Thursday, October 31, 2019

Internet is good for study Essay Example | Topics and Well Written Essays - 1250 words

Internet is good for study - Essay Example It has always been acknowledged that members of the current generation, especially adolescents and young adults use the Internet for diverse purposes other than fact finding or information gathering. The popularity of social networking sites have significantly increased Internet usage through sharing of experiences, photos, events, and recent updates on the lives of friends, relatives, and acquaintances. From the study conducted by the Lebo, the Internet was found to be used for the following general purposes: fact finding activities, visiting social networking sites, playing games, watching videos, paying bills, and even purchasing products online (Lebo). Fact finding activities could already be classified as a general category for studying. In this regard, the current discourse contends that the Internet is actually a good medium for enhancing academic performance or in studying for the reasons that information are easily accessible; more people from all walks of life have immediat e access to this technological medium; and studying through the Internet could be undertaken across time and geographic locations. The Internet has been found to be used as a source of information (Lebo). As emphasized, â€Å"they can bring a whole world of information to the students† (Hughes and Fan 1). Across different academic levels, the Internet provides access to varied information which could even been translated in diverse languages, depending on the nationalities of the users. From the comprehensive study that disclosed activities in the Internet, it was revealed that â€Å"large percentages of Internet users go online at least weekly for basic information: 61 percent go online for fact-finding, and 43 percent for looking up the definition of a word† (Lebo 27). Rather than relying on the traditional dictionaries to looks into the meaning of words; or books to search on different topics as subject of the users’ research, the

Tuesday, October 29, 2019

Ethics Philosophy Essay Example | Topics and Well Written Essays - 3000 words

Ethics Philosophy - Essay Example Second, Mill considers the possible grounds of justification for this mindset: the higher party's position, he says, could be attributed to pride, love of freedom, love of autonomy, or to the love of power or excitement. But, he returns, justification of holding onto one's position, refusing to trade places regardless of the degree of happiness of the pig/fool that surpasses his/hers, rests in human dignity. This, Mill reasons, is so imperative to intelligent, superior beings, that they would for no reason outside it compromise it. Further, Mills admonishes anyone contesting his approach as one who is confusing the definitions/conditions of happiness and contentment. He concedes that 1) a higher being has higher (and/or greater) needs-he/she needs more to make him/her happy; and 2) a lower being with a lesser range of (and thereby need for) the capacity for happiness will have a better chance of complete happiness, whereas one with greater needs is at risk for having a smaller percentage of his/her needs fulfilled. If a person has only one bucket to fill as opposed to twenty, for example, the person with only one bucket will have a better likelihood of walking away from the fountain of happiness and saying, "I have successfully filled all of my buckets." But after conceding, Mill returns to the higher party's ability to tolerate more, and therefore to bear greater burdens. Such is the opinion of the higher, intelligent being-with the capacity to tolerate, appreciate, and understand that to be a superior being who is momentarily unhappy is far better than to be an inferior being with constant happiness. And, he claims, if the other party does not agree, it is only because he/she is incapable of understanding Mill's position and is therefore basing his/her [inferior] contention on a lack of information. That is, the lower being cannot fully comprehend the options of both sides, does not have the capacity or range to choose, even, and does not, therefore, understand what it is to have the dilemma of choosing in the first place: if you are not smart enough to understand the difference in stations (the higher and the lower's stations in life), then you have not the ability to choose between the two-and do have, as Mills does, the grounds upon which to base your opinion. 2. For Nietzsche, anything which intrudes upon or impedes one's will to power is suspect. In this case, two select characteristics threaten this will to power-weakness and humility. Nietzsche grants the possibility that within a collective, it might be good and possible to not hurt others and protect oneself from being hurt, if everyone in the group "mutually" "refrains from injury, from violence, from exploitation." (Solomon, 392) But, Nietzsche notes, the moment the practice is made a principle, a law, the effort becomes one of a kind of anarchy, of "dissolution and decay"-what he calls a "Will to Denial." (392) This is for him in direct

Sunday, October 27, 2019

The Seven Layer Osi Model

The Seven Layer Osi Model Seven-layer OSI model is a logical layer and developed by the ISO international standardization organization. The purpose of this layer is to understand the transmission of data flows from source to destination and to identify problems during data transmission. The seven layers include Application, Presentation, Session, Transport, Network, Data link and Physical layer. The sequence of layer names to be remembered by this phrase All people seem to need data processing. The following is a general description of each layer. OSI reference model is now being considered as the main model for the internetworking and inter computing. The seven layers divide the task of data transmission in sub tasks and then complete the data transmission cycle. QUESTION 1 In the 1980s, the European-dominated International Standards Organization (ISO) began to develop its Open Systems Interconnection (OSI) networking suite. OSI has two major components: an abstract model of networking (the Basic Reference Model, or seven-layer model), and a set of concrete protocols. Briefly explain each of the seven OSI layer included their function and usage in data communication and networking. OSI Reference Model OSI reference model (Open Systems Interconnection) illustrates how information from a software application on a computer moves through a network medium to a software application on another computer. OSI reference model is conceptually divided into 7 layers where each layer has a specific network function, as described by figure 1.1 (with no physical media). This model was created based on a proposal made by the International Standards Organization (ISO) as a first step toward international standardization of protocols used at various layers. à ¯Ã‚ ¿Ã‚ ½This model is called ISO OSI (Open Systems Interconnection) Reference Model because this model is intended for sharing open systemà ¯Ã‚ ¿Ã‚ ½.[1] Open Systems can be interpreted as an open system to communicate with other systems. For his brief, we will call this model as the OSI model only. Figure 1.1. OSI Reference Model OSI model has seven layers. The principles used for the seven layers are: 1. A layer must be made when needed different levels of abstraction. 2. Each layer shall have certain functions. 3. The function of each layer should be chosen carefully in accordance with the provisions of international protocol standards. 4. Layer boundaries labored to minimize the flow of information through the interface. 5. The number of layers must be quite a lot, so that different functions do not need to be united in a single layer outside needs. However, the number of layers must also be cultivated as little as possible so that the network architecture does not become difficult to use. Below discuss about each layer of the OSI model sequentially, starting from the bottom layer. It should be noted that the OSI model itself is not network architecture, because this model does not explain the exact services and protocols to be used on any layer. OSI model only explains about what should be done by a layer. However, ISO has also established standards for all layers, although these standards do not constitute a reference model itself. Each layer has been declared as a separate international standard. Characteristics of the OSI Layers To seven layers of OSI reference model can be divided into two categories, namely upper and lower layers. The top layer of the OSI model deals with application issues and generally implemented only in software. The highest layer (application layer) is the cover prior to the user (users), both users and application layer processes interact with software applications that contain a communication component. The term upper layer is sometimes used to refer to some of the top layer of another coating layer in the OSI model. The bottom layer of the OSI model to control data transport issues. Physical layer and data link layer implemented in hardware and software. The layers below the others are generally only implemented in software. à ¯Ã‚ ¿Ã‚ ½The lowest layer, the physical layer is a layer of cover for the physical network medium (cable networks), and as responsible for the placement of information on the network mediaà ¯Ã‚ ¿Ã‚ ½.[2] The following table shows the separation of the two l ayers in the layers of the OSI model. Application Application Overlay Presentation Session Transport Data Transport Undercoat Network Data Link Physical Table 1.2 Separation of top layer and bottom layer of the OSI model Protocol OSI model provides a conceptual framework for communication between computers, but this model is not a method of communication. In fact communication can occur due to use of communication protocols. In the context of data networks, a protocol is a formal rules and agreements that determine how computers exchange information over a network medium. A protocol implements one or more of the layers of the OSI. A wide variation of the communication protocol, but all maintains the flow in one group: the LAN protocols, WAN protocols, network protocols, and routing protocols. LAN protocols operate at the physical and data link layer of the OSI model and define communication over various LAN media. WAN protocols operate at the third lowest layer of the OSI model and define communication over various WAN. Routing protocol is a network layer protocol that is responsible for determining the road and traffic arrangements. Finally, the network protocol is different from the upper layer protocols th at exist in a series of protocols. Layers of the OSI Model Physical Layer Physical Layer functions in the delivery of raw bits into the channel of communication. Design issues that must be considered here is to ensure that when one side sends data 1 bit, the data must be accepted by the other side as a bit too, and not 0 bit. The question that arises in this case is: how many volts should be used to declare a value of 1? And how many volts is also required for the number 0?. It takes a bit how microsecond will be exhausted? Is the transmission can be processed simultaneously in both directions? How many pins are owned by the network and what is the use of each pin? In general, design problems are found here related to the mechanical, electrical and procedural interfaces, and physical media which is under the physical layer. Data Link Layer The main task of the data link layer is as raw data transmission facility and transforms the data to a channel that is free from transmission errors. Before forwarded who work layer, data link layer perform this task by allowing the sender meme cage breaking input data into a number of data frames (usually numbering in the hundreds or thousands of bytes). Then the data link layer transmits these frames in sequence, and process the acknowledgment frames sent back by the recipient. Because the physical layer send and receive bit stream without regard to the meaning or architectural frame, then depending on the data link layer was to create and recognize frame boundaries it. This can be done by affixing a special bit to the beginning and end of the frame. If incidental bit patterns can be found in the data, it is necessary to pay special attention to ensure that the pattern is not incorrectly considered as the boundaries of the frame. The occurrence of noise in the channel can damage the frame. In this case, the data link layer software on the source machine to send back the broken frame. However, transmission of the same frame over and over again can cause duplication of frames. Duplicate frames need to be sent if an acknowledgment frame from the receiver who returned to the sender has been lost. à ¯Ã‚ ¿Ã‚ ½Depending on the layer is to overcome the problems that caused the destruction, loss and duplication of frames. The data link layer provides some service classes for the network layer. This service class can be distinguished in terms of quality and priceà ¯Ã‚ ¿Ã‚ ½.[4] Other problems that arise in the data link layer (and also most of the layers above it) are seeking the smooth process of data transmission from the sender to the recipient a slow speed. Mechanism of regulation of traffic data should allow the sender to know the amount of buffer space owned by the recipient at a certain moment. Often setting flow and error handling is done in an integrated manner. Channel that can send data in both directions also can be problematic. So therefore need to be considered for the data link layer software. Problems that can arise here is that the frames acknowledgement flowing from A to B compete with each other ahead of the flow from B to A. Settlement of the best (piggy backing) could have been used, then we shall discuss it in depth. Broadcast networks have an additional problem in the data link layer. The problem is in terms of controlling access to a shared channel. To fix this you can use a special sub layer of data link layer, called the medium acc ess sub layer. Network Layer Network layer serves to control operation of the subnet. Important design problem is how to determine the route packets from source to destination. Route can be based on static tables are linked to network. Route can also be determined at the beginning of a conversation such as a terminal session. Finally, the route can also be very dynamic; it can be different for each package. Therefore, the delivery route of a packet depends on network load at that time. If at the same time in a subnet there are too many packets, then there is the possibility of the packages arrive at the same time. This can lead to bottlenecks. Congestion control as it is also the task of the network layer. Because the sub net operators expect the good fortune of his job duties. There is often some accounting function built at the network layer. To make billing information, at least the software should calculate the number of packets or characters or bits that are sent by each customer. Accounting becomes more co mplicated, when a packet crosses a country that has a different rate. The move packets from one network to another can also cause problems that are not small. Addressing mode used by a network can be different from the methods used by other network. A network may be unable to receive the package at all because the packet size is too big. Protocol was be different, as well as others. Network layer has been given the task to solve all these problems, allowing different networks interconnected to each other. Transport Layer The basic function is the transport layer receives data from the session layer, split the data into pieces smaller if necessary, forwards the data to the network layer, and ensure that all pieces of data can arrive at the other side correctly. Moreover, all this must be done efficiently, and aims to protect the upper layers of the changes in hardware technology that can not be avoided. Under normal circumstances, the transport layer makes the network connection is different for each transport connection which is required by the session layer. When the transport connection requires a high throughput, then the transport layer can make a lot of network connections. Transport layer divide sending data to a number of networks to increase throughput. On the other hand, if the manufacture or maintenance of the network connection is quite expensive, transport layer can combine multiple transport connections to the same network connection. This is done to make this merger is not seen by the s ession layer. Transport layer also determines the type of service for the session layer, and in turn the type of service for users of the network. Type of the most popular transport layer is a channel error-free point to point that forward messages or bytes in accordance with the order delivery. However, there are also other types of transport services. The services are transport isolated messages that do not guarantee order of delivery, and broadcast messages to a number of purposes. Type of service determined when the connection starts. Transport layer is a layer end to end in fact, from source to destination. In other words, a program on the source machine to bring the conversation with the same program on the target machine. In the lower layers, there are protocols between the two machines and other machines that are close by. Protocol is not located in the outer or the source machines outer purpose machine, which may be separated by a router. The differences between layers 1 to 3 are intertwined and layer 4 to 7 are end to end. This can be explained as shown in Figure 1-1. In addition to merging multiple streams of messages into a single channel, transport layer must be careful in defining and deciding on the network connection. This process requires a naming mechanism, so that a process on a machine has a way to explain with whom the machine wants to talk. Also there should be a mechanism to regulate the flow of information, so that the flow of information from a fast host does not overwhelm a slow host. Such mechanism is called flow control and plays an important role in the transport layer (also in other layers). Flow control between hosts with different hosts by controlling the flow of the router with the router. Well find out later that the same principles used for both types of the control. Session Layer Session layer allows users to establish sessions with other users. A session in addition allows ordinary data transport, as did the transport layer, also provides special services for specific applications. A session is used to allow one user logs into a remote timesharing system or to move files from one machine to another to machine. A session layer service is to implement the dialogue control. Sessions can allow traffic to move in two directions at one time or only in one direction only. If at one time in traffic only in one direction only analogous to a single railway line, the session layer helps to determine who is entitled to use the channels turn at an instant. Service sessions are described as token management. For some protocols, it is important to ensure that both parties concerned do not perform surgery at the same time. To regulate this activity, the session layer provides tokens that can turn. Only a party that holds the token is allowed performs critical operations. Another session is a synchronization service. Take for example that can occur when trying to transfer files that lasted 2 hours from one machine to another machine with the possibility of having an interval of 1 hour between the two crashes that can occur. After each transfer is canceled, the transfer may need to be repeated again from scratch, and may experience another failure. To reduce the possibility of this problem, the session layer can insert a specific sign to the flow of data. Therefore, if a crash, only the data that is after the sign is to be transferred back. Presentation Layer Presentation layer performs certain functions that are required to ensure the discovery of a common solution for certain problems. Presentation Layer does not allow users to solve their own problems. Unlike the layers underneath are only moving the bits from one place to another place, presentation layer attention to syntax and semantics of information transmitted. One example is the encoding of data presentation service. Most users do not move a random string of binary bits. The users exchange data just as the name, date, amount of money, and bills. The items are expressed in the form of a string of characters, integer numbers, floating point numbers, a data structure formed from some simpler items. There is a difference between one computer to another computer in a given code to declare a string of characters (for example, ASCII and Unicode), integer (for example, complement and complement one two), and so forth. To allow the two computers that have different presentation to commun icate, data structures to be exchanged can be expressed by means of abstract, in accordance with standard encoding to be used on line. Presentation layer-data set and convert this abstract structure of representation that is used on a computer into a network standard representation, and vice versa. Application Layer Application layer consists of a variety of protocols. For example there are hundreds of incompatible terminal types in the entire world. Take the situation where full-screen editor is expected to work on a network with a variety of terminals, which each have different screen layouts, have a way different sequence of keystrokes for the insertion and deletion of text, move the sensor and so forth. One way to overcome such problems in data is to define an abstract network virtual terminal, so editors and other programs can be written for each corresponding. To handle each terminal type, one part of the software must be written to map the network virtual terminal functions to the actual terminal. For example, when moving the cursor editor virtual terminal into the left corner of the screen, the software should issue the appropriate command sequence to achieve the cursor. All virtual terminal software is in the application layer. Another application layer function is file transfer. File systems from one another have different naming conventions, how to express the lines of text are different, and so forth. Transfer files from a system different to other systems that require treatment to overcome the lack of this compatible. The task is also a job application layer, such as electronic mail, remote job entry, directory lookup, and various general purpose facilities and other special purpose facilities. CONCLUSION The process of sending a data to be sent to the recipient. Sender processes submitting data to the application layer, which then add the user application header, the AH (which may also be empty), the front end and submit the results to the presentation layer. Presentation layer can form these data in various ways and may just add a header at the front end, which is given by the session layer. It is important to remember that the presentation layer is not aware of the data which are marked AH by application layer is the data users really are. The process of granting this header repeated until the data reaches the physical layer, where data will be transmitted to other machines. On these machines, all headers were be removed one by one until reaching the admissions process. Figure1 .3 Examples of how the OSI model used The key here is that although the actual data transmission is each layer is programmed as though the transmission in question took place horizontally. For example, when transport layer delivery get a message from the session layer, transport layer will then affix the transport layer header and sends it to the receiver transport layer. INTRODUCTION Computer networks are a tool, known also as nodes, relating to media liaison. Node may consist of a computer, printer or other device to send and receive data generated by other nodes, nodes in the network. Media Liaison, also known as communication media. On this day, there are various types of networks, including local area network (LAN) and wide area network (WAN). The largest network in the world is the Internet. Edit Development. Network started with a small building, the connection about ten computers and a printer. The technology that exists at the time the computer is connected to limit the number and length of communications cable that can be allowed on the network. In the early nineties the communication cable can be pulled so far about 600 feet to the extension of approximately 30 computers only. This network is suitable for a small organization known as local area network (LAN). LANs typically connect devices in a building or a building. A LAN can be built only with two computers and a printer or can be extended only in one building to include audio and video software. LAN size is limited to a distance of several kilometers only. LAN with data rates from 4 Mbps to 100 Mbps. Network connections from different countries has established the development of LAN to the wide area network (WAN). WAN can be sending data, audio and video at distances up to cover a country or continent or around the world. QUESTION 2 Briefly explain at least four (4) topologies of networks and suggest how we implement these topologies in networking. MAIN BODY Network can be of any of the following three types: Local Area Network: Figure: 2.1 Local Area Network Local Area Network (LAN) is a limited range of geographical barriers such as a laboratory, a school or building. In a typical LAN configuration, one of the computers used as file server file server that functions to keep all the software that controls the network. All computers are connected to the server file known as a workstation. Computer workstation comprising a desktop computer specifications less than the server and also may have software on the disk severity. Cable used to connect the LAN via network card installed on each computer. Metropolitan Area Network: Figure : 2.2 Metropolitan Area Network Town Area Network (MAN) covers a wider geographical area as a region or city. Widespread area network connecting a number of Local Area Network in a place to enable sharing of information carried. Universities and government agencies Wide spread Area Network to communicate with the other communities and private industries. One example is the MAN MIND Network, located in Pasco County, Florida which enables communication between the Central Pasco Media Center Main Frame using a telephone line, coaxial cable, and wireless communication providers. Wide Area Network: Figure : 2.3 Wide Area Network Widespread Area Network (WAN) covers a wider area as a state, nation and world. To create a WAN requires systems across the sea or the use of microwave or satellite. Use WAN enables communication between the states can be implemented quickly. Configuring the WAN is complex and requires a hardware multiplexing multiplexer for LAN and MAN links for access to a comprehensive communications network such as the Internet. Network Topology: Figure : 3.1 Network Topology à ¯Ã‚ ¿Ã‚ ½A computer network system using communication line that connects computers to each otherà ¯Ã‚ ¿Ã‚ ½.[5] There are various methods that can be used for the communication and is known as topology. Topology can be considered as a virtual shape or structure of a network. This shape actually does not correspond to the actual physical design of the devices on the computer network. The computers on the home network can be arranged in a circle shape but it does not necessarily mean that it presents a ring topology. There are few types of topologies for computer networks, namely: Star Network Topology Figure :3.1.1 Star Network Topology Star topology is a network where all computers or other devices connected to the central distribution system, known as the Hub or Switch. Hub or Switch is responsible for managing the computer network. All messages or data that is sent to a central control hub for avoid collisions from occurring. There are two operations that used by the hub or switch that is operating broadcast and the operations of the transition switching. à ¯Ã‚ ¿Ã‚ ½Distribution operations, hub or switch will make the delivery of data received from one station to all the routes connecting them. In transition operations, the hub or switch will save the data received and sends the data through a receiving stationà ¯Ã‚ ¿Ã‚ ½.[3] Each node can be connected to the network and can be removed at any time without affecting the whole system of directly by. Furthermore, if one node does not work, it will not affect other computer networks. Any damage to the connection between the hub nodes will not affect the system as a whole, but if the damage occurred on the hub, the entire system will also be affected. The main weakness of this topology is that it requires a fairly high cost in view of all systems connected to it computers, scanners, printers, etc. requires its own cable. Ring Network Topology Figure :3.1.2 Ring Network Topology In local area networks where the ring topology is used, each computer is connected to the network in a closed loop or ring. The Messages or data to be transferred in order according to the same path in the same ring. Network technology was first used by IBM systems with Type I in the category of cable shielded Twisted Pair STP. Each data node will be checked by delivery location. If not the same node strike, it will be submitted to the next node and this will continue until the delivery address the same node strike. à ¯Ã‚ ¿Ã‚ ½As the data is transferred by the same route as the sequence of the potential for violations of data that appears to be similar to the network and can be removed at any time without affecting the whole system of directly byà ¯Ã‚ ¿Ã‚ ½.[6] However, one problem that arises is if a node fails, the entire network will probably also be affected. Arrangement of nodes in this topology is almost the same physically as star topology; only a logical was a ring. The attachment is required in this topology is called Multi Station Access Unit (MSAU). MSAU is installed in a ring-shaped network where it is more than one unit. If only one unit only used the physical topology is similar to the star connection. Bus Network Topology Figure :3.1.3 Bus Network Topology Bus topology, are also known as the Ethernet using a line length where each node in relation to him. Data will be sent by each node in the hope that it does not collide with data transmitted from other nodes. If it happens, the node will try again until successful. Weakness of the bus topology is in terms of maintenance. It is quite difficult to maintain in view of the connection is in the form of a series. In the event of damage to any line at any node, it will cause the entire system will not work. In addition to accurately locate points or nodes those are damaged. Each node can be connected to the network and can be removed at any time without affecting the whole system directly. Furthermore, if one node does not work nor does it affect other computer networks. The other advantage is there in this topology is that it uses a single cable and requires no additional hardware to build the network. But it does not require a very high cost for maintenance purposes. Tree Network Topology Figure :3.1.4 Tree Network Topology The tree topology is essentially a hybrid of the bus and star layouts. It is also known as a hierarchical topology and has a central root node that is connected to one or more nodes of a lower hierarchy. à ¯Ã‚ ¿Ã‚ ½In a symmetrical hierarchy, each node in the network has a specific fixed number of nodes connected to those at a lower levelà ¯Ã‚ ¿Ã‚ ½.[3] Apart from these basic types of network topologies, there are hybrid network topologies, which are composed of a combination of two or more basic topologies. These network mappings aim at harnessing the advantages of each of the basic topologies used in them. Network topologies are the physical arrangements of network nodes and wires. What is interesting is that the inanimate nodes and wires turn live for the transmission of information. Mesh Network Topology Figure :3.1.5 Mesh Network Topology In a full mesh network, each network node is connected to every other node in the network. Due to this arrangement of nodes, it becomes possible for a simultaneous transmission of signals from one node to several other nodes. In a partially connected mesh network, only some of the network nodes are connected to more than one node. à ¯Ã‚ ¿Ã‚ ½This is beneficial over a fully connected mesh in terms of redundancy caused by the point-to-point links between all the nodesà ¯Ã‚ ¿Ã‚ ½.[5] The nodes of a mesh network require possessing some kind of routing logic so that the signals and the data traveling over the network take the shortest path during each of the transmissions. CONCLUSION Topologies are essence of computer networks design. Efficient networks can only be built based on the complete knowledge and understanding of above mentioned topologies. Knowledge of every communication device is of equal importance to help you find the best option for your network requirements. Optimum networks can be built with complete knowledge and understanding of computer network devices and how they are designed, any mistake in choosing inappropriate techniques, device etc can only be the waste of time, resources and efforts. APPENDIX Figure 1.1. OSI Reference Model Application Application Overlay Presentation Session Transport Data Transport Undercoat Network Data Link Physical Table 1.2 Separation of top layer and bottom layer of the OSI model Figure1 .3 Examples of how the OSI model used Figure: 2.1 Local Area Network Figure : 2.2 Metropolitan Area Network Figure : 2.3 Wide Area Network Figure : 3.1 Network Topology Figure :3.1.1 Star Network Topology Figure :3.1.2 Ring Network Topology Figure :3.1.3 Bus Network Topology Figure :3.1.4 Tree Network Topology

Friday, October 25, 2019

Jean Piagets Stages of Cognitive Development Essay -- childs intelle

Piaget's Stages of Cognitive Development Very briefly describe Piaget’s stages of cognitive development and explain what he meant by saying that young children are egocentric. Use experimental evidence to consider this claim. Cognitive development is what psychologists talk about when discussing a child’s intellectual growth. Jean Piaget (1896 to 1980), a Swiss psychologist developed a theory of cognitive development, which is still much discussed and critiqued today. Providing a firm building block to all work done in the study of child development and the concept that young children are egocentric. Piaget’s stages are divided into four main steps of cognitive development. Stage one begins at birth and is completed at approximately two years; this is called the period of sensorimotor intelligence. Second stage builds on from the first at the age of about two years, the preoperational period lasts for five years of the child’s life. From that the child moves into the Concrete Operations stage, a stage which lasts to the age of eleven. Finally a child will reach the fourth stage the period of Formal operations aged eleven plus. Piagets first stage of intellectual growth, the Sensimotor period can be split into another six parts, each part can be tested by use of simple experiments with babies. Object Permanence is understanding that something any object is there weither or not the person can see it. For example when we put an object such as a cup down on a table and turn our back to it, it is rational to state that the cup will still be exactly where it was left. Piaget’s theory stated that babies within the Sensimotor pe... ...e of formal operations the person is now able to think hypothetically In conclusion Piagets theory of cognitive development is backed up with the experimental evidence given from experiments run with infants and children. From birth to the stage of concrete operations the child is termed egocentric. What Piaget meant by calling young children egocentrics was that they are not selfish but have not yet attained the ability to see things from another perspective. Bibilography Gleitamn,H.,Fridlund, A.J.,& Reisburg, D. (1999) Psychology, (5th ed.). New York: W.W.Norton & Co. Ginsburg,H.P.,Opper,S.(1988) Piagets Theory of intellectual development,(3rd ed.). London:Prentice Hall International (UK). Glover, J.A.,et.al.(1949).Educational psychology Principles and Applications. Boston: Little Brown and Company.

Thursday, October 24, 2019

Primary and Secondary Reflection Examples

1. This lecture is started by Marcel after discussing about truth as a value, the setting of any kind of thought but there is this distinctive character of philosophical thought that is reflection. It is about not just the meaning of something at first glance but by probing more deeply to the meaning of things and experiences that we encounter. 2. Marcel is going to illustrate how reflection is rooted in daily life by giving examples that show the importance of probing more deeply into thought. 3. Reflection happens due to an occurrence of a phenomenon that is a break from the daily normal life. If the phenomenon involves something that is valuable to me then, the reflection becomes a personal act where no one can reflect for oneself but oneself. If the watch was not valuable to me in the first place no reflection would have occurred for it would just have been something that occurred and not something that one would call as an experience. 4. The lie that I made in the example was the occurrence that was a break from the normal everyday life. I considered myself as trustworthy and honest therefore telling the lie was indeed a phenomenon for me. The same things can be said for this situation just like in the previous one. The phenomenon has led me to reflect for myself and probe deeply to the lie that I made. I reach such questions as who I really am for I was already not the man who I thought he was. 5. This example is about being disappointed to someone for something that they did and then, remembering a memory where I have done a similar thing. Being disappointed to someone was the break from normal everyday life because disappointments only happen when your expectations do not meet with the reality. This has led to the question of who I really am because I am disappointed at someone who was exactly just like me before. I am not the man who I really thought I was anymore. This conclusion comes from the reflection for oneself where one explores deeply into the meaning of one phenomenon. The reflection can leave me in anguish but I am liberated. 6. In the last example, realizations come to me from the things I have explored to more deeply. I am already a better communicator to myself and to my friend for I have destroyed the barrier that once stood there to block our communication. This is the liberating part of reflection. Where I was once anguished by the thoughts that I had because of what I reflected yet it brought something liberating to my life. 7. The third example as I stated was about communication. This clearly shows the importance of the notion of intercourse. This shows that I need others and that other people need me. I need people who need me to make me assure myself of my awareness that I am aware of myself. 8. Life is one with reflection yet there seems to be and objection that differentiates life with reflection. Life is hot while reflection is cold. Life is like a fire burning with voices and experiences waiting to happen. Bursts of energy come for never-ending sources of emotions of joy and sadness. Reflection tends to make this thought as something that one would only analyze and not experience. Just like a car broken into pieces and analyzed. 9. The reflection in the intoxicated young man comes to him when realizes things that are important to him like his future. This is the something that is valuable to him that makes him reflect upon his actions. The rash things he said due to his intoxication was the phenomenon that made him reflect. His life was the thing that was at stake so then he had to reflect upon the things that he did and explore more deeply the consequences one action of his might do to his life. The other examples like the prisoner and the mother make me ask myself questions like â€Å"What am I really living for? † â€Å"Who am I living for? â€Å"What things do I live by? † These are questions whose answers make a great impact upon my life for these are the things that fuel my everyday life. I have to know what I live for and know for sure that is something that is valuable to me. It has to be something worth living and dying for so I can say to myself that I have lived my life to the fulle st every day. 10. Reflection should be one with my life. It is not the bad guy in the movie anymore but the one that saves the day. Reflection makes us probe deeply into things and liberate us from our narrow thinking. But if we use reflection to reduce life to animalism, then this makes reflection the antagonist and as something that is an unintelligible concept. 11. Experience and reflection are analogous. One goes with the other. Experience is not just a passive memory but an active participation of the other. We can say therefore that one is more reflective if one has more experience and vice versa. But there are two levels of reflection that we need to differentiate. The first is primary reflection. Our immediate consciousness of what happens in our experience is our primary reflection. We must further break this down in order to come up with a deeper understanding. From this point, we reconstruct the experience while integrating what we have discovered from it, thus a transcendence of knowledge through reflection on experience. This is our secondary reflection or a reflection upon our reflection. Through this process, we become aware of our awareness. We experience exclamatory awareness. This is when we feel truly alive. 12. The question who am I still hangs and yet remains to be the most important one we must answer. Through primary and secondary reflection we might be able this question finally. 13. Because of the secondary reflection I am able to realize that I am like this person wearing someone else’s clothes. I have this feeling that I am not who I am now and who I was before. These realizations of mine makes me uneasy because I cannot myself of the question â€Å"Who really am I? † 14. The civil servant asking the question are you Mr. so and so may think that I am insane if I answer â€Å"Certainly not† but this is how I feel. I think that I am not the man who I was anymore. I am not the person I have written myself to be. My name already sounds different to me because of the realizations it brings to me. Who really am I? 15. The uneasy feeling that I am not who I am anymore leads me to the question again of who I really am. 16. I have realized that am a not a definite somebody. I am just this non-somebody linked in a profoundly obscure fashion, with a somebody about who I am being questioned about and about whom I am certainly not free to answer just what I like at the moment because I am not the person that the civil servant is describing anymore. 17. The uneasy feeling leads us to realizations that I am not a definite somebody. We have to explore deeply and probe deeply to this problem and hopefully answer this question. 18. I have to recognize the fact that I am not a definite somebody and therefore accept the facts that there is another sense in which I am somebody and that other somebodies also exist. 19. Marcel criticizes the relationship that I have with myself because of the paradox of how I appear to myself – as a definite somebody and not a somebody. I could be anybody who I think I could be. A master, a friend, a teacher, a servant. This paradox is in relation to myself as a subject. It is in relation of myself as these definite characteristics are contingent. 20. The questions come whether we can consider this not being a definite somebody exists. Exists in a way that I have something to define myself, something I live for and something I live by. Definitely the answer to this question is negative. But this does not mean that I am imaginary, for it does not mean that what is not actual is imaginary. 21. Now I come to ask myself. Does anything really exist? Do I know of anything to prove that I myself exist? These questions ask for a centrally significant existence without which I cannot possibly judge anything else to exist. We should however expound and probe more into this statement of existential indubitablity otherwise we might have a collision with total or modified skepticism. 22. Total skepticism doubts the existence of anything. In the phenomenological level, total skepticism is meaningless. Our day to day experiences prove to us what exists and what does not. Experiences that we reflect upon further makes us aware of the existence of other people and objects. There is a clear distinction of what really exists or not through reflection. 23. Relative skepticism on the other hand makes me ask myself if I do really exist since I am the one questioning about existence of other things I should be able to answer my own existence. The separation of I and exist in the question â€Å"Do I really exist? † proves that the â€Å"I† is never a â€Å"that† and also that existence is not a predicate. 24. The â€Å"I exist† is an indubitable touchstone of experience therefore it cannot be separated. Marcel points out that â€Å"I exist† lies in another level. It is not something that one can infer so quickly for â€Å"I exist† lies in the banks of every possible current of inference. Therefore the substitution made by modern philosophers could be criticized since â€Å"Sentio, ergo sum† still hides a Cogito because of the ‘ergo’. 25. To say that you exist cannot be separated from the fact that you are existing, that is, others are aware of your existence as well, to truly exist is to manifest. With it, doubting oneself cannot be avoided and by doing so we become more aware of ourselves as likened that a child’s expressions. 26. To exist and the awareness of existence cannot be separated because that is the character of the self that cannot be doubted. It is inherent to the self that he exists for himself and for others and that cannot be apart from the datum that is my body. 27. The author talks about applying primary and secondary reflection on â€Å"my body†. Primary and secondary reflection means to look at my body the same way as all other bodies, subject to destruction and non privileged. It is detaching this body from the thought that is mine. 28. Secondary reflection is reuniting the ideas se apart by primary reflection and that is to unite the body back with the center. 29. There is difficulty in proceeding to secondary reflection without contradicting what was proposed in the primary reflection that both body and soul are distinct. 30. It is a matter of perspective that we proceed in reflection by considering that body and soul are distinct but interrelated. If we should reflect on what makes up my body then, we should reject the distinction that both are things. 31. To refer to my body as the â€Å"my† that I mean it to be then, I must reject a psycho-physical parallelism belief that me and my body are mere things but rather have an intimacy of relationship with each other. This intimacy manifests through the actual real life experiences of the body and the real thing from which we should get implications from and not put ideal meanings to it. These experiences can cause us either to behave as a master of our body or a salve to it but either way, it is the â€Å"my† in my body that I own it to be. 32. The author relates a person’s ownership of the â€Å"my† of â€Å"my body† as the same with saying that â€Å"the dog is mine† for such dog to be really mine, there must exist a positive relationship like accepting that I have claim and all responsibility to it and it too will give the same positivity by responding to me. 33. It cannot be argues that you are the owner of your body as you are the owner of the dog in the previous analogy but in slave very, such is not the case for the master of a slave who claims to have ownership of his slave’s body but a slave cannot help but persist that his body is his especially after the injustices of slavery. 34. I have a responsibility to look after my body by providing for it the same as I do for my dog. But we must be aware of an upper limit of a situation that we are in, that we are now capable of dissociating ourselves from our lives saying â€Å"that this body is not mine† or â€Å"looking after this body is not my responsibility. 35. My body is mine to a point where I am capable of controlling it like your dog’s obedience, but there is this time where an inner limit has to be considered as in the case of illness where you don’t have the same control of your body as you used to have. This is expressed in the phrase â€Å"I am no longer myself†. 36. The likeness of â€Å"my dog† as well as other objects that are mine is distinct from the spatio-terminal being that I am but here exists a link between us that we could be associated with each other. 37. There must be a link between me and my body from which is the means for me to relate all other ownerships and at every single ownership that there is. There is also that desire to personally experience that my body is mine. 38. To own something requires oneself to claim it and take care of it , therefore some one who owns things cannot be reduces to a dematerialized ego who cannot claim nor care for something. 39. Another observation made that when I become too attached with what I possess, it tends to become a part of my body. And when such possessions are threatened like in the case of being lost, it feels as if my body has also been affected. 40. The strength of possession is as reliant with how united you are with your body, but as of external possessions, when they get lost. it leaves the owner at vulnerable state form being affected with the loss leaving him to want more to possess things that are not identical or that do not define him, most especially, a person from which the very idea cannot be owned. 41. The link between me and my body cannot be asserted to be independent from each other but once that link breaks as by means of death, no experience could ever tell us now what we can still become. 42. Looking at the previous situation at a different view by means of secondary reflection. 43. My body can be thought of as being an instrument from which I can act what I intend to manifest myself into the world, this requires us to think what being an instrument would imply and under that conditions would that be. 44. An instrument could be understood as something that would increase the efficiency of an existing power that is present in the person using the instrument like an optical apparatus for seeing. Therefore my body can be seen as a united body with a group of powers. 45. I have to understand that my body is mine to avoid narrowing my body as an object. Also that I am my body is an instrument, an extension of another body’s powers. Such infinite reveres could be avoided by claiming my body as mine and not an instrument. 46. In claiming that I am my body, care must be observed so as not to reduce me as an object but rather as a subject, a being that has a relationship. Sympathetic meditation was a term used by Marcel to describe how my body was at first in accordance with my feelings. 47. Using my body to feel mu body is using it as an instrument and it has been described in the previous numbers that my body should not be reduced to an apparatus and in this case just to view my feelings. 48. Marcel ends it by introducing the inquiry to feelings that in doing so we do not begin with searching for explanations but rather look into how we get to feel in an everyday set up and how we represent it.

Wednesday, October 23, 2019

Design a Flow Chart for a Process

Design a flow chart for a process Zoey Johnson University of Phoenix OPS/571 October 27, 2012 One process that seems to be a never ending process in my daily life is doing laundry. With a household of six people, the laundry needs to be done daily or else it will overtake the house quickly. To help illustrate the laundry process I have used Microsoft Word to create a flowchart that depicts the process. Using flowcharts is valuable because the flow of logic is shown throughout the process. Much like a blueprint for a building, a flowchart depicts the development of a process.Factors that affect the process design Water temperature and water level are the factors that affect process of the design. Both factors will determine how the laundry gets done. Performing the process design for laundry is broken down into the following steps. 1. ) Sort the clothes between whites, light colors, and dark colors 2. ) Check that the pockets are empty a. If pockets are empty move to step 3 b. If pock ets are not empty, empty them then move to step 3 3. ) Measure out the desired amount of detergent 4. ) Pour the detergent into the washer . ) Determine if fabric softener is needed. If needed, measure and add. If not go straight to step 6 c. Add Fabric Softener 6. ) Select water temperature. If clothes are temperature sensitive move to step 7, if not move to step 8 7. )Are clothes durable, like cotton d. If Yes use hot water e. If No use cold water 8. ) Determine Washing cycle f. If fabrics are delicate select gentle wash g. If fabrics are not delicate select normal wash 9. ) Adjust the water level per load 10. ) Load the clothes into the washer 11. Turn on washer and wait 35 – 45 minutes for wash cycle 12. ) Take clothes out of washer and put into dryer 13. ) Turn on dryer and wait 60 minutes 14. ) Take clothes out of dryer and fold For the flow chart design, the oval shapes represent the start and end steps for the process. The rectangular shapes represent the process step s. Decision steps are depicted by a diamond shape. Arrows are used to act as a guide to show the flow of process. Identify metric to measure process For the purpose of the laundering process, I have chosen sorting time as the metric for the process.Separating everyone’s laundry into whites, light colors, and dark colors is a time consuming process that can be reduced to reduce the amount of time it takes to do laundry. The remaining steps are fairly automatic so decreasing the sorting time is the best way to improve the process. Start Start Flow Chart Sort clothes by colors: whites, light colors, and dark colors Sort clothes by colors: whites, light colors, and dark colors No No Are pockets empty? Are pockets empty? Empty pockets Empty pockets Yes Yes Measure out desired amount of detergentMeasure out desired amount of detergent Pour Detergent into washer Pour Detergent into washer Is Fabric Softener Needed? Is Fabric Softener Needed? Add Fabric Softener Add Fabric Softener Y es Yes No No Are clothes Durable? Are clothes Durable? Yes Yes Select water temperature. Are clothes temperature sensitive? Select water temperature. Are clothes temperature sensitive? No No Yes Yes Use cold water Use cold water Use hot water Use hot water No No Determine wash cycle. Are fabrics delicate? Determine wash cycle. Are fabrics delicate? No No Yes YesUse normal cycle Use normal cycle Use gentle cycle Use gentle cycle Adjust the water level Adjust the water level Turn on washer and wait 35 – 45 minutes for wash cycle to complete Turn on washer and wait 35 – 45 minutes for wash cycle to complete Load Clothes into washer Load Clothes into washer Take clothes out of washer and load into dryer Take clothes out of washer and load into dryer Turn on dryer and wait 60 minutes for clothes to dry Turn on dryer and wait 60 minutes for clothes to dry Take clothes out of dryer and fold Take clothes out of dryer and fold

Tuesday, October 22, 2019

Ethos, Pathos, Logos, Kairos The Modes of Persuasion and How to Use Them

Ethos, Pathos, Logos, Kairos The Modes of Persuasion and How to Use Them SAT / ACT Prep Online Guides and Tips Ethos, pathos, logos, and kairos all stem from rhetoric- that is, speaking and writing effectively. You might find the concepts in courses on rhetoric, psychology, English, or in just about any other field! The concepts of ethos, pathos, logos, and kairos are also called the modes of persuasion, ethical strategies, or rhetorical appeals. They have a lot of different applications ranging from everyday interactions with others to big political speeches to effective advertising. Read on to learn about what the modes of persuasion are, how they’re used, and how to identify them! "Yes, Alexander, this will be on the test." What Are the Modes of Persuasion? As you might have guessed from the sound of the words, ethos, pathos, logos, and kairos go all the way back to ancient Greece. The concepts were introduced in Aristotle’s Rhetoric, a treatise on persuasion that approached rhetoric as an art, in the fourth century BCE. Rhetoric was primarily concerned with ethos, pathos, and logos, but kairos, or the idea of using your words at the right time, was also an important feature of Aristotle’s teachings. However, kairos was particularly interesting to the Sophists, a group of intellectuals who made their living teaching a variety of subjects. The Sophists stressed the importance of structuring rhetoric around the ideal time and place. Together, all four concepts have become the modes of persuasion, though we typically focus on ethos, pathos, and logos. If Einstein says it, it must be true. What Is Ethos? Though you may not have heard the term before, ‘ethos’ is a common concept. You can think of it as an appeal to authority or character- persuasive techniques using ethos will attempt to persuade you based on the speaker’s social standing or knowledge. The word ethos even comes from the Greek word for character. An ethos-based argument will include a statement that makes use of the speaker or writer’s position and knowledge. For example, hearing the phrase, â€Å"As a doctor, I believe,† before an argument about physical health is more likely to sway you than hearing, â€Å"As a second-grade teacher, I believe.† Likewise, celebrity endorsements can be incredibly effective in persuading people to do things. Many viewers aspire to be like their favorite celebrities, so when they appear in advertisements, they're more likely to buy whatever they're selling to be more like them. The same is true of social media influencers, whose partnerships with brands can have huge financial benefits for marketers. In addition to authority figures and celebrities, according to Aristotle, we’re more likely to trust people who we perceive as having good sense, good morals, and goodwill- in other words, we trust people who are rational, fair, and kind. You don’t have to be famous to use ethos effectively; you just need whoever you’re persuading to perceive you as rational, moral, and kind. Sad imagery is an example of pathos, which appeals to emotion. What Is Pathos? Pathos, which comes from the Greek word for suffering or experience, is rhetoric that appeals to emotion. The emotion appealed to can be a positive or negative one, but whatever it is, it should make people feel strongly as a means of getting them to agree or disagree. For example, imagine someone asks you to donate to a cause, such as saving rainforests. If they just ask you to donate, you may or may not want to, depending on your previous views. But if they take the time to tell you a story about how many animals go extinct because of deforestation, or even about how their fundraising efforts have improved conditions in the rainforests, you may be more likely to donate because you’re emotionally involved. But pathos isn’t just about creating emotion; it can also be about counteracting it. For example, imagine a teacher speaking to a group of angry children. The children are annoyed that they have to do schoolwork when they’d rather be outside. The teacher could admonish them for misbehaving, or, with rhetoric, he could change their minds. Suppose that, instead of punishing them, the teacher instead tries to inspire calmness in them by putting on some soothing music and speaking in a more hushed voice. He could also try reminding them that if they get to work, the time will pass quicker and they’ll be able to go outside to play. Aristotle outlines emotional dichotomies in Rhetoric. If an audience is experiencing one emotion and it’s necessary to your argument that they feel another, you can counterbalance the unwanted emotion with the desired one. The dichotomies, expanded upon after Aristotle, are: Anger/Calmness Friendship/Enmity Fear/Confidence Shame/Shamelessness Kindness/Unkindness Pity/Indignation Envy/Emulation Note that these can work in either direction; it’s not just about swaying an audience from a negative emotion to a positive one. However,changing an audience's emotion based on false or misleading informationis often seen as manipulation rather than persuasion. Getting into the hows and whys requires a dive into the ethics of rhetoric, but suffice to say that when you attempt to deceive an audience, that is manipulation. If you really want to get an audience fired up about something, you can inspire righteous anger, which may or may not be manipulation. If somebody is offended that you’ve asked them for something, you can try making them feel sorry for you by turning indignation into pity- that’s manipulation. Seems trustworthy, right? What Is Logos? Logos comes from a Greek word of multiple meanings, including â€Å"ground,† â€Å"speech,† and â€Å"reason.† In rhetoric, it specifically refers to having a sense of logic to your persuasion; logos-based rhetoric is founded in logic and reason rather than emotion, authority, or personality. A logic-based argument appeals to a person’s sense of reason- good logos-based rhetoric will persuade people because the argument is well-reasoned and based in fact. There are two common approaches to logos: deductive and inductive arguments. Deductive arguments build on statements to reach a conclusion- in effect, the conclusion is reached in reverse. A common method is to propose multiple true statements which are combined to reach a conclusion, such as the classic method of proving that Socrates is mortal. All men are mortal, and Socrates is a man, therefore Socrates must be mortal. That’s not really a case that needs to be argued, but we can apply the same framework to other arguments as well. For example, we need energy to live. Food gives the body energy. Therefore, we need food to live. All of this is based on things we can prove, and results in a conclusion that is true, not just theorized. Deductive reasoning works on the assumption that A = B, B = C, so therefore A = C. But this also supposes that all the information is true, which is not always the case. Sometimes the conclusions you reach with deductive reasoning can be valid, as in the reasoning makes sense, but the conclusion may not be necessarily true. If we return to the Socrates argument, we could propose that: All men eat apples. Socrates is a man. Therefore, Socrates must eat apples. The problem is that we can’t prove that all men eat apples- some do, some don’t. Some might eat an apple once but never again. But based on our arguments, the conclusion that Socrates must eat apples is valid. A strong deductive argument for logos-based reasoning will be composed of provable facts that can reach a provable conclusion. However, a valid but not entirely sound argument can also be effective- but be wary of shifting from persuasion to manipulation! Another approach to logos-based rhetoric is inductive reasoning, which, unlike deductive reasoning, results in a probable argument rather than a definite one. That doesn’t mean that it is less effective- many scientific concepts we accept as truth are inductive theories simply because we cannot travel back in time and prove them- but rather that inductive reasoning is based on eliminating the impossible and ending in an argument that is based in sound logic and fact, but that may not necessarily be provable. For example, all people with a cough have a cold. Kelly has a cough. Therefore, Kelly likely has a cold. Our conclusion is likely, but not absolute. It’s possible that Kelly doesn’t have a cold- not because she doesn't have a cough, but because there are other possible causes, such as having allergies or having just breathed in some dust. The conclusion that she has a cold is likely based on data, but not absolute. Another example would be that Kelly picks her nose. Kelly is a woman, therefore all women must pick their nose. Inductive reasoning is based on generalizations. The first example, in which Kelly likelyhas a cold, makes sense because it’s based on something provable- that a sampling of people who have a cough have colds- and followed up with a likely conclusion. In the second example, this is a less sensible conclusion because it’s based on extrapolation from a single reference point. If we reverse the claim and say that all women pick their noses, and Kelly is a woman, therefore Kelly must pick her nose, that would be more sound logic. Still not necessarily true- not all women pick their noses- but a more sound example of inductive reasoning. Inductive reasoning can still be incredibly effective in persuasion, provided that your information is well-reasoned. Inductive reasoning creates a hypothesis that can be tested; its conclusion is not necessarily true, but can be examined. As always, be wary of venturing into manipulation, which is more likely to be based on erroneous or misleading facts. Kairos is all about the right time and place. What Is Kairos? Kairos is the Greek word for the opportune moment, which is precisely what it means in rhetoric. According to this principle, the time in which an argument is deployed is as important as the argument itself. An argument at the wrong time or to the wrong audience will be wasted; to be effective, you must also consider when you are speaking and to whom. In effect, kairos means choosing the correct rhetorical device to match the audience and space in which you’re attempting to persuade. If you wanted to persuade people to go vegetarian, the middle of a hot dog-eating contest is probably not the right time. Likewise, you’re probably not going to persuade a room of data-driven scientists of something by appealing to pathos or ethos; logos is probably your best bet. In essence, kairos asks you to consider the context and atmosphere of the argument you’re making. How can you deploy your argument better considering time and space? Should you wait, or is time of the essence? As Aristotle famously said, â€Å"Anybody can become angry- that is easy, but to be angry with the right person and to the right degree and at the right time and for the right purpose, and in the right way- that is not within everybody's power and is not easy.† The goal of kairos is to achieve exactly that. Effective use of kairos strengthens your persuasion ability by considering how people are already feeling based on context. How can you influence or counteract that? Or maybe pathos isn’t the right approach- maybe cold hard facts, using logos, is more suited. Kairos works in conjunction with the other modes of persuasion to strengthen your argument, so as you’re putting a persuasive piece together, consider how and when it’ll be deployed! Do a little detective work to figure out which mode of persuasion you're seeing. How to Identify Ethos, Pathos, Logos, and Kairos Understanding how the modes of persuasion work can make you better at identifying and picking them out. Not only is a better understanding of them useful for composing your own arguments, but it’s also beneficial when seeing other people’s arguments. When you understand how ethos, pathos, logos, and kairos work, you’re less susceptible to them. Advertising is one of the places we see the modes of persuasion most often. Looking at each of these advertisements, you can see how they use each mode of persuasion to convince audiences to convince an audience of something. Ethos Using celebrities is a classic example of ethos, which uses authority or recognition to convince an audience of something. In this case, celebrities like Michelle Obama, Lin-Manuel Miranda, and Janelle Mone discuss the importance of voting. It doesn’t matter that they’re not politicians or political scientists; audiences find themappealing and genuine. When they speak of the importance of voting, audiences listen because they like what these figures have to say. If talented, famous people like this are taking the time to vote, it must be important! Historians or those well-versed in politics might make different arguments about why audiences should vote, but in this case, the goal is to inspire people. When we see people we admire doing things, we want to do them too; hence the reason that ethos works so well. Pathos ASPCA’s commercials are some of the most infamous examples of pathos in advertising. Sarah McLachlan’s â€Å"Angel† plays over footage of abused animals in shelters, encouraging viewers to donate money to support the organization. It’s not hard to understand why it works; both the song and the imagery are heartbreaking! You can’t help but feel sad when you see it, and that sadness, when followed up by a prompt to donate, encourages you to take immediate action.And these ads are effective- the campaign raised millions of dollars for ASPCA. By appealing to our emotions and making us feel sad, this advertisement encourages us to act. That’s a classic use of ethos- it influences our feelings through the one-two punch of sad music and imagery, encouraging us to perform the desired action. Logos In some cases, emotion and authority aren’t the right tactic. Logos often appears in tech advertisements, such as this one for the iPhone XS and XR. Notice how the advertisement focuses on product shots and technological terms. Most audiences won’t know what an A12 bionic neural engine is, but it sounds impressive. Likewise, that â€Å"12 MPf/1.8 wide-angle lens, with larger, deeper 1.4 micron pixels† is pretty meaningless to most people, but the numbers suggest that this phone is something special because it uses scientific-sounding language. It doesn’t matter whether audiences really understand what’s being said or not. What matters is that they feel confident that the ad is selling them something they need- in this case, impressive technological specifications that make this phone an improvement over others. Kairos Kairos should ideally factor into all uses of the modes of persuasion, but timeliness can also be a big selling point. In this Christmas-themed MMs advertisement, the company uses timely humor to forge a connection between the holidays and MMs. Because these commercials have been running for such a long time, there’s also a nostalgic attachment to them. Just as people look forward to new Budweiser advertisements during the Super Bowl, others look forward to seeing MMs or the Coca-Cola polar bear during the holidays. Though this commercial doesn’t go out of its way to tell you the benefits of MMs, it does forge a connection between MMs and Christmas, encouraging people to purchase them around the holidays. Enhance your persuasion by better understanding ethos, pathos, logos, and kairos. Examples of the Modes of Persuasion Now that you’ve had some exposure to how ethos, pathos, logos, and kairos function and what they can do, you can test your ability to recognize them using the images below! There are a few things to notice about this image: The anonymous figure The language The use of a statistic Can you figure out which mode of persuasion this represents? The fact that the figure is anonymous tells us it’s probably not ethos. While we might be influenced by a person who’s in shape, there’s not really an appeal here based on the person- they’re just an image to support the ad. â€Å"DOMINATE† is a pretty loaded word, suggesting that this may have elements of pathos. However, take a look at that statistic. Whether it’s true or not, a hard statistic like that suggests that this ad is using logos to appeal to viewers. You can draw out an argument from there- 75% of users lose weight within weeks. You’re a user. Therefore, you will likely lose weight within weeks. What do you notice about this image? The photo The way the text frames the woman’s body The name of the perfume The color choice What mode of persuasion is this? Again, we don’t know who the model is, and perfume isn’t going to make us look like her, so we can count ethos out. The ad seems pretty intent on making us look at certain things- the woman’s lips and chest in particular. What is it trying to make us feel? â€Å"FORBIDDEN FRUIT† has a connotation of sensuality. Red is a color commonly associated with passion. When you combine the photo, the framing, the perfume name, and the color, you get a strong sense of sex appeal from the advertisement. This makes it an example of pathos- the ad is trying to make us feel a certain way. If we buy this perfume, maybe we would feel attractive, too. How about this advertisement? A serious-looking photo Text promising â€Å"no more back pain† â€Å"Doctor recommended.† Seeing a doctor might make you tempted to think the answer is logos, but there’s no appeal to logic here. â€Å"No more back pain,† is a nice promise, but there’s no attempt to appeal to emotions, so it can’t be pathos. What’s important in this image is the combination of the doctor in the image and the line â€Å"doctor recommended.† This doctor might not be famous, but he does have authority, making this an example of ethos. Our confidence in this treatment grows because we trust that a doctor understands how to address back pain. What mode of persuasion is this?Think about: The framing The model The text She does look fashionable and the ad mentions stylists, so it’s possible that this is ethos. There are no statistics or arguments being made, so the answer probably isn’t logos. Pathos is possible, but despite having a heavily made-up model, this ad is far less about sex appeal than the previous one. But the text mentions a specific holiday- New Year’s- suggesting that this is kairos. Kairos can, and often should, be combined with all the modes of persuasion to be even more effective. In this case, the model’s appearance could suggest either ethos or pathos in addition to kairos. The message here is that you should act now, at the beginning of the year, to take advantage of the deal and to start the year off with a new style, much like the one the model is sporting. A crying child is almost certainly pathos. Key Tips for Identifying Ethos, Pathos, Logos, and Kairos Now that you know the difference between all the modes of persuasion, you’ll have a much easier time identifying them. If you run into trouble, you can always ask questions about what you’re seeing, hearing, or reading to understand what mode of persuasion it’s using. #1: Is It Related to a Specific Time? If the argument is based on a specific day or context, such as Valentine’s Day or appealing only to a select group of people, such as people with dogs, it’s more likely to be kairos. #2: Does It Involve a Celebrity or Authority Figure? Celebrities are often a dead giveaway that an argument is using ethos. But authority figures, such as doctors, dentists, or politicians, can also be used to appeal to ethos. Even regular, everyday people can work, particularly when combined with pathos, to appeal to you based on a mutual connection you have. #3: Does It Involve Statistics? Statistics are a huge clue that an argument is using logos. But logos can also just be a logical argument, such as that if plants need water, and it’s hard to remember to water them, you should buy an automatic plant waterer. It makes perfect sense, making you more likely to buy it, rather than changing your habits to remember to water your plants more frequently. #4: Does It Influence Your Emotions? If an argument tries to change your emotions, whether by making you sad, happy, angry, or something else entirely, it’s a good indicator that it’s using pathos. Sex appeal is one of the biggest examples of pathos in advertising, appearing everywhere from makeup ads to car commercials to hamburger advertisements. What’s Next? Need help understanding the historical context forThe Great Gatsby to perfect your kairos-based argument? You can always combine the modes of persuasion with literary devices to make your arguments even stronger! Learn how to say "good morning" in Japanese! Even if it's not a mode of persuasion, it's just good manners. Have friends who also need help with test prep? Share this article! Tweet Melissa Brinks About the Author Melissa Brinks graduated from the University of Washington in 2014 with a Bachelor's in English with a creative writing emphasis. She has spent several years tutoring K-12 students in many subjects, including in SAT prep, to help them prepare for their college education. Get Free Guides to Boost Your SAT/ACT Get FREE EXCLUSIVE insider tips on how to ACE THE SAT/ACT. 100% Privacy. No spam ever. hbspt.forms.create({ portalId: '360031', formId: '2167ba30-e68e-4777-b88d-8bf3c84579af', formInstanceId: '2', submitButtonClass: 'btn-red-light btn', target: '#hubspot-container2', redirectUrl: 'http://ww2.prepscholar.com/blog-subscribe-thank-you', css: '.post-bottom .hs-form.stacked label {display:none;} .post-bottom .hs-form.stacked .field div.input {padding-top: 55px; padding-left: 300px;} .post-bottom .hs-input {width: 220px} .post-bottom .btn-primary, .hs-button.primary {margin-top:0px; padding-left:350px} .post-bottom .hs-form-field {margin-bottom:5px}' }); $(function(){ $(".exclusive-tip-form #hubspot-container2 label").hide(); }); function replace_tag(a, b){ $(a).each(function(index) { var thisTD = this; var newElement = $(""); $.each(this.attributes, function(index) { $(newElement).attr(thisTD.attributes[index].name, thisTD.attributes[index].value); }); $(this).after(newElement).remove(); }); } $(function(){ replace_tag($(".posts-by-topic h3"), "h2"); }) Ask a Question BelowHave any questions about this article or other topics? Ask below and we'll reply! Search the Blog Search jQuery(function(){ var $ = jQuery; var url = 'http://google.com/search?q=site:' + location.protocol + '//' + location.hostname + ' '; var $searchModule = $('.hs-search-module.6e67cb40-435f-4eaf-a523-e559220cd89d'); var $input = $searchModule.find('input'); var $button = $searchModule.find('.hs-button.primary'); if (false) { $input.val(decodeURIComponent(location.pathname.split('/').join(' ').split('.').join(' ').split('-').join(' ').split('_').join(''))); } $button.click(function(){ var newUrl = url + $input.val(); var win = window.open(newUrl, '_blank'); if (win) { //Browser has allowed it to be opened win.focus(); } else { //Browser has blocked it location.href = newUrl; } }); $input.keypress(function(e){ if (e.keyCode !== 13) return; e.preventDefault(); $button.click(); }); }); Improve With Our Famous Guides SATPrep ACTPrep For All Students The 5 Strategies You Must Be Using to Improve 160+ SAT Points How to Get a Perfect 1600, by a Perfect Scorer Series: How to Get 800 on Each SAT Section: Score 800 on SAT Math Score 800 on SAT Reading Score 800 on SAT Writing Series: How to Get to 600 on Each SAT Section: Score 600 on SAT Math Score 600 on SAT Reading Score 600 on SAT Writing Free Complete Official SAT Practice Tests What SAT Target Score Should You Be Aiming For? 15 Strategies to Improve Your SAT Essay The 5 Strategies You Must Be Using to Improve 4+ ACT Points How to Get a Perfect 36 ACT, by a Perfect Scorer Series: How to Get 36 on Each ACT Section: 36 on ACT English 36 on ACT Math 36 on ACT Reading 36 on ACT Science Series: How to Get to 24 on Each ACT Section: 24 on ACT English 24 on ACT Math 24 on ACT Reading 24 on ACT Science What ACT target score should you be aiming for? ACT Vocabulary You Must Know ACT Writing: 15 Tips to Raise Your Essay Score How to Get Into Harvard and the Ivy League How to Get a Perfect 4.0 GPA How to Write an Amazing College Essay What Exactly Are Colleges Looking For? Is the ACT easier than the SAT? A Comprehensive Guide Should you retake your SAT or ACT? When should you take the SAT or ACT? Michael improved by 370 POINTS! Find Out How Stay Informed Get the latest articles and test prep tips! Looking for Graduate School Test Prep? Check out our top-rated graduate blogs here: GRE Online Prep Blog GMAT Online Prep Blog TOEFL Online Prep Blog

Monday, October 21, 2019

U2 Research Project Example

U2 Research Project Example U2 Research Project – Coursework Example U2 Research Project al affiliation Windows PowerShell Windows PowerShell is a .NET-based framework from Microsoft that is used for automating and configuring management tasks. It is essentially a replacement for command prompt and VBScript. It comprises a command-line shell with accompanying scripting language (Wilson, 2013). Some of the functions of PowerShell include accessing USB devices installed on multiple computers within one network, running time-consuming tasks in the background, and terminating programs that take long to respond. In addition, it can be used to find specific information from other computers in the same network (Microsoft Corporation, 2013).Windows PowerShell is used in administrative roles that require the elimination of repetitive tasks, which are tedious to carry out on several computers. The program allows users to automate and simplify tiresome and repetitive tasks through the creation of scripts and combination of multiple commands. PowerShell is benefi cial because it displays useful information that may not be available on a typical user interface. It is also helpful because it can accomplish mundane tasks quickly (Microsoft Corporation, 2013).Security Configuration WizardSecurity Configuration Wizard (SCW) is a wizard that enables a computer administrator to create security policies in Windows. The security policy created is typically an XML file; it configures network security, services, audit policy, and specific registry values. Because SCW is a role-based tool, consumers can use it to create policies that enable firewall rules, services, and customized settings that can allow selected servers to perform specific roles. For instance, SCW can function as a domain controller (Garfias, 2005).There are four major benefits of using SCW. First, it has advanced security features that enhance the functionality of Windows firewall. Second, it disables unnecessary services in a system. Third, it does not interfere with essential compon ents of a server, which can affect how a server performs specific roles. Lastly, it allows users to deploy SCW-generated security policies using Group Policy (Microsoft Corporation, n.d.).ReferencesGarfias, K. (2005). Security Configuration Wizard. Retrieved December 14, 2014 from giac.org/paper/gsec/4378/security-configuration-wizard/107239Microsoft Corporation. (n.d.). Security Configuration Wizard. Retrieved December 14, 2014 from http://technet.microsoft.com/en-us/library/cc754997.aspxMicrosoft Corporation. (2013, June 24). Getting started with Windows PowerShell Workflow. Retrieved December 15, 2014 from http://technet.microsoft.com/en-us/library/jj134242.aspxWilson, E. (2013). Windows PowerShell 3.0. Sebastopol, California: O’Reilly Media.

Sunday, October 20, 2019

An Assessment of Heroism in the Characters of Gawain and Beowulf

An Assessment of Heroism in the Characters of Gawain and Beowulf Who is more heroic: Gawain or Beowulf? Hero (n): a person who is admired for great or brave acts or fine qualities (Merriam-Webster.com). While deciphering the true meaning of heroism for a few minutes something stopped me. In general opinion, most readers would consider Beowulf more heroic. And, according to the pattern of literature, film, and storytelling Beowulf is more heroic. But truly, it depends on which context you are viewing this upon. If we were to read the two stories in the Anglo-Saxon era, of which took place from 410 – 1066 AD, we could all agree Beowulf is the true hero. He fought off two monsters and a dragon among other beasts. When he fought Grendel he proclaimed, â€Å"it won’t be a cutting edge I’ll wield to mow him down, easily as I might†¦ He has no idea of the arts of war, of shield or sword-play, although he does possess a wild strength† (Greenblatt, 55). He acknowledges the pure strength of Grendel, and declares he will fight him without weapons because that is the just thing to do. He wants to be fair and square. A cowardly or even just average person would use any advantage to best the monster, but Beowulf has a true inner-courage, incomparable to anyone else in existence. He won battles nobody else could. Gawain had one battle to fight. He only volunteered because nobody else would except for his king, and he kept the â€Å"magical girdle† instead of show ing up as he promised to (giving the green knight a fair blow to his neck). He was fearful, where Beowulf was not. Beowulf fought bare-handedly when he didn’t even have to. So, physically or externally Beowulf was the true hero. In parallel the two stories yield a different answer, when viewing them from the eyes of a person alive in the 21st century. The true hero comes from within today. For example, someone who can lift three cars has less of a place in society than someone who can travel to third world countries and give food and shelter to those who are unfortunate. Gawain has more inner strength than Beowulf does. For example, in the days leading up to the meeting with the Green Knight, he is tested by temptations. One of those temptations is sex, and yet, despite the Green Knight’s wife’s strong sex appeal, he turns her away in the nicest way possible. The Green Knight was testing Gawain up until the moment he struck him with the axe. Gawain, fearful, kept the girdle that the Green Knight’s wife gave him because he believed it’s magical powers would save him. Therefore, he broke his promise. He was supposed to bear his neck, no shield, no protection. He lost his â€Å"tr oth† or his word by wearing that girdle. When he finds out that the Green Knight was testing him in his ability to keep his troth he was furious. He admitted, â€Å" Dread of the death blow and cowardly doubts meant I gave into greed, and in doing so forgot the freedom and fidelity every knight knows to follow† (Greenblatt, 235). After that the Green Knight forgives him because, like the readers, he sees Gawain’s strength in admitting his downfall and being truthful and regretful in the end. Beowulf is the opposite. He is egotistical and arrogant. Yes, he is significantly strong, but it is never enough. He always wants more. He always wants the fame, as when he left his men behind to take on the dragon, alone, despite his old age. Beowulf’s fault led him to his death, whereas Gawain’s humility saved his life. In today’s world all of us are faced with numerous different amounts of temptation. It speaks a lot to ones character to avoid them, and to speak for themselves in regret when they falter in their ability to deny those temptations. Gawain does this, when Beowulf is blind to his own faults. Today, Gawain would be the true hero. This is why when reading and interpreting the texts we must always consider context. Gawain is the real â€Å"person who is admired for great or brave acts or fine qualities† (Merriam-Webster). Gawain is the indisputable hero.

Friday, October 18, 2019

Effects of obesity Research Paper Example | Topics and Well Written Essays - 1250 words

Effects of obesity - Research Paper Example Obesity can occur because of many causes. Heredity is one factor that causes obesity, though its role is perceived to be greater than it really is. Many people think of genes as the sole cause of obesity. While gene increases the tendency of an individual to gain weight, people generally have an unhealthy style of living that prevails in the culture of the family. Many people become obese because of the very unhealthy lifestyle. Prenatal and postnatal influences increase the tendency of children to be obese. Pregnant mothers who are obese or who smoke increase the tendency of their children to grow into obese adults (Harvard School of Public Health, 2014). Excessive gain of weight during the stage of infancy increases people’s risk of becoming obese as adults, whereas breastfeeding lowers this risk. A potential cause of obesity is the unhealthy diet whose consumption has become a trend and culture particularly in the West. People commonly consume large meals with a high conten t of refined grains, unhealthy fats, red meat, and carbonated drinks. Healthy diet based on the consumption of fresh vegetables and fruits is not very common. Advancement of technology is another factor that can be considered as the cause of obesity. People spend too much time watching television, surfing the internet, using computers, and Facebooking. All of these activities limit their physical activity. In addition, people’s tendency to consume unhealthy diets and life an unhealthy lifestyle is increased under the influence of constant advertising of unhealthy products on the digital media. Children experience many negative effects of obesity. Obese children cannot participate as actively in the physical extracurricular activities in school as their class-fellows. They might feel motivated to participate because of their inner talents, but their weight, figure, and obesity-influenced characteristics discourage them from making

The Role of a Woman Essay Example | Topics and Well Written Essays - 750 words

The Role of a Woman - Essay Example ge topic for many countries, especially the developing countries, it is with no doubts that the position that women hold in the society is greatly changing. In particular, the society has opened doors for women to conquer in vast areas while trying to support themselves and their families. Apart from taking care of their families, women now take part in businesses, leadership, and even the political arena. The capacity of a woman to decide whether to stay home with her family or to pursue a career is greatly impacted by what the society requires of them. It is with no doubt that a lot has changed since the earlier days when all decisions on money and careers were solely left for men. Today, educational opportunities are wide open for both sexes, and women are allowed to apply legally for practically any type of job. However, as much as women take up new and bigger roles in the society, they are still expected to take care of their families and homes. Generally, there is a notion that women are able to do it all. In essence, women are taught that they can be able maintain a home, raise a family, have a social life and manage their careers all alone. This results in a condition known as superwoman syndrome since it is theoretical impossible for a woman to do all this and still satisfy every aspect of her life. In fact, studies have shown that women who get help with child care and their housework are able to handle their work responsibilities more easily (Elliott,  47). By not delegating enough duties, women block their own path to career success as this makes their workload unmanageable. In this regard, women ought to choose where to put more emphasis between their families and their work. The society does play a great role in determining the kind of choices women make in terms of career and family duties. Human values and beliefs are based on what the society has put to be right and what it has displayed as wrong. Most of the society voices actually hinder women

Business organisation Essay Example | Topics and Well Written Essays - 2000 words

Business organisation - Essay Example 2007)†. Scientific management principals and tools were developed by emphasizing on extensive research and studies to provide a management solution to the managers who are considered as major stakeholders in the wellbeing of an organization. Fredrick W. Taylor is considered the pioneer in developing scientific management theories. He worked on the application of scientific methods to the labour management to improve their productivity. â€Å"He spent more than two decades passionately pursuing the ‘one best way’ for each job to be done (Robbins & Coulter, 2002)†. Scientific management call for the need of application of maximization of worker’s productivity by the application of appropriate and efficient work methodologies in the light of science, especially ergonomics. The industries at that time were production oriented and mass production, Fordism, and they required practices and procedure that were scientifically designed to optimize their work activities. Fredrick Taylor, who is called the father of scientific management, was a self-made man with his professional career spent in working within a labour intensive environment. Prior to scientific management, â€Å"Taylor worked as an apprentice to a pattern-maker, and as a machinist. He later joined the Midvale steel company as a labor rising in eight years to chief engineer (Hartman S.W. 2007)†. He worked in that environment observing efficiencies in work practices and thus created a desire to work upon the improvement of working methods. Taylor worked for years to develop optimal work methods and developed four principles, called principles of scientific management. Later Gantt and Gilbreth made some alterations in his theory but the basic theme remained the same. In addition, the idea was to break the tasks into simple and small parts and each part to be assigned to a particular person who has the capability and

Thursday, October 17, 2019

Analyze a website and present a case to the court Essay

Analyze a website and present a case to the court - Essay Example The area effect of explosive weapons causes death and injury not only to military combatants, but also to civilians, such as children, women and old people who clearly do not pose threat. This kind of harm is unacceptable because it has no justification. Although at present, there is no specific international treaty that prohibits the use of explosive weapons in densely populated areas, except perhaps for the use of cluster bombs which are banned by the Convention on Cluster Munitions, their use nevertheless, contravene basic human rights. The Universal Declaration of Human Rights, which should be abided by all members of the United Nations, proclaims that every person has the right to â€Å"life, liberty and security of persons.† Moreover, under the Geneva Convention of 1949, those who do not take direct part in a war are considered non-combatants and are therefore, must be, among others, free from violence to life and prison. Similarly, the Rome Statute of the International Criminal Court proscribes any attack against civilians. It is accepted principle under the international humanitarian law that the direct targeting of civilians violates the customary laws of war. The use of explosive weapons clearly breaches the principles enshrined in these treaties and customary laws.

Formulation of Strategy and Its Effects on Organizational Structure Essay

Formulation of Strategy and Its Effects on Organizational Structure - Essay Example If the strategy is effective, it would result in an efficient organizational structure and the organization would be able to achieve its goals successfully. Therefore, the following discussion takes into account the fact that the formulation of strategy takes precedence over the determination of structure of the organization. FORMULATION OF STRATEGY Formulation of strategy is highly important for the success of an organization. If an organization puts the right effort in the process of formulation of strategy, it would be able to design an effective strategy and thus the organization would reap long term benefits on the basis of that strategy. According to Lamb (1984), strategic management is a continuous process that controls and evaluates the business undertaken by the organization, evaluates the potential of its competitors of the organization, and it specifies goals and strategies for the organization in order to enable it to face the threats posed by the competitors, and then re -evaluates the efficiency and effectiveness of the strategy on a periodic basis. Strategic management also assumes the responsibility of determining whether the strategy requires any modification due the change in the external environment of the entity. The initial stage of strategy formulation is the determination of a mission statement for the organization. ... zation conducts an internal and external analysis of the entity in order to assess the threats posed to the organization by its environment and the opportunities that the organization possesses. One of such analyses is known as SWOT analysis which considers the strengths, weaknesses, opportunities and threats of the organization. SWOT analysis is used to assess the effectiveness of an already implemented strategy as well (Armstrong et al 2009). This analysis is highly important for the strategic core of an organization as it provides critical information regarding the environment in which the organization operates. By having such information, the management would be able to design such competitive strategy that would help the organization survive in the industry amidst the competition posed by its competitors. Internal analysis of an organization includes the evaluation of the resources possessed by the organization and the internal processes of an organization. The management evalua tes the resources possessed by the organization as compared to other organizations in the industry. If the organization possesses a resource that is available to that and that organization only, it can be given the status of the competitive advantage of the organization. Competitive advantage of an organization is a resource or a quality acquired by an organization that helps it survive in the industry notwithstanding the size and potential of its competitors. If the competitive advantage of an organization is identified, the strategic core of the organization can design the strategy in such a manner that it capitalizes over the potential of the organization’s competitive advantage. Competitive advantage of an organization may be the distinct quality of its products, a technology