Thursday, September 19, 2019
After the Japanese attack on Pearl Harbor, the CIA (Central Intelligence Agency) was created by President Truman as an insurance policy against that kind of surprise, which caught America off guard in World War II. According to the National Security Act of 1947 the CIAÃ¢â¬â¢s principal function was to be the correlation and evaluation of intelligence collected by other departments. In other words, the CIA is an All-Source Fusion Agency. The difference involving the direction of the CIA during the cold war and the function that the CIA plays now have changed somewhat, but these roles basically remain the same. During the cold war, global security rested on the shoulders of the two greatest nations: The United States and the Soviet Union. Other nations had capabilities to harm other smaller nations, but none had the world power control of the two greatest nations. The CIAÃ¢â¬â¢s mission in the spring of 1948 was Ã¢â¬Å"to collect secret intelligence on the Soviet Union itself, its military intentions, atomic weapons and advanced missiles; on Soviet actions in Eastern Europe, North Korea and North Vietnam.Ã¢â¬ (Richelson, 217). The mission set forth the guidelines for the CIA to protect the United States from the SovietÃ¢â¬â¢s missiles. Now that the United States is dealing with nations of the former Soviet Union there is still a need to watch those Soviet missiles. The difference is now the CIA must track where the missiles and miscellaneous small arms are being distributed or sold. The mission of watching the missiles remains, but the role the CIA plays has slightly changed. The need for the CIA in todayÃ¢â¬â¢s global society has increased to a higher level than that of the cold war. Today there is a threat from every corner of the world, instead of only between the major world powers. With the United States being the only world power and the Soviet Union collapsed, weapons of mass destruction have hit the open market. This new over-the-counter missile sale has multiplied AmericaÃ¢â¬â¢s potential foes (Bissell, 205). Bin Laden has demonstrated that no activity oversees will be safe. With the horrific act of the attack on the USS Cole in October 2000, the Middle East has shown but one example of how the CIAÃ¢â¬â¢s roles of responsibility must change to watch smaller groups or organizations. The evil mix of fanaticism and flexibility that is the mark of todayÃ¢â¬â¢s terrorist makes the next strike not a question of if, but of when and where.
Wednesday, September 18, 2019
Study of William BlakeÃ¢â¬â¢s Poems of Experience Most of William BlakeÃ¢â¬â¢s poetry that I have studied has had a major theme or themes such as religion or oppression and usually his poems also use symbolism to get across the point. I am going to study closer two poems: The Tiger and A Poison Tree. The Tiger is a very famous poem and is one of the more popular poems written by Blake. I feel that the poem is about religion, creation and the French Revolution, which took place in France around the time, that Blake was writing these poems. I think that the Tiger itself is a personification of evil, which you could say is the French Revolution as many Europeans thought that the revolution was an evil thing. The animal, the Tiger is also a very strong, ferocious animal that hunts its prey very well. Again there are connections with the revolution, which was very strong and ferocious and did not stop until it got what it wanted like a tiger doesnÃ¢â¬â¢t stop until it gets its prey. The poem starts of by saying that the Tiger is Ã¢â¬ËburningÃ¢â¬â¢, which I thinks means that the revolution is alive and burning. The word burning gives a slow but steady feeling so that it makes the reader think that the revolution is alive but it has not yet hit full force and is just biding its time before it can make that crucial hit. The first verse ends by asking a question Ã¢â¬ËWhat immortal hand or eye could frame thy fearful symmetryÃ¢â¬â¢. I think that this refers to how quickly the revolution got out of control and who could possibly control it after that. Many other countries joined in to help the king of France but were they enough to stop the revolution? Through the second, third and fourth verses Blake gives a very strong image of the Ã¢â¬ËTigerÃ¢â¬â¢ being created possibly by God himself. Blake uses phrases such as Ã¢â¬Ësinews of thy heartÃ¢â¬â¢, which gives a feeling of a very strong and unforgiving thing being produced. Then he moves on to speak of what tools could have created the Ã¢â¬ËTigerÃ¢â¬â¢ and Blake mentions tools such as a hammer, a furnace and an anvil which are all tools used in forging metal and heavy industry such as that. This gives the reader a sense of the Ã¢â¬ËTigerÃ¢â¬â¢ being very strong and tough. Also the image of a furnace burning relates back to the revolution burning and it makes me think of things which you donÃ¢â¬â¢t touch or go near as they are very dangerous. This could be related to the dangerousness of the
Tuesday, September 17, 2019
It is rather common to observe chronic inflammatory Gingival giantisms during and/or station orthodontic intervention. Sometimes the giantisms may even potentially complicate and/or interrupt orthodontic intervention. With the debut of soft tissue optical masers these jobs can now be addressed more easy. Amongst many LASERS now available in Dentistry DIODE LASERS seem to be most ideal for orthodontic soft tissue applications. As newer interventions herald into minimally invasive techniques, DIODE LASERS are going more promising both in patient satisfaction and dentist satisfaction. Keywords: Gingival giantism, LASERS, DIODE, Compliance.IntroductionIt is rather common to observe chronic inflammatory Gingival giantisms during and/or station orthodontic intervention. Sometimes the giantisms may even potentially complicate and/or interrupt orthodontic intervention. In malice of frequent patient instruction and motive of the patient sing unwritten hygiene, it Ã¢â¬Ës rather common to see patients developing gingival over growings because of hapless conformity and complicated orthodontic contraption designs. Conventionally surgical gingival giantisms are treated by Gingivoplasty or Gingivectomy utilizing Surgical knifes & A ; Blades. After development of soft tissue LASERS ( Light Amplification by Stimulated Emission of Radiation ) patients conventional techniques are replaced by LASER Gingivoplasty & A ; Gingivectomy. The possible advantages of LASERS include: Minimized intra operative hemorrhage, Less runing clip, Faster mending, Less postoperative hurting and puf finess, Good patient credence and easiness for orthodontist to restart back to intervention fast1-4. This article presents instance studies of successfully treated gingival giantisms with Diode LASERS. Degree of gingival giantisms can be scored as5 Grade 0: No marks of gingival giantism. Grade 1: Giantism confined to Interdental papilla. Grade 2: Giantism involves papilla and fringy gingival. Grade 3: Giantism covers three quarters or more of the Crown.Case 1A 19 twelvemonth old female patient was referred from Department of Orthodontics to Department of Periodontology after her orthodontic intervention for rectification of Gingival symmetricalness. Clinical scrutiny revealed Grade II Gingival Overgrowths in relation to Maxillary & A ; Mandibular front tooths. Patient besides has important physiological melanin pigmentation of affiliated Gingiva, Marginal Gingiva and Inderdental papilla ( Figure:1 ) . After appropriate patient instruction she was enrolled for Phase I periodontal therapy. After four hebdomads of callback there were no important alterations in the Gingival symmetricalness. Then patient was treated with Diode LASERS and Gingivoplasty and melanin depigmentation of Maxillary anterior Gingiva was performed. Post operatively patient was rather satisfied with both gingival symmetricalness and gingival coloring material ( Figure:2 ) .Case 2A 16 twelvemonth old Fem ale was referred from Orthodontics section to Department of Periodontology during her active intervention stage for appraisal of Gingival status. Clinical scrutiny revealed generalised gingival expansions along with generalised hemorrhage on examining. Orthodontist was advised to take the arch wires and molar sets. After patient was explained about her gingival status and the intervention, she was enrolled for Phase I therapy. After for hebdomads the Phase I therapy consequences were evaluated and farther determination was made to rectify the residuary Grade II gingival giantisms by Diode LASERS ( Figure: 3 ) . After Diode LASER Gingivoplasty gingival architecture was reverted to normal ( Figure: 4 ) . Orthodontic therapy was resumed after 2 hebdomads of equal healing.Case 3A 18 twelvemonth old female patient was referred to Periodontology section amid her Orthodontic intervention. Intra unwritten scrutiny revealed Grade II type Gingival Overgrowth in relation to Maxillary front too ths and 2nd bicuspids. Orthodontist was advised to take off the arch wire and patient was enrolled for Phase I periodontal therapy. After rating of stage I consequences the determination was made to rectify gingival giantisms by Diode LASERS. Gingival giantism rectification and melanin depigmentation of maxillary anterior gingival was done using Diode LASERS. Orthodontic therapy was resumed after 2 hebdomads of equal healing.DiscussionImproper unwritten hygiene leads to plaque accretions and subsequent periodontal jobs and caries6. With fixed orthodontic contraptions and patients Ã¢â¬Ë improper unwritten hygiene patterns can compromise the orthodontic intervention outcomes7. In longterm orthodontias interventions merely a 50 % conformity rate has been noted8. Factors which can act upon conformity include: patient features, intervention continuance and complexness, Dentist and patient relationship and educational and behavioural intercessions used9-13. Orthodontists are often challenged by soft tissue jobs associated with intervention. Most frequent challenges include gingival giantisms and gingival dissymmetry that can turn even good treated instance into 1 that falls short aesthetically. Conventional surgical gingivolplasties and gingivectomies have built-in patient related jobs like: Surgical injury, station operatve hurting and puffiness, hapless patient credence etc. With the debut of soft tissue optical masers these jobs can now be addressed more easy. Amongst many LASERS now available in Dentistry DIODE LASERS seem to be most ideal for orthodontic soft tissue applications14 ( Table: 1 ) . DIODE LASERS are most ideal because of built-in advantages like16: Sole intent is soft tissue remotion No hazard of harm to next tooth Structure Excellent haemostasis Dry-field operation Light contact of the fiber tip with tissue Proprioceptive feedback Portability Incorporation of DIODE LASERS in orthodontists Ã¢â¬Ë office besides helps to undertake with other soft tissue jobs like17-20: Aesthetic gingival recontouring, Soft tissue Crown prolongation, Exposure of soft-tissue impacted dentitions Removal of inflamed and hypertrophic tissue and Frenectomies Tissue remotion at the site for miniscrewDecisionWith the coming of low strength Soft tissue specific LASERS like DIODE, managing the soft tissue related ailments has become more ease and honoring. As newer interventions herald into minimally invasive techniques, DIODE LASERS are going more promising both in patient satisfaction and dentist satisfaction.
Monday, September 16, 2019
Corepro Soft is a high-end firm started in 2004 as part of diversification plans of the group to migrate into IT to fulfill the global need of IT projects. At the helm of affairs it has strong technical team to develop and manage softwareÃ¢â¬â¢s and creates strong support for large corporations worldwide. We have built a reputation for professional relationships and a long- term career path, in stark contrast to traditional, nomadic consulting work. We develops soft wareÃ¢â¬â¢s based on Java, J2EE, J2ME, Oracle, C++, ASP.NET, VB.NET, SQL, PHP, AJAX, MYSQL and Embedded platform to fulfill any technical domain. Several other partners nationwide to serve the needs of companies all over the world. Vision: We are committed to be a truly global organization in providing IT services by Upholding the value system and following ethical business practices. We ensure Customer satisfaction while encouraging team participation by being an employer of Choice. Mission: We are one of the fastest growing, world-class and reputed providers of Information Technology services and solutions. Its mission is to help leading global corporations Create and sustain a competitive advantage. As a true Global Organization, We offer its clients, partners and employees a wealth of cross-cultural expertise and knowledge to ensure a return on investment, sustainable and profitable long-term growth. PURPOSE OF THE SYSTEM EXISTING SYSTEM The system starts with registration of new staff and students. When the subjects are to be allocated to the faculty, the Head of the Department should enter everything in the Excel sheets. Then the staff entersÃ corresponding subjectÃ¢â¬â¢s attendance and marks of a student then those must also be entered in the Excel sheets and validations are to be done by the user itself. So there will be a lot of work to be done and must be more conscious during the entrance of details. So, more risk is involved. PROBLEMS IN THE EXISTING SYSTEM: Storing and accessing the data in the form of Excel sheets and account books is a tedious work. It requires a lot of laborious work. It may often yield undesired results. Maintaining these records as piles may turn out to be a costlier task than any other of the colleges and institutions Risks involved in existing system: Present System is time-consuming and also results in lack of getting inefficient results. Some of the risks involved in the present system are: During the entrance of marks and attendance, if any mistake is done at a point, then this becomes cumulative and leads to adverse consequences If there is any need to retrieve results it may seem to be difficult to search. PROPOSED SYSTEM UMS (UNIVERSITY MANAGEMENT SYSTEM) makes management to get the most updated information always by avoiding manual accounting process. This system has the following functional divisions. University Administrator College Administrator User (Students / Faculties) University Administrator has the functionality of registering new colleges and courses. College Administrator has the rights of creating department, allocating courses to departments, creating faculties, students and allocating subjects to faculties, and modifications in the data entered by the user can also be done by the college administrator. User of this may be faculty or students. Faculty has the facility of entering the marks and attendance of the students. Students can check their marks and attendance but there is no chance of modifications. Reports must be generated for the existing data i.e. for attendance and marks of the students, which are usedÃ to assess the performance of the students. These reports should be viewed by the in charge and user. INTRODUCTION After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important, but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult, improper understanding of present system can lead diversion from solution. ANALYSIS MODEL The model that is basically being followed is the WATER FALL MODEL, which states that the phases are organized in a linear order. First of all the feasibility study is done. Once that part is over the requirement analysis and project planning begins. The design starts after the requirement analysis is complete and the coding begins after the design is complete. Once the programming is completed, the testing is done. In this model the sequence of activities performed in a software development project are: Ã¢â¬â Requirement Analysis Project Planning System design Detail design Coding Unit testing System integration & testing Here the linear ordering of these activities is critical. End of the phase and the output of one phase is the input of other phase. The output of eachÃ phase is to be consistent with the overall requirement of the system. Some of the qualities of spiral model are also incorporated like after the people concerned with the project review completion of each of the phase the work done. WATER FALL MODEL was being chosen because all requirements were known beforehand and the objective of our software development is the computerization/automation of an already existing manual working system. Fig 2.2: Water Fall Model FEASIBILITY STUDY Preliminary investigation examine project feasibility, the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All system is feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: Technical Feasibility Operational Feasibility Economical Feasibility TECHNICAL FEASIBILITY Technical Feasibility centers on the existing computer system hardware, software, etc. and to some extent how it can support the proposed addition. This involves financial considerations to accommodate technical enhancements. Technical support is also a reason for the success of the project. The techniques needed for the system should be available and it must be reasonable to use. Technical Feasibility is mainly concerned with the study of function, performance, and constraints that may affect the ability to achieve the system. By conducting an efficient technical feasibility we need to ensure that the project works to solve the existing problem area. Since the project is designed with ASP.NET with C# as Front end and SQL Server 2000 as Back end, it is easy to install in all theÃ systems wherever needed. It is more efficient, easy and user-friendly to understand by almost everyone. Huge amount of data can be handled efficiently using SQL Server as back end. Hence this project has g ood technical feasibility OPERATIONAL FEASIBILITY People are inherently instant to change and computers have been known to facilitate change. An estimate should be made to how strong a reaction the user staff is likely to have towards the development of the computerized system. The staff is accustomed to computerized systems. These kinds of systems are becoming more common day by day for evaluation of the software engineers. Hence,this system is operationally feasible. As this system is technically, economically and operationally feasible, this system is judged feasible. ECONOMICAL FEASIBILITY The role of interface design is to reconcile the differences that prevail among the software engineerÃ¢â¬â¢s design model, the designed system meet the end user requirement with economical way at minimal cost within the affordable price by encouraging more of proposed system. Economic feasibility is concerned with comparing the development cost with the income/benefit derived from the developed system. In this we need to derive how this project will help the management to take effective decisions. Economic Feasibility is mainly concerned with the cost incurred in the implementation of the software. Since this project is developed using ASP.NET with C# and SQL Server which is more commonly available and even the cost involved in the installation process is not high. Similarly it is easy to recruit persons for operating the software since almost all the people are aware of ASP.NET with C# and SQL Server. Even if we want to train the persons in these area the cost involved in training is also very less. Hence this project has good economic feasibility. The system once developed must be used efficiently. Otherwise there is noÃ meaning for developing the system. For this a careful study of the existing system and its drawbacks are needed. The user should be able to distinguish the existing one and proposed one, so that one must be able to appreciate the characteristics of the proposed system, the manual one is not highly reliable and also is considerably fast. The proposed system is efficient, reliable and also quickly responding. S/w and H/w requirements 1. Environment: Servers: Operating System Server: Ã¢â¬â Microsoft Windows 2000 or Higher Data Base Server: Microsoft SQL Server 2000/2005 Clients: Microsoft Internet Explorer, Tools: Microsoft Visual Studio .Net User Interface: ASP.NET with AJAX Code Behind: VC#.NET 2. Requirements: Hardware requirements: Number Description 1 PC with 2 GB hard-disk and 256 MB RAM Software requirements: Number Description 1 Windows 2000/ XP/ or Higher with MS-office 2. MS-SQL server2000/2005 3. Ms-Visual Studio .Net 2005 4. Ms-Internet Explorer INPUT AND OUTPUTS: The major inputs and outputs and major functions of the system are follows: Inputs: University Administrator enter his user id and password for login to authenticate in this system University Administrator creates the college . While registration Colleges can able to provide their information like 1. College id 2. College name 3. Address Information of college 4. Password for the college Administrator can create the various college details in this website. Registered colleges and staff need to submit their log in information for change their password. For searching College details guest need to choose the colleges or search college option for user interface. For searching a college a guest can choose search college option. For upload their deatails a college must login to their profile For display they have to view the reports. Outputs: Administrator can have his own home page. Colleges ans staff and student have their own home page after completion of the authentication process. Admin get all colleges and staff and course details. The registered userÃ¢â¬â¢s data can be stored in centralized database through the system user interface. Various types of information can be displayed to the users like colleges, courses and course subjects etc After successful submission of log in information users can got their new password. Profile can be update by the users individually. PROCESS MODEL USED WITH JUSTIFICATION ACCESS CONTROL FOR DATA WHICH REQUIRE USER AUTHENTICAION The following commands specify access control identifiers and they are typically used to authorize and authenticate the user (command codes are shown in parentheses) USER NAME (USER) The user identification is that which is required by the server for access to its file system. This command will normally be the first command transmitted by the user after the control connections are made (some servers may require this). PASSWORD (PASS) This command must be immediately preceded by the user name command, and, for some sites, completes the userÃ¢â¬â¢s identification for access control. Since password information is quite sensitive, it is desirable in general to Ã¢â¬Å"maskÃ¢â¬ it or suppress type out.. System Requirements Specification: The software, Site Explorer is designed for management of web sites from a remote location. Purpose: The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system. Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes the complete requirement of the system. It is meant for use by the developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. Developers Responsibilities Overview: The developer is responsible for: Developing the system, which meets the SRS and solving all the requirements of the system? Demonstrating the system and installing the system at clientÃ¢â¬â¢s location after the acceptance testing is successful. Submitting the required user manual describing the system interfaces to work on it and also the documents of the system. Conducting any user training that might beÃ needed for using the system. Maintaining the system for a period of one year after installation. Output Design: Outputs from computer systems are required primarily to communicate the results of processing to users. They are also used to provides a permanent copy of the results for later consultation. The various types of outputs in general are: External Outputs, whose destination is outside the organization. Internal Outputs whose destination is within organization and they are the UserÃ¢â¬â¢s main interface with the computer. Operational outputs whose use is purely within the computer department. Interface outputs, which involve the user in communicating directly. Output Definition: The outputs should be defined in terms of the following points: Type of the output Content of the output Format of the output Location of the output Frequency of the output Volume of the output Sequence of the output It is not always desirable to print or display data as it is held on a computer. It should be decided as which form of the output is the most suitable. Output Media: In the next stage it is to be decided that which medium is the most appropriate for the output. The main considerations when deciding about the output media are: The suitability for the device to the particular application. The need for a hard copy. The response time required. The location of the users The software and hardware available. Keeping in view the above description the project is to have outputs mainlyÃ coming under the category of internal outputs. The main outputs desired according to the requirement specification are: The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the screen. Keeping in view these outputs, the format for the output is taken from the outputs, which are currently being obtained after manual processing. The standard printer is to be used as output media for hard copies. Input Design: Input design is a part of overall system design. The main objective during the input design is as given below: To produce a cost-effective method of input. To achieve the highest possible level of accuracy. To ensure that the input is acceptable and understood by the user.
Sunday, September 15, 2019
According to the Pittsburgh Youth Study conducted by Katharine Browning, Ph.D., and Rolf Loeber, Ph.D., it was found that there are multiple factors that are connected with youth delinquency.Ã The objective of the study was to determine the factors in delinquency involvement and other related behaviors (Browning & Loeber, 1999).Ã Those involved in the study consisted of three groups of boys, and they were observed within the duration of almost ten years (Browning & Loeber, 1999).Ã The study group included a random selection of first, fourth and seventh graders. Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã To begin with, Browning and Loeber (1999) found that African-American boys were more prone to juvenile delinquency than their Caucasian counterparts.Ã It was also discovered that as widespread delinquency increased, so did the frequency.Ã Again, the percentage for African-American boys were higher than Caucasian ones. Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã Moreover, the study showed that delinquent behaviors followed a certain pattern; what began as a less serious behavior eventually progressed to a more serious one (Browning & Loeber, 1999).Ã Browning and Loeber (1999) listed three pathways which categorized the offenses, all of which displayed the shift from a less serious offense like lying to a more serious act like property damage or fighting. Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã More importantly, the study determined two factors that causes juvenile offense.Ã Ã Ã Ã The first one was innate forces, internal factors such as intelligent quotient (IQ) and personality (Browning & Loeber, 1999).Ã The second factor was external forces, which consists of family members and friends (Browning & Loeber, 1999).Ã The external forces were contained within different environments, such as the school and home (Browning & Loeber, 1999). Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã The study also came across some Ã¢â¬Å"individual risk factorsÃ¢â¬ (Browning & Loeber, 1999).Ã First, it was found that careless behaviors were related to delinquency (Browning & Loeber, 1999).Ã Other factors that contributed to delinquency include intelligence quotient and socioeconomic status (Browning & Loeber, 1999).Ã Second, delinquents were found to have Ã¢â¬Å"low threshold for negative feelings,Ã¢â¬ and were more prone to an impulsive manner (Browning & Loeber, 1999).Ã Aside from these, there were other risk factors like depression and guilt (Browning & Loeber, 1999). Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã Browning and Loeber also determined how family factors are also related to delinquency.Ã Poor supervision is a major element in delinquency; specific examples include the repercussions of physical punishments and inadequate communication between parents and sons (Browning & Loeber, 1999).Ã Ã¢â¬Å"Other family risk factors include low socioeconomic status, bad neighborhood and exposure to social servicesÃ¢â¬ (Browning & Loeber, 1999).Ã Moreover, it was found that broken families also caused delinquency (Browning & Loeber, 1999). Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã Ã The findings of the study provided the authorities with warning signs to look out for in potential delinquents.Ã In my opinion, the government should take these findings and work out a plan to avoid further delinquency.Ã According to the findings, the most prone to delinquency are those with low socioeconomic status, those with family problems, and African-American boys. Ã The government should then focus their efforts to these specific categories.Ã For instance, they can hold summer camps for African-American youth, where they can instill positive values so that they would not go astray.Ã They should provide seminars for parents, so that they can be more effective in their parenting and communicating with their children.Ã Since delinquency can be traced to oneÃ¢â¬â¢s socioeconomic status, the government should create venues for the improvement of oneÃ¢â¬â¢s social standing.Ã These findings are extremely helpful in stopping youth delinquency, and the government should take advantage of these to effect change. Ã References Browning, K., & Loeber, R. (1999). Highlights of findings from the Pittsburgh youth study. OJJDP Fact Sheet, 95.
Saturday, September 14, 2019
1.Question: Were you involved in the war? Any family members involved in the war? Answer: He was not involved in the war because he was too young. However, his father worked as an electric engineer for the army and operated radars. He had two uncles who were also in the army and had another uncle in the navy. 2.Question: Were you active in civil defense, Red Cross, war industries, other volunteer activities? Answer: He was in the boy scouts and was extremely patriotic. He collected scraps of aluminum, steel, iron, and paper for the war effort. He did not see this job as a burden and even competed for respect by trying to collect the most materials. He was also a coastal watcher and was assigned to watch for enemy submarines along the eastern coast. However, he never actually saw one. 3.Question: Any military experiences or personal anecdotes? Answer: He became a casualty-reporting officer in 1957 when he was stationed in Alaska. Before then, he was generally pro-war, but after telling two or three wives that their husbands were dead, he became more passive. He said his job as a casualty-reporting officer changed his view towards war and caused him to question the Vietnam War and the policies of President Bush. 4.Question: How did you view the war then? Answer: During the time of the war, he was nonchalant to the war. In fact, he said the worst part about the attack on Pearl Harbor was that he could not go to the beach on that day. As a child, he did not understand much about the war. For example, he said that when he learned about the Pearl Harbor invasion, he asked himself Ã¢â¬Å"whatÃ¢â¬â¢s a Pearl Harbor?Ã¢â¬ and when he read about the dropping of the atomic bomb on Nagasaki and Hiroshima, he asked himself Ã¢â¬Å"whatÃ¢â¬â¢s an atomic bomb?Ã¢â¬ He viewed the war as a game, because he never experienced any major losses. He thought that there was no way the UnitedÃ States could lose and never worried for one second. 5.Question: How did you view military or political leaders during World War II? Answer: He admits that most of his opinions concerning them were affected by his fatherÃ¢â¬â¢s views and by movies, which he labels as propaganda. For example, he hated Himmler, Goebbels, Hitler, Goering, and Tojo because movies portrayed them as villains. He disliked Franklin D. Roosevelt because of his farm policies, which forced farmers to kill pigs in order to drive pork prices higher. He liked Churchill and idolized Dwight D. Eisenhower. 6.Question: Who do you feel was responsible for the war? Answer: He said the French were responsible for World War II because they created unfavorable and impossible situations for the Germans with their reparation system. He said that Hitler would never have risen into power if France had not burdened the German economy so heavily. He also felt that Japan was responsible for the war in the east, but the United States could have prevented the war from escalating by lifting its embargo on Japanese products. 7.Question: Did you suffer any deprivations because of the war? Answer: During World War II, BillÃ¢â¬â¢s father worked with radars as an electrical engineer and was sent oversees to North Africa in 1943. Bill missed his father after he was called off to duty. Other than that, he suffered no other deprivations. 8.Question: Do you have any comments about rationing? Answer: Rationing was not very hard for his family because he had numerous relatives who were farmers. He maintained that the rations were adequate for his family and friends and that he never knew anyone who starved because of rationing. However, gasoline rations caused many problems for his familyÃ because they moved around often. 9.Question: What were you doing when you first heard the news of Pearl Harbor? Answer: He was getting ready to go to the beach in Florida when he received a phone call from his father saying that Pearl Harbor had been attacked. His dad had to go directly to Pearl Harbor but he was just saddened that he could not go to the beach. It was not until several days later did he find out the severity of the situation when he saw a movie clarifying the Pearl Harbor attack. 10.Question: Did you know about the Nisei camps? Answer: No, like most Americans, he did not know about the Nisei camps until after the war had ended. At the University of Illinois, he had a close Japanese friend, ***** *********, who lived in a Nisei camp during World War II. Yukio was eleven years old when he was driven out of his home and sent into a Nisei camp. Yukio told Bill that there was plenty of food in the Nisei camp. The only bad memory he had of the camp was the giant fence that he was not allowed to cross in order to get his soccer ball. After YukioÃ¢â¬â¢s family was released from the Nisei camp, they moved to Chicago to escape the bad memories that remained present in the west coast. 11.Question: How were Jewish refugees received in America? Were the welcomed? Answer: Bill said that as a child, he knew very little about the immigration laws for the Japanese and the Jewish. However, he distinctively remembered many restaurants and hotels hanging signs that read: Ã¢â¬Å"no Jews allowedÃ¢â¬ . He said that he always felt sympathetic towards the Jews because he had a close Jewish friend during the war. 12.Question: How were African Americans treated during the war? Answer: He said that he never had any friends that were African American during his childhood. He said there were no African Americans or any otherÃ non-Caucasian races in any of the schools that he attended. He told me that African Americans were generally underused because they were thought of as inferior to the Caucasians. He even told me that some African Americans underwent experimental testing similar to the experiments that Hitler had used on the Jews. At Tuskegee, the United States military infected them with syphilis in order to study its effects on human beings. 13.Question: Was the war discussed in school? Answer: He said that kids usually talked about the war during school, but their teachers abstained from discussions about the war. Even in history class, teachers refused to discuss Ã¢â¬Å"current eventsÃ¢â¬ because they felt that the kids were too young to learn about the war. However, the children were allowed to sing patriotic songs for almost an hour every day. I think that Bill answered my questions without any bias or prejudice. He is currently taking many history courses at ******** so his historical knowledge is very accurate. His answers are impartial because he likes to view the war from different viewpoints. He told me that one must study World War II not only from the side of the Allies, but must gain the perspective of the Axis. During our interview, he constantly got off the subject and started lecturing me about the history of World War II. In fact, he brought several of his college textbooks and used his books to prove whatever point he was trying to make. Initially, after he told me about the syphilis experimental testing that the United States military administered on African Americans, I was reluctant to believe him (though I never showed any skepticism). However, he took out one of his textbooks, showed me the article on the Tuskegee experimental testing, and immediately gained my complete trust and confidence. Both his historical knowledge of World War II and his short-term (and probably long-term) memory are very accurate. I trust that the answers he gave concerning his childhood are also very accurate. Another reason that I think he was not biased in answering my questions was that he answered every one of them. He never tried to avoid any specific questions. Also, none of his relatives was injured or killed because of the war so it is unlikely for him to hold a grudge against theÃ Germans or the Japanese. However, one of the adverse effects of being too impartial is that he is unable to formulate any of his own opinions. For example, when I asked him who he thought was responsible for the war, he gave me a fifteen-minute history lecture about how France burdened Germany with reparation payments, which left the Germans economically destitute. Then he went on to discuss all the causes that were listed in his book, which took another fifteen minutes. After listening patiently for almost half an hour, I asked him who he felt was responsible for the war when he was a child. He answered, Ã¢â¬Å"When I was a kid, I was more interested in sports so I didnÃ¢â¬â¢t really care who was responsible for the war. Movies. Movies and my father convinced me that Hitler and Tojo were the ones responsible for the warÃ¢â¬ . I learned many things about life during World War II from Bill. For example, I learned that kids during that era were pro-war and very patriotic. This may have resulted from movies that were designed for propaganda. At that time, everyone went to the movies at least once a week, which may have greatly contributed to patriotism and to the war effort. I also learned that many children were active in collecting scraps of aluminum, steel, iron, or paper for the war effort. I do not know if these scraps actually helped build a lot of planes and ships, because it is foolish to think that there was that much scraps lying on the ground for the kids to collect, but it probably did get everyone involved and committed to the war effort. In addition, I learned that few Americans knew about the Nisei camps or the German concentration camps during World War II. It was not revealed to the public until after the war ended. Immigration laws were not widely publicized during the war either. I learned that rationing in the United States was not too awful and that no one starved or went hungry because of it. In fact, many felt that rationing was a major step up from the hunger caused by the Great Depression. Finally, I learned that some African Americans were the subjects of experimental testing during World War II. How can Americans shamelessly condemn HitlerÃ¢â¬â¢s experimental testing on the Jews when they are committing the same crime?
Friday, September 13, 2019
Big brother - Research Paper Example In addition, children spend much time in the watching of television via the internet. The long time spent on the computer affects the physical health of children and adults alike. This also affects a personÃ¢â¬â¢s social life because it limits the time spent in socializing and making of social networks. Computers will lead to the destruction of humankind in the near future. The childrenÃ¢â¬â¢s perceptions of reality are compromised leading to inability to make sound judgments. In addition, the cognitive and the development of the child are affected. Communication has also been shifted to the use of computers. Staying long with a computer also contributes in the increase of weight among people because of lack of required body exercise. This also affects the eyesight of a person because of overexposure of the eyes to a lot of computer monitor screen light. Accessibility to the computer deprives many people of the power of imagination hence creativity and innovation power of people is compromised. The use of computers has paved way for computer data hackers and software piracy, which has resulted in the loss of confidential information from secured locations. In addition, this has resulted in the loss of billions of dollars through the cyber-crimes. ... The computers have resulted in less time for social affairs for many people resulting in domestic chaos and conflicts. This arises as a result of lack of time for socializing and problem-solving with friends and relatives of an individual. Unfortunately, the internet exposes the children to pornographic movies and videos, which corrupt their minds. This may also result in the commission of immoral acts by the children. Communication online is not a good channel to convey confidential information because of lack of trust for the two people from different graphical user interfaces. Technology makes people to cut ties with their friends and acquaintances, which erode the aspect of human co-existence. In fact, a person is turned into a robot. According to Meghanathan, Dhinaharan and Brajesh, there is a price paid in the use of technology though it makes life easy (32). Computer technology lacks the mechanism of rectifying the children after they commit mistakes due to technology-based ex posure like pornographic movie watching. The people encountered in the course of utilizing computer technology in using information, sometimes mislead the public with regard to acquisition of communication skills. For instance, the mumbling nature of most speakers on TV sets denies children the opportunity to learn the language through the media. In addition, the violence films broadcasted negatively impact children becauseÃ they seek to rehearse the taekwondo skills on TV and online movies. The vulgar language used in these instances is emulated by the children leading to immoral behavior among the children. Indeed, the swearing manifest in most movies is emulated by the children. These behaviors are provocative in society thus the