Wednesday, December 25, 2019

Cultural Norms About Parenting Practices - 984 Words

The concept of a good parent and what it means to embody one is highly opinionated and extremely difficult to define. In a country like the U.S, young children are becoming more racially and ethnically diverse everyday due to a widespread range of different cultures. This makes it a nightmare to determine what is considered good parenting. Cultural norms about parenting practices and values typically stem from a person’s country of origin and how they were raised. In general, a common theme that emerges across cultures is a desire for a child to be obedient, respectful, polite, honest, and successful especially in school. In the stories Two Kinds by Amy Tan and Who’s Irish by Gish Jen the concept of a good parent in an Asian orientated culture is highlighted. In addition, both stories illustrate the cultural division between an immigrant mother and her Asian-American daughter. Although the actions of these mothers are a bit extreme at times by U.S standards, regardless they can be considered good parents because they have their child s best interest in mind and simply want the best for them. Expectations and disappointments are a normal part of parenting. Every parent in one way or another wants to see their child succeed and excel. Jing-mei’s mother in the story Two Kinds is no exception to this desire. In a line near the beginning of the story her mother tells her, You can be best anything† (pg. ). It makes sense why her mother is so optimistic and hopeful aboutShow MoreRelatedWhat s Taking Place Around The World? Essay1631 Words   |  7 Pagesfocus on globalization and educations. For this reason, issues of culture are brought up. The problem with culture is maintaining it, and one of the questions that are asked when culture is a topic of interest is how can individuals maintain their cultural identity but still be open to a culture different from theirs? Globalization, as defined by Wan Shun Eva Lam, is what s taking place around the world concerning integration, migration of labor, growth of media and the rise of communication, andRead MoreCulture Is An Important Determinant Of Our Personality1594 Words   |  7 PagesLoosely defined, a group of people who share a group identity with the same values, beliefs, and norms belong to a particular culture. Therefore it would be incorrect to say that culture has no affect on us. In fact, culture, influences our most basic human behavior like the manner in which we learn, think, and behave. As a consequence of being influenced by our culture, many theorists believe that culture is an important determinant of our personality. Whether we are conscientious, independent,Read MoreGender And Gender Roles1080 Words   |  5 PagesGender roles are born through social construct rather than given biologically. Language in male and female roles have been substantially focused on â€Å"how the system is put to use in practice† (Bucholtz 1999: Page 80). If a per son studied the differences of feminism and masculinity, the differences will outstand each other, because women are expected to act and speak in a specific way, as well as men. An insight of the differentiation of men and women would be â€Å"women may use â€Å"men’s† forms to indexRead MoreCulture : Up The Identity And Personality Of An Individual1145 Words   |  5 PagesParenting Styles Jacqueline Bonner February 04, 2015 Argosy Culture makes up the identity and personality of an individual. Every individual has their own culture implanted in them from the community in which they live, the family in which they grew up and the personal identity people have given them in the overall society. The individual’s personal views, aspects of reasoning and judgment and their general logical thinking as an individual are affected significantly by theirRead MoreMorality and Society Essay1295 Words   |  6 Pagesbe right, but whether we like it or not society does make us or break us. Several social changes have impacted our society as well; some of the more elaborate changes that have taken place include media, religion, education, social relationships, parenting styles and economic instability. Social relationships and parental styles have however changed a lot during the years and this has a huge effect on our morality. Social relationships come with the need to be connected to each other, whether it isRead MoreThe Relationship Between Flexibility Benefits Used And Work Family Conflict1433 Words   |  6 Pagesages ranged between 26 and 57 years old (Cicei, 2015). Only 72.5% of the participants had children, 9.8% had other dependent care responsibilities, and 77.5% were married (Cicei, 2015). The study was administered online using a survey that asked about employee benefits used, flexible work arrangements, and work family conflict. The results of the study determined that flexible work arrangements are negatively associated with time and strain-based conflict more so than behavior based conflict dueRead MoreTeenage Pregnancy Essay1573 Words   |  7 Pagesas well as conflicting with their cultural beliefs. As teen motherhood is socially structured. Society has judged teenaged pregnant girls as deviant (nonconforming) and that their lack of adherence to social, religious, and moral values was considered immoral. Teenaged pregnancy evolved as a social problem in North America. 1 Contrary to society’s social structure, consideration of teen pregnancy as immoral and a social issue, First Nation cultural beliefs welcomed children and consideredRead MoreExamination Of Individualism And Collectivism1513 Words   |  7 Pagesand Triandis (Hofstede, 1980; Triandis, 1972, 1980, 1988). Cultural identities can be grouped based on individualism and collectivism and this classification provides with new dimensions to contrast cultures. Culture influences people s development, attitude and creates diverse value system. Pregnancy, childbirth, childcare and rearing are a culture specific event and processes (Pierce, Sarason Sarason, 1996), therefore cross-cultural researches play vital role to identify these differences. FirstRead MoreEssay on The Importance of Good Parenting1393 Words   |  6 PagesIntroduction Parenting style is one of the most attributed issues when dealing with care for children by their own parents. Parents should be always knowledgeable about the impact of proper parenting so that their child will grow productively. In this case, the level of parenting issues can help to improve the process of child’s learning development. This paper is going to discuss at least three parenting style for children in order to explore more about these proper parenting styles, which couldRead MoreThe Impact Of Parenting Styles On A Child s Development2645 Words   |  11 PagesMelanie Santos Final Reflection Research Paper PSYC 215 - Dr. Bagshaw The significant impact different parenting styles can have on a child’s development intrigued me and prompted my self reflection of how my immigrant parents parenting practices affected my development. From my experience, I believe immigrant parents are more likely to display authoritarian versus authoritative parenting styles. â€Å"Studies have shown that parents of individualistic cultures (i.e. western cultures) are more likely

Tuesday, December 17, 2019

Benefits And Harms Of International Education For Both...

According to Ninnes and Hellsten, the international movement of student or academic staff between countries. It can be understood as the international link between nation states, governments or institutes to achieve better education program. (Ninnes P. Hellsten M. (eds.), Internationalizing Higher Education, 120-121). The International Education has grown strongly in Australia for the last few years. At the same time, it has a direct impact on Australia and home countries such as China. Based on the research, this essay argues that there are some benefits and also harms of international education for both home and host countries. This essay first shows what is the Internationalisation. Then, it gives information about the benefits and†¦show more content†¦A plan that involves the interests of Australia s â€Å"soft diplomacy† Colombo Plan. This plan has funded foreign students in Asia to study in Australia. Plans is to be created from 1951, and by 1985, this plan has trained about 40,000 students. Many of which have achieved significant accomplishments, achieved leadership positions in not only the industry but also the government, especially in Malaysia, Singapore, and Indonesia. After planning Colombo, Australia began providing international long-term education. Currently, Australia has a network of approximately 2.5 million international students from many diverse fields at the university (Byrne Hall, 2014). These students are the people that have contributed to long-term support and important for Australia as they have achieved a leadership position in the industry and the government. Found that Australian students should be encouraged to study to reinforce soft diplomatic interests, the Australian government has created a new plan to support Australians to study and long-term studies. Countries such as the United States has recognized the potential benefits of international education, the United States made comments that they would double the number of students in 2018 (ICEF Monitor, 2015). International education also provides benefit about knowledge sharing, one of bilingual employees, which can be generated by international education, can contribute to bringingShow MoreRelatedEthics And Ethics Of Globalization1500 Words   |  6 Pages1 Economical ethical threats: Globalization has led to the creation of international markets where regulations are avoided i.e. poor market regulation Individual government cannot legislate or regulate in the international market as it cut across the boundary of a single country. International organization as well are relunctant to legislate over international market regulation as they will require to obtain an international agreement which will be a very difficult task. The non adequate regulationRead MoreThe Internationalization Of The Education829 Words   |  4 PagesHowever, the internationalization of education also has some problems into both home and host country. Through a research, the brain drain is one of the serious problems in China because many Chinese students do not return home when they graduate in the host country, and to bring the talent Chinese students start to run away from home country slowly (TimSoutar, 2002). This problem is caused from several reasons, which are the poor living situati on, low salary, and political structure, are pushingRead MoreTransnational Corporations Are A New Development1604 Words   |  7 Pagesit seems that this process has been quickly accelerated. Since the end of World War II and the rebuilding effort that followed it, global development has increased at an intense rate fueled by transnational corporations, the World Bank, and the International Monetary Fund. These multilateral organizations have transformed our global economy and reshaped our society. It’s not as if transnational corporations are a new development. Settlement of the Americas and the Caribbean, and the colonization ofRead MoreAdvantages And Disadvantages Of Foreign Direct Investment Essay1810 Words   |  8 PagesDirect Investment with particular reference to any one low-income country of your choice. Foreign Direct investment is an increasingly important outlet for resource transfers between industrial and developing nations. According to the world bank, FDI is a form of investment occurring when a business enterprise operates, has control or obtains a substantial degree of influence on the management of an enterprise in another country (generally 10% of voting stock). (The World Bank, 2016) Foreign directRead MoreBilingual Education : The Problems1695 Words   |  7 PagesIntroduction Bilingual education is a highly-debated subject in America and in many other countries. Many people are quick to point out problems produced by bilingual education. In my opinion, the benefits of bilingual education outweigh the problems. In this paper, I will discuss some benefits, problems, and solutions to these problems while also advocating the importance of bilingual education. Benefits of Bilingual Education There are many benefits to bilingual education. Most benefits will help studentsRead MoreBenefits Of Foreign Direct Investment2242 Words   |  9 PagesNisha Bhikha Dr. Tamara Black WRIT 340 29 March 2016 Benefits of Foreign Direct Investment for Nations in Sub-Saharan Africa Executive Summary As developing nations continue to expand their economic systems and find their place within the global market, the practice of Foreign Direct Investment (FDI) has become increasingly common. In 2013, developing nations received nearly 800 billion dollars of FDI, accounting for 54% of total global inflows (UNCTAD 2). Though many have elected to adopt a cautiousRead More The Increasing Danger of Industrialization on the Environment964 Words   |  4 Pagesprominent victims. They were also the first ones to put a system in place in attempt to counteract the harm done to the environment. Government agencies such as the EPA, strict laws set to protect the environment in most Scandinavian countries, the International Organization for Standardization (ISO), etc. are examples of the new environmental-friendly trend being exhibited in developed countries. The fact that such agencies and organizations work towards cleaner technologies and methods that areRead MoreEssay about BHP Billiton: An alysis of International Strategies1677 Words   |  7 Pages BHP Billiton analysis of International strategies and discussion BHP Billiton is a globalized company that was formed in 2001 through a merger between Broken Hill Proprietary (BH P) and Billiton. BHP is one of the world’s largest producers of aluminum, cooper, iron, ore, silver uranium and other minerals alike. BHP also has interests in petroleum. BHP is the worlds largest mining and resource company with about 100,000 staff in more than 25 different countries. The companies headquarter residesRead MoreThe Impacts of Sustainable Tourism and Their Influence on Resort Management1684 Words   |  7 Pagesfrequently mentioned in tourism industry is sustainable tourism. Sustainable tourism is tourism that takes full account of its current and future economic, social and environmental impacts, addressing the needs of visitors, the industry, the environment and host communities (UNWTO, 2005). The issue of sustainable development came to peoples attention when nature began to deteriorate. For example, ozone depletion, favouritism against races, culture intensify (Gisolf, 2010). Resorts which are closely relatedRead MoreMarket and Environment Analysis of Pakistan and Its Impact on International Businesses or Mne’s Operating in the Market of Pakistan in Current Economic and Political Climate11533 Words   |  47 Pagesand environment analysis of Pakistan and its impact on international businesses or MNE’s operating in the market of Pakistan in current economic and political climate. Abstract: This research paper enlightens the external environment which affects current Pakistan’s economy and MNEs. The purpose of this research to analyze the variables that affect economy, perceived perception of investors to invest or not to invest in Pakistan, International businesses or MNEs which is operating in the Pakistan’s

Monday, December 9, 2019

Lion king free essay sample

The Lion King was first made in 1994 directed by Roger Allers and Rob Minkoff. The original Disney cartoon of a lion cub blamed for his fathers death has been remade into a Broadway musical acclaimed all over the world. The Lion King is a musical based on the 1994 Disney animated film of the same name with music by Elton John. Directed by Julie Taymor, the musical features actors in animal costumes as well as giant, hollow puppets. The show is produced by Disney Theatrical. The director works closely with the performers in the theatre, guiding them in sharping their performance. The director also works closely with the playwright, and is responsible, as well, for coordinating other aspects of the production. When Julie Taymor the director was faced with a problem of whether to create humans or animals playing the part and she decided to make masks that show the animal face, as well as, show the human face giving the character his or her personality. We will write a custom essay sample on Lion king or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The costumes have a value of their own, adding color, shape, texture, and symbolism to overall effect. Other element such as; make up, hairstyles, mask and personal items like bracelets and necklaces and also very important. As for expressing other animals that are not part of the main cast or to express a certain theme, 2 different kinds of puppetry were used to express an African theme. Masks are considered functional works of art and play a social purpose in Africa. They are used in storytelling and ceremonies and are made to be worn over the head rather than cover the face. This technique is also used in The Lion King so that the human facial expression is not lost and to support the beadwork, corsets and armor used to show the human qualities of a lion. The costumes on the other hand are made of silk cloth to hide the human form, break the shoulder line and to enhance the powerful joints and thighs.

Sunday, December 1, 2019

The Effect Of Media Images Essay Research free essay sample

The Effect Of Media Images Essay, Research Paper It was stylish to be fat throughout most of history. Obesity was attractive because it was considered to be a mark of wealth. Those who could obtain plenty nutrient to maintain themselves and their household good fed were people with money. In the past century, nevertheless, nutrient has been abundant in most of the developed states, and tenuity has become stylish. Eating upsets have increased significantly over the past 30 old ages. The two most common feeding upsets include anorexia and bulimia nervosa. Anorexia nervosa is a disease in which adult females go really self-aware about their weight and have an intense fright of going fat. They go to such extremes as hungering themselves in order to maintain thin, and some use extra methods such as emesis, taking inordinate sums of laxatives, or exerting abundantly. Bulimia nervosa on the other manus is an eating upset in which the patient eats big sums of nutrient in a short period of clip, besides known as orgy feeding. We will write a custom essay sample on The Effect Of Media Images Essay Research or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Another symptom of binge-eating syndrome is fring oneself of nutrient through emesis, utilizing laxatives, or over-exercising, normally known as purge. Womans with anorexia nervosa or binge-eating syndrome frequently experience weariness and decreased energy, concerns, personality alterations, and abdominal hurting. If an feeding upset is left untreated, it can take to serious wellness harm, even decease. These eating upsets are normally brought on because a miss is unsated with her ain organic structure image. Oftentimes she feels out of control, and curtailing her consumption of nutrient is one manner to recover control. The patient has a sense of power over nutrient, and this makes her experience more unafraid about everything else traveling on in her life. Many times, misss with low self-prides are the victims of eating upsets because they frequently seek blessing from their equals. By being dilutant, they believe that they will go more desirable. Surveies have shown that the bu lk of adult females with feeding upsets are striplings. What makes a immature adult female associate tenuity with beauty? Many are now get downing to believe that the media has much to make with how adult females view themselves. Young adult females see thin theoretical accounts and actresses in magazines, advertizements, and telecasting shows. The media have portrayed the successful and beautiful supporters as thin. They have promoted the image of tenuity through popular programming.. Thinness has therefore become associated with ego control and success. The mean American adult female s organic structure weight has increased over the past 30 old ages, yet the theoretical accounts that represent American adult females have become increasin gly dilutant. The media s portraiture of happy, successful adult females being highly thin makes a immense impact on adult females s perceptual experience of beauty. When misss begin to compare themselves to the celebrated and thin adult females they see on telecasting, or in magazines, they equate thinness with beauty, and many strive to go beautiful. An addition in the figure of diet and wellness articles and advertizements had besides risen along with the figure of eating upsets. Articles on weight loss can be found in about every issue of adult females s magazines, and new # 8220 ; miracle # 8221 ; diet books are invariably being published. Many of these diets are unhealthy, and some are even unsafe. Weight loss advertizements are found in about every type of media, and adult females are invariably obssessed with the subject of weight. Many immature adult female can overlook the watercourse of tenuity and diet propaganda that they encounter, but an increasing figure of adult females are non so lucky. As the media puts more and more accent on tenuity, more adult females go disgruntled with their ain organic structures. Some may reason that the media has nil to make with a adult female s perceptual experience of herself. They believe that adult females want to look at people more beautiful than themselves, and that thin theoretical accounts inspire people to take better attention of their ain organic structures. But researches suggest that exposure to thin theoretical accounts resulted in lower self-pride and reduced weight satisfaction. Surveies prove that the media does straight associate to and impact a adult female s organic structure image and self-pride, which is straight related to eating upsets. There are ways that adult females can get the better of societal force per unit areas about weight and visual aspect. One manner to acknowledge stereotyping in the media and to appreciate and esteem individuals of all sizes. The media frequently portrays corpulent people as amusing or stupid and they are often shown eating big sums of nutrient. Thin people, on the other manus, are portrayed as smart and successful. Admiting stereotyping will assist to esteem people of all sizes, and to accept all sizes as equal. Women besides need to larn to reject negative messages from the media and to accept themselves as they are. When adult females stop mensurating themselves against the about impossible criterions that the media have set, and larn to wish themselves, they will go happy with themselves and will non worry about their weight or visual aspect. One needs to happen comfort in activities, people, or ends instead than nutrient or visual aspect. When a adult female learns how to love an d care for herself right, she will be content with her visual aspect even if she is non what the media would portray as the # 8220 ; ideal # 8221 ; adult female.

Tuesday, November 26, 2019

The Legend of the Fifth Sun

The Legend of the Fifth Sun The Aztec creation myth which describes how the world originated is called the Legend of the Fifth Sun. Several different versions of this myth exist because the stories were originally passed down by oral tradition, and also because the Aztecs adopted and modified gods and myths from other tribes that they met and conquered. According to the Aztec creation myth, the world of the Aztecs at the time of the Spanish colonization was the fifth era of a cycle of creation and destruction. They believed their world had been created and destroyed four times before. During each of the four previous cycles, different gods first governed the earth through a dominant element and then destroyed it. These worlds were called suns. During the 16th century- and the period in which we still live today- the Aztecs believed that they were living in the fifth sun, and it would also end in violence at the end of the calendrical cycle. In the Beginning In the beginning, according to Aztec mythology, the creator couple Tonacacihuatl and Tonacateuctli (also known as the god Ometeotl, who was both male and female) gave birth to four sons, the Tezcatlipocas of the East, North, South, and West. After 600 years, the sons began to create the universe, including the creation of cosmic time, called suns. These gods eventually created the world and all the other deities. After the world was created, the gods gave light to humans, but to do this, one of the gods had to sacrifice himself by leaping into a fire. Each subsequent sun was created by the personal sacrifice of at least one of the gods, and a key element of the story, like that of all Aztec culture, is that sacrifice is required to begin renewal. Four Cycles The first god to sacrifice himself was Tezcatlipoca, who leaped into the fire and started the First Sun, called 4 Tiger. This period was inhabited by giants who ate only acorns, and it came to an end when the giants were devoured by jaguars. The world lasted 676 years, or 13 52-year cycles according to the pan-Mesoamerican calendar.The Second Sun, or 4-Wind sun, was governed by Quetzalcoatl (also known as the White Tezcatlipoca), and the earth was populated by humans who ate only pià ±on nuts. Tezcatlipoca wanted to be Sun, and turned himself into a tiger and threw Quetzalcoatl off his throne. This world came to an end through catastrophic hurricanes and floods. The few survivors fled to the top of the trees and were transformed into monkeys. This world also lasted 676 years.The Third Sun, or 4-Rain Sun, was dominated by water: its ruling deity was the rain god Tlaloc and its people ate seeds that grew in the water. This world came to an end when the god Quetzalcoatl made it rain fi re and ashes. The survivors became turkeys, butterflies or dogs. Turkeys are called pipil-pipil in the Aztec language, meaning child or prince. This world ended in 7 cycles or 364 years. The Fourth Sun, the 4-Water sun, was governed by the goddess Chalchiuthlicue, sister and wife of Tlaloc. The people ate maize. A great flood marked the end of this world, and all the people were transformed into fish. The 4 Water Sun lasted for 676 years. Creating the Fifth Sun At the end of the fourth sun, the gods gathered at Teotihuacan to decide who had to sacrifice him/herself for the new world to begin. The god Huehuetà ©otl, the old fire god, started a sacrificial bonfire, but none of the most important gods wanted to jump into the flames. The rich and proud god Tecuciztecatl Lord of the Snails hesitated and during that hesitation, the humble and poor Nanahuatzin the Pimply or Scabby One leaped into the flames and became the new sun. Tecuciztecatl jumped in after him and became a second sun. The gods realized that two suns would overwhelm the world, so they threw a rabbit at Tecuciztecal, and it became the moon- that is why you can still see the rabbit in the moon today. The two celestial bodies were set in motion by Ehecatl, the god of the wind, who fiercely and violently blew the sun into motion. The Fifth Sun The Fifth Sun (called 4-Movement) is ruled by Tonatiuh, the sun god. This fifth sun is characterized by the sign Ollin, which means movement. According to Aztec beliefs, this indicated that this world would come to an end through earthquakes, and all the people will be eaten by sky monsters. The Aztecs considered themselves â€Å"the People of the Sun† and therefore their duty was to nourish the Sun god through blood offerings and sacrifices. Failure to do this would cause the end of their world and the disappearance of the sun from the sky. A version of this myth is recorded on the famous Aztec Calendar Stone, a colossal stone sculpture whose images referred to one version of this creation tale linked to Aztec history. The New Fire Ceremony At the end of each 52-year cycle, the Aztec priests carried out the New Fire ceremony, or binding of the years. The myth of the Five Suns predicted the end of a calendar cycle, but it was not known which cycle would be the last one. The Aztec people would clean their houses, discarding all household idols, cooking pots, clothing, and mats. During the last five days, fires were extinguished, and the people climbed on their roofs to await the fate of the world. On the last day of the calendar cycle, the priests would climb the Star Mountain, today known in Spanish as Cerro de la Estrella, and watch the rise of the Pleiades to ensure it followed its normal path. A fire drill was placed on the heart of a sacrificial victim: if the fire could not be lit, the myth said, the sun would be destroyed forever. The successful fire was then brought to Tenochtitlan to relight hearths throughout the city. According to the Spanish chronicler Bernardo Sahagun, the New Fire ceremony was conducted every 52 years in villages throughout the Aztec world. Updated by K. Kris Hirst Sources: Adams REW. 1991. Prehistoric Mesoamerica. Third Edition. Norman: University of Oklahoma Press.Berdan FF. 2014. Aztec Archaeology and Ethnohistory. New York: Cambridge University Press.Read KA. 1986. The Fleeting Moment: Cosmogony, Eschatology, and Ethics in Aztec Religion and Society. The Journal of Religious Ethics 14(1):113-138.Smith ME. 2013. The Aztecs. Oxford: Wiley-Blackwell.Taube KA. 1993. Aztec and Maya Myths. Fourth Edition. Austin: University of Texas Press.Van Tuerenhout DR. 2005. The Aztecs. New Perspectives. Santa Barbara, California: ABC-CLIO Inc.

Saturday, November 23, 2019

Major General John B. Gordon, American Civil War

Major General John B. Gordon, American Civil War The son of a prominent minister in Upson County, GA, John Brown Gordon was born February 6, 1832. At a young age, he moved with his family to Walker County where his father had purchased a coal mine. Educated locally, he later attended the University of Georgia. Though a strong student, Gordon inexplicably left school before graduating. Moving to Atlanta, he read law and entered the bar in 1854. While in the city, he married Rebecca Haralson, daughter of Congressman Hugh A. Haralson. Unable to attract clients in Atlanta, Gordon moved north to oversee his fathers mining interests. He was in this position when the Civil War began in April 1861. Early Career A supporter of the Confederate cause, Gordon quickly raised a company of mountaineers known as the Raccoon Roughs. In May 1861, this company was incorporated into the 6th Alabama Infantry Regiment with Gordon as its captain. Though lacking any formal military training, Gordon was promoted to major a short time later. Initially sent to Corinth, MS, the regiment was later ordered to Virginia. While on the field for the First Battle of Bull Run that July, it saw little action. Showing himself to be an able officer, Gordon was given command of the regiment in April 1862 and promoted to colonel. This coincided with a shift south to oppose Major General George B. McClellans Peninsula Campaign. The following month, he ably led the regiment during the Battle of Seven Pines outside Richmond, VA. In late June, Gordon returned to combat as General Robert E. Lee began the Seven Days Battles. Striking at Union forces, Gordon quickly established a reputation for fearlessness in battle. On July 1, a Union bullet wounded him in the head during the Battle of Malvern Hill. Recovering, he rejoined the army in time for the Maryland Campaign that September. Serving in Brigadier General Robert Rodes brigade, Gordon aided in holding a key sunken road (Bloody Lane) during the Battle of Antietam on September 17. In the course of the fighting, he was wounded five times. Finally brought down by a bullet that passed through his left cheek and out his jaw, he collapsed with his face in his cap. Gordon later related that he would have drowned in his own blood had there not been a bullet hole in his hat. A Rising Star For his performance, Gordon was promoted to brigadier general in November 1862 and, following his recovery, given command of a brigade in Major General Jubal Earlys division in Lieutenant General Thomas Stonewall Jacksons Second Corps. In this role, he saw action near Fredericksburg and Salem Church during the Battle of Chancellorsville in May 1863. With Jacksons death following the Confederate victory, command of his corps passed to Lieutenant General Richard Ewell. Spearheading Lees subsequent advance north into Pennsylvania, Gordons brigade reached the Susquehanna River at Wrightsville on June 28. Here they were prevented from crossing the river by Pennsylvania militia which burned the towns railroad bridge. Gordons advance to Wrightsville marked the easternmost penetration of Pennsylvania during the campaign. With his army strung out, Lee ordered his men to concentrate at Cashtown, PA. As this movement was in progress, fighting began at Gettysburg between troops led by Lieutenant General A.P. Hill and Union cavalry under Brigadier General John Buford. As the battle grew in size, Gordon, and the rest of Earlys Division approached Gettysburg from the north. Deploying for battle on July 1, his brigade attacked and routed Brigadier General Francis Barlows division on Blochers Knoll. The next day, Gordons brigade supported an attack against the Union position on East Cemetery Hill but did not take part in the fighting. The Overland Campaign Following the Confederate defeat at Gettysburg, Gordons brigade retired south with the army. That fall, he participated in the inconclusive Bristoe and Mine Run Campaigns. With the beginning of Lieutenant General Ulysses S. Grants Overland Campaign in May 1864, Gordons brigade took part in the Battle of the Wilderness. In the course of the fighting, his men pushed the enemy back at Saunders Field as well as launched a successful attack on the Union right. Recognizing Gordons skill, Lee elevated him to lead Earlys division as part of a larger reorganization of the army. Fighting recommenced a few days later at the Battle of Spotsylvania Court House. On May 12, Union forces launched a massive assault on the Mule Shoe Salient. With Union forces overwhelming the Confederate defenders, Gordon rushed his men forward in an attempt to restore the situation and stabilize the lines. As the battle raged, he ordered Lee to the rear as the iconic Confederate leader attempted to personally lead an attack forward. For his efforts, Gordon was promoted to major general on May 14. As Union forces continued to push south, Gordon led his men at the Battle of Cold Harbor in early June. After inflicting a bloody defeat on the Union troops, Lee instructed Early, now leading the Second Corps, to take his men to the Shenandoah Valley in an effort to draw off some Union forces. Marching with Early, Gordon took part the advance down the Valley and the victory at the Battle of Monocacy in Maryland. After menacing Washington, DC and forcing Grant to detach forces to counter his operations, Early withdrew to the Valley where he won the Second Battle of Kernstown in late July. Tired of Earlys depredations, Grant sent Major General Philip Sheridan to the Valley with a large force. Attacking up (south) the Valley, Sheridan clashed with Early and Gordon at Winchester on September 19 and soundly defeated the Confederates. Retreating south, the Confederates were defeated again two days later at Fishers Hill. Attempting to recover the situation, Early and Gordon launched a surprise attack on Union forces at Cedar Creek on October 19. Despite initial success, they were badly defeated when Union forces rallied. Rejoining Lee at the Siege of Petersburg, Gordon was placed in command of the remnants of the Second Corps in December 20. Final Actions As the winter progressed, the Confederate position at Petersburg became desperate as Union strength continued to grow. Needing to force Grant to contract his lines and wanting to disrupt a potential Union assault, Lee asked Gordon to plan an attack on the enemys position. Staging from Colquitts Salient, Gordon intended to assault Fort Stedman with the goal of driving east towards the Union supply base at City Point. Moving forward at 4:15 AM on March 25, 1865, his troops were able to quickly take the fort and open a 1,000-foot breach in the Union lines. Despite this initial success, Union reinforcements quickly sealed the breach and by 7:30 AM Gordons attack had been contained. Counterattacking, Union troops forced Gordon to fall back to the Confederate lines. With the Confederate defeat at Five Forks on April 1, Lees position at Petersburg became untenable. Coming under attack from Grant on April 2, Confederate troops began retreating west with Gordons corps acting as a rearguard. On April 6, Gordons corps was part of a Confederate force that was defeated at the Battle of Saylers Creek. Retreating further, his men ultimately arrived at Appomattox. On the morning of April 9, Lee, hoping to reach Lynchburg, asked Gordon to clear Union forces from their line of advance. Attacking, Gordons men pushed back the first Union troops they encountered but were halted by the arrival of two enemy corps. With his men outnumbered and spent, he requested reinforcements from Lee. Lacking additional men, Lee concluded that he had no choice but to surrender. The afternoon, he met with Grant and surrendered the Army of Northern Virginia. Later Life Returning to Georgia after the war, Gordon unsuccessfully campaigned for governor in 1868 on a staunch anti-Reconstruction platform. Defeated, he achieved public office in 1872 when he was elected to the US Senate. Over the next fifteen years, Gordon served two stints in the Senate as well as a term as Governor of Georgia. In 1890, he became the first Commander-in-Chief of the United Confederate Veterans and later published his memoirs, Reminiscences of the Civil War in 1903. Gordon died at Miami, FL on January 9, 1904, and was buried at Oakland Cemetery in Atlanta. Selected Sources Civil War: John B. GordonNew Georgia Encyclopedia: John B. GordonCivil War Trust: John B. Gordon

Thursday, November 21, 2019

Discussion 9 Assignment Example | Topics and Well Written Essays - 250 words

Discussion 9 - Assignment Example I absolutely agree with the facts and the study of this article because small and medium enterprises need to breakthrough to the bigger circle of business so that they can compete at a bigger level. Competition at a global level is going to benefit the customer. It keeps the companies on edge to deliver the best quality at the ideal price. If small and medium enterprises also adhere to the same principles where only 3.4 defects in every million possible defects shows the capability of six Sigma processes (Raghunath & Jayathirta 1), then it is only going to serve the society at a larger scale. It is not only going to help improve the quality of products in small and medium industries but it will also help modify the culture (Raghunath & Jayathirta 2). It is not about statistics, the process is based on scientific methodology that utilizes statistical thinking. By improving the quality through six Sigma methodologies that customers will benefit from the delivery of products and service s. Increasing competition decreases profit margins and that helps promote the SMEs. But they will need competent leadership management to effectively implement Six Sigma methodologies (Raghunath & Jayathirta 6). As a customer I want to see Six Sigma strategy implemented in SMEs. Ragunath, A. & Jayathirta, R. V. Barriers for implementation of Six Sigma by Small and Medium Enterprises. International Journal of Advancements in Research & Technology. Vol. 2(2).

Tuesday, November 19, 2019

MARKETING PLAN FOR PGI COMPANY Essay Example | Topics and Well Written Essays - 5500 words

MARKETING PLAN FOR PGI COMPANY - Essay Example Number of words 1482 (excluding appendices/bibliographies and tables) Contents EXECUTIVE SUMMARY 4 INTERVIEW AND ANSWERS 5 INTERVIEW SUMMARY 12 DEMOGRAPHIC SEGMENTATION 13 GENDER SEGMENTATION 13 AGE SEGMENTATION 14 BEHAVIORAL SEGMENTATION 15 BEHAVIORAL SEGMENTATION SUMMARY 16 MARKETING MIX 16 CUSTOMER AUDIT 18 OPPORTUNITIES AND THREATS 18 INTERNAL AUDIT 19 STRENGTHS AND WEAKNESSES 19 MACRO ECONOMIC AUDIT 20 MACRO ECONOMIC SUMMARY 21 MICRO ENVIRONMENT AUDIT 21 MICRO ENVIRONMENT AUDIT SUMMARY 22 MISSION 23 EXTERNAL FACTOR (EXTERNAL AUDIT) 23 INTERNAL FACTOR (INTERNAL AUDIT) 23 COMPETITOR AUDIT 24 COMPETITOR AUDIT SUMMARY 24 SWOT ANALYSIS 24 TOWS ANALYSIS 26 MARKETING OBJECTIVES 27 STRATEGY THRUST 27 ANSOFF MATRIX 27 STRATEGIC OBJECTIVE 28 STRATEGIC OBJECTIVE SUMMARY 29 CORE STRATEGY 29 CORE STRATEGY SUMMARY 30 MARKETING MIX DECISION 30 MARKETING PLAN CONTROL 31 CONTROL 31 CONTIGENCY PLAN 32 PGI MARKETING PLAN EXECUTIVE SUMMARY PGI is an insurance broker that specializes in motor vehicl e insurance only. The company is now considering expanding its offerings by introducing a general household insurance policy to existing customers. The company has established links with affinity groups such as trade unions which give it access to more than 5 million customers. The target market consists of homeowners across all gender and age segments. The primary needs of the market are price, service and information. This report analyzes the industry and the competitive position of PGI within the industry to recommend a price skimming marketing strategy. INTERVIEW AND ANSWERS Stage 1: Cut and Paste Questions Interviewee 1 Male 46yrs Interviewee 2 Female 56yrs Interviewee 3 Male 25yrs Interviewee 4 Female 23yrs Interviewee 5 Male 61yrs Interviewee 6 Female 43yrs Interviewee 7 Female 63yrs Interviewee 8 Male 48yrs Q1 Would you be prepared to buy a household contents policy from a group which you are a member of? Yes I already get my car insurance from my Trade Union so why not my c ontents policy No I get my contents insurance from my mortgage lender, I thought I had to as they gave me the money. Yes why not, so long as they are competitively priced. Well currently I get my contents insurance from the web, the site searches 20 insurance companies for the best deal. I do have to input my requirements though. So if my staff association had a similar arrangement then I would think about it. Yes from my union but I can’t see it from the Train spotting club. What about when I retire though? No, I like to buy insurance from people who know about insurance, I mean does my trade union know anything about insurance? I don’t think so! Yes from my union but really I use my local insurance broker –they take all the hassle out of buying. What about when I retire though? Yes, why not if they can get me a good deal –must be able to get a bulk discount, I mean my trade union has over 1 million members now. Q2 What would you expect to find in a hous ehold contents policy? Well the contents of my house insured of course! But I would want my portable belongings insured outside of the house in case I lose them or had them stolen, I’d like the kids belongings insured too, especially the eldest while he is at university. I don’t know, how about the obvious, like my contents insured against lose due to fire, accidental damage, theft etc. Oh and outside the house as well. Well, accidental loss cover, the usual fire and theft that’s about it. Just fire and theft mainly. Just like the basic cover. Don’t want to spend too much money. The usual fire, theft, accidental damage, legal expenses insurance and all those telephone help lines –you know the repair, tradesman-sourcing etc. Oh just everything covered really,

Sunday, November 17, 2019

Dr Jekyll and Mr Hyde coursework Essay Example for Free

Dr Jekyll and Mr Hyde coursework Essay Dr Jekyll and Mr Hyde has appealed to a wide audience from the first time it was published in 1886 to the present day. What do you think are the reasons for this? The story of Dr Jekyll and Mr Hyde was first published in a time when classes separated the rich and the poor. These classes never mixed and never talked. The poor classes lived on one side of London and the rich classes lived on the other. The rich would of never had been thought about the poor because there was very few means of learning. Before the story of Dr Jekell and Mr Hyde the two classes would have read different books but when the book was published it had elements that appealed to both classes. The genre of the book is gothic horror and fiction. The elements of gothic in it are the horror, super natural and the mystery. It also has a dark and very gloomy setting and it talks about the smog lying very low on the floor. For a moment, the fog would be quite broken up, and a haggered shaft of daylight would glance in between the swirling wreaths. This is gothic because it is quite mysterious and spooky. This could appeal to many people because this is like real life with the smog coming under the door. People could relate to this. It always has a dark and gloomy character in it to. In this case its Mr Hyde. This dark and gloomy character first appears in the beginning of the novel were he tramples the little girl. and then the horrible part of the thing; for the man trampled calmly over the chills body and left her screaming on the ground This would have shocked many people at the thought of this tragedy. I think this is such a popular genre because it gives people the fear without actually getting hurt. This would have been the only type of scary entertainment that they had. Readers would have loved the thrill that it gave them. Mr Enfield witnessed the attack and was horrified when discussing it with a friend as they walked through the park. It sound nothing to hear, but it was hellish to see I think that this is a really important part to the story. There were many stories with death and murder in them but this book was particularly unusual. The castle of otranto was the first gothic novel and laid the foundations for future novels such as Frankenstein and Jekell and Hyde. During the 1800s people technology was not as well advanced as it is today so Dr Jekell would not of understood the changes completely. When Mr Jekell takes the potion and begins to transform but he doesnt know that this could change his life forever and eventually led him to death. Hydes house is in the Soho area, which in the 1800s would have been the poorest area in London. The description of the house sound very dark, gloomy, and depressing. This is the kind of area and house that you would expect a murder to come from. On the other hand the other side of London would have been the area were the richest people would have lived. These were well-respected people and these were the people everyone wanted to be. During this time there was a serial killer on the lose Jack the ripper. His first Victims started with prostitutes and eventually moved on the people with little money and no family. He was never caught although there was p pattern to every murder he committed. To many people Jack the ripper was life imitating fiction because the things that he did and the circumstances that he did them in sounded just like a story or a novel. People also thought that that Jack would of got his ideas from the story Jekell and Hyde. This Novel uses suspension and tension all the way through the book. We often have to play a detective in this story and all the way through we are given pieces to fit together. At the end all revels itself and the mystery is solved. In my conclusion Dr Jekyll and Mr Hyde was a very enjoyable read. It was also very interesting because it gave an image of what the life was like in the 1800s. I never realised that Victorian life was so hard. Still today I think that many people enjoy the story of Dr Jekyll and Mr Hyde. I think this is because it is a very unusual book and appeals to a wide audience rather than just one type of person. This could be one of the reasons why it is so popular. This book has been around for almost a 100 years and I think that it has got many more enjoyable years to go.

Thursday, November 14, 2019

Oliver North :: essays research papers

	In October and November 1986, two secret illegal U.S. Government operations were publicly exposed. In addition to naming other people as illegal operatives, the scapegoat of it all was Lieutenant Colonel Oliver L. North. Only months before he was being heraled in the New York Times as "President Reagan's Man of Action", and now North was being handed the blame of all guilty of illegally negotiating deals with Iran and Nicaragua. As the Iran-Contra Scandal was led into the national spotlight, so was Oliver North. But while in that spotlight, North pleaded the Fifth Amendment, the right to not incriminate yourself. With doing so, he also saved the reputations of many who turned their backs on him. For this and many other achievements, Lt. Col. Oliver L. North is an American hero. 	Oliver L. North was born in San Antonio, Texas. His age and date of birth are being withheld due to security reasons. He attended school in Philmont, New York and later enrolled into the United Sates Naval Academy in Annapolis, Maryland. As graduation neared, North chose the path of being a Marine Corps leader. He was later called into duty in Vietnam, where he was station with K Company of the Third Battalion, Third Marine Regiment, Third Division from December 3, 1968 to August 21, 1969. During his service, North led many covert operations, and was awarded a Silver Star, a Bronze Star, and two Purple Hearts. He was a "marine's marine", and was a one-of-a-kind leader. 	While in Vietnam, he was assigned to counterinsurgency operations in which he met General Singlaub and General Secord, then lieutenant colonels. After coming back from Vietnam, he served as a planner in the Marine Corps headquarters in Washington, D.C. After being promoted to Major in the Marine Corps, North led a detachment of Marines who were to assist the rescuers of the aborted mission to free U.S. hostages in Tehran. A little more than a year later, while North was studying at the Naval War College in Providence, he came to befriend Navy Secretary John Lehman. Lehman helped North get a spot on the National Security Council. Among several military officers sent to the National Security Council, North was the youngest. He was described as a "bright articulate officer with a gung ho spirit who saw the world in sharply etched blacks and whites." His role was to draw up plans, to get them approved, and to see that they are carried out. Oliver North :: essays research papers 	In October and November 1986, two secret illegal U.S. Government operations were publicly exposed. In addition to naming other people as illegal operatives, the scapegoat of it all was Lieutenant Colonel Oliver L. North. Only months before he was being heraled in the New York Times as "President Reagan's Man of Action", and now North was being handed the blame of all guilty of illegally negotiating deals with Iran and Nicaragua. As the Iran-Contra Scandal was led into the national spotlight, so was Oliver North. But while in that spotlight, North pleaded the Fifth Amendment, the right to not incriminate yourself. With doing so, he also saved the reputations of many who turned their backs on him. For this and many other achievements, Lt. Col. Oliver L. North is an American hero. 	Oliver L. North was born in San Antonio, Texas. His age and date of birth are being withheld due to security reasons. He attended school in Philmont, New York and later enrolled into the United Sates Naval Academy in Annapolis, Maryland. As graduation neared, North chose the path of being a Marine Corps leader. He was later called into duty in Vietnam, where he was station with K Company of the Third Battalion, Third Marine Regiment, Third Division from December 3, 1968 to August 21, 1969. During his service, North led many covert operations, and was awarded a Silver Star, a Bronze Star, and two Purple Hearts. He was a "marine's marine", and was a one-of-a-kind leader. 	While in Vietnam, he was assigned to counterinsurgency operations in which he met General Singlaub and General Secord, then lieutenant colonels. After coming back from Vietnam, he served as a planner in the Marine Corps headquarters in Washington, D.C. After being promoted to Major in the Marine Corps, North led a detachment of Marines who were to assist the rescuers of the aborted mission to free U.S. hostages in Tehran. A little more than a year later, while North was studying at the Naval War College in Providence, he came to befriend Navy Secretary John Lehman. Lehman helped North get a spot on the National Security Council. Among several military officers sent to the National Security Council, North was the youngest. He was described as a "bright articulate officer with a gung ho spirit who saw the world in sharply etched blacks and whites." His role was to draw up plans, to get them approved, and to see that they are carried out.

Tuesday, November 12, 2019

Meaning of a word Essay

â€Å"Language is the subject. It is the written form with which I’ve managed to keep the wolf from the door, and in diaries, my sanity. In spite of this, I consider the written word inferior to the spoken, and much of the frustration experienced by novelists is the awareness that whatever we manage to capture in even the most transcendent passages falls far short of the richness of life. Dialogue achieves its power in the dynamics of a fleeting moment of sight, sound, smell and touch.† -excerpt taken from Gloria Naylor’s ‘The Meanings of a Word’. Words The first sentence of this excerpt can have several interpretations, depending on which synonym of the word ‘language’ you choose to use. It could be her theme, her topic, her focus, the area that is under discussion. Language, for her, is the subject, the one she has used to support herself, the form she has employed to preserve her sanity. In the first part of her third sentence, Naylor states that she considers the written word inferior to the spoken in spite of her second sentence; it is second rate, of lesser importance than the words actually verbalized. For her, written words do not hold as much power as those that are spoken; she, and novelists like her, are aware that even the most descriptive and moving of passages do not fully capture a ‘fleeting moment of sight, sound, smell and touch’ the way dialogue does. Naylor is of the opinion that one simple gesture, scene, scent or sound achieves what a thousand words describing them cannot, and this is frustrating to her, hence, her statement, ‘†¦I consider the written word inferior to the spoken’. I disagree with this idea and argue that the written word is superior to the spoken. There is a phrase that says that ‘the pen is mightier than the sword’. Taken in literal terms, this phrase is a physical impossibility. Obviously, he who wields the bigger, stronger sword would triumph over he who brings a flimsy pen to the fight, unless by some slim chance it was some sort of new,  unbreakable pen. What, then, is the meaning of this saying? The answer lies not in comparing the physical appearances of these two objects, but in considering what they can do. A sword, when used by a master of the blade, can kill maybe a dozen people. A pen can kill millions. It can condemn entire cities to death. In 1945, documents authorizing the use of the atomic bomb on Japan did just that; with the signatures of the cabinet and the President of the United States, Hiroshima and Nagasaki’s fates were sealed. Consider also, that while a sword may be used to threaten a village or two, using a pen can set entire countries free, and decide the future of generations to come. The independence of British colonies, such as Zambia in 1964, was finalized by a stroke of a pen at the bottom of the declaration. Think about it and you realize something: it’s not the pen that’s mightier than the sword. It is merely an instrument that is used to achieve an end. It is the words that are written using the pen which hold the power; it is the words on that document or bill or law or article that are mightier than the sword. â€Å"I was jarred and shocked by the style, the clear, clean, sweeping sentences. Why did he write like that? And how did one write like that? I pictured the man as a raging demon, slashing with his pen, consumed with hate†¦I stood up trying to realize what reality lay behind the meaning of his words†¦this man was fighting, fighting with words†¦using words as a weapon, using them as one would use a club. Could words be weapons? Well, yes, for here they were.† -excerpt taken from Richard Wright’s ‘The Library card’ The above excerpt comes from a point in Wright’s ‘The Library Card’ where the main character reacts strongly to a book he has just read. It is clear that the direct, cutting style of writing has affected him, and he hungers to know why and how someone could write like that. This leads him to pondering the hidden meaning behind the words, and the style of writing is such that he likens the author of the book to a demon, ‘slashing with his pen’. In fact, he comes to the conclusion that words can be used as weapons and this  supports the argument that written word is superior to the spoken. Like Mencken in ‘The Library Card’, we can use written words in the same way. They can be used to challenge set ways of thinking and attack prejudices and injustices without the violence of a war or the pettiness of a verbal argument. Using written words, arguments become free of emotional entanglements and are reduced to their simplest, most direct for ms. The spoken words that Naylor prefers would not be able to attain the same effect that a signed document would. A verbal agreement about an important matter, such as Independence of a country, would never hold up to the scrutiny of a legal proceeding. It would be far too easy for either party to change the wording of their verbal agreement ever so slightly to tip the scales in their favor or change the words all together, and in doing so, change the terms completely. There would be no way to prove that the agreement even took place. The spoken word or word of mouth is an unreliable way to learn about historical events. Stories that are passed down from generation to generation stand a high risk of being distorted over time, and with so many storytellers, the original version will be lost within three or four generations. This is another way that the written word is superior to the spoken; written documentation ensures that the facts and details will always be there when we need them, exact and unchanged. With so many variations and dialects of the English Language, it is almost impossible to find a daily word that was not been abbreviated or corrupted into slang. If it is not one or the other, then the context it is used in gives it a completely different meaning anyway. Take the word ‘nigger’ for example. Naylor shows us that depending on the words it is used with in speech, the word takes on multiple implications, thus increasing the chance of mistaking its meaning. Written words are clear cut, especially if written clearly, correctly and succinctly. Words hold power over us all. While the spoken form does hold sway over every living being, words used in speech are like the beginnings of a thought and  it is the written form that ultimately completes the idea.

Saturday, November 9, 2019

Police Department Organization Essay

There are three different types of police departments they individually have their own jurisdictions nonetheless their structure is very similar. For bigger departments the structure is going to be more in depth mainly because of all the moving parts in its system. For those smaller departments it will be smaller due to fewer personnel on shift and tasks at hand. In the Unites States we have three different types of police departments local, state, and federal. In this paper you will find a brief description of all three. In the city of El Centro California we have a smaller department due to the population here in El Centro. El Centro Police Department was established in 1908 it involves 58 sworn officers and 26 civilian employees. The structure is made up of the Police Chief, Commanders, Lieutenants, Sergeants, field officers, and civilian employees. This department comprises of three sub-divisions patrol, traffic, and Crisis Response Unit. Patrol is in charge of patrolling the city and making police presence known. Traffic division handles city traffic and makes sure that residents and visitors alike are respecting all speed limits and traffic signals. Crisis Response Unit is a specialized unit that has been established to handle critical field operations. It manages sensitive calls such as those where negotiations are needed; it is also capable of deploying specialized units where highly trained officers are need. Investigations Division accounts for two sergeants, seven detectives, one community service officer, and a secretary. Four of the seven detectives are assigned to handle multi-jurisdictional narcotics enforcement and one detective is allocated to juvenile crimes. Evidence and property is controlled by the community service officer. The person responsible for the Investigation Divisions smooth operations is the division secretary. The Chief, Executive Commander, and Staff assistant lead the Administration Division. Police Chief Jim McGinley is the current chief for El Centro police department. Chief McGinley has 32 years of law enforcement practice; previously he served as Commanding Officer for San Diego Police Department. Prior to retirement in 2005 Chief McGinley headed the Investigations Divisions 2. Chief McGinley was in charge of elder abuse, auto theft, financial crimes, robbery, gangs, and homicide. California Highway Patrol was formed August 14, 1929. It consists of eight different divisions throughout California. Their structure is very similar to a military unit. At the top of its structure is the Commissioner which has the following offices under it Office of Special Representative, Office of Inspector General, and Office of Employee Relations. Deputy Commissioner follows with the Office of legal affairs, Medical Relations, and Equal Employment Opportunity. After that the structure branches of into two different components one being administrative and the other being the officers on the beat. Assistant Commissioner Staff has several departments like Administrative Service Division, Information management, Enforcement & Planning, Office of the Academy, Internal Affairs, Office of Employee Assistance & safety, and the Office of Organization Development. Assistant Commissioner Field is the other branch that I mentioned. This office also has various divisions and offices like Protective Service Division, Office of Air Operations, State Security Division, and all of it different patrol divisions in the state. The state is broken down into eight different divisions I will name them form southern California to northern California; Border Division, Southern Division, Inland Division, Central Division, Costal Division, Valley Division, Golden gate Division, and Northern Division. California Highway Patrol has two main missions the primary one is to make sure that all traffic and transportation along freeways and state routes. CHP officer still maintain police authority out of state route and freeways. CHP’s secondary mission is to aid and assist to any emergencies that exceed local capabilities. A federal police agency is the Drug Enforcement Administration (DEA) and it was founded in July 1973 formed by President Richard Nixon. He established this agency to combat the war on drugs and not only nationwide but worldwide as well. According to the Drug Enforcement Administration web page the DEA has nearly 5,000 Special Agents and a budget of $2.02 billion. The Administrations structure is very complex and consists of many different divisions. At the top of its enormous structure it has its Administrator and Deputy Administrator followed by five different branches forming the top of this structure. It has Executive Equal Opportunity & Employee Assistant Staff (ADE), Executive Policy & Strategic Planning Staff (ADS), Office of Administrative Law Judges (LJ), Office of Chief Council, and Office of Congressional & public Affairs. Drug Enforcement Administration has many other divisions and departments that they account for a whole thirty one of them to be exact with the last one being field operations. DEA has a much larger structure mainly because it not only fights the war on drugs and terrorism in the United States but it also must do it worldwide. References www.chp.ca.gov www.cityofelcentro.org/police/ www.justice.gov/dea

Thursday, November 7, 2019

Essay Leighton Holdings Entry to China

Essay Leighton Holdings Entry to China Essay Leighton Holdings Entry to China Table of Contents 1. Executive Summary 2 2. Introduction 3 3. Background 4 3.1 Environmental Sustainability 4 3.2 Competitiveness of Chinese construction industry 5 3.3 Relationship-Based Business Culture 5 3.4 Insufficient Law and Regulation 6 4. Discussion of the Issues 7 4.1 Chinese Cultures 7 4.2 Cultural Impacts 8 4.3 Sustainable Development 8 5.0 Conclusion and Recommendations 9 6.0 Reference 11 1. Executive Summary It is in the best interest for Leighton Holdings to understand the Chinese cultures to avoid missing any business opportunities in China. In the recent years, the construction industry has been playing a leading role in the Chinese rapid economic development. The increase in economic activity has resulted in a heavy demand for construction, providing Leighton Holdings a good opportunity to expand its construction business in China. However, China’s incomplete regulatory system, cultural differences, as well as a relationship-based business culture were among the factors identified as making China a challenging project environment. This is due to the national culture of Confucius, which affects the way the Chinese people doing business. Some of the salient principles of Confucius are highlighted below: * Submitting to authority; * Respecting the concept of â€Å"big family† * â€Å"middle way† to preserve harmony in one community; and * Maintaining harmonious relationships with neighbours. Based on the identified issues, some recommendations are provided for Leighton Holdings to expand its business in China: * Make the right connections in China and hold implementation plan workshops and follow-up sessions with Chinese team members to establish and maintain trust and respect at the start of the project; * Develop a clear and appropriate plan and well defined a project’s scope and design before agreements or contracts are signed to avoid cultural misunderstanding or future disputes; * Employ people who have educational and working experience in both Australia and China to be the communication channel; * Establish price competitiveness by sourcing environmental-friendly resources globally to meet the Chinese demand for sustainable construction; * Cooperate with international association such as World Trade Organization and Asia Pacific Economic Cooperation to lobby the Chinese government for policy changes and to call for the transparency during the bidding proces s. 2. Introduction Leighton Holdings is one of Australian’s largest construction firms and one of the world’s largest contract mining companies. It operates with a number of subsidiaries in Australia including Thiess, John Holland Group and Leighton International, providing a wide range of construction operations in heavy industry, engineering and commercial construction (IBISWorld, 2013). With the goal of being renowned for excellence across the construction, mining, and operations and maintenance markets, Leighton Holdings is committed to the achievement of high quality standards, and strives for integrating environmental, social and governance factors into decision making to create short and long term shareholder value, pursuing sustainability of its business (Leighton Holdings, 2013 a; Leighton Holdings, 2013 c; Leighton Holdings, 2013 d). In recent years, the rapid increase of the world’s population, in addition to the expansion in global economic activity and falling trade barriers, has led to massive increases in demand for construction around the world, especially in Asia where large amounts of social commercial infrastructure are being developed (Ochieng, Price Moore, 2013). According to the Global Construction Report (2011), China surpassed Japan as the world’s largest construction market in 2003, and it will overtake the US as the world’s largest construction sector in 2018. These indicate a great opportunity for Leighton Holdings to export its construction

Tuesday, November 5, 2019

3 Reasons to Ditch Your Novels Prologue

3 Reasons to Ditch Your Novels Prologue 3 Reasons to Ditch Your Novels Prologue 3 Reasons to Ditch Your Novels Prologue By Maeve Maddox The prologue is a legitimate story-telling device, but many readers admit that when they see the word Prologue, they skip at once to the page that begins with the words Chapter One. Sometimes a prologue is the ideal way to present information essential to the readers understanding of the story. Mystery writers, for example, often begin with a prologue written from the killers point of view, or perhaps that of the killers first victim. On the other hand, such a scene can be written as Chapter One as Martha Grimes does it in The Dirty Duck. Writers of historical fiction may wish to provide background information to orient the reader in an unfamiliar period. Writers of fantasy or sci-fi may write a prologue to equip the reader with unfamiliar assumptions held by the inhabitants of the strange world theyre about to enter. Too often, however, what some writers call a prologue is undigested back story, mere scene-setting, or what should be Chapter One. Ditch your prologue if 1. it seems boring even to you and you can hardly wait to get to Chapter One. 2. its a lengthy narrative of back story that could more effectively be doled out in small bits as the story progresses. 3. all it does is create atmosphere without having much to do with the story. Reconsider that Prologue (Update: link no longer active) Prologues and Epilogues Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Fiction Writing category, check our popular posts, or choose a related post below:7 Types of Narrative ConflictThe Writing Process3 Types of Essays Are Models for Professional Writing Forms

Sunday, November 3, 2019

Ethics Essay Example | Topics and Well Written Essays - 500 words - 44

Ethics - Essay Example The objective of this paper is therefore, to identify examples of dubious activities which are involved in this movie. The first ambiguous activities in the movie, is the way most of the employees who work for the brokerage company becomes millionaires very fast. In real life situations, it takes a while for someone to become a millionaire. For example, in one of the scenes where Snarls Jin tells new recruits that the company does not hire brokers, but they train millionaires. This does not make sense because first of all, this is a brokerage firm, but one of the senior most managers tells its employees that they do not hire brokers, but train them to become millionaires. In addition its common knowledge that, every manager will always try to show new recruits, the company’s laid down rules. Therefore, the activities that the company; is involved with is ethically questionable. The moral philosophy by which the parties seemed to have relied to justify their actions is mala prohibita. This moral philosophy, describes the acts which are not morally wrong, but however, the law prohibits them (Mara and Roberts 108). The parties in the movie relied upon this philosophy to justify their actions by getting involved in dubious stock exchange in order to get rich quickly. This is because when they are caught, the law enforcers will not be able to find any evidence against them, unless they do a much thorough investigation. In addition to that, the constitution is also not very clear on what penalties someone found committing mala prohibita should be given (Mara and Roberts 109). The two alternative philosophies which could have led the parties to different results are mala in se and misdemeanor. Mala in se can be defined as those acts which are immoral and very wrong for killing someone. Misdemeanor on the other hand can be said to be those crimes which are not very serious and therefore attract less penalties (Mara and Roberts 110). In case the

Thursday, October 31, 2019

Article Rebuttal Essay Example | Topics and Well Written Essays - 500 words - 2

Article Rebuttal - Essay Example The politics of same-sex marriage is deeper than a mere proclamation. There are numerous fault lines that are built due to the cultural issues in the American politics (Rimmerman & Wilcox 2007). The gay rights law has expanded over the years increasing the members of the community to become large enough to fight for a separate seat in elections. What has really compelled opponents of the same-sex marriage is the focus that gay marriage has received in the state court through their efforts. The community has managed to sponsor its case through major litigating groups such as the â€Å"Lamdba Legal in New York, GLAD in Boston and NCLR in San Francisco†. In the absence of these national groups the ACLU Gay and Lesbian Rights project gets involved (Rimmerman & Wilcox 2007). It is for this reason that the focus on same-sex marriage has increased in the recent years. Bronner states that the opponents are frequently requested to accept the gay marriage as part of the American culture to an extent that even Presifent Obama agreed to accept the new addition in the most welcoming manner. Mr. Blankenhorn, however, is not concerned with the ethics and morality of the act itself. He believes that the same-sex marriage is the major cause in the decline in general marriage patterns in the society. He lays stress on the institution of marriage as being a healthy and significant part of the society. He is merely using the language of morality when he speaks of marriage and indirectly, despite his denial, is addressing the religious or biblical justification for going against the same-sex marriage (Bronner 2012). Mr. Blankenhorn indeed is giving the most unfortunate acceptance for the gay-marriage. But what the author seems to overlook is the fact that the situation is not as simple as it may seem to be (Bronner 2012). The whole idea of marriage has largely evolved in recent years because of the pressure that the

Tuesday, October 29, 2019

Psychoanalys Essay Example | Topics and Well Written Essays - 500 words

Psychoanalys - Essay Example Hypocrisy is the false claim to virtue. It always refers to consciously intended deception by a person in a position of trust. Making use of literary examples, the investigation starts with the delineation of three readily apparent preconditions for falling prey to hypocrisy. Idealization of the hypocrite is seen as a defense against a dread of uncertainty on the part of the person who succumbs to hypocrisy. The addition of a third precondition, the force of powerful desire, completes the introduction. A selective review of historical and philosophical studies of hypocrisy over the past twenty-five hundred years situates the problem of the susceptibility to hypocrisy. Must idealization lead to credulity I do not think so. Belief, even strong belief, need not be credulous, and idealization, though it always involves some substitution of wish for judgment, is not always used as a defense. But when idealization and belief are fueled by anxiety, independent judgment, fragile under the best of circumstances, may fail. So idealization as defense against the dread of uncertainty may be expected to create the credulity that is one precondition for successful hypocrisy. But unrelenting credulity may come about also from great desire, especially in those inclined to magical thinking and other immaturities of consideration by playwrights and philosophers, a

Sunday, October 27, 2019

Tic Tac Toe Game Computer Science Essay

Tic Tac Toe Game Computer Science Essay Most of the research nowadays is focused towards problems that deal with complexity or are influenced by some kind of random events. Interesting about these problems is that if they are deterministic, then a solution is expected to exist, at least a theoretical one. These problems are often inspired by games, such as mathematical games (ex. Tic-Tac-Toe, Chess). On the other hand the point of randomness involved in these problems increases the difficulty of prediction on the possible solution, or in some situations outcome. This is thy, there are certain methods of operations devised, that in turn give some supplementary information to a decision maker. In most of the cases, the probability distribution of an even which took place randomly, it is possible to be affected by prior events. These games are often played by at least 2 players (or many), out of which the one is called an opponent. The decisions at each step are made by the last move of the opponent. The operations research in these games is called game theory. The vital Tic-Tac-Toe game consists of two players, X and O, who take turns marking the spaces in a 3ÃÆ'-3 grid (Crowley, 1993; Gardner, 1998). The game usually begins with the X player, and the player who will manage to place three respective marks (in any direction, i.e. in a horizontal, vertical, or diagonal row) wins the game. This basic version of the game is rather simple, what allows the game to be used as a useful tool in combinatorial game theory, as well as a branch of artificial intelligence that deals with the searching of game trees (Beck, 2008). Using game theory there are few approaches that can be undertaken: The games solution is resulted by dominance when the game has only 1 rational strategy for each player Minimax strategies decide a stable solution useful if the opponent makes the wrong play Minimax strategies do not decide a stable solution using a probability distribution Even though, game theory researches are made on the possible playing strategies, they might not be employed in real life when playing a game, because: There might be too many strategies to enumerate (this number is simply too large to be estimated). Players are not always rational. There might be more than two players. Real-life games are not zero-sum games. This project deals with developing a Tic-Tac-Toe to be used on a mobile device. The following chapter discusses the Aims and Objectives of the game. Chapter 3 talks about a background research on this game, starting with a review on existing Tic-Tac-Toe games, which in turn leads to discussion about the existing models of this game and the proposed model of this work. Finally, Chapter 3 concludes with a technology research concentrated towards Java 2 Platform, Micro Edition (J2ME). Chapters 4 and 5 describe the system requirement analysis and design on this work, and chapters 6, 7, and 8 include explanation on the implementation, testing and evaluation. And finally, chapter 9 concludes this work. 2. Aim and Objectives The aim of this project is to develop a Tic-Tac-Toe game for mobile device. The game is supposed to consist of two parts, one a single player game (a player against a system), and the other a multi-player game (two players on their mobile devices, playing against each other). In order to accomplish these, the following objectives were defined. Single player game The player should play Tic-Tac-Toe game on his mobile device. The player should have option to edit his name. The player will start the game of choosing his symbol as X or O. If player 1 selected X then O has to be automatically allotted to the mobile device as a second player, and vice versa. The player has an option to choose the small game grid out of 4 small tic-tac-toe games. If player X marked horizontally or vertically or diagonally of his symbol X in a row, then player X won that small match. Finally, which player won the maximum small games will be declared as winner of the tic-tac-toe game. Multi-player game Using Bluetooth as communication channel the two players should play Tic-Tac-Toe game from different mobiles. Players should have options to edit his name. Once both players connected together, then first player will start the game of choosing his symbol as X or O. If player 1 selected X then O has to be automatically allotted to player 2. Then main game grid has to display in both mobiles. Player2 have option to choose the small game grid out of 4 small tic-tac-toe games. After grid selection both players will play tic-tac-toe game in that small grid. If player X marked horizontally or vertically or diagonally of his symbol X in a row, then player X won that small match. That small grid is marked with X and Player1 awarded 1 point, screen should zoom out and have to display whole main game grid and now player who won the previous game will have the choice to choose on which grid have to be select to play remaining game. This process will be repeated until the whole Four (4) small games grids marked with X, or O, or T. Finally which player won the maximum small games will be declared as winner of the tic-tac-toe game. then game ends. 3. Background Research In this section the Tic-Tac-Toe game will be discussed in details. At the outset, the basic rules of the game are going to be covered. Then, there will be a review on existing Tic-Tac-Toe games, which in turn will lead to discussion about the existing models of this game and the proposed model of this work. Finally, this section is going to be concluded with a technology research concentrated towards Java 2 Platform, Micro Edition (J2ME). 3.1 Basic Rules of Tic-Tac-Toe game The basic Tic-Tac-Toe game consists of two players, X and O, who take turns marking the spaces in a 3ÃÆ'-3 grid (Crowley, 1993; Gardner, 1998). The game usually starts with the X player, and the player who will manage to place three respective marks wins the game. The marks can be placed in any direction, i.e. in a horizontal, vertical, or diagonal row. This basic version of the game is rather simple and very often leads to draw. This simplicity allows the game to be used as a useful tool in combinatorial game theory, as well as a branch of artificial intelligence that deals with the searching of game trees (Beck, 2008). The Roman Empire is known to have established the beginnings of the earliest known variant of tic-tac-toe. It originated around the first century BC (Crowley, 1993). At that time, the game was called Terni Lapilli. Instead of having any number of pieces, each player only had three. The game was played by moving them around to empty spaces to keep playing. However, according to Claudia Zaslavskys book, the game Tic Tac Toe is originating from ancient Egypt (Zaslavsky, 1982). Chess and Tic-Tac-Toe are one of the most famous games to which the moves are not left to chances, rather than pure mathematics and logical reasoning. In these games, a player wins by achieving a winning configuration first, like for instance: checkmate in chess, and 3-in-a-row in a basic Tic-Tac-Toe game in 33 board (Gardner, 1998). Thus, the question which can be posed at this point is: How a player can achieve a winning configuration first? Even though there isnt a general theorem to answer this question, there might be a well-known strategy stealing argument that can give a partial answer about when a player can achieve a winning configuration first (Beck, 2008). In order to find a winning strategy, in theory all the paths could be explored. However, in practice this is not easy because the total number of strategies can be calculated a double exponential function of the size of the board. For example, a 3-dimensional 5ÃÆ'-5ÃÆ'-5 version of Tic-Tac-Toe, has about 3125 positions. This is because each one of the 53 cells has 3 options: Marked by the first player, Marked by the second player, or Unmarked. Thus the backtracking on a graph of 3125 vertices takes at least 3125 steps. This is the main reason that this 3-dimensional 5ÃÆ'-5ÃÆ'-5 version of Tic-Tac-Toe remains unsolved up to date. Moreover, only two explicit winning strategies are known from in the whole class of nÃÆ'-nÃÆ'- ·  ·  ·ÃƒÆ'-n = nd Tic-Tac-Toe games. This is the 33 version and it is characterized with an easy winning strategy, and the 43 version that in turn has an extremely complicated winning strategy. In order to play a perfect tic-tac-toe game, i.e. a win or a draw, the player can play given they move consistent with the uppermost possible moves. This is presented in the following table (Crowley, 1993): Win If the player has two in a row, play the third to get three in a row. Block If the opponent has two in a row, play the third to block them. Fork Create an opportunity where you can win in two ways. Block opponents fork Option 1: Create two in a row to force the opponent into defending, as long as it doesnt result in them creating a fork or winning. For example, if X has a corner, O has the center, and X has the opposite corner as well, O must not play a corner in order to win. (Playing a corner in this scenario creates a fork for X to win.) Option 2: If there is a configuration where the opponent can fork, block that fork. Center Play the center. Opposite corner If the opponent is in the corner, play the opposite corner. Empty corner Play in a corner square. Empty side Play in a middle square on any of the 4 sides. Initially, the player that starts first gets the X and has 3 probable positions to mark in his turn. Even though it seems that there are 9 possible positions, as there are 9 squares in the grid, by rotating the board, this is not the case. It can be observed that: Every corner mark is tactically equal to every other corner mark, and Every edge mark is tactically equal to every other edge mark. There are therefore only three possible first marks: corner, edge, or center. The first player could win (or make a draw) from any of these starting marks. It can be also observed that playing a corner would give the opponent the smallest choice of squares. This is a nice strategy as could be played to avoid losing (Zaslavsky, 1982) . The second player can be identified as O and this player must respond to Xs opening mark. However, this should be done in such a way as to avoid Player X to win. It can be stated that Player O must always respond with (Zaslavsky, 1982): To a corner opening with a center mark, To a center opening with a corner mark and To an edge opening either with a center mark, a corner mark next to the X, or an edge mark opposite the X. Any different play would allow X to compel a win. After every next turn of player X, the player O should follow the above list. This way the player O can achieve a draw (or a win if the player X makes a weak play). 3.2 Existing Tic-Tac-Toe games As many other games like: three mens morris, nine mens morris, pente, gomoku, Qubic, Connect Four, Quarto and Gobblet, Tic-Tac-Toe also has the same goal, i.e. a player wins if he is the first one to get n-in-a-row. Basically, if a generalization is to be provided, it can be concluded that all the different formations of Tic-Tac-Toe can be represented as nd-games, which are accordingly played on a d-dimensional boards with edge n (Zaslavsky, 1982). As it was discussed in the previous section as well, the original Tic-Tac-Toe game is actually a 32-game. There are many variations, discussed as follows (Patashnik, 1980; Gardner, 1998; Beck, 2008). A slightly different version of a Tic-Tac-Toe game is the 33-game, played on a 3x3x3 board (Patashnik, 1980). It can be noted that this game gives good opportunities to the player that plays first, so he could achieve an easy win by playing at the center with his first move. Similarly, playing on a 4x4x4 board also gives the first payer better chances for wining. More complex version of a Tic-Tac-Toe game is playing it on a board with higher dimensional space. 4 dimensional, i.e. 3ÃÆ'-3ÃÆ'-3ÃÆ'-3 board is one of the most commonly played Tic-Tac-Toe (Patashnik, 1980). In this version there are 2 possible aims. One of them is to position elements through all of the board, thus the player that has more rows of 3 totally than the other one is the winner of the game. And the other strategy is to include 4 players, in which case the winner is the payer that will get a row of 3 first. Another version is the misà ¨re tic-tac-toe game. It is played according to its conventional rules, such as in this variation 33 game would be a draw, whereas the winner is the player that will get n in a row (Berlekamp, 1982). Quite a new game is the Tic Tac Tactic variation of tic-tac-toe (Berlekamp, 1982). This game is played on a 3 dimensional curved board, and the here each player tries to roll a ball at least half the way, as it would then drop on a grid that has 9 positions (33 grid). This way the players should make a row of 3 in order to gain a ball. The winner is the player that will have won the first 5 balls. In order to roll their balls precisely, they could use a device that helps into changing a balls trajectory. Yet another version is the nine board tic-tac-toe. In this game, there are in essence 9 boards, arranged as 33 grids, and the first payer can start on any of them by his choice (Gardner, 1998). The following moves are supposed to be places on the board chosen by the first player. Once this board gets full and there is no more space left, the next move can be again on any of the boards left, by the choice of the player. The winner is the one that will achieve 3 in a row. However, having 9 boards gives the game yet another spirit than the usual tic-tac-toe game, as the players can have an opening, middle and end of their game. Similar to the nine board tic-tac-toe game is the super tic-tac-toe game (Beck, 2008). The difference in this variation is that this game does not end once a player makes 3 in a row in one of the 9 boards. As an alternative, the position of that board is marked on a new 33 grid, and the winner is the one that will make 3 in row there. Tic-Tac-Chess is an interesting combination of games, as it involved playing a chess game, as well as a tic-tac-toe game at the same time (Beck, 2008). In this variation, once a player captures a piece from the challenger on the chess game, makes a move on the tic-tac-toe game (even if the challenger has not placed anything on the tic-tac-toe game yet). And of course, the winner is the player that will make 3 in a row on the tic-tac-toe game first. A game that in essence is an isomorphic to a tic-tac-toe game, even though it seems as a completely different game, is described as follows (Beck, 2008). Basically, there are 2 players that should say a number between 1 and 9, without repeating the previously said numbers. The winner is the player that will first make a sum of 15. This game is isomorphic to a tic-tac-toe, because if those numbers are to be placed on a 33 magic grid, then it will be exactly as playing a tic-tac-toe game, because a straight line is formed only if the sum of the numbers is 15. This information is mostly useful in programming variations of a tic-tac-toe game. Another different variation again employs numbers from 1 to 9 (Gardner, 1998). These are to be placed on a 33 grid, but must be held with an order of precedence defined by the players. Then the players play a tic-tac-toe game, filling the grid by the precedence defined beforehand. Check Lines is a very old variation of tic-tac-toe game, invented in the 1970s by Tri-ang Toys Games. In this game the board is actually any geometrical pattern that consists of 12 lines. There are 11 holes in total, distributed in a way that each line has 3 holes. At this point, each player is given 5 coins, and each player on their turn should place a coin on the board. The winner is the one that will have first completed 2 lines. Because the players have only 5 coins, this means that they have to complete intersecting lines. If none of the players have won after placing their 5 coins, then they will continue playing by replacing the position of the coins, on the remaining spaces, with the rule that it must be done only on an adjacent hole. Very similar game to the tic-tac-toe game is the Toss Across game. Here, the players are given bags with beans and they are throwing them on a big board for marking the squares. Star Tic Tac Toe is another popular variation of tic-tac-toe. This game is played with checkers like movable pieces. It has a 33 board, thus a player has 3 pieces accordingly. The participants keep on replacing pieces into the spaces which are left empty in the board, until one the players wins; this actually adds some more dynamism in the game. Moreover, the players have supplementary star shaped pieces, which can be swapped. Similar category of games as the previous bullet, are the: Mojo, Mojo Too and Mojo tic-tac-toe games. In these variation the payers also pieces and pawn(s) onto empty positions until there is a winner. Moreover, there are many shows based on the tic-tac-toe game, as well: Hollywood Squares is a show with 9 celebrities, which fill the cells of the tic-tac-toe grid. Tic-Tac-Dough is a show on which the players put symbols up on the board. This is achieved by answering queries in a variety of categories. In Beat the Teacher competitors respond to questions to win a turn, again on a tic-tac-toe grid. On The Price Is Right, there is a pricing game called Secret X, in which players must estimate prices to win Xes, in order to place them on a blank board. They must position the Xes as to provide speculation of the location on the secret X. This is in turn hidden in the middle line of the board, forming a tic-tac-toe line across. The fictional game Dni game of Gemedet, has an aim to place 6 balls in a row to a 9x9x9 grid (Gardner, 1998). The fictional game Squid-Tac-Toad, has an aim to place 4 or 5 balls in a row to a 44 or 55 grid, accordingly (Gardner, 1998). A more simplistic variation of this game is having the rules as of the Y formations to count as a win. This is rather simple, because all the scenarios basically forming some kind of a Y configuration. Quantum tic tac toe is yet another variation in which the participants are positioning a quantum superposition of numbers on a tic tac toe board (Gardner, 1998). A larger grid (for example 1010) tic-tac-toe games also exist. In a 1010 grid the winner should place 5 in a row. The more the grids there are on a board, the larger complexity of the game is. Another similar game named Go-moku, originating from Vietnam, also has the strategy for a player to get 5 in a row in order to win the game (Gardner, 1998). The players put Xs and Os, but in order to try blocking each other, in this variation they should also try to create changes for wining. Another difference is that the board has no limit, thus the game is played until there is a winner. Three Mens Morris and Nine Mens Morris are also variations, in which there is a limiting on the number of pieces in order for a move to be allowed (Gardner, 1998). Finally, the last variation of the tic-tac-toe game, employs the words: eat, an, laf, it, line, if, lot, on and foe. In this game, the winner is the one that will select 3 words that start with the same letter. If the game was places on a tic-tac-toe grid, it would mean 3 words in order to form a line (three in a row line). 3.3 Proposed model There are quite a few algorithms hat can be used for creating the Tic-Tac-Toes game strategy. The most popular ones are the semantic algorithms and the lexical algorithms. For this project, a lexical algorithm was utilized. The model of the tic-tac-toe game described in this work contains 2 different game strategies. Basically, the one strategy is the Single Player game where a player plays against a system. The other strategy involves Multiple Player environment, and it is being played by a player versus another player. In order to analyze this game, a decision tree might be used. Moreover, for the analyzing part it should be assumed that both the players in the Multiple Player environment, and the single player in the Single Player game, are in essence experienced. This means that the result of a game can be foreseen after the first move from each participant (again assuming that there are no mistakes). Let us represent with 1 if the player that has the X wins and with -1 if the player that has the O wins. The following figure represents the decision tree after the first move from each participant. As it was already discussed in section 3.1 Basic Rules of Tic-Tac-Toe game, the tic-tac-toe game is symmetric and therefore it is sufficient to consider only the squares 1, 2 and 3 for the first player (see the figure below). The rest of the moves are symmetric and will be presented. So, following this reasoning, the first player has the positions 1, 2 and 3 available, and the second player has the remai ning two positions. The figure above presents an expansion, so called an extensive form. It demonstrates that even in the simplest scenario the decision tree can be quite large. For example, if the first two moves were to be presented, this would be impossible to be demonstrated on a single page. Similarly to this discussion, the strategic form of the game can be presented by a different model, i.e. as a matrix. In order to demonstrate this approach, it should be assumed that the players choose one strategy and they strictly follow it when their turn comes. Of course, each strategy should represent all the paths of action and in every possible situation. At the beginning, let us assume that there is a strategy that the first player uses for their first move, and another strategy for the first move of the second player. This logic would create some rules like the following (Zaslavsky, 1982): For the first player: select one of the nine squares on the game board. For the second player: Select one of the nine squares on the game board. If the first player already uses the selected square, then à ¢Ã¢â€š ¬Ã‚ ¢ put an O in square 3, 5, 7, or 9 if an X is in square 1 (center) à ¢Ã¢â€š ¬Ã‚ ¢ put an O in cell 1 if an X is in cell j. These rules are examples of complete strategies, and these can be selected by the payers before the beginning of the game, and thus followed with their first moves. The strategic form of a tic-tac-toe game is presented on the figure below. It should be noted that the entries in the table below are in essence the values of the game. They hold values for every possible selection of strategies. Each tic-tac-toe game that can be actually presented in an extensive form would have an equivalent strategic form similar to the one shown in the table presented above. Moreover, this table is also equivalent to the matrix established previously. The payoff matrix in cooperation with the descriptions of the strategies comprises the model for the two-person tic-tac-toe game. 3.4 Comparison of Proposed model with Existing Models The semantic algorithm is yet another approach towards the tic-tac-toe game. The semantic algorithm is in essence a learning algorithm, and it might be structured in the following way. It might have as initial information the ability to recognizing the 3 states of a game: lost, won or a draw. The algorithm in this case would play the X, and it will play against another algorithm, i.e. the O. As soon as a game is finishes, the information if the game was won or lost is stored. Moreover, the moves are presented with the smaller letters x and o accordingly. A possible structure of stored information could be the following line: x5 o3 x9 o4 x1 won. The first move is always randomly selected. So, given that the algorithm played 7 (x7), and the opponent played 6 (o6), the algorithm will search for previous games that are most similar to x7 o6. If such a case is found, then the following rules apply: If the game found was a win, than the algorithm will try to reproduce the move. If the position is not available, it will play randomly. If the game found was a loss, the algorithm will try to correct the move, by not placing an element in the same position as in the lost game. This is repeated until there is a winner. Moreover, if a game end with a draw, it is not saved in the database. Comparing this algorithm with a lexical algorithm such as our proposed model, it might be noted that the semantic algorithm usually plays very badly at the begging. But, after a certain number of games, the learning curve of the algorithm becomes better. On the other hand, our proposed model behaves well during all the stages of the game. 3.5 Technology Research (j2me) Being quite different from other programming languages, Java does both compiling and interpreting when it comes to process code. As it can be seen from the photo above, the source code (i.e. the .java files) is initially translated by the compiler. This gives an output of an intermediate language, called Java bytecode (i.e. the .class files). The bytecode is then ready to be executed (or in other words, interpreted) within a particular virtual processor, known as the JVM (Java Virtual Machine) (Hayun, 2009; Knudsen, 2008). This is in essence a simulated processor that executes all the bytecode commands. The Java Virtual Machine is the basic components that give to Java the feature to compatibility. This is simply because it represents a reliable layer between bytecode and the concrete machine instructions, translated at runtime. Over the years, the Java language has undergone many changes and development. J2SE (Java 2 Standard Edition) had its first edition targeting GUIs, applets, and other basic and rather simple applications. Recently, the language was extended with the Java suite known as J2EE (Java 2 Enterprise Edition). This edition is based for server side development, and includes tools for: database access, messaging, content rendering, inter-process communications, and transaction control (Hayun, 2009; Li, 2005). J2ME (Java 2 Micro Edition) came into existence as to cover the needs for applications targeting mobile devices. As it can be seen from this short overview, there are versions of Java to suit different environments: from the enterprise development tools intended for use in servers, to the micro systems. An important thing to note at this point is that the separation between platforms is not just unconditional (Knudsen, 2008). Many times these are not a simple line than can be drawn. In ord er to demonstrate this, it might be explained that Java 2 Micro Edition development sometimes requires the use of Java 2 Enterprise Edition and Java 2 Micro Edition. This is the case with multiplayer games for instance, so and Java 2 Micro Edition is used for the client side, but Java 2 Enterprise Edition is used for the server side of the application/game. Moreover, different Java editions target different hardware configurations. Similarly, there are 3 virtual machines to be used for the different environments (Li, 2005). For example, Hotspot VM is a default virtual machine suitable for a executing the full-scale edition of JavaHotspot. JavaHotspot is a newer type of virtual machine competent of vigorously optimizing a great deal of executed code (called as hotspots) during the runtime (Li, 2005). Other versions of virtual machine are the Compact Virtual Machine (CVM) and Kilobyte Virtual Machine (KVM). These are in essence smaller virtual machine implementations. They are targete d to run within the restrictions of the limited resources found on the micro devices (these will be discussed later in this section, as well). The requirement of having another version (like the Java 2 Micro Edition) for the mobile devices came because these devices do not have sufficient recourses to run Java 2 Standard Edition, since J2SE was clearly way excessively large to fit on even the bigger micro devices. However, the question was imposed initially was which features should be left out from the J2SE, so to be minimized in a smaller edition. Also, having great diversity of different devices, it would not have been a nice decision to restrict all the J2ME applications to the lowest compatible hardware configuration (Li, 2005; Kochnev, 2003). Moreover, this solution would not have been practical as well, because it would incorrectly neglect the capabilities of the higher end devices. The final solution is comprehended through a mixture of J2ME configurations and profiles (Krikke, 2005). It represented a revised Java architecture, which actually offers for the leaving out of parts of the platform, at the same time as a ddition to device and category precise components. Along these lines, the configuration would identify the abilities of a Java platform intended for use on a sequence of analogous hardware. Possible components that can be removed are the following (Kochnev, 2003; Lefevre, 2005): Java language mechanism smallest amount hardware necessities, such as the memory, screen size, and processor power for the family of devices integrated Java libraries By utilizing this approach, there are actually 2 preset configurations for mobile devices: one for somewhat restricted devices such as PDAs and Set-Top-Boxes (for instance the digital TV receivers), and another one for devices such as pagers and mobile phones. These two configurations are (Kochnev, 2003; Krikke, 2005; Lefevre, 2005): CDC (Connected Device Configuration) CLDC (Connected, Limited Device Configuration) All of these configurations are to be reviewed as follows. On the other hand, a good example of java profiles is the UI (User Interface) for mobile phones. For example, the J2ME configuration CLDC that wraps this type of device, keeps out the typical Java UI libraries (AWT and Swing). The devices do not have the ability of presenting anything derived from these libraries in any case. This is due to the fact that their screens are just too small. Thus, there is no point to slaughtering valued space on them. The solution was to generate an innovative User Interface, fitting to the exact necessities of the poor mobiles LCD display. The consequential LCD UI is built-in in the CLDC profile. This targets MIDs (Mobile Information Devices), for this reason the name is MIDP. The CDC is built for bigger devices such as digital TV set-top-boxes and PDAs. These are devices characteristically with numerous space of memory. The CDC is the bigger brother of the J2ME configurations. It encloses a single profile (the Foundation profile) as well as a high performance virtual machine (known as the Compact Virtual Machine CVM). This Java language implementation, as well as the API, practically has all the influence of J2SE. Unluckily, the CDC is not accessible on the platform for the most micro-game players (the mobile phones). The CLDC is especially targeted to micro devices, like mobile phones. It fundamentally defines a standard, which in turn is used by all the device manufact