Monday, December 30, 2019

Countless Years of Environmental Torture in Nepal

Overfilling with mountainous regions and breathtaking scenery, Nepal has yet to recover from countless years of environmental issues. Like a snowball rolling down a hill, problems in Nepal only grow more significant as the years go by. Taking notice of the extreme environmental problems in the country, world-wide organizations researched the regions of Nepal, only to find that water pollution was an emerging, life-threatening issue. Immediately, many international organizations partnered with the Nepalese government in hopes of improving the water status of the country by using the â€Å"Rainwater Harvesting Jar,† an efficient solution to the water problem. Nepal is a small country located between India and China with a growing population of over thirty million people. While the country is often famous for its beautiful landscapes and tourist attraction, Mount Everest, it is actually suffering with severe water pollution. Clean water is eventually becoming more limited and difficult to access, and the population of many communities is rapidly growing. â€Å"Many rural communities live in remote areas far from water supplies while in urban areas, an increase of population, caused in part by people moving because of the decade long internal conflict, is putting increasing strain on limited water and sanitation facilities† (â€Å"WaterAid’s Approach†). This ever-increasing population is not only affecting the amount of water, but also the cleanliness and safety of it. People are unaware ofShow MoreRelatedRohingya Problem in Bangladesh6891 Words   |  28 PagesChittagong Division,  Bangladesh), where the majority o f Rohingya are populated. Kingdom of Mrauk U Early evidence of Bengali Muslim settlements in Arakan date back to the time of King  Narameikhla  (1430–1434) of the  Kingdom of Mrauk U. After 24 years of exile in  Bengal, he regained control of the Arakanese throne in 1430 with military assistance from theSultanate of Bengal. The  Bengalis  who came with him formed their own settlements in the region.  Narameikhla ceded some territory to the SultanRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pages†¢ Gabrielle Hecht and Paul N. Edwards 271 8 A Century of Environmental Transitions †¢ Richard P. Tucker 315 About the Contributors †¢ 343 _ IN TR OD UC TIO N Michael Adas B y any of the customary measures we deploy to demarcate historical epochs, the twentieth century does not appear to be a very coherent unit. The beginnings and ends of what we choose to call centuries are almost invariably years of little significance. But there is little agreement over when

Sunday, December 22, 2019

Underage Drinking On College Campuses - 1464 Words

Underage Drinking on College Campuses Everyday there are young adults drinking underage around the United states on and off college campuses. Even with a national drinking age and laws that govern that drinking age, young adults are still drinking. Many universities across the nation have tried to eliminate underage drinking, by creating a zero alcohol on campus policy. This policy pertains to all students whether of drinking age or not. The universities that create such policies are known to college students as a dry campus. The concept of a dry campus is to eliminate the access to alcohol to those students that are under age, drinking and driving, and binge drinking on campus. Campuses that are dry have the most restrictive alcohol†¦show more content†¦Even with all the efforts to enforce an alcohol-free campus, the hard work has fallen to the waste side throughout the life span of the policy. To this very day, students continue to drink illegally in the dorms, in Greek ho uses on campus property, and in some cases openly around campus. The alcohol policy was put into place to protect the well-being of all concerned in the University community. The history of alcohol consumption at OU was the leading cause of the once wet campus to become dry. The movement to a dry campus began after the death of a freshmen pledge into the Greek system. The freshman had dead from alcohol poising after a night of binge drinking at a fraternity house. The death of the young man promoted leadership at OU to reevaluate the current alcohol policy. Per NBC News â€Å"Oklahoma University president David Boren says the one death on his campus was one too many.† (Williams 2004). In January 2005, the campus officially went to a dry campus, with a three-stick policy attached. Students would be given three alcohol policy violations before being expelled from the university (2016) . The leadership at OU had sold grounds for implementing the zero-alcohol policy. As rational as this policy was to implement, it hasn’t been as effective as the University was hoping for. Eliminating alcohol on campus is a far cry from the once wet campus. There is a middle ground that could haveShow MoreRelatedCollege Campus : Dangerous Incidents On Colleges Campuses1716 Words   |  7 PagesCollege freshmen are so excited when they enter the campus with a hope of enjoying their freedom. They also expect to be safe on their college campus but dangerous incidents on colleges campuses have increased in recent years. In one situation, an 18-year-old freshman student at one of the Chicago’s university could not forget her Friday night at the university dorm when she was attacked (Schulte, 2014). She said she was being watched couple times around campus by other man from a distance. AfterRead MoreBinge Drinking vs the Drinking Age Essays829 Words   |  4 PagesEnglish 101 March 13, 2013 Binge Drinking VS the Drinking Age Presidents of college campuses around the nation face issues of underage drinking and binge drinking on a regular basis and realizes that it is a danger and a problem. â€Å"Alcohol consumption is the third leading cause of death in the U.S., a major contributing factor to unintentional injuries, the leading cause of death for youths and young adults, and accounts for an estimated 75,000 or more deaths in the United States annually† (WechslerRead More Lowering the Legal Minimum Drinking Age Essay1622 Words   |  7 PagesThe issue of underage drinking has become a major problem, especially on college campuses. But, underage drinking is not purely the root of all accidents related to alcohol. The real problem lies within the unsafe underage drinking habits amongst youth. There are ways that these alcohol-related accidents can be avoided. Several organizations have been created that are targeting a change in the legal drinking age laws. One key way to lower the risk of unsafe drinking is to lower the minimum legalRead MoreAlcohol Issues on College Campuses1181 Words   |  5 PagesAlcohol Issues on College Campuses â€Å"Binge Drinking on College Campuses.† Center for Science in the Public for Science, Center for Science in the Public Interest. Web. 21Mar. 2012. The Center for Science in the Public Interest (CSPI) discusses that students enrolled in college are more likely to consume alcohol than their peers than do not attend college. They report that 1700 college students die yearly due to alcohol. The increasing number of college students drinking has resulted in higher incidencesRead MoreThe Legal Drinking Age Of The United States Essay1385 Words   |  6 Pagesremember the night before when they went out drinking. It is a common fact that most teenagers have had a drink of alcohol before their twenty-first birthday. Most teenagers drink regularly or in some cases, binge drink. Nobody can prevent underage drinking. When people tell a teenagers they cannot have something, it inclines them to want it even more and teenagers will go to extreme lengths to obtain it. In 1984, Congress passed the law stating the legal drinking age in the United States was twenty-oneRead MoreUnderage Drinking851 Words   |  4 PagesUnderage drinking is becom ing more of a noticeable problem in society, not only with high school students, but also with younger generations. Drinking is all over the television, the radio, and talked about in schools, public places, etc. Alcohol advertisements are more and more appealing to younger generations. If our youth is educated at a younger age, if school policies were stricter, and if clubs and bars cracked down on underage drinking the problem would not be as serious. Youth should beRead MoreThe Issue Of Underage Drinking928 Words   |  4 Pages The issue of underage drinking has been constant for many years. The law for the minimum drinking age allows people 21 and older to legally drink alcoholic beverages. It is hard to enforce this law especially on college campuses where lots of underage drinking takes place. Someone that is 18 and older can get into some clubs where they are getting drinks even though they are not supposed to. There is a level of responsibility they needs to be taken when people are drinking. They should know howRead MoreThe Effects of Alcohol on Campus Essay1367 Words   |  6 Pagesthe rules and laws of the university and the state. Underage drinking has become a nationwide pandemic. With the legal drinking age now at twenty-one, at least half of the college population is underage, leaving room for more students to engage in binge drinking at fraternities, athletic events, and dorm rooms. The fact that half the students are underage makes them more rebellious and wanting to feel above the law, ofte n ending in underage drinking. The articles that will be reviewed and discussedRead MoreUnderage Drinking And Teenage Drinking1584 Words   |  7 PagesAlex Wilmore Joshua James, Instructor ENG 111 07 July 2015 Underage Drinking â€Å"With such compelling information, the question is why haven t we been able to do more to prevent the crisis of underage drinking? The answer is: rising the age to 25† is what Lucille Roybal-Allard once said, a U.S. Representative for serving in Congress since 1993. This statement has brought many to speculate of issues and debates. This expression opened the eyes of American people that often struggled to make this truthRead MoreUnderage Drinking And Teenage Drinking1584 Words   |  7 PagesAlex Wilmore Joshua James, Instructor ENG 111 07 July 2015 Underage Drinking â€Å"With such compelling information, the question is why haven t we been able to do more to prevent the crisis of underage drinking? The answer is: rising the age to 25† is what Lucille Roybal-Allard once said, a U.S. Representative for serving in Congress since 1993. This statement has brought many to speculate of issues and debates. This expression opened the eyes of American people that often struggled to make this truth

Saturday, December 14, 2019

Batter My Heart, Three-person’d God by John Donne Free Essays

The poem â€Å"Batter My Heart, Three-person’d God† by John Donne is a prayer to God from the poet. Donne is a struggling sinner, and the poem is his desperate cry for help. He wants God to be in his life, no matter how difficult and painful it is, and desires to be everything God wants him to be. We will write a custom essay sample on Batter My Heart, Three-person’d God by John Donne or any similar topic only for you Order Now The poem gives a sense of Donne’s complex relationship with God. It is apparent that he is in the midst of a struggle with good and evil, and begins with a plea to God to enter his heart by any means necessary and rid him of the evil that has taken over. Donne uses graphic and violent imagery throughout the poem as a way of showing his utter desperation. This imagery is used in an exaggerated way to convey Donne’s strong desire for God, as well as implying that there is something else that is hindering his ability to allow God in himself. In using the metaphor â€Å"batter my heart† in the first line, Donne is implying that he wants God to use his power like a battering ram to enter his heart. This gives a strong indication that there is some unknown force – be it sin, evil, or the devil – preventing Donne himself from allowing God to enter. He refers to God as the â€Å"three-personed God,† alluding to the Bible’s teaching of God as the Father, the Son, and the Holy Spirit. Donne’s complaint is that God is not being aggressive enough in how he is dealing with him; the Father knocks, the Holy Spirit breathes, and the Son shines his light upon him, but Donne wants him to use his power more aggressively to â€Å"mend† him, help him become â€Å"new,† and force the evils out of him. The progression to violent imagery shows Donne’s desperation; he no longer wants God â€Å"knock,† but is asking him to â€Å"break† the door down, not simply â€Å"breathe† but to â€Å"blow,† and not â€Å"shine,† but to â€Å"burn. The use of alliteration with the words â€Å"break,† â€Å"breathe† and â€Å"blow† help in drawing attention to their severity, and emphasizing the extent of Donne’s desperation. He believes that in using these destructive actions, God will free him from his weaknesses and make him new again. In the second quatrain, it becomes clear that the first four lines are meant to be taken metaphorically, rather than literally. Donne likens his heart to a city that has been overtaken, and he wants God to be aggressive in taking it back. This expands upon the indication of the unknown force; Donne’s heart is the city that has been taken captive, and God is the savior that he wants to break down the gate and take it back by force. It becomes obvious in this quatrain that the previously unknown force holding Donne back is his sense reason and rationality. He shows that even his mind has failed him in his attempts to be close with God. Donne’s reason is what should be fighting for him in his battle and defending him, but instead is captured, shows weakness, and even lies to him. He suggests that although he believes God is the rightful ruler of his heart, his rationality has been impaired such that he cannot defend Him and let Him in. The sestet begins with further reinforcement of the notion that Donne wants God back in his life, no matter how difficult it may be. He begins by stating that even though his spiritual life is currently in a state of struggle, he still has a deep affection of God and wants to love and be loved by Him. His state of desperation is the result of this struggle. Donne quickly returns to the shocking imagery that has been prevalent throughout, claiming he is â€Å"betrothed† to the enemy. This claim of engagement to the devil is a paradox; he is not actually going to marry the devil, but at the time feels unwillingly more connected to God’s enemies and their ways than to God and God’s ways. He asks God to â€Å"divorce† him, to â€Å"untie or break† the engagement he has with the devil. At the end of the prayer, Donne uses two more paradoxes to explain how deep of a connection he wants to feel with God. He begs for God to imprison him to set him free and his feels as though God’s prison is the only way in which he can be truly free of his weaknesses, and pure of evils. He also begs to be ravished and filled with delight so that he may become pure, which carries some sexual imagery. As with the metaphor in the first quatrain, this is not a literal request; he simply wants to be convinced of the power of God, so that he can have a close and loving relationship with Him. These contradictions show a deeply emotional affection towards God, and when taken figuratively are very effective in conveying his message of desperation. Although â€Å"Batter My Heart, Three-person’d God† is filled with graphic and violent imagery, John Donne is not attempting to be crude or inappropriate. Donne is simply explaining his own tremulous relation with God, and uses the violent imagery as a means to show how desperate he has become in his mission to bring God back into his life. If he allows God to do whatever it takes, even if it means pain and the loss of his very freedom, he knows God can bring him into a close, loving relationship with Him and make him into the person he thinks God wants him to be. So he can pray, â€Å"Batter my heart,† â€Å"break, blow, burn,† â€Å"imprison me,† â€Å"enthrall† and â€Å"ravish† me, for he believes his God is a loving, pure, kind, and just â€Å"three-person’d God† and he trusts Him with his very heart, soul, and life. How to cite Batter My Heart, Three-person’d God by John Donne, Essay examples

Thursday, December 5, 2019

In 1968, a man called Franco Zefferelli produced a film of the Shakespeare classic Essay Example For Students

In 1968, a man called Franco Zefferelli produced a film of the Shakespeare classic Essay In 1968, a man called Franco Zefferelli produced a film of the Shakespeare classic; Romeo and Juliet. However in 1997 a newer version of the film was made by a man called Baz Lurham, and by comparing the two, you will immediately be able to notice how much the two versions differ. This is down to the difference of interpretation between the two directors of what exactly the expectations of the audiences were at that time. Obviously the audiences of 1968 would have been expecting a typical classic version of the Shakepeare play on-screen, whereas the audiences of 1997 would have been expecting something much more modern and like the world we live in today. Not only is this the case, but the fact that the two directors have chosen two extremely different settings for the films will have affected the outcome. Not forgetting that also between 1968 and 1997 many things in the world had changed, for example; there were now guns whereas in 1997 they had swords, and so this would have also p layed a big part in the differing of the two films. In the Zefferelli version the Capulets and the Montagues are two Roman Catholic families with a long on-going feud, both living in the town of Verona in the time of the middle-ages. Whilst the Lurhman version is set in the 20th century in the West Coast State, Venice Beach, with the Capulets being typical West Coast American Hispanics and the Montagues being White Anglo-Saxon Protestants. Although many things differ in the more recent film from the original film, two main aspects are kept the same; the general storyline and language used. Comparing the two films, bits of the storyline differed but as for the actual Shakespeare story, that had not changed. In both versions, we are introduced to Benvolio, the Montague gang leader who was actually quite a peace keeper, very much unlike Tybalt, the Capulet gang leader who is a very firey character. Also in both versions the directors chose to use original Shakespearean English throughout the movie even though in Lurhmans version it has been slightly modernised for the audiences sake. You could familiarise the two films through the aspect that the two families/gangs are dressed as if in uniforms. However the similarity stays there as the in the first the Capulet family are dressed brightly and the Montagues dully and in the second the Capulets are now dressed in dark colours and the Montagues in bright. Unlike Zefferelli, who used just the clothing to identify the two families from one another, Lurhman uses this but also iconography using gang crests, and freeze frames to identify the two sides in a more obvious and sharp manner. One of the main differences between the opening scenes of the Zefferelli version and the Lurhman version is the prologue. In the original Zefferelli version we are given a rather long prologue read slowly, calmly informing us of the feud. However in the second, the Lurhman version, we are given a hugely contrasting prologue where it bursts onto the blank screen out of nowhere as a news report with breaking news, and is read in a fast, informative and more serious way. Also in the first, the prologue is greeted with a calming ballad and panoramic views of the town of Verona. Whereas in the second it is greeted with loud choral music grabbing your attention, and a mosaic of different clips and pictures (teaser reel) from further on in the film to give us an idea of what we are in for. He did this as the audience of today can relate to it a lot more than Zefferellis as they will be used to seeing breaking news reports on the TV. .u1a199d78c0b9cf1ee00d2d5912071eb3 , .u1a199d78c0b9cf1ee00d2d5912071eb3 .postImageUrl , .u1a199d78c0b9cf1ee00d2d5912071eb3 .centered-text-area { min-height: 80px; position: relative; } .u1a199d78c0b9cf1ee00d2d5912071eb3 , .u1a199d78c0b9cf1ee00d2d5912071eb3:hover , .u1a199d78c0b9cf1ee00d2d5912071eb3:visited , .u1a199d78c0b9cf1ee00d2d5912071eb3:active { border:0!important; } .u1a199d78c0b9cf1ee00d2d5912071eb3 .clearfix:after { content: ""; display: table; clear: both; } .u1a199d78c0b9cf1ee00d2d5912071eb3 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u1a199d78c0b9cf1ee00d2d5912071eb3:active , .u1a199d78c0b9cf1ee00d2d5912071eb3:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u1a199d78c0b9cf1ee00d2d5912071eb3 .centered-text-area { width: 100%; position: relative ; } .u1a199d78c0b9cf1ee00d2d5912071eb3 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u1a199d78c0b9cf1ee00d2d5912071eb3 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u1a199d78c0b9cf1ee00d2d5912071eb3 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u1a199d78c0b9cf1ee00d2d5912071eb3:hover .ctaButton { background-color: #34495E!important; } .u1a199d78c0b9cf1ee00d2d5912071eb3 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u1a199d78c0b9cf1ee00d2d5912071eb3 .u1a199d78c0b9cf1ee00d2d5912071eb3-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u1a199d78c0b9cf1ee00d2d5912071eb3:after { content: ""; display: block; clear: both; } READ: The way Shakespeare maintains the audience's attention EssayAfter the introductory prologue in the first, the camera then takes us into the busy Verona market where we first meet the two families. We can see the feud between them almost immediately as the Capulets immediately try to mock the Montagues when they see them. The Montagues did not retaliate and looked the more peace-keeping of the two families, although when the Capulets became physical, this is when the retaliation from the Montagues came, and a huge sword fight broke out. When watching we see the Capulet, Benvolio try and break up the fight and make peace although he fails. This was because, at that point the firey, fearsome Capulet, Tybalt arrived and almost staright away, the camera zoomed in up close to his face, showing the audience he was a man of high stature. He refused to keep peace and fought, i.e. Peace? I hate the word! The fight went on for a short while with the camera showing us many different parts of the action, but was then broke up by the Verona boss, the Prince. Instantly the camera zooms in onto his face and looks up at him, indicating he is of a very high stature in the village, and is hugely respected and authoritative. He declared that if anyone was to start a fight again in the village, that person would be put to death, in turn hoping it would stop any conflict. However, after the prologue in the Lurhman version it cuts into action with us with a whole different mind set and expectance. Firstly we are greeted with the Montagues being shown as the younger, more child-like gang. We then meet the Capulet gang who look a lot more intimidating as they give the impression of being more experienced, fearsome and organised than the Montagues, and we can see that the Montagues know this, as they are showing lots of fear towards the Capulets. At this point the two gang leaders are in the petrol station shop and outside where the gangs are a small argument is breaking out. We then see that the Montagues know their leader is returning to them and so this is when the guns are raised. At this point we meet Benvolio, the Montague leader and to show us he is a main character, there is a freeze-frame with spaghetti Western style music in the back ground for a couple of seconds, and he is trying to keep the peace, when Tybalt, the formidable Capulet leader co mes out (another freeze-frame this time with typical bad guy music) and things get really tense. All of this shows that Zefferlli uses the camera to give a point of view whereas Lurhman doesnt use it for this, and instead uses it for impact on his audience. This is when the gun fight breaks out and you can clearly see the difference in quality, composure and experience between the two gangs. The Montagues are clearly scared, very uncalm and very unfocused and keep shooting wildly hitting the petrol sign time after time. Whereas Tybalt is extremely focused and virtually dances around the station shooting at the Montagues as if it came naturally to him. This then breaks out into a fight of a huge scale and causes masses of destruction to the city. This is then followed by a news report showing videos of the army, police and helicopters trying desperately to calm things down across the whole city and ends up having the two gang leaders (Benvolio and Tybalt) pointing guns at one another. This overall gives us a bigger feeling of shock than the Zefferrelli version as there has been a lot more damaged caused, this fight was on a much bigger scale and that just a simple biting of the thumb has caused all of this, in turn showing us how great t he feud between the two gangs was.

Thursday, November 28, 2019

M11Cde Skills-Based Assessment Essay Example

M11Cde Skills-Based Assessment Essay School of Engineering Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. . Download an electronic copy of this document and where there are blanks or spaces to complete addressing information etc. , please include them in the document. You submission should include the answers in the document, but do not change the document in any other way! If the document has been modified other than to include the required information your submissio n will be null and void. 3. Your files should be name as â€Å"SID_FIRSTNAME_SURNAME. doc†. E. g. 100292_FIRSTNAME_SURNAME. doc. 4. Save the configurations from all your network devices and embed them into the end of this document. 5. If you have attempted to configure VLANs, please also include a switch configuration from any one of your LAN switches. Please note that this must be a switch that you have actually configured VLANs on. 6. If you have implemented the network in Packet Tracer, you may consider submitting a copy of that as well but this is not compulsory. Zero Tolerance for late submission: If your work is late it will have to be marked zero according to new university policy. Please ensure you upload your work well before the deadline. You will be able to delete and update your work before the deadline. Plagiarism Note: We will write a custom essay sample on M11Cde Skills-Based Assessment specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on M11Cde Skills-Based Assessment specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on M11Cde Skills-Based Assessment specifically for you FOR ONLY $16.38 $13.9/page Hire Writer As with all assessed work, both the research and written submission should be your own work. When submitting this work you are explicitly indicating that you have read the rules on plagiarism as defined in the University regulations and that all work is in fact your own, except where explicitly referenced using the accepted referencing style. Feedback and marking: The practical work will be marked by using the questions set in the online quiz and number of questions for each section will depend on the weightings set in the below sections. Feedbacks and marks will be provided once the online practical quiz is submitted. Network topology [Whilst the topology shows only two hosts on each LAN, you should configure four hosts on each LAN. ] Network Information The WAN IP network address between Dundee and Glasgow is 209. 154. 17. 0 with a subnet mask of 255. 255. 255. 0. The WAN IP network address between Edinburgh and Glasgow is 209. 154. 16. 0 with a subnet mask of 255. 255. 255. 0. This is clearly shown on the network topology. Dundee information The LAN for Dundee has been assigned an IP network address of 192. 168. 6. 0 Each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 40. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Dundee |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 6th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. The table below shows how the 6th usable network can be identified. |Network |Network ID |First Host |Last Host |Broadcast |Mask | |0 |192. 168. 6. 0 |192. 168. 6. 1 |192. 168. 6. 14 |192. 168. 6. 15 |/28 | |1 |192. 168. 6. 16 |192. 168. 6. 17 |192. 168. 6. 30 |192. 168. 6. 31 |/28 | |2 |192. 168. 6. 2 |192. 168. 6. 33 |192. 168. 6. 46 |192. 168. 6. 47 |/28 | |3 |192. 168. 6. 48 |192. 168. 6. 49 |192. 168. 6. 62 |192. 168. 6. 63 |/28 | |4 |192. 168. 6. 64 |192. 168. 6. 65 |192. 168. 6. 78 |192. 168. 6. 79 |/28 | |5 |192. 168. 6. 80 |192. 168. 6. 81 |192. 168. 6. 94 |192. 168. 6. 95 |/28 | |6 |192. 168. 6. 6 |192. 168. 6. 97 |192. 168. 6. 110 |192. 168. 6. 111 |/28 | |7 |192. 168. 6. 112 |192. 168. 6. 113 |192. 168. 6. 126 |192. 168. 6. 127 |/28 | You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192. 168. 5. 0 Again, each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 240. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Edinburgh |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 4th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. You must follow the example for Dundee to complete the table for step 1 planning. You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. The elements of the coursework are: 1. Planning and assigning addresses [30 marks] 2. Basic configuration [40 marks] 3. Security ACLs [10 marks] 4. Security VLANs [20 marks] The basic theme is that Glasgow (GLA) is regional headquarters of the company. Edinburgh and Dundee are branch offices. Each network associate (student) will be responsible for an entire network. This means that using either the lab equipment in EC1-13 or Packet Tracer, you will configure 3 routers, 2 switches and 8 PCs. A network address and specific number of hosts per subnet has been assigned for the local LAN on each network (Edinburgh and Dundee). From the information provided, the subnet address, the subnet mask, the first and last usable addresses and the broadcast address for each site LAN need to be determined. (When using the router or Packet Tracer it is expected that you keep a copy of your router configuration at each stage, just in case you run into problems). Step 1 Planning Using the chart below, plan the first ten usable subnets of the LAN address assigned to Edinburgh. You have been given the first 6 addresses for Dundee, you are now expected to plan for the first 10 addresses for Edinburgh. Subnet |Subnet |Subnet |First Host |Last Host |Broadcast | | |Address |Mask (/x) | | | | |0 |192. 168. 5. 0 |28 |192. 168. 5. 1 |192. 168. 5. 14 |192. 168. 5. 5 | |1 |192. 168. 5. 16 |28 |192. 168. 5. 17 |192. 168. 5. 30 |192. 168. 5. 31 | |2 |192. 168. 5. 32 |28 |192. 168. 5. 33 |192. 168. 5. 46 |192. 168. 5. 47 | |3 |192. 168. 5. 48 |28 |192. 168. 5. 49 |192. 168. 5. 2 |192. 168. 5. 63 | |4 |192. 168. 5. 64 |28 |192. 168. 5. 65 |192. 168. 5. 78 |192. 168. 5. 79 | |5 |192. 168. 5. 80 |28 |192. 168. 5. 81 |192. 168. 5. 94 |192. 168. 5. 95 | |6 |192. 168. 5. 96 |28 |192. 168. 5. 97 |192. 68. 5. 110 |192. 168. 5. 111 | |7 |192. 168. 5. 112 |28 |192. 168. 5. 113 |192. 168. 5. 126 |192. 168. 5. 127 | |8 |192. 168. 5. 128 |28 |192. 168. 5. 129 |192. 168. 5. 142 |192. 168. 5. 143 | |9 |192. 168. 5. 144 |28 |192. 68. 5. 145 |192. 168. 5. 152 |192. 168. 5. 159 | |10 |192. 168. 5. 160 |28 |192. 168. 5. 161 |192. 168. 5. 174 |192. 168. 5. 175 | For the WAN links for DUN and EDN the lowest usable address on the networks must be used. Identify and use the lowest usable WAN address for your S0 interface assigned to you for the two networks shown: 1 Dundee:209. 154. 17. 1 Edinburgh:209. 154. 16. 1 For security reasons, all of the production workstations will be assigned the lower-half of the IP addresses of the assigned subnet. All of the network devices and management stations will be assigned the upper-half of the IP address numbers of the subnet assigned for the LAN. From this upper half range of addresses, the Ethernet router interface (the default gateway on each LAN) is to be assigned the highest usable address. Identify the required IP address of the Ethernet interface on your two routers. Address of your Ethernet interface on Dundee : 192. 168. 6. 10 Address of your Ethernet interface on Edinburgh : 192. 168. 5. 78 The host (PC) configurations must also be planned. Using the table, complete the host information. |Branch: DUN |IP Address Range | |Production Host Range |192. 168. 6. 97192. 168. 6. 103 | |(Lower half) | | |Management Host Range |192. 168. 6. 104192. 168. 6. 10 | |(Upper half) | | [5 marks for ranges of addresses] Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 6. 97 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 Management Host (1) IP Address192. 168. 6. 104 Subnet Mask255. 255. 255. 240 Default Gateway192. 1 68. 6. 110 |Branch: EDN |IP Address Range | |Production Host Range |192. 68. 5. 65192. 168. 5. 71 | |(Lower half) | | |Management Host Range |192. 168. 5. 72192. 168. 5. 78 | |(Upper half) | | Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 5. 65 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Management Host (1) IP Address192. 168. 5. 72 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Step 2 Basic Configuration Apply a basic configuration to the router. This configuration should include all the normal configuration items. You must supply one router configuration file. This will be either Dundee or Edinburgh. The router configuration files will be marked as follows: Basic Configuration †¢ Router name †¢ Console and VTY configuration and passwords (use ‘cisco’, ‘class’ and ‘berril’ for console, secret and VTY passwords respectively) †¢ Interface configurations DTE/DCE identified appropriately and clockrates set only on DCE †¢ Routing correct and working (RIP is fine) †¢ Host tables †¢ Banner display before login – warn of unauthorised access Basic Configuration (40 marks) Security (ACLS Marked as part of step 3) 1. ACLs correct and applied to correct interface in correct direction [10] 2. ACLs correct but not applied to correct interface or direction [7 9] 3. ACLs attempted but some errors or wrong placement [4 6] 4. ACLs attempted but incorrect and not applied properly [1- 3] 5. ACLs not attempted [0] ACL Total (Total 10 marks) Step 3 Security There are several security concerns in the Internetwork. Develop Access Control Lists (ACLs) to address security issues. The following problems must be addressed: 1. The production hosts in both the Edinburgh and Dundee networks are permitted HTTP access to the 172. 16. 0. 0 network, management hosts are permitted no access to this network. 2. The company has discovered an Internet Web server at 198. 145. 7. 1 that is known to contain viruses. All hosts are banned from reaching this site. The ACLs are worth 10 marks. Step 4 VLANs This step is the final 20% of the coursework mark. To achieve this step you should consider how you might use a VLAN to separate the production and management LANs. The goal is that neither network should be able to see the other network traffic. There is no additional guidance on this part of the skills test as you are expected to identify: 1. An appropriate VLAN number to use for each VLAN. 2. An appropriate VLAN configuration. 3. Implement the VLAN and provide the switch configuration file(s) to show that the VLAN has been implemented. VLAN Marks The VLAN component will be marked as follows: VLAN configured and correct configuration supplied [20] †¢ VLAN identified but configuration incomplete or incorrect [10 – 15] †¢ VLAN attempted [5 – 10 depending on level of attempt] †¢ VLAN not attempted [0] VLAN (Total 20 marks) Appendix Network device configurations†¦Ã¢â‚¬ ¦ [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Press RETURN to get st arted! Routerenable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Router(config)#hostname EDINBURGH EDINBURGH(config)#line console 0 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#line vty 0 4 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#enable password cisco EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHen Password: EDINBURGH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#enable secret class EDINBURGH(config)#exit EDINBURGH# SYS-5-CONFIG_I: Configured from console by console [pic] [pic] EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip address 209. 154. 16. 1 255. 255. 255. 0 EDINBURGH(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial2/0, changed state to up EDINBURGH(config-if)#exit %LINEPROTO-5-UPDOWN: Line protocol on Interface Seri al2/0, changed state to up EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip address 192. 168. 5. 78 255. 255. 255. 240 EDINBURGH(config-if)#no shutdown LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up EDINBURGH(config-if)#exit EDINBURGH(config)#router rip EDINBURGH(config-router)#network 172. 16. 0. 0 EDINBURGH(config-router)#network 192. 168. 6. 0 EDINBURGH(config-router)#network 192. 168. 5. 0 EDINBURGH(config-router)#network 209. 154. 16. 0 EDINBURGH(config-router)#network 209. 154. 17. 0 EDINBURGH(config-router)#exit EDINBURGH(config)# banner motd #warn of unauthorised access# EDINBURGH(config)# banner login #do not enter if you are not authorized# EDINBURGH(config)#ip host DUN 209. 54. 17. 1 192. 168. 6. 110 EDINBURGH(config)#ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration [OK] EDINBURGH# EDINBURGHshow host Default Domain is not set Name/address lookup uses domain service Name servers are 255. 255. 255. 255 Codes: UN unknown, EX expired, OK OK, revalidate temp temporary, perm permanent NA Not Applicable None Not defined Host Port Flags Age Type Address(es) DUN None (perm, OK) 0 IP 192. 168. 6. 110 209. 154. 17. 1 GLA None (perm, OK) 0 IP 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH [pic] [pic] [pic] EDINBURGH#show r Building configuration Current configuration : 1291 bytes ! version 12. 2 no service timestamps log datetime msec no service timestamps debug datetime msec o service password-encryption ! hostname EDINBURGH ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU. ZeCi1 enable password cisco ! ! ! ! ! ! ! ! ip host DUN 192. 168. 6. 110 209. 154. 17. 1 ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 ! ! ! ! ! ! interface FastEthernet0/0 ip address 192. 168. 5. 78 255. 255. 255. 240 ip access-group 100 in duplex auto speed auto ! interface FastEthernet1/0 no ip address duplex auto speed auto shutdown ! interface Serial2/0 ip address 209. 154. 16. 1 255. 255. 255. 0 ip access-group 10 out ! interface Serial3/0 no ip address shutdown ! interface FastEthernet4/0 o ip address sh utdown ! interface FastEthernet5/0 no ip address shutdown ! router rip network 172. 16. 0. 0 network 192. 168. 5. 0 network 192. 168. 6. 0 network 209. 154. 16. 0 network 209. 154. 17. 0 ! ip classless ! ! access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www access-list 100 permit ip any any access-list 10 permit any access-list 10 deny host 198. 145. 7. 1 ! ! ! no cdp run ! banner login ^Cdo not enter if you are not authorized^C banner motd ^Cwarn of unauthorised access^C ! ! ! ! line con 0 password cisco login line vty 0 4 password cisco login ! ! ! end EDINBURGH# EDINBURGH#show access-lists configuration EDINBURGH(config)#access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq 80 EDINBURGH(config)#access-list 100 permit ip any any EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip access-group 100 in EDINBURGH(config-if)#exit EDINBURGH(config)#access-list 10 permit any EDINBURGH(config)#access-list 10 deny host 198. 145. 7. 1 EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip access-group 10 out EDINBURGH(config-if)#exit EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration [OK] EDINBURGH# [pic] EDINBURGH#show access-lists Extended IP access list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www permit ip any any Standard IP access list 10 permit any deny host 198. 145. 7. 1 EDINBURGH# [pic] EDINBURGHSWITCH CONFIGURATION Switchen Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname EDINBURGHSWITCH EDINBURGHSWITCH(config)#line console 0 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#line vty 0 4 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#enable password cisco EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#enable secret class EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH# EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface vlan1 EDINBURGHSWITCH(config-if)#ip address 192. 168. 5. 77 255. 255. 255. 240 EDINBURGHSWITCH(config-if)#no shutdown %LINK-5-CHANGED: Interface Vlan1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up EDINBURGHSWITCH(config-if)#ip default-gateway 192. 168. 5. 78 EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#copy running-config startup-config Destination filename [startup-config]? Building configuration [OK] EDINBURGHSWITCH# EDINBURGHSWITCH#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. EDINBURGHSWITCH(vlan)#vlan 10 name production VLAN 10 modified: Name: production EDINBURGHSWITCH(vlan)#vlan 20 name management VLAN 20 added: Name: management EDINBURGHSWITCH(vlan)#exit APPLY completed. EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface fastethernet0/2 EDINBURGHSWITCH(config-if)#switchport mode access EDINBURGHSWITCH(config-if)#switchport access vlan 10 EDINBURGHSWITCH(config-if)

Monday, November 25, 2019

Women and Labor in Early America

Women and Labor in Early America Working in the Home From the late colonial period through the American Revolution, womens work usually centered on the home, but romanticizing this role as the Domestic Sphere came in the early 19th century. During much of the colonial period, the birth rate was high: soon after the time of the American Revolution it was still about seven children per mother. In early America among the colonists, the work of a wife was often alongside her husband, running a household, farm or plantation. Cooking for the household took a major part of a womans time. Making garments - spinning yarn, weaving cloth, sewing and mending clothes - also took much time. Slaves and Servants Other women worked as servants or were enslaved.  Some European women came as indentured servants, required so serve for a certain amount of time before having independence.  Women who were enslaved, captured from Africa or born to slave mothers, often did the same work that the men did, in the home or in the field. Some work was skilled labor, but much was unskilled field labor or in the household. Early in colonial history, Native Americans were also sometimes enslaved. Division of Labor by Gender In the typical white home in 18th century America, most of which were engaged in agriculture, the men were responsible for agricultural labor and the women for domestic chores, including cooking, cleaning, spinning yarn, weaving and sewing cloth, care of the animals that lived near the house, care of the gardens, in addition to their work caring for the children. Women participated in mens work at times. At harvest time, it was not unusual for women to also work in the fields. When husbands were away on long journeys, the wives usually took over the farm management. Women Outside Marriage Unmarried women, or divorced women without property, might work in another household, helping out with household chores of the wife or substituting for the wife if there was not one in the family. (Widows and widowers tended to remarry very quickly, though.)  Some unmarried or widowed women ran schools or taught in them, or worked as governesses for other families. Women in the Cities In cities, where families owned shops or worked in trades, the women often took care of domestic chores including raising children, preparing food, cleaning, taking care of small animals and house gardens, and preparing clothing. They also often worked alongside their husbands, assisting with some tasks in the shop or business, or taking care of customers. Women could not keep their own wages, so many of the records that might tell us more about womens work just dont exist. Many women, especially but not only widows, owned businesses. Women worked as apothecaries, barbers, blacksmiths, sextons, printers, tavern keepers and midwives. During the Revolution During the American Revolution, many women in colonial families participated in boycotting British goods, which meant more home manufacture to replace those items.  When men were at war, the women and children had to do the chores that would usually have been done by the men. After the Revolution After the Revolution and into the early 19th century, higher expectations for educating the children fell, often, to the mother. Widows and the wives of men off to war or traveling on business often ran large farms and plantations pretty much as the sole managers. Beginnings of Industrialization In the 1840s and 1850s, as the Industrial Revolution and factory labor took hold in the United States, more women went to work outside the home. By 1840, ten percent of women held jobs outside the household; ten years later, this had risen to fifteen percent. Factory owners hired women and children when they could, because they could pay lower wages to women and children than to men. For some tasks, like sewing, women were preferred because they had training and experience, and the jobs were womens work. The sewing machine was not introduced into the factory system until the 1830s; before that, sewing was done by hand. Factory work by women led to some of the first labor union organizing involving women workers, including when the Lowell girls organized (workers in the Lowell mills).

Thursday, November 21, 2019

Detail the severity of unemployment in the United States, the Research Paper

Detail the severity of unemployment in the United States, the Administration's response, and one major economic objection to the - Research Paper Example The unemployment statistics have never been as poor as they are today, at least not in decades. In fact, there is a possibility that is far worse than we have been led to believe. The United States unemployment issues is a huge topic be tossed back and forth, by both candidates, in the presidential election. In order to understand the overall unemployment issue it is necessary to grasp what does â€Å"unemployment† actually mean to the government? What do the statistics truly reveal about the current unemployment crisis and what has the current administration done to improve or prevent it? Generally speaking one would define â€Å"unemployment† as anyone who is not employed. It seems rather self explanatory, and yet the government has a different way of perceiving the concept, as well as, a number of categorizations that make up the statistics. In the eyes of the government an unemployed person is someone who is able to work and has been seeking work within the given mo nth. All of these individuals, 16 years of age and older, will fall into this category and therefore become part the current statistical assessment. It is upon these people that we receive the current, official unemployment rate. That rate, as of August 2012, is stated to be 8.1 percent.("Labor force statistics," 2012) The problem with this percentage is the restrictions on whom they are judging their assessments. They do not include the long-time unemployed who, due the nature of the job market, have given up the search for the, nearly, impossible. They do not include, previously, stay at home mothers or fathers that have, due to the economic crisis, found it necessary to find work but are unable to do so. For this reason, there are many Americans whose unemployment is not being immediately reflected in the above percentage. The government, also, has specific groupings to justify the different categories within unemployment. Natural unemployment reflects literally, the natural acce ptance and level of unemployment which is typical. Frictional unemployment allows for those employees that become unemployed intentionally, transitionally, but have yet to find new employment. Structural unemployment is when the skills of job seekers are not the skills employers are needing. Cyclical unemployment, is not considered a direct part of natural unemployment, it occurs with the success and failures within the business industry. Seasonal employees and â€Å"classically† unemployed are, also, included is separate categories. The Bureau of Labor Statistics assures that all people, in all forms of unemployment are ultimately assessed, but are statistically not included in the official unemployment rate. The unfortunate problem with this system is that it is not providing the overall data all together; if it did then the United States at this moment is closer to 25 percent, â€Å"†¦the same as during the Great Depression.†( Amadeo, 2012) According to the Bur eau of Labor Statistics unemployment was at the lowest it had been in many year in 2007, and the a sudden rise, followed by a continual rise over the last four years, until a sudden, subtle drop in the present year; as seen in the chart below-right.(â€Å"Labor force statistics,† 2012) In comparison to other countries it has been It is shocking. In 2002 the United States has the lowest unemployment rate worldwide. By 2010 we were the highest, as seen in the chart above-right, higher than the United Kingdom, Japan and Italy.(Ydstie, 2012) There