Monday, September 30, 2019

Ap Euro Martin Luther Conservative or Revolutionary Essay

Martin Luther was one of the greatest monks, priests, and theological teachers of Germany, along with being the symbol of the Protestant Reformation. He did not start off so religious however. One day he was caught in a frightening and dangerous storm. He prayed to God begging not to be killed, and vowed to become a monk if he survived. He did live, upholding his word to the lord, and joined a monastery. He joined an Augustinian friary in 1505, where he suffered from anfechtung, or spiritual anxiety. He never knew if he was doing enough good works to achieve salvation and gain entrance to the kingdom of heaven, as it was believed by the Catholic religion that it took good works along with faith in order to enter. To take his mind off of his religious worries, he was recommended to a teaching post at the University of Wittenberg. There, he taught theology and was quite popular among his students. Luther suffered from constant constipation, so he often read the bible while on the toile t. One day while doing this a certain passage from the epistle of St. Paul to the Romans: â€Å"the just shall live by faith,† which led to Luther’s core belief of sola fide, or faith alone. Through this belief, Luther believed that the only thing needed to achieve salvation was to live by faith alone, which challenged the Roman Catholic Church’s theology that both faith and good works were necessary. Luther shared his beliefs with the people of the Holy Roman Empire, demanding change to the way theology was widely taught. He agreed with parts of the current teachings and was conservative, wanting to keep parts of the religion the same. He kept the sacraments, however reduced the amount of them from 7 to 2. He was also like many Roman Catholic religious figures, anti-Semitic. Lutheranism, as his religion came to be called, became more submissive to the state as well. However Luther also had many revolutionary ideas, which angered those of the RCC. In response to the political problems, he wished to do away with the process of indulgences, which were no more than pieces of paper in his eyes as works had nothing to do with salvation. His nailing of the 95 Theses highly angered the church authorities, as it went against everything they taught and believe. However in his response to the social problem of the Peasant’s Revolt, he told the princes to crush those who rebelled, as social revolution was not his intention. After careful evaluation, Martin Luther has proven to be both a revolutionary as well as a conservative. Luther proved himself time and again of his revolutionary approach to religion. His best example of this was the 95 Theses. Johann Tetzel, a German Roman Catholic priest, was selling an expensive indulgence as a fund-raising idea of Pope Leo X to finance the building of St. Peters basilica. When one of Luther’s parishioners came to confession, he presented an indulgence he had paid for, claiming he no longer had to re pent of his sins, since the document promised to forgive all his sins. Luther was outraged, and wrote up the Ninety-Five Theses, protesting the sale of indulgences, which he proceeded to nail to the door of All Saints’ Church in Wittenberg Germany. He did this on a major Catholic holiday, All Saints Day, which struck at the core of the Catholic religion. The most prominent, challenging, and well known was Theses 86 which read â€Å"Why does the pope, whose wealth today is greater than the wealth of the richest Crassus, build the basilica of Saint Peter with the money of poor believers rather than with his own money?† He said indulgences did not do what the Church said it did because salvation was granted by sola fide. The ideas in the Ninety-Five Theses quickly spread throughout Europe via the moveable type printing press. Another time Luther engaged in revolutionary actions was at The Disputation at Leipzig. He was invited to participate in the Church-sponsored debate, as the Church wanted a dialogue concerning Luther’s challenges to Catholic doctrine and practices. RCC leaders at Leipzig declared that Luther’s ideas were wrong because the pope and Church traditions could not be wrong. Luther then shocked everyone, denying the authority of the pope and church councils. He declared that the only authority on matters of faith for Christians was the Bible. He said that sola scriptura, or scripture alone, determined the belief of Christians, not the teachings of the Pope. Upon the conclusion of the meeting at Leipzig, Luther was threatened with a papal bull of excommunication, which he burned in protest. Luther also showed revolutionary idea at the Diet of Worms. He was called to attend by Charles V, the recently elected Holy Roman Emperor. At the assembly, Luther was asked if he had written the â€Å"Ninety-Five Theses,† â€Å"The Address to the Christian Nobility,† â€Å"The Babylonian Captivity of the Church,† and other works. Luther accepted the accusations and acknowledged that he had written them, and when asked to recant his ideas or suffer the consequences, he requested a night to think about his decision. When Luther returned the next day, he stood firm when asked if he would recant and proudly declared â€Å"Here I stand, I can do no other.† Luther was then declared a heretic and became a marked man. Troops of Frederick the Elector rescued Luther and took him to safe hiding in Wartburg Castle, where he proceeded to translate the Bible into the vernacular, which was highly against the teachings of the church and very illegal. He also declared that monks and nuns were not obligated to uphold their vows. Luther not only acted revolutionarily towards political religious issues, but towards the social issues of the time as well. The most well known was the Peasants’ Revolt. Some religious leaders twisted and perverted Luther’s ideas to benefit their own causes, with the most prominent being Thomas Mà ¼ntzer. They wrote the â€Å"Twelve Articles†: a petition of peasant demands and sent it to the Swabian League that called upon the Holy Roman Emperor to help the peasantry deal with economic and religious issues. When Charles V ignored the â€Å"Twelve Articles,† preachers led by Mà ¼ntzer stirred the masses to revolt against the nobles. Luther believed the peasants were way out of line, as he was adamantly against mixing religious reformation with political and social revolution. He disassociated himself with Mà ¼ntzer and the revolting peasants. He urged the princes to work together to â€Å"slaughter the swine,† or the peasants. He argued that religious subjects must be subordinate to their secular authorities. Luther proved himself a revolutionary over and over through many acts throughout his religious life. Though Luther was a revolutionary, many of his actions also dictate a conservative approach, wanting to keep some things the same or even go back to the way they used to be. An important message Luther delivered was that good Christians owed obedience to established authority in worldly matters. Lutheranism viewed the state with more respect than other religions did. Lutheranism was much more submissive to the state. He insisted that Christian liberty was an internal freedom, known only to God. Luther wanted the church teachings to go back to how they used to be, based on sola scriptura or scripture alone, without the need of outside interpretation by the pope, bishops, abbots, etc. He was conservative in that he made many alliances with princes who liked his ideas, spreading them to their own kingdoms. He didn’t side with armed rebellions, citing his name, against the nobility in regions of Germany, instead he backed the nobility, telling them to work together to â€Å"slaughter the swine.† He did not want to do away with the sacraments, however he did want to reduce them from seven to two. This showed how he did not want to change all parts of the Roman Catholic religion, only parts. Also, like most religious figures of the time Martin Luther was anti-Semitic. He wanted all the Jewish people to convert to Lutheranism, as he did not believe the Jewish religion was correct in its teachings and beliefs. He restricted the right of private judgement in matters involving conscience, but never denied it. A conservative in the way he did things, Luther was truly a great leader. Luther believed that the only thing needed to achieve salvation was to live by faith alone, which challenged the Roman Catholic Church’s theology that both faith and good works were necessary. Luther shared his beliefs with the people of the Holy Roman Empire, demanding change to the way theology was widely taught. He agreed with parts of the current teachings and was conservative, wanting to keep parts of the religion the same. He kept the sacraments, however reduced the amount of them from 7 to 2. An anti-Semitic, Luther displayed similarities with other religious officials. Lutheranism b ecame more submissive to the state, as Luther believed that in worldly matters religion has to listen to authority. However Luther also had many revolutionary ideas, which upset those of the RCC as it went against the basics of Roman Catholic teachings. In response to the political problems, he wished to do away with the money robbery of the selling of indulgences, which were no more than pieces of paper in his eyes as works had nothing to do with salvation. His nailing of the 95 Theses made the power of the church authorities fluctuate, as it went against everything they taught their followers and everything they had been taught.. However in his response to the social problem of the Peasant’s Revolt, he told the princes to crush those who rebelled, as social revolution was not his intention. He meant to keep the matters of social or political problems separate from religious reform. After carefully evaluating his actions, Martin Luther has proven to be both a revolutionary a s well as a conservative on multiple occasions.

Sunday, September 29, 2019

Family Violence Essay

Family violence is not a new phenomenon, as it has essentially existed since the beginning of time. Only in modern times, however have societies begun to recognize violence and family members as a social problem (Barnett, Miller-Perrin & Perrin, 2005). For many years, the social problem of family violence had not only been heavily ignored, but for a number of years, had not been fully understood. For example, family violence takes many forms and has a number of different names. Family violence, also known as domestic violence, spousal abuse, battering, family violence, and intimate partner violence (IPV), is defined as a pattern of abusive behaviors by one partner against another in an intimate relationship such as marriage, dating, family, or cohabitation (Barnett et al., 2005). Moreover, family violence includes but is not limited to physical abuse such as kicking and punching, but also includes sexual and emotional abuse. Emotional abuse includes controlling or domineering; intimi dation; stalking; passive/covert abuse (neglect) and economic deprivation and in many cases is more severe than physical abuse. The changing visibility of family violence is the leading indicator of the necessity of an historical approach to understanding it (Gordon, 2002). Over the past few years, the general public in the US has become familiar with family violence through news coverage of highly publicizes cases, TV programs and movies. At the same time, researchers have made great strides in recognizing the scope of family violence and the context in which it occurs (Barnett et al., 2005). As sociologists know of it today, family violence is politically, historically and socially constructed (Gordon, 2002). In terms of power relations and functionalism, family violence arises out of power struggles in which members of the family are contesting for resources and benefits (Gordon, 2002). Furthermore, these contests arise from both personal aspirations and change social norms and conditions (Gordon, 2002). It is therefore important to know that family violence cannot be understood outside the context of the overall politics of the family. Historical developments that continue to influence family violence include prominent changes in the situation of women and children (Gordon, 2002). It is imperative therefore for a historical analysis of family violence to include a view of the changing power relations among classes, sexes, and generations (Gordon, 2002). Political attitudes have also affected research â€Å"findings† about family violence. Both psychological and sociological interpretations in the debate often ignore the gender politics of family violence issues, and the gender implications of policy recommendations, not only when women or girls were the victims, but also when women were the abusers (Gordon, 2002). Over the past 80 years, four major types of family violence have be studied and examined; child abuse, child neglect, sexual abuse of children and wife beating. In later years, there have been other forms of family violence, which include sibling abuse (which is the most common form of family violence), and elder abuse (Gordon, 2002). Family violence has had many different faces historically, and has been classified in five different stages with different focuses periodically. The first was the 19th century and child saving era, which was from 1876-1910. During this era, there was anti-cruelty to children movement that was influenced by the temperance movement. Emphasis on the cruelty done to kids was placed on the immigrant poor and never the respectable classes (Gordon, 2002). The progressive era was followed by a child saving era which lasted from 1910 -1930 which lead to an emphasis on child neglect. During this era, there was a decrease emphasis on alcohol and identified other forms of stress such as poverty, unemployment and illness (Gordon, 2002). The depressed followed the progressive era where there was an increased defense for the conventional nuclear family. During the World War world war 2 era and the 1950’s child neglect was increasingly seen as emotional neglect and the 1960s and 70s was a period of increased medicalization of family violence which, as sociologists have identified can have extremely negative affects (Gordon, 2002). A lot of attention to family violence began to gain increasing importance during the time of the women’s movement in the 1970s as a concern about wives being beaten by their husbands. Interestingly enough, there was a rise in what some call â€Å"the men’s movement† as response to the problem of domestic violence against men, which is largely omitted in the feminist theory (Barnett et al., 2005). Some flaws in the feminist approach to family violence (as well as others that will be further discussed in the paper), is that it has reduced domestic violence, especially against men as their likelihood of being killed by a female intimate partner has decreased six-fold (Barnett et al. , 2005). OVERVIEW OF SEMINAR READINGS: WEEK 2 Symbolic interactionism is a perspective which seeks to understand how people interact with others (Ingoldsby, Smith & Miller, 2004a). The theory claims that people interact with one another by interpreting each other’s actions (Ingoldsby et al., 2004a). Their response is based on the meanings that they attach to such actions (Ingoldsby et al., 2004a). Thus, human interaction is largely mediated by the use of symbols (Karp & Yoels, 1993). Authors Karp & Yoels (1993) discuss notions of the generalized other and looking-glass self as examples of symbols with which we interact. In one instance, the self emerges from common expectations that others have about social norms within a particular society (Karp & Yoels, 1993). But in another instance, people will self-evaluate themselves against the perceived judgments of others and act accordingly (Karp & Yoels, 1993). The emphasis on symbols brings attention to the roles people play. Role-playing is a key mechanism that allows people to see another person’s perspective to understand what an action might mean (Ingoldsby et al., 2004a). In sum, no situation is static but rather contextual (Ingoldsby et al., 2004a). Individuals then through their own behavior and interaction with others, construct their individual social realities (Karp & Yoels, 1993; Ingoldsby et al., 2004a). Situating family violence within a framework of symbolic interactionism is important in that it provides a context within which people develop their personal interpretations of events. Therefore to understand family violence requires knowledge of the processes through which such interpretations emerge. Rosen (1996) and Mullaney (2007) illustrate ways in which interpretations of the self are at the core of domestic violence. Their findings are essential for understanding how family violence continues over time. Findings also help to account for the formation and preservation of culture and social roles in society. In one respect, interpretations of the self are mediated through two primary orientations of communication: processes of seduction an d processes of entrapment (Rosen, 1996). This first is characterized by forces that tend to draw women into their relationships (romantic fantasies and romantic fusion) and the second by forces that keep them there: survival tactics, cognitive dissonance, roller coaster relationships, traumatic bonding, Romeo and Juliet effects, and peer-family collusion (Rosen, 1996). For example, within the framework of symbolic interactionism, processes of seduction can be loosely defined as a dependent emotional state (Rosen, 1996). Individuals then, connect with partners because they internalize similar understandings of weakness and dependency to communicate feelings of love (Rosen, 1996). The interplay of such communication patterns facilitates an environment of spousal abuse that is likely to continue so long as interaction is repetitive (Rosen, 1996). Processes of entrapment on the other hand, can be argued to demonstrate the externalization of the communication patterns found in processes of seduction. Once meanings of dependency and weakness have been internalized as being both legitimate and appropriate within the context of one’s relationship, these women rationalize such behavior as the norm and thus stay. Survival tactics for example illustrate these efforts, by which women actively engage towards relationship management of an abusive relationship, otherwise internalized as an acceptable social norm. In contrast, Mullaney (2007) identifies low self-esteem as a correlate of men’s violent behavior. Domestic violence then, is a reaction to the attacks or perceived attacks on men’s self-concept (Mullaney, 2007). Mullaney (2007) argues that men will most often justify, yet also minimize, excuse, or blame and offer no apology on account for their violence towards women. These categories serve as scripts through which perceptions of masculinity are restored (Mullaney, 2007). If threatened, masculinity evolves accordingly as men interpret the actions of those around them. For example, women’s irrational spending habits may undermine men’s role as financial provider (Mullaney, 2007). Men would argue that such habits do not align functionally with women’s domestic and social roles (Mullaney, 2007). By doing so, men’s responses are based on the meanings which they attach to such actions and reflect cultural expectations of gender difference. This is problematic because it helps promote and develop stereotypically gendered selves (Mullaney, 2007). Symbolic interactionism then, becomes useful in demonstrating how dominant ideologies of gender are enacted within the interactions of marital relationships, and lend to domestic violence in the process. THEORETICAL PERSPECTIVES Feminist Theory The root of feminist theory begins with the inclusion of gender and power. Feminists argue that the distinctions between males and females are not inherent or functional; rather they are socially constructed to create and maintain male power in society and thus the family (Yllo, 1993). This sense of patriarchy reinforces traditional social roles and the relationship between the division of power and gender. The feminist perspective suggests that men use violence to retain their dominance or sense of control within the institution of the family. Thus, the feminist paradigm believes that domestic violence is utilized as another means of the social control of women, and takes roots at a personal, institutional, symbolic and material level. The application of a feminist lens to Rosen’s (1996) article allows for a very different approach to the processes of abduction and entrapment. The feminist perspective would likely explain that the forces drawing women into abusive relationshi ps were largely due to the social expectations of femininity and masculinity. The concept of romantic fantasies can be explored through gender identities. Here society portrays the male as being a strong, aggressive, independent individual and the female as a weak, docile individual that is largely dependant on their partner. For instance, the fantasy of Cinderella eludes that a man can protect a woman and save her from her problems. Feminists would suggest that women fall victim to these relationships due to the inequalities portrayed by traditional gender norms. Feminist theorists would likely explain the concept of romantic fusion as being due to the extremely controlling nature of husbands within a patriarchal marriage. This type of relationship is defined as Patriarchal Terrorism (Johnson, 1995). Here, the woman in the relationship would be forced to part with her individual characteristics and become completely devoted to her husband (Johnson, 1995). Furthermore, the husband may further restrict the identity of the woman by refusing to allow her to go to work or maintain friends outside of the actual relationship. The feminist lens would offer a slightly different interpretation of the processes that restrict women from escaping abusive relationships. Though women may still use coping mechanisms and adhere to other social forces, outlined by symbolic interactionaists, feminist theory suggests two main reasons why they stay in violent relationships. The first reason women stay in abusive relationships is fro the sake of their children (Emery, 2009). In cases such as these women will stay with the intent of maintaining some stability for their kids by trying keeping the family in tact. The other reasons women may stay are due to the normalization of gender norms in society. Feminist theory sees the root causes of intimate partner violence as a causation of living in a society that excuses aggressive male behaviours (Yllo, 1993). In other words, because these behaviours are so normative, some women may excuse the behavior and treat it as the norm. What is perceived as the norm also varies across culture. Even today, many cultures adhere to traditional hegemonic norms and strongly believe women should be completely subservient to their husbands. In cases such as this, abuse may be next to impossible to escape. The application of the feminist perspective to Mullaney’s (2007) article would allow for a similar analysis of the attitudes of men and their reasons for rationalizing their abusive behaviours. Mullaney (2007) suggests that men will often become violent due to low self-esteem and a perceived attack on their self-concept. The feminist lens would suggest that men become violent due to the inequalities in society that allow men an advantage position and with that gendered norms. Traditional hegemonic masculine norms suggest that men should be leaders that are strong, in control and tough. This is what the men in the study were trying to demonstrate. Whenever, they felt that their sense of masculinity was being challenged they would lash out in an attempt to regain control. The Control Model of Domestic Violence further provides a precise framework in displaying the interconnectedness between violence and other forms of coercive control. Simply put, the feminist theory suggests th at men use violence as a tactic of controlling their abused wives from participating in actions they have not sanctioned. Family Systems Theory The Family Systems theory provides a very unique, holistic perspective on the topic of violence in the family. This perspective describes the family as a unit of interacting personalities. Sociologist Ernest Burgess, best summarized this perspective when he stated that the family is more then just a definition; it is a living, super personality that has its essence in the interaction of its members (Ingoldsby, Smith & Miller, 2004b). Each member of the family plays a very important role in the overall functioning of the unit. When applied to the topic of violence in the institution of the family, this paradigm focuses on the family dynamics that contribute to domestic abuse. Subsequently less attention is focused on the individual perpetrating the violence and more attention is paid to the environment surrounding the violence and the role each character in the family plays. The Family Systems perspective offers a diverse interpretation of Rosen’s (1996) article on the processe s of abduction and entrapment. Family Systems Theorists differ with respect to how they feel that women are drawn into abusive relationships. This perspective identifies the connection between family goals, rules and control, and how together one can fully understand the development and causation of domestic abuse (Ingoldsby et al., 2004b). For example in the article by Rosen (1996), it can be seen that by using family systems theory and studying familial interactions that certain females may be predisposed to the Cinderella and Beauty and the Beast paradigms. By looking at how their families’ function, one may be able to see the recycling effect due to unresolved or violent backgrounds these victimized individuals may come from. They may fall into a similar pattern from what they know at home, thereby examining the origins of this behavior and viewing the interconnectedness of how one internalizes family rules and ideas of control. Family System’s Theory offers a unique interpretation as to the role women play in becoming stuck in abusive relationships. In the stages preceding marriage, women will often date their partner, while simultaneously leading separate lives which consist of separate relations. As the commitment in a relationship increases, a couple begins to modify their individual social lives. In these types of situations, both men and women will often make more time for one another. This allows for the woman to feel appreciated and loved. As the relationship continues to progress, incidents of sexual jealously among men will often become a major source of conflict. This sense of possessiveness will ultimately cause the female to begin severing ties with male friends, and become increasingly committed to her future husband (Dobash & Dobash, 1993). Once married, dramatic changes occur and the extreme constriction of the wives social life takes place. With the introduction of children, comes the solidification of traditional gendered norms. Wives become extremely restricted and are left responsible for domestic work, such as the operation of the home (Dobash & Dobash, 1993). This may cause women to become increasingly dependant on their husbands. Subsequently, when sources of conflict occur, such as sexual jealousy, disputes over domestic duties or the expenditure of money, women may feel that they have no mobility and are stick in their current situation. Lastly, Family Systems Theory offers a holistic approach to the factors found in Mullaney’s (2007) article that cause men abuse their partners. Like Feminists, Family Systems theorists also believe that a very important aspect of traditional hegemonic masculinity is the element of control. However, unlike the feminist theory this approach attempts to understand what causes men to lose control. One explanation is that violent men often feel as if they may lose control, if they express their emotions, and thus hold it in. This in turn, causes violent men to generally be less emotionally reactive to stress on a day-to-day basis, then non-violent men (Umberson, Anderson, Williams, & Chen, 2003). Though in the short term, repression may be a successful coping strategy for reducing stress and anxiety, it causes the individual increased predicaments in the long run. Repression turns a violent man into a ticking-time bomb, one that is ready to explode in a violent manner. As a result, unlike feminist theories or social interactionism, family systems theory attempts to understand violence in the family by examining every interdependent part of the family. This includes the part both the victims and the offenders play, as well as the role everyday stresses and ones immediate environment have in contributing to family violence. Social Constructionism The methodological approach of Social Constructionism somewhat contrasts the assumptions of other theoretical perspectives that explore the issue of family violence. This paradigm suggests that the emergence of social problems is heavily due to how society, or more specifically institutions within society such as the mainstream media, portrays the issue at hand. Furthermore, social constructionists are often referred to as claims-makers, in that they present a claim that attempts to define the problem at hand. These claims can be heavily influenced by the agenda of the claims-maker, and will clearly identify the roles of the characters within the construct of the event. For instance, social constructionist’s will identify the perpetrator of the violence as the villain and the abused partner as the victim. The analysis of Rosen’s article surrounding the processes involved with seduction and entrapment, using a constructionist lens, provides a different interpretation to the ways women become bound to abusive relations. This perspective focuses on the subjective definitions that cause social problems and look to frame the phenomena of family violence as a social problem (Loseke, 2005). For instance, symbolic interactionism maintains that some abused women are bound to relationships by the process of cognitive dissonance. In cases such as this, women create discrepancies between what they believe the violence in the relationship signifies and what is actually happening. Constructionists on the other hand will focus very little time into how women construct the violent situations. Instead this perspective theorizes that these women have fallen victims to the violent, controlling nature of their abusive, villainous male partners (Loseke, 2005). The media or other primary claims-makers would further emphasis on violent verbal claims, visual images and specific behaviours. The reason of this is to evoke the emotions of society in order to persuade society that a troubled condition exists. The application of a constructions lens to Mullaney’s article on the reasons and types of rationalizations men provide for spousal abuse would allow theorists a better understanding of the ways victims and villains perceive family violence. The social constructionist lens suggests that men create their own social reality. This reality allows men to rationalize their behaviours. For example, in Mullaney’s (2007) article men would often minimize, justify or even deny abusive behaviours. These men will often excuse their behaviours by blaming social or external factors, such as alcohol abuse and the structural problems associated with poverty. These claims are sometimes able to persuade audiences and have allowed for some villains to be rehabilitated through the medicalization of their deviance. ADVANTAGES AND DISADVANTAGES Symbolic Interactionism Symbolic Interactionism is a key tool to examine domestic violence and its various intricacies. In essence, SI theory attempts to look at domestic violence from the viewpoint of individuals and their interactions with other people. This theory explains that individuals are engulfed in a symbolized environment, where the meanings for these symbols are altered within the course of interaction with other people (Karp & Yoels, 1993). For example, in the article â€Å"The ties that bind women to violent premarital relationships: Processes of seduction and entrapment†, SI is exemplified in the notion of cognitive dissonance. If a man were to slap his wife, while she may see this as an expression or symbol of love, many other people would see this as abuse. Therefore, the difference and meanings of symbols is very fluid, changing and subjective. Furthermore, SI theory is extremely effective in allowing researchers to understand and describe the individuals and their behaviors. It allows an understanding of how conflicts and complex behavioral patterns may arise in relationships, and how the interpretations of symbols may play a role in domestic disputes. This theory is quite effective in predicting future behavior (SI theory is advantageous to use as it grows and adapts to changes within society) and the roles they may play in the relationship either as a perpetrator or a victim, and the context in which these roles are played (Karp & Yoels, 1993). Rosen (1996) explains and clumps together several types of entrapment processes, such as placation or isolation, which predicts why and how females are coerced to remain in that sort of relationship. In addition, this theory does lack certain key elements in understanding domestic violence in its entirety. Due to the quite narrow scope of analysis, it is not very useful in understanding more macro levels of interactions such as groups or family systems. Another disadvantage is that it is quite difficult to apply the theory to other cultures, as its findings and hypotheses are based on a singular cultural atmosphere. Since monotony across cultures does not exist, a grand, overarching theory of domestic violence cannot be established, thereby making international or cross-cultural comparisons quite trying. Feminism Domestic violence as viewed through the feminist perspective focuses on the relationship between gender and the division of power in the familial framework (Yllo, 1993). This framework allows domestic abuse to be viewed in a way that is quite distinct from other theories. Feminist theory reveals that the social expectations regarding masculinity and femininity give relationships their shape, which may result in violent and abusive familial relations (Yllo, 1993). Feminist theory allows for the recognition of the effects of patriarchy in an abusive relationship, which is normally neglected in other theories. For instance, the Conflict Tactics Scale (CTS) looks at the violence in families, however it neglects several other aspects that could contribute to violence. CTS assumes that males and females are both equally violent in domestic relationships however, feminists note that CTS fails to account for the social expectations (Yllo, 1993). The social expectations of the division of power between a male and female within a relationship can give rise to the abuse and therefore, it cannot be assumed that males and females are equally violent and there are statistical measures that portray a gendered view. For example in the reading, â€Å"Patriarchal terrorism and common couple violence: two forms of violence against women† it can be seen that feminism denotes a difference in the types of violence that occur in domestic partnerships and further differentiates between common couple violence and patriarchal terrorism. This article notes that while CTS looks only at a limited number of control tactics, feminism can shed light to several other controlling methods. While, one can see that feminist theory brings up key defining points that are commonly overlooked, it does remain flawed in many respects. Feminist theory is difficult to apply to forms of domestic violence except for spousal abuse; specifically it only examines the abuse directed towards women. It automatically victimizes the female, and thereby situates the male in role of the villain. Another disadvantage of using solely feminist theory is that same-sex relationships are also not taken into account in their analyses, since it is assumed in feminist analysis that males are the perpetrators and use violence in the relationship to control women. For instance in the article, â€Å"The ties that bind women to violent premarital relationships: Processes of seduction and entrapment†, the analyses are based on the observation of heterosexual relationships. It did not look at how and if these processes of entrapment are applicable to homosexual relationships, for instance, do the Cinderella or Beauty and the Beast paradigm still adequately explain why homosexuals remain in violent relationships. It can be seen that there is a victim/perpetrator structure of the violent relationship, however it cannot be concluded that the processes that entrap victims in violent relationship are similar for same-sex couples. Family Systems Theory Family systems theory is a more holistic approach to understanding abuse within the family and further looks into how everyone within this framework is interconnected. Therefore, it explains how the individual affects the family system and vice versa. Through this analysis, one key contribution of this theory is that it paves the way of identifying the connection between family goals, rules and control, and how together one can fully understand the development and causation of domestic abuse (Ingoldsby et al., 2004b). For example in the article by Rosen (1996), it can be seen that by using family systems theory and studying familial interactions, certain females may be predisposed to the Cinderella and Beauty and the Beast paradigms. By looking at how their families’ function, one may be able to see the recycling effect due to unresolved or violent backgrounds these victimized individuals may come from. They may fall into a similar pattern from what they know at home, thereby examining the origins of this behavior and viewing the interconnectedness of how one internalizes family rules and ideas of control. In the article, â€Å"Stay for the Children? Husband Violence, Marital Stability, and Children’s Behavior Problems† it clearly articulates that the violent behavior is internalized or externalized by children by prolonged exposure of violent behavior. The cyclical pattern of violence is foreseeable in these sorts of family arrangements, thereby being consistent with the idea that the system of family and the individuals within it are affected by each other on a constant basis. Family Systems theory also helps identify the different sorts of family structures in terms of their communicational boundaries and also allows the recognition of the various outcomes for a particular situation (Ingoldsby et al., 2004b). Understanding that there are multiple outcomes for a given situation sets a more encompassing investigation and limits the likelihood of leaving something out or missing a key-contributing factor. It also allows a point of differentiation, and assumes that not all people react the same when the situation arises. This is important as it further provides the researcher with a defining and narrowing point as to which sort of family has a higher likelihood for domestic violence to occur and persist. Some of the downfalls of using family systems theory are that it is often criticized that it is too general and therefore, its application remains vague. The vagueness stretches from the assumption that systems theory is not a true theory rather it is a model that is more methodological than theoretical. Social Constructionism Social constructionist theory is a popular theory used to examine the roles played in an abusive relationship. An advantage of constructionist theory is that it clearly identifies the victim and the villain within the construct of the particular event (Loseke, 2005). Claims-makers are portrayed as practical actors constructing successful claims that reflect existing culture, and producing new culture of various social problems, specifically family violence. Social constructionism also allows domestic violence issues to be raised to the forefront and become more public, through the media. Through its application and explanations, this theory can be used to show how knowledge is socially constructed and how that knowledge reflects power and politics in family violence situations. Furthermore, it can give shape to other forms of domestic violence through counter claims making, such as husband abuse. Unlike other theories, constructionism is quite useful in examining other types of abuse and not singularly looking at wife abuse like feminism (Loseke, 2005). Constructionism allows for the understanding of child or elder abuse in the household. This theory also helps understand how people construct realities that keep them in abusive relationships, and how the relationship may be viewed differently to other people. In the article by Mullaney (2007), the construction of the men’s reality of the situation may differ from what abuse has occurred to the wife. The husband may reframe the abuse as â€Å"non-violent† or suggest that in that instance of abuse that it was not the â€Å"real him† that was carrying out the abuse. The disadvantages of using social constructionist theory are that due to the fact that individual events are a crucial component to the analysis, its subjectivity allows much room for debate. This makes it difficult to develop a theory that can encompass all the social realities and have it apply to all domestic violence cases cross-culturally. While looking at the article â€Å"Creating clients: Social problems work in a shelter for battered women,† it can be seen that shelters create an ideal client that one must fit in order to be allowed to be in the shelter. Creating this sort of criteria leaves out many other people who typically do not fit the stereotype or do not meet the conditions set out by the providers even though they are in need of assistance. Using this theory, it seems as though society has constructed an â€Å"ideal† victim and those who do not appear to fit this idealistic view of a victim are often rejected despite their need for immediate attention. Social constructionism therefore does not grant that everyone experiencing violence will be offered assistance, as this is based on the shelter’s perception of what a victim should look like. Family violence is a very serious social problem, and while social critics focus on how to achieve social change in this regard, social constructionists work to achieve new knowledge. Thus, social constructionism does not only pose a potentially dangerous approach to understanding and treatment of family violence, but it also does not examine objective conditions in their own right and seek to solve this social problem; essentially there are â€Å"no real truths† due to the subjectivity of the theory. REFLECTION Although much research and knowledge has been gathered in the field of family violence, there are ways in which this research must progress. Theoretically, family systems theory, symbolic interactionism, social constructionism, and feminist perspectives each have advantages in their application. As previously discussed, they each additionally have faults that hinder the study of family violence. We propose that a new theoretical framework be considered which essentially combines different aspects of each. For example, the notions of cause and effect associated with family systems, with an understanding of roles, salience and identity associated with symbolic interactionism. These theories can additionally be used to critically examine the core concepts of each. For example, how is the process of the looking-glass self influenced by the double-bind. Theoretical application in these ways may lead to new ways of perceiving family violence. The study of family violence also should attempt to increase its scope. Studies of family violence must adjust due to emerging and increasingly common alternative family forms; same-sex parent families and polygamous relationships are such examples. Methodologically, the study of family violence should attempt to attain a more culturally diverse sample. Many of the readings focused on this semester relied on a predominantly Caucasian sample, and studies focusing on different ethnicities would be beneficial. If researchers are to examine alternative family forms they must also establish a methodology that is sensitive to the stigma surrounding different identities, for example the emasculation associated with husband abuse, or the intersection of a homosexual identity within a context of family violence. Researchers should also establish a methodology that accounts for those patterns of violence considered â€Å"less severe† than others such as verbal abuse, as studies pertaini ng solely to physical violence are not enough. Practically, we suggest that researchers focus on early intervention through education. Researchers should aim for the implementation of programs directed to informing children and teenagers about this social issue. With increased awareness may come increased action towards ending the problem. These programs may assist a young person who is dealing with family violence, giving them an opportunity to speak to someone about it. Making the issue visible, giving it a platform to be discussed and early intervention is requisite to decreasing the frequency of family violence. The application of different aspects of the theories discussed this semester will be beneficial to the study of family violence as a whole. The fallacies of one theory may be redeemed through the usage of another. When evaluating such troubling social issues such as family violence, it is important to always think critically. In the cases of physical violence, we know that though symbolic interactionism, family members react to a situation based on their ability interpret the situation. So, it is important to understand the symbols the family uses to understand their interactions and behaviors. If a family is exposed to continuous physical abuse, in what ways do the family members interpret and internalize it? Why is it that many of the abused women came from families where no abuse was present and moreover continue the cycle of abuse? Where has the self worth gone or was it ever there in the first place? We now know some of the reasons why family violence is not reported and a lot of it has to do with the social stigma that is attributed both by those receiving the abuse and those who are the abusers. By building on – rather than challenging – the theories we can expand our knowledge and practically implement programs to assist those dealing with family violence. REFERENCES Barnett, O. W., Miller-Perrin, C. L., & Perrin, R. D. (2005). Family violence across the lifespan: An introduction (2nd ed.). Thousand Oaks: CA: Sage Publications. Dobash, R. E. & Dobash, R. (1993). Violence against wives. In B. Fox (Ed.), Familypatterns: Gender relations (pp. 299-317). Toronto: Oxford University Press. Emery, C. R. (2009). Stay for the children? Husband violence, marital stability, and children’s behavior problems. Journal of Marriage and the Family, 71, 905-916. Gordon, L. (1989). The politics and history of family violence. In A. Skolnick & J. Skolnick (Eds.), Family in Transition (pp. 68-86). Glenview, Illinois: Scott, Foresman and Company. Ingoldsby, B., Smith, S., & Miller, J. (2004a). Symbolic interactionism theory. In B. Ingoldsby, S. Smith, & J. Miller (Eds.), Exploring family theories (pp. 81-92). CA: Roxbury Publishing Company. Ingoldsby, B., Smith, S., & Miller, J. (2004b). Family systems theory. In B. Ingoldsby, S. Smith, & J. Miller (Eds.), Explo ring family theories (pp. 167-179). CA: Roxbury Publishing Company. Johnson, M. (1995). Patriarchal terrorism and common couple violence: two forms of violence against women. Journal of Marriage and the Family, 57, 283-294. Karp, D., & Yoels, B. (1993). Socialization and the construction of social reality. In D. Karp & W. Yoels (Eds.), Sociology in everyday life (pp. 37-59). Illinois: Waveland Press. Loseke, D. R. (2005). Construction people. In D. R. Loseke (Ed.), Thinking about social problems: An introduction to constructionist perspective (pp. 75-96). London: Aldine Transaction. Mullaney, J. L. (2007). Telling it like a man: Masculinities and battering men’s accounts of their violence. Men and Masculinities, 10, 222-247. Rosen, K. (1996). The ties that bind women to violent premarital relationships: Processes of seduction and entrapment. In D. Cahn & S. Lloyd (Eds.), Family violence from a communication perspective (pp. 151-176). Thousand Oaks, CA: Sage Publications. Umbe rson, D., Anderson, K., Williams, K., and Chen, M. (2003). Relation dynamics, emotion state, and domestic violence: a stress and masculinities perspective. Journal of Marriage and the Family, 65, 233-247. Yllo, K. (1993). Through a feminist lens: Gender, power, and violence. In R. Gelles & D. Loseke (Eds.), Current controversies on family violence (pp. 47-62). Newbury Park: Sage Publications.

Saturday, September 28, 2019

Black Death

The Black Death according to many historians does not narrow down to one cause. There have been several interpretations of what has caused the plague. But there have not been different opinions on the effects of the Black Death. The plague has caused a decrease in population; drop in food prices, religious conflicts, and land lost. Historians can conclude with the aftermath of the plague that it was a significant event in which many people were affected.Besides the fact that the Black Death devastated Europe in the medieval times, it also had a powerful impact on population, culture, religion, and economy. The population decreased due to the thousands of deaths caused by The Black Death. The population â€Å"did not recover from the plague, did not resume the skyrocketing demographic curve of the late 13th century† (Cantor 88). It seemed to be estimated that almost 35 million Europeans died from the plague. Late marriages were also a factor that caused the populations not to bounce back from adversity due to the long periods of bachelorhood. Therefore, childbirth was at a smaller percent and if a woman were to be pregnant she would die due to old age. Also, some of the people who were affected by the plague thought it was God punishing them for their sins and how they deserved it. Culture was another aspect of the plague. Many cultures had changed and land was lost. The plague had affected people’s land because of the spread of the disease was already onto the animals. Farmers could not cultivate their farmland or animals because they were dying and then the plague had spread to the landowners. Religion, people viewed the plague as an evil deep inside themselves. They viewed it as God punishing them for their sins so they must ask for forgiveness, donate to the church, and live better lives. Those who were punished by God â€Å"turned to better things in their minds. They abstained from all vice during that time and they lived virtuously; many divided their property among the poor, even before they were attacked by disease (Cantor 247). Flagellants whipped themselves and scourged themselves as penance for their and society’s sins in the belief that the Black Death was God’s way of punishing them. Another thought came across that the Jews had poisoned Christian community wells badly to persecute Jews. This did not help Europe bolster their community back to normal. The economy; due to the shortage of land and people, people were out of pay and prices of food went up. Due to many deaths, there were shortages of goods and then a rise in prices. The prices on wheat, cheese, and meat went up. Majority of farmland was left with no farmer so the food was there to rot. Due to that, people could not provide food for themselves and they had to buy food even though the prices went up; the consumption of meat went up as well. The plague affected Europe’s community so much that people were living different lifestyles, from growing there own food to surviving on high priced food while sick. Cantor writes from a Political history view as well as a Cultural historical view. Political History is â€Å"the narrative and analysis of political events, ideas, movements, and leaders. It is distinct from, but related to, other fields of history such as Diplomatic history, social history, economic history, and military history, as well as constitutional history and public history† (Wikipedia n.p.). Cantor writes from a political history view because he focuses on the impact the Black Death had on Europe. Cantor also writes from a Cultural history view; Cultural History is building on materialism but focuses on language as a historical view and borrows from anthropology and linguistics of people in the past. Cantor writes from this view partially because he analyzes the people that deeply impacted the Black Death and how the cultural world was affected by it. But his main focus was to convey the difference in cultural backgrounds and how they affected the Black Death. It was believed/said that the cause of The Black Death and majority of the plagues that struck Europe were epidemics of the bubonic plague. (CJ Duncan, Scott S). One historian believes that â€Å"the disease was a viral haemorrhagic fever, characterized by long incubation period of 32 days, which allowed it to be spread widely even with the limited transport of the Middle Ages.† It was spread by being emerged from its â€Å"animal host† and then attacked Europe/Asia communities over and over. The Black Plague spread quickly, believed to being spread by animal host, because fleas and rats would transfer it to other animals. Another prediction was that a fleabite would an infected rat; Yersinia Pestis grows in its gut. The Black Death is believed to have started to spread from the human to human with no rats and or fleas involved because places where the plague hit there were no rats. In conclusion to The Black Death and how Cantor wrote in his perspective, it is hard to say what is the deciding factor in what caused the plague all together. Since the plague has many reasons as to what caused the spread they all eventually lead to what happened after, tragedy. The plague affected how people lived their lifestyles, farms were lost and lots of people died. As well as food prices going up because many animals got infected with the plague causing them to die; the farmers weren’t able to provide for themselves or families. Cantor wrote his book with historical facts and key people who set the tone for the book. Other historians did the same but had a different opinion on what caused it. Concluding this The Black Death left the world with open eyes to show how a sickness will affect not only people but religion and money too. Bibliography 1. Black Death.

Friday, September 27, 2019

Engineering sceince Math Problem Example | Topics and Well Written Essays - 1250 words

Engineering sceince - Math Problem Example 2 =0.5 * 1.5*238.762 =42754.7532 Joules = 42.7547532Kilojoules Question 2 Potential energy, PE = Therefore, PE = 440*9.8*3.5 = 15092N Kinetic energy, KE = = =9295N Total energy = 9295 + 15092 = 24387 joules Assuming all the energy is converted to KE since there is negligible friction, the final velocity can be gotten by = =110.85 Therefore final velocity, = 10.53m/s Task 3 Question 1 When a net force is acting on an object is proportional to the displacement of the object from the equilibrium, a simple harmonic motion occurs. This is as a result of the insignificance of the force acting on the object (in this case it is zero). A sinusoidal curve illustrates, which is presented as a function of time, illustrates the displacement of the object when the force is acting on it (object). Ideologically, this signifies the model of oscillatory motion. This represents ideologically the model of oscillatory motion. ... Question 2 Angular velocity = 3000rpm = 314.16rad/s Maximum velocity, v =A =0.24*314.16 = 75.4m/s Maximum acceleration is given by 2 =0.24*314.162 = 23685.653376m/s2 =23.683km/s2 Maximum theoretical force F= ma from Newton’s second law 0.28*23685.653376 = 6631.98N Therefore maximum force is

Thursday, September 26, 2019

The war against ISIS will lead to World War III Essay

The war against ISIS will lead to World War III - Essay Example The militant group has been involved in mass killings, carrying out crucifixions, public executions among other inhuman acts. The United States is one of the nations that are in the forefront of fighting ISIS. Drone airstrikes have been carried out against ISIS. The undertaking has led to many questions whether the war against ISIS will eventually lead to World War III or not2. This dilemma is supported by the fact that the planned Christian genocide by the ISIS and the killing of hundreds of people with Jewish faith reflects thoughts of what had occurred prior to World War II. Households have also been stamped with the Arabic Letter N, also called the death stamp which means Nazarene, a repetition of what occurred to Jews during the Holocaust. This means that ISIS is taking a trend that occurred the same way as that before World War II started. The threat is real, and nations should come together to ensure the world does not suffer the same fate again. As Barack Obama of the United States puts it "America is not fighting this war alone." The war on ISIS should involve as many countries as possible so as to bring the militant group down3. In my point of view, the war on terror and especially against ISIS will not lead to WW III. This is because if the group is ignored and left to continue with its vices, more Christians and Jews will be killed which is a violation of human rights. The result is an increased level of hatred between Jews and Christians on one side and Islamic states on the other, a situation that will further fuel the chances of occurrence of World War III. Air strikes will lead to weakening the militant state, and its sources of funds will be destroyed which will delay the advancement of the group big-time. Leaders of ISIS have also been eliminated successfully during this strikes, and although the group has not been weakened to the core, there has been a lack of coordination among

Diverse Britain Essay Example | Topics and Well Written Essays - 1250 words

Diverse Britain - Essay Example A list is long but important thing is that rule and laws gave them equal rights who settled in UK regardless of their ethnicity, race and culture. (Ethnic Diversity) Some of the demographic features of ethnic diversity in UK are worth enumerating. Ethnicity Population Proportion in total UK population Bangladeshi 283,063 0.5% Black (others) �,585 0.2% Black African �,277 0.8% Black Caribbean �,876 1.0% Chinese �,403 0.4% Indian �,053,411 1.8% Mixed race �,117 1.2% Other �,615 0.4% Other Asian (non-Chinese) �,644 0.4% Pakistani �,285 1.3% White �,153,898 92.1% Source: http://www.statistics.gov.uk/CCI/nugget.asp?ID=273 It will be most interesting now to see how media people respond to the notions of ethnic diversity in UK. R eports from Print Media Murrells (2011) in The Guardian reports under the heading ‘Preston's Nathan Ellington claims he was racially abused at Millwall’. Nathan Ellington claimed he had a worst racial humiliation of his life at Millwall. "I've never seen a more racist and abusive crowd as I saw today at Millwall! Disgrace to the human race." Murrells (2011) further writes quoting Ellington, â€Å"I didn't bite or report it, it's just sad really that there are still people with so much anger at a football match." (Murrells, 2011) Ellington further said that he was inflicted with a remark of thief and targeted of monkey noises as reported in the paper. It is really surprising that such a celebrity player has to face such hostile remarks particularly, when Nathan is British born. It was simply not a club rivalry but something more than that. â€Å"Commercials represent only 5% of TV ads featuring ethnic minorities† (Sweney, 2011) With above title a report published in The Guardian in its issue of 21 April 2011. Subject of the report was that only 5% of the 35,000 ads were involved with the actors from black or other ethnic community. The report prepared by Clearcast mentioned that TV advertising is not proportionately representing blacks in view of the fact that Asian, Black and other ethnic minorities constitute about 13 percent of the UK population. Issue of ethnicity and belonging to black community still prevents one doing significant role in television commercials. Otherwise, how can one explain such a low level of participation in the ad business? It seems that it will take years before any racial discrimination is totally eliminated and participation of the other ethnic community sharply increases. The report further said that only 1130 ads were such that when any actor of ethnic minority group was given a main role. It means that commercials are not appropriately representing the diverse makeup of the UK. (Sweney, 2011) â€Å"Your tr ibe need to behave like proper English children: What BBC's Mishal Husain was told by shopper in supermarket.† (Jarvis, 2011) Above heading appeared in Daily Mail in its issue of 8th May, 2011. The children of BBC news reporter Mishal Husain were told to behave ‘like proper English children’ when she visited a mall in Waitrose for shopping along with her three children and husband. Ms Husain is the upcoming star of BBC News. She is born and brought up in UK though her parents belong to Pakistan. Even BBC1’

Wednesday, September 25, 2019

Retail Marketing and Distribution Essay Example | Topics and Well Written Essays - 5000 words

Retail Marketing and Distribution - Essay Example Retailing has been a prevalent activity over the years but its systematic study has been necessitated in the present times because of the alterations in the components of retailing along with the conditions in the marketplace. Marketing is considered to be one of the most significant areas for any of the retail operations because of the fact that retailing tends to comprise the activities that are generally involved in the marketing as well as distribution of the goods and the services. The success of the retailer depends upon the marketing efficiency along with the capability of the retailer to comprehend and to serve the needs and the demands of the customers. Retailers are not only considered to be one of the most essential parts of the marketing channel but they are also considered to be creating an essential association between the customers and the manufacturers. The economic conditions of the countries as well as the economical structures of the communities are shaped by the r etailers. Furthermore, retailing has a direct influence upon the social life. It can be stated that though retailing has its roots in conventional societies by means of trading of goods and services however, it has been formalized and it has become a branded activity in the present times. In the context of demand driven societies, the retailers play a significant role as one of the chains in the channels of distribution. It can be observed that the ways customers tend to dominate the entire marketing as well as supply chain management, similarly the retailers also attain a significant role and they are found to be exerting their power by choosing their brand that they want to sell based upon their marketing demands and their strategies. Retailers are found to occupy a significant position in the distribution channel. The success of the channels of distribution generally depends upon the availability of the right kinds of goods and services, in right amount at the right place at the right time along with the procurement of the product from the right kind of sources. It can be stated that branding can be of great importance in the retail industry in order to impact customer perceptions and hence drive store choices and loyalty. Furthermore, retailer distribution plays a significant role in creating proper brand image among the consumers1. The main objective of the study is to investigate the way retailer branding strategies within retail stores impact the retailer sector. The study shall also aim at comprehending the meaning of retail branding strategies along with the forms of retailer branding strategies and their characteristics. It shall also highlight the role of retail branding in retailing. The study shall further progress with determining the current trends in retailer branding strategies and will discuss regarding the pros and the cons that have been recognized in the literatures regarding the use of the numerous approaches to retail branding. Definitio n of Retail Branding Brand can be considered

Tuesday, September 24, 2019

Roger Shimomura's artwork writing assignment Essay

Roger Shimomura's artwork writing assignment - Essay Example e strategies include, but are not limited to: appropriation, masquerade, subversion, juxtaposition, irony, tabulation, and disturbing stereotypical thinking. The paper will aim at undertaking the analysis in order to understand how the strategies were used to represent racism and stereotypes that were directed towards Asians and how this racist and stereotypical representation is not behind the society. In Roger Shimomura’s yellow terror, there are many themes that this works display and they can be understood by having a close look and interpretation of the collection. At the Wing Luke Asian Museum, the fact that the paintings are professional works of art that says it all. One of the paintings known as the different citizens is made up such that on the right of the painting someone sees a modest gray self portrait of Roger Shimomura. On the left side there is a ridiculous caricature of a Japanese military officer who is smiling and the officer is represented as a person who has yellow skin, buck teeth, slanted eyes and oversized ears1. Through this work of art, Roger Shimomura is trying to presents some aspects of racism that existed and until today. The artwork can specifically be interpreted as the use of artwork by Roger Shimomura to show his audience the racist lens that filtered the perception of Japanese Americans. Another obvious piece of art that depicts racism by Roger Shimomura is the Roger and Janet art work in which Roger Shimomura is shown to be a big-mouthed individual, who has buck- tooth, the stereotypical big ears, and a screaming mouth next to the blue eyed wife as depicted in the art. Examining the largest painting in the exhibition yellow terror, it is evident that Roger Shimomura uses the caricatures of Japanese soldiers, which are represented as individuals who crash, tumble and collide. Roger Shimomura himself is at the center of this chaos which pushes his eyes into a slant as if creating the nightmare mental picture of the Japanese

Monday, September 23, 2019

CASE ASSIGNMENT MODULE 5 MGT 516 Total Rewards Essay

CASE ASSIGNMENT MODULE 5 MGT 516 Total Rewards - Essay Example This paper aims at comparing and contrasting the total rewards system with the traditional approach of compensation. Also, the paper will discuss in detail the advantages and disadvantages of total rewards program from the views of the employees as well as from the perspective of employers. A brief discussion of how total rewards are impacted by the legal environment has also been included. Total Rewards: Rewards have been a common element right from the beginning. Be it the barter systems used in the early years or the various compensation plans used in the current times. These have all been the basis for the motivation of people across the world. It was in 1990 that the system of total rewards was introduced and here people around the world were thinking of newer and more effective ways for compensations and benefits (Chen and Hsieh). Also, it was here that aspects such as tangible and intangible methods of motivating employees were being focused upon. The main aim and intension of the total rewards was mainly to retain the employees within the company (Johnston). The following section will detail a comparison and contrast of the total rewards system with the traditional approach of compensation. ... The traditional method of rewards was the same for all employees within the company, the total rewards system on the other hand is focused on only working towards retaining the best in the company. In the traditional approach, the compensations re generally bargain able and employers have a chance to bargain with the employees based on the job market. On the other hand, the total reward style of remuneration is based more so on the employees and their individual value. Another major difference here is that the total rewards are focused on all aspects of the pay, the entire remuneration, including all the direct as well as indirect wages and also prerequisites likewise (Reference for Business). The traditional system however focuses on the basic pay and the added benefits based on the individuals contracts. The traditional approach is more focused on aspects like the hierarchy of the individual, and the position within the company. On the other hand for the total rewards, the focus is more on the individuals work performance and skills (Reynolds). Here hierarchy does not play a major role. Advantages and Disadvantages: Total rewards system have a number of advantages and disadvantages likewise. The following sub sections will detail the advantages and disadvantages from the view of the employer and the employees. Employer’s Perspective: The total rewards in terms of the employer’s perspective, there are a number of issues. Firstly, this proves to be a more expensive approach. The company can have a much higher level of cost savings if another method of payment is to be used for the employees. Also, this method can lead to a number of additional and unnecessary

Sunday, September 22, 2019

Night Hoops Essay Example for Free

Night Hoops Essay Fellow Word Shakers, When I started reading the book, Night Hoops by Carl Deuker, I was very bored. I felt like I wasn’t relating to the characters and the plot was moving too slowly. I questioned whether I should start a new book; however, I persevered just like Nick, and I am very grateful that I stuck with it. After reading Night Hoops, I have developed a new mindset on how I should pursue my goals no matter what impediments obstruct my ability to reach them. Nick, the protagonist, always dreamt of earning his spot on his high school’s varsity basketball team, but his road to the team was filled with family troubles; being overshadowed by his older brother, Scott; and run-ins with Trent, the local bully. However, Nick persevered through it all and accomplished his goal of making the varsity basketball team. Over the past few years, I have been extremely dedicated to becoming the best golfer I can be. However recently, I have lost my enthusiasm for the game. Because of this, I feel like I can relate to Nick and although he is a fictional character, use him as inspiration to rededicate myself to the game of golf. Aside from my fascination with Nick’s perseverance and dedication, I was intrigued by the friendship that developed between Nick and Trent, the local bully. At first, Trent and Nick didn’t get along. In fact, Trent beat Nick up. However, as Deuker took us through their relationship we saw how they soon became good friends who were connected through the game of basketball. From this, I realized that some of the people best fit for you could be right under your nose, but they put up a facade to support their tough guy image so you don’t get a chance to get to know who they truly are. Another aspect of the book that really captured my attention was how Nick’s father applied pressure on him to succeed in basketball. At first, this pressure really inhibited Nick’s ability to play good basketball. However, as he became used to the pressure and used it as motivation, Nick became the player both he and his dad always wanted him to be. This brings up the dilemma that a lot of parents struggle with today. Should they push their kids to succeed or should they let their kids succeed on their own? There is no right or wrong answer to this question, but I think it is fascinating that Deuker poses this question in a book written for teens. More than just my experience with the different characters, I loved Deuker’s very tangible description of the basketball games: â€Å"He caught it in stride, soared upward in the same fluid motion, and gently laid the ball against the backboard. It dropped through the net just as the horn sounded. A tenth of a second later we were jumping all over him† (167). I felt like I was at the game, sitting on the edge of my seat praying that the ball falls through the net, and jumping into the air screaming in joy when it does. Although I loved his poetic descriptions of the basketball games, I felt like too often he used very basic, simple language. Every book has its flaws, but if you are into basketball, like a story about perseverance, or want to be taken through a great friendship then this book is definitely for you. I hope that you enjoy this book as much as I did. Yours Truly,

Saturday, September 21, 2019

Database Design And Development For Petcare Veterinary Computer Science Essay

Database Design And Development For Petcare Veterinary Computer Science Essay Draw an Entity Relationship Data Model that describes the content and structure of data held by PetCare. Specify the cardinality ratio and participation constraint of each relationship type. Database Development Process The process is divided into four main stages: requirements elicitation, conceptual modeling, logical modeling and physical modelling. The techniques used in the development process naturally divide into three categories: those concerned modelling, those concerned with logical modelling and those concerned with physical modelling. Figure 1 the database development process Requirements Elicitation Requirements elicitation involves establishing the key technical requirements for a database system usually through formal and informal interaction between developers and organizational stakeholders such as users. It provides the structure of data needed and the use of the data in some information system context. Stakeholder identification and participation One of the first things that must be done in any information systems project is to identify the relevant stakeholders. A stakeholders group is any social group within and without the organization that potentially may influence the successful use and impact of the database system. Veterinary doctor Use the database to for managing treatment information of pet Staff keep track of animal and appointment Regulators National and regional government may need to audit the database Requirements Elicitation and requirements specification Requirements elicitation is the precursor to requirements specification. In terms of a system to manage Petcare, the following is a list of proposed requirements for system: The database should be capable of supporting the following transaction: Create and maintain records recording the details of Petcare Pets clinics and the members of staff at each clinic. Create and maintain records recording the details of pet owners. Create and maintain the details of pets. Create and maintain records recording the details of the types of treatments for pets. Create and maintain records recording the details of examinations and treatments given to pets. Create and maintain records recording the details of invoices to pet owners for treatment to their pets. Create and maintain pet owner/pet appointments at each clinic. Data requirements PetCare veterinary surgery Petcare has six medium sized veterinary surgery clinics across London. The details of each clinic include address of branch, telephone number, opening hours and emergency contact telephone number. Assuming that each clinic has a number of staff for example vets, nurses, secretaries and cleaners. Staff The details stored on each member of staff include the staff name, address, home telephone number and mobile telephone number. Pet owners When a pet owner first contacts a clinic of Petcare the details of the pet owner are recorded, which include name, address, home telephone number and mobile telephone number. Pets The details of the pet requiring treatment are noted, which include a put number, type of pet, age and sex. Examinations When a sick pet is brought to a clinic, the vet on duty examines the pet. The details of each examination are recorded and include an examination number, the date and time of the examination, the name of the vet, the pet number, pet name, and type of pet, and a full description of the outcome of the examination results. Petcare provides various treatments for all types of pets. The details of each treatment include a treatment number, full description of the treatment, and the cost to the pet owner. Based on the result of the examination of a sick pet, the vet may propose one or more types of treatment. For each types of treatment, the information recorded includes the examination number and date. Invoices The pet owner is responsible for the cost of the treatment given to a pet. The owner is invoiced for the treatment arising from each examination, and the details recorded on the invoice include the invoice number, invoice date, owner number, owner name and full address, put number, put name, and details of the treatment given. The invoice provides the cost for each type of treatment and total cost of all treatments given to the pet. Additional data is also recorded on the payment for example cash, credit card or check. Appointments If the pet requires to be seen by the vet at later date, the owner and pet are given an appointment. The details of an appointment are recorded and include an appointment number, owner name, date and time. Using the logical database design methodology Entity-Relationship modeling is a top-down approach to database design. We begin ER modeling by identifying the important data (called entities) and relationships between the data that must be represented in the model. We then add more details such as the information we want to hold about the entities and relationships (called attributes) and any constraints on the entities, relationships, and attributes. Identify entities Identify entities A set of objects with the same properties, which are identified by a user or organization as having an independent existence The first step in logical database design is to identify entity that you have to represent in the database. Entity name Description Occurrence Clinic Veterinary clinics One or more Petcare clinics located throughout London Staff General term describing all staff employed by Petcare Each member of staff works at a particular clinic PetOwner Owners of pets taken to Petcare Owner takes his/her pet to a particular clinic Pet Sick animal seek treatment to the clinic One or more animal are taken to the clinic Examination Treatment Invoice Appointment PetTreatment Attributes The particular properties of entities are called attributes. Attributes represent what we want to know about entities. Single-Valued attributes The majority of attributes are single-valued for a particular entity. For example, each occurrence of the Staff entity has a single value for the staffNo attribute (for example,001), and therefore the staffNo attribute is referred to as being single-valued. Derived attributes An attributes that represents a value that is derivable from the value of a related attributes, or set of attributes, no necessarily in the same entity. Some attributes may be related for a particular entity. For example, the age of a pet is derivable form the date of birth (DOB) attribute, and therefore the age and DOB attributes are related. We refer the age attributes as a derived attributes, the value of which is derived from the DOB attribute. Age is not normally stored in a database because it would have to be updated regularly. On the other hand, as date of birth never changes and age can be derived from date of , date of birth is stored instead, and age is derived from DOB attribute, when needed. Identify relationships Having identifies the entities; next step is to identify all the relationships that exist between these entities. A relationship is a set of associations between participating entities. As with entities, each association should be uniquely identifiable within the set. A uniquely identifiable associations is called a relationships occurrence Clinic Relationships Entity Relationship Entity Clinic Has Veterinary Registers Pet Schedules Appointment IsContactedBy PetOwner Veterinary Relationships Entity Relationship Entity Veterinary Performs Examination Pet Owner Relationships Entity Relationship Entity PetOwner Owns Pet Pays Invoice Attends Appointment Pet Relationships Entity Relationship Entity Pet Undergoes Examination Attends Appointment Cardinality Ratio of PetCare database Cardinality or degree concerns the number of instances involved in a relationship. A relationship can be said to be either a 1:1 (one-to-one) relationship, a 1: M (one-to-many) relationship, or an M: N (many-to-many) relationship. Final Clinic relationships Entity Cardinality Relationship Cardinality Entity Clinic 1..1 Has 1..M Staff 1..M Registers 1..M Pet 1..1 Schedules 1†¦M Appointment 1..1 IsContactedBy 1..M PetOwner Final Veterinary Relationships Entity Cardinality Relationship Cardinality Entity Veterinary 1..1 Performs 1..M Examination Final Pet Owner Relationships Entity Cardinality Relationship Cardinality Entity PetOwner 1..1 Owns 1..M Pet 1..1 Pays 1..M Invoice 1..1 Attends 1..M Appointment Final Pet Relationships Entity Cardinality Relationship Cardinality Entity Pet 1..1 Undergoes 1..M Examination 1..1 Attends 1..M Appointment First draft Entity Relationship Data Model Second draft Entity Relationship Data Model Final Entity Relationship Data Model Task 2 Normalization Normalization is a technique for producing a set of table with desirable properties that support the requirements of a user or company. There are several normal forms, although the most ones are called first normal form (1NF), second normal form (2NF), and third normal form (3NF). All these normal forms are based on rules about relationships among the columns of a table. First normal forms (1NF) Only first normal form (1NF) is critical in creating appropriate tables for relational databases. All the subsequence normal forms are optional. A table in which the intersection of every column and record contains only one value Clinic (clinicNo, address, city, state, zipcode, telNo, faxNo, opeingHour) Primary Key clinicNo Alternate Key zipCode Alternate Key telNo Alternate Key faxNo Alternate Key opeingHour clinicNo address telNo openingHour C001 Enfield 503-555-3618, 503-555-2727, 503-555-6534 9.00-21-00 C002 Islington 206-555-6756, 206-555-8836 9.00-21-00 C003 Hackney 212-371-3000 9.00-21-00 C004 Holloway 206-555-3131, 206-555-4112 9.00-21-00 C005 Chingford 8502333 9.00-21-00 C006 Leyton 4650000 9.00-21-00This version of the Clinic table is not in 1NF More than one value, so not in 1NF Converting to 1NF To convert this version of the Clinic table to 1NF, we create separate table called ClinicTelephone to hold the telephone number of clinics, by removing the tellNo column from the Clinic table along with a copy of the primary key of the Clinic table. The primary key for the new ClinicTelephone table is now the telNo column. The Clinic and ClinicTelephone table are in 1 NF as there is a single value at the intersection of every column with every record for each table Clinic (Not 1NF) clinicNo address telNo openingHour C001 Enfield 503-555-3618, 503-555-2727, 503-555-6534 9.00-21-00 C002 Islington 206-555-6756, 206-555-8836 9.00-21-00 C003 Hackney 212-371-3000 9.00-21-00 C004 Holloway 206-555-3131, 206-555-4112 9.00-21-00 C005 Chingford 8502333 9.00-21-00 C006 Leyton 4650000 9.00-21-00 Remove telNo column and create a new column called telNo in the new table Take copy of clinicNo column to new table to become foreign key ClinicTelephone (1NF) clinicNo telNo C001 503-555-3618 C001 503-555-2727 C001 503-555-6534 C002 206-555-6756 C002 206-555-8836 C003 212-371-3000 C004 206-555-3131 C004 206-555-4112 C005 8502333 C006 4650000 Clinic (1NF) clinicNo address openingHour C001 Enfield 9.00-21-00 C002 Islington 9.00-21-00 C003 Hackney 9.00-21-00 C004 Holloway 9.00-21-00 C005 Chingford 9.00-21-00 C006 Leyton 9.00-21-00 Second normal form (2NF) Second normal form applies only to tables with composite primary keys that are table with a primary key composed of two or more columns. A 1NF table with a single column primary key is automatically in at least 2NF. A table that is not in 2NF may suffer from update anomalies. A table that is already in 1NF and which the values in each non-primary-key column can be worked out from values in all columns that make up the primary key. Third normal form (3NF) Although 2NF table have less redundancy that table in 1 NF, they may still suffer from update anomalies. A table that is already in 1NF and 2NF, and in which the values in all non-primary key columns can be worked out from only the primary key column and no other columns. staffNo name lastName salary clinicNo clinicAddress telNo S001 Tom Adams 25000 C001 Enfield 5035553618 S002 Sally Daniels 35222 C001 Enfield 5035553618 S003 Mary Chin 5200 C002 Islington 206555675 S004 Sally Stern 5000 C002 Islington 206555 S005 Art Peters 45822 C003 Hackney 8502333 S006 Tommy Verciti 65000 C004 Holloway 4650000 Values in clinicNo and clinicAddress columns can be worked out from telNo, so table not in 3NF Values in clinicNo and telNo columns can be worked out from clinicAddress, so table not in 3NF Values in all non-primary-key columns can be worked out from the primary key, staffNo Values in clinicAddress and telNo columns can be worked out from clinicNo, so table not in 3NF staffNo name lastName salary clinicNo clinicAddress telNo StaffClinic (Not 3NF) staffNo name lastName salary clinicNo clinicAddress telNo S001 Tom Adams 25000 C001 Enfield 5035553618 S002 Sally Daniels 35222 C001 Enfield 5035553618 S003 Mary Chin 5200 C002 Islington 206555675 S004 Sally Stern 5000 C002 Islington 206555 S005 Art Peters 45822 C003 Hackney 8502333 S006 Tommy Verciti 65000 C004 Holloway 4650000 Move column to new table Take copy of clinicNo column to new table to become primary key Clinic (3NF) clinicNo clinicAddress telNo C001 Enfield 5035553618 C001 Enfield 5035553618 C002 Islington 206555675 C002 Islington 206555 C003 Hackney 8502333 C004 Holloway 4650000 Staff (3NF) staffNo name lastName salary clinicNo S001 Tom Adams 25000 C001 S002 Sally Daniels 35222 C001 S003 Mary Chin 5200 C002 S004 Sally Stern 5000 C002 S005 Art Peters 45822 C003 S006 Tommy Verciti 65000 C004 Primary key Becomes foreign key Becomes candidate key Becomes primary key Task 3 Using a Database Management System (DBMS) of your choice, set up all the above normalized tables, and populate them with well-designed test data (minimum 5 records per table). Provides printouts of all tables. Reasonable assumption may be made with regard to data Clinic Table create table clinic ( clinicNO int not null primary key, telNo varchar(255), address varchar(255), ) alter table clinic add clinicName varchar (255) alter table clinic add openingHour varchar(255) alter table clinic add eTelNo varchar (255) insert into clinic values (01,2863015,Darwin Avenue,8.00-21.00,2863000,Enfield) insert into clinic values (02,4650001,John David Avenue,8.00-21.00,2868000,Islington) insert into clinic values (03,4278926,King Arthur Avenue,8.00-21.00,2867000,Hackney) insert into clinic values (04,2682365,Paul Mac Avenue,8.00-21.00,2866000,Holloway) insert into clinic values (05,4682685,James Micheal Avenue,8.00-21.00,2865000,Chingford) insert into clinic values (06,2863015,Benaoit Frank Avenue,8.00-21.00,2864000,Leyton) Pet owner create table petowner ( ownerID int not null primary key, oFName varchar (255), oLName varchar (255), clinicNo int foreign key references clinic (clinicNo)) alter table petowner add addres varchar(255) alter table petowner add hTelNo varchar(255) alter table petowner add mTelNo varchar (255) insert into petowner values (01,Marvin,Hemraj,1,Edith Cavel Str,2106584,758956) insert into petowner values (02,Ramjeet,Lavin,2,Avenue Gonin,2564589,7585695) insert into petowner values (03,Arzeena,Bakarkhan,3,Gorgetown Str,2106584,758956) insert into petowner values (04,Chetan,Sing,4,Jackson Road,2458695,7582658) insert into petowner values (05,Hansley,Nowjee,5,15 Ollier Avenue,2565458,7589562) insert into petowner values (06,Sam,Fisher,6,Leess Street,26584585,75895623) Pet Table create table pet ( petNo int not null primary key, type varchar (255), breed varchar (255), sex varchar (255), dob varchar (255) ) alter table pet add clinicNo int foreign key references clinic (clinicNo) alter table pet add ownerid int foreign key references petOwner (ownerid) alter table pet add petName varchar (255) insert into pet values (01,Dog,Terroer,Male,1 Jan 2004,01,01,Wouf) insert into pet values (02,Dog,Poodle,Female,2 Feb 2005,02,02,Snoopy) insert into pet values (03,Cat,Persian,Male,3 March 2006,03,03,Minous) insert into pet values (04,Cat,Siamese,Female,4 April 2007,04,04,Milous) insert into pet values (05,Rabit,Dwarf,male,5 May 2008,05,05,Lapino) insert into pet values (06,Cat,Siamese,Female,4 June 2009,06,06,Lapinas) Examination Table create table examination ( examNo int not null primary key ) alter table examination add veterinaryId int foreign key references veterinary (veterinaryId) alter table examination add petNo int foreign key references pet (petNo) alter table examination add presDrugType varchar (255), presPeriod varchar (255) insert into examination values (1,1,Anti-biotic,15,01) insert into examination values (2,2,Painkiller,14,02) insert into examination values (3,3,Behaviour modification,13,03) insert into examination values (4,4,Ear medication,12,04) insert into examination values (5,5,Skin medication,15,05) insert into examination values (6,6,Painkiller,10,06) Appointment Table create table appointment ( appNo int not null primary key, aDate varchar (255), aTime varchar (255), petNo int foreign key references pet (petNo), ownerID int foreign key references petowner (ownerID), veterinaryId int foreign key references veterinary (veterinaryId) ) alter table appointment add clinicNO int foreign key references clinic (clinicNO) alter table appointment alter column aDate date insert into appointment values (01,2 October 2010,10.00,1,1,1,1) insert into appointment values (02,3 November 2009,10.35,2,2,2,2) insert into appointment values (03,4 December 2009,13.00,3,3,3,3) insert into appointment values (04,5 January 2010,15.00,4,4,4,4) insert into appointment values (05,6 Feb 2010,18.00,5,5,5,5) insert into appointment values (06,7 March 2010,9.00,6,6,6,6) Invoice Table create table invoice ( invoiceNo int not null primary key, ownerid int foreign key references petowner (ownerid), amt int ) alter table invoice add examNo int foreign key references examination (examNo) insert into invoice values (01,01,500,1) insert into invoice values (02,02,2000,2) insert into invoice values (03,03,400,3) insert into invoice values (04,04,300,4) insert into invoice values (05,05,1500,5) insert into invoice values (06,06,750,6) Veterinary Table create table veterinary ( veterinaryId int not null primary key, name varchar (255), Address varchar(255), hTelNo varchar(255), mTelNo varchar(255), clinicBranch varchar (255), specialise varchar(255) ) select * from veterinary alter table veterinary add spspecialise varchar(255) alter table veterinary drop column clinicBranch alter table veterinary add clinicNo int foreign key references clinic (clinicNo) insert into veterinary values (01,Jean,High Street Way 43,6358264,7595865,1,dog) insert into veterinary values (02,Robbin,Lower Downtown 2,6582354,7362548,2,cat) insert into veterinary values (03,Ricky,Market Ville Road,4582356,7586523,3,rabit) insert into veterinary values (04,Rowan,Little China Road2,4582653,7263158,4,dog) insert into veterinary values (05,Laksh,Havana Roadway,8596564,7236458,5,rabit) insert into veterinary values (06,Hans,Talipos Road,4625687,7859584,6,cat) Task 4 Set-up and test all of the following queries using Structured Query Language (SQL). Provide printouts of SQL code for each query and the output produced when you run the query in the database you have developed. Query Question 1 Display the names and address of the branches of Petcare and the name of all veterinary doctors working at each of the branches. Any specialism (s) of the veterinary doctors should also show. Using SQL Code SELECT clinic.clinicName AS [Branches Name], clinic.address AS [Branches Address], veterinary.name AS [Veterinary Doctor Name], veterinary.specialise AS [Veterinary Specialism] FROM clinic INNER JOIN veterinary ON clinic.clinicNO = veterinary.clinicNo The Result Using Query Designer The Result Query Question 2 Display all the appointments for the whole of the Petcare organization. This should be ordered by date. The result should display the branch the appointment is at, the name of the veterinary doctor the appointment is with, the date and time of the appointment, the name of the animal the appointment is for, the type of animal and the breed of the animal. Using SQL code SELECT clinic.clinicName AS [Branches Name], veterinary.name AS [Veterinary Doctor Name], appointment.aDate AS [Appointment Date], appointment.aTime AS [Appointment Time], pet.petName AS [Pet Name], pet.type AS [Pet Type], pet.breed AS [Pet Breed] FROM appointment INNER JOIN clinic ON appointment.clinicNO = clinic.clinicNO INNER JOIN veterinary ON appointment.veterinaryId = veterinary.veterinaryId AND clinic.clinicNO = veterinary.clinicNo INNER JOIN pet ON appointment.petNo = pet.petNo AND clinic.clinicNO = pet.clinicNo ORDER BY [Appointment Date] The Result Using Query Designer The Result Task 5 Explain any assumptions you have made when analyzing, designing and implementing the above database, justify the approach you have taken and explain any alternative approaches you could have taken to any of the above tasks. Discuss any changes you would make to improve your work. Determine candidate, primary and alternate key attributes This step is concerned with identifying the candidate key for an entity and then selecting one to be the primary key. In the process of identifying primary keys, note whether an entity is strong or weak. In trying to identify candidate keys, I observe that the clinic number for the Clinic entity, the veterinary number for the veterinary entity, the invoice number for the Invoice entity are unique for the entire practice. On the other hand, the owner number for the PetOwner entity, the pet number for the Pet entity, are only unique for a particular clinic. Its not uncommon for a company to give different offices a degree of local autonomy. However, in a centralized database system its sometimes more appropriate to have uniqueness throughout the company. In discussion with the PetCare management, its agreed that all numbers should be allocated across the entire practice, as opposed to each branches. If this had not been the decision, it would have been necessary to add the clinic number to those numbers only unique within each clinic to gain uniqueness across the practice. With this in mind, I have now identify the primary keys and foreign key. Check model for redundancy At this point, I have a logical data model for Petcare. However, the data model may contain some redundancy which should be removed. More speci ¬Ã‚ cally, I have to: (1) Re-examine one-to-one (1:1) relationships. (2) Remove redundant relationships. (3) One-to-one (1:1) relationships Redundant relationships There are a number of relationships between PetOwner, Pet, Clinic, and Appointment, and a closer examination is useful to identify any redundant relationships. First of all, note that the PetOwner/Pet entities have mandatory participation in the POAttends/PAttends/Owns relationships, and that a PetOwner may own many pets. Therefore, for any given Appointment we can identify the Owner through the POAttends relationship, but we cannot then identify the Pet through the Owns relationship. However, for any given Appointment, we can identify the Pet through the PAttends relationship and for any given Pet we can identify the PetOwner through the Owns relationship, which suggests that the POAttends relationship is redundant. In a similar way, through the PAttends relationship we can identify the Pet, and through the Registers relationship we can identify the Clinic involved in the Appointment, which suggests the Schedules relationship is also redundant. Note that the IsContactedBy relationship between Clinic and PetOwner also appears to be redundant. However, PetCare notes the details of pet owners when they first make contact and only obtains the details of pets at the first appointment, and so the IsContactedBy relationship is retained. Check business rules Business rules are the constraints that I have impose in order to protect the database from becoming inconsistent. Of the six types of business rules, four were identified in previous steps and documented in the above. I consider the remaining two here: referential integrity and other business rules. Referential integrity There are two issues to consider here: (1) Identify whether nulls are allowed for the foreign key. In general, if the participation of the child table in the relationship is mandatory, then the strategy is tha

Friday, September 20, 2019

Star Formation :: Astronomy

The basic idea of star formation is gravitational collapse – the contraction of a region of gas under the influence of gravity. This is a simple process that would be expected to occur in any region of material dense enough for collisions between atoms to radiate away energy. However, the gas must be dense enough for collisions to occur and the temperature must be low enough for the atomic velocities not to be able to escape the system's gravity, so star formation only occurs in a few areas. The sites of star formation in the galaxy are mostly located within molecular clouds – expansive, cool clouds of mostly hydrogen and helium gas. Molecular clouds are on average too diffuse to contract gravitationally, but within a cloud are regions of locally higher density, which are the sites of active star formation. It is not known exactly what causes molecular clouds and star-forming regions to be distributed as they are. However, it appears to be related to the spiral-arm structure of spiral galaxies, which is thought to be the result of density waves passing through the disk, compressing matter and igniting star formation in their wake, leaving the trails of young, hot, blue stars in their wake that are the primary feature of spiral galaxies. The distribution of gas in these regions is probably erratic enough that once a sufficient compression comes through a large number of separated regions will be triggered to contract individually. One a sufficiently dense region begins to contract, the process becomes self-sustaining, as contraction only increases the density and makes contraction more rapid. Any net rotation in the region will be flattened by conservation of angular momentum as the cloud contracts and spins more rapidly, making the contracting region attain the shape of a disk. The center of mass of the cloud will, of course, be the location of highest density, and as matter rains onto the center it will heat up rapidly to very high temperatures. This 'protostar' will emit strong radiation and winds which, while not immediately enough to stop the influx of matter from the disk, generates powerful outflow jets along the poles of the system, which may also be influenced by magnetic force originating in the disk. Throughout the process the temperature, density, and pressure in the protostar at the center are increasing, and soon approach figures comparable to normal stars. Once the temperature of the center