Sunday, May 17, 2020
Interpretation Of Africa s History Through Maps - 1493 Words
Interpretation of Africa s History through Maps There are many misconceptions about Africaââ¬â¢s past. However, Africaââ¬â¢s earliest people adapted to a wide range of geographic conditions to establish societies based on family ties, religion, iron technology, and trade. Today Africa is a continent made up of 54 independent countries, and itââ¬â¢s the worldââ¬â¢s oldest populated area. Africaââ¬â¢s is more than three times the size of the United States, and over time there has been a great deal of trade and movement of goods and people including transatlantic slave trade. The following maps show the changing relationships of Africa to the rest of the world and provide a different historical interpretation then the many misconceptions most people have ofâ⬠¦show more contentâ⬠¦The rivers and tributaries helped with the development of fishing and the navigation of supplies. The tributary system operated by the Kongo kings spawned an inter-regional trade. Another feature of the Later Iron Age was the increase in use of cattle that was a good source for food, and was used in trade for iron and other necessities. The open grassland in the Zimbabwe Plateau shown in the map on right side above was where they innovated the technique of terracing the hillsides to prevent erosion. This is one of the many innovations most people donââ¬â¢t realize came from Africa. Another part of the Later Iron Age was the development of gold-mining. What was unique about Great Zimbabwe was their elaborate development. It started on the hilltops and later in the valleys. The stonemasonry and building techniques were some of the most unique in all of Africa. The following map is a 14th century Spanish map of Mansa Musa as he traveled across the Sahara on a pilgrimage to Mecca. Drawn on the map is Mansa Musa holding gold. He brought so much gold that on his arrival to Cairo, he devalued the currency of Mediterranean societies. At the top of the map is Spain. Filling most of the map is North Africa, with the Mediterranean extending east and the Atlantic west of Gibraltar. Mansa Musa was a skilled military leader who exercised total control over the gold and salt trade and used his 100,000-man army to kept order and protect Mali from attack. Under Mansa Musa,
Wednesday, May 6, 2020
Censorship in the Classroom Essay - 2774 Words
Sex. Politics. Religion. The big three: a work of literature is often considered controversial because of its statement about or use of these topics. What makes these and other areas so touchy in the classroom? Why do some parents and concerned community members want controversial materials out of the classroom? In this look at the language of censorship, we must first define censorship, who does the censoring, and why. These will be the first three spotlights for looking at the language of censorship. Then, we will look at how teachers, especially teachers of literature and the language arts are affected by censorship. Finally, we will preview how censorship can be taught in the classroom, to prevent some of tomorrowsâ⬠¦show more contentâ⬠¦A breaking and entering when even the senses were torn apart... (Angelou, 1969, 76). This does not sound like something one would read in Penthouse or Playboy, or even in hard-core porn on the internet. Yet according to Ken Donelson, I Know Why the Caged Bird Sings has gotten the second highest number of complaints in the last ten years, with twenty-three. Only Steinbecks Of Mice and Men had more, with twenty-nine (Donelson, 1997). Other complaints against I Know Why the Caged Bird Sings called the novel graphic and said that it raised sexual issues without moral resolution (Foerstel, 1994). This is an example of censorship in a language arts classroom. But what is censorship? Websters Encyclopedic Unabridged Dictionary of the English Language defines censorship as the act of censoring. What is censoring? These definitions were selected from the definition of censor: (n) 1) an official who examines books, plays, news reports, motion pictures, radio programs, etc., for the purpose of suppressing parts deemed objectionable on moral, political, military, or other grounds. 2) any person who supervises the manners or morals of others. (v) to subject to censorship (Websters, 1989). In the classroom, teachers are considered by law to be operating in place of the parents. This makes parents prime candidates for classroom censorship, althoughShow MoreRelatedCensorship and Material Selection Policies Essay863 Words à |à 4 Pagesobjectionable by the standards applied by a censor. It has been like this for ages. As long as someone has something to tell, another will be there to try and prevent them. Schools have been doing this for quite a while now and there is a need to stop it. Censorship of books in schools should not be allowed as many students will never get to experience classic literature if not exposed to it early on. Intellectual Freedom is the right of every individual to both seek and receive information from all pointsRead MoreFreedom For Students And Parents Should Limit Academic Freedom820 Words à |à 4 Pagesdecades now, censorship has been a prominent issue in American education. Though whatââ¬â¢s best for students is at the forefront of that conversation, many continue to disagree about the amount of academic freedom that K-12 public school teachers should have in their classrooms. The idea of censoring teachersââ¬â¢ messages to students and even school activities is grounded in protecting the morality of American children. Proponents of academic freedom for K-12 teachers believe that censorship has instilledRead MoreLiterature Be Banned1227 Words à |à 5 Pages Literature shouldnââ¬â¢t be banned because literature inspires, advocates, unites, entertains, and informs. By banning books from the classroom, we prevent students from learning about controversial topics in a safe environment. The Menifee school district banned the dictionaries from the students because of one parents complaint. I believe this was a terrible idea because many students need a dictionary to look back at when they think theyââ¬â¢re wrong. Dictionaries are helpful in many ways such as learningRead MoreCensorship Critique Essay1074 Words à |à 5 PagesJulia Else-Green Eng 103 DE2 October 11, 2008 Critique of ââ¬Å"Censorship: A Personal Viewâ⬠In her essay, ââ¬Å"Censorship: A Personal Viewâ⬠Judy Blume gives readers insight on the impact of censorship based on her personal experiences as a young reader and then later in life as a censored writer. She provides numerous examples of educators who were affected by censorship and chose to take a stand against it (345). Although the piece lacks evidentiary support for these accounts, and draws on sarcasmRead MoreOn January 1, 2016, The Institute Of Contemporary History1736 Words à |à 7 Pageshad to contend with a lot of criticism due to their strong censorship of Mein Kampf. According to one commentator, letting people read the book and make their mind meditate upon its content could do more to fight fascism rather than strict censorship (Horn). Unfortunately, not many governments view censorship in this light. In the current digital age, it is extremely hard to completely block the distribution of any book. In fact, censorship often raises the curiosity of the publ ic, leading to an evenRead MoreCensorship For Middle School Students Essay1111 Words à |à 5 PagesCensorship by definition is the suppression of speech or removal of communicative material which may be considered objectionable or repulsive. Censorship is nothing new and its effects are constantly felt throughout society. Many societies use censorship to protect the established moral and social order. Book censorship in western cultures can be traced to the earliest years of Christianity, when the church began to suppress opposing views as unorthodox. In ancient times, before the printing pressRead MoreEssay on The Freedom Of Speech675 Words à |à 3 Pagesreasons given for censorship; a classroom or library may restrict or ban a book or other learning resource because it includes social, political, or religious views believed to be inappropriate or threatening. A movie or TV program may be considered violent, or indecent because of nudity or inappropriate behavior. Also, a song or speech could contain language thought to be vulgar, or ideas and values that some consider objectionable. Although these examples are good reasons for censorship, initiating theseRead MoreCensorship Is Not Limited Repressive Regimes Or Network Television?1522 Words à |à 7 PagesCensorship is not limited to repressive regimes or network television. Weather we know it or not censorship is happening all the time throughout the day. We censor ourselves, we listen to censored music and as students we see the internet being heavily censored in school. The Childrenââ¬â¢s Internet Protection Act (CIPA) was signed into law in 2000; the law requires any public schools or library to filter any inappropriate content from the computers being used by minors. Since the law has been put inRead MoreTeen Music And The Music1130 Words à |à 5 Pagesviolent lyrics, research has disproven any conspiratorial links between the music and violent behavior. In fact, it can be used resourcefully i nstead, unless censorship removes that resource. Teen music, specifically hip-hop and rap, should not be censored because the lyrics can be a useful teaching tool; society suffers from all forms of censorship; and no clearly proven link exists between violent teen behavior and urban music. Most teenagers are interested in some form of explicit music, because theyRead More The Censorship Debate795 Words à |à 4 Pages The Censorship Debate nbsp; nbsp;nbsp;nbsp;nbsp; Do words such as nigger, bitch, or ass offend you?nbsp; The answer may seem clear cut, but our nation has been struggling with the issue of censorship almost since its conception.nbsp; To many, the aforementioned words are a part of their everyday vocabulary; to others, they are vulgar and unacceptable.nbsp; The issue of censorship is much more than just words.nbsp; There have been huge controversies over the negative ideas and
Literature Review about Reflective Report Writing Of Cybercrime
Question: Describe about cybercrime and its major categories? Answer: In order to develop the World Wide Web and internet, developer faced wide range of issues. Therefore, in order to mitigate these issues, student of IT has to study about the professional issues in Information technology (PIIT). It always relies at the heart of information technology. Since early days, criminality and crime both associated with each other. In different countries, the content of crime is different. Based on the nature and extent, crime is depended. In these modern days, information technology helps in generating business effectiveness and increasing performance. Professional Issues in Information Technology (PIIT) mainly occurs in the years of science and technology. Several authors provide lot of definition about Information Technology. Some critics say that information technology is the heart of computer that affects the era of business and their own network. Some critic defined that cybercrime is one type of crime that committed in the network of computer using inte rnet as well as other tools. However, it has been learned that computer is one of the most important part that considered as tools of information technology. However, it is identified that computer considered as an integral part of professional information technology from the point of view of internet and World Wide Web. From the point of view of internet access, information technology generates wide range of benefits to the organization in all sectors such as business industry, educational sector, etc (Dixon, 2007). There are several examples of information technology that learned in lesson such as knowledge management system, automatic generation of information via application, etc. In other words, information technology defined as the violence action. Majority of organization in these days used information technology in their business process for improving the purchasing as well as logistics system and generate higher value (Beck Boyd, 1978). There are some ways that a person ab le to work in a team such as Positive Outlook: It is very impotent in order to work as an IT professional. Positive attitude helps in changing the work and make stable in IT career. Love for Challenge: In order to work in IT sector, person has to show their enjoyment in multi disciplinary work (Engdahl, 2010). Ability to adapt to a change: It is also an important factor in terms of being IT professional. This is required because software or application change frequently. Patience, Patience and more Patience: When a person work as a member of team, this is required. It may be stressful as well as challenging but creates more fun in future. Careers in IT Information technology is broad subject and varies several types of job. Regarding information technology, there are wide range of opportunities to get job an develop career such as Business Analyst System Analyst Network Administrator Computer Design Computer Programmer Web Designer Web Developer Cybercrime In my literature review, it has been describe that there are three major categories of cyber crime such as crimes against property, government and person. Cybercrime against person is that harassment to people via cyber stalking, emails, fake phone calls, etc. Cyber Stalking is one of the most common and popular cybercrime where attackers use wide range of protocols like user net group, e-mails and chat rooms (Cartwright Scisco, 2004). Using these protocols, attackers provide different types of harassment such as religious, sexual, racial, etc. Thos kind of cybercrime mainly occurs from the teenagers and woman. Cybercrime against property occurs when the attackers develop harmful program and send it to others computer user via internet (Rijlaarsdam, Bergh and Couzijn, 2005). It had been learned that attackers using internet send virus to the personal computer and access entire information from that particular computer. Email scam is one of the great example of cybercrime against property. Attacker sends emails with virus and demand to put bank account details into the emails body. Apart from that, hacking of the companys website is also another example of cybercrime against property. As consequence, cyber terrorism is one of the most serious type of crime from the viewpoint of cybercrime. Hacking into the military sites, governments websites are the key examples of cyber terrorism. In my literature review, it has been learned by me that in technology environment, criminals of cyber categorized into different group. These are as follows Organized hacker: In order to fulfill certain objectives, these types of hackers are organized. The main aim of these hackers is to hack the political website and put bias information, fundamentalism, etc. For example, recently one hacker hack the Facebook page of Facebook developer Mark Zuckerberg. This type of hacking falls under the category of organized hacker. Discounted employees: There are huge people in the world who dissatisfied with the employers or sacked by some organization. Those types of people fall under this category. In order to take revenge from their employer, people under this category hack the system of employer. Professional Hackers: These types of hackers motivate to make money. The main aim of professional hackers is to make money from internet. Professional hackers mostly hacked the website of banks, big organization that is related to the financial sector and get the reliable information from site. I learned there are several reasons for cybercrime. The reasons of cybercrime are as follows Easy to Access: Safe guard is the main problem of computer system. Due to the complex of technology, there is present possibly of breach regarding unauthorized access. Therefore, most of the user set up their computer password in order to prevent unauthorized access using codes, retina, key loggers, advance voice recorders, etc. I learned that this type of system could easily access these passwords via bypassing the firewalls and using bio metric system. Negligence: The term negligence closely connected with the technology that conducted by human. In order to protect the computer system especially for business industry need to be any negligence. It is not maintained properly, cyber criminal access information from computer system and control the overall system. Loss of Evidence: It has been identified that loss of evidence is a big problem and very common from the point of view of cybercrime. Cyber criminal most of the time destroyed data from victim computer. Capacity to store data in small space: Computer system has the capacity to store data huge data in very small space using unique characteristic. Therefore, it is easier for the cyber criminal to access information or remove it. Complex: In order to operate the computers, need to install one operating system such as Linux, windows, Mac, etc. However, these types of operating system are composed with the million of codes. In my literature review, I learned that in major cases human mind fails to write code with proper way. They often lapse in any stage during writing the codes of operating system. The cyber criminal take advantage of lapse in any stage and penetrate the computer system. There are several manner and mode of cyber crime such as Hacking (unauthorized access): Hacking is the common term in internet area. Regarding unauthorized access, Information and Communication Act was formed in 2006. This act allows the user in protecting unauthorized access of information during interchangeable. Email Bombing: This is also popular crime in internet. There are majority of attackers that send bulk amount of emails to the computer of victim. The main intention of these type of attackers is to crash the system of victim. Worms Attack: Worms attack is also known as the virus. Attacker send virus in the form of data into victims computer for corrupting the file. The main functionality of work attack is to copies the computer memory and transfer into another computer. For example, love bug virus affected in the globe computers and losses $10 billion in business. Robert Morris created this virus in 1988 for accessing information from victim computer. Trojan Attacks: It is the most popular and harmful origin in terms of cybercrime. Attacker installed Trojan into the victims computer via chatting and access information from victims computer. Web jacking: I leaned that using the technique of Web Jacking, hackers gain information from the victim computer over internet. Majority of attacker use web jacking for providing their own information via government website. I learned that via the technology of web jacking, hacker hack the website of other and make the site according to their own demand. Moreover, I understand that cybercrime is classified into three groups such as against individuals, against organization and against society. Harassment via email: In these modern days, harassment via emails is the new concept of cybercrime. Cyber criminal send emails that contains virus to the victims computer system in the form of letter. When the victim download letter in his or her computer virus automatically runs and access information about the computer. Apart from that, I learned that majority of people send continuous emails to the victim computer. Harassment via email is the common cyber crime in these days. Cyber Stalking: It is also the new concept of cyber crime. The main concept of cyber stalking is that the criminal of cyber observes the movement of person across the internet via posting different type of message or entering chat room frequently to the victims computer. Defamation: cyber defamation is same according to the general defamation. I learned that this type of cybercrime mainly occur for the teenagers. For example, someone hacks the email id or Facebook page and change the status that he is in relationship or post some bad pictures, etc. As time passed, affects of cybercrime increased fast in comparison to other crime. There are several factors unable to detect or analyze the causes of statistic of cybercrime. Firstly, in these present days, aggressive development of technology is growing faster. This make difficult to detect cybercrime. Due to lack of knowledge as well as expertise officially, cybercrime still not analyzed or detected. Apart from that, most important method that hide the criminal activity regarding cybercrime is that when activity of cybercrime detected for a business organization, the owner of the firm lodge report for not to published name due adverse publicity. These are the main reason that leads to hide the actual nu mber of cybercrime cases in the world. Access over computer system: Unauthorized access over computer system is called cybercrime. In the world, there are several rules and regulation of hacking interchangeable in terms of hacking. In internet, various hackers access information of victim computer via providing virus or run firewall system breaking code. In order to mitigate hacking confusion, or prevent the information from being hacked, user of computer system can involve Act 200 of hacking. Email spoofing: In my literature review part, I learned that email spoofing is one of the ways of misrepresenting the origin. It has been identified that some hackers send emails to the victim for asking banking details that looks like original according to the email of banking sector. Recently the student of the University of Western Australia received emails to changing their password due to technical up gradation. According to the student of University, this email came from technical department of the University. However, this mail was traced by the technical department and aware student for never accept this type of emails without any notification of the University. Intellectual property crime: According to the critics, intellectual property consist wide range of rights in terms of protecting property. Therefore, it has been also identified by me that unlawful act may deprived completely. In order to protect the intellectual property, people have to violate software privacy, infringement, trademark, violation, source code of computer, etc. However, it has been often seen that majority of people access information or copying file without any authentication. For example, in internet several websites provide software application without permission of Microsoft. Terrorism of cyber against governmental organization: It has been understood by me that there are required to distinguish between the cyber crime and cyber terrorism. However, both of these two consider under the act of criminal. It has been realized that cyber crime generally consists under the domestic issue. However, it has some consequence in international. On the other hand, cyber terrorism is considered as the global issues. It has both international and domestic issues in respect to cybercrime. In order to protect the common form of terrorist attack in internet, victim has to use anti malware threat protecting software, or avoid unknown sources email. Majority of cyber criminal uses 512-bit encryption method in order to decrypt the information in governmental website. From this point of view, website of government has to use 1024-bit encryption method in terms of sharing information. Trafficking: Hackers assumes different forms of trafficking to the victim. In general, trafficking are can be in different in form such as human beings, arms weapons, drugs, etc. It has been identified that trafficking is the modern type of slavery. According to critics, trafficking is the fastest growing crime. Fraud and Cheating: In these modern days, online fraud and cheating is the lucrative cybercrime in these days. In internet, victim received different chat request from different server. It has been seen that in some cases online fraud and cheating pertaining to the contractual crime, credit card crime or jobs offering. From the point of view of fraud and cheating, it has been identified that there are several engineers work on the back office of customer care. During the working time, they fraudulently access information of customer credit card. Description of Changes In this world, cybercrime is ironically increased. Therefore, awareness of cyber security will be the best methodology or appropriate technology of protecting the threats of cyber crime. In my literature, review learned that technology site CNET stated that there are majority of companies that suffer from electronic threat or harassment both physically and mentally. In this physical world, people move one company to another due to change of job position (Stefoff, 2009). Therefore, if the employee wanted to steal the information of previous company such as operating manuals, battle plan, target market, target customer, etc they have lots of chance to copy file from the system of the organization in a small USB device. In order to protect the cyber crime and keep safe the information from hacker, need to follow the steps Secure the computer: In order to secure information in one computer, people have to active firewall protection. Activation of firewall allows the people in avoiding unknown source and keeps safe the computer from virus attack. Apart from that, user of computer especially the business organization has to use antivirus software that protects malware theft in internet. Moreover, in order to block the spyware in computer system need to update antivirus software application regularly. Use of Strong Password: Majority of cyber criminals hack information via internet of their victim computer. Therefore, in order to protect the cybercrime in internet, computer user has to use strong password in their own account that contains at least 10 characters in length with combination of numbers, capital and small letter along with special characters. Install latest operating system: In order to keep safe the information, organization in business sector has to install latest operating system with update features. For example, if the organization installed windows latest operating system they can easily access information if any employees insert USB device into the system. This will be the better technology for preventing personal information. Data Protection: When the organization especially the organization that operates in financial sector share information to other, need to use RSS encryption technology. It will help in protecting data from hacked into the server. 512-bit encryption method will be the best technology of encrypting data and protect from hacker. Apart from that, organization in financial sector has to take regular backup of their information and store in into the other location such as external hard disk or cloud server (Ross, 2010). Secure wireless network: In these modern days, companies use wireless connection technology in order to create intranet connection over workplace. It is also one of the lapse points by company because hacker using the wireless network attacks into their server room and access information. Appropriate combination of password and user identity technology in wireless network will be the best methodology (Vanelstraete Francken, 1997). The IT department of financial sector has to set up the network that protects access of internet when it identifies unknown IP address use system. Apart from that, computer user has to justify proper identity when they sale or purchased products via online. Moreover, when user access social networking site, they have to be more conscious. References: Beck, C., Boyd, D. (1978).The moral education project (year 5). [Toronto]: Ministry of Education. Cartwright, T., Scisco, P. (2004).Developing your intuition. Greensboro, N.C.: Center for Creative Leadership. Engdahl, S. (2010).Cybercrime. Farmington Hills, MI: Greenhaven Press. Ross, J. (2010).Cybercrime. New York: Chelsea House. Stefoff, R. (2009).Cybercrime. Tarrytown, N.Y.: Marshall Cavendish Benchmark. Vanelstraete, A., Francken, L. (1997).Prevention of reflective cracking in pavements. London: E FN Spon.
Subscribe to:
Posts (Atom)