Tuesday, November 26, 2019

USS Minnesota (BB-22) in the Great White Fleet

USS Minnesota (BB-22) in the Great White Fleet USS Minnesota (BB-22) - Overview: Nation: United States Type: Battleship Shipyard: Newport News Shipbuilding Drydock Company Laid Down: October 27, 1903 Launched: April 8, 1905 Commissioned: March 9, 1907 Fate: Sold for scrap, 1924 USS Minnesota (BB-22) - Specifications Displacement: 16,000 tons Length: 456.3 ft. Beam: 76.9 ft. Draft: 24.5 ft. Speed: 18 knots Complement: 880 men Armament 4 Ãâ€" 12 in./45 cal guns8 Ãâ€" 8 in./45 cal guns12 Ãâ€" 7 in./45 cal guns20 Ãâ€" 3 in./50 cal guns12 Ãâ€" 3 pounders2 Ãâ€" 1 pounders4 Ãâ€" 21 in. torpedo tubes USS Minnesota (BB-22) - Design Construction: With construction beginning on the Virginia-class (USS Virginia, USS Nebraska, USS Georgia, USS , and USS ) of battleship in 1901, Secretary of the Navy John D. Long consulted the US Navys system of bureaus and boards for their input regarding the design of capital ships. While their thoughts centered on equipping the next class of battleships with four 12 guns, energetic debate continued over the types secondary armament. Following extensive discussions, it was decided to arm the new type with eight 8 guns placed in four waist turrets. These were to be supported by twelve rapid-fire 7 guns. Achieving a compromise with this armament, the new class pushed forward and on July 1, 1902 approval was received for construction of two battleships, USS Connecticut (BB-18) and USS (BB-19). Dubbed the Connecticut-class, this type would ultimately comprise six battleships. Laid down on October 27, 1903, work commenced on USS Minnesota at the Newport News Shipbuilding Drydock Company. Less than two years later, the battleship entered the water on April 8, 1905, with Rose Schaller, the daughter of a Minnesota state senator, acting as sponsor. Building continued for nearly two years before the ship entered commission on March 9, 1907, with Captain John Hubbard in command. Though the US Navys most modern type, the Connecticut-class was made obsolete that December when British Admiral Sir John Fisher introduced the all-big gun HMS Dreadnought. Departing Norfolk, Minnesota steamed north for a shakedown cruise off New England before returning the Chesapeake to take part in the Jamestown Exposition that April to September. USS Minnesota (BB-22) - Great White Fleet: In 1906, President Theodore Roosevelt became concerned about the US Navys lack of strength in the Pacific due to the increasing danger posed by Japan. To demonstrate to the Japanese that the United States could easily switch its main battle fleet to the Pacific, he directed that a world cruise of the countrys battleships be planned. Dubbed the Great White Fleet, Minnesota, still commanded by Hubbard, was directed to join the forces Third Division, Second Squadron. Both the flagship of the division and squadron, Minnesota embarked Rear Admiral Charles Thomas. Other elements of the division included the battleships USS Maine (BB-10), USS Missouri (BB-11), and USS Ohio (BB-12). Leaving from Hampton Roads on December 16, the fleet sailed south through the Atlantic and made visits to Trinidad and Rio de Janeiro before reaching Punta Arenas, Chile on February 1, 1908. Passing through the Straits of Magellan, the fleet cruised in review off Valparaiso, Chile before making a port call at Cal lao, Peru. Departing on February 29, Minnesota and the other battleships spent three weeks conducting gunnery practice off Mexico the following month. Making port at San Francisco on May 6, the fleet paused in California for a short time before turning west for Hawaii. Steering southwest, Minnesota and the fleet arrived at New Zealand and Australia in August. After enjoying festive and elaborate port calls, which included parties, sporting events, and parades, the fleet moved north to the Philippines, Japan, and China. Concluding goodwill visits in these countries, Minnesota and the fleet transited the Indian Ocean and passed through the Suez Canal. Arriving in the Mediterranean, the fleet divided to show the flag in numerous ports before rendezvousing at Gibraltar. Reunited, it crossed the Atlantic and reached Hampton Roads on February 22 where it was greeted by Roosevelt. With the cruise over, Minnesota entered the yard for an overhaul that saw a cage foremast installed. USS Minnesota (BB-22) - Later Service: Resuming duty with the Atlantic Fleet, Minnesota spent much of the next three years employed off the East Coast though it did make one visit to the English Channel. During this period, it received a cage mainmast. In early 1912, the battleship shifted south to Cuban waters and in June aided in protecting American interests on the island during an insurrection known as the Negro Rebellion. The following year, Minnesota moved to the Gulf of Mexico as tensions between the United States and Mexico increased. Though the battleship returned home that fall, it spent much of 1914 off Mexico. Making two deployments to the area, it helped support the US occupation of Veracruz. With the conclusion of operations in Mexico, Minnesota resumed routine activities off the East Coast. It continued in this duty until being moved to the Reserve Fleet in November 1916. USS Minnesota (BB-22) - World War I: With the US entry into World War I in April 1917, Minnesota returned to active duty. Assigned to Battleship Division 4 in the Chesapeake Bay, it commenced operations as an engineering and gunnery training ship. On September 29, 1918, while conducting training off Fenwick Island Light, Minnesota struck a mine which had been laid by a German submarine. Though no one on board was killed, the explosion caused substantial damage to the battleships starboard side. Turning north, Minnesota limped to Philadelphia where it underwent five months of repairs. Emerging from the yard on March 11, 1919, it joined the Cruiser and Transport Force. In this role, it completed three trips to Brest, France to help return American servicemen from Europe. Completing this duty, Minnesota spent the summers of 1920 and 1921 as a training ship for midshipmen from the US Naval Academy. With the end of the latter years training cruise, it moved into reserve before being decommissioned on December 1. Idle for the next three years, it was sold for scrap on January 23, 1924 in accordance with the Washington Naval Treaty. Selected Sources DANFS: USS Minnesota (BB-22)NHHC: USS Minnesota (BB-22)NavSource: USS Minnesota (BB-22)

Saturday, November 23, 2019

4 Common Questions About How to Vote in College

4 Common Questions About How to Vote in College With so much else to juggle while in college, you may not have thought much about how to vote. Even if its your first election or going to school means you live in a different state, figuring out how to vote in college can be relatively simple.  Ã¢â‚¬â€¹Ã¢â‚¬â€¹ I Live in One State but Go to School in Another. Where Do I Vote? You can be a resident of two states, but you can only vote in one. So if youre a college student who has a permanent address is in one state and lives in another to attend school, you can choose where you want to cast your vote. Youll need to check with your home state or the state your school is in for more details on registration requirements, how to register and, of course, how to vote. You can generally find this information through a states Secretary of State website or  the board of elections. Additionally, if you decide to vote in your home state but are living in another state, youll probably need to vote absentee. Make sure you allow yourself enough time to receive - and return - your ballot through the mail. The same goes for changing registration: While a few states offer same-day voter registration, many have firm deadlines for registering new voters before an election.   How Do I Vote in My Hometown Election If Im Away at School? If, say, you live in Hawaii but are in college in New York, chances are you arent going to be able to head home to vote. Assuming you want to remain a registered voter in Hawaii, youll need to register as an absentee voter and have your ballot sent to you at school. How Do I Vote in the State Where My School Is? As long as youve registered to vote in your new state, you should get voter materials in the mail that will explain the issues, have candidate statements and say where your local polling place is. You may very well vote right on your campus. If not, theres a pretty good chance that a lot of students at your school will need to get to the neighborhood polling place on Election Day. Check with your student activities or student life office to see if they are running shuttles or if there are any carpooling initiatives involved for reaching the polling place. Lastly, if you dont have transportation to your local polling place or wont be able to vote on Election Day for some other reason, see if you can vote by mail.   Even if your permanent address and your school are in the same state, youll want to double-check your registration. If you cant get home on Election Day, you either need to vote absentee or consider changing your registration to your school address so you can vote locally. Where Can I Get More Information on the Issues That Affect College Students? College students are a critical - and very large - voting constituency who are often at the forefront of political activism. (Its not an accident presidential debates are historically held on college campuses.) Most campuses have programs and events, put on by campus or local political parties and campaigns, that explain different candidates views on certain issues. The internet is full of information on elections but put in the effort to seek out credible sources. Look to non-profit, non-partisan organizations for details on election issues, as well as quality news sources and political parties websites, which have information on initiatives, candidates, and their policies.

Thursday, November 21, 2019

Managing Information in Toyota Motor Corporation Research Paper

Managing Information in Toyota Motor Corporation - Research Paper Example The objective here is to achieve optimum cost control so that it will reflect positively on the bottom - the line of the company’s profits and give maximum returns to the stakeholders of the company. Efforts at cost control, without compromising on quality, are an everyday effort within the company Cost control can be defined as â€Å"Application of (1) investigative procedures to detect variance of actual costs from budgeted costs, (2) diagnostic procedures to ascertain the cause(s) of variance, and (3) corrective procedures to effect realignment between actual and budgeted costs.† The type of information that is required to achieve cost control is wide-ranging and has to be acquired from a variety of sources. The types of cost that are incurred in a typical manufacturing concern include direct costs, indirect costs, hidden costs, future liability costs, intangible costs, external costs etc.a. Direct costs: Direct cost is costs that can be readily identified as those d irectly incurred in them the manufacturing process. It includes raw materials, wages depreciation etc.  b. Indirect costs: Costs, which cannot be attributed directly to production, are termed as indirect costs. These include salaries, rent, marketing expenses etc.  c.   An example would be where customers are not satisfied with the product which results in a fall in sales. â€Å"Some examples of hidden quality costs are customer dissatisfaction with a product or defects in a product that causes a loss of sales.

Tuesday, November 19, 2019

Airplane accident Research Paper Example | Topics and Well Written Essays - 2250 words

Airplane accident - Research Paper Example So far, NTSB has established that aviation can profit from more training of pilots and the re-evaluation of the existing safety procedures in cases of engine malfunctions. Thesis: Despite pilot errors being the primary  cause of the airplane accidents, there are other issues such as mechanical dysfunction, poor weather, and landing accidents that can result in aviation accidents. Literature Review Statistics show that the number of airplane accidents experienced in developed nations has dropped since 2010 even though aircraft accidents in developing nations have increased. According to Learmount, in 2010 in the United States alone there were 26 fatal airplane accidents, compared with 28 accidents in 2009 (Learmount). According to Flightglobal, which researches aircraft malfunctions and evaluates them for the benefit of aviation and aerospace experts in the air transport industry, the number of commercial aircraft accidents from 2010 to 2011 rose to 32 from 28 (Rapoport 46). Airline safety professionals have attributed this fact to the emergence of in-flight malfunctions when the planes encounter severe weather or when birds interfere with the engines while the planes are in flight. According to NTSB statistics, between 2004 and 2008, there were approximately 245 commercial aviation accidents that occurred as a result of different reasons such as adverse weather or fuel exhaustion (2010 NTSB aviation statistics released). The numbers of plane crashes would increase over the years at a steady rate so that in 2010, general aviation aircraft, which include commercial aircraft, had 267 aircraft accidents (2010 NTSB aviation statistics released). Even though adverse weather is a common cause of plane crashes, many pilots still choose to navigate through it rather than delay flights. This may in part be due to the pressure of maintaining the passengers’ preferred schedules. According to Jarboe, there were 111 weather-related commercial aircraft crashes in Pue rto Rico and the United States in 2004 alone. Between 2010 and 2011, 15% of all aviation accidents were the result of the malfunctioning of in-flight systems due to adverse weather (Jarboe 2). Harsh weather systems are also thought to have caused the malfunctioning of in-flight systems in the ill-fated Air France’s flight AF447. Air crash investigators who examined the different parts of the ill-fated flight AF447 also confirmed that the malfunctioning of the pitot tube may have pushed the pilots to erroneous decisions. All avionics mechanical systems are dependent on pitot tubes.   This device is responsible for measuring the impact of oncoming air. However, the simple design of pitot tubes makes them susceptible to blockages which can be caused by mud wasp nests, dead insects, and ice. According to Jackson, the failure of the pitot system is viewed as being the worst possible malfunction that can occur when a plane is in flight (Jackson). Numerous airplane accidents that took place in the past can be have been traced to the existence of a faulty pitot tube. According to Jackson, in 1995, an X-31A research aircraft crashed in California after its pitot tube was covered by ice (Jackson). Another plane, the Austral Lineas Aereas Flight 2553, similarly crashed, causing the deaths of its 74 passengers, when its pitot tube was completely frozen. Its pilots had actually presumed that the plane was stalling- which is something that is

Sunday, November 17, 2019

Information Assurance Essay Example for Free

Information Assurance Essay Information Assurance (IA) can be referred to as the process that involves in the management of perils that are closely related to the usage, processing, storage and electronic transfers of information. This field has been birthed by information security, a field in computer security. Information Assurance is aimed at availability, authentication, non-repudiation, integrity and confidentiality of information and information systems thus serving as a defense and protection turf for electronic information. The process of Information Assurance commences with the act of specifying and classifying the assets of the information to be protected. This process of information specification and classification is done objectively taking into contemplation the nature, source and the purpose of the information in focus. This is followed by risk assessment that is done by Information Assurance practitioner who has to put into consideration the likelihood and the impact of the undesired actions that may negatively affect the disclosure of the information in storage to unauthorized individuals. It is at this stage that the both qualitative and the quantitative value of the risk in relation to the current situation and predictable hazard is determined. Moreover, the IA practitioner develops a risk management plan that puts forward the countermeasures that can probably mitigate, accept, eliminate or transfer the risks. The plans also puts into consideration the detection, prevention and response towards the emergent or prospective perils (Qian, Tipper, Krishnamurthy, 2008). During the plan development, various frame works can be employed such as ISO 17799, PCIDSS, ISO/IEC 27002 or CobiT. Procedures and policies such as frequent data and information backups and configuration hardening, installation of anti-virus programs and firewalls are among the countermeasures that can be used. Other activities included as countermeasures are trainings and the restructuring of the computer network systems which put in place computer emergence response team (CERT) or computer security incident response team (CSIRT). These countermeasures aim at managing, extenuating or totally eliminating the forthcoming risks in the most cost-effective manner. Later, implementation, testing and evaluation of the plan are undertaken through various designed methodologies such as formal audits. An overhaul, known as the service integrity service is put in place to protect the resources of the system from accidental unwarranted change, destruction or loss (Rogers, 2004). The system’s authenticator, also referred to as the system administrator, bears the entire authorization mandate and it is only through his certification and accreditation that a third party or any other person can access the information in store. In addition, liaison of the authenticator with the user representative and the program manager grants equal access rights to the protected information. The above three officials also have to decide agreeably on the most appropriate approaches to be instituted in an attempt to meet all the information security prerequisites. Once they have identified these methodologies, they also highlight on the security remedies that are satisfying. The authenticator’s leadership, these information system officials are bestowed with the obligation to oversee the activities of the information system security. So as to be able to access the information in the system, the authenticator has to issue a declaration indicating that approval has been granted to the any alleged declaration holder to operate the automated information system (AIS). Included in this declaration are the sets of standardized rules and regulations that must be adhered to the latter by all users having the right of access to the stored information. These prescriptions are aimed at safeguarding the information in store and the Automated Information System at large. Besides this declaration, data security can be ensured by the use of logins, passwords and digital certificates which are specifically issued to those users who are sanctioned (May, et al, 2004). The former is not so much campaigned for but instead, the latter and the use of biometric techniques such as voice and fingerprints as regarded as more secluded methods. Computer information attackers have devised ways to overwrite and also override these login passwords and as a result, this safety methodology is rarely relied upon. Once authentication has been granted, encryption of the sensitive data is done to avert it from eavesdropping and other related computer information crimes. During the process of authentication personal information is gathered and entered into the automated system which aids in the person’s identification. As a result, the party is issued with a credential. This credential validates the user identity claim when he/she is accessing the controlled and protected assets or information. In pursuit to ensure more safety over the stored information, multi-factor authentication has been employed. The multi-factor authentication process is subject to various environments and other technological rudiments and varies depending on these two aspects (Department of the Army, 2007). These techniques may include network architecture controls, remote network access, network sniffers and securing network ports. Failure to conform to or adopt any of the above mentioned authentication methodologies will expose the stored data to computer information systems defaulters who can craftily bypass weak technical controls. Consequently, they distort the information. This distortion may vary from mere acts such as modifying the main memory’s information after having read it to causing notable and probably irreversible behavior of the schedulers which are finally associated with the crashing of the entire information systems with large volumes data loss. In addition the can disable the firewall module packet filtering by transforming the image such that the agent’s in-memory store code starts working inappropriately (Larry, 2009). This may render the agent disabled from accessing the system. Once automated information attacker gains this unauthorized opportunity to access to the clients’ information he has the freedom to perform dynamic data modifications. Besides, he can access the system management memory (SMM) handler. The end result of this will be a system management random access memory (SMRAM) cache-based attack. Computer information criminals also alter the information system’s operating codes. Moreover, they can access client’s personal and confidential details such personal identification numbers and probably financial institution’s information thus ending up in a big loss in their finances. National and scientific databases have been prepared and managed by the governments of various states. Moreover, academic organizations and research institutions are also reliable. However, these stakeholders have to take keen attention during the auditing of the information, especially those received from partnerships with other organizations to avoid errors that may be disastrous in the future. In information assurance, the information flowing in the associated institutions should be confidential as earlier said and also the information’s integrity should be well safeguarded. In ensuring that the information meets these prerequisites, the British standards well implemented. Information assurance standards are also published a template in the IA website. Moreover, the Defense Information Systems Agency (DISA) site contains these standards which are also coordinated with the MCNOSC. Therefore in conclusion, information assurance can be basically taken to mean the information operations (IO) aimed at information and information systems (IS) protection. This is achieved through the information assurance standards that see the achievement of information availability, its integrity, confidentiality, authentication and non-repudiation. The realization of these standards ensure the refurbishment of IS through the amalgamation of restoration, detection, fortification and reaction competences

Thursday, November 14, 2019

Class Reflection on Study of Indigenous People :: Indigenous Studies

WOW When I first came into this class, introduction to indigenous studies, I was uncertain of what to expect but really interested. Part taking in my major towards history and noticed this class I immediately pounced on it as I was quite interested and very pleased. I have been paying attention to many circumstances going on with the indigenous people, their land and culture over the past few years. As even into the first day of class it opened my eyes to a whole new way of life, situations and much much more that indigenous people have went through and are still going through taking my perception much more in-depth, and I cant belief how astonished I am already only six weeks into the course. A very interesting piece I took very seriously was the one by Ermine, Willie. Aboriginal Esptimology, First Nations Education in Canada. As it began to introduce me into a whole new world of the insight and knowledge of aboriginals, it just amazed me. It helped me understand the thoughts and how in depth and real the believes and rituals are. â€Å"Philosophers among Aboriginal people have explored and analyzed the process of self-actualization. The being in relation to the cosmos possessed intriguing and mysterious qualities that provided insights into existence. In their quest to find meaning in the outer space. Aboriginal people turned into the inner space. This inner space is that universe of being within each person that is synonymous with the soul, the spirit, the self.† Wow. To me that quotation was intense I had to read it over a few times to understand the in depth meaning and message it was giving me. I found it so meaningful and in lighting how the thoughts would come to a person like that. When I read that I was greatly interested in the inner self and honestly looked many examples up on Google for a longer period of time than I thought. But as I read on in Willie’s writings I noticed this quote. â€Å"No one could dictate the path that must be followed. There was reconition that every individual had the capacity to make headway into knowledge that comes from the inner space in the individual gives rise to a subjective world-view out onto the external world. The in-depth and analysis of this reading I cant even explain how this took me, I am sorry if I’m carrying this one reading on to far but I have one more quote I took that I would like to share. Class Reflection on Study of Indigenous People :: Indigenous Studies WOW When I first came into this class, introduction to indigenous studies, I was uncertain of what to expect but really interested. Part taking in my major towards history and noticed this class I immediately pounced on it as I was quite interested and very pleased. I have been paying attention to many circumstances going on with the indigenous people, their land and culture over the past few years. As even into the first day of class it opened my eyes to a whole new way of life, situations and much much more that indigenous people have went through and are still going through taking my perception much more in-depth, and I cant belief how astonished I am already only six weeks into the course. A very interesting piece I took very seriously was the one by Ermine, Willie. Aboriginal Esptimology, First Nations Education in Canada. As it began to introduce me into a whole new world of the insight and knowledge of aboriginals, it just amazed me. It helped me understand the thoughts and how in depth and real the believes and rituals are. â€Å"Philosophers among Aboriginal people have explored and analyzed the process of self-actualization. The being in relation to the cosmos possessed intriguing and mysterious qualities that provided insights into existence. In their quest to find meaning in the outer space. Aboriginal people turned into the inner space. This inner space is that universe of being within each person that is synonymous with the soul, the spirit, the self.† Wow. To me that quotation was intense I had to read it over a few times to understand the in depth meaning and message it was giving me. I found it so meaningful and in lighting how the thoughts would come to a person like that. When I read that I was greatly interested in the inner self and honestly looked many examples up on Google for a longer period of time than I thought. But as I read on in Willie’s writings I noticed this quote. â€Å"No one could dictate the path that must be followed. There was reconition that every individual had the capacity to make headway into knowledge that comes from the inner space in the individual gives rise to a subjective world-view out onto the external world. The in-depth and analysis of this reading I cant even explain how this took me, I am sorry if I’m carrying this one reading on to far but I have one more quote I took that I would like to share.

Tuesday, November 12, 2019

Metonymy and Euphemisms

In the previous chapter I presented the default cases of metonymy and how cognitive and communicative principles govern the selection of a preferred metonymic vehicle. These principles enable us to understand why we choose certain entities to access a target and why some vehicle-to-target routes have been conventionalized in the language. However, it sometimes occurs that cognitive and communicative principles are overridden because of the speaker’s expressive needs or a particular social situation. The violation of the principles in question may result in the use of metonymy – based euphemisms which I will try to explore in the following discussion. As it was mentioned before, there are certain cognitive and communicative principles which account for the choice of preferred metonymic vehicles. Among cognitive principles we distinguish for example, the HUMAN OVER NON-HUMAN, the CONCRETE OVER ABSTRACT, the GOOD GESTALT OVER POOR GESTALT or the SPECIFIC OVER GENERIC principle. Kovecses and Radden (1998: 45-50) notice that cognitive principles mainly contribute to human experience, perceptual selectivity and cultural preference. Most of the people’s conceptualizations is affected by our human experiences and perceptions. Thus, we attach greater importance to things that we can easily perceive and interact with. Cultural preferences are also significant factors in determining our choice of certain vehicles in metonymy. Therefore, we often select the stereotypical, ideal or typical members of a category to stand for that category. In the example He has a great heart the cognitive principle CONCRETE OVER ABSTRACT is applied. The hearer encounters no difficulty in understanding the metonymy since we tend to refer to concrete physical object which are more salient than abstract entities. Thus the hearer knows that the speaker is talking about a person who is very kind and not about one whose heart has a large size. The default selection of a metonymic vehicle is also determined by two communicative principles, namely the principle of clarity and the principle of relevance. Entities that are clear and relevant are more preferred to those that are less clear and relevant. Therefore, in a sentence   people achieve the intended target effortlessly since the principle CLEAR OVER OBSCURE governs the understanding of the metonymy. Yet, as Radden and Kovecses (1998: 53) state, cognitive and communicative principles account for the choice of default routes, they are unable to explain the selection of non-default cases of metonymy. One of the examples of non-default routes are metonymic euphemisms. Radden and Kovecses (1998: 53) suggest that what may account for the non-default selection is social considerations. It means that the speaker refrains from uttering a clear, literal expression because he does not want to sound vulgar or indiscrete. The authors (1998: 52) also propose that rhetorical effects may be another reason for choosing a non-default route. The examples of these strategies will be presented later in the discussion. First, however, the term euphemism has to be explained and reasons for its occurrence in language explored. The word ‘euphemism’ is of a Greek origin and it means ‘good sounding’, ‘good auguring’, ‘mild’. In dictionaries it is defined as a rhetorical device. Since Polish and English examples of metonymy-based euphemisms will be presented in the paper, I will give some explanations of the term in question coming from Polish and English linguistic sources. Dictionary of Contemporary English (1990: 346) gives the following definition: ‘the use of a pleasanter, less direct name for something thought to be unpleasant’. Allan and Burridge (1991: 14) propose that euphemisms are ‘alternatives to dispreferred expressions’ and are used to ‘avoid possible loss of face: either one’s own or, by giving offense, that of the audience, or of some third party’. Another explanation comes from Polish. All in all, as Dabrowska (1993: 51) summarizes euphemisms are all those words or phrases that bring positive or neutral connotations. They are used to avoid or soothe a name of dispreferred expression and the reasons for the occurrence of euphemisms are paralinguistic (psychological, social, ideological or political). That is to say, euphemisms are widely employed in language in response to taboos. Generally speaking, a taboo is prohibition of certain behaviours (including language ones) that can bring harm or embarrassment to the hearer. As there is a wide spectrum of areas where the term ’taboo’ operates, different definitions of this phenomenon exist. Nevertheless, as Dabrowska (1993: 17) points out, almost all the explanations which appear in dictionaries, encyclopaedias and linguistic papers define ‘taboo’ as a prohibition of a certain type, a phenomenon which should be avoided or treated carefully because of the possession of harmful, dangerous powers. A taboo guards certain human values and social norms. Since a taboo is a ban of certain behaviours it also refers to the linguistic behaviour. It means that some words are forbidden to be communicated or preferred to be avoided. The reasons for the avoidance are mainly connected with religious beliefs, superstitions, death, sex or politics. Thus, what the speaker can do is either not to use a prohibited expression or to substitute it for another one – euphemism. In other words, a euphemism is a linguistic response to a ban of uttering certain words. Let us now discuss the reasons that stand behind the appearance of a linguistic taboo and therefore, the occurrence of euphemisms. In the past, people were afraid of referring directly to the names of certain supernatural beings and to the names of certain animals. They believed that those creatures possessed some magical and supernatural powers. Thus, people felt fear and anxiety for them and did not mention directly the names of God or such animals as a bear or a lion. It resulted in expressions the Lord or the All-Mighty. Ullmann (1967: 205-6) calls this phenomenon ‘taboo of fear’. Dabrowska (1993: 27-8) observes that this kind of motivation was stronger in the past but it cannot be stated that it is not present currently. Nowadays, euphemistic expressions motivated by fear are those associated with the devil. Holders (1987: ) gives such instances as Lord of the flies, black gentleman, Old Scratch and Ullmann (1967: 205) lists Nick and Hangie. Many scholars notice that the use of euphemisms is determined by courtesy, kindness and delicacy. The speaker avoids expressions that can offend or distress the hearer. Ullmann and Kany (1967: 206-7) call this phenomenon ‘taboo of delicacy’. Due to the existence of ‘taboo of delicacy’ we do not talk explicitly about death, diseases, physical and mental defects or criminal actions, especially when they directly involve our interlocutors. For example, instead of adopting very explicit verb ‘to die’ we may substitute it for a euphemistic phrase ‘to pass away’ which seems to be a milder and more appropriate form in many cases. In other situations the use of euphemisms is motivated by ‘taboo of propriety’ (Ullmann, 1967: 207-8). Norms of decency make people avoid a direct reference to such topics as sex, swearing or certain body parts and their functions. The speaker’s decency, modesty and sometimes his embarrassment refrain him from mentioning troublesome subjects directly. Therefore, one can talk about having sex using a euphemistic expression to sleep with. It is also very common that people ask about the location of a place where they can wash their hands or powder their nose, meaning a toilet. Leszczynski (1988: 22) observes that avoiding certain expressions is caused also by the speaker’s disapproval of some words or phrases. Thus, the speaker does not use these words or tries to communicate them in a milder and more pleasant way. Leszczynski (1988: 22) emphasizes that a very significant factor which motivates the use of euphemisms is on the one hand, the protection of hearer’s feelings and sensitivity and on the other, the protection of the speaker himself. The former situation results from the speaker’s real care about his interlocutor or his false concern which only aims at avoiding people’s disapproval. With respect to the protection of the speaker, he either believes in what he is saying or wants to meet with the acceptance of society. As Dabrowska (1993: 26-7) points out, the speaker’s use of euphemisms in response to the ‘taboo of propriety’ may be an effect of hypocrisy. The author (1993: 26-7) claims that people sometimes do not make a direct reference to certain body parts and bodily functions not because of their real need but because of being prudish. Dabrowska (1993: 27) also observes that the speaker’s cunning and his self-interest is a highly common factor for euphemizing. In order to induce the hearer’s positive attitude, that is necessary to attain certain goal, the speaker emphasizes the value of certain things. He presents himself and his actions in the most favourable light and raises their prestige. This kind of behaviour aims at bewitching hearers and making them, for instance, to buy certain advertised products or, in politics, to believe in politician’s good intentions. Motivation based on cunning and the speaker’s self-interest is characteristic for euphemisms present in the language of advertising, politics, propaganda and diplomacy. For example, it is politically correct to use an expression excess of labour force instead of unemployment. In the language of politics we frequently hear about price regulation which is a gentler phrase for rise in prices. As it was presented, there are numerous factors that condition the use of euphemistic expressions. Similarly, a wide spectrum of linguistic ways for euphemizing exist. One of them is metonymy which is commonly used to employ euphemisms in language. Just to remind, Webster’s Third New International Dictionary ( ) defines metonymy as a substitution of the name of one entity for the name of another entity on the condition that these entities are related to each other. Radden and Kovecses (1999: 18) add that the substitution of entities is not enough. What is essential is that metonymy interrelates these entities to â€Å"form a new, complex meaning†. Langacker (1993: 30) perceives metonymy as a reference-point phenomenon in which a reference point – an entity evoked by a metonymic expression – makes possible accessing the desired target.

Saturday, November 9, 2019

How Does the Film “the Breakfast Club” (1985) Perpetuate Teen Stereotypes Essay

â€Å"The Breakfast Club† shows the typical stereotypes of before, specially the 80s. The snob girl that thinks she shouldn’t be there, the popular sports boy, the rebel that is not understood, the nerd that doesn’t want to be in trouble, the outcast that is ignored, and the teacher that thinks to highly of themselves and thinks that teenager equals problem. In the 80s â€Å"The Breakfast Club† became really popular. This could be because the teenagers that saw it found themselves identified with the characters. It also made adults and teenagers see from the outside what was happening, and that stereotypes did exist. Nowadays these stereotypes still exist in a way, but not as marked as before. Now teenagers could communicate with other people from different groups, not like in the film, were the â€Å"popular† girl doesn’t think the rebel, nerd or outcast should be with her there. She thinks to highly of herself. Internet has also helped people not label others as much. Now people sometimes meet though internet, and this makes the first impression useless in what it refers to appearance. Teenagers get to know each other more, so they don’t fall for the stereotypical appearance of others. I find that what has also changed between the 80s and now, is that studies have become more important. It is true that we still think a lot about our appearance, clothes, etc. but the society has made us more aware of the fact that without studies we maybe wouldn’t be able to go far. More information on TV has also influenced, now people are informed better on what’s happening around the world. Teenagers now know there is more apart from school and friends, and are more worried about their future and world-wide problems, than to belong to a group. We are more understanding on what is around us, we are less narrow minded. Know we know there are people the same as us, so we give more opportunities. However, are stereotypes still giving problems? Many adults stereotype teenagers as being lazy, unmotivated, and undetermined individuals. Loud, obnoxious, rebellious, out of control, and up to no good†¦ Many people in different generations sincerely believe that all teenagers are guaranteed trouble no matter where they are. I am not arguing that teenagers like that don’t exist, because there are plenty of them out there, but it is bothering that one type of teenager has been able to spoil the image of all the others. Things like long or coloured hair, black clothes, heavy make-up, ect. Create a wrong idea of the person. Things like saying that a teenager is bad just because they are trouble makers is wrong, someone could be just having fun and act serious somewhere else. People, specially teachers and parents, think that all teenagers are always ready for the battle, that they are not capable of reasoning, listening, or saying something interesting. In an external point of view, I personally find teenagers more interesting than any other group of ages. We are in the middle of children and adults, our view of the both is split into two and our exposure between them is different, this creates a wider point of view. Therefore, a different opinion. In conclusion, Stereotypes have changed throughout the years, people don’t label as much. However, it’s still there, and is still harmful.

Thursday, November 7, 2019

Free Essays on History Of Korean Economy

Few scholars of economics describe Korean economic success as â€Å"The miracle on the Han.† Korean economic success from the 1960s to 1980s is contributed by a number of international, social, political, and cultural factors. Korea’s economic transformation did not happen overnight or restricted to just few ingredients. In my opinion these factors were interrelated in many ways. Not one factor by itself could be responsible for such a complicated task. Influences of international powers have shaped Korean economy in many ways. Japan and United States’ influence has been extraordinary compared to others. Japanese colonialism unmistakably laid foundations for transformation to modern economy of Korea. Under Japanese rule, Korea changed from agricultural oriented society to a modern industrialized nation. The colonial government, although its intentions were geared for their gains, helped establish railroads, textile factories, power plants, and others. United Sta tes plays a crucial role for war-devastated Korea in the 1950s. U.S. aided more than any nation through military and economic assistance. Its assistance laid foundations for modern economy that present Korea built itself on. But international help alone cannot be held responsible for economic success of Korea. A dynamic class of entrepreneurs and a class of dependable and efficient industrial workers that were able to assimilate and change with global economic trends were also essential. Without them foreign capital and technology into the economy is likely to be a wasted effort (Eckert et al., 1990, p. 400). The country’s low standard of living and low pay invited and promoted foreign investments. Although Korea provided cheap labor and quality products it would not have been complete without government’s strong hold on policies. Authoritarian rule of General Part era might not be approved by most democratic nations at the time but for Korea, it seemed necessary. With... Free Essays on History Of Korean Economy Free Essays on History Of Korean Economy Few scholars of economics describe Korean economic success as â€Å"The miracle on the Han.† Korean economic success from the 1960s to 1980s is contributed by a number of international, social, political, and cultural factors. Korea’s economic transformation did not happen overnight or restricted to just few ingredients. In my opinion these factors were interrelated in many ways. Not one factor by itself could be responsible for such a complicated task. Influences of international powers have shaped Korean economy in many ways. Japan and United States’ influence has been extraordinary compared to others. Japanese colonialism unmistakably laid foundations for transformation to modern economy of Korea. Under Japanese rule, Korea changed from agricultural oriented society to a modern industrialized nation. The colonial government, although its intentions were geared for their gains, helped establish railroads, textile factories, power plants, and others. United Sta tes plays a crucial role for war-devastated Korea in the 1950s. U.S. aided more than any nation through military and economic assistance. Its assistance laid foundations for modern economy that present Korea built itself on. But international help alone cannot be held responsible for economic success of Korea. A dynamic class of entrepreneurs and a class of dependable and efficient industrial workers that were able to assimilate and change with global economic trends were also essential. Without them foreign capital and technology into the economy is likely to be a wasted effort (Eckert et al., 1990, p. 400). The country’s low standard of living and low pay invited and promoted foreign investments. Although Korea provided cheap labor and quality products it would not have been complete without government’s strong hold on policies. Authoritarian rule of General Part era might not be approved by most democratic nations at the time but for Korea, it seemed necessary. With...

Tuesday, November 5, 2019

Aphrodite, the Greek Goddess of Love and Beauty

Aphrodite, the Greek Goddess of Love and Beauty Aphrodite is the goddess of beauty, love, and sexuality. She is sometimes known as the Cyprian because there was a cult center of Aphrodite on Cyprus [See Map Jc-d]. Aphrodite is the mother of the god of love, Eros (more familiar as Cupid). She is the wife of the ugliest of the gods, Hephaestus. Unlike the powerful virginal goddesses, Athena and Artemis, or the faithful goddess of marriage, Hera, she has love affairs with gods and mortals. Aphrodites birth story makes her relation to the other gods and goddesses of Mt. Olympus ambiguous. Family of Origin Hesiod says Aphrodite arose from the foam that gathered around the genitals of Uranus. They just happened to be floating in the sea after his son Cronus castrated his father. The poet known as Homer calls Aphrodite the daughter of Zeus and Dione. She is also described as the daughter of Oceanus and Tethys (both Titans). If Aphrodite is the cast-offspring of Uranus, she is of the same generation as Zeus parents. If she is the daughter of the Titans, she is Zeus cousin. Roman Equivalent Aphrodite was called Venus by the Romans as in the famous Venus de Milo statue. Attributes And Associations Mirror, of course she is the goddess of beauty. Also, the apple, which has lots of associations with love or beauty (as in Sleeping Beauty) and especially the golden apple. Aphrodite is associated with a magic girdle (belt), the dove, myrrh and myrtle, the dolphin, and more. In the famous Botticelli painting, Aphrodite is seen rising from a clam shell. Sources Ancient sources for Aphrodite include Apollodorus, Apuleius, Aristophanes, Cicero, Dionysius of Halicarnassus, Diodorus Siculus, Euripides, Hesiod, Homer, Hyginus, Nonnius, Ovid, Pausanias, Pindar, Plato, Quintus Smyrnaeus, Sophocles, Statius, Strabo and Vergil (Virgil). Trojan War and Aeneids Aphrodite / Venus The story of the Trojan War begins with the story of the apple of discord, which naturally was made of gold: Each of 3 goddesses: Hera - marriage goddess and wife of ZeusAthena - Zeus daughter, wisdom goddess, and one of the powerful virginal goddesses mentioned above, andAphrodite thought she deserved the golden apple, by virtue of being kallista the most beautiful. Since the goddesses couldnt decide among themselves and Zeus wasnt willing to suffer the wrath of the females in his family, the goddesses appealed to Paris, son of King Priam of Troy. They asked him to judge which of them was the most beautiful. Paris judged the goddess of beauty to be the loveliest. In return for his verdict, Aphrodite promised Paris the fairest woman. Unfortunately, this fairest mortal was Helen of Sparta, wife of Menelaus. Paris took the prize that had been awarded him by Aphrodite, despite her prior commitments, and so started the most famous war in history, that between the Greeks and Trojans. Vergil or Virgils Aeneid tells a Trojan War sequel story about a surviving Trojan prince, Aeneas, transporting his household gods from the burning city of Troy to Italy, where he founds the race of the Romans. In the Aeneid, the Roman version of Aphrodite, Venus, is Aeneas mother. In the Iliad, she protected her son, even at the cost of suffering a wound inflicted by Diomedes.

Sunday, November 3, 2019

MGMT315 U4 IP Research Paper Example | Topics and Well Written Essays - 750 words

MGMT315 U4 IP - Research Paper Example s which every organisation must be aware of and adhere to before they can invest in a foreign country and before they can engage employees in that country. Any American company that intends to invest in a foreign country needs to keep abreast of the specific employment laws of that particular country so as to ensure that they do not get into problems with the regulatory authorities in the country. Before a company can invest in a foreign country, it is important to carry out an initial survey on the employment laws applicable in that country so as to determine how they differ from those applicable in the USA. This is important due to the fact that some employment laws may lead to a situation where the incremental operational costs exceed the benefits the company will get from operating in that country (Hennart and Larimo, 1998). Employment laws normally relate to rules and regulations governing minimum wages, maximum working hours and minimum annual leave days that an employee is entitled to. They also relate to the whether an employee is entitled to paid leave days or not. Employment laws are diverse in every country since in most cases the government of the country sets the minimum wages applicable to the employees in the country. The employment laws may also relate to the length of time that a company should keep employees on casual employment terms and the procedure to absorb them into permanent basis. American companies therefore need to familiarise themselves with laws in different countries so that they evaluate the economics of investing in a particular country (Hennart and Larimo, 1998). The management of the American company working in a global location need to analyse the political situation of the specific country so as to determine the political stability of the country. This is important in that the company will be able to evaluate the risks and return coefficients associated with investing in the country. A politically stable country provides a