a theory dating back to classical times that rhetorical figures or schemes originated as forms of expression used naturally by people in states of extreme emotion (Brinton 1988:163), that they are, in fact, imitative of emotional states. . . . Thus, rhetorical figures of omission, unusual word order or repetition are held to be imitative of actual disturbances of language in emotional contexts, which, in turn, reflect feelings and emotional states such as anger, grief, indignation or consternation...Now while it is undoubtedly true that such schemes as aposiopesis (breaking off an utterance before it is completed), hyperbat on or repetition are frequently related to emotional states, it must also be realised that the whole reservoir of rhetorical schemes represents a system which provides a multitude of possibilities of expressing meanings, among which emotions form only one variety.  (Wolfgang G. Mà ¼ller, Iconicity and Rhetoric, The Motivated Sign, ed. by Olga Fischer and Max Nnny. John Benjamins, 2001) Functions of Schemes In addition to structuring reality, the schemes help writers organize and orchestrate their relationships with readers. As vehicles for social interaction, they can Signal the level of formality (high, middle, low) as well [as] local shifts across these levels;Control the emotional intensity of prosecranking it up here, ratcheting it down there;Showcase the writers wit and command over his or her medium;Enlist readers into collaborative relationships, inviting them to desire the completion of a pattern once they get its gist (Burke, Rhetoric of Motives 58-59).    (Chris Holcomb and M. Jimmie Killingsworth, Performing Prose: The Study and Practice of Style in Composition. SIU Press, 2010) Tropes and Schemes in The Garden of Eloquence [Henry] Peacham [in The Garden of Eloquence, 1577] divides his treatment of figurative language into tropes and schemes, the difference being that in the Trope there is a chaunge of signifycation, but not in the Scheme (sig. E1v). Tropes are further divided into tropes of words and sentences, and schemes are also divided into grammatical and rhetorical schemes. Grammatical schemes deviate from customs of speaking and writing and are subdivided into orthographical and syntactical schemes. Rhetorical schemes add distinction and doe take away the wearinesse of our common and dayly speach, and doe fashion a pleasant, sharpe, evident and gallant kinde of speaking, giving unto matters great strength, perspecuitie and grace (sig. H4v). Rhetorical schemes apply to words, sentences and amplification. (Grant M. Boswell, Henry Peacham. Encyclopedia of Rhetoric and Composition: Communication From Ancient Times to the Information Age, ed. by Theresa Enos. Routledge, 2010) Etymology From the Greek schema   , form, shape Pronunciation: SKEEM Also Known As: figure

Thursday, November 21, 2019

General Motors International Operations Research Paper

General Motors International Operations - Research Paper Example The project aimed at improving its performance hence face the world competition of other related companies like China. Some years later, the company announced it wanted to reduce its investment by seventeen Billion US dollars to pat the pension debts as well as tax debts. The pension process required a special legal grant to free itself from tax penalties. In concluding, this paper proves how the company strategies to maintain its market share. This is evidenced the company has expanded marginally maintaining more than thirty vehicle plants in thirty-one countries. Introduction Automobile industry has grown tremendously within the last few decades as a result of technological advancement (Tuman, 2003). General Motors Corporation, a company based in America whose headquarters are in Michigan is a good example. The company is the world’s largest manufacturer and marketer of vehicles with many new and competitive brands. The company markets its vehicles under brand names like Bui ck, Chevrolet, Opel, Daewoo, and Vauxhall. The company also sells its products under other brand names based in China like Alpheon, Jiefang, and Wuling. Further, the company has absorbed more than 200,000 people across the globe and has business links with almost all the world countries (Crumm, 2010). In addition, the company also provides financing services through its subsidiary financial contracts. America provides the largest market for light vehicles, commercial vehicles, and the long chases. It roughly consumes about a half of the total production of the General Motors. General Motors was desperate to shed some of its own branches mainly in North America to settle government loans. However, the two successive presidents of the United States, George Bush, and Barrack Obama agreed to fund the company to enable it to retain most of its branches in North America. Through this funding, Davis (1999) argues, General Motors introduced Vauxhall Nova â€Å"the smallest and most fuel-ef ficient gasoline-power car ever offered by General Motors† (pg 113). General Motors has gone through a past positive progressive record since its incision despite the few challenges it might have undergone. As the largest world’s automobile industry, the company has recorded high-profit levels for a notable period of time. This success can be attributed to its slogan stated by Crumm (2010) that, â€Å"What is good for General Motors is good for the country† (pg 1). For the last two years, Toyota Company, General Motors’ main competitor has recorded a higher level. To compete effectively in the market, the company is focusing on the current market demands of their high consumers like Brazil, China, and the United States (Davis, 1999). The company has an expansion plan from which it expects to benefit extensively by investing more in new markets to meet the growing market demands. Diversity in General Motors is quite evident. Through this diversification, th e company comprises of almost all the fields of production, which include manufacturers, dealers, retailers, auto engineers, and body repairers. As a result, a swing in material change would occur automatically. General Motors has undergone economic and political surges, and there is little public criticism over the ever-expanding corporate power and control of the General Motors.

Wednesday, November 20, 2019

Analysis Paper 1 Essay Example | Topics and Well Written Essays - 1000 words

Analysis Paper 1 - Essay Example THESIS STATEMENT The lines of the poem, ‘Eating Poetry’ by Mark Strand, do not fall into conventional schemes of logical thought process; it is bizarre, yet there are layers of interpretations and intercepts that can be formed from striking metaphors, paradoxical lines and conflicting concepts inherent within the poem. With this concern, this essay intends to analyze the poem, ‘Eating Poetry’ at length and confront the idea of the poet, operating behind the poem at a comprehensive level. EATING POETRY: ANALYSIS The poem, ‘Eating Poetry’ indicates immense love of the poet, for poetry. It is expressed in a bizarre way, but there is a strong sense of desperation inherent within the tone of the poet. Poet wants to express that poetry is not always about the ability to express the meaning inherent within it; far beyond the expression and understanding of meaning of a poem, lays its real essence, the language, choice of words, its symphony and its met er. All these elements get lost and subverted in understanding the real meaning of poetry at times. A poet is able to find extraordinary ideas through looking or gazing at ordinary things. A dog or a piece of log, a bizarre and not so attractive librarian who is very much confused, can also become the subject of his poetry, being the pivot or the central thought of the poem like one in ‘Eating Poetry’ (Slaughter, â€Å"Eating Poetry†). At the outset, the poetry begins with a stark indication that it is consuming the poet entirely or it can indicate that the poet is gobbling poetry like a hungry man and ‘Ink runs from the corners of my mouth’. Next in the poem, comes the bizarre and clumsy portrait of the librarian who has nothing logical to follow through the first paragraph of the poem. It is evident that the librarian is sad and under the hue of dim light with all the oddities around the queue for poetry gets lost and cannot, anymore find a concret e expression (Slaughter, â€Å"Eating Poetry†). The presence of dogs and their coming up from the basement might irritate or make the librarian feel awkward, but then the dogs are also viewed to be the integral part of the poem. Very few poets, like the poet of ‘Eating Poetry’, would be able to include even a dog into the scheme of thought process inherent in the poetry. The description of the dogs and the metaphors used to express them are also remarkable. The blond feet of the dogs seem burning that makes the librarian feel more distressed, stamping her feet and sobbing in depression (Slaughter, â€Å"Eating Poetry†). Next, the poem reaches the height of awkwardness, when the poet starts behaving like a dog, gets down on his knees and starts licking the hands of the librarian who scream in awe and fear. And the poem ends with self evaluation of the poet as a new man who engages himself behind the librarian snarling and licking her hands, which gives him an inner joy and makes him lost himself in the darkness of the books. The transition of the poet into a dog seems quite symbolic. The loyalty and faithfulness, which can be expected from a dog often misses in a man. Therefore, there might be a clear indication from the poet’

Monday, November 18, 2019

Shirley Jackson Research Paper Example | Topics and Well Written Essays - 2250 words

Shirley Jackson - Research Paper Example Simultaneously, the focus Shirley Jackson made on the life theme belongs to that long American tradition of the romance, what Richard Chase refers to as "that freer, more daring, more brilliant fiction that contrasts with the solid moral inclusiveness and massive equability of the English novel" (Chase, viii). It is Chase's conviction that "the history of American novel is not only the history of the rise of realism but also of the repeated rediscovery of the uses of romance, and that this will continue to be so" (Chase, xii). Jackson's illustrations of life have been most amenable to an imagination shaped and inspired by a culture of contradiction, of disharmonies, of what Chase calls "radical disunities." From the critical perspective, it was important to list these qualities of Jackson's literature in order to see that the fiction of Shirley Jackson, specifically her focus on the themes of life and death, belong to that major stream of American literature represented by Poe, Hawth orne, Melville, James, and Faulkner. Traditionally for Shirley Jackson's fiction, her protagonists and audience are immobilized by dread and death. Indeed, author's fiction revolves around dread: what it is and what it feels like. In her work, dread is an emotion, a predicament, an existential condition. What is dreaded is a truth which seems to be the author's. As one reads, one feels the presence of Shirley Jackson in her work. In "The Lottery," something dreadful occurs from the very beginning. Regularly, once-a-year, a villager is ritually stoned to death. But this event inspires no fear. Rather, it is sanctioned by the community. From the readers' perspective, they appreciate the horror of the lottery, but their only reaction is surprise. The sense of horror comes later, after they finish reading. Like the villagers themselves, readers are dissociated emotionally from the feelings, and Jackson manages this through the delay of information. Thus a paradox emerges. Something fearful occurs, but the fearful event is not anticipated by reader or character. Nevertheless, the reader's sense of dread is increased by the story - not in the forward movement of reading, but retrospectively. The point is this that Jackson mystifies the reader in order to take the reader by surprise. In Jackson's work it is the emotion of surprise which finally gets under audience's skin and proves to readers that they have something to worry about. "The Lottery" is the tale of a town ritual, namely, the stoning of one of its citizens, chosen collectively by drawing lots. From the very beginning of the narration, Shirley Jackson displays great ability to suggest and foreshadow through her symbols and descriptions of setting and circumstances. Shirley Jackson masterfully and not accidentally put the most important symbol of her short story in its title. The lottery symbolizes death, meaningless, insensible and evident. Critically speaking, insensibility and meaninglessness are the elements of author's narrational emphasis, and these themes find their place in all Jackson fiction. In this particular short story, the cruelty of the

Saturday, November 16, 2019

Study About Pc Troubleshooting And Maintenance Computer Science Essay

Study About Pc Troubleshooting And Maintenance Computer Science Essay Most of the time when we start up our computers, the CPU or Central Processing Unit goes through a series of steps or procedures before the computer operating systems boots from the hard disk. These initial steps are all categorized in a system called CMOS which stands for Complementary Metal Oxide Semiconductor. This is the where the systems settings such as the system clock, hard disk status, optical drives and other settings like the CPUs clock speed, FSB and so on are all on this setting. On the other hand, the chip that stores the settings is known as the BIOS chip also known as Basic Input Output System. This holds the most basic computer instructions that are required to boot the operating system like Windows XP or Linux based operating systems such as Ubuntu. Many people always get mistaken by calling is a CMOS chip, but since the BIOS and CMOS is so tightly intertwined, they can be both referred to as one (Difference between CMOS and BIOS, Dennis Faas). In other words, the CMOS chip stores the data needed for the BIOS so that the computer may boot us properly. The battery used to store the data is a lithium button battery which is located just near the CMOS chip and the CMOS jumper. This battery hold provides power to the CMOS chip even when the power of the computer is shut off. This is necessary where the chip is volatile, means that it will lose data when there is no power unlike a hard disk which work on magnetism. What is BIOS CMOS BIOS is commonly known as Basic Input/Output System. It is practically the lowest level processor that stands in between the hardware like the chipset and the processor with the operating system that is installed in a hard disk. The BIOS gives full access to the hardware components to allow a creation of high level operating systems such as Windows XP, Windows 7, Macintosh as well as Linux based operating systems. Moreover, the BIOS is also responsible over the behaviour of the hardware, such as the processors clock speed, the Front Side Bus or known as FSB, system clock, and many other vital hardware settings which is required to load or configured before the operating system loads into the Random Access Memory or RAM (System BIOS, Charles M. Kozierok, 2001). For a computer to operate, all the components must be given specific instructions on how and what they are suppose to do. Usually, that is where the BIOS come into play. The BIOS has a special software in which it runs preliminary codes or instructions which is preset into the ROM chip or Read Only Memory chip that is executed to load the operating system from the hard disk into the RAM for the computer to further execute more complicated commands and instructions so that it would be easier for the processor to communicate with the RAM in terms of instruction execution and access (The BIOS Program, Charles M. Kozierok, 2001). One of the most basic operations of the BIOS is the POST (Power On Self Test). This part is done to make sure that all of the components in the computer such as the motherboard, hard disks, optical drives, graphics adapter card and other components are working and they are detected throughout the system. Figure 1: BIOS that uses flash memory CMOS or Complementary Metal Oxide Semiconductor is low in power consumption and has low heat production rate technology that is used in contemporary microchips and it is commonly known as a small battery powered configuration chip where the BIOS stores the time, date and the system configuration settings (What is CMOS?, 2010). The main composition of this chip is made from silicon and germanium which in a way conducts electricity. These materials are then doped where impurities are added to transform it into a fully scaled transistor, either of extra negative charged (N-type) or positively charged (P-type). CMOS on the other hand uses both kinds of transistors in a complementary way to create a current gate where it makes an electrical control present. They practically use no power at all but this in another way, it makes it heat up fast where this sets a major limit to the speed where a microprocessor can operate (CMOS, 2005). The CMOS has a software which is a setup that is included in the creation of the chip. This setup is very vital for system configuration such as the frequency and voltage control of the components, the system date and time and the POST settings as well as the boot priority settings for the operating system to load. Figure 2: Examples of CMOS setup software interface Types of BIOS CMOS Now we know that BIOS is mainly the system where as the CMOS is the chip that contains a software that runs the BIOS. BIOSes were programmed initially into ROMs or PROMs (Programmable Read Only Memory) CMOS chips, where it only stored a very limited amount of data of the system configuration. Extensibility of the BIOS is limited to the capacity of the CMOS chip hence many years later BIOSes became more better when they introduce a new kind technology known as EPROM (Erasable Programmable Read Only Memory) and EEPROM (Electronically Erasable Programmable Read Only Memory). Though EPROMs are eraser in a very different manner where the chip has to be exposed to UV light which passes through a small glass window on the chip, in order to clear all the memory cells. The chip has a small window that allows the intake of UV light upon erasing the data instructions in the CMOS chip (How to erase and program an EPROM, 2003). Figure 3: DIP type ROM CMOS chip Figure 4: PLCC type PROM CMOS chip The CMOS chip on the other hand has 2 commonly used types, categorized by their packages, PLCC and DIP. PLCC stands for Plastic Leaded Chip Carrier which is a four sided chip carrier with a J lead and pin spacings of 1.27mm. The lead count or legs usually range from 20 to 84 (Minges, Merrill L. (1989). Electronic Materials Handbook). DIP stands for Dual Inline Package which consists of two parallel sided electrical connecting pins connected to a rectangular housing. Both types of packages for the CMOS chip is fixed at 32 pins, since the CMOS settings only need to transfer about 32 bits across the board. Like mentioned in the introduction, the BIOS or the CMOS chip is powered by a battery that is used to store the settings and instructions intact even after the power is turned off. Below are the several types of batteries the CMOS chip uses (CMOS Battery, 2010): Figure 5: 3V Lithium Button Cell Battery Figure 6: 4.5V Alkaline Battery Figure 7: 3.6V Nickel-Cadmium Battery (Solder Connectors) Current Technologies and Models for BIOS CMOS In todays market, the current technology used in BIOS and CMOS is the PLCC type, EEPROM CMOS chip and powered by a 3V Lithium Battery Cell. The CMOS setup for the BIOS include two major companies which are American Megatrends and Phoenix BIOS. There are also other types setups which are configured by the computer manufacturer such as Dell, Acer, HP Compaq and many more. The BIOS on the other hand provides extra facilities in terms of the configurability of the onboard devices like the embedded audio, the processors voltage, FSB, Multiplier, RAM voltage, hard disk boot sequence and many more. Below are some examples of the CMOS setup screens in configuration mode for different types of setup: Figure 8: CMOS setup main page for AWARD Software. Figure 9: CPU Configuration settings Figure 10: Boot Sequence settings BIOS CMOS Failures and Solutions Like the RAMs and hard disks, the BIOS and CMOS chip can also have error and failures. There are three types of virus invasion that can affect the BIOS system: CIH Black Hat 2006 Persistent BIOS Infection CIH was the first virus that was able to erase the content on a Flash ROM BIOS. It was also given the nickname as Chernobyl Virus The extent of the virus lead to the ejection of the CMOS chip from the motherboard and sent for reprogramming for it has also distorted its basic functionality. Black Hat 2006 is a virus that is capable to elevate privileges and read physical memory, using malicious procedures that replaced normal ACPI functions stored in flash memory. Persistent BIOS Infection work as an insertion of malicious code into the decompression routines in the BIOS, allowing for nearly full control of the PC at every start-up, even before the operating system is booted. The proof of the concept does not exploit a flaw in the BIOS implementation, but only involves the normal BIOS flashing procedures. Thus, it requires physical access to the machine or for the user on the operating system to be root (Researchers unveil persistent BIOS attack methods, 2009). Solutions to overcome these kinds of virus usually required either reprogramming of the CMOS chip or just an upgrade of the CMOS firmware. To reset all the data in the BIOS via the CMOS chip are usually done as follows: Turn off all power and disconnect all wires from the PC Open the CPU casing to reveal the motherboard Find the jumper pins that is used to clear the CMOS settings or a small button near the CMOS chip Short the jumper pins by moving the connector from 1-2 to 2-3 position to clear the settings and remove the system battery. Else, press the button for 8 seconds. After this is done, move the jumper connector back to its original position 1-2 and then place the system battery back in its place. Place the cover back and connect all the wires and turn on the power Once the computer loads and pass the POST test, the BIOS will prompt to enter CMOS settings to set it back again. After the settings are set, save the settings and exit the menu so the computer can restart and load the operating system. Conclusion In conclusion, the BIOS is the most system for a computer to boot and load settings for the all the hardware components. The CMOS chip is a requirement for it is the component that stores the instructions of the BIOS into the setup. Without this, the computer would not know how to load the operating system or identify the existence of any hardware components.

Wednesday, November 13, 2019

Experiencing Cyberspace :: web internet

Experiencing Cyberspace 1.   Ã‚  Ã‚  Ã‚  Ã‚  If a survey were being done on how people experience cyberspace, one would immediately notice that no two answers would be the same. Experiencing cyberspace is something that is different for every individual. I myself experience cyberspace psychologically, I experience it in my mind. There have been many attempts at trying to define the abstruse term, but up to date, no one has pinned the tail on the donkey. There cannot be one solid definition for a word that possesses so many meanings. I personally associate the word cyberspace with the idea of being able to travel to distant places without ever leaving my chair. Obviously, I know that there is no possible way of visiting different places or countries via my home computer, but in my mind, when I see the location that I am connected to, it feel as though a part of me is there. The best part is that I can switch from scenario to scenario without having to travel any ground. I do not feel a sense of distance or location, except when it takes a prolonged amount of time to connect to a host. When I travel from place to place (site to site), I do not cover any known physical distances, but instead I cover visual distance. Just as many people do, I refer to the places that I visit as virtual worlds. I like calling them this because I never actually get to see the reality of the "world". I only get to see it electronically and digitally. The feeling that I experience while in cyberspace is knowing that I possess the power to visit any where I want. When I click one of the buttons on the mouse, or what I refer to as a transporter, I feel as though all the power in the world rests at the end of my fingertips. I am in my own sort of fantasy land. Once I land in a desired location, or website, I have the opportunity to click on pictures and words that take me to new worlds. These pictures and words have the power to make my virtual tour even more pleasing by introducing me to new and exciting things. People have referred to experiences in cyberspace, experiences such as mine, as a basic extension of the mind. I definitely agree with this statement. I believe that it takes imagination and creativity to experience all of the things that cyberspace has to offer. With all the colors, strange text and mind-boggling graphics, cyberspace is something that everyone must experience on their own.