Friday, September 6, 2019

Western Governor’s University Essay Example for Free

Western Governor’s University Essay A nurse can exert leadership without occupying a formal leadership position by taking a leadership stance. In the course, Becoming a Leader in Health Care, it describes leadership as an attitude and not just a position (Reinertsen, 2009, p. 2). Leaders take responsibility for problems and look for ways to solve them. The nurse on an interdisciplinary team serves as a leader by acting as a patient advocate and by coordinating with the other team members to work towards a common goal for the patient. The nurse is instrumental in directing the care and communicating the essential issues in the patient’s care to the whole team. Communication is an essential part to the healthcare team. The nurse communicates with all the members of the team the vital information and ensures follow up care is received. This coordination of care and effective communication leads to positive patient outcomes and increased patient satisfaction. Another way the nurse serves as a leader on the interdisciplinary team is by bringing forth process problems and asking for the teams input on how to solve a particular problem. For example, the nurse may identify a problem with a decrease in hand hygiene compliance. The nurse can solicit ideas on how to solve the problem. The nurse may also bring forward some of his or her own ideas to solve the problem like more dispensers outside of each room and visual reminders to staff to do hand hygiene that are not following the procedure to increase hand hygiene compliance. By doing this nurse is acting as a leader by taking responsibility for a problem. The leadership stance is a lets solve it attitude towards problem resolution. (Reinersten, 2009, p. 2). C. Active Involvement It is important for a nurse to be actively involved in the interdisciplinary team because teamwork is essential in effective patient care. One of the first ways a nurse plays a contributing role on the interdisciplinary team is by communication of relevant information. A structured communication tool called SBAR (Situation, Background, Assessment, and Recommendation) is used to relay relevant information between caregivers. An example would be a nurse communicating to a doctor regarding a patient with chest pain. Situation: â€Å"Mr. Clark is complaining of chest pain radiating down both arm.† Background: â€Å"He has a history of cardiovascular disease and has taken 3 sublingual Nitroglycerin without relief.† Assessment: â€Å"He is short of breath and diaphoretic.† Recommendation: â€Å"Can we institute the Acute Coronary Syndrome Orders until you get here? How long will it be till you arrive?† A second example of the way a nurse contributes to the interdisciplinary team is through the coordination of care. If the patient needs a bedside procedure such as a bronchoscopy the nurse needs to coordinate with the physician to provide informed consent and the equipment technician to set-up the equipment for the procedure. The nurse must coordinate with the pharmacist to obtain medications that will be needed for the procedure and the respiratory therapist to assist with the procedure. Lastly, the nurse must coordinate with the lab and radiology to do any post-procedure labs and x-rays. C1. Contributing Position The nurse can take an active contributing role with an interdisciplinary team by working with the other disciplines. The nurse collects data for the dietician such as height and weight, monitors fluid intake and output and diet intake. The nurse does a thorough assessment of the gastrointestinal system and monitors bowel movements. This information enables the dietician to better plan the nutritional needs of the patient. This collaboration leads to improved outcomes for the patient. A second way that the nurse can take a contributing role is by making sure core measures are done for specific diagnoses. These evidenced based measures guide the care and contribute to better outcomes for the patient. D. Culture of Safety The Institute of Healthcare Improvement defines the four characteristics of a culture of safety as psychological safety, active leadership, transparency and fairness (â€Å"Culture of Safety†, 2011). Psychological safety pertains to a safe environment where people feel comfortable in speaking up about a concern. For example, if site verification is done on an impending surgery and one member of the team feels there might be an error the person can feel safe to speak up and question without fear of being penalized or berated for speaking up. This promotes an environment where learning is increased and the risk of future harm to patients is decreased. Active leadership in a culture of safety is using effective leadership. Effective leaders set a positive tone in the environment, share information and invite others to share, call people by their names to create familiarity, and are approachable. An example of this would be surgeon who is about to perform surgery, he speaks to the team members using their first names, explains the case to the them, and asks the team to speak up if there is questions during the case. The surgeon maintains a positive attitude and the team feels that they can approach him with concerns. Transparency is the willingness of an organization to investigate errors that have occurred and share the information so that others can learn from the mistake. If transparency does not exist it can allow errors to continue to occur and risk patient safety. An example would be a wrong site surgery, if an important check was omitted and not reported the error could occur again. Transparency allows the organization to fix process problems that may have precipitated the error and help find solutions to prevent future errors. Lastly, fairness is another component to the culture of safety. Fairness relates to the fact that people are responsible for their behavior but the important distinction is the fact that some errors are made due to flawed systems and some errors are made due to poor decision-making. The three concepts of human behavior that need to be determined before accountability can be decided are human error where the nurse just inadvertently made a slip or lapse by forgetting to turn back on the tube feeding after giving medication. When the nurse creates a shortcut in a policy, such as running potassium faster than the recommended 10 meq/hr, is considered at risk behavior. Reckless behavior would be a nurse taking narcotic medication prescribed for a patient while on duty (â€Å"Culture of Safety†, 2011). Culture of safety is an important a spect to making patient care safer. References Reinertsen, J. (2009). Becoming a leader in health care. Retrieved from http://www.ihi.org/offerings/IHIOpenSchool/Courses/Pages/default.aspx PS 106: Introduction to the Culture of Safety. (2011). Retrieved from www.ihi.org/offerings/IHIOpenSchool/Courses/Pages/default.aspx

Thursday, September 5, 2019

Advantages and Reasons of Being Bilingual

Advantages and Reasons of Being Bilingual Saunders (1988) states that Fishman, a well-known writer in bilingualism, declares that more than half of the worlds population today uses more than one language while engaging in activities basic to human needs (Saunders 1988 p.1). Numerous causes contribute to the emergence and dominance of bilingualism. There are various optional or compulsory factors. Immigration is a major factor of being bilingual, whereas Immigrants move from one country to another, because of various reasons. For example, some of them escape from wars or poverty in their countries to search for better life in foreign linguistic communities. As a result, they will be forced to learn the language of the host countries and become bilingual in order to have wider contact opportunities and getting jobs. According to Saunders (1988), most immigrants speak the language of the new culture and environment. In Australia, for instance, 86.3% of immigrants speak their second language more than their home languages. Geogr aphical proximity of two countries is a possible factor of being bilingual, where people of the two communities need the communication among each other for different purposes like trade and other social relations like marriage resulting in bilingual families. Saunders also states that commerce and trade are critical factors motivating people to acquire a second language. Most economic business and commercial markets involve bilingual individuals to deal with customers from multicultural areas. 2.3.1 Education as a great reason of being bilingual: Education is one of the most fundamental factors pushing or motivating individuals to learn a second language. Being bilingual through education can be optional or obligatory. I notice that, in all Arab Gulf countries, most school students become bilingual due to their learning of English as a compulsory subject. However, there are some students, including colleges and universities students, who learn their second language English as an optional subject. The learning of English in these countries seems to be the result of the international relations between them and the United Kingdom. It is worth mentioning that the main focus of my research paper is being bilingual due to education. According to Baker (1988), bilingual education refers to any program aiming to teach students a second language besides their mother tongue at school. It takes various classifications based on the following factors. First of all, bilingual education is classified to elitist bilingualism and folk bilingualism according to the incentive of being bilingual. Elitist bilingualism is regarded as a reward offered to certain special individuals by government. Some students, for instance, are rewarded by being allowed to study abroad or study in prestigious universities in their countries. On the other hand, folk bilingual education is deemed a crucial need people have to meet in order to remain alive. When immigrants move to a new place, they acquire the language of that place so that they can interact with people there. Bilingual education is also categorized into immersion and submersion bilingual education based on the use of both languages in learning. In the immersion education, student s are allowed to speak their mother tongue while experiencing their subjects and communicating with teachers. They learn the second language gradually as time goes by. In contrast, students are not allowed to speak their home language in the submersion bilingual education. They are taught all their subjects in their second language. According to the major used language, bilingual education can be also categorized into transitional and maintenance or enrichment bilingual educations. Transitional bilingual education essentially aims to develop and make students fluent in one language only, which is the majority language. Therefore, this bilingual education focuses on the bilingualà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s first language in the learning procedures with few extra classes to learn the second language. For example, in the USA and Europe, the minority of languages are taken into account and cured in order to make the minority groups to be able to continue the education in English or other majority languages. Huddy and Sears (1984), state that bilingual education is improved in the United States by the Bilingual Educational Act in order to meet the needs of children who speak minor languages (Huddy and Sears 1984). On the other hand, maintenance or enrichment bilingual education aims to teach children their subjects with both languages to guarantee that children get good levels of proficiency in both languages. Baker indicates that some students are taught some subjects such as grammar in their native language, while mathematics is learned in the second language. Consequently, students master both languages, and the two languages are developed simultaneously. This type of education is used for example in Canada and Wales as Baker shows that à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€¦Ã¢â‚¬Å"English speakers are taught French or Welsh to enable them to be fully bilingualà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚  (P, 47). I assume that maintenance or enrichment bilingual education refers to th e same kind of education used in Oman but, here, the government uses the term dual education to refer to it.

Wednesday, September 4, 2019

The Entity Relationship Diagram

The Entity Relationship Diagram Design the database system for Petcare. Petcare is a medium sized veterinary surgery with six branches across London. They want a database system developed to handle the records of the animals they care for, prescriptions and appointments. Entity-relationship diagram An entity-relationship diagram (ERD) is a data modeling technique that creates a graphical representation of the entities, and the relationships between entities, within an information system. This diagram is often used as a way to visualize a relational database: each entity represents a database table, and the relationship lines represent the keys in one table that point to specific records in related tables. ERDs may also be more abstract, not necessarily capturing every table needed within a database, but serving to diagram the major concepts and relationships. Definition of relationship A relationship is some association between entities. Relationship is shown by line between entities. Relationship lines indicate that each instance of an entity may have a relationship with instances of the connected entity, or vice versa. Definition of entity attribute An entity is characterized by a number of properties or attributes. Values assigned to attributes are used to distinguish one entity from another. Definition of Optionality and Cardinality Symbols at the ends of the relationship lines indicate the optionality and the cardinality of each relationship. Optionality expresses whether the relationship is optional or mandatory. Cardinality expresses the maximum number of relationships. Before analyzing the entities, let have a look the definition of entity. An entity can define as a thing which an organization recognizes as being capable of an independent existence and which can be uniquely identified. In addition, an entity is an abstraction from the complexities of some domain. Each entity is shown in box within the ERD. In this case study, the entities of the Veterinary Surgery are identified as followed: Owner is represented owners of animals which included name, address, home telephone number and mobile telephone number; Animal is represented information of an animal which included sex, age and owner Breed is represented information of breed for each animal type AnimalType is represented type of animal (dog, cat, rabbit, etc) Appointment Petcare keep the following information: the animal the appointment is for, the owner of the animal who requested the appointment, which veterinary doctor the appointment is with, the time and date of the appointment, the diagnosis made and the charge made for the appointment Prescription is represented record shows the period, in days, that the drug must be taken for. The cost of the medication is also recorded Drug contains the name of the drug DrugType contains the name of the drug type (Anti-biotic, Painkiller, Behaviour modification, Ear medication, Skin medication) Vet is represented the following information kept about them: name, address, home telephone number, and mobile telephone number Branch is kept for each branch of Petcare. This records the name of the branch (Enfield, Islington, Hackney, Holloway, Chingford or Leyton), address of the branch, telephone number, opening hours and emergency contact telephone number. Identifying the relationships for the model: Relationships mean that in a relational database, all entities have bonds between them, expressed as relationships. The relationship is a link between to entities, and it tells us something about which relationships exists between our entities. In the ER approach, more than one relationship can exist between any two entities. What is one-to-many and many-to-many Entity Relationship~ One-to-Many Entity Relationship is by far the most common relationship type. It consists of either a one through many or a zero through many notations on one side of a relationship and a one and only one or zero or one notation on the other. However, we can summarize all the entities to the Entity Relationship Data Model. Diagram for Entity Relationship Data Model which describes the content and structure of the data held by Petcare. Owner Breed Animal Prescription Drug DrugType AnimalType Appointment VetAnimalType Vet Branch Fig 1 entity relationship diagram for the Petcare. Normalized Tables Table is a data (value), which is the model of the vertical columns (which identifies the name) and the horizontal lines. A specified number of columns in the table, but may be any number of rows. Each row to identify the subset of the values in the column, which has been identified as a candidate key. Table in another term relationship, although there is the difference that a table is usually a multi-set (bag) as a series, and does not allow copies. In addition, the actual data rows, the panels are generally associated with some other meta-data, such as restrictions on the table or the values in columns. Primary key: Primary key is a field or combination of fields that uniquely identify a record in the table, so each tag can be placed without confusion. Primary key is the field (s) (primary key can be made up of more than one field) that uniquely identifies each record, ie the primary key is unique to each record and the value will never be duplicated in the same table. A constraint is a rule that defines what data are valid for the area. So the primary key constraint is the rule which says that the primary key field can not be empty and can not contain duplicate data. Database systems usually have more than one table, and these are usually related in any way. For example, a customer table and an Order table relate to each other on a unique customer number. The customer table will always be a record for each customer, and the Order table has a record for each order that the customer has. Foreign keys: A foreign key (sometimes referred to as the reference key) is a key used to link two tables together. Typically, you will have a primary key field from one table and paste it into another table, which becomes the foreign key (the primary key in the original table). A foreign key constraint that the data in the foreign keys must be consistent with the primary key of the table is linked. This is called reference integrity is to ensure that data entered is correct and is not unique Definition of Normalization Database normalization is a technique to reduce to the minimum duplication of information for designing relational database tables and in doing so to maintain the database for certain types of structural and logical problems, that is to say data anomalies. For example, when a given piece of information has multiple instances to be found in a table, this possible happen that these instances will not be kept consistent during the data in the table is updated, leading to a loss of data integrity. The such kind of problems are less vulnerable to a sufficiently normalized table, because its structure reflects the basic assumptions of the multiple instances of the same information should be used when a single instance of only. There are rules for UNF, 1NF, 2NF, 3NF, BCNF, 4NF, 5NF and domain-Key NF. Most textbooks mention 5NF and DKNF only in passing and note that they are not particularly applicable to be design process. Normalization is really about the formalism of simple ideas. All too often, the simplicity is lost in esoteric terminology and papers are often excessively concerned with the formalism and provide very practical insight. In this project, why need a normalization the database, it is because normalization is about designing a good database i.e. a set of related tales with a minimum of redundant data and no update, delete or insert anomalies. Normalization is a bottom up approach to database design, The designer interviews users and collects documents reports etc. The data on a report can be listed and then normalized to produce the required tables and attributes. First normal form to second normal form: To move form first normal form to second normal form I remove part-key dependencies. A relation is in second normal form if and only if it is first normal form every non key attributes is fully functionally dependent on the primary key Take for instance the table named Animal here I have a tow compound key BreedID and AppointmentID. BreedID and AppointmentID have influence on the Animal. Hence I brake out the determinant and dependent data items into their own table. Second normal form to third normal form: To move form second normal forms to tired normal form I remove inter-data dependences (non-key dependences). A relation is in third normal form if and only if it its in second normal form and every non-key attribute is non-transitively dependent on the primary key A use full mnemonic for remembering the relation for normalization is the distortion of the legal Oath presented below: No repeating group The data items depended upon the key. The while key And nothing but the key So help me code. Boyce-Codd Normal Form (BCNF) A relation is in Boyce-Codd normal form (BCNF) if and only if every one of its important functional dependencies is a candidate key. The definition of BCNF is handling certain situations which 3NF does not deal with. To distinguish the characteristics of a relation between 3NF and BCNF are given below. Since it is such a relationship is unlikely to have these properties, in the real life design the most case of the relations in 3NF are also in BCNF. Therefore many authors propose a vaguely distinction between 3NF and BCNF when it involves about giving advice to normalize a design for long term. As the relations in 3NF and BCNF are slightly difference, it is a bit difficult to bring up with significantly examples. To be strictly conforming to the definition of 3NF does not handle a relation that: 1. Has multiple candidate keys, which 2. Those candidate keys are composite, and 3. The candidate key overlap. For example, the candidate keys have at least one common attribute. Here is all tables after normalization: OwnerID Name Address HomePhoneNumber Mobile Table 2.11 VetAnimalType Using a Database Management System (DBMS) set-up all of the above normalised tables A Database Management System (DBMS) is a set of computer software programs. It controls the creation, maintenance, and the use of the database with computer as a platform or of an organization and its end users. It allows the organizations to place control of organization-wide database development in the hands of database administrators and other specialists. A DBMS is a set of system software. It helps the use of integrated collection of data records and files known as databases. It allows the programs of different user application to access the same database easily. A DBMS is a set of software programs that controls the organization, storage, management, and retrieval of data in a database. DBMSs are categorized according to their data structures or types. The DBMS accepts requests for data from an application program and instructs the operating system to transfer the appropriate data. The queries and responses must be submitted and received according to a format that conforms to one or more applicable protocols. When a DBMS is used, information systems can be changed much more easily as the organizations information requirements change. New categories of data can be added to the database without disruption to the existing system. A DBMS includes four main parts: data structure, modeling language, database query language, and transaction mechanisms: Components of DBMS Data Definition Subsystem helps user to create and maintain the data dictionary and define the structure of the files in a database. DBMS Engine accepts logical request from the various other DBMS subsystems, converts them into physical equivalent, and actually accesses the database and data dictionary as they exist on a storage device. Data Manipulation Subsystem helps user to add, change, and delete information in a database and query it for valuable information. Software tools within the data manipulation subsystem are most often the primary interface between user and the information contained in a database. It allows user to specify its logical information requirements. Data Administration Subsystem helps users to manage the overall database environment by providing facilities for backup and recovery, security management, query optimization, concurrency control, and change management. Application Generation Subsystem contains facilities to help users to develop transactions-intensive applications. It usually requires that user perform a detailed series of tasks to process a transaction. It facilities easy-to-use data entry screens, programming languages, and interfaces. Microsoft Access 2003 to setup normalized tables and designed test data. Set-up and test all of the following queries using Structured Query Language (SQL). Structured Query Language (SQL) is a computer language which is designed for managing data in a relational database management system. It lets users to access and manipulate the database. The following task is to display how the Structured Query Language helps users to managing data in the Academic Human resources department system. An SQL query manifests itself as a series of commands or statements. Queries may include arithmetic calculations and can use query elements or procedures stored in the system. SQL databases are designed from using SQL queries The SQL language is used to ask database questions for the data stored inside the database: what is the value of the element stored in Name index?, or what is the relationship between the data name and salary?. Manipulative commands, like insert data or update record are also issued using SQL queries. A Data Definition Language allows SQL queries to create or administer the data structures, the tables of data, which constitute the database. The actual syntax used is a little more strict and regimented than these natural language phrases suggest, but in effect this is the type of communication that will take place between a relational database and the person or device querying it using SQL. Provide printouts of SQL code for each query and the output produced when you run the query in the database you have developed: Display the names and addresses of the branches of Petcare and the names of all the veterinary doctors working at each of the branches. Any specialism(s) of the veterinary doctors should also be shown. Below is the SQL code for create the table. SELECT Branch.BranchName, Branch.Address, VET.VetName, AnimalType.AnimalTypeName FROM (AnimalType INNER JOIN VetAnimalType ON AnimalType.AnimalTypeID = VetAnimalType.AnimalTypeID) INNER JOIN (Branch INNER JOIN VET ON Branch.BranchID = VET.BranchID) ON VetAnimalType.VetAnimalTypeID = VET.VetAnimalTypeID; Display all the appointments for the whole of the Petcare organisation. This should be ordered by date. The result should display the branch the appointment is at, the name of the veterinary doctor the appointment is with, the date and time of the appointment, the name of the animal the appointment is for, the type of animal and the breed of the animal. Below is the SQL code for create the table. SELECT Branch.BranchName, Vet.VetName, Appointment.Date, Appointment.Time, Animal.AnimalName, AnimalType.AnimalTypeName, Breed.BreedName FROM (Branch INNER JOIN Vet ON Branch.BranchID = Vet.BranchID) INNER JOIN ((AnimalType INNER JOIN Breed ON AnimalType.AnimalTypeID = Breed.AnimalTypeID) INNER JOIN (Animal INNER JOIN Appointment ON Animal.AnimalID = Appointment.AnimalID) ON Breed.BreedID = Animal.BreedID) ON Vet.VetID = Appointment.VetID Task 5 assumptions and Improvements Assumption For the design the Petcare database system, we have made some assumptions before the implementation of the database. The entity relationship diagramming is created to identify each entity, relationship and attributes. The assumptions are the follows: We must need to assign vet to any new appointment. Since each doctor only can work at one Branch at a time and they can specialize more than one type of animal. This mean all branch can for any type of animal to make appointment. set all the primary keys and foreign keys in all of the tables, each table have their unique ID. Each table should have a primary key, and each table can have only one primary key. In the task 3, we are using DBMS, Microsoft Access 2003, to setup normalized tables and designed test data. In the task 4, we are using SQL statements base on Microsoft Access 2003 to query our database to investigate the database system can be fulfills the requirements or not. Base on using the Entity relationship data model that describes the content and structure of the data help by the department. At the real environment, we can consider the database on three levels of abstraction: external, conceptual, and internal. The external level also has the users views of the database. This is depending on their needs, different users access different parts of the database. Improvements Object-orientation and databases Both object-oriented programming and relational database management systems (RDBMSs) are extremely common in software today. Since relational databases do not store objects directly (though some RDBMSs have object-oriented features to approximate this), there is a general need to bridge the two worlds. The core of object-relational thinking is the ability to incorporate greater levels of abstraction into data models. This idea represents a major shift in the way that data modeling is done. Current relational databases are usually highly normalized but with little abstraction. Each thing of interest is instantiated as a relational table. As a result, systems frequently require numerous database tables and an equal number of screen modules and reports. The program modules are usually based directly on these tables with user workflow only instantiated through the way that the hundreds of screen modules interact. The object-oriented (OO) approach to data modeling will be something of a change for people familiar with entity relationship modeling. Even though we still end up with tables and relationships at the end of the process, the way to think about the modeling process has to change. Object-relational data models have several advantages over traditional data models: They require fe wer entities (or classes in object-oriented terminology); They are more robust, in that they will support not only the specific user requirements gathered during the analysis phase, but will also usually support a broader class of requirements; They are more stable in that, as new requirements arise, the models will require fewer changes than traditional models Data is not information unless it is valued. Information value provides profit or gain only when accessible or used. Accessibility and use, through organized systems, provides competitive advantage. Speed determines the degree of competitive advantage. Computerized database systems are thus, the ultimate method of high-speed information retrieval. It is not difficult to build an organized database system. The difficulty lies in the laborious, mundane task of collecting, categorizing and maintaining the massive amounts of data. Information is not valued unless it is legitimate. It must be valid and true to be worthy of use in decision-making. So, it is critical that all aspects of our system provide quality. To quote statistics based on erroneous data is considered foolish or criminal. The core of object-relational thinking is the ability to incorporate greater levels of abstraction into data models. This idea represents a major shift in the way that data modeling is done. Current relational databases are usually highly normalized but with little abstraction. The database systems have become so important to organizations that the activity is devoted to planning for, monitoring and administering the systems. We can focus on the planning and managerial activities relevant to database. It is defined the concept of data administration, the scope of the data administration function, relate the costs and benefits of having a data administration functions. It also defines the concept of a data dictionary and considers the issue of database security. The data control is primary function for the database administrator (DBA). The DBA needs to be able to do three main things: Prevent would-be users from logging-on to the database Allocate access to specific parts of the database to specific users Allocate access to specific operations to specific users For the DBMS toolkit to review the database, the interface is essential function of most ICT systems it to interact with users. The three aspects are the content, control and format. The interface can be seen as collection of dialogues between the user and the ICT systems.

Smoking Should Be Outlawed and Tobacco Profit Applied to Medical Resear

Smoking Should Be Outlawed and Tobacco Profit Applied to Medical Research "Scientists know what makes tobacco so deadly. It's the more than 4,000 different chemicals that cigarettes contain. And the more than 400 different poisons that scientists have found in cigarette smoke" (LeTourneau). Does that statement appeal to you? Funny how the public hears this phrase and knows what tobacco is made from, yet they still smoke knowing that tobacco kills more than 440,000 people a year in America alone. "That's more people than die from AIDS, alcohol, car accidents, fires, illegal drugs, murders, and suicides all added together"(LeTourneau). Tobacco is made from all kind of harmful things. Things that give little children asthma, give adults emphysema, cancer of the lungs, throat, mouth, tongue, and can cause many other awful occurrences with people's health. I believe that tobacco should be taken off the market completely. I believe that tobacco companies should not have to pay for rehabilitation for those people who are addicted to tobacco because it is t heir own choice. Inste...

Tuesday, September 3, 2019

The Yellow Wallpaper and The Cask Of Amontillado -- Yellow Wallpaper C

The Yellow Wallpaper and The Cask Of Amontillado  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚      The short story, " The Yellow Wallpaper", written by Charlotte Gilman, and "The Cask of Amontillado" written by Edgar Allan Poe, are stories in which the plots are very different, but share similar qualities with the elements in the story. "The Cask of Amontillado" is a powerful tale of revenge, in which the narrator of the tale pledges revenge upon Fortunato for an insult. "The Yellow Wallpaper" is a story about a woman, her psychological difficulties and her husband's therapeutic treatment of her illness. She struggles over her illness, and battle's her controlling husband. The settings in both stories are very important, they influence the characters, and help with the development of the plot.   In "The Yellow Wallpaper" the setting helps define the action as well as to explain characters behaviors. The setting is which the story takes place is in the narrators room, where she is severally ill, and she is "locked up" in the room which served as her cage. The room in which the narrator is caged in is a nursery, "it is a big, airy room, the whole floor nearly, with windows that look all ways. The paint and paper look as if a boys' school had used it." The narrator describes the color of the walls as repellent, almost revolting, it is an unclear yellow with a dull orange. The condition that the narrator is in, the repulsiveness of the room, and the room haunting her, drives her into insanity.   "The Cask of Amontillado" takes place in an appropriate setting, not only is the setting underground, but also in the blackness of the night. The story begins around dusk, one evening during the carnival season in a European city. The location quickly change... ...he wall, he thinks about his rejected opportunities and his unbearable regret. As he sobers with terror, the final blow will come from the realization that his life is ending in his catacombs dying with his finest wine. The catacombs, in which he dies, set the theme, and relate well with the story. Without the yellow wallpaper in the short story, the significance of the wallpaper would not mater, nor would it set the theme or plot. At night the wallpaper becomes bars, and the wallpaper lets her see herself as a women and her desire to free herself. She needs to free herself from the difficulties of her husband, and from her sickness. The settings in both, set up the elements of the stories and ads to the effect in both of the short stories.   Bibliography Branson, Leigh W. Edgar Allen Poe's Literary Neighborhood, 17 Mar. 1997 *htt://www.geocities.com/Athens

Monday, September 2, 2019

History of West Point Essay

In 1778 George Washington, for whom West Point was always a crucial strategic position in the United States, appointed Kosciuszko as a chief designer of its first fundamental fortifications to which he moved his headquarters the following year. In 1802, President Jefferson officially opened the United States Military Academy at West Point. Under the superintendence of Colonel Thayer (1817-1833) who was also called the â€Å"father of the Military Academy†, higher academic standards were set and a great emphasis was put on military discipline and code of conduct. Civil engineering became the fundamental subject on the curriculum at West Point and for many years its graduates were the nation’s major constructors of the first bridges, roads, railway lines, etc in the USA (A Brief History of the Academy). During the American Civil War, both warring sides, the South and the North, were headed mainly by West Pointers, such as Grant, Sherman, Jackson, Lee, Sheridan, and others. West Point graduates also distinguished themselves in Europe during World War I. After the war, the academic curriculum at West Point was gradually diversified and enormous efforts were made to improve various physical fitness programs (A Brief History of the Academy). Among the most prominent West Pointers that distinguished themselves in World War II were military leaders such as Eisenhower, Bradley, MacArthur, Wainwright, Patton, Clark, Stilwell, and others. In the postwar period, the curriculum at West Point was broadened again and included science and technology. In 1964, the Corps of Cadets was increased from 2,529 to 4,417 resulting in the appearance of new facilities. The enrollment of women at West Point began in 1976 and each class now has approximately fifteen percent of female cadets. At present, the West Point Military Academy comprises over 4,000 cadets and every year it graduates over 900 officers (A Brief History of the Academy). â€Å"Page # 2† Code of conduct at West Point At West Point every cadet adheres to an ethical code of conduct called the Cadet Honor Code whose golden rule states: â€Å"A cadet will not lie, cheat, or steal, or tolerate those who do†. The Honor Code is a vital and important tradition that was initially formalized in 1922 by Superintendent MacArthur who also established the Cadet Honor Committee. The last part of the golden rule, however, was not included in its original version. In 1970, the code of conduct was revised resulting in the introduction of the â€Å"non-toleration† clause (Jones). The Cadet Honor Code in its present form has no boundaries and sets high standards of ethical behavior not only when cadets are at West Point, but also when they are at home or with friends. Living by the code means that cadets must strive for moral and ethical perfection and must never lie, cheat, steal, nor can they tolerate lying, cheating, or stealing by others. Cadets must be truthful, fair, and respect the rights and property of other people, and also assume responsibility for their actions. These principles constitute the Spirit of the Code whose goal is the development of leaders of characters. These high standards distinguish the Military Academy at West Point as well as its graduates from any other institution and students. For Cadets, they are fundamental principles of life, not just prohibitions (Jones). At the Academy, there is a democratic system of responding to any violation of the Cadet Honor Code. West Pointers are responsible for running the Honor System, convening Honor Investigations and Hearings of particular cases. The Cadet Honor Board consisting of six members gathers and evaluates the evidence to decide whether a Cadet is guilty of violation of the Honor Code. In case a cadet is found guilty of violation of any aspect of the code, Board members inform the Superintendent of his status who then decides what will happen to that cadet. In most cases, â€Å"dismissal† is the standard verdict but the cadet may also be given another chance to live honorably in the future (Jones). â€Å"Page # 3† Cadet life and religion at West Point A cadet’s life at West Point is very busy. A cadet’s daily schedule includes classes, study, physical education, athletics, military duties, and over hundred extracurricular activities coordinated by the Cadet Activities Office. Many instructors and officers reside at West Point and provide additional help and instruction to the cadets who need it, and also guide many extracurricular activities in which cadets are involved in their free time. These activities include language, aeronautics, astronautics, computer, engineering, athletic, and many other clubs (The West Point Experience). Sports play a very important role in the life of West Pointers developing self-confidence, competitiveness, and self-discipline in cadets. The Academy’s intercollegiate program includes twenty-four sports. In addition, cadets also publish publications such as â€Å"Howitzer†, â€Å"The Pointer†, or â€Å"Bugle Notes†; run the WKDT radio station; and write, produce, and perform plays and music. Extracurricular activities at West Point are viewed as an important aspect of a college community life (The West Point Experience). Religion is another important aspect of community life at West Point. The religious ministry comprising all major faith groups is provided not only for the Corps of Cadets, but also for the West Point staff. While performing the ministry, chaplains in religious communities are often assisted by councils consisting of cadets (Nonstandard Activities of the United States Military Academy). West Point cadets have the opportunity to attend chapel services and practice various religious observances. Cadets can join and regularly participate in chapel choirs, ceremonial rites, discussion groups, Sunday religious school classes run by various religious affiliations whose mission is to contribute to the spiritual and moral development of the West Point community (The West Point Experience). REFERENCES: 1. A Brief History of the Academy. Retrieved May 6, 2008 from the World Wide Web: http://www. usma. edu/history. asp 2. Jones, D. United States Military Academy’s Honor Code and System. Retrieved May 6, 2008 from the World Wide Web: http://www. usma. edu/Cpme/HS_Outreach/HS_Outreach. htm

Sunday, September 1, 2019

Comparing Pride and Prejudice to Macbeth

In the first few chapters of ‘Pride and Prejudice’, Jane Austen portrays Fitzwilliam Darcy as: â€Å"so high and conceited†, â€Å"a most disagreeable man† and possessed of â€Å"shocking madness†. This is conveyed to the audience through Elizabeth Bennet’s eavesdropping and the Bennet family’s first impression of Darcy. At the start of ‘Macbeth’ however, the central character, Macbeth, is portrayed by William Shakespeare as a hero. In Scotland he is loved, trusted and admired: â€Å"Oh valiant cousin, worthy gentleman†, â€Å"brave Macbeth†.Nevertheless by the end of both works, the audience’s own opinion of each character has changed to the complete opposite. Their opinion has been altered by the authors who try to confute the audience’s initial understanding of both characters. Many characters throughout ‘Pride and Prejudice’ change in one way or another. They especially change ot her people’s impressions of them. A good example of this is Mr Wickham. When Wickham is first introduced into the novel, he is portrayed as a good, kind man who was unfortunate enough to have lived with Darcy: â€Å"Wickham was the happy man towards whom almost every female eye was turned†¦ As the novel progresses Elizabeth begins to find out about his true characteristics. The way in which Jane Austen changes our opinion of Wickham is initially through the letter that Darcy sends to Elizabeth after she has declined his first offer of marriage. The letter she receives explains why Darcy dislikes Wickham. It tells her of the ungentleman like things that Wickham has done in the past. It explains how he became a â€Å"wild one† as one of Darcy’s housemaids told Elizabeth when she made a visit to Pemberley.On the other hand in ‘Macbeth’, the character who undergoes the most change throughout the play is in fact Macbeth himself. At first, he was a very honourable and noble man, both on and off the battlefields of Scotland. This is shown we he is appointed to becoming Thane of Cawdor: â€Å"He bade me, from him, call thee Thane of Cawdor†. Macbeth however, was a very ambitious man as well, and this was part of the reason for his change of character and downfall: â€Å"I have no spur†¦but only vaulting ambition which o’erleaps itself†.It was Shakespeare’s portrayal of Macbeth’s ambition that allowed him to have the ability to change the audience’s opinion of Macbeth completely. Pushed by the idea that he could become king, his growing ambition and misplace confidence in the prophecies and Lady Macbeth, Macbeth begins to become an evil, murderous tyrant lacking any sense of mind. Another way in which Jane Austen changes ideas and characters in ‘Pride and Prejudice’ is through the actions and words of Mr Bennet. Mr Bennet undergoes one of the most significant changes thr oughout the course of the novel.When he is first introduced he is one of the primary characters offering comic relief and as the beginning of the story progresses, we see that his primary characteristics revolve around poking fun at his wife; â€Å"I have the utmost respect for your nerves. They've been my constant companion these twenty years. † He also stays aloof from his daughters, and does not care about serious matters of love. As the novel progresses, most especially after Lydia's elopement and arranged marriage, we see Mr. Bennet's character begin to change.The weight of his careless attitude finally sits heavy enough on his shoulders that he can no longer ignore it. While he still pokes fun at his wife, he understands that his daughters need a firm father if they are to curb their wild natures. With Lydia, it was too late, but he wasted no time in turning on Kitty and immediately laying down the law of his house: â€Å" This shows the audience that he realises that he hasn’t brought up his daughters how he wanted to and her wants to change that with kitty.