Monday, September 30, 2019

Law in the Modern Times

Dietrich v The Queen Argued that there Is Immunity from conviction unless such a person In provided with counsel at the public expense. Mason C. J. And Brenan J. â€Å"The applicant is entitled to succeed because his trial miscarried by virtue of the judge's failure to stay or adjourn the trial until arrangements were made for counsel to appear the public expenseÃ'›. He was deprived of his right to a fair trial. † â€Å"Indeed, where there is no legal representation, and save in the exceptional case of the skilled litigant, the adversary system, whether or not It remains in theory, in racist breaks down † – Lord Devil.There Is an argued analogy with the united States Constitution, however as It Is based on their Constitution It has no parallel In Australian law. Could create difficulties – egg. Accused could demand counsel of a particular degree, skill or experience. Lack of representation may mean that an accused is unable to receive, or not receive a f ar trial. Brenna J. Whilst dissenting, Brenna acknowledges: â€Å"The entitlement of a person charged with a serious offence to be represented by counsel at public expense would be an important safeguard of fairness in the administration of criminal justice.Argues that our common law is different to other common law countries that have a Bill of Rights. â€Å"In the present case, there is no constitutional or statutory provision which supports the applicant's case. † â€Å"Every right or title must be enforced or administered in some form. † Deane J. â€Å"The entitlement of an accused person to a fair trial according to law Is recognized as the central thesis of the administration of criminal justice. † and right' which subjects innocent men t increased dangers of conviction merely cause of their poverty. However, viewed in the context of the overall trial, impropriety or unfairness could not have infected the verdict in the sense that it could not have advers ely influenced the final verdict which the accused was convicted. † Dawson J. The Trial Judge addressing Jury â€Å"The fact is he unrepresented, and you should make whatever allowances you believe appropriate for that fact. † â€Å"Entitlement to appear by counsel is not the same thing as entitlement to have counsel at the public expense. † â€Å"If he is convicted, an appeal cannot succeed merely because he was at a equidistant in being unrepresented. â€Å"There cannot be a miscarriage of Justice merely because an accused in unrepresented when he has no entitlement to representation. † Dietrich relied on Article 14(3)(d) of International Covenant on Civil and Political Rights: â€Å"To have legal assistance assigned to him, and without payment by him in any such case if he does not have sufficient means to pay for it. † However Dawson J. Believes that the common law can hold a fair trial with an unrepresented accused. Robinson v The Queen Man ac cused and convicted of murder in JamaicaMinority Judges dissented – found that accused had no defense counsel and a denial of such a right was sufficient to impair the trial. The UN Human Rights Committee responded to the trial of Robinson by stating that â€Å"the absence of counsel constituted an unfair trial. † In the common law country of Canada, the Charter of Rights and Freedoms holds that in serious offences, counsel is essential for a fair trial. Deane J. â€Å"Central of our criminal law†¦ That no person shall be convicted of crime otherwise than after a fair trial according to law. † Gaudier J.A trial is not necessarily unfair because it is less than perfect, but it is unfair if it involves a risk of the accused being improperly convicted. † â€Å"What makes a trial without representation unfair is the possibility that representation might affect the outcome of the case. † Miscarriage of Justice. Mason C. J. â€Å"By reason of the la ck of representation of the accused, the resulting trial is not a fair one, any conviction of the accused must be quashed by an appellate court for the reason that there has been a miscarriage of Justice in that the accused as not been convicted without a fair trial.Where an accused has no representation, proceedings should be adjourned to enable accused to find counsel. Paragraph issue? If the trial proceeds without a defense counsel, and the accused is convicted, the conviction will almost certainly be quashed. The notion that a trial Judge may be able to give helping hand to accused is illusory and bound to cause problems in course of trial. No Judges prepared to fashion a constitutional right to state-funded counsel. Murphy J. Is McGinnis: â€Å"Putting aside an accused to trial in a serious case is barbarous.

Sunday, September 29, 2019

Preparing a Virtual Workstation Essay

Abstract To be able to launch Windows 7 virtual machine on any computer in our labs without triggering the WGA antipiracy warning. Lab 1 Worksheet: 1 Preparing a Virtual Workstation Question 1: What is the current screen resolution? My current screen resolution is 800Ãâ€"600. I would have prefer this resolution, because I can slide between the virtual machine and my main computer. Question 2: What security advantage does displaying the login screen on resume offer? Some security advantages that displaying the login screen on resume offer is that it offers security from anyone coming along and taking a look at what you were working on. As well as gaining access to your computer and all your data. Question 3: How did changing the theme affect your display? Changing the theme will affect the cursors color, selections and icons. Question 4: What other file type option are available? The other file type options that are available is CD .ISO or DVD .ISO. Conclusion Based on Lab 1, I was able to launch Windows 7 in the virtual machine without triggering the WGA antipiracy. To know how to adjust the current screen resolution and the benefits of having a login screen on resume for security purpose. Finding that changing the theme for personalizing the computer and how to create an .iso image with Roxio Creator DX. References Zacker, Craig. (2012). Windows 7 Configuration Microsoft Certified Technology Specialist Exam 70-680. John Wiley & Sons, Inc.

Saturday, September 28, 2019

Policy Paper Essay Example | Topics and Well Written Essays - 2000 words

Policy Paper - Essay Example In Texas, two-year old Riley Ann died on the spot when she was supposedly flung to the other side of the room during an â€Å"obedience training session† with her mom and stepfather. (Callebs, S., 2007) According to the mother, the toddler was having difficulty saying â€Å"please† and â€Å"yes, sir†. Obviously, this situation has gone beyond reasonable. Riley Ann’s parents were sent to jail for parricide. In Montreal, Quebec, a 9-year old autistic boy was found lifeless in his classroom on April 17, 2008 due to suffocation from a therapeutic blanket wrapped around his head by his teacher as a punishment for being disruptive. (Glocwood, R., 2009) Corporal punishment for children is not a new thing. It has been practiced even before civilization as we know it. Since ancient times, corporal punishment on children has been recorded in literature, art and science. (Ten Bensel, Rheinberger, Radbill, 1997) In ancient Rome, corporal punishment was seen as both necessary and virtuous: â€Å"Most of the ancient philosophers and law-makers were in favour of flogging children, not only as a means of inducing them to conduct themselves well and tell the truth, but also an aid to education itself† (Scott, G.R., 1951). Even now some people even refer to the Bible which contains phrases such as Proverbs 23:13 that talk about disciplining children: â€Å"Withhold not correction from the child: for it thou beatest him with the rod, he shall not die.† According to early Christian sources, children’s obedience was a necessary element of family life. Didache 4-9 and Barnabas 19-5 warned parents not to withhold corporal punishment from son or daughter but to â€Å"teach [didaxeis] them the fear of God† from their â€Å"youth† (neotetos). (Horn, C. and Martens, J., 2009) For decades the right to punish or discipline children as families saw fit was considered a parental privilege. (Marotz, L., 2009) Different forms of punishment have

Friday, September 27, 2019

How the Vitamin War changed America Assignment Example | Topics and Well Written Essays - 750 words

How the Vitamin War changed America - Assignment Example Vietnam War badly shook public confidence in their government and an extraordinary number of Americans openly criticized their public institutions. The Vietnam War was lost inside America, and the victories and achievements on the war turf stood useless (Rother, 2007). The American Engagement in Vietnam took a huge economic toll on the country. The two decades of war necessitated huge human and financial resources. This resulted in a complete stagflation of American and European economies. Since the start of the war, the cost of living increased by 16% in 1970. Inflation led to complete wipe out of any economic gains that Americans could have had from their jobs. Others lost their jobs and still others saw their wages lowered to support the government spending on the war. President Lyndon Johnson asked Congress for extra taxes to help cover up the war expenses. There was only way he was getting this money; by cutting down on domestic spending. During this time, the government shut do wn many social programs to finance the Vietnam War, further incarcerating it in the public’s eyes. In the end, this war cost President Johnson his presidency. It made Americans skeptical about ever going to war again. Vietnam War taught Americans that there are limits to the supremacy of American power. America chose to remain out of world affairs for many years after the war (Rother, 2007). The Vietnam War changed the American presidency forever as well. People became more outspoken about putting a cap of presidential powers especially during war times. The â€Å"War Powers Act† of 1973 put an end to extraordinary presidential powers during wartime. The war also affected our military and Americans had a newfound respect and love for their soldiers that had never been experienced before. General Maxwell Taylor was one of the key figures during the war, he says, "first, we didn't know ourselves. We thought that we were going into another Korean war, but this was a diffe rent country. Secondly, we did not know our South Vietnamese allies †¦ And we knew less about North Vietnam. Who was Ho Chi Minh? Nobody really knew. Therefore, until we know the enemy, know our allies, and know ourselves, we had better keep out of this kind of dirty business. It's very dangerous." Many soldiers of the Vietnam War were young men, mere teenagers. They could not handle the stresses of war and indulged in drugs; marijuana was the drug of choice as it grew freely in Vietnam. At the end of the war, America welcomed thousands of men who had been scarred irreparably by the war. These soldiers could not be re incorporated into the society as they had no education or skills regarding anything but fighting (Brush, 2002; Wells & Gitlin, 2005). American culture during the Vietnam war was largely dictated by its image in media; and this I mage was not a good one. It was the first war in American history that was broadcast on television. This brought the war home for many pe ople as they witnessed the horrors firsthand. The nightly news counted the casualties everyday and people witnessed the bloody terror of bombings in their own living rooms. At the start of the war, the Vietnam War was depicted as a very positive event in American history, but s time passed the media and public view of the war changed drastically. It became a rat race among

Thursday, September 26, 2019

Assignment Example | Topics and Well Written Essays - 250 words - 69

Assignment Example The Hutu and Tutsi practiced different economic activities. The Hutus were farmers while the Tutsis were herders. Before the mid-nineteenth century, both communities had plenty of land for farming and grazing, however, the land became scarce as the population of the Rwandese increased (7). At one time, the country was the most densely populated in the whole of Africa. This overpopulation put a strain on the scarce land resources available in the country. The two communities started competing for the little land, with Tutsi wanting it for herding while the Hutus wanted to use it to grow crops. This competition escalated to tribal tensions which resulted in the 1994 genocide (9). Another reason given for the genocide was the way in which the Tutsi aristocracy treated the Hutu. This became a problem when the country’s Belgian colonizers treated the Tutsis with favoritism making the Hutus more like second class citizens (14). However, at the time of independence, the Belgians reversed their favoritism and now started supporting the Hutus in administration positions. This caused a lot of tensions between the two communities (15). The tensions were escalated by an economic turmoil and food shortages in the early 90s. In April 1994, the Rwandese president died after his plane was short down and this was the catalyst that prompted the unfortunate bloodbath that left hundreds of thousands dead Assignment Example | Topics and Well Written Essays - 250 words - 135 Assignment Example PRO stands for Public Relations Officer who handles all queries related to press so that image and reputation of company remains well protected. 2. In IT department, majority of the time people are exchanging IT terminologies that are not understood by employees and customers. There are some frequently used terminologies such as ERP in organizations that stand for Enterprise Resource Planning system that is responsible for handling all resource allocation tasks within the organization. 3. In Human Resource department, many laws are mentioned in the rules and regulations book so that employees are treated fairly such as MWA (Minimum Wages Act), EEO (Equal Employment Opportunity), LEP (Limited English Proficiency) Law, EDA (Employees with Disabilities Act) and many more. These laws are assumed to be understood by everyone and it is important for employees to gather information about them (HR Laws, 2012; LEP, 2010). In order to make sure that everyone has clear understanding about key terminologies so that there is no confusion for everyone, it is important for organizations to circulate a list of departmental factoids along with details about them so that they are able to ensure that everyone is on the same ground and business operations will be conducted smoothly. If employees have any confusion, then they should freely contact their supervisor who will provide them the right guidance to have a clear understanding about organization’s key terms that are exchanged among employees (HR Laws, 2012). Therefore, departmental factoids should be discussed extensively so that there are no problems in communication within the

Wednesday, September 25, 2019

Pharmacy Admission Letter Essay Example | Topics and Well Written Essays - 500 words

Pharmacy Admission Letter - Essay Example Once in a while I have participated in volunteer work to help the sick and the poor due to the call I have to care for the needy. At one time, I accompanied my parent in China and I volunteered to help the poor and the sick. I have been serious with my studies throughout my academic life after I scored a bad grade once when I enjoyed my freedom immediately I went to college. Since then, my academic track has been smooth and I have always maintained good grades in my area of study. I really like the program run LECOM Erie School of Pharmacy since it is possible to complete a Doctorate degree within three years instead of four years. The institution runs all year round curriculum hence they are able to complete their curriculum within three years. This is very encouraging especially to me since I am a sharp student and for this case, one spends less time in college. Having studied Psychology major and biology minor Case Western Reserve University, I have sound background in what is required for one to study a Doctorate of Pharmacy Degree. Since I have good background in the pharmacy area coupled with me being a fast learner, I believe the Doctorate of Pharmacy Degree fits my area of specialization.

Tuesday, September 24, 2019

Critically compare and contrast the arguments of classical and modern Essay

Critically compare and contrast the arguments of classical and modern liberals regarding the role of the state - Essay Example Upholding individual rights and ensuring equality of opportunity are considered to be better than theocratic rules, absolutism and totalitarianism. This ideology arose in the Age of Enlightenment; out of dissatisfaction with the interference of the Church and â€Å"the comprehensive political control and regulation of economic affairs† (Balaam, 2007:7) that prevailed. A liberal state neither seeks to resolve the conflicts of people on various matters of faith and life, nor interfere in the market economy. Instead, it â€Å"provides a neutral framework within which citizens can pursue their diverse conceptions of the good life† (Honderich, 1995: 483) and live together. Classical liberals favour religious tolerance over a religious monopoly. All liberals seek â€Å"the best form of government which will permit the individual to pursue life as he or she sees fit† (IEP, 2006). Liberal ideas now dominate many parts of the world. The USA was founded on the very principles of liberty, freedom and equality. Freedom is considered an ideal, which is only possible if people are allowed to be autonomous. The value of freedom â€Å"has its roots not only in Rousseau’s and Kant’s political theory, but also in John Stuart Mill’s On Liberty†¦ [and is still] a dominant strain in liberalism† (SEP, 2007). Liberalism prefers a limited role of the state because the state is perceived to be abusive of individual liberties, which leads to tensions between the individual and the state. Liberals believe that the tasks performed by the government must be limited to â€Å"tasks that individuals cannot perform by themselves, such as establish a basic legal system, assure national defence, and coin money† (Balaam, 2007: 50). Adam Smith, concerned with state interference in the market system, was a proponent of this view when he stated that the government’s role should be restricted to only doing work that private

Monday, September 23, 2019

Internet and Security Coursework Example | Topics and Well Written Essays - 1000 words

Internet and Security - Coursework Example He notes that the precise tools that are used for flattening the world (technology) are the same tool that can be used to unflatten the world. Responsible use of technology builds the universe while the selfish use of the same technology destroys the world and keeps societies distant. The other security concern is the economic security of the American people. The author expresses concerns that the American place as the economic powerhouse is threatened because of the attitude of the citizens and the government. The government spends mindlessly on wars and neglects the fundamental economy of the states. The citizens, on the other hand, idolize ideas and opinions that cannot bring economic growth to the nation. They, for example, idolize Britney Spears while their serious competitors idolize the resourceful Bill Gates (Friedman, 32). Social injustice in the global economic system: Thomas notes that the flattened world has caused a caste-like system where wealthy states are getting rich er while the poor countries are languishing in more poverty. Trade is focused between rich states while the poor countries are sidelined. The concern is that populations in poor nations will languish in perpetual poverty. Misuse of borrowed technology: The author loves the rate of labor transfer and the numbers of people coming from other countries in quest of knowledge in the USA. He regrets the misuse of this acquired knowledge, for example, in the 9/11n attack. The mastermind of the attacks, Osama, received his education in the US. The third ethical question insinuated in the story is unlawful labor outsourcing. It creates jobs for some but breeches professional ethos in some areas. By the time of publication of the book, there were no stringent laws regulating the business. An example is the online writing of assignments for some students by others.

Sunday, September 22, 2019

Christianity and the Secular Point of View of Gun Violence Essay

Christianity and the Secular Point of View of Gun Violence - Essay Example A political debate has also been sparked by these mass shootings over gun violence and gun control. In this perspective, the church has adopted a secular view with regard to these shootings. Drawing on the variety of literature, the paper will discuss Christianity and the secular point of view of gun violence/school shootings. Discussion The American Secret Service defines school shootings as the deliberate selection of a school as the location of the attack. The number of mass shootings and gun violence in the U.S is as rampant as the number of people living in America. According to figures from the US Department of Justice and Council on Foreign Affairs, there have been 60,000 people affected by gun violence and mass shootings in 2015 alone. As a result of the magnitude and effects of gun violence and mass shootings, the Church has adopted a secular view to the issue. Conversations about mass shootings often devolve around emotions. In the recent times, the Christians are agitating for their right to bear and own firearms. There is still debate on the effectiveness of guns used in personal defense. A survey carried out by the U.S Department of Justice placed the rate of using guns for personal defense at 1.6 million. However, this is twice the crime rates. The Christians share the view that the Bible was authored long before the gun was invented. It, however, mentions the use weapons in battles and wars. War is portrayed as something that is part of a fallen world (Mark 13:7; James 4:1).

Saturday, September 21, 2019

Human being Essay Example for Free

Human being Essay There has always been a concern as to why some people behave in some weird ways that not any ordinary person will act in such a manner. It is a fact that all individuals are different from each other but there are expectations that human beings have over others. That certain character trait should not be expected in a normal human being. A study into the issues of psychopath and sociopath will help to show some light to the question of how different persons can be described and classified in a view of understanding human behavior and human psychology. Who are psychopaths or sociopaths? According to Patrick (2007) a psychopath or a sociopath is an individual who displays unique unordinary behaviors as compared to the other normal human beings. Such an individual shows signs of not having any guilt or troubled conscience for something he or she has done which is wrong, likes putting blame on other people for the mistakes that he or she commits, likes lying all the time about several issues, do not value other people as fellow human beings, get involved in destructive actions fights and wars, some are sexually irresponsible, have low self control, not realistic in whatever they plan and do, and seem to attract the attention of others by portraying a false picture of themselves among other unordinary behaviors. What are the causes? As argued in Goldstein and Weiner (2003) there are some reasons that have been found out to result in the development of such character traits some of them include; in born traits that a person inherits from his or her family background, some could happen where the society in which people live in draws lines of behaviors that seem to be extra ordinary from the rest of others in the society, would come also as a result of the influences of the external environment and as a result of the adaptive strategies in a bid to survive in the world with others and the problems and experiences that a person underwent while growing will also contribute like if a person was exposed to violent circumstances in hi or her childhood the same things are likely to be done by that person. Is the female psychopath different from the male sociopath? How and in what way? Why is this important to understand? The way in which a female psychopath behaves tends to be more similar to that of their male counterparts although the ratio of male to female a bit higher. The kind of activities that they involve themselves in are the ones that will help to distinguish the differences but basically the same idea is that they all display behaviors that seem to be unruly, Berecz (1999). A female psychopath will show behaviors like; most of them would not want to get into a serious marriage commitment by staying with a husband but instead would prefer to stay alone with her children, would want to be draw the attention of the people around her, likely to mistreat her own children, she does not want to strive for anything that can help her but instead will want other people to do everything she is supposed to do for her benefit Million, Simonsen and Smith (2003). According to Gill and Barraclough (2007) such a female person is too proud of herself and could want to have all the things that others have to herself. In some cases will want to attempt suicide as a way to deal with her problems, all her life she will be blaming other people for the miseries she might be undergoing. She engages in criminal activities like conning people their belongings, leading people to crimes, are drug addicts of a high extent with their life styles leading to sex exploits and males and females they way she wishes for herself which in some instances could include killing. As discussed in Herve and Yuille (2007) the males will involve themselves in very many sexual relationships with women and will be able to convince women with a lot of ease to get into relationships with him. He tends to spend his money in a reckless way, like involving themselves in criminal activities like murder, violent robberies, once he marries he is likely to abandon his wife and children and being unfaithful to the other spouse. Involve themselves in ungodly acts like having sex with the animals, would like to cover his weaknesses with good acts like being generous with his wealth. They are also likely to drug addicts like alcohol, bhang among others. Conclusion According to the analysis that has been made above the way Female psychopaths behave is different from the way male sociopaths would behave because men are more energetic and will display the disorders that they have with relating with others by use of applying force in either fighting, car breaking , among other physical means of applying force. As for the females their disorders will be see through the various reacts that a female will undertake like her talking and other means of communication. They involve themselves in many sexual relationships and will get away with it from all the partners without admitting to that behavior among others Berecz (1999). Word count 876 References Alan Goldstein, Irving Weiner (2003). Forensic psychology: Forensic psychology. John Wiley and sons publishers. Christopher J. Patrick (2007). Handbook of Psychopathy. Guilford press. David Gill, Jennifer Barraclough (2007). Hughes’ outline of modern psychiatry. 5th edition, John Wiley and sons publishers. John M. Berecz (1999). Sexual styles: a psychologist’s guide to understanding our lover’s personality. Humanics publishing group H Herve, John C. Yuille (2007). The psychopath: theory, research and practice. Routledge publishers. Theodore Million, E. Simonsen, M. B smith (2003). Psychopapthy: Antisocial, criminal and violent behavior. Guilford press. .

Friday, September 20, 2019

How do the films address and represent indian national identity?

How do the films address and represent indian national identity? Its a fairly well-known fact that the Indian film industry is the most active in the world, producing more number of movies each year than any other (including Hollywood). Few of those films, however, reach the international market. Occasionally, however, a worthwhile picture causes enough people to take notice that it becomes a favourite on the international film festival circuit. The movie Roja (1992) and Bombay (1995) directed by Mani Rathnam crossed the National boundaries. Roja (1992) and Bombay (1995), which deals Kashmir terrorism and the riots in Bombay after the demolition of the Babri Masjid in Ayodhya by Hindu fundamentalists. Roja (1992), a patriotic love story against the backdrop of Kashmir terrorism, was dubbed from Tamil language and released in Hindi and other languages became a huge success all over the nation. The movie depicts a serious theme of ‘National Integration after the war between India and Pakistan on a territorial dispute in Kashmir borders. The local militants group of Islamist in Pakistan who seek to claim Kashmir initiated the war. The movie created an awareness of growing terrorism in Kashmir borders. Mani Rathnam was critically acclaimed for the theme chosen (National Integration) after its release. Roja revolves around one Mans love for his motherland and a wifes unfailing love for her husband. Rishi Kumar (Aravind swamy) is the lead (character) in the movie. Mani Rathnam films focus not much on individual characters but on complex plots and events of history. Roja won the national award for the best film and is regularly screened on Indian state television following Independ ence Day promoting â€Å"National integration†. It was a turning point in Indian cinema to portray a different genre with delicate music. The story line is about how a girl, who never crossed her village boundaries managed to bring her husband back from the terrorists trap in Kashmir. The message conveyed through the movie is wanted â€Å"peace† between the borders of India and Pakistan. Mani Ratnam always in his movie addresses the historical events of the nation that created any social difficulty. I will be analysing Roja, how it address the Indian national identity with key factors glorified in the movie. The movie was shot at different locations, southern and northern parts in India but the thrilling part was at Kashmir mountains where the terrorists set up their plot. The characters in the movie are well presented. The hero (Rishi) in negating his given religious identity in the first instance he embraces the terrorists leader saying hum ‘‘koi nahi hain† (we are none) but then he claims a name saying â€Å"hum sirf Indian hain† (we are Indians). It is also a kind of melodrama with a message of â€Å"National Integration† in it. (Ravi S.Vasudevan, 1996). The music of the film added success through emphasizing different Indian culture and the music was drawn on folklore, example in a song, gang of ladies singing and dancing with traditional Indian village costume depicting the National Identity. Much of Roja is set in Kashmir, which was formerly used as the major location for romance in Hindi movies, drawing on its association of earthly paradise, but which features rarely now because of political unrest and terrorism. One of the most memorable scene from the film is when the hero, Rishi, is taunted by his captors, Kashmiri separatists, who burn the Indian flag, where Rishi throws himself on it and catches fire, to the words of a song by the nationalist Tamil poet Subramania Bharathi â€Å"India is dearer to me than life† evoked the patriotism to intense. Music of the film represents the culture identities of different locations. The camera movements were glorifying especially in the chase scene where the hero Rishi (Aravind Swamy) tries to flee from the place where he was abducted by the terrorists. Cinematography of the film has been a major credit in representing the Indian National Identity through picturising the different geographical entity. It was watching thriller putting ourselves in the situation. Roja was well received by the audience in spite of some critical findings as it signifies peaceful relations between the two countries. The film turned to be huge success even catching the attention of international audience tapping into the growing fear of terrorists attacks across the world. Mani Rathnam second film Bombay (1995), has a central narrative of an inter communal marriage between a South Indian male and a Muslim girl in India, marked it as the most anxiously awaited film to be released. The board of censor and public response to the film were controversial after its release. The movie was dubbed from Tamil (south Indian) language to other different languages to spread the message of â€Å"unity† among the Indian religions across the nation. Bombay (1995) is a film based on communal riots, provoked by the demolition of the Babri Masjid (Mosque) by Hindu fundamentalist in December 1992. Mani Rathnam the director of Bombay has revolutionized the Indian Film Industry with technically strong films that are beautifully visualised conveying some kind of social message in it. It was the first film to portray the Muslim victims of the Bombay riots sympathetically. He sees his work as plea for peace between Hindu and Muslim. Instead, however it brought a permanently brewing conflict back to boil. He consulted Hindu majorities and Muslim minorities in this research. I believe that Mani Rathnam is concerned very much about the social issues happening across the country, that he gave a movie Bombay and a message in it. Indian audience come to theatre looking for some entertainment, so the movie is portrayed with social representations relied on melodrama and music. Religious conflict has addressed the national identity in film Bombay. The film Bombay begins as a romantic drama depicting the growing love between a Hindu man (Aravind swamy) and a Muslim woman (Manisha koirala). Bombay was an inspiration on the history of events that happened in December 1992. The Hindu fundamentalists around India, who demanded the building of a temple at Ramas (Indian god) birthday place in Ayodhya, on a site then occupied by the a mosque was demolished, which initiated the (Bombay riots).(Dwyer Rachel,2006). I will analyse the production, reception, theme and the national identity that the movie exemplify. The characters of the film are given great importance specifically, shekhar (Arvind swamy) a student studying journalism in Bombay and shaila banu(Manisha koirala) a Muslim schoolgirl in the village. Eventually, they both fall in love. The marriage proposal was denied by both the parents because of religious conflict. Shekhar with shaila elope to Bombay, where they start a new life away from their parents. Although Bombay and Roja solicit quite different sentiments, both arise from a similar subjectivity that of a hero presented with the characteristics notations of professional identity, cosmopolitan, ideological humanism, rationalism, and marginalization of religion. Although the film was about Bombay, it was shot in constructed sets at Madras. The art director Thotta Tharani constructed small town sets of Bombay in limited production value that looked like Bombay. Inspired by the documentation and re-creation of the Vietnam war, Rajiv Menon the cinematographer took for his models of ‘Apocalypse Now'( 1979 ) and the ‘Killing Fields (1984 ) to convey a heightened sense of reality in Bombay that was horrifying yet to be ‘stunning and beautiful (Lalitha Gopalan, 2005, p.21). The music by A.R Rahman was extraordinarily moving and the back ground score was emotionally evoking the sense of patriotism. The songs were beautifully picturised across South India and they portray different culture. Especially the song ‘Kannalanae/with my eyes depicts the Indian tradition of celebrating a marriage ceremony. Most of the Bollywood cinemas contain elements of music, comedy and melodrama, as the tradition and culture in India posses it. The film was set to be released in 1994 but a series of events involving the Board of Censors in Bombay and Madras, sensitivity to reminding Muslim of the campaign against them appears to underlie the censor boards deletion of the following visuals of the Babri Masjid and its demolition. The protests from two communal groups and the instructions from police delayed the film release until April 1995. Political and religious entity portrays the identity of the nation state. Bombay did not receive a warm welcome from the audience; instead several forms of protest were raised. The Muslim community started sending letters to editors of newspaper and many theatres were ransacked. Director Rathnam has shown great courage in making this picture (bombs were thrown at his house after its release), showing the aversion towards the subject. Later the movie was a great success in spite of chaos happening all over the country. The movie crossed the National boundaries and gained some international recognition. Bombay brings out the climax scene very well showing a human chain symbolically denoting the end of riots and reunites that still remains memorable. The film thereby sets out a symbolic representation of a common enough past, present and future logic. The film is an appeal for unity and peace in Hindu and Muslim within the nation. Roja and Bombay are the films which engaged with contemporary issues about Indian nation state. There is a suggestion here that the films vision of bringing to an end of antagonism nevertheless entails the reproduction of difference. The film projects a transcendent secular modernity and national identity square with its production. These films offered a universal identification to Indian cinema. Broadly speaking Nation can defined in seven ways in Indian subcontinent. They are Ancient civilization entity, composite culture, political entity, religious entity, geographical territorial entity and unity of Nation. Roja and Bombay is composed of all these entities represent the National Identity. Robert Pascals Theory on Icy Moons | Analysis Robert Pascals Theory on Icy Moons | Analysis In Robert Pascals research article, Physiochemical Requirements Inferred for Chemical Self-Organization Hardly Support an Emergence of Life in the Deep Oceans of Icy Moons, Pascal presents different hypotheses of the formation of life on icy moons compared to life on Earth. Liquid water, free energy, and organic matter are the three essential components to start the origin of life. In addition, the complexity of the environment and the structure of the entity itself are also essential to the formation of life. On these icy moons, Pascal states that there would have been an event which was highly unlikely, taking place to combine these components. These events are considered, because our knowledge of astrobiology is only limited within the parameters of Earth. On icy moons, life will be significantly simpler than of life on Earth due to the insufficiency of the components used to start the origins of life. The first component is liquid water, water plays a major role in creating life on Earth and most of the living organisms on Earth grow in wet environments. The properties of water being a solvent and to be able to dissolve mostly everything allow organisms to evolve in different environments. The second component is organic matter which is present in minerals. Organic matter is combined together with water and energy in a long process to help the entity grow its structure. The third component is energy which allows an endergonic reaction to take place to create a chemical reaction with water and organic matter. Kinetic barriers are also formed by existing energy around the entity which depends on the temperature in the environment during the origin of life process allowing system to maintain its equilibrium state and further evolve. In addition, the entity must be capable of reproducing itself leading to the evolution of the entity. The second law of thermodynamics is applied to demonstrate how the entity maintains its equilibrium state coupled with a form of stability, called dynamic kinetic stability (Robert Pascal, 2016) which enables the entity to reproduce itself towards an irreversible stage. Considering all theories and conclusions researchers have come to, Pascal states that the final parameters which determine how the origin of life will be formed is the covalent bonds of the entity relative to the liquid water around it, the temperature of the environment where the entity resides, liquid water, and an energy source equivalent to light. The origin of life of different extra-terrestrial systems depends on the complexity of the evolution of the entity and the complexity of its environment. The oceans on Jupiter and Saturns icy moons have a significantly lower temperature environment compared to the Earth, with no light or alternative energy source that would reach the entity to start any kinetic irreversibility leading to a conclusion that an event that was highly unlikely would have taken place to start the origin of life process in the oceans of the icy moons. It is believed that on the icy moons, chemical gradients are contained between the crust and the ocean which meets the criteria of the origin of life on Earth. Pascal uses the knowledge of astrobiology within the parameters of Earth to present three hypotheses about how life would form on these icy moons. The first hypothesis is called panspermia, which is the theory of the origin of life would have originated from microorganisms from outer space, which upon reaching a suitable environment, is able to initiate life. The second hypothesis considered entities that have experienced conditions that would allow the entity to take in liquid water through the environment and solar energy by exchanges through the atmosphere. The second hypothesis was deemed incompatible as the time duration of the process would be too short for the process of chemiosmosis. The third hypothesis was the subduction process in the ocean which would have activated chemicals capable of feeding the chemical protometabolisms. This shows that including the present day knowledge of astrobiology and the origin of life process, the origin of life process in the oceans of icy m oons must also include an event that would be highly unlikely of taking place as the formation of life on different extra-terrestrial systems depend on the complexity of its environment and the evolution of the entity itself. In Pascals Physiochemical Requirements Inferred for Chemical Self-Organization Hardly Support an Emergence of Life in the Deep Oceans of Icy Moons, the information in the hypotheses about the formation of life on icy moons are limited, because our knowledge of astrobiology is only limited within the parameters of Earth. Reference List Earth, P., Panspermia, H. and Panspermia, R. (2017). PANSPERMIA THEORY origin of life on Earth directed panspermia lithopanspermia meteorites Panspermia Theory. [online] Panspermia-theory.com. Available at: http://www.panspermia-theory.com/ [Accessed 20 Mar. 2017]. Khan Academy. (2017) Khan Academy, [online] Available at: https://www.khanacademy.org/science/biology/history-of-life-on-earth/history-life-on-earth/a/hypotheses-about-the-origins-of-life [Accessed 20 Mar. 2017].

Thursday, September 19, 2019

Computers :: essays research papers

COMPUTERS Could one imagine what the world would be like today without computers? For one, I would not be typing this paper right now. Computers were actually developed in early history. The first major use for a computer in the U.S. was during the 1890 census. Two men, Herman Hollerith and James Powers, developed a new punched-card system that could automatically read information on cards without human intervention (Chaney 52). This caused many other people to develop computers for various tasks. Each new computer helped to perform a different function and make it easier. Eventually IBM made a computer that could perform various tasks such as: figure out equations, store data, and draw graphics (Chaney 53). From there the computer industry exploded. Now computers have changed many aspects of life. Computers have had a major effect upon business. One area deals with the advertising industry. It has completely re-arranged the advertising business. Before computers companies used to advertise only on magazines, billboards, and T.V. The internet has spawned a new world for advertising. If anyone has ever been on the Internet; they know that it is a major contributor to this. Instead of companies paying around 1 million dollars to advertise for a 30 second commercial during the Super Bowl; they could just pay a certain amount to be advertised forever on the net. People can also notice the changes of advertising on the T.V., also. Not until the last few years have people noticed that a great deal of the commercials on T.V. are computer-related. These two combined have made the advertising businesses boom. Not only just on the T.V., but also on the net. Another area affected is the stock trading business. Computers have actually hurt the majority of stock brokerage firms. The reason is because computers allow it’s users to have access to the same information the actual brokers have. They can log onto the internet and go to their online firm to download information on stocks. This way they have the knowledge to trade and buy stocks for themselves without paying a certain percent to the broker. People can become a member of online firms such as: Ameritrade, DLJ Direct, SureTrade, and others. Here they can trade for a mere $8-$10 dollars. People also have responded th at they feel more comfortable when they have total control of their money ( Maney 45). A final area deals with the actual computer-related companies. Computers :: essays research papers COMPUTERS Could one imagine what the world would be like today without computers? For one, I would not be typing this paper right now. Computers were actually developed in early history. The first major use for a computer in the U.S. was during the 1890 census. Two men, Herman Hollerith and James Powers, developed a new punched-card system that could automatically read information on cards without human intervention (Chaney 52). This caused many other people to develop computers for various tasks. Each new computer helped to perform a different function and make it easier. Eventually IBM made a computer that could perform various tasks such as: figure out equations, store data, and draw graphics (Chaney 53). From there the computer industry exploded. Now computers have changed many aspects of life. Computers have had a major effect upon business. One area deals with the advertising industry. It has completely re-arranged the advertising business. Before computers companies used to advertise only on magazines, billboards, and T.V. The internet has spawned a new world for advertising. If anyone has ever been on the Internet; they know that it is a major contributor to this. Instead of companies paying around 1 million dollars to advertise for a 30 second commercial during the Super Bowl; they could just pay a certain amount to be advertised forever on the net. People can also notice the changes of advertising on the T.V., also. Not until the last few years have people noticed that a great deal of the commercials on T.V. are computer-related. These two combined have made the advertising businesses boom. Not only just on the T.V., but also on the net. Another area affected is the stock trading business. Computers have actually hurt the majority of stock brokerage firms. The reason is because computers allow it’s users to have access to the same information the actual brokers have. They can log onto the internet and go to their online firm to download information on stocks. This way they have the knowledge to trade and buy stocks for themselves without paying a certain percent to the broker. People can become a member of online firms such as: Ameritrade, DLJ Direct, SureTrade, and others. Here they can trade for a mere $8-$10 dollars. People also have responded th at they feel more comfortable when they have total control of their money ( Maney 45). A final area deals with the actual computer-related companies.

Wednesday, September 18, 2019

The Saga of the Tigua Indians Essay -- Tigua Indians Native Americans

The Saga of the Tigua Indians The Saga of the Tigua Indians is an amazing one. By all reasoning they should have been wiped out long ago. There quiet defiance to change, however, has carried them through. From the height of civilization to near extinction the Tigua have remained. They endure imprisonment by the Spanish, oppression and manipulation by everyone that followed. This is the story of a people thought to extinct, that are once again learning to survive. Early histories of the Tigua Indians are conflicting and largely untrue. Since 1680 it had been believed that the Tiguas were traitors to the Pueblo Nation, and had chose sides with the Spanish during the Pueblo Revolt. Upon the Spanish retreat south it was believed that the Tiguas chose to flea with the Spanish Military. The truth of their migration south is somewhat different. The Tigua are direct descendants of the Pueblo Indians of Isleta, New Mexico. There name Tigua, or Tiwa, refers to the dialect that they speak. Long before they founded Isleta, however, they were the inhabitants of a much more spectacular home; the fabled city of Gran Quivira, the golden city that drew the interest of Coronado. By 800 A.D. the city covered seventeen acres. T its height it had twenty housing projects built in the form of towering apartments, when most of Europe was nothing but primitive tribes. Terraces, garden apartments, churches, workshops and kitchens separated these projects. The masons w ere so skilled that the stones required no cement, and the carpenters cut wood in a way that the beams required no nails. When the Spanish finally found this city of legends they ere so impressed that they called it Pueblo de los Humanas, or the City of Human Beings. Then they went about destroying the city and the people forcing them into exile. This marked the beginning of centuries of abuse. From relocation to theft the Tiguas were to become the plaything of Europeans and Americans alike. In 1680 the majority of the Pueblo Indians in New Mexico staged a revolt against the Spanish. On the whole the Tigua did not join the revolt. Some believe this is an indication that the Tigua were loyal to the cross and to Spain. This is not entirely accurate. As the southernmost pueblo, location probably had more to do with the fate of the Tigua then anything. The news of this revolt led by an Indian named Pope had... ...se. The tribe is currently building many welfare programs, educational programs, establishing health benefits, plus laying aside money to distribute to the entire tribe. The money is currently collecting interest in a trust until the Bureau of Indian Affairs gives approval to a distribution plan. The lawsuits to reclaim the land have been put on hold. The Tigua are getting what they want through the casino. They are by choice quietly buying land that is legally theirs anyway. Though they are the rightful owners, the Tigua do not wish to make a big scene. They prefer to achieve economic independence on their own, hopefully reducing the chances of being taken advantage of again. Only six full-blooded Tigua remain, and they still plow and keep their traditional lands. They continue to teach children and grandchildren how to be Tigua. Works Cited 1. Ysleta del Sur Pueblo Archives (the Tigua file. / (S.l. / 1992-1993 FILM 22,186 REEL 1 Center for American History FILM 22,186 REEL 2 Center for American History FILM 22,186 REEL 3 Center for American History 2. Exiled : the Tigua Indians of Ysleta del Sur. Randy Lee Eickhoff. Plano, Texas, Republic of Texas Press, 1996.

Tuesday, September 17, 2019

The Iliad and the Fate Of Patroclus :: Iliad essays

The Iliad and the Fate Of Patroclus      Ã‚   Throughout The Iliad Of Homer, the constant theme of death is inherently apparent.   Each main character, either by a spear or merely a scratch from an arrow, was wounded or killed during the progression of the story.   For Zeus' son, Sarpedon, it was a spear through the heart, and for Hector, it was the bronze of the mighty Achilles through his neck which caused his early demise.   It seems that no one could escape an agonizing fate.   Of these deaths, the most interesting and intriguing death of all is that of Achilles' dear friend Patroclus.   Although his life was taken by the mighty Hector's spear, who was truly liable for his death?   The intricate story line of The Iliad makes many possible answers available, but only one possibility accurately explains the actions and events that led to this gruesome episode. Patrocles was responsible for his own death.      Ã‚  Ã‚  Ã‚   First of all, Patrocles was responsible for his own death because he requested his insertion into the battle, fully knowing that the Achaeans were being unmercifully defeated.   In Book XVI , Patroclus said,      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   " Send me forth now at the head of the Myrmidon host   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   That I may be a light of hope to the Danaans.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   And let me strap on my shoulders that armor of yours   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   That the zealous Trojans take me for you and quickly   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Withdraw from the fighting."      Ã‚  Ã‚  Ã‚   Because Achilles refused to help the Achaeans battle the Trojans, a discontented Patroclus took the matter into his own hands by requesting activation into battle disguised as Achilles in the hope of sending the Trojans into a full retreat from the sight of him.   It is apparent that Patroclus was willing to fight although the odds were greatly against him.   His vehemence towards the Trojans coupled with his disappointment of Achilles gave him the drive to conquer the Trojan army with or without the aid of Achilles.   In doing so, Patroclus took an enormous risk that the Trojans would fall for his trick, a risk with his life as the stakes.   Essentially, while pleading to Achilles for battle, it was his own dark death for which he plead.

Monday, September 16, 2019

Communication Technologies Essay

In this assignment I am going to describes different types of communication devices. For example Switches, Routers, etc. Then I am going to explain the principles of signal theory. After this I will look at difference methods of electronic communication and transmission used. Communication Devices Switches – These are mainly used for local area networks (LAN). The reason behind this is that they can be used to bridge a lot of computers together. They do look like hubs but they can vary in speed. They are more intelligent due to the fact that they can send out packets from a set port. There is advantage of using a network switch, they can be used with an Ethernet cable or a fibre optic cable and they still will work perfectly fine. When connecting a router or a server in an LAN or WAN network it is slightly easier because you would just need one cable which would mostly need to a fibre optic cable, so you can get the maximum rate of transfer speed. Routers – They are mainly used for connecting one network to another. They are meant for handling information and forwarding to another network connected to the router. You can either connect using wireless or a cable. Normally an Ethernet cable is used to connect the computer networks. Hubs – Also known as a concentrator or a multiport repeater. Used in a star or a hierarchical network setup to connect the station or the cable segments. There are two main types of hubs: passive & active. Active takes the incoming traffic, amplifies the signal and then forwards it all the ports. In a passive hub it simply divides the incoming traffic and forwards it. A hub can be used to manage and allow individual port configuration and traffic. Hubs operate on the physical layer of the OSI model and they are protocol transparent. This means that they do have the ability to set upper layer protocols such as IP, IPX or a MAC addresses. Hubs just extend them do not control the broadcast or collision domains. Bridges – Used to increase the performance of a network by dividing it into separate collision domains. Even though they are more intelligent than hubs due to the fact that they operate at the Data Link layer of the OSI model, they still are not able to control the upper layer protocols. On a separate segment they store the MAC addressing table of all nodes. Basically it takes the incoming frames and checks the destined MAC address and lookups it up against the store MAC addressing table and decides what to do. If the frame is comes from the same port as the destined port than it simply discards the frame. If the destined location is not known than it will be flooded throughout the outgoing ports and segments. Repeaters -One of the less complex hardware of the networking world, because it basically runs at the physical layer of an OSI model, so it is not aware of the frame formats and upper layer protocols. Repeater basically is used to expand a LAN network over large distance regenerating a signal. When using a repeater remember the 5-4-3 rule which means that a maximum distance between two hosts on the same network is 5. Use only maximum of 4 repeaters in a network and only 3 segments can be populated. Gateways – Very intelligent devices, they work at the Transport Layer protocol. This is higher than the Upper Layer protocol. This means that can manage and control IP, IPX and MAC addressing. They allow IPX/SPX clients to IP/TCP uplink network to connect to the internet. A gateway in simple terms is like a post office. All the information is sent to it and then as a post office knows the number of houses in the area in the same way a gateway would know all the ports and direct it there. Cell Phones – It is a piece of device which is used by a lot of people. It is a portable version and more advanced version of a normal home phone. It lets you voice calling, text messaging, the some other advanced phones even allow video calling and internet browsing. Cell phone is a full duplex device therefore you can connect it to your computer and use it as a modem even though it would be very slow. The newer released phones are somewhere near capable of the proper modem speeds. DCE & DTE devices – Data Communication Equipment (DCE) is basically equipment which allows communication with a Data Terminal Equipment (DTE). In another words DTE ends the communication line and a DCE provides the path of communication. An example of an DCE is an modem and a computer is a DTE. Fax Machine – A device which allows you to send paper copies using PSTN lines to other people. It can also be used to send memos and other information as well. It uses the phone line to transmit the data that is sent. A fax machine has a sensor to read the data and the end of it. It will encode the black and white that it picks on the paper and moves it to the receiving end. It will compress the data before transmitting it. As soon as it receives the data it decodes and decompresses the data so it can arrange it in the way that it scanned it from the original document. There are a lot of things in a fax machine that allow it to do its function. It consists of a source projecting a light beam, a rotating cylinder and a photo electric cell. It also has paper feed like a printer. E-Mail – Email also which is the short form for electronic mail. You can use e-mail to stay in contact with your friend/family even colleagues. It does it by finding out the person you want to email he’s email address and then you will send him an email and click send and then that person will receive it. Signal Theory When talking about signal theory data is represented by digital format which is dependent on binary or base 2 principles. Analogue and digital frequencies are used for transmitting signals along a medium link. Analogue records the waveform as they are. Digital on the other hand turns the analogue signals normally to sets of number. Analogue signals can have varying amplitude and frequency. Amplitude analyzes the loudness of the signal and Frequency determines the pitch of the signal. â€Å"Pitch† mostly used to refer to low and high notes. If the frequency is lowered than you get a low note and if the opposite is applied than you get a high note. Bit is a binary digit which represents value of 0 which is normally off and 1 which is normally on. Bit can also be referred to as a electrical pulse which is generated by the inner clock in the control unit or data register. Bit can also be used for digital electronics which is another system that uses digital signals. Manipulation o f a bit within the memory of a computer can be kept in a steady level on a storage device as a magnetic tape or disc. Byte which is made up of 8 bits is a unit measurement used for information stored on a computer. Synchronous & Asynchronous Communication To sum up synchronous communication it is when interaction with data takes place it is done in real time. On the other hand asynchronous or delayed communication is when any data which is archived or stored and accessed later. It is important to choose the most effective delivery mode because it directly impacts the level of interaction that is going to take place. Synchronous It does not use start or stop bits but instead it synchronizes the transmission speed with receiving and sending end of transmission using the clock signals specifically built for each of the components. After this constant streams of data are transmitted between two sources. Because no start or stop bits are involved data transmission is faster, but more problems occur because if latency takes into effect then the synchronization clock will be out of timing therefore the receiving node will get the wrong timings that have been acknowledged in the protocol sending and receiving data. If this happens then data can be corrupted, missing or even wrong message. There are ways around this which take time. You could use check digits and re-synchronize the clocks so that you can verify that the transmission has been successful and has not been interrupted. Advantages of using synchronous transmission are that lower overhead and more data can be transmitted and data transmission rates are al so faster. The drawbacks of using synchronous transmission is obviously more prone to problems, it is more expensive and more complex. Asynchronous Opposite to synchronous it uses start and stop bits to mark the start and end of a transmission, this means that 8 bit ASCII characters would be transmitted using 10 bits because the use of start and stop bits. For example (1)10111111(0) the bracketed out one and zero at the start and end mark the start and end of a transmission. This tells the receiving either the first character is transmitting or finished transmitting. This method of transmission is normally used when data is sent occasionally as opposed to in solid stream. Benefits of using asynchronous data is that it works out cheaper because timing is not that important and it is also simple because both end do not require synchronization. Drawback are that if a large amount of data is to be transmitted it would take a long time this is because a lot of bits are only for control uses they do not contain any useful information. Bandwidth is used to define how much volume a medium can transmit. Basically it is the maximum rate at which data can be transmitted across mediums. The more bandwidth a wire can handle the higher transmission rates can be achieved. It can also high transmission rates for multiple users. But there are restrictions in place such as if a user has been transmitting a lot of data between a period of time then a temporary limit will be put on. This is quite common with ISP’s. To stop this happening to you best thing to do is not to download a lot at the same time and also close programs which use the bandwidth continuously. Radio Transmission Radio is a way of transmitting signals using varied tones which convey a message of electromagnetic waves with a frequency. Electromagnetic radiation travels in direction of oscillating electromagnetic fields which go through the air and vacuum of space. Changes in radiated waves such as amplitude, frequency or phase allow information to be carried systematically. If the radio waves pass through electrical conductors the oscillating fields induce an alternating current in the conductor. This could be detected and changed into sound or any other type of signal which is able to carry information. Every radio system has a inbuilt transmitter this is the source which allows electrical energy that produces a alternating current of a desired frequency of oscillation. The inbuilt transmitter also has a system which changes some properties of the energy produced to impress a signal on it. This change could be as simple as turning the signal on or off. Change could be more complex such as alternating more subtle properties such as amplitude, frequency, phase or combination of all three properties. The modulated electrical energy is sent via the transmitter to an antenna. Antenna changes the alternating current electromagnetic waves; this allows the waves to transmit in the air. There are drawbacks of using radio. First is attenuation can happen, this basically means the longer the wave has travelling to get to its destination the more weaker it gets. Most obvious example of this would be someone listening to FM radio in the midlands; the further he goes away from the midlands the more signal gets weaker. Microwave An electromagnetic based wave which has a range or wavelength of up to 30 GHz. Currently microwaves are getting more popular due to advancing technologies. Microwave offers high bandwidth at low cost. Most common problem with microwave transmission is reflection. Microwaves are common used for radar which pickup planes and helicopters flying in the air. Microwaves will hit the plane or helicopter and reflect back and gets calculated giving the position of the flying object. Waves are reflected due to a barrier which stops the wave from going further so it hits the barrier and reflects back. Reflection affects the signal if the reflection is not good then the reflection won’t happen therefore a dead or a blank signal will be received. To minimize the effect try staying close the satellite. Wireless protocols such as Bluetooth use microwaves to transmit. Satellite Satellite is a orbiting piece of hardware which has been left floating in the air from big companies like Microsoft, satellite can be used for communication. There are also other types of satellites which are used for spying or used for online maps such as Google maps, Microsoft live maps or another services. Satellites provide high bandwidth solutions. Satellite is categorized as a WAN because it uses high speed & long distance communication technology which allows them to connect to computers. Attenuation also affects satellite connection due to the same reason. If a satellite is not in the required position and starts transmitting signal it will not reach television so they might not work properly or correctly. Satellite dish has to be in the same direction as the satellite. Satellite signals reach television using a transmission antenna which is located at an uplink facility. The facility has an uplink satellite dish which would be around 9-12 meters in diameter. The bigger the diameter of the satellite the more accurate signals and better signal strength from the satellite is received. The satellite dish would be pointed towards the satellite and the uplinked signal is received by the transponder at a certain frequency. This frequency is normally C-band (4-8 GHz) or KU-band (12-18 GHz). The transponder then retransmits the signal back to the earth. NTSC, PAL or SECAM are three broadcast standards used through out the world. NTSC is normally used in the US, Canada, Japan, Mexico, Philippines, South Korea and other countries. PAL which stands for Phase Alternating Line is an colour encoding system which is used by over 120 countries in the world. In a few years time most of the countries will stop using PAL and either change to DVB-T SECAM It is sequential colour with memory is the analogue colour television system. SECAM was Europe’s first colour t elevision standard and France currently uses it. The analogue signals for the three broadcasting types are transmitted via a satellite link scramble or unscramble. The analogue signal is a frequency modulated and transformed for a FM to something called baseband. The baseband fuses the audio and video sub carrier. The audio sub is further demodulated to provide a raw audio signal. Digital TV’s that transmit via satellites are normally based on open standards such as MPEG and DVB-S. MPEG which stands for Moving Pictures Experts Group is a compressed format which code moving pictures and associated audio information. There is also MPEG 2 which is a digital television signal which is broadcasted via terrestrial cable and direct broadcast satellite TV systems. DVB-S which stands for Digital Video Broadcasting is a standard for satellite TV’s which forward error coding and modulation. It is used by every single satellite that serves a continent. Standards Organizations There are difference types of standard organizations. These are the various types of standard organizations TIA/EIA, RS-232, IEEE, ISO, OSI and Manchester Encoding. ISO/OSI – International Standards Organization’s Open System Interconnect (ISO/OSI) is the standard model for networking protocols and distributed applications. ISO/OSI defines seven network layers. 1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application I will be only be explaining in-depth the first network layer: Physical. This layer defines what cable or physical medium to be used. There are lots of different types of cable thinnet, thicknet, TPC, UTP. All of these mediums are functionally the same. The major difference between the various cables is the cost, convenience, installation and maintenance. Converters from one media to another operate at this level. TIA/EIA – Telecommunications Industry Association & Electronics Industries Alliance (TIA/EIA), state the standards which should be used laying cables in a building or a campus. TIA/EIA describes how a hierarchical topology should be laid out. A system where a main cross connect system is used and connected using a star topology using a backbone cabling through a intermediate or a horizontal cross connect. This type of cabling or similar is also used for laying out telecommunication cables. The backbone cabling method will be used to connect the entrance facilities to the main cross connect. In areas such as office a horizontal cross connect for the consolidation of the horizontal cabling, which extends into a star topology. Maximum stated horizontal cable distance should anywhere between 70M-90M. This applies to TTP (Twisted Pair Cable), but the fibre optic horizontal cabling has a set limit of 90M. IEEE – Institute of Electrical and Electronics Engineers allows the development of â€Å"Electro Technology† which in other words applies to electricity applied to technology. Societies like the IEEE Computer Society are subsidiaries of the IEEE itself. This standards organization also publishes journals. Devices such as digital camera need set amount of bandwidth speed so it uses a IEEE plug. Any device that uses the IEEE standard uses a twisted pair cable. Signalling Standards NRZ- It stands for Non Return to Zero. It is a binary code normally used for slow speed synchronous and asynchronous transmission interfaces. Ones is represented as a small voltage and zero is negative voltages. They are transmitted by either by set or constant DC voltages. It also uses additional synchronisation so it dose not lose any bits in the process. NRZ-L – Non Return to Zero Level is similar to NRZ, but it not a binary code. Same as NRZ one is represented as small voltage, but zero is also represented as a small voltage but it is not as big voltage as one, Therefore it allows more data to be send without a lot of signal change. NRZ-M – Non Return to Zero Mark again similar to NRZ, but one is actually represented by a change in physical state and zero is represented as change in physical state. This basically means that there is no voltage when there is no change in physical state. RS-232 – This standard applies to serial data transfer such as the 9 pin serial connecters which are commonly used on a computer motherboard. The data is sent in as time series of bits. Synchronous & Asynchronous is both supported by this standard. This standard and states the number of control circuits that can be or need to be used to connect the DCE & DTE terminal with one another. Data and control circuits which are signalled from a DTE connected to a DCE or vice versa will always flow and operate in one direction this is called half duplex. Only full duplex allows data to be sent and received in both directions at the same time. Manchester Encoding – Data bits which are represented by transitions from a logical state another is called Manchester encoding. This is a digital type encoding. In this encoding the signal is self clocking because the length of every data bit is set by default. Depending on the transition direction the state of the bit can be analyzed. In Manchester encoding the signal synchronizes itself. This is an advantage because this will decrease the error rate and optimize the reliability. But on the other hand it is also a disadvantage because the amount of bits sent in the original signal when transmitted has be twice the amount of bits from the original signal. Differential Manchester – Also known as Conditioned Diphase (CDP). It is a encoding method which uses data and clock signal as fused to create a self-synchronizing data steam. Similar to Manchester encoding it uses present or absent transitions to represent logical value. TTL – Transistor Transistor Logic is a binary code which either uses high voltages between 2.2V and 5V to represent one and no voltages between 0V and 0.8V to represent a zero Name Specification Maximum Length/Speed Advantages Disadvantages Cat.5 Cable RJ45 Connector. Made from Copper, PVC, Plastic Length:100 M Speed:100 Mbit/s Cheapest type of cable, Mostly unshielded & more prone to electrical noise. Cat.6 Cable RJ45 Connector. Made from Copper, PVC, Plastic Length:100 M Speed: 10 Gbit/s Very fast transmission. Unshielded & more expensive than Cat.5 Cat.7 Cable RJ45 Connector. Made from Copper, PVC, Plastic Length:100 M Speed:100 Gbit/s Extremely fast and less interference Incredibly expensive and mostly likely be manufactured till 2013 Bluetooth Mostly Copper for the circuitry, Plastic for casing. Length: 100 M Speed:1 Gbit/s Send from cell phones, do not need wires to connect, Most of the phone are equipped with it Open and other people can access your phone if not protected. Quite slow when sending and receiving on a cell phone. Infrared Receiver, Antenna and Transmitter, Copper & Plastic Length: 40 km Speed: 4 Mbit/s Shorter wave than microwaves, not as harmful. Less interference. Microwaves Antenna & Receiver. Length: 1 M Speed: 300 GHz Good for sending data over longer distances Dangerous, if something that uses microwaves e.g. cell phone for too long. Too much interference Wi-Fi Wi-Fi Signal Transmitter. Length: 95 M Speed: 5 GHz Usable anywhere in the house, can even be used as a hotspot in public places e.g. airports, cafà ¯Ã‚ ¿Ã‚ ½, etc Other people can also access it so many connections can make it slow. Satellite Dish and a satellite in orbit Length: 22,000 Miles Speed: 40 Mbit/s Connection from anywhere in the world. Delay of up to 500 millisecond due to rain or moisture Fibre Optic LED/Laser Connector. Glass, Plastic, PVC. Length: 40,000 Speed: 10 Gbit/s Extremely fast speeds can be achieved without the use of switches, hubs, etc over long distances Simply expensive to buy. Radio Transmitter & Receiver Length: 100 Miles Speed: 300 GHz Available anywhere in the world. Very limited range and gets easily affected by interference. Name Specification Advantages Disadvantages Coaxial Diameter: 6 mm / Resistance: 85.2 km Capacity: 70 km at 1KHz Cheap. 500 meters length. It very reliable Expensive and hard to install Fibre Optic Diameter: 2 microns. Good for transmission over long distance because it is immune to magnetic interference. Electrical interference protected. Stretches up to 3000 meters. No noise is generated Very expensive and over time the sent signal will get weaker because of signal reflecting. UTP/Cat.5 Foiled and uses copper wire. Stretches up to 100 meters. Easy installation and transmission rates reaching up to 1 Gbps. Very open to interferences. STP Foiled and also uses copper wire. Shielded. Length up to 100 meters. Transmission rates between 10-100 Mbps Expensive heavy and big in physical size. Radio Uses antenna to transmit. Signal can be refracted. No wires needed and very long distances capable. Signal gets weaker the more time taken to reach the destination. Security is a problem very open for hackers. LAN This is type of network which covers a small office, home or a school network. A LAN uses either wired Ethernet or wireless RF technology. Using a LAN can be much easier when there is a printer available or sharing a file throughout the network. Updating software is much easier because updating software will automatically update all the other software’s. LAN has much higher transmission rates because it is wired connection rather than wireless. Ethernet and Wi-Fi as most widely used technologies, however many others such as token rings have been used before. This relates to standard IEEE 802.2. This standard allows two connectionless and one connection orientated operational mode: Type 1 which allows frames to be sent to a single destination or multiple destinations on the same network is a connectionless mode. Type 2 is the oriented operational connection mode. In this mode it uses something called sequence numbering which makes sure that when the data is send it gets to the destination in the correct order and not a single frame has been lost. Type 3 which is also a connectionless service, but only support point to point communication. Infrared is related to this service because in computer infrared network it can receive and transmit data either through the side of the device or the rear side of the device. When connections are made using Microsoft Windows Infrared the same method used for LAN connections can be used. Infrared technology has been extended to allow more than two computers to be connected semi permanent networks. The advantage of a LAN is that the same physical communication path can be shared by multiple devices. For example it there is a printer, a computer and the internet connection the LAN will allow connections to the printer and it will also allow connections to the internet. If a software is loaded onto the file server that all the computers on the network can use it. There are quite a few drawbacks of a LAN network. For example security measures need to be taken so that users cannot access unauthorised areas. It is quite hard to setup the network. Skilled technicians are needed to maintain the network. Yet the biggest disadvantage is that if the file server goes down than all the other computers on the network are affected as well. WAN This type of network covers a wider area. It is used over high speed, long distance communications such as computers in two different areas. A WAN can also be shared. For example two occupants in two buildings can share the wireless connection to a third person, or a business or anyone or anything they wish to do so. Data is safe, secure and quick when it is transmitted between two computers. WAN can also be used to connect different types of networks together for example a WAN network connected to a LAN networks. The reason behind this is that it is AppleTalk. It is a cheap LAN architecture which is a standard model built for all Apple Macintosh computers and laser printers. It also supports Apple LocalTalk cabling scheme as well as Ethernet and IBM token ring. AppleTalk can connect to standard computers which do not have AppleTalk. This all relates to FDDI standard which stands for Fibre Distributed Data Interface. It is a backbone of a wide area network. It uses fibre optic cable to transmit data up to supported rate of 100 Mbps. An advantage of a WAN it allows secure and fast transmission between two computers. Data transmission is inexpensive and reliable. Sharing a connection is easy as well because it allows direct connectivity. A WAN also allows sharing of software and resources to other workstations connected on the network. Disadvantage of a WAN network is that the signal strong all the time so anyone trying to hitchhike a connection can use the WAN connection it is not protected. WAN are slow and expensive to set-up. They also need a good firewall to stop intruders using the connection. Networking Mediums Different types of medium are used for different types of topologies. Coaxial Cable It is normally used to connect telecommunication devices which used for broadband connection which use high transmission rates to transfer data. The cable is insulated using a braided shield which is also known as a screen. It protects the cable from electromagnetic interference. It has higher capacity than a standard copper wire. Therefore it allows radio frequencies and television signals to be transmitted. Various types of coaxial cables are available which can be used for thin Ethernet which are used for networking 10Mbps connections lengthening up to 200 meters. There is also thick Ethernet cable is also used for 10Mbps connections but stretching up to 500 meters. Unshielded Twisted Pair (UTP) coaxial cable has been used in the past when building networking using thick or thin Ethernet. Ethernet cables quite expensive but they are still used because they carry more data then a telephone wire and it is less susceptible to interference. Optical Fibre Optical fibre also known as a fibre optic cable uses light to transmit data. Light is made using a laser or LED is sent down a fibre which is thin strand of glass. Fibre optic is about 2 microns in diameter which is 15 times thinner than a single human hair. Optic fibre is not affected by electromagnetic interference. It is cable of higher than data transmission rates, ideal for broadband usage. Fibre optics are manufactured in two different types the single mode and multi mode. The difference between the two is quite obvious single mode uses one beam of light to transmit data to longer distance of around 3 km but the multimode uses multiple beams of light to transmit data but only to shorter distance of 2 km. This allows more data to be sent simultaneously. It is normally used for broadband transmission as mentioned before because it is faster at transmission than any other cable currently available. Fibre optic also has an advantage of long distance transmission because light propa gates through the fibre with little attenuation compared to electric cables. Not many repeaters are needed for long distance. Data travelling using the fibre can reach rates of unto 111 Gbps. Fibre optics also restrict high voltages travelling from end to end of a fibre to another end. It also restricts cross talk and environmental noise between signals transmitting to different cables. UTP (Unshielded Twisted Pair) & STP (Shielded Twisted Pair) UTP and STP both use copper wires which are known to man as one of the oldest types of transmission media methods. STP is insulated with a metallic plastic foil which is all under the plastic sheath. This insulating is expensive to make that’s why it is more expensive than normal cable. Even though STP cable is shielded there is still crosstalk. It cannot be eliminated. Both UTP & STP individual wires are twisted together so it creates there is less crosstalk. Core of each of the type of cable is a very good conductor and easy to work with. Media which can be used with UTP is internet, because it is easy to install, maintain, less expensive and allows higher transmission rates. The media used with STP is also internet, but it is more expensive and difficult to install. The advantage is that there is less interference. It is difficult to install because it has to be grounded at both ends. Improper grounding will result I metallic shielding acting as a antenna and it will pick u p unwanted signals. Due to the cost and difficult to install and maintain it is hardly used in Ethernet networks. It is mainly used in Europe. Crosstalk Crosstalk means that signal that are transmitting in different circuits interfering with each other. Crosstalk happens because unwanted signals interfere with another channel transmitting undesirably. Electrical Noise Noise is when an electrical signal is transmitted across a wire which is not the sent signal by the user, but it is another signal which has been picked up randomly. Twisted pair cables eliminate the interference because they are twisted with each other so they cancel out each other. The thickness and varied insulation of a cable and its capacitance of the wires will cause noise. For example when there is communication on a telephone and either person cannot hear the message clearly this is caused by noise affecting the signal. This is known as crosstalk, as mentioned before crosstalk is when signal is affected by electromagnetic field around a wire. Electric noise cannot be eliminated but can be minimized by taking caution. Keep cables away from electrical equipments and shield the cable weather it is a fibre optic or a STP. Checksum It is a method used for error-checking the received data against a calculated checksum. For example when a data is received by the designated node the checksum error detection method will create a new calculation and check it against the old calculation to check weather the same result it received. This makes sure the data has not been altered in any way when it was transmitting. The checking of the data is called checksum function or checksum algorithm. Cyclic Redundancy Check (CRC) CRC is another type of error-checking technique used in data communication. A CRC character is generated at the end of the transmission. The produced CRC character’s value depends on the hexadecimal value of ones in the data block. The node receiving the transmission makes a similar calculation and compares it to the source node and it the values are different then it asks for retransmission of the data. Frame It is a collection of bits sent over a medium. It contains physical address and control information. It also contains error-detection methods like CRC. The size and role of the frame is all dependent on the type of protocol, which is often used synonymously with packet. When the data is split and if necessary it is sent to Ethernet frame. The size of the Ethernet frame varies between 64 and 1,518 bytes. It uses the IEEE 802.3. It contains address, length, data and error checking utility. The data is passed onto the lower level components corresponding to OSI’s Physical layer. This converts the frames into bit-stream and sends it over the transmission medium. Other network adapters on the Ethernet receive the frame and analyze it for the destination address. If the destination address match of the network adapter, the adapter software simply processes the incoming frame and the passes the data to higher levels of the protocol stack. Packets It is a unit of data sent across networks. When a computer transmits data it will split or divide it into packets when it reaches the defined node it is transformed into the original transmission. Also known as a datagram it contains two parts. The header which acts as a envelope and the other part is the payload which is contents. Any message sent over the size of 1,500 bytes is fragmented into packet for transmission. When packet filter is put into place the header of incoming and outgoing packet is analyzed and decides whether to let them pass or restrict the packet, this is decided based on network rules. Data Transmission Modes & Methods There are three different ways transmission can take place. Data transmits either using simplex, half duplex or full duplex mode. There are two different ways how data is transmitted. Data can be transmitted via serial or via parallel transmission. Simplex Simplex data can only travel in one direction. Television and radio broadcasting are example of simplex. Fibre optic works with simplex mode. Simplex is good for satellite communications. TV signal is the proof that satellite communication is good because the transmission is good and clear. Simplex is rarely used for computer based telecommunications. Half Duplex Half duplex data can travel both ways but only in one direction. Coaxial cable works in half duplex mode. Radio is a example of half duplex because the signal reaches the destination and comes back to the original source. Communication between networks also works at half duplex. If a node is transmitting a message and another node wants to transmit it has to wait till the token ring comes back. Full Duplex In full duplex data can travel in both directions and at the same time. The bandwidth is divided in both directions. UTP/STP mediums work at full duplex. For example Bluetooth is a full duplex because data can be received and sent by both devices. Another example is landline telephone because both end of the phone can speak and listen to each other. Serial Transmission In serial transmission one bit is sent at a time. It is good for communication between several participants. Serial transmission is slow. When the data is sent it is dissembled by the source and reassembled by the receiver. Parallel Transmission Parallel transmission is when every bit is sent simultaneously but using separate wire. Basically when data is parallel channel transmitted for i.e. 8 bits or a byte everything is sent simultaneously therefore it’s faster than serial because serial channel would send the 8 bits or byte one by one. Most common example is communication between a printer and the computer.

Atkinsons Case

Case requirements Atkinson Atkinson have been trading as a department store on the Moor In Sheffield for over 50 years. Two of the directors are friends of your parents. They have asked you and a small group of your colleagues to cast an eye over the business and offer some Impartial advice as to its future direction. You were provided with the publicly available statements of the group, data from FAME Is also available on the Internet through literates.. Whilst passing through the Meadowland Centre you notice that there are some new units being developed.A number of businesses such as Deadbeats and Thornton have outlets In both Sheffield and Meadowland whilst others such as House of Fraser have moved out of the city centre altogether. You have contacted Meadowland Properties PL and have received a letter in return which sets out the availability and costs of leasing a new unit in the Meadowland Centre. You have also acquired information from Sheffield City Council containing demogra phic and other information http:†www. Creditworthiness. Co. UK/ http:†www. Sheffield. Gob. UK/your-city-council/Sheffield-facts-figuresYou are required to attend a meeting with the two directors to make a presentation (power point facilities are available) on your findings. Assessment weighting Learning outcomes Weighting % 1 . Identify subject skills and knowledge appropriate to problem this is reflected In outcome 2 2. Assess difficulties in clearly defining problem areas (Including analysis of position) 30 3. Apply and integrate previously acquired subject skills outcomes 2/4 4. Acquire, classify organist and evaluate Information In a suitable format for the application of decision making techniques 30 5.Communicate proposed course of action and answer questions 40 Meadowland Properties PL Sheffield Dear Sir Thank you for your recent enquiry concerning the leasing costs for the units to be completed at the Meadowland Centre in late 2008. To give you some idea of the s ize of the units, Deadbeats occupies a site of 125,000 square feet. Leases will run to the December 2032 and will be renewable at that date subject to negotiation. All rents will be increased annually in line with the change in the retail price index excluding mortgage payments. Size Annual rent Unit 1 125,000 square feet unit 2 60,000 square feetIEEE,OHO unit 3 40,000 square feet IEEE,OHO In addition to these rental costs, there is a service charge payable to ourselves. At the moment this is EH. 30 per square foot per annum for the first 25,000 square feet, half this rate for the next 25,000 square feet and a quarter of this rate for anything over 50,000 square feet. This charge covers all communal areas, supervision of car parking etc. Tenants are, of course, responsible for the payment of business rates. We thank you for your interest and look forward to hearing from you in the near future. Yours faithfully Alexander Goodyear (Customer Services Director)

Sunday, September 15, 2019

Economic Commentary: Public Good, Market Failure Essay

Paper Edition | Page: 5 Jakarta has long been infamous for its repeated floods, such as those that crippled the capital and all its government and economic activities last week. Over 15,000 people were displaced and the material losses from infrastructure destruction and damage inflicted on personal property have reportedly reached Rp 20 trillion (US$ 2 billion). The devastating impact of the disaster on government activities and public services under the central government’s auspices has revived a debate over the need for the country to move its capital from floodridden Jakarta. Even President Susilo Bambang Yudhoyono, according to his aides, has considered relocation of the capital, albeit as a last resort, as part of an all-out, comprehensive effort to solve the problems facing Jakarta. With or without major floods, which strike every five or six years, Jakarta can no longer sustain the population burden with all its consequences. The city no longer has space to provide housing to all of its nearly 10 million citizens or build roads for the 6 million cars and motorcycles thronging the capital. This is quite apart from the city’s lack of infrastructure to protect residents from disasters like the annual floods. Jakarta today is typified by frustrating traffic gridlock, slums that encircle high-rise buildings, makeshift huts built along riverbanks, food stalls and groceries that occupy sidewalks, traditional markets that spill onto public thoroughfares, clogged drains, illegal parking along busy streets and other forms of disorderliness resulting from the state of over-population. Not to mention the city’s crime rate, which tends to increase year-on- year. Every time Jakarta voters chose their leader, they elect a candidate who they consider able to live up to their high expectations, which of course gives them false hope. Jakarta has turned into a megalopolis without enough resources to deal with its gigantic problems and challenges. What the founding fathers failed to anticipate when they chose Jakarta as the capital city was perhaps its evolution as the country’s commercial hub. About 60 percent of the nation’s money circulates in Jakarta, where foreign companies assign their representatives. Many countries have become aware of the problems in developing their capital city as both the center of government and the heart of economic activities. Then they have got to the point where relocating the capital city becomes unavoidable. Brazil did it in 1960 when it moved its capital from densely populated Rio de Janeiro to newly built Brasilia City, our Southeast Asian neighbors Malaysia and Myanmar moved their capitals to Putrajaya and Naypyidaw in 1999 and 2005 respectively. Indonesia moved its capital to Yogyakarta from January 1946 to December 1949 due to the war of independence. In that time Bukittinggi in West Sumatra also briefly served as the capital city when founding president Sukarno established an emergency government prior to his arrest by the Dutch between December 1948 and June 1949. Unless Jakarta takes drastic measures to shore up its increasing burden, Indonesia will have to consider an alternative capital. Sooner or later saying good-bye to Jakarta will no longer be a matter of choice, but of necessity. Commentary: The article tells us about the recent flood in Jakarta, which has brought huge impacts to the nation financial cycle. The flood was happened because many factors, but the most significant factor is because the lack maintenance of the flood controls system in Jakarta. The capacity of the drains has not been maintain to what level it should be. Therefore, due to heavy rain during the rain season the flood control system could not handle the pressure which resulting the massive flood in most of part the city. Public Good is defined as a good that is both non-excludable and non-rivalrous. Nonrivalrous; its consumption by one person does not reduce consumption by someone else; Non-excludable; it is not possible to exclude someone from using the good. Flood in Jakarta happened because the government has created a market failure since they have under provided the flood control system in Jakarta. The flood control system is an example of an environmental public goods: flood cont rol system, which nobody would provide on their own, even though everybody benefits from it being available. This suggests that since flood control system is a public good (because it is over consume, and underprovided based on what is needed for society) it clearly shows that it is an example of a market failure. Since the market fails to allocate resources to the production of the public goods it means that there are external costs. The article mentioned that the flood has resulted massive looses: over 15,0000 people were displaced and material losses from the city infrastructure, damage inflicted on personal property have reportedly reached Rp 20 trillion (US$ 2 billion). About 60 percent of the nation’s money circulates in Jakarta, where foreign companies assign their representatives; the flood has also interrupted the economic activities, as Jakarta is the â€Å"heart of economic activities† Through this tragedy there are different effect resulted. Seeing the disaster, we could clearly see the disadvantages. Most Jakartans living in flood-prone areas will probably answer mud or garbage after the flood, Citizen loss their property, illness such as fever and other water-borne diseases has also spread wildly.It means, there are external cost needed to recover houses and infrastructure as well as for the health care. In the other hand, other stakeholder got more benefit : trash picker and food seller on the street. Local news reported that the trash picker help to picked up motorcycle from one point to another; they got paid for Rp. 20.000/one way. The food seller on the street increases their income as there is increase in consumer,people were trying to see the flood from closed distance. Jakarta’s government must step in to ensure that flood control systems are produced at socially desirable levels. The flood control system should be provided up to the point where MB=MC so the flood would not be happen again and it would not interrupt the economic sector as well as creating disadvantage for the whole citizen. There are many ways to correct the market failure. Government could make an effective legislation to limit number of urbanization. As we know, Jakarta does not have an appropriate city planner. People build shift huts in the area where it is inappropriate such as the riverbanks. These people are not paying for the house tax since their house is also illegal. This will distort the city infrastructure and also decrease government revenue since they are not paying tax. Government could also do implication of direct provision in using economic criteria to determine which public goods and in what quantity of the public good should be produced. To make government direct provision to be happen, tax should be imply. With implying indirect tax government will increase the revenue which could be use for the spending on public goods, in this case is to increase the number the flood control system and maintain its quality. In long run, this issue will add another problem including the nation government and economic sectors. Based on the article, the President of Indonesia has stated there would be a probability of relocation of the capital. This will bring huge cost on all government, public services, and the whole economic activity within the country, unless the flood issue in being solved. Works Citied: â€Å"Editorial: Good-bye Jakarta.† Jakarta Post. N.p., 26 Jan. 2013. Web. 01 Feb. 2013. Tragakes, Ellie. â€Å"Market Failure.† Economics for the IB Diploma. Cambridge: Cambridge UP, 2009. 119+. Print.