Thursday, October 31, 2019

Multi-faceted role of the teacher Essay Example | Topics and Well Written Essays - 3000 words

Multi-faceted role of the teacher - Essay Example Educators design curriculum to help them set learning paths for their students. This noble task has been attempted repeatedly and in various contexts in the hopes of improving curriculum. It can be said that educators always work towards a curriculum that empowers the learner. It would greatly benefit him and future generations to come. Curriculum comprises the whole school programme. It covers a broad spectrum - from how the physical environment is designed, which skills are targeted to be developed in the children, which concepts and activities are appropriate for the age group, what are the routines to be included and how one transitions from one activity to another. Marsh (2004) defines curriculum as a variety of learning experiences where students gain general skills and obtain knowledge in different learning sites. This definition concentrates more on learning and learning skills rather than teaching. It also values the practical skills gained from other learning sites other than from school alone. Grundy (1987) in his definition describes curriculum as ‘A programme of activities (by teachers and pupils) designed so that pupils will attain so far as possible certain educational and other schooling ends or objectives’ (Grundy, 1987, p.11). It is evident that any curriculum definition one way or another puts emphasis on the learning process, gained knowledge and skills, subject content and students’ comprehensive learning experience. In designing an appropriate course curriculum, an essential process needs to be considered including which curriculum model is most suitable for the needs of the learner. The process of learning is as important as the content learned (Newby 2005). Constructivist theory is gaining more attention, recognition and acceptance in many educational institutions. Its curriculum premises on the belief that learners â€Å"construct† their own

Tuesday, October 29, 2019

Trends Executive Memo Essay Example | Topics and Well Written Essays - 250 words

Trends Executive Memo - Essay Example Further, technology will assist in the collection of evidence for use in courts, and in surveillance of correction centers to reduce the breakout incidences that have been on the rise. This is a major step into the future which ought to happen soon. However, serious planning and strategizing is necessary before taking the steps (NRC-US, 2002). Partnership between the state and private security agencies will be enhanced. This will ensure that security information is shared as received from the public and actions taken in a team fashion. The correction department in the country has experienced a number of challenges. Besides the increased breakouts, it has been noted that many inmates get connected to the outside ‘friends’ through the help of the wardens (Gingrich & Worthington, 2013. Pg. 365). This has to stop. Every correction center must have installed surveillance system to monitor activities within (Priest & Arkin, 2011, pg. 76). These systems, from all centers, will be channeled to the head office surveillance department in real-time. The future of the security is that collaborative units will work together to ensure that the public is secure. Further, technological innovations will replace the manual entries and surveillance making the work easier to execute and monitor (Evans, Martin & Poatsy, 2005. pg. 245). Each of the departments will, therefore, perform their mandate with connectivity and collaboration rather than

Sunday, October 27, 2019

Analysis of Unified Modelling Language

Analysis of Unified Modelling Language Chapter 1: Introduction Context of the Problem The Unified Modeling Language is a graphical modeling language used for the visualization, specification, construction, and documentation of object-oriented software systems. It has been adopted by the Object Management Group (OMG) and is widely accepted as a standard in industry and research. The UML provides thirteen types of diagrams for different purpose. This thesis focuses on sequence and class diagram known as structure diagram and behavior diagram. Sequence forms concentrate on the presentation of dynamic aspects of a software system, and class forms the structural view of software system. Sequence diagrams stress time ordering while Class focus on static. In Model-driven Architecture (MDA), class diagram is the source for code generation in object-oriented development (Pender, 2003), so how to map what we find in the interaction diagram back to class diagram become an important subject if we want to develop system from behavior aspect initially. There are some existing relatively modest tool supports exploiting the logical dependencies of UML diagrams. Some systems maintain method lists across class diagrams and sequence diagrams and the transformation between sequence diagrams and collaboration diagrams. However, nowadays, the two diagrams that sequence and Class are draw divided and can not be transformed between each other. And there is no comprehensive framework that would support such mechanisms throughout these two diagram types in a systematic way (Selonen et al., 2003). That waste much time to maintain system and often make the system development documents should rewrite again and again. To solve these problems, a transformation theorem which proposed by Selonen et al. (2003) is cited in this paper. Selonen et al. (2003) propose a framework and categorize meaningful transformation operations between different diagram types in UML. These operations can be used, for example, for model checking, merging, slicing and synthesis (Selonen et al., 2003). The transformation operation can be used as a basis of tool support in UML-based modeling tools. With these operations, we can get the benefits as follows: Class Diagram becomes easier and faster to create because they can be achieved as results of automated operations. Class Diagram becomes more consistent and correct because they are either produced or updated automatically, or checked against each other exploiting the transformation operations. Improve the software development process. The process of agile modeling become from use case to sequence diagram and then translated to class diagram. It will be more simply and efficiency. Research Question and sub-questions How does the transformation between sequence and Class diagrams make systems easier to develop and maintain and avoid system development documents to be rewritten all the time? What are meta-modeling, Meta Object Facility and Object Constraint language? How to operate the transformation? How does the transformation work in the real world (Examples)? Significance of the Study Sequence diagrams provide a natural and easy medium for designing the examples of typical dynamic interactions of objects, often as refined representations of use cases. After modeling examples of interactions, the designer should add the information implied by the sequence diagrams to the static view (class diagrams), or check that the static view conforms to the sequence diagrams (Selonen et al., 2000). The sequence diagram and class diagram derived from the same use case and can not be transformed between each other. This paper discusses a particular UML transformation operation mentioned in (Selonen et al., 2003), which transforms from a sequence diagram into a class diagram. The transformation operation is based on the UML 2.0 Specification (OMG, 2003), which defines the syntax and semantics of UML. The thesis defines the rules on the phases of this transformation operation and gives a transformation example to show the result of transformation. This paper will concentrate on the conceptual research of UML semantics, and do not concentrate on any development tool. However, OCL will be used to describe the transformation rules and hoped can be used in UML-based modeling tools development. I hope that the steps of modeling will improve; Support for synthesizing a new class diagram from an existing sequence diagram can provide significant help for the designer. Such synthesis operation helps the designer keep the two diagrams consistent because the synthesized class diagram can be compared with existing class diagram. The transformation operation also speeds up the design process, and to decrease the risk of human errors. In UML CASE tool vendors can implement this transformation operation in their tools to get the benefits described above. Research Design and Methodology The protocol for this research project is mostly using qualitative by design. A Case study will be used as the most important a strategy of research methodology in the study. The research process consists of six steps. It collects and analysis the documents and papers which are corresponding to the UML transformation thesis, OCL and MDA transformation theory. Then proposing a transformation framework for transformation from sequence diagram to class diagram and concluding transformation mapping rules. This paper will testify and revise the transformation mapping rules via implement a real case of agile modeling development process. And finally proposing the research result, and discuss the conclusion and future work. Organization of the Study Chapter 1: Introduction Chapter one introduces the research. This chapter will present the context of the problem, the problem statement, the main research question, the significance of the study, and the research methodology used to address the main research question. Chapter 2: Review of the Literature Chapter two gives an overview of the background literature for the thesis. Chapter 3: Meta-modeling, Meta Object Facility and Object Constraint language Chapter three will give the brief introduction of UML, MDA, meta-model, transformation and OCL are described at first, followed are the separate meta-models of sequence and class diagram. Chapter 4: Operation of the Transformation Chapter four will propose a framework of transformation from Sequence diagram to Class diagram. Also, a rule will be defined on every phase of transformation, using OCL to describe transformation rules. Chapter 5: Example of the Translations Chapter five will be working on a Case Study, and demonstrating the transformation for a true case in the real world. Chapter 6: Conclusion Chapter six will present the summery and conclusion. Chapter 2: Review of Literature 2.1 UML The complexity in software development process of getting from a set of requirements to a proper abstraction of the solution leads people to develop models. A model is a simplification of something so we can view, manipulate, and reason about it, and so help us understand the complexity inherent in the subject under study (Mellor et al., 2004). The UML is a family of graphical notations, backed by single meta-model, that help in describing and designing software systems, particularly software systems built using the object-oriented (OO) style (Fowler, 2003). The Unified Modeling Language (UML), since adopted as a standard (UML 1.1) by OMG in 1997, has become a widely accepted as standard for modeling a software system. The latest UML version 2.0 has been formally adopted in June 2003, and it will be applied throughout this thesis. UML 2 describes 13 official diagram types which fall in two categories depending on whether they describe structural or behavioral aspects of a software system. The UML can capture an array of processes and structures which related to business and software. UML has such power that a modeler can use it for the general architecture of any construction that has both a static structure and dynamic behavior. A project can rely on UML as the standard language to express requirements, system design, deployment instructions, and code structure (Eriksson et al., 2004). 2.2 Agile Modeling Test case modeling and an evolutionary approach are two major and strongly related techniques to model transformation (Rumpe, 2004). UML nowadays has become popular modeling language for software intensive systems used. Models can be used for a variety of purposes. One advantage of using models for test case description is the application specific parts which are modeled with UML-diagrams, such as connection to frameworks, error handling, persistence, or communication are handled by the parameterized code generator (Rumpe, 2004). This allows us to develop models which can be independent of any technology or platform, such as PIM. When the technology changes, we only need to update the generator, and the application defining models can directly be reused. This concept also directly supports the above mentioned MDA-Approach (OMG, 2005) of the OMG. Another important merit is that both of the production code and automatically executable tests are modeled by the same UML diagrams. Therefore developers could use a single homogeneous language to describe implementation and tests. This will enhance the availability of tests at the beginning of the coding activities. Analogously to the â€Å"test first approach† (Beck, 2001), sequence diagrams are used for test cases and can be taken from the previously modeled requirements. When we start software modeling by drawing classes in a class diagram does not mean we are developing a class model. Instead, we are developing a software model by defining static aspects through a static view. If we start our development by drawing a dynamic diagram, like the state or sequence diagram, we are developing a software model by defining dynamic aspects through a dynamic view. The class and sequence diagrams could better be called structural and dynamic views. They are all written in the same language: UML (Kleppe et al, 2003). In Agile modeling (Ambler, 2002), we develop an Information system in following steps by using UML. System Use Case Models UI Prototypes UML Class Diagrams UML Sequence Diagrams UML Activity Diagrams Use case diagram shows a number of external actors and their connection to the use cases that the system provides. A use case is a description of a functionality (a specific usage of the system) that the system provides. The description of the actual use case is normally done in plain text or as a document linked to the use case. The functionality and flow can also be described using an activity diagram. The use case description only views the system behavior as the user perceives it and does not describe how the functionality is provided inside the system. Use cases define the functional requirements of the system. Sequence diagrams address an interaction and may be used to model flows within use cases (Booch et al., 1999). They show how the objects interact to execute operations, emphasis on the time ordering of the messages. Class diagrams shows a collection of declarative (static) model elements, such as classes, types, and their contents and relationships. Once we have the use cases, the next step is to create the class diagram. This is the heart of the object-oriented model. This paper concentrates on the steps of modeling from Use Case Models to Class Diagrams and sequence Diagrams. 2.3 MDA The MDA is a new software engineering approach developed and published by the Object Management Group (OMG). One fundamental observation in the evolution of living software systems over the years is that their basic design models are mostly unchanged. Most changes to evolving software systems take place only at engineering level, forced by the introduction of new technologies and platforms (BAohme et al., 2005). MDA promotes simply the usage of models for the whole software system development. To capture the problem of technology evolution MDA defines two categories of models. The first one is for abstract modeling of the software systems at the design level. This model class is called Platform Independent Model (PIM). The second category is related to specific platforms and technologies. It contains mainly engineering aspects of the software system and is called Platform Specific Model (PSM). Between these two classes of models, MDA defines a relation in the form of several transformations, which ensure the structural equivalence of PIM and PSM. Another key issue of MDA is a technology framework for different kinds of model handling (storage, exchange, mapping of models, etc.). The Meta Object Facility (MOF) (OMG, 2000) is convenient for this purpose. Historically modeling languages were defined by abstract grammars. MOF instead defines modeling languages on the base of so-called Meta-Models. Meta-Models are models (instances) of built-in MOF concepts. Using this framework the developer can focus more on the definition of mappings between models rather than having to struggle with ordinary model handling. This is due to the fact that MOF comes with a method for the definition of model classes (Meta-Models) and for the exchange of models using the XML Metadata Interchange (XMI). In addition, MOF provides mappings of Meta-Models to repository interfaces as well. Such a repository holds all necessary information about model instances. The above argument is correct for most of todays component technology. To show the real application we have to choose concrete Meta-Models for PIM and PSM. This also leads to the selection of appropriate Meta-Models and notations for PIM and PSM. One requirement for both is the support of the component concept as a first class concept. Moreover, the Meta-Model for the PSM should be part of a well-defined and established component technology. Because the spread industrial usage is a process consuming several years, the suitable technologies have traditional syntax based languages for component definition. MDA exploits the emergence of a class of tools, which support model translation and allow meta-model manipulation. Meta-models are models of the formalism used to build models. They define the various kinds of contained model elements and the way they are arranged, related and constrained. The process of developing a model results in the creation of instances of the model elements defined in the meta-model – the meta-model is â€Å"populated† with instance data. Model transformation is the process of converting a model expressed in one formalism to another model of the same system expressed using a different formalism. This can be achieved by building a meta-model of each of the source and target model representations and then defining a mapping between them. The meta-model of the source model is populated with instance data of the specific source model to be transformed. The mapping rules are applied as a set of operations invoked on the source meta-model, which results in a meta-model of the target model populated with instance data. This populated target meta-model is then used to generate the target model (or possibly the target text in the case of code generation. (Bloomfield, 2005) 2.4 Models, modeling, and MDA Models and model-driven software development are at the heart of the MDA approach. So it is appropriate to start by looking at what is being practiced when enterprise application developers take advantage of modeling. In the software engineering world, modeling has a rich tradition from the earliest days of programming. The most recent innovations have focused on notations and tools that allow users to express system perspectives of value to software architects and developers in ways that are readily mapped into the programming language code that can be compiled for a particular operating system platform. The current state of this practice employs the Unified Modeling Language (UML) as the primary modeling notation (Rumbaugh et al.,1999). The UML allows development teams to capture a variety of important characteristics of a system in corresponding models. Transformations among these models are primarily manual, with tool support for managing traceability and dependency relationships among modeling elements, supported by best practice guidance on how to maintain synchronized models as part of a large-scale development effort. One useful way to characterize current practice is to look at the different ways in which the models are synchronized with the source code. Each category identifies a particular use of models in assisting software practitioners to create running applications (code) for a specific runtime platform, and the relationship between the models and the code. Today, most of software developers still take a code-only approach, and do not use separately defined models at all. They rely almost entirely on the code they write, and they express their model of the system they are building directly in a 3rd generation programming language such as Java, C++, or C# within an Integrated Development Environment (IDE) such as IBM WebSphere Studio, Eclipse, and Microsoft VisualStudio. Any â€Å"modeling† they do is in the form of programming abstractions embedded in the code (e.g., packages, modules, interfaces, etc.), which are managed through mechanisms such as program libraries and object hierarchies. Any separate modeling of architectural designs is informal and intuitive, and lives on whiteboards, in PowerPoint sides, or in the developers’ heads. While this may be adequate for individuals and very small teams, this approach makes it difficult to understand key characteristics of the system among the details of the implementation of the business logic. Furthermore, it becomes much more difficult to manage the evolution of these solutions as their scale and complexity increases, as the system evolves over time, or when the original members of the design team are not directly accessible to the team maintaining the system. An addition is to provide code visualizations in some appropriate modeling notation. As developers create or analyze an application, they often want to visualize the code through some graphical notation that aids their understanding of the code’s structure or behavior. It may also be possible to manipulate the graphical notation as an alternative to editing the text based code, so that the visual rendering becomes a direct representation of the code. Such rendering is sometimes called a code model, or an implementation model, although many feel it more appropriate to call these artifacts â€Å"diagrams† and reserve the use of â€Å"model† for higher levels of abstraction. Some tools that allow such diagrams (e.g., IBM Web Sphere Studio and Borland Together/J), the code view and the model view can be displayed simultaneously; as the developer manipulates either view the other is immediately synchronized with it. In this approach, the diagrams are tightly coupled representations of the code and provide an alternative way to view and possibly edit at the code level. Further advantage of the models can be taken through roundtrip engineering (RTE) between an abstract model of the system describing the system architecture or design, and the code. The developer typically elaborates the system design to some level of detail, then creating a first-pass implementation from the code generated by applying model-to-code transformations, usually manually. For instance, one team working on the high level design provides design models to the team working on the implementation (perhaps simply by printing out model diagrams, or providing the implementation team some files containing the models). The implementation team converts this abstract, high-level design into a detailed set of design models and the programming language implementation. Iterations of these representations will occur as errors and their corrections are made in either the design or the code. Consequently, without considerable discipline, the abstract models and the implementation models usually and quickly – end up out of step. Tools can automate the initial transformation, and can help to keep the design and implementation models in step as they evolve. Typically the tools generate code stubs from the design models that the user has to further refine. As changes are made to the code they must at some point be reconciled with the original model. To achieve this some approach to recognize generated versus user defined code is used such as placing markers in the code. Tools adopting this approach, such as IBM Rational Rose, can offer multiple transformation services supporting RTE between models and different implementation languages. In a model-centric approach, models of the system are established in sufficient detail that the full implementation of the system can be generated from the models themselves. To achieve this, the models may include, for example, representations of the persistent and non persistent data, business logic, and presentation elements. Any integration to legacy data and services may require that the interfaces to those elements are also modeled. In some cases much more than code stubs can be generated depending on the fidelity of the models of patterns to transform the models to code, frequently allowing the developer some choice in the patterns that are applied (e.g., among various deployment topologies). To further assist in the code generation, this approach frequently makes use of standard or proprietary application frameworks and runtime services that ease the code generation task by constraining the styles of applications that can be generated. Hence, tools using this approach typically specialize in the generation of particular styles of applications (e.g., IBM Rational Rose Technical Developer for real-time embedded systems). However, in all cases the models are the primary artifact created and manipulated by developers. A model-only approach is at the far-right end of the modeling spectrum. In this approach developers use models purely as thought aids in understanding the business or solution domain, or for analyzing the architecture of a proposed solution. Models are frequently used as the basis for discussion, communication, and analysis among teams within a single organization, or across multi-organizational projects. These models frequently appear in proposals for new work, or adorn the walls of offices and cubes in software labs everywhere as a way of understanding some complex domain of interest, and establishing a shared vocabulary and set of concepts among disparate teams. In practice the implementation of a system, whether from scratch or updating an existing solution, may be practically disconnected from the models. An interesting example of this approach can be seen in the growing number of organizations who outsource implementation and maintenance of their systems while maintaining contr ol of the overall enterprise architecture. 2.5 Transformations between UML diagrams UML provides different diagram types supporting the development process from requirements specification to implementation (Selonen et al., 2001). The models presented by different diagrams view a system from different perspectives or from different abstraction levels. Therefore, the various UML models of the same system are not independent specifications but strongly overlapping: they depend on each other in many ways. For Instance, changes in one model may imply changes in another, and a large portion of one model may be synthesized on the basis of another model. So far there exists relatively modest tool support exploiting the logical dependencies of UML models. Some systems (e.g. Rational Rose) maintain, for instance, method lists across class diagrams and sequence diagrams: adding a call of a new method in a sequence diagram automatically causes the corresponding updating of the class symbol in a class diagram. Another example is the transformation between sequence diagrams and collaboration diagrams, also supported by Rational Rose. However, there is no comprehensive framework that would support such mechanisms throughout Class diagram and Sequence diagram in a systematic way. This paper studies the relationships of Class diagram and Sequence diagram in UML, and transformation operations that are based on those relationships. A transformation operation takes a UML diagram as its operand (the source diagram), and produces another diagram of another type as its result (the target diagram). It considers such transformation operations as an essential part of a UML- based software design environment. The transformation operations can be used for example in the following ways: Model checking:Are two diagrams consistent with each other? It is much easier to find inconsistencies between two diagrams of the same type than between two diagrams of different types. If the diagrams are of different types, transformation operations can be first applied to obtain two diagrams of the same type, which are then compared for consistency. Model merging:Add the information contained in one diagram to another diagram. Merging the modeling information of two diagrams is much easier when the diagrams are of the same type (Alanen and Porres, 2003). If the diagrams are of different types, transformation operations can be first applied to obtain two diagrams of the same type, which are then merged. Model slicing:Create a partial view of a diagram showing only a particular aspect. Often the aspect can be presented in the form of another diagram (of some other type). For example, one may want to see a dynamic slice of a static diagram. The diagram representing the slicing criterion (for example, a dynamic diagram) can be first transformed into the type of the target diagram (for example, a static diagram). An intersection of the two diagrams of the same type then shows the desired slice. Model synthesis:Produce a diagram on the basis of an existing diagram of another type. This is the most straightforward usage of transformation operations. Such synthesis can be useful for two purposes: to obtain automatically an initial form of a diagram needed in a subsequent phase of the software development process, or to obtain a different view of the information contained by a diagram. The latter may be used just as a transient view on a model, rather than as a persistent design artifact. 2.6 Phase of Transformation Operation Selonen et al. (2003) use the UML meta-model to define the transformation between UML diagrams. Since diagram types are only very loosely defined (the same notation may represent different meaning on different diagrams), we need to establish a precise mapping from a graphical view representing a diagram type to a model; i.e. we must define a model that corresponds to a given diagram. This model contains exactly the logical information exposed by the diagram, needed by the transformation operations. We will call this model the minimal model of the diagram. As we do this for all diagram types, we are able to define transformations between diagram types as functions from the meta-model of a diagram type to the meta-model of another diagram type. Such a function takes the minimal model of the source diagram as its argument, and produces the minimal model of the target diagram. They call the transformation rules the interpretation of the transformation. Assuming that the mappings from the source diagram into its minimal model, from this minimal model into the minimal model of the target diagram, and finally into the target diagram, are all defined uniquely, the transformation between two diagram types becomes fully defined (Selonen et al.,2003). First, take a given sequence diagram and map the sequence diagram to its minimal model. Then transform this minimal model to a minimal model of a class diagram. Finally, this minimal model is mapping to a class diagram in model level. This thesis will base on this process to introduce a definite transformation operation. Reference Tom Pender. (2003). UML Bible (1st edition). Wiley, ISBN: 0764526049 Martin Fowler. (2004). UML Distilled (3rd edition), Wesley, ISBN: 0321193687 Hans-Erik Eriksson, Magnus Penker, Brain Lyons, and David Fado. (2004). UML 2 Toolkit, Wiley, ISBN: 0471463612 Ambler. (2002). Agile Modeling: Effective Practices for Extreme Programming and the Unified Process, Wiley, ISBN: 0471202827 Jos Warmer, Anneke Kleppe.(2003). The Object Constraint Language: Getting Your Models Ready for MDA (2nd Edition), Wesley, ISBN: 0321179366 Grzegorz Rozenberg.(1997). Handbook on Graph Grammars and Computing by Graph Transformation: Foundations (1st edition), World Scientific Publishing Company, ISBN: 9810228848 James Rumbaugh, Grady Booch, and Ivar Jacobson. (1999). The Unified Modeling Language Reference Manual, Wesley, ISBN: 020130998X Jams R Rumbaugh, Michael R. Blaha, William Lorensen, Frederick Eddy. (1991). Object-Oriented Modeling and Design, Prentice Hall; United States Ed edition, ISBN: 0136298419 Rumpe, B.(2004). Agile Modeling with the UML, Springer-Verlag Berlin Heidelberg Petri Selonen, Kai Koskimies and Markku Sakkinen. (2001). How to Make Apples from Oranges in UML. Proceedings of the 34th Hawaii International Conference on System Sciences. Retrieved February 21, 2008, from: http://csdl2.computer.org/comp/proceedings/hicss/2001/0981/03/09813054.pdf Petri Selonen, Kai Koskimies and Markku Sakkinen. (2003). Transformations between UML diagrams. Journal of Database Management. Retrieved February 21, 2008, from: http://www.accessmylibrary.com/coms2/summary_0286-23439697_ITM Petri Selonen (2000). Scenario-based Synthesis of Annotated Class Diagrams in UML. Tampere University of Technology, Retrieved February 21, 2008, from: http://citeseer.ist.psu.edu/462963.html Mellor, S. J., Scott, K., Uhl, A., and Weise,D., MD. (2004). a Distilled: Principles of Model-Driven. Wesley, Retrieved February 22, 2008, From: http://www.metamodel.com/,2005 OMG. (2003). UML 2.0 OCL Specification, Retrieved February 22, 2008, from: http://www.omg.org/docs/ptc/03-10-14.pdf,2003 Tony Bloomfield. (2005). MDA,Meta-Modelling,and Model Transformation: introduction New Technology into the Defence Industry, Retrieved February 22, 2008, from: http://www.enabler.com/en/skills/ecmda/PAPER_Bloomfield.pdf

Friday, October 25, 2019

Music in Twelfth Night Essay -- Literary Analysis, Shakespeare

Critics call Twelfth Night one of William Shakespeare’s most poetic and musical plays. Shakespeare writes poetic lines for the major characters, Viola, Orsino, and Olivia, and gives the Fool, and other minor characters, songs to sing throughout the play. The particularly romantic lines of the play make it seem as if the characters are professional poets themselves. Shakespeare also uses the music and poetry in Twelfth Night to foreshadow what is going to happen for the rest of the performance and to reveal major themes in the play. Music and poetry become major characters in the play themselves. The opening soliloquy of Act I Scene I, given by Duke Orsino, is another perfect example of Shakespeare using music to show the upcoming storyline of the play. At first, Orsino is using music as a metaphor that feeds the appetite of love. He speaks for a minute about his love for the music playing, and then changes abruptly by saying, â€Å"Enough; no more† (7). Already Shakespeare is foreshadowing Orsino’s fickleness when it comes to music which in turn stands for love. Of course, further into the play, it is shown that Orsino truly is fickle when it comes to love. As soon as he finds out that Cesario is in fact the woman Viola, he instantly forgets all the passion he had for Olivia and marries Viola. Another part of Orsino’s opening speech that shows a piece of the future plot is the part where he talks about love being â€Å"receiveth as the sea† (11). This can be taken to show that love will come by the sea. In the very next scene, Viola appears in Illyria from a shipwreck. Sebastian, although Shakespeare does not say so at the time, also comes onto the scene because of the same shipwreck. Shakespeare forecasts, very subtly, that these are t... ...one of the antics at the start play to woo Olivia succeed for Orsino and Viola’s initial plan in the beginning does not blossom. This line concludes the part of Feste’s song in which he is giving a synopsis of the play. The last two stanzas are addressed to the audience and Feste thanks them. Shakespeare craftily uses music and poetry to guide the audience through the play and give them an inkling of what is to come, if the audience chooses to play close attention. However, it is not always clear what the song means and, depending on the character delivering the song or poem, comes off as more comedic than meaningful to the performance. By the end of the play, the audience has accepted that music and poetry are just as much themes in the play as disguise and love, but are blended so painstakingly that neither poetry or love overshadow anything in the performance.

Thursday, October 24, 2019

A Deviant Act That Is Not Criminal in Nature Essay

The text gave an example of a deviant act that is not criminal in nature. What other types of deviant acts can you think of that do not violate criminal laws? Many deviant acts are acts that depart from are social norms. Every society has its basic social norms; it may vary a bit, because of so many different multi-cultural societies. Even so I can safely say that most societies have the same universal belief when it comes to social norms. Social norms are very serious if an individual commits a deviant act, the community will automatically demand punishment. In some cases the individual will be punished by the society but will not face a criminal charge by the government. Many deviant acts do not violate written laws; therefore individual cannot be charge with a criminal violation. There are so many different perspectives to social norms that makes the United State vary in what is legal and what is not. A great example is polygamy, this act is outside of our social norms, but in Nevada there is no criminal charge for plural marriage even though it is not legal in most states. Another example would be cross-dressing it is considered to be a deviant act in most parts of the world not because it is criminal in nature; but because of the act itself is outside the boundaries of our social norms. Homosexuality is also another big controversy in regards to our social norms today, it is considered to be a deviant act nevertheless it is not a criminal violation. There are many act that I would consider to be deviant acts but are not punishable by law. A disowning of a child, giving up a child up for adoption, or simply not taking responsibility for a child, that can be and should be considered deviant act with criminal punishment; unfortunately, it is not a criminal violation. Divorce can also be looked at as a deviant act in some societies because when one joins in marriage it is for the rest of their lives, there is no petitioning for a divorce; that would just be departing from our social norms. In many cases there are little things that can be considered outside the social norms like: A male with long hair, a female with no hair on her head, or a child taking a small amount of money from parents purse or wallet without his/her permission is a bad act but is not punishable by law. Here I wrote many examples I could think of that can be considered a deviant acts but them actually becoming a criminal violation is not near. Our society today is leaning away from our social norms to the point that we the people are ignoring what we were thought by our elders of what the basic social norms should be.

Wednesday, October 23, 2019

Faith and Diplomacy

Katherine Donado Writing III October 5, 2012 Technology Technology is valuable because it is used in every day. As Mandana Mohsenzadega states in, â€Å"OMG: Tweeting, Trending, and Texting† people feel incomplete without technology (448). Technology was intended to bring people closer and increase communication. To be able to stay in contact more in a faster way when is impossible to see a family member. Maybe they might live in a different country and for many reasons not being able to travel.Technology is very important and useful, because it provides a lot of information, it makes businesses more efficient and it is a faster way to protect people in dangerous occasions. Technology is often used to find out information. It is a faster, quicker and easier way to get answers from Websites. Mohsenzadega refers to this (448), â€Å"†¦. with just the click of a button on our handy-dandy little gadgets. † Everything is there, with no need to struggle or go out to get things done. Some people do not need the doctor for check-ups. They can get the information from Medline. om which allows people to self-diagnose (448). Computers help us stay up to date with everything, whether it is the weather, or a family member that lives far. It is cheaper to communicate now over Facebook, Twitter, Facetime or Oovoo because it’s free, instead of buying a phone card every time they need to keep in contact with a relative. It has also brought people together from all over the world. They meet new people find out about them and most of the time fall in love and end up together. The internet is very useful and good.Some people feel better behind screens and are able to express themselves better and open up more to people, when they are not face to face. People get to know them better on the internet and get a lot of information from there. Just the simple fact of entertainment, of having memories with friends, photos, meaningful texts or listening to music, which is known to calm people and lets them get away from everything when they’re in their zone. Technology is known for something most people can’t live without, â€Å"Cannot imagine living a week without my laptop. Since I grew up in this culture, it would be exceedingly senseless. (450) Businesses have also become more efficient because of technology. Due to the self-service cashiers, have become defunct. Fewer employees need to be hired because machines do their jobs. One can go pay for their groceries with just a swipe of their card. Technology has also influenced many other businesses. There is no reason to wait for a conference and waste time, when they can call each other at any time and connect all lines so everyone can be in a conference call without having to be running late or being taken out of their house, office, or even state.Some businesses have jobs and meeting out of state to make it more comfortable for people that are far away in the same busines s. It is better to have everyone meet up in a place where they can all feel fair when it comes to traveling. Also can be very useful when people aren’t on time or running late, they can just send their work with a simple text or e-mail without having to waste time when certain paper work hs to be done at a certain time or wait to see the person to give them the work. Another reason why technology is important is because it keeps us safe.Many phones have a GPS system in them that helps law enforcement track and locate the subject. Cameras were invented to watch, there put just about in every store and place. With the phones, people are more likely to call the police in case of an emergency, with less difficulties. With just a push of a button, it connects you to help. Also alarm systems, to keep peoples home safe when they’re away. Technology prevents accidents from happening. Making it possible for crimes to be solved faster and more accurately. In conclusion, technolo gy would be known to be very useful in life.It has brought many people together and most importantly kept them safe. It has made people’s lives a lot easier and faster, without any difficulties or struggles. Everything can be done with just a push of a button. No need to get up or go out because everything in within reach. It has made life a lot more valuable and understanding when you have an object that gives you answers to any problems you may have with no solution. People have to understand that technology was made for the better, to be able to make life easier and make us feel comfortable knowing that there is answers to what we seek in life.

Tuesday, October 22, 2019

Free Essays on Abraham Lincolna And Abolition

The Role of Abraham Lincoln in the Abolition of Slavery I am going to analyze the essay, â€Å"The role of Abraham Lincoln in the Abolition of Slavery.† This was written by James M. McPherson, and he tries to let the reader understand what Abraham Lincoln had to do with the abolition of slavery. McPherson wants the reader to understand that Abraham Lincoln was a crossbreed between a conservative and a revolutionary thinker. He wants the reader to know that the slaves would not have been freed if it were not for Lincoln, but that he was not the sole factor in the event. The emancipation proclamation shows Lincoln’s push for this to happen, and the fact that it worked gives him a placed in history forever. The author wants to make clear that even though Lincoln was a large part of freeing the slaves that it was not his intent as president or for the war. The author states that although this revolutionary achievement was made, it was not part of Lincoln’s war aims. This gives Lincoln some conservative credibility, which is a great tactic to use to persuade the audience that Lincoln is not a full breed revolutionist. Another point that McPherson makes to prove his argument that Lincoln is a conservative is when he points out that Lincoln stated, â€Å"I am naturally anti-slavery. If slavery is not wrong, nothing is wrong.† Then follows it up by saying that Lincoln’s conflict was that as president he could not act officially on his private judgment concerning the moral issue of slavery. McPherson relies upon quoting Lincoln for most of his argumentative evidence. There is no quantitative evidence, nor does there need to be. Also, there are very little generalizations. He uses specific statements and political beliefs of the time period to persuade the reader that Lincoln was a conservative revolutionary. For example, when explaining how Lincoln wanted Congress to endorse his plan for gradual emancipation... Free Essays on Abraham Lincolna And Abolition Free Essays on Abraham Lincolna And Abolition The Role of Abraham Lincoln in the Abolition of Slavery I am going to analyze the essay, â€Å"The role of Abraham Lincoln in the Abolition of Slavery.† This was written by James M. McPherson, and he tries to let the reader understand what Abraham Lincoln had to do with the abolition of slavery. McPherson wants the reader to understand that Abraham Lincoln was a crossbreed between a conservative and a revolutionary thinker. He wants the reader to know that the slaves would not have been freed if it were not for Lincoln, but that he was not the sole factor in the event. The emancipation proclamation shows Lincoln’s push for this to happen, and the fact that it worked gives him a placed in history forever. The author wants to make clear that even though Lincoln was a large part of freeing the slaves that it was not his intent as president or for the war. The author states that although this revolutionary achievement was made, it was not part of Lincoln’s war aims. This gives Lincoln some conservative credibility, which is a great tactic to use to persuade the audience that Lincoln is not a full breed revolutionist. Another point that McPherson makes to prove his argument that Lincoln is a conservative is when he points out that Lincoln stated, â€Å"I am naturally anti-slavery. If slavery is not wrong, nothing is wrong.† Then follows it up by saying that Lincoln’s conflict was that as president he could not act officially on his private judgment concerning the moral issue of slavery. McPherson relies upon quoting Lincoln for most of his argumentative evidence. There is no quantitative evidence, nor does there need to be. Also, there are very little generalizations. He uses specific statements and political beliefs of the time period to persuade the reader that Lincoln was a conservative revolutionary. For example, when explaining how Lincoln wanted Congress to endorse his plan for gradual emancipation...

Monday, October 21, 2019

Free Essays on Gio Ponti

During the twentieth century, the world of Italian design achieved their identity as the â€Å"design capital of the world†. The evolution of Italian design was equally impacted by the rise of Fascism between the World Wars, the emergence of new ideological approaches towards design, and technological advancements. However, no other element influenced Italy’s national identity more than the work of Gio Ponti. Furthermore, the increasing popularity of Modernism in today’s world has sparked a renewed interest in Ponti’s design ideology, as well as his works, both of which have adopted innovation and refinement. In order to understand Gio Ponti’s influence on Italian design, one must first understand the influence the world had on Ponti. A brief synopsis of his existence is necessary in order to reveal the elements, which ultimately determined his novel ideology towards design. Ponti’s service during WWI and his work with various design firms he worked with over the span of nearly six decades are obvious contributions. Meanwhile, one cannot overlook his work as an editor and educator, nor his participation in the Triennale Exhibitions, which not only influenced Ponti but the rest of the world as well. First, it is necessary to give due credit to gioponti.com/index.html, which provided all of the following biographical information pertaining to Gio Ponti. Gio Ponti was born in Milan on November 18, 1891 to Enrico Ponti and Giovanna Rigone. As Italy engaged in a war with Austria, Ponti was drafted into the army. By 1916, Ponti acquired the rank of captain, while he also received the Bronze Medal and Military Cross. During his tour in WWI, Ponti witnessed many examples of the classical architect, Andrea Palladio. His experience with Palladian architecture helped to initiate his earliest conceptions of design. After exiting the war, Ponti pursued a degree in architecture at the Milan Polytechnic and finally... Free Essays on Gio Ponti Free Essays on Gio Ponti During the twentieth century, the world of Italian design achieved their identity as the â€Å"design capital of the world†. The evolution of Italian design was equally impacted by the rise of Fascism between the World Wars, the emergence of new ideological approaches towards design, and technological advancements. However, no other element influenced Italy’s national identity more than the work of Gio Ponti. Furthermore, the increasing popularity of Modernism in today’s world has sparked a renewed interest in Ponti’s design ideology, as well as his works, both of which have adopted innovation and refinement. In order to understand Gio Ponti’s influence on Italian design, one must first understand the influence the world had on Ponti. A brief synopsis of his existence is necessary in order to reveal the elements, which ultimately determined his novel ideology towards design. Ponti’s service during WWI and his work with various design firms he worked with over the span of nearly six decades are obvious contributions. Meanwhile, one cannot overlook his work as an editor and educator, nor his participation in the Triennale Exhibitions, which not only influenced Ponti but the rest of the world as well. First, it is necessary to give due credit to gioponti.com/index.html, which provided all of the following biographical information pertaining to Gio Ponti. Gio Ponti was born in Milan on November 18, 1891 to Enrico Ponti and Giovanna Rigone. As Italy engaged in a war with Austria, Ponti was drafted into the army. By 1916, Ponti acquired the rank of captain, while he also received the Bronze Medal and Military Cross. During his tour in WWI, Ponti witnessed many examples of the classical architect, Andrea Palladio. His experience with Palladian architecture helped to initiate his earliest conceptions of design. After exiting the war, Ponti pursued a degree in architecture at the Milan Polytechnic and finally...

Sunday, October 20, 2019

The Super Easy Guide How to Negotiate a Raise and Promotion

The Super Easy Guide How to Negotiate a Raise and Promotion You’ve put in your time at Company X. You don’t just do the bare basics  like showing up on time, not abusing your lunch and break privileges, and keeping the Twitter scrolling to a minimum–you go above and beyond, day in and day out.  You know how hard you work and what value you bring to the company, and now you’d like to see that in the form of a new title and a salary increase. So what now? How do you go about negotiating a raise and promotion? We’ve compiled some of our best advice on how to negotiate a raise and  a) whether or not the timing is right to ask, b) how to go about making your dreams a reality, and c) what to do if you fail.How to Design a Plan of Attack for Approaching Your BossFirst thing’s first. Are you ready to ask for a raise? And if so, where do you begin? Here are some great places to start if you’re early on in the process:How to Ask Your Boss for a RaiseHow to Get a Raise at Work6 Scientific Tips for G etting a Pay RaiseFirst, you need to be honest with yourself: do you want a raise, or do you deserve a raise? We all want more money and a more prestigious title. But in order to get these bumps, you’re going to have to prove (with concrete examples, with written lists, with references from people you’ve helped, etc.) you’ve earned them. No manager, no matter how cool, is handing out raises like free candy. It’s a big deal that involves a lot of signoffs from people at all levels. So before you go in, ask yourself: Do I really deserve this? And, if so, start planning on how you’re going to prove it.Create a Pitch Your Boss Can’t DenyAs you continue to plan your pitch, you’ll really need to figure out how to articulate your awesomeness in terms that your manager and any other higher-ups can understand. You’ll also have to be ready for all sorts of situations–your ideal might not happen, but they might offer an alternative you’d never considered. What then?6 Strategies to Prove You Deserve a Raise4 Things We’ve Learned From a Redditor’s Quest for Getting a RaiseA Google HR Chief Shares The Secret to Getting Promoted3 Strategies for Getting a PromotionAs easy as it would be, and as much as you know you deserve it, you  can’t just walk in and declare: â€Å"I’d like to make more money,† or â€Å"I think it’s time for a title change.† You need to approach your request with a well-thought-out strategy. And before you go in, think of any and all responses you might get†¦and how you’ll respond to each. Preparation is  key. You deserve it; now prove it.You’re Going to Have to Ask for What You WantJust because, in your mind, of  course everyone knows what a good job your do and of  course if an opportunity were to open up, it would be yours does not make it true! Offices are big places with lots of stuff going on. Your interna l monologue is not real life.5 Myths Stopping You From Getting PromotedAs in real life, in an office everyone is more preoccupied with themselves than what you’re doing. Oh, you stepped in and finished up something that technically wasn’t your gig? That’s awesome and kind, but most people will just be relieved they didn’t have to do it and move on with their lives. Keep a running list of these â€Å"above and beyonds† so you can share it when the time is right. Waiting for someone from higher up to magically bestow you with the promotion you deserve? Likely not gonna happen. You did all the hard work, and how you’re going to have to do the harder work of asking for what you want and proving it beyond a shadow of a doubt.What to do When the Best-Laid Plans FailOf course, things don’t always go as planned. If getting a raise or a promotion were easy, we’d all be rich CEOs. Or, you know, retired. Read the below, dust yourself off, and try again.When You Get Promoted Without A RaiseWhat to Do If You Didn’t Get the PromotionYou’re (hopefully, since you’re a good worker) not going to slack now that you didn’t get what you wanted. Either you’ll put your head down, continue to do the work, and ask again later†¦or put your head down, continue to do the work, and look for a job elsewhere that might appreciate you more or have the funds to give you what you want. If elsewhere is where you want to go, try signing up with TheJobNetwork  to get matched with an ideal job for you and your career path.Just remember–always stay classy and work hard, and your reputation will follow you wherever you go.

Saturday, October 19, 2019

About how some aspect of the year 1968 contributed to it being a Essay

About how some aspect of the year 1968 contributed to it being a unique year in world history - Essay Example A huge wave protests against Vietnam War and racism prevailed in the United States in the year 1968. The democratic convention is one of the remarkable protests that took place in this year. The police beat the demonstrators in their chanting while the whole world watched. The 1968’s color students’ strike made the first significant breakthrough in the war for ethnic studies. Radicalization became deeper and broader in year 1968 than the previous years. More students supported Che Guevara, a Latin American revolutionist than his counterparts in the United States’ presidential candidacy (Kurlansky 84). A survey by New York Times showed that 40% of the students figure that accounted to approximately three million people thought that the United States needed revolution. The radical sentiment became stronger. It started with the African American society in 1968 and later penetrated to the Asian American, Native American, Chicano and Puerto Rican. The 1968’s radical battalions failed to unite by only one doctrine or program. Various predominant themes that reflected their fifteen years of black power, antiwar and civil rights protests that had dictated their political evolvement were their main perspective (Kurlansky 45). The anti-imperialism as well as the antiracism was in the front position, in the radical outlook. The source of inspiration of the two groups was from the liberation movements. The movements were crashing the notion that United States was invisible. 1968 was the year when the Cuban and Vietnamese revolutions, Marxist armed groups in Latin America, people’s china and also the Middle East joined together into an unstoppable torrent. The activist of the time regarded solidarity to the third world as their major responsibility. It was a term that was commonly used during that period and resulted to today’s global south. People who embraced the ideas about

Friday, October 18, 2019

Creating Shared Value Project Essay Example | Topics and Well Written Essays - 1000 words

Creating Shared Value Project - Essay Example In the past few decades, sustainable nutrition was proposed, with a dietary recommendation that would lead to healthier consumers. However, little attention has been paid to sustainable nutrition. With the growing academic knowledge on the environmental and eco-system degradation, renewed attention has been directed towards sustainability, particularly in our diets. Thus, the society has acknowledged that sustainable principles for nutrition are urgently needed to address nutrition and food security. Ensuring sustainable diets require the development of strategies and policies towards sustainable food production and consumption. Addressing nutrition needs of the rapid growing population, food systems have under transformation toward more efficient ways of utilizing the resources and effective food consumption methods. Currently, Food and Agriculture Organization (FAO) activities to ensure sustainable nutrition focus on food production, food consumption, and nutrition security. This will help in providing eco-friendly food recommendation to the consumers to understand what the requirements for an environmental sustainable food system are. Even though food is defined in the Millennium Ecosystem Assessment, nutrition is seldom dealt with to determine the nutrients contained in a whole diet. Nutrients and diets are essential, as ecosystem services to increase the awareness of nutrition as a concern for the environment, and to assist in improving and understanding the idea of sustainable diets (Hasler, 2000). Sustainable nutrition along with education policies is significant to the achievement of the goals of sustainable development. In addition, it acts as a link connecting the nutritional well-being of the individual and community. Sustainable nutrition can also address the consumption of food with lower water and carbon. It can also promote the utilization of food biodiversity such as traditional and local foods with more nutritional rich

Causes and Effects on Global Economy Research Paper

Causes and Effects on Global Economy - Research Paper Example The spate of events undermined the confidence of the investors impacting the global financial markets. With the tightening of the credit norms, there was a slowdown in the economies worldwide. It is argued that the government and Federal banks could have avoided this situation had they acted on time. Critics put the blame on the regulatory practices of the government and credit rating agencies. The latter failed to assess the risk associated with the mortgage-based financial products. As a result of the high ratings given to these securities, they were passed on to the investors easily. A hike in the interest rate led to widespread delinquency on the home loans and early foreclosures. This increased the supply of houses thereby putting a downward pressure on their prices. The rise in the rates of delinquencies due to the steep housing installments eroded the value of the mortgage-based securities. Surplus liquidity and low rates of interest created conditions of easy credit and contributed to a housing boom. There was a considerable increase in the homeownership rates in the country most of which was comprised of the subprime mortgage. During this time credit was extended to the borrowers with a bad credit history. The installments on these loans were low initially but with the rest of the interest rates, the monthly installments of the borrowers also increased substantially. Meanwhile, the steep rise in the house price and credit created a building boom. The rise in the rate of foreclosure together with the surplus unsold houses caused a steep fall in the housing prices in the US. Another reason that contributed to the rise in the home loan delinquency was the quality of credit. Enticed by earning higher transaction fees the lenders failed to check the creditworthiness of the borrower and in the process extended credit to the high-risk segment.

Thursday, October 17, 2019

The Impact Of Global Warming On Developing Countries Essay

The Impact Of Global Warming On Developing Countries - Essay Example Global warming has been directly linked to increased emissions of carbon dioxide and other gases. The Earth is warmed by the radiant heat from the rays of the sun, which is generally equal to the amount of energy that is radiated back from the Earth in the form of infra red radiation. Thus the temperature of the Earth remains constant. However, the temperature of the Earth is directly dependent upon the composition of its atmosphere and when there is an excess of carbon dioxide and similar gases in the atmosphere, it blocks the infra red radiation from the surface of the Earth, trapping heat in the lower atmosphere and creating a "greenhouse effect" which increases global temperatures Rapid industrialization has resulted in increased energy use, with the resultant multiplication of carbon dioxide emissions. According to Roberts (2004), energy demand in countries like India, China and Brazil is developing so fast that it may double by 2020, while in the developed countries, the demand for power is fast outstripping supply, raising the specter of blackouts. In fact Roberts (2004) also points out that â€Å"China has seen dramatic increases in its energy consumption in recent years (pp. 143–145). In the words of one scientist; â€Å"China's rapid industrialization has led to upward revision of predictions... While previously we thought in terms of doubling the strength of the CO2 content of the pre industrial atmosphere, current thought is moving toward a tripling† (Broecker 1586).

How can the child's position in the family and the size of the childs Essay

How can the child's position in the family and the size of the childs family influence his or her development - Essay Example r of significant studies dealing with family size and child’s IQ development, it has been noted that a large number of studies routinely show that family size is related considerably to children’s IQs: the larger the family, the lower the children’s IQ is likely to be (Zajonc 1976). This can be because of the reason that less crowded families gets parents to be more involved with their children giving them more attention than larger families. Size of the family has had a depressing effect on children’s IQ in Scotland and France alone with families of four or more children scoring below the mean for the general population. In a separate study in France and Holland, family size has been found to operate somewhat independently of socioeconomic status when it comes to children’s IQs. This is to say that children from smaller families have the advantage when it comes to cognitive development irrespective of their parents’ economic status, and large families tend to depress children’s IQs irrespective of their parents’ economic status. Moreover, as family sizes get larger, the child’s percentage of passing an admission test automatically drops according to Zajonc analysis index. There are already literary supports on the importance of birth order in the family that affect the child’s personality and other characteristics. Child’s position in the family proves to be significant according to detailed clinical studies, however factors are so numerous and varied in defying statistical generalization. There is still much doubt whether the child’s status constitutes a psychological entity accounting to the share of attention from parents. Children in the family may have the same physical environment they are exposed to but receive different attitudes and expectations for each from others depending on the child’s birth order and sex (Lindgren & Watson 1979). Reading Development. In a study concerning child’s reading influences, ordinal

Wednesday, October 16, 2019

Cost of Capital Coursework Example | Topics and Well Written Essays - 250 words

Cost of Capital - Coursework Example First, the cost of debt is a component of the weighted average cost of capital, and it refers to the interest paid on a certain amount if a company borrows funds from outside or it is obliged to take a debt from financial institutions. It is usually expressed as a percentage rate. Besides that, it is computed either as an after tax rate or before tax rate. Second, the cost of preferred stock is the rate of return needed by the preferred stock holders in a company. It is usually computed by dividing the yearly dividend payment on the preferred stock by the current market price of the preferred stock. Third, the cost of common stock is also known as cost of equity and is the minimum rate of return that a firm is supposed to generate so as to persuade the investors to invest in the common stock of the company at its current market price. Lastly, the cost of retained earnings is a component of the cost of equity. However, it excludes the taxes as well as the transaction costs associated with dividends making it slightly less than the common stock (Brigham & Houston, 2015). The cost of retained earnings should be at least equal to the shareholders’ rate of return on the re-investment of the company’s

How can the child's position in the family and the size of the childs Essay

How can the child's position in the family and the size of the childs family influence his or her development - Essay Example r of significant studies dealing with family size and child’s IQ development, it has been noted that a large number of studies routinely show that family size is related considerably to children’s IQs: the larger the family, the lower the children’s IQ is likely to be (Zajonc 1976). This can be because of the reason that less crowded families gets parents to be more involved with their children giving them more attention than larger families. Size of the family has had a depressing effect on children’s IQ in Scotland and France alone with families of four or more children scoring below the mean for the general population. In a separate study in France and Holland, family size has been found to operate somewhat independently of socioeconomic status when it comes to children’s IQs. This is to say that children from smaller families have the advantage when it comes to cognitive development irrespective of their parents’ economic status, and large families tend to depress children’s IQs irrespective of their parents’ economic status. Moreover, as family sizes get larger, the child’s percentage of passing an admission test automatically drops according to Zajonc analysis index. There are already literary supports on the importance of birth order in the family that affect the child’s personality and other characteristics. Child’s position in the family proves to be significant according to detailed clinical studies, however factors are so numerous and varied in defying statistical generalization. There is still much doubt whether the child’s status constitutes a psychological entity accounting to the share of attention from parents. Children in the family may have the same physical environment they are exposed to but receive different attitudes and expectations for each from others depending on the child’s birth order and sex (Lindgren & Watson 1979). Reading Development. In a study concerning child’s reading influences, ordinal

Tuesday, October 15, 2019

Of mice and men presentation - Chapter one Essay Example for Free

Of mice and men presentation Chapter one Essay At the start of chapter one the setting is tranquil, there are many animals to show that the humans will not be welcome when they arrive. The animals seem to own the valley. (OHP EXAMPLES OF ANIMALS) * Because the lizard is small it would need to be very quiet and peaceful for it to make a Skittering sound. ** The rabbits are obviously very confident with the surroundings, which shows that humans do not go there often. The rabbits are a recurring theme in Of mice and men *** Deer are generally very timid animals around humans so, again, like the rabbits it proves the absence of human life and its effects on the wildlife. Steinbeck also uses a lot of natural colours that make the setting calm and harmonious. There are Deep greens of the trees, Golden foothill slopes and Yellow sands. These colours do not clash with each other and help contribute to the almost utopian environment. Because of a complete lack of human life, the area not only seems safer but also calmer. The trees have been personified to replace the humans. The sycamores were said to have White, recumbent limbs When Steinbeck says that Men who have sat on it have worn the limb of the sycamore he shows that people can destroy nature and the beauty of the setting. Another example of this is when he talks of A path beaten hard by boys This is just before George and Lennie enter the scene so could indicate that they are not entirely wanted. (SEE OHP FOR PICTURES) **** These pictures show the impact of humans In the paragraph when the men enter the novel the scene starts to have a darker atmosphere. The shade Climbs up the hills. This is not only an example of the personification of the shadow, but it also dims the previously bright setting. This could be because George and Lennie are arriving. Darkness shows evil and although I wouldnt call George or Lennie evil the animals do not want them there. The way the two men enter seems to be very significant. George walks before Lennie even though there is enough room for them top walk side by side. This shows Georges protectiveness and leadership over Lennie. It also shows Lennie is mentally younger and more simplistic because he is always copying like a child is. (SEE OHP GEORGE AND LENNIE WALKING) Lennies simplicity is also graphically portrayed when he is likened to different animals. For example when Steinbeck says: His huge companion dropped his blankets and flung himself down and drunk from the surface of the green pool, he drank with long gulps, snorting into the water like a horse. This simile shows that Lennie is not only as strong as a horse but also has manners like one. He is later referred to as bear-like in his actions and features. It is described that he is Dragging his paws Obviously, being a human, he has hands not paws but because they are so large and because of what he is doing with them they are called paws. There is a sequence in the first chapter where Lennie imitates Georges exact movements-this show that Lennie needs to copy because he cant think for himself and he is not confident. (ANDREW COPYS DAN AS LENNIE DOES GEORGE) As you can see I was playing the role of George, the intelligent character and Andrew the slow, simple character. Yet another example of George being the more confident character is when he starts to get angry and begins to shout, complaining about the bus driver. Whilst George is doing this Lennie is very quiet and acts timidly. It is, however easy for the reader to be sympathetic towards George and understand his anger. Because Lennie isnt very clever, George often has to repeat himself many times. At one point George has to ask Lennie three times to put down a dead mouse that he has got. When they want to eat, Lennie wants to go to the ranch that they are headed towards but George realises that they will have to do more work if they go straight away so he says no. Lennie cannot understand this. This shows that Lennie just wants immediate satisfaction whereas George can look at what will happen in the future. It is also possible to see a kind, caring side through Georges anger and frustration. He often says Aw Lennie when his friend gets upset about something and comforts him. The first chapter gives an in-depth impression of what the two main characters personalities are like and how they have similarities and differences.

Monday, October 14, 2019

Facebook: Motives for Use and Effects on Personality

Facebook: Motives for Use and Effects on Personality The current study investigated the motives for using Facebook from the uses and gratifications perspectives and personality as predictors of Facebook addiction among the Mauritian university students. It also explored the relationship of motives and personality with attitudinal/ behavioral outcomes of the participants’ Facebook use. It was found that certain prevalent motives and extraversion trait were strongly associated with the Facebook variables studied and significantly predicted addiction to the site as expected. Relationship between Facebook and motives The study found 8 motives for Mauritian youths for using Facebook, the most popular social networking site. These motives include passing time, education, political, social interaction, entertainment, network surveillance, information seeking and relationship maintenance. Preceding studies found similar motives for using the site. For instance Dhaha et al (2014) found that entertainment, social interaction, political and education motivated Somali youths to use Facebook. Hart (2011) found that four motives for using the site among undergraduates, namely information seeking, passing time, relationship maintenance and entertainment significantly predicted amount of Facebook use, frequency of Facebook use and number of Facebook friends. Zhang et al (2011) found that network surveillance significantly predicted time spent on Facebook per day and number of Facebook friends. In this study a bivariate correlation has revealed that there was a moderate and significant positive relationship o f amount of time spent per day, number of friends and login frequency with all the motives except education and political which showed no relationship with these Facebook usage variables. The study enquired the intensity of Facebook addiction among Mauritian youths. The Facebook addiction instrument was divided into 4 dimensions namely salience, loss of control, mood modification and conflict. The results confirmed addictive tendencies among 27.2% of the sample as they rated high on overall Facebook addiction scale. It was found that the site was incorporated in their daily lives (salience), many spend more than 3 hours per day on it (38.2%), they often lose sleep due to late night logins, have a constant urge to check Facebook (loss of control), neglect responsibilities such as academic performance (conflict) and often use Facebook to reduce feelings of anxiety (mood modification). These findings corroborate with previous studies. For instance Zaremohzzabieh et al (2014) and Balakrishinan Shamim (2013) found similar outcomes of addictive behaviors towards the use of Facebook, namely salience, loss of control, mood modification, withdrawal and conflict. In terms of the relationship between Facebook motives and Facebook addiction, the study shown a significant positive correlation between Facebook addiction and the 8 motives components studied. Facebook addiction was more closely related to passing time motive followed by entertainment, social interaction and relationship maintenance. These findings are consistent with previous studies of Facebook addiction from uses gratifications perspectives. For instance Dhaha et al. (2014) and Kavitha (2013) found that entertainment, communication, passing time, social interaction and companionship were correlated with Facebook addiction. The study also investigated specific motives as predictors of Facebook addiction to test the hypotheses. The analysis of the multiple regression revealed that the four motives namely passing time, entertainment, social interaction and relationship maintenance significantly predicted Facebook addiction. Passing time motive emerged as the best predictor of Facebook addiction, followed by entertainment and relationship maintenance. These findings are supported by previous studies. For instance (Kavitha, 2013) also identified passing time as the best predictor of Facebook addiction. In the same line a systematic review that examined Facebook addiction and motives has revealed that for 14 out of 16 studies, the components explaining the majority of the variance relate to either passing time or relationship maintenance (Ryan et al, 2014). With regard to the prevalent gratification of passing time, findings seem to reflect the usual use of Facebook to occupy time when bored, to procrastinat e from other activities or task avoidance (Foregger, 2008; Sheldon, 2008). The researchers also found that entertainment (e.g. playing games) was a popular motive for engaging in Facebook appearing across 15 studies (Ryan et al, 2014). It is associated with pleasure seeking. Dhaha et al (2014) and Sofiah et al (2011) also found that entertainment, social interaction (e.g. making new friends) and communication significantly predicted Facebook addiction. These findings are consistent with those of Ryan et al, (2014) which reported that motives can be related to Facebook addiction through use that is habitual, excessive or a desire for mood modification. The findings reflect both the benefits and downside of Facebook use. The uses and gratifications of Facebook use operate to satisfy the social and psychological needs of a large number of internet users but at the same contributing to addiction to the site (Ryan et al, 2014). As the findings indicate, excessive use result in negative life outcomes such as neglecting significant activities e.g. school and significant relationships. For instance this paradox can be illustrated in terms of the Stimulation Hypothesis and Displacement Hypothesis since findings of this study have revealed that social interaction is related to Facebook addiction. The former supports the positive effects of social interaction via Facebook. It argues that online interaction complements existing social interact ion and can extend new cyber relationships to offline interaction thereby improving social relationships and relieved from loneliness (Valkenburg, 2007). But paradoxically the displacement hypothesis suggests that the time and psychic energy spent on Facebook with weak ties or virtual characters replaces real world interaction and is harming significant relationships (Valkenburg, 2007). Similarly (Sheldon et al, 2011) found that spending a lot of time on Facebook correlated with both high levels of feeling connected to other people and with high levels of disconnection. Moreover Facebook addiction is found to be with associated depression, anxiety disorders, aggressive tendencies and decreased productivity (Rosen et al, 2014) Relationship between Facebook and personality This study analyzed the attitudinal and behavioral outcomes of the respondents’ Facebook use from a personality trait approach involving extraversion, openness to experience, agreeableness, conscientiousness, emotional stability and narcissism. The study also posits that certain of these personality traits predict Facebook addiction. Results indicate that extraversion significantly and positively correlated with amount of time spent on Facebook per day, login frequency, number of friends and Facebook addiction. Regression analysis has revealed that extraversion significantly predicts Facebook addiction. These findings are in line with other studies. For instance Amichai-Hamburger et al (2010) and Kosinski et al 2013 found that Extroversion was positively related with amount of time spend on Facebook and number of friends. Wilson et al (2010) reported that extraversion was related to higher levels of Facebook use and predicts addictive tendencies to the site. The researchersâ⠂¬â„¢ findings suggest that extroverts are over reliant on SNSs as they require a higher level of stimulation and a large social network. In the same line the current study found that there was a positive significant correlation between extraversion and social interaction motive consistent with the rich-get-richer approach which claims that extraverts gain more benefits through SNSs as they can enlarge their social relationships (Kuss Griffiths, 2011). This is to contrast with Moore McElroy, (2012) who found that those who score low on extraversion i.e. introverts positively correlated with Facebook use to stay in touch with friends. With respect to narcissism this study found that narcissism significantly and positively correlated with amount of time spent on Facebook per day, login frequency, number of friends and Facebook addiction. Carpenter et al (2012) and Rosen (2014) also found that users who score high on narcissism spend a lot of time on Facebook; they depict addictive symptoms to the site and have many Facebook friends. Moreover the current study revealed there was a high and positive significant correlation of narcissism with the frequency of posting updates and changing profile pictures. Similarly Alloway et al (2014) found that frequency of posting status updates was related to narcissism. Individuals scoring high on narcissism are more active on social network sites as these sites represent an opportunity to present themselves in a self-promoting way which is in line with their ideal self by frequently posting glorifying pictures and updates about them (C. S. Andreassen, et al, 2012). On the other hand this study revealed that conscientiousness was negatively related to amount of time spent on Facebook and login frequency and low scores on conscientiousness predicted Facebook addiction. These findings are consistent with Wilson et al (2010) which showed low scores on conscientiousness was related to higher levels of SNSs use and significantly predicted addictive tendencies to SNSs. It was hypothesized that unconscientious young adults exhibit addictive tendencies towards the use of SNSs as they lack self-discipline and tend to use these sites as way of procrastinating (Wilson et al 2010). However these findings differ from that of Marcus et al (2006) who found that conscientiousness was positively related to self-monitoring and presentation, suggesting that those who rated high on conscientiousness engage on social-networking sites to gain social appreciation. Alternatively this study found there was no relationship of openness to experience with amount time spends per day, number of friends and login frequency. Openness to experience did not predict Facebook addiction. These findings are supported by Wilson et al (2010) which also revealed that openness trait has no impact on SNSs use. The researchers believe that this is due to the fact that Facebook is no longer being a new creation and thus has lost some of its appeal for those with openness characteristic who are keen to experience newer activities (Wilson et al, 2010). However this study’s finding do not link with those of Ross et al (2009) which showed that higher levels of openness to experience was associated with greater online sociability. Conversely this study found that there was no relationship between openness to experience and social interaction motive for using Facebook. This study revealed that there was no relationship of agreeableness personality trait with amount of time spends per day on Facebook, how often participants login to Facebook, number of Facebook friends and Facebook addiction. These results correspond with those of Wilson et al (2010) which showed that the agreeableness trait has no influence on SNS use. This is also in line with Duff (2012) which found that there was no significant relationship between agreeableness and frequency of Facebook use. Neuroticism was negatively related to amount of time spend on Facebook per day, login frequency and Facebook addiction. These results indicate that participants scoring low on neuroticism spend more time on Facebook and depict addictive tendencies to the site. Conversely high scores on neuroticism is associated with less time spend on Facebook. These findings are in contrast with those of Wilson et al (2010) who found that neuroticism was not associated with addictive tendencies to SNS. Likewise Duff (20..) found that neuroticism was not related to frequency of Facebook use. The current findings do not link also with other studies which reported that high scores on neuroticism was positively associated with social media use where it was assumed that neurotics use social media as a way of seeking support. Moreover another plausible reason reported for this positive relationship was that online social networks give those who are high on neuroticism more time for scrutiny before acting unlike face-to-face interactions (C. S. Andreassen, et al, 2012). However this study’s findings are indirectly supported by those of Marcus et al (2006), which indicated a significant negative correlation between neuroticism and self-monitoring (Duff..). Marcus et al (2006) argued that these results indicated that those higher in neuroticism show a lack of ability in changing their behavior to gain social approval from others. Thus this may indirectly explain why neurotics spend less time on Facebook. In the same line the current study has revealed that neuroticism is negatively related to social interaction implying that those who are high on neuroticism are less likely to engage in social interactions. Relationship between self-esteem and Facebook This study reported a significant negative correlation between self-esteem and amount of time spent on Facebook per day. This indicates that those who score low on self-esteem spend more time on Facebook. These findings are supported by previous studies. For instance Kalpidou et al 2011 found there was a negative correlation between self-esteem and time spent on Facebook. In the same line Mehdizadeh’s (2010) findings revealed that lower levels of self-esteem correlated with greater amount of time spent on Facebook. The current study also revealed that self-esteem was negatively related to number of friends suggesting that low self-esteem participants have more friends. These findings are consistent with Zywica Danowski’s (2008) findings which reported that low self-esteem users have many Facebook friends as they strived more to increase their Facebook popularity to compensate for inadequate offline popularity, consistent with the social compensation hypothesis. Moreover having many Facebook friends implies performing for a bigger audience which is associated with enhancing in self-esteem. Another plausible explanation for these results interlink with Ellison et al, 2007 study which stated that low self-esteem users reap more benefits from Facebook than their high self-esteem counterparts as Facebook affordances mitigate fear of rejection and enable them to enlarge their social capital in a way more rewarding for them than face to face interaction. Since low self-esteem involves poor self-perception, social anxiety and shyness, features such as wall posting, messaging, poking, tagging and display of users’ personal information encouraged low self-esteem users to improve social relationships. (Steinfield et al, 2008). Hence as Facebook is related to bounding and bridging of social capital it can be deduced that those with low self-esteem spend more time on Facebook to boost their self-esteem (Steinfield et al, 2008). Furthermore, viewing one’s own Facebook profile, editing Facebook profile and receiving positive feedback from others were found to enhance self-esteem (Gonzales Hancock 2011; Valkenburg et al, 2006). Gonzales Hancock 2011 stated that Facebook is related to self-presentation. Thus it can be said that those with low self-esteem spend more time on Facebook than those with high self-esteem in order to optimize their self-presentation such as posting information about themselves so as to gain more popularity and altogether boost their social self-esteem. The present findings indicate that low self-esteem users may be over reliant on Facebook to reap these benefits. Indeed this study has revealed a significant correlation between self-esteem and Facebook addiction. Correspondingly Denti et al (2012) also found that low self-esteem was associated with Facebook addiction. The researcher found that Women Facebook addicts with low self-esteem use Facebook more to report negative information about their lives (Denti et al 2012). However the results do not link with those of Wilson et al (2010) which indicated that there was no relationship between self-esteem and social networking sites. Correlation Between Crime and Poverty: Sociological Critique Correlation Between Crime and Poverty: Sociological Critique Introduction Jock Young once said: â€Å"At heart, the extent of crime is a political as well [1]as a behavioural matter †¦ The figures for crime †¦ are not hard facts in the sense that this is true of the height and weight of physical bodies. They are moral not physical statistics†. It is apparent from this statement that there are inherent flaws in all types of theories of crime causation whether these derive form the sociological, psychological or biological traditions. Nevertheless, crime causation theories form a significant part of modern criminology and have been used extensively to form policy and legislation. Bearing in mind the limitation of these theories, this essay will try to address the question why sociological theories of criminality suggest that social deprivation and poverty are two of the most significant factors that lead to criminality when two of the most poverty stricken groups, women and the elderly, have low rates of crime. Crime and poverty: A sociological approach There are many schools of thought that deal with crime causation. Sociological theories of crime focus on the social dimension of criminality, trying to analyse the sociological reasons that push individuals to commit crime e.g. poverty, shaming, social deprivation, fear etc. Sociology, in general is â€Å"the study of social organisation and institutions and of collective behaviour and interaction, including the individual’s relationship to the group†[2]. As early as 1893, criminologists such as Durkheim asserted that social deprivation and the division of labour in society puts disadvantaged groups in need, often leaving them with no other option but to resort to crime[3]. Very close to this analysis is the approach of Radical Criminology. This uses Marx’s ideas of capitalist society and social classes claiming that â€Å"much proletarian offending could be redefined as a form of redistributive class justice or as a sign of the possessive individualism which resided in the core values of capitalist society†[4]. Radical Criminology went a step further by arguing that individuals from working classes who resort to crime are in reality victims of a false consciousness that turns proletarian against proletarian. The ultimate goal is to preserve unequal class relations, masking the real nature of crime and repression in capitalist society[5]. Irrespective of whether we adopt the sociological explanation of the Traditional or Radical Criminology, there is still a paradox that both theories seem to overlook. If crime is closely related to class, social deprivation and poverty – regardless of whether this is a construct of capitalism or simply a means to survival – there is still not an adequate explanation as to why the female and older groups that form great part of poor classes render very low criminality rates. The correlation between, crime, poverty and gender/age The two most powerful demographic features that discriminate between offenders and non-offenders but at same time provide a good explanation of criminal behaviour are gender and age. At one time there was so little criminality from female and older groups that criminologists turned their attention to it. John Hagan justified the low crime levels within female groups by saying that male groups often see crime as a source of fun and excitement, which is not often the case with female groups which are more family-oriented due to the maternity role they carry[6]. Moreover, daughters are believed to be more frequently subject to intense, continual and diffuse family control in the private and domestic environments and this gradually develops among female groups a stronger feeling of emotional sanctions than physical or custodial controls. Therefore, shaming methodologies and the withdrawn of love and affection have greater impact on female groups than incapacitation. This system does not need the intervention of the criminal justice system but of close family guidance. Finally, this close family control also encourages female groups to stay away from the â€Å"purview of agents of formal social control†[7]. Carlen’s findings reinforce this theory as he collected evidence that showed â€Å"female criminals were most likely to emerge when domestic family controls were removed altogether†[8]. With minor exceptions the crimes of the elderly have not been in the focus of criminological attention[9]. Stephens argues that older people who belong to poor classes are more concerned with survival issues and do not feel empowered to resort to crime apart from occasional petty offences. They also lack the physical and psychological motivation to commit serious crimes such as murder or robbery. However, this is not the case with older people from wealthy classes as these groups are most often characterised by power, greed. They also carry the advantage of experience. However, again, they lack the physical energy to commit violent crimes and that is why they tend to focus on financial offences. Conclusion It is apparent from the above analysis that sociological theories that use poverty and social deprivation to explain crime do not clash with the low levels of criminality within female and older groups. Male groups from poor classes render higher rates because they do not experience the same control mechanisms that female and older groups receive. When these mechanisms are lifted (e.g. because there is no close family control or because the feeling of survival is not that evident), then the risk is the same. Bibliography Box S (1983) Power, Crime and Mystification, London: Tavistock. Carlen P (1988) Women, Crime and Poverty, Milton Keynes: Open University Press. Durkheim E (1953) The Division of Labour in Society, Oxford: Oxford University Press Rock P (1997) â€Å"Sociological Theories of Crime† The Oxford Handbook of Criminology, Oxford: Oxford University Press. Haggan J (1979) â€Å"The Sexual Stratification of Social Control† 30 British Journal of Sociology. Stephens J (1976) Loners, Losers and Lovers. Seattle, Washington: University of Washington. Young J (1988) â€Å"Radical Criminology in Britain: The Emergence of a Competing Paradigm† 28 British Journal of Criminology 1 Footnotes [1] Young J (1988) â€Å"Radical Criminology in Britain: The Emergence of a Competing Paradigm† 28 British Journal of Criminology, page 175. [2] The Oxford English Dictionary [3] Durkheim E (1893) The Division of Labour in Society, later reprinted as Durkheim E (1953) The Division of Labour in Society, Oxford: Oxford University Press [4] Rock P (1997) â€Å"Sociological Theories of Crime† The Oxford Handbook of Criminology, Oxford: Oxford University Press. [5] Box S (1983) Power, Crime and Mystification, London: Tavistock. [6] Haggan J (1979) â€Å"The Sexual Stratification of Social Control† 30 British Journal of Sociology. [7] Loc cit supra note 4 page 243. [8] Carlen P (1988) Women, Crime and Poverty, Milton Keynes: Open University Press. [9] One exception is Stephens J (1976) Loners, Losers and Lovers. Seattle, Washington: University of Washington.

Sunday, October 13, 2019

Take What You Get :: Personal Narrative Baseball Friendships Papers

Take What You Get I hated both my last day of school in Hopkinton and my first day of school in Sherborn. My mother drove me to my new school in our brand new white Volvo station wagon. The ride from our house to the school seemed much shorter than it actually was. Looking back on it, anytime I’ve unwillingly traveled somewhere, the car ride seemed extremely short. I remember the station wagon climbing the long, winding hill that led to Pine Hill Elementary school. As I watched the trees and fields pass, I imagined that the car hadn’t gone by them. In my mind, I was still back in my new trundle bed at home. My mom knew I was on the verge of tears, and she was constantly moving her hand back and forth between the car’s stick shift and my knee. "All the kids are going to love you," she said, patting my leg. "Mrs. Smith is so excited to have you in her class." I couldn’t even muster a response. I pictured Mrs. Smith forcing me to stand up in front of the class, asking me to tell the kids my name and what I liked to do. Then I saw the kids laughing when I broke down in tears, unable to give them an answer, or merely mumble a few words about myself. I couldn’t even respond to my own mother. "Honey, it’s ok to be nervous. Remember that I’ll pick you at 3:15. You don’t have to take the bus this afternoon." She parked the car and held my hand as we walked up the steps to the school’s entrance. I was wearing blue shorts, a bad choice because they were too short and revealed my pale, chubby legs. The walk with the principal and my mother down the long, empty corridors was what finally did it for me. I had been trying my hardest to hold back the tears, forcing myself to think of the end of the day, when my mother would be waiting for me. But the classroom was getting too close. I could sense it by the way the principal slowed his pace and drifted to the right side of the corridor. I felt the tears under my eyes, but I didn’t care enough to wipe them away with my arm. "Welcome to Pine Hill," Mrs. Smith said.