Friday, November 29, 2019

20 Response Essay Topics Great Ideas Related to the Rite of Passage

20 Response Essay Topics Great Ideas Related to the Rite of Passage If you have gone through our first guide, 10 facts on the rite of passage, you are right on track. In our second guide, we discuss 20 topics on the rite of passage so you don’t have to spend more time than necessary trying to find a relevant topic for your response essay. Furthermore, we have also included a sample response essay which you can utilize for your assignment. Be sure to follow-up this guide with our third and last guide how to outline a response essay on the rite of passage which will help you evaluate the structure to use while writing a response essay. Here are 20 topics on the rite of passage for a response essay: Rites of Passage in Ancient Greece Jewish Customs and Their Rites of Passage Common Rites of Passage in Indian Culture Rites of Passage and Their Significance Roles of Rites of Passage in a Human Society Correlation between Religion and Rites of Passage Personal Views on the Rites of Passage Effects of Rites of Passage on Social Statuses Four Stages of the Rites of Passage Rites of Passage on Birth and Pregnancy Common Rites of Passage to Perform before Marriage Role of Rites of Passage on Manhood and Adults The Rite of Baptism a Highly Desirable Ceremony Initiation Rites of Passage in Different Cultures Rites of Marriage and Betrothal Role of Rites of Passage to Avoid Incest Common Mortuary Rites of Different Religions Correlation between Rites of Passage and Culture The Significance of Rites of Passage on Human Behavior What is â€Å"Coming of Age Day† All about? Now you have 20 topic suggestions to choose from and start writing your response essay. To make the things easier, we have also provided you with a sample essay below. If you haven’t already, check out our first guide, 10 facts on the rite of passage for a response essay, which assists you throughout the writing process. Once you have gone through this (second) guide, be sure to read our third (and last) guide on how to outline a response essay on the subject. This will help you in writing a brilliant response essay for your professor and keeping the former smooth and professional. Here is a sample of a response essay on the rite of passage: Sample Response Essay Four Stages of Rites of Passage Rites of passage are ceremonial events that exist in all kind of cultures and religions throughout the world. A rite of passage actually describes the significance of a person’s status and there are rituals and traditions that are performed to transcend the person’s status in front of the group (or tribe) he/she is part of. This essay will describe the importance and stages of rites of passage that are found throughout history. The significance of rites of passage varies from one society to another, one religion to another; one culture to another and so on. But if we were to talk generally, a rite of passage plays a vital role in human behavior, society and culture. It shapes the life of a person if it’s importance is taken into consideration. Most of the time, a rite of passage is actually considered a ceremony to celebrate the milestones that a person hits in order to pass on to the next stage. Speaking of stages, there are four primary stages found in the rite of passage. First of these are birth rites. When it comes to birth rites, it is often a collection of distinct rituals that include the mother, father, relatives and members of society. The rites start taking place during the pregnancy period and continue till the child has been introduced to supernatural beings or an omnipotence entity commonly known as god(s). Mostly, the rites concern both parents and the child who will be coming into the world. Depending on the religion, culture and society, the mother of an upcoming child will refrain from heavy or â€Å"back breaking† activities while the father will give more time to the mother and meet her needs and wants in any way possible. Once the child has been delivered successfully, he/she is baptized and introduced to the super-beings of religion, i.e. god(s) or other entities that play a significant role in that specific society. Initiation rites are another group often considered as the rites of coming of age. It was considered that initiation rites were applied on people who reached had puberty level but according to an extensive historical research, this may not be true after all. In many religions, cultures and society, the initiation rites take place when a person is considered to have attained maturity. These rites include rituals where supernatural beings are introduced to the person either by fasting, physical exertion or consumption of herbs that results in altering common sensibilities and inducing hallucinations. However, in modern societies such as today, initiation rites are only sufficient when we are talking about breaking milestones such as getting a driving license, graduating, marrying etc. Ever since the era of technology took over, spiritualism is not considered a part of our lives and people have focused more on their social and financial rites instead. Going further with our list marriage rites are seen mostly in every religion, culture and society throughout the world. It’s what bonds two families together. However, the tradition and rituals vary. In some societies, exchange of goods and transfer is required whereas in some societies, a simple vow is what is needed. The insignia of change in social status also varies; in modern societies, wedding rings are sufficient to show that the couple is married. In other cultures, one is required to have to wear tattoos, ornaments or other embellishments to show the significance of marriage. The final group is death rites. This is one exception that does not change when it comes to the differentiation between societies, cultures and religions. All of these communities believe that there is an afterlife, not for our bodies, but for our souls (spirits) or consciousness. Every religion, culture and society holds a variety of rituals for their dead. Religion and culture play a vital role in keeping the rites of passage alive in this modern era because societies have become ignorant for most rites of passage and only a few of them are actually considered of importance. This should give you a fairly good idea on how to write on a rite of passage response essay. However, you should check out our final guide which tells you precisely how to shape up your response essay from start to finish. References: Rites of Passage. International Encyclopedia of Marriage and Family. 2003: Encyclopedia. encyclopedia.com/doc/1G2-3406900364.html Bobby C. Alexander (2009) â€Å"Rite of Passage† Encyclopedia Britannica  https://www.britannica.com/topic/rite-of-passage/ Samuel G.F. Brandon â€Å"Death Rite† Encyclopedia Britannica  https://www.britannica.com/topic/death-rite Tabar, Margaret. Rite of passage. Knowledge Quest 30.4 (2002): 29. Lewis, Amy. Rite of Passage. Amaranthus 1994.1 (2013): 19. Van Gennep, Arnold. The rites of passage. University of Chicago Press, 2011. Stevenson, Kenneth W. Nuptial Blessing: A Study of Christian Marriage Rites. Alcuin Club/SPCK, 1982.

Monday, November 25, 2019

How does Shakespeare make the start of the play gripping and exciting Essay Example

How does Shakespeare make the start of the play gripping and exciting Essay Example How does Shakespeare make the start of the play gripping and exciting Essay How does Shakespeare make the start of the play gripping and exciting Essay Essay Topic: Romeo and Juliet Originally written by Arthur Brooke in the form of a long poem called The Tragical History of Romeus and Juliet, Romeo and Juliet was later rewritten by former actor and playwright William Shakespeare. Shakespeare, a magician with words, added more depth, detail and characters to the tragedy. The famous play, The Most Excellent and Lamentable Tragedy of Romeo and Juliet, more commonly referred to as Romeo and Juliet, was believed to be written roughly between 1591 and 1595, in the Elizabethan era. In the Elizabethan era theatres were popular. Whilst watching a play the audience were not expected to be silent: people ate, talked and fidgeted through the performance. Going to the theatre was like going to a social event thus people would be loud and mingle around; you had to earn the audience’s attention by having a riveting start to the play. In addition, there were hardly any props for the actors so the story had to be told through words. Shakespeare creates an engaging and gripping opening to Romeo and Juliet with the use of various linguistic techniques, dramatic devices, metaphoric imagery and humour. Shakespeare ingeniously starts the play with a prologue containing the whole story, start to finish, in a carefully written sonnet; this leaves the audience waiting in anticipation for the prologue to be brought to life. He uses this dramatic device to enliven and alarm the audience as well as inform them about the feud among the two families and the effect it causes. It is apt that the Prologue is written in the form of a sonnet; they are often associated with love and as the play is a tragic love story, it is appropriate. The audience are told that in the play that â€Å"A pair of star-crossd lovers take their life† and their deaths ultimately unite their feuding families. The phrase â€Å"star cross’d† literally means against the stars; the expression links to the texts historical context because during the Elizabethan era nobility had personal astrologers to give them their horoscope and â€Å"star cross’d† had meant that their stars were aligned. This would have scared an Elizabethan audience as they strongly believed in the idea of having a destiny and fate mapped out already in the stars. A modern day audience today would not have believed in fate so strongly. In Act 1 Scene 1, immediately following the Prologue, the scene picks up on the theme of hate; the audience found out in the Prologue that there is going to be a lot of â€Å"civil blood† lost and after a short, comical conversation between two servants, the Prologue begins to come to life. The use of humour holds the audience’s attention and makes them laugh. One of the ways Shakespeare incorporates humour into the play is with the use of puns and references to male anatomy. The scene starts off with a witty and bawdy conversation between two Capulet servants. The joke Gregory says: Tis well thou art not fish; if thou hadst, thou hadst been poor-John, is coarse and is used to tease Sampson. In Elizabethan times â€Å"Poor-John was the cheapest kind of dried fish. Dried fish were commonly sold whole and were so thoroughly dried that they were as hard as wood. Thus a dried fish could be compared to a mans erection. It was vital that the audience were entertained and the vulgar jokes were fun to watch at the start and warm the audience up. Quickly after the jokes the violence starts to emerge; the silly gags contrast with the seriousness of the fight. Gregory says: â€Å"Draw thy tool! Here comes two of the house of the Montagues. † The servants wonder if they should provoke a fight or start a fight themselves. We knew there was going to be a fight because it was inevitable; it was just a matter of who is involved and when it occurs. The Capulet servants deliberately rouse the Montague servants. We can see this where it says: â€Å"Nay, as they dare. I will bite my thumb at them; which is a disgrace to them, if they bear it. These servants decide to provoke the fight by biting their thumbs. This would be like flipping someone off today. That stirs up the opposing familys servants and a fight ensues. The provoking makes the feud seem silly and pointless because flipping some off today would not start a fight in which blood would be shed. Here we are shown the full extent of the grudge and introduced to a few minor characters and the antagonist Tybalt. The audience is already made aware of the personalities of each of the characters and their part in the main story: Tybalt is the villain and loves to fight. This leads the audience to think that Tybalt is the person that comes between Romeo and Juliet and influence’s their feelings to immediately despise him. The Prince’s Speech is engaging because we know the quarrelling families will be rebellious and not listen so there will most likely be more fights; the audience are on stand-by until this happens. Throughout the speech there is a lot of metaphoric imagery which interests us as we imagine the image in our heads. An example of this would be: â€Å"With purple fountains issuing from your veins the word â€Å"purple† is used here because in the Elizabethan era nobility were thought to have had blue blood whereas commoners had red and blue mixed with red made purple therefore both noble and common people died. On the other hand it could be interpreted as a dark or deep wound such as the deep hatred the families have for each other. The Prince threatens the families at the end. We can see this where it says: â€Å"If you ever disturb our streets again, your lives shall pay the forfeit of the peace. The sinister threat is exhilarating for the audience because they know that it would have to be put into action and people’s lives will be lost. However it seems less real for a contemporary audience as it is not part of the new justice system, yet the modern day adaptation does not fail to hook the audience. In Act 1 Scene 5, at a party hosted by the Capulet family, Romeo sees Juliet for the first time. As Romeo sees Juliet for the first time, all the old romantics begin to swoon and sigh over his amorous sonnet for her. At this point it is crucial that the audience believe that Romeo is truly in love with Juliet or else their deaths will not be as heart-rending. One of the ways we are shown Romeo’s strong feelings is through light and dark imagery. An example of this is: â€Å"a snowy white dove trooping with crows. † He is speaking about binary opposites: doves are white and crows are black. This emphasises how Romeo sees Juliet; she stands out to him. Moreover â€Å"doves† are seen as symbols of live and â€Å"crows† are seen as evil or ugly birds. This is a highly important moment because we realise that Rosaline is the crow in this quote. This links back to where earlier in the text where Benvolio was telling Romeo to â€Å"examine other beauties† and he â€Å"will make thee think thy swan a crow. † Another way Romeo’s love is indicated is through the use of words that appeal to the eyes. Throughout the speech words like â€Å"watch†, â€Å"light†, â€Å"sight† and â€Å"beauty† are used. These words imply that Romeo is smitten with her and can’t take his eyes off of her. Alternatively, Romeo can be seen as rather shallow and superficial as well as young and naive; he doesn’t know what love really is. Shakespeare uses religious imagery to ensure that the love between Romeo and Juliet is perceived as pure and true. Phrases such as: â€Å"This holy shrine† and â€Å"blushing pilgrims† influences the audience’s feelings by making us feel the love radiating off the character and believe that they are meant to be. The way in which Shakespeare portrays the love between Romeo and Juliet is exceptional however it is less likely for a modern day audience today to believe that the two are really in love; they would see it as an infatuation. Furthermore, the audience are captivated by antagonist Tybalt because his choleric character suggests to them that whenever he is around a fight may arouse. He speaks in rhyme like Romeo but this time to declare his hate for the Montague family rather than love; this shows that he is of equal status to Romeo. His hate for the Montagues is clear through his use of words which describe hatred and anger. Some of the words he uses are: â€Å"scorn†, â€Å"sin† and â€Å"strike. † The use of sibilance when he speaks suggests that he is like Satan and is evil. The words make a hissing sound like a snake and this links to the book of Genesis from the Bible where Satan in form of a snake causes the downfall of Adam and Eve. The audience were familiar with the stories from the Bible and the majority were Christian so this was a strong way of showing evil. They can also see his rage in the way Shakespeare has created the sonnet to have a staccato rhythm. People usually use sharp and quick words when they are angry as they do not use elaborate words. This also makes Tybalt sound like he is clenching his teeth and heightens the sense of resentment. In conclusion, the moment that all viewers wait for and the moment that is the most important to the play is the scene where Romeo and Juliet, the â€Å"star cross’d lovers† meet for the first time and fall in love. From that moment the story builds to the ultimate scene where they go on to â€Å"take their life†. In my opinion it is the best scene in Romeo and Juliet because I like romantic scenes; the lines he says about her are moving and even though I would not believe they are really in love, Romeo talks about Juliet the way any girl would like her boyfriend or husband to talk about her. Moreover this scene is thrilling because both themes run through it in complete contrast allowing the audience to sense the strong emotions better whilst they are forever sitting in the stands waiting for the moment where Romeo and Juliet die; Tybalt is fuming that Romeo intruded and so it seems like a colossal brawl will occur right there and then. In Elizabethan times it was vital the audience were gripped right from the very start. They treated the theatre as a social gathering and the racket was the equivalent to a modern day rock concert. Nowadays when people go to the theatre it is a more formal gathering where people sit quietly and watch; being noisy would be considered very discourteous and the lack of props would have made the play extremely dull as these days people tend to be more interested in the acting rather than the dialogue. Shakespeare had to capture the Elizabethan audience’s attention right from the beginning but a modern day audience would not need as much persuading which is why the modern day adaptation by Baz Luhrmann is a big hit today. The Prologue in the Baz Luhrmann’s version is still exciting but more realistic than a person standing on the stage telling you what the story will be; it is told through a news report on a television screen. In my opinion Shakespeare’s opening of Romeo and Juliet is clearly legendary for a reason. It does more than grip the audience’s attention; it seizes it and does not let go. In conclusion, Act 1 is jam-packed with remarkable scenes that would keep you on the edge of your seat (unless you were a stinkard) craving more.

Thursday, November 21, 2019

Letter From Birmingham Jail Essay Example | Topics and Well Written Essays - 500 words - 1

Letter From Birmingham Jail - Essay Example 38). Kind does utilize rhetorical questions to persuade the readers (pg. 29). He addresses the issues at hand with a high degree of professionalism. He also utilizes comparisons as an indicator of the efforts the Negros had to pursue freedom (Eskew, pg. 45). He is courageous enough to expound that he does possess the qualifications to lead the rest of the populations in demonstrations. Concisely, he says that he is in Birmingham because of the immense injustices available, and he is ready to provide a solution to them. The letter introduction sets an acknowledgement tone rather than attack. Primarily, he utilizes the words such as â€Å"My dear fellow clergymen† to initiate a sense of welcome and unison. He does not usher in an argument, but rather brings up a sense of understanding. Such an attack to the religious men could increase the chances of washing away the respect they had for him. He even compares himself to the prophets, such as Paul who was called to save the Macedonians. The daring Paul was not afraid to leave his small Tarsus village to spread the gospel of Jesus. In the form of allusion, he persuades the clergy that he is sent and having an intrinsic urge to preach the freedom gospel to the people of Birmingham until they are free from injustice. Immediately after he addresses the core reason for the letter, he goes ahead to address the clergymen, to counteract their claims and arguments in a logical manner (Birt, pg. 16). In a calm manner, he points out that the clergymen are not concerned with the conditions or issues leading the rising trends of demonstrations in Birmingham. Such utilization of logos does instills common sense among the clergymen. Kind adds insult to injury by saying that the demonstrations were inevitable. The Negro community could not react in any other way, other than demonstrating. The clergymen did claim that the demonstrators were breaking the laws through

Wednesday, November 20, 2019

Rule of St Benedict Essay Example | Topics and Well Written Essays - 2000 words

Rule of St Benedict - Essay Example The rule was authored to provide a guide for the formation of autonomous and individual communities, which Benedictine monasteries remain to this day. The emphasis laid on autonomy helped the monasteries to assume contemplative lifestyles and cultivate communities that were tightly bonded2. However, the monasteries also suffered from isolation from the communities that surrounded them, as well as increased inefficiency, declining appeal for potential recruits, and decreased mobility in serving others. Over the centuries, different emphasis on the rules led to the divergence of Ancient Observance, Cistercian Common Orders, and the Benedictine Confederation. St. Benedict, however, did not author the rules in a vacuum and it is evident that his work was heavily influenced by fading Athenian and Hebrew traditions present in medieval Europe at the time3. While this does not mean the rule was a throwback to the ancient times, there are various similarities. This paper seeks to compare the power relations and hierarchical structures in the early Benedictine monasteries and the governing of secular society at the time. The Benedictine Monastery as a Microcosm of Society as a Whole The Benedictine monastery under the Rule of St. ... Similar to the society in which he lived, St. Benedict ordered that the monks were to eat two cooked dishes of food at every meal, as well as a pound of bread daily. In the summer, he insisted on two meals and one in the winter, which was the same thing that peasants did due to the scarcity of food in the winter. The monks were also ordered to retire to their boarding rooms for six to eight hours every evening, which is the same as peasants who were not supposed to wander around the towns at night5. The Rule of St. Benedict also perceived the need for government in a uniform and permanent form, rather than the variable and arbitrary models used by other monasteries before his6. This led to a form of collectivism that was no different to society as a whole. The rule insisted on a common life compared to the solitary life led by Egyptian monks. In furthering his aim, St. Benedict also introduced into his rule the vow of stability, which was to become the basis of the order’s per manence and success. This is just one example of his idea of the family as practiced in society that pervades the rule. Family ties bounded the members of his monastery, just like in society. In addition, the members of this family took upon the obligation of preserving the family, in this case the monastery, until they died. This aspect of the rule secured the community, as it did the family in society, with all member monks sharing in the fruits that arose from each of the monk’s labor. It also gave the monks the strength that comes from being part of a united family pursuing similar ends, which, in the case of society, meant subsistence farming and hunting. Therefore, like the defining Hebrew and Athenian society that was present at the time, the monks were part of a

Monday, November 18, 2019

International Relations (The Caspian Sea Dispute) Essay

International Relations (The Caspian Sea Dispute) - Essay Example The interest encompassing oil extraction in Caspian region are commonly existent in several countries of the world in view of its significance to each individual country's benefit. For instance, the Caspian states regard the extraction of oil as a bonanza of future riches, potency and control. However, Caspian states are not the only ones to conceive these purviews, beside these interests are also cherished by the giant international oil companies such as BP, Amoco and Exxon etc with a view to boosting profitability. Besides, countries like United States, Russia, China, Iran and Turkey. All guided by the objective to gain maximum possible geopolitical advantages out of the region's oil exploration and exploitation. Hence, this paper sharpens the significance of this region for several interested parties and also explores the arousing international level conflicts concerning the geographic expedition and utilization of Caspian Sea's abounding oil resources. The internal and external politics in the Caspian region have led to the enormously growing contention among several countries. The internal importance of oil reserves in the region arises in Azerbaijan and Kazakhstan, where the oil is expected to free the countries from the claws of poverty, economic backwardness and Russian influence. The other country having substantial concerns for the region is Russia, which regards the exploration of oil in the region to be severely yoked with Russian 'internal security' matters. Finally the Caspian region is of international interest because of the region's potential to have ample reserves of unexplored oil, which can shape the fortune of several countries connected with it. As Frank Viviano (1998, pA1) propounds, "The oil boom in the Caspian basin promises to alter everything in its path- to erect a new El Dorado in desert wasted, fuel the economies of US and Europe, and re-order the global economy. It will also imperil thousands of years of tradition, setting its defenders against the tide of a glittering but deeply uncertain future." The foremost problem with the Caspian Sea's oil resources is that these reserves are not distributed equally across the sea, which has inseminated conflicts among the countries bordering it on the issue of maximum access to amplest oil. The major dispute held by the countries bordering the Caspian Sea i.e., Russia, Kazakhstan, Azerbaijan, Turkmenistan and Iran is the application of international law for the usage of Caspian resources, arguing on the treatment of Caspian as sea or lake. Brice Clagett (1998, p4) illustrate that if the Caspian is to be handled as sea, the eminent beneficiaries would be Azerbaijan and Kazakhstan, as the resources of the sea would then be utilized by each country to the extent of a specified zone off the seashore under the international law. Both Russia and Iran, who had been historically sharing the Caspian Sea reserves, do not contain sufficient oil resources within their specified limits off the seashore. Therefore, they prefer the Caspian to be treat ed as a lake, enabling the countries to equally share the resources beneath the sea. Besides Azerbaijan, Kazakhstan and other Caspian States, the most evident interest in Caspian Sea reserves is that of the Russian. Ozden Oktav (2005, p21) illuminates that "Russia has many economic and

Saturday, November 16, 2019

Literature Review Of Mph Bookstore Information Technology Essay

Literature Review Of Mph Bookstore Information Technology Essay For this section, it is all about the literature review on MPH bookstore with E-commerce system which is commonly used in today businesses network environment, their strengths and to achieve information on its history and how businessman operate their business with current architecture. The author will develop an E-commerce system for enchant the web login. 1.2 History of MPH Bookstore In 1815, MPH Bookstores has originally roots when William Milne, a young pioneer, starts a lasting mission enter in Malacca. The establishment migrated to Singapore when 1890 with the environmental objective of printing literature. During 1906, the organization change into the Methodist Publishing House. In 1927, it was formed into a legal corporation as Malaya Publishing House after it became a public listed company. According to the notification of the Malaysian nation in 1963, the company moved its name to Malaysia Publishing House with new bookstores were available in Malaysia (Penang, Malacca and Kuala Lumpur). To the public, Malaysia Publishing House as known as MPH. In 1972, Jack Chia from Hong Kong acquired MPH. However, MPH became known as Jack Chia-MPH Ltd. In March 2000, current Company changed its name into MPH Ltd in March 2000 to throw back the different in its majority ownership since 1998. MPH Bookstores Sdn Bhd was 100% owned by MPH Group Pte Ltd which in turn was a controlled by a holding of MPH Ltd, the public company revealed on the stock exchange of Singapore. In 2002, Malaysian company owned MPH Bookstores (S) Pte Ltd, Jalinan Inspirasi Sdn Bhd, which is part of a large Malaysian conglomerate owned by Malaysian businessman Tan Sri Syed Mokhtar Al-Bukhary. However, MPH becomes a entirely Malaysian-owned company. As the MPH group (Jalinan Inspirasi) to throw back its core businesses and it now owns MPH Bookstores (Indonesia, Singapore and Malaysia), MPH Distributors (Singapore and Malaysia). (mphonline, 2009) 1.3 MPH Bookstores Business Operation Figure 1 this is example of MPH bookstores online On wholly MPH Bookstores website, the ways they implement their e-business are to allow the consumer can get the latest book with cheaper prices and free delivery services. To register as their memberships, consumer can register directly through the official website. The site contains a shopping cart, order from listing products or services selected and credit card payment. At the same time, to make it become more attractive, they offered consumer may get the latest release books, cheaper prices for online transactions, and on the spot view the catalogue or information. With e-commerce system that provided by MPH bookstores, consumers will now have the ability to enjoy their services in better way. The prices displayed from the official website were no different with physical bookstores. For the delivery stage, for West Malaysia delivery it takes from 3 to 5 business days, for East Malaysia it takes within 14days and also available for globally. If the consumers received the books were damaged, MPH bookstore policy allows for a refund. However, the policy requires that the damaged book be returned to the following address within 7 days from the date of receipt of the book. Besides that, the objectives of this business operation are cause visitors to come to a place or participate in a venture by offering something of interest or advantage. If the MPH bookstore runs out of stock, consumers can order book from MPH online for Rm4 postage, if order above RM80 it will free delivery. 1.3.1 What should consumers do if they forget their password? Consumers require clicking on the Forget Password option, and then enter in your user Id and password. You will be prompted for an answer to the question of your choice. Once the answer is justified, the forgotten password will be displayed on the website. 1.3.2 What are the standard browser versions? MPH bookstores online is preferred with Internet Explorer 6.0 and above. Technology infrastructure for E-business system E-business infrastructure is vital to all companies adopting e-business. The infrastructure directly affects the quality of service experienced of users of the systems in terms of speed and responsiveness. E-business infrastructure refers to the combination of hardware such as servers and client PC in an organization, the network used to link this hardware and the software applications used to deliver services to workers within the e-business and also to its partners and customers. Infrastructure also includes the architecture of the networks, hardware and software and where it is located. Finally, infrastructure can also be considers to include the date and documents accessed through e-business applications. Introduction of E-commerce Now we are survive in an eagerness age of human innovation, where only one generation can witness very great shifts in technology and way of life. E-commerce not only just big, is also major refer to selling, services and buying products over internet or computer networks. Millions of companies that selling products to other companies have bring out that the Web not only provides a 24hours services and show that their products can reach a quick way to reach the right people in a company for the complete detail.(Ecommerce Definition,2006) 2.1.1 The E-commerce marketplace In this section we look at how electronic communications have changed relationships between the different participants of commercial transactions. Since the nature of these changes according to whether the transaction is between business and consumer or between businesses (inter-organizational, we start by reviewing differences between these types of transactions. We then look at how the channel structures of organizations have been changed through the process of disintermediation and reinter mediation. Locations for trading and mechanisms of commercial exchange in the electronic marketplace are then reviewed. Management terms have difficult decisions to take about which of these new models of trading is relevant to them, so we questioning approach, looking at some examples that have worked and some that havent it. 2.1.2 Benefits of Ecommerce Ecommerce enables people to go in businesses without the longer movement of time or distance. E-commerce systems can operate all day every day, once consumers access to the Internet at any point of time whenever day or night and purchase or sell anything one desires through the mouse clicking. The internet braces the world market through web businesses operate is the global market and wide. However it is possible to run business with any business or people who are connected to the Internet. For simple local businesses, as specialist record stores are enabling to market and selling using e-commerce. This is the current global opportunity is attend to the fact, different from traditional communications methods, users are not allow to charged according to the distance over which they are communicating. 2.2 Identify the e-business development Nowadays, as we discovered on Electronic business, it play a major role in the current worlds economy. Business development is a combination of marketing, strategic analysis, trade, regular occupation and sales. To perform your organization and business development being successful and greater is reliant on better knowledge of management theories and regular practice. Business development professional occupation is typically to identify new business opportunities whether that means latest markets, partnerships with other businesses, proper ways to reach existing markets, and product or service offerings to better meet the needs of existing markets and then to go out and make full use of those opportunities to bring in more revenue. Business development professionals are able to connect in everything to the development of their employers services and products. (E-business development, 2003) 2.3 Study on the innovations of e-commerce system The maturation ubiquity of current information technology is enabling the development of advanced services which consumers can access with existing devices such as computers or mobile phones. One of the innovations of e-commerce has affected the way people buy goods, services, choice, convenience and cost. Consumers may wish to give their own impressions of such sites, but better grades may be secured where further research is carried out, for example consumer surveys. It may also be possible to gain an insight into the benefits of using such websites through contact with e-commerce businesses. Second, consumers should be encourages to use the correct technical terminology in all the brief reports or descriptions produced for this unit. It is expected that higher grade consumers will use the correct terminology in their reports and will also produce more considered reports rather than one example of a benefit and/or limitation as would be expected for pass consumers. 2.4 Management Innovation Strategies in E-commerce Era When goes into the Era of e-commerce, business enterprises have several different features. To receive full benefits of e-commerce, enterprises should bring out appropriate management innovations. Enterprise innovation management allow helping enterprises to achieve great rate development to win over business opportunities and get opportunity to approach into markets and obtain higher profits. This stage is to investigate the new requirements on enterprise management through an e-commerce era, including occurring continuously updating thoughts of business management, flat organizational structure, management epitaxial expansion, informationization of means of production and marketing, flexible production management. Facts reveals that the business process reengineering, organizational development, creativity, cultural transformation, skill management and communication management have serious impinge on the enterprise development in terms of management and innovation. (Management Inno vation Strategies in E-commerce Era, 2008) E-Commerce Strategies The most importance ecommerce strategy is to enforce a proper secure E-commerce website. The appropriate way to achieve this is to protect the websites with security protocols and digital certificates. Major clients are attracted to ecommerce sites because of the good security and transaction mechanism. With ecommerce web site certified from the leading online security agencies is one of good way to promote E-commerce and supply the mechanism more authenticity and the quality of being trusted. Besides that, ensure that control the ecommerce operational specifications are brought out promptly tables and the databases are developed using programming language skills which display down all the data entry in a queue. Maintaining the record of the entire transactions which are brought out using the ecommerce mechanism can help the system to track all the complete details in more convenient and timely manner. E-commerce site design also plays an important role in its effectiveness. The interface of E-commerce sites is generally design to be user friendly and easily operational by the consumers so that they can make the online transaction more convenient or easily and in a manner which is very clear to the clients. Make the research on the existing websites Study on existing website with security enhancements Figure 2.1 this is one of the security enhancements that what Digi company had implemented. To key in username and password must through provided clicking the button provided. Figure 2.2 this figure show the second example of security enhancements. The figure 2.1 and 2.2 given on the top is the some part of the website of Lelong and Digi company in Malaysia how they operation their businesses.Lelong.com users can use standard or secure mode in security position. For the Digi company, they design a simple virtual keyboard on the registration webpage to avoid the data keyed by user can be protected from malicious key logger a harmful application which has been designed to capture keystrokes. Security enhancements developed for to prevent intruders go into certain network or user account to store media to view or retrieve the client information. With different security features implemented, users might attract with those security development. 3.2 Investigate the Security Issue 3.3 Digital Signatures and Certificates A digital signature is a common a way to enable that an electronic document (e-mail, spreadsheet or text file, etc.) is authentic. Authentic refer to that you know who created the document and know that it has not been changed in any way since that person created it. Digital signatures bound on several types of encryption to enable the authentication. Encryption is the process of data taken of computer, when sending to another computer and encoding it into a form that only the destination computer will be able to decode. Authentication is to process of ensure that information is coming from a trusted source. There are several ways to authenticate a person or information on a computer: Password The function of username and password provide the most usual method of authentication. Users can key in their name and password when prompted by the computer. It checks the username and password against a secure file to confirm. If either the username or password does not match with default registered, then users are not allowed further access. Checksum Possible only one of the origin methods of ensuring that data is accurate, checksums will provide a form of authentication when the wrong checksum suggests that the data has been compromised. The checksum is remaining in one of two ways. Assume the checksum of packet is around 1 byte long, which means that it can provide a maximum value of 255. If either the sum in other bytes in the packet is 255 or less then, then the checksum will contains that exact value. Yet if the sum of other bytes is more than 255, so the checksum is the remainder of the total value after it has been divided by 256. The example given for following page: Byte 1 Byte 2 Byte 3 Byte 4 Byte 5 Byte 6 Byte 7 Byte 8 Total Checksum 212 232 54 135 244 15 179 80 1151 127 1151 divided by 256 equals 4.496 (round to 4) Multiply 4 X 256 which equals 1024 1151 minus 1024 equals 127 3.4 Digital certificates To enforce the public key encryption on a large scale, such as a secure Web server might need, requires a different approach. This is where digital certificates come in. A digital certificate is basically a bit of information that says the Web server is trusted by self-reliant source as known as a Certificate Authority. The Certificate Authority pretends as the agent that both computers trust. It ensures that each computer is in fact who they say they are and then provides the public keys for each computer. 3.5 Secure Socket Layers (SSL) In network environment, SSL stands for Secure Sockets Layer. SSL is a protocol that developed for sending information securely over the Internet. Many websites use SSL for secure for their sites, such as user account pages and online checkout. Usually, when you are asked to log on on a website, the consequent page is secured by SSL. SSL encrypts the data being transmitted so that a third party cannot retrieve while the transmission and view the data being transmitted. Only the administrator and the secure server are able to recognize the data. SSL help to keeps information such like name, address, and credit card between users and merchant to which users are providing it. Without this kind of protocol, online shopping would be far too insecure to be practical. When you view a Web address starting with http or https indicates the website is secure. These websites frequent using SSL certificates to verify their authenticity. 3.6 Virtual Keyboard for Web Interface Figure 3 this is the layout of virtual keyboard A virtual keyboard development is to increase the security for those users had their own user account for several E-commerce services website by entering the username and password. Besides that, the virtual keyboard login is an application  in which a data entry layout will change once the page is refreshed. In general, virtual keyboard can help protect from malicious Spywares and Trojan Programs designed to capture keystrokes. Consequently, you can reduce risk of use and allow secure and safer authentication. Chapter 4: System Analysis 4.1 Fact-Finding Fact-finding is the method that used for the system developers to collect the information from groups or individuals. In this method, the analyst sits face to face with peoples and records their feedback or responses. As the interviewer, they can clear and cross check the doubts there itself by collected information with accurate and reliable. Through the fact-finding, it would make their business requirements such as good under ­standing of the organization and its business objectives. 4.2 User requirement 4.2.1 System Administrator The duty of system administrator usually plays an important role to managing the information, installing, updating, supporting and maintaining serves for computer systems. For this section, the proposed system administrator is responsible to manage the books information, tag prices and quantity arrangement for consumers. Input /Modify the control Administrator allows change the information, uploading the photo or catalogue, updating and responding to service outages and other problems. Maintaining the server performance and efficiency. Output The catalogue, book titles, prices, and information will show. Process Processing the Storage Locate the information of books ,CD or DVD or prices in the database Performance None 4.2.2 MPH bookstores consumers The consumers will frequently enter the MPH bookstores official websites to view the latest updates and informations such as promotion or new release. The reason why of MPH launched this online shopping or e-business is to make their consumers shopping with more convenient way. Input Click on the option and it will automatically add to the cart. Output Login Username and Password/ forgot your password option. The proposed system will display the appropriate information of the books once the consumers had selected through the options that available on website interface. Process The book information or prices label will get directly from the database. Control None Performance None Chapter 5.0 Choose on appropriate tools or software 5.1Overview For this chapter, the author had review on available tools on the internet is performed in order to select suitable tools to be used to develop the system. 5.2 Study on available development software. 5.2.1 Java Figure 4.1 this is interface of java programming language Java is a high-level programming language that developed by Sun Microsystems. Java was originally called OAK, it was develop for several proposes such like handheld devices and set-top boxes. Oak was unsuccessful so in 1995 Sun changed the name to Java and modified the language to take benefits of the burgeoning World Wide Web. Java is an object-oriented language which is similar to C++, but simplified to get rid of language features that cause common programming errors. Java source code files (a .java extension) are compiled into a format called byte code (files with a .class extension), which can then be performed by a Java interpreter. Compiled Java code can execute on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VM), available for major operating systems, including Windows OS, the Macintosh OS, and UNIX/LINUX. Byte code able to converted directly into machine language instructions by using just-in-time compiler (JIT). In general, the purpose of java programming language with a number of features those make the language suitable for use on the World Wide Web. Small Java applications are called Java applets and able downloaded from a Web server and execute your computer by a Java-compatible Web browser, such as Microsoft Internet Explorer, Mozilla Firefox and Netscape Navigator. 5.2.2 ASP.NET   Figure 4.2 this is interface of asp.net programming language ASP.NET, the next version of ASP, is a programming framework used to create enterprise-class Web Applications. These applications are accessible on a global basis leading to efficient information management. Microsoft has been continuously working to shift its focus from Windows-based platforms to the Internet. As a result, Microsoft introduced ASP (Active Server Pages) in November 1996. ASP offered the efficiency of ISAPI applications along with a new level of simplicity that made it easy to understand and use. However, ASP script was an interpreted script and essentially  unstructured code and was difficult to debug and maintain.  The web contain many different technologies, software integration for Web development was complicated and required to understand many different technologies. An application grew bigger in size and became more complex, the number of lines of  source code in ASP applications increased  attractive and was difficult to maintain.  Therefore, the arch itecture was needed that would allow development of Web applications in a structured and consistent way. (Asp.net, 2004) 5.2.3 Visual Basic.Net   Figure 4.3 this is interface of visual basic.net programming language Microsoft-created object-oriented programming language as known as Visual Basic.NET which combines features of Microsofts .NET Framework and Web Services, such as SOAP, which is originally, developed using XML. Visual Basic.NET, which thought would be a sequel to Visual Basic 6.0, has a totally different language core. There is no backward or forward compatibility between Visual Basic 6.0 projects and code and Visual Basic.NET projects and code. Visual Basic.NET is a language developed to create .NET applications, Windows or Web applications, and Web Services. (Visual Basic, 2006) 5.3 Comparison on Java, Asp.net and Visual Basic Java Advantages In general, advantages of Java are platform-independent: One of the most significant advantages of Java is its ability to move easily from one computer system to another. The ability to run the same program on many different systems is crucial to World Wide Web software, and Java succeeds at this by being platform-independent at both the source and binary levels. Java is distributed: Distributed computing involves several computers on a network working together. Java is designed to make distributed computing easy with the networking capability that is inherently integrated into it. Disadvantages For the performance, Java can be perceived as significantly slower and more memory-consuming than natively compiled languages such as C or C++. Java is predominantly a single-paradigm language. However, with the addition of static imports in Java 5.0 the procedural paradigm is better accommodated than in earlier versions of Java and default interface and feel of GUI design is too complicated. ASP.NET   Advantages The latest set of controls that are able to use in the same way with HTML control like Calendars controls. It will execute without the requirement of ActiveX Control and without bringing up issues of Browser compatibility. ASP .NET Server take over the Controls that have an object model from the traditional HTML and provide single set of properties and methods that can make the change of the outlook and behavior of the controls and reduces the amount of code required to build huge applications. Disadvantages The control of Asp.net coding is inbuilt with the web server controls so users have no much of direct control on these controls. Visual Basic Advantages For the visual basic language, its simple language. Some program that might be difficult to program with other language can be done in Visual Basic very easily. It is because Visual Basic is so popular; beginner can find the answers to your programming problems much more easily than other programming languages. Disadvantages The disadvantages of Visual Basic are powerful language, but its not suit for programming really sophisticated games and slower than other languages. 5.4 Study on available data management software Microsoft SQL Server 2008 SQL Server 2008 delivers on Microsofts Data Platform vision by helping any organization to manage data, place, and time management. It provides can store data from structured, semi-structured, and unstructured documents, such as images and rich media, directly within the database. SQL Server 2008 hand over a rich set of integrated services that enable you to do more with your data such as query, search, synchronize, report, and analyze. SQL Server 2008 provides the highest levels and advanced of security, reliability, and scalability for your applications. To take newer advantage of new opportunities in today is fast-moving into business world, companies need the capacity to create and deploy data-driven solutions quickly. SQL Server 2008 is reduces time management, cost of management and development of applications. SQL server 2008 is able to access the data from your enterprise and provide control over your data, no matter where its stored from the largest servers within the data center to desktops to mobile devices. SQL Server 2008 provides a comprehensive platform that delivers intelligence where your users want it. For the Information workers can access data directly using the tools they use every day, such as the Microsoft Office system that provide by Microsoft. (MicrosoftSqlServer2008, 2010) 5.5 The chosen software to be used for the proposed system The author selects Microsoft SQL Server 2008 as the database management system and Visual basic language design for web interface. It is because SQL Server 2008 provides the common function by helping manage the data, place and time and Visual Basic is easier to learn and popular compare with other language such as (Java or C++ ) and yet it is enough powerful programming language to develop certain system. SQL provides the highest levels of security, reliability and scalability. In other way, the reason why the author chosen the Microsoft SQL Server 2008 is because it has the ability to support with the system which means that be able to connect with Visual Basic language tool that has been chosen as the development tool or software for proposed system. REFERENCES (BACKGROUND READING MATERIALS): MPH Bookstores Sdn Bhd, 2009, MPHonline, online, cited on 13th Jan 2010. Available from: http://www.mphonline.com/welcome/welcome.aspx MPH online, 2009, About the MPH, online, cited on 15th Jan 2010.Available from: http://www.mphonline.com/help/aboutus.aspx Mariosalexandrou, 2010 E-commerce definition, online , cited on 20th Jan 2010.Available from: http://www.mariosalexandrou.com/definition/ecommerce.asp Freetutes, 2008 Learn Visual Basic online, cited 15th Feb 2010. Available from http://visualbasic.freetutes.com/ Techterms, 2010 ASP.Net online, cited 17th Feb 2010. Available from http://www.techterms.com/definition/aspnet Java,2010 Definition of Java ,cited 13th Feb 2010. Available from http://www.pcmag.com/encyclopedia_term/0,2542,t=Javai=45557,00.asp Microsoft, 2010 Microsoft SQL Server 2008, cited 14th Feb 2010. Available from http://blogs.technet.com/dataplatforminsider/archive/2008/01/25/microsoft-sql-server-2008-roadmap-clarification.aspx. Digi, 2010 Online Customer Service, cited 22th Feb 2010. Available from https://www.digi.com.my/sso/try_login?v=1pid=2pssid=379e2d9011216b706f93f84247ce3e88baca7d3150cd33bfdb5f6c01e0699d4dprid=19a30572366f1c0df3b4cea76759a1afpurl=https%3A%2F%2Fwww.digi.com.my%2Focs%2Fmyaccount%2Fmain%2Fhome.do%3Fssologin%3Dtruecurl=http%3A%2F%2Fwww.digi.com.my ***END OF REPORT***

Wednesday, November 13, 2019

Essay --

The literary movement during the 1980's in Britain was heavily influenced by the state of Britain's economy at the time. The people of Britain had become infatuated with politics due to the election of Margaret Thatcher, the first and only woman Prime Minister of the United Kingdom to have held office. She was known as the â€Å"Iron lady† and the leader of the Conservative Party. Her influence on the British government with her use of Thatcherism did not leave behind a good legacy in the literature department. In a New York Times newspaper article, it is stated that, â€Å"The Thatcher years were a time of remarkable cultural ferment, in which the energies of an extraordinarily diverse roster of musicians, novelists, playwrights, critics and filmmakers — to say nothing of television comedians and puppeteers — were unleashed in opposition, glum and passionate, explicit and overt, to the prime minister herself,†(nytimes.com). Many literary figures have writ ten novels in response to the events of the society's cultural downfall in the 1980's. In Doris Lessing's, The Good Terrorist, which is set in the time period of Thatcherism, she portrays her character's thoughts on bourgeois liberalism as contradictions to their personalities. The main character, Alice Mellings, assumes that she is committing these acts of terrorism for a good reason. Alice and her band of revolutionary rejects are the manifestations of Doris Lessing's various frustrations against political advancements with feminism, communism, and Thatcherism. †¨ The political views and opinions that Doris Lessing's character accumulate in The Good Terrorist are most likely fueled by Lessing's real life experiences with communist parties and her unsatisfying life in the suburbs in Rho... ...ain. During the time of the 1980's in Britain, feminism, communism, and Thatcherism were big parts of the time period. These political advancements caused many literary responses to the downfall of the government that Margaret Thatcher ruled at the time. Lessing was a feminist but was not a feminist at the same time. In an article on dnaindia.com, it is stated that, â€Å"Lessing was able to do a great deal for women without subscribing to feminism; she did it with her life, and with (not just within) her writing,†(dnaindia). Unfortunately, not a lot of research has been done on The Good Terrorist, and it being a good fictional reference into the life of a group of squatters in 1980's Britain, Doris Lessing writes from her perspective on feminist criticism and explores her ideas, hoping to expand further into more of Lessing's works and explore the meanings behind them.