Wednesday, August 26, 2020

Communication Theories Essay Example | Topics and Well Written Essays - 250 words - 3

Correspondence Theories - Essay Example For this situation, the sender accepts prime accountability for the closeness between the two companions in such a case that he/she didn't advance the solicitation, the two would not have been companions. Of the considerable number of companions we have on Facebook, we will in general associate with the ones remarking on our statuses more than others. We answer their remarks and they answer our answers. Being recorded in the friend’s list is not quite the same as visiting with a companion on-line. Obviously, the last methodology advances closeness between companions. Consequently, the input impact of CMC has the second-biggest social effect. The recipient impact has the third-biggest social effect. On Facebook, we get warnings, solicitations to occasions, and solicitations to games. A large portion of the solicitations are gotten on the grounds that the sender â€Å"sends to all† in the friends’ list. The channel effect’s social effect is the least It does n't make a difference whether a message is gotten through email, online talk or message. What advances closeness is the way that a message or remark is

Saturday, August 22, 2020

Bitter Imagery in Hamlet Essay -- GCSE English Literature Coursework

Harsh Imagery in Hamlet    In Hamlet, symbolism of malady, toxic substance and rot, are utilized by Shakespeare for a reason. The portrayals of sickness, toxin, and rot assist us with understanding the unpleasant connections that exist in the play and Hamlet’s own criticism. We see Hamlet’s cynicism in his discourse when he examines self destruction. The angry relationship that exists among Claudius and Hamlet is increased with the utilization of symbolism when Claudius gets some information about Polonius. Symbolism upgrades Claudius’ severe dislike of Hamlet. Shakespeare utilizes symbolism in this play to extend our comprehension of the feelings experienced.     The symbolism of rot is utilized to help appreciate the downturn Hamlet feels in his first talk about self destruction. O this also tarnished tissue would liquefy, Thaw, and resolve itself into a dew, (I;ii, 129-130) Hamlet is fundamentally imparting that he wishes not to exist in this world any longer. He needs beyond words be separated of the ground. A picture of Hamlet’s tissue, spoiling, consolidating with the dirt is created. As of now we can get a handle on Hamlet’s genuine feelings. We sympathize with his torment and his long for death. Hamlet keeps on saying How tired, stale, level, and unrewarding/Seem to me all the employments of this world! Fie on’t, ah, fie, ‘tis an unweeded garden/That develops to seed. Things rank and gross in nature/Possess it merely.(I;ii, 133-137) Here, Hamlet says his purpose behind needing to end it all is that he despises the world he lives in. He feels that his general surroundings is futi le and in disorder. We can comprehend the genuine inspiration for his self destruction. Shakespeare lets us peer into Hamlet’s soul by making these clear pictures.     Claudius’ relationship with Hamlet is drea... ...hance Hamlet's cynicism of life. Symbolism is likewise utilized fundamentally in depicting the sharp feelings that exist among Hamlet and Claudius. At the point when Claudius addresses Hamlet of the whereabouts of Polonius we see the foul relationship with the assistance of symbolism. As Claudius recognizes Hamlet's conduct and madness, he uncovers the resentment he feels towards Hamlet. In Hamlet's monologue, concerning self destruction, symbolism gives us his dim emotions. In Hamlet we really observe what a lot of profundity symbolism gives us. Symbolism of malady, toxin and rot gives us a possibility at truly understanding the genuine feelings that the characters involvement with their psyche and soul. With the symbolism made by Shakespeare, we as perusers, can really grasp the sentiments that are experienced by the characters in Hamlet, that are not generally clear yet significant.    

Friday, August 14, 2020

Couldnt We Call Them Loan Lions Or Loan Vipers by a Shark

Couldnt We Call Them Loan Lions Or Loan Vipers by a Shark Couldnt We Call Them Loan Lions? Or Loan Vipers? by a Shark Couldnt We Call Them Loan Lions? Or Loan Vipers? by a SharkI have some numbers for you. 450. 23. 1.Lets start with the first number. 450 people in the United States die falling out of bed each year.The second number, 23, is the number of annual skateboard-related deaths.And the “one?” That’s how many Americans are killed by sharks each year. And yet, sharks like me are constantly being demonized.We’re typecast as villains in movies like Jaws and Deep Blue Sea. Children songs warn of a “shark attack doo doo, doo doo doo doo.”When was the last time you saw a positive portrayal of sharks in the media? Street Sharks? It’s been off the air for over two decades, and I think it’s fair to admit that it was, perhaps, slightly derivative of Teenage Mutant Ninja Turtles.But I think nothing has been quite so pervasive, quite as subtlety damaging, as the term “loan shark.” It’s not that I have thin skin. My skin, in fact, is actually quite thick and rough. If you rub it the wrong way,  you’ll get quite the nasty cut, so believe me when I say that isn’t the issue.Sharks hunt for food. Predatory lenders hunt for profit.“Loan sharks” are lenders, often of dubious legality, who take advantage of people in unfortunate financial situations, whether it be bad credit, gambling problems, or otherwise. They offer dangerous bad credit loans and no credit check loans that trap unsuspecting borrowers in a never-ending cycle of debt.Some of them, like payday lenders, target potential customers who have nowhere else to turn. Payday loans have short payment terms, often only two weeks, and if you can’t pay back the whole amount with fees and interest in that time, you may have to pay a “rollover” fee to extend the loan another two weeks. This is a great way to start drowning in debt.They also might hide unfavorable terms in the small print of the contract you have to sign to get the loan. Or they might advertise it as a simple cash advance when in fact its a loan that comes with 500 percent APR! That’s why it’s important to scan the terms of the agreement as though it was a body of water and you were trying to find your preyâ€"like a dolphin, or a big school of tuna, or ahem But let’s get back to my initial point.What about title loans? These are another kind of short-term loan, usually about a month long, that asks borrowers to repay a large amount of money in a single lump sum. If I told you, that you had a month to pay back a $1,500 loan, would that seem doable? No, I thought not. And title loans use your car as collateral, which means that failing to pay it back could easily result in your vehicle being repossessed!Sure, sharks have anywhere from five to 50 rows of razor-sharp, terrifying teeth, but we dont take your car away just because you cant afford a 300 percent interest rate. Now, granted, if cars werent made of metal, but instead were made of, like, seal flesh, that would be an entirely different story. But I d igressWe (and by we I mean sharks) deserve better.Do you know of a single shark that has ever been a lender, let alone a crooked one? Because I don’t, and as a shark, I’m going to go out on a fin and assume I know more sharks than you do.I’m also aware that within the idiom “going out on a limb,” the limb is meant to refer to a tree branch, and not a human limb. Thus my pun about “going out on a fin” is certainly not as clever as it would have been in an alternative world where the origin of the idiom did relate to human limbs. Sadly, that is not the world we live in, and I’m sure you’ll agree that making the pun, however flawed, is better than letting it go unmade. I just wanted to head off the assumption that just because I’m a shark, I’m ignorant of idioms.On the contrary, I’m all too aware of human expressions and the harm they can cause, as is the case with “loan shark.” Although the animal kingdom is entirely devoid of lenders, I will allow the crea tive license required to refer to a crooked lender with an animal term. But so many animals would be more appropriate.What if we called predatory lenders something else instead?Are you attempting to highlight the sneakiness of predatory lenders? Everyone knows  shark fins are visible above the water as we approach. We dont so much sneak up on our prey as we wear it down from a long chase. If youre looking to capture sneakiness, sharks are not your animal. Perhaps “loan viper” would be a better fit. Or what about loan cuttlefish. Those dudes are sneaky as all heck.“Loan lion” could also be a good choice, though it might imply a majesty unbefitting of crooked lenders. But could not the same be said of “loan sharks?” We dont have the Disney movie bonafides that lions do, but I dare you to find a sea creature as majestic as we are. And dont say  Whales. Whales suck. Those guys are jerks.I hope you’ll take these humble suggestions into consideration.Sharks deserve better th an being compared to predatory lenders. We might be a little intimidating, but those guys are the real monsters. I’ve said all I plan to on the subject, and now I have to move on. Because if I don’t keep moving, water will stop passing through my gills and I will die.To learn more about predatory lending, check out these related posts and articles from OppLoans:Affordable housing shortage may be fueling the Las Vegas payday loan industryYour Guide to Cash Advance ScamsWant to Avoid No Credit Check Loans? Build an Emergency FundWhat do you think we should predatory lenders instead of loans sharks? Let us know!  You can  email us  or you can find us on  Facebook  and  Twitter.ContributorsA Shark. It swims in the ocean and eats seals.Because its a shark. D.F.A. from Cornell.

Sunday, May 24, 2020

The Maginot Line Frances Defensive Failure in World War II

Built between 1930 and 1940, Frances Maginot Line was a massive system of defenses that became famous for failing to stop a German invasion. While an understanding of the Lines creation is vital to any study of World War I, World War II, and the period in between, this knowledge is also helpful when interpreting a number of modern references. The Aftermath of World War I The First World War ended on the 11th of November 1918, concluding a four-year period in which Eastern France had been almost continuously occupied by enemy forces. The conflict had killed over one million French citizens, while a further 4–5 million had been wounded; great scars ran across both the landscape and the European psyche. In the aftermath of this war, France began to ask a vital question: how should it now defend itself? This dilemma grew in importance after the Treaty of Versailles, the famous document of 1919 that was supposed to prevent further conflict by crippling and punishing the defeated countries, but whose nature and severity is now recognized as having partly caused the Second World War. Many French politicians and generals were unhappy with the terms of the treaty, believing that Germany had escaped too lightly. Some individuals, such as Field Marshall Foch, argued that Versailles was simply another armistice and that war would ultimately resume. The Question of National Defense Accordingly, the question of defense became an official matter in 1919, when the French Prime Minister   Clemenceau, discussed it with Marshal Pà ©tain, the head of the armed forces. Various studies and commissions explored many options, and three main schools of thought emerged. Two of these based their arguments on evidence gathered from the First World War, advocating a line of fortifications along Frances eastern border. A third looked toward the future. This final group, who included a certain Charles de Gaulle, believed that war would become fast and mobile, organized around tanks and other vehicles with air support. These ideas were frowned upon within France, where the consensus of opinion regarded them as being inherently aggressive and requiring outright attacks: the two defensive schools were preferred. The Lesson of Verdun The great fortifications at Verdun were judged to have been the most successful in the Great War, surviving artillery fire and suffering little internal damage. The fact that Verduns largest fortress, Douaumont, had fallen easily to a German attack in 1916 only broadened the argument: the fort had been built for a garrison of 500 troops, but the Germans found it manned by less than a fifth of that number. Large, well-built and—as attested to by Douaumont—well-maintained defenses would work. Indeed, the First World War had been a conflict of attrition in which many hundreds of miles of trenches, mainly dug from mud, reinforced by wood, and surrounded by barbed wire, had held each army at bay for several years. It was simple logic to take these ramshackle earthworks, mentally replace them with massive Douaumont-esque forts, and conclude that a planned defensive line would be wholly effective. The Two Schools of Defense The first school, whose main exponent was Marshall Joffre, wanted large quantities of troops based in a line of small, heavily defended areas from which counter-attacks could be launched against anyone advancing through the gaps. The second school, led by Pà ©tain, advocated a long, deep, and constant network of fortifications which would militarize a large area of the eastern border and hark back to the Hindenburg line. Unlike most high-ranking commanders in the Great War, Pà ©tain was considered as both a success and a hero; he was also synonymous with defensive tactics, lending great weight to the arguments for a fortified line. In 1922, the recently promoted Minister for War began to develop a compromise, based largely on the Pà ©tain model; this new voice was Andrà © Maginot. Andr Maginot Takes the Lead Fortification was a matter of grave urgency for a man called Andrà © Maginot: he believed the French government to be weak, and the safety provided by the Treaty of Versailles to be a delusion. Although Paul Painlevà © replaced him at the Ministry for War in 1924, Maginot was never completely separated from the project, often working with the new minister. Progress was made in 1926 when Maginot and Painlevà © obtained government funding for a new body, the Committee of Frontier Defense (Commission de Dà ©fense des Frontieres or CDF), to build three small experimental sections of a new defense plan, based largely on the Pà ©tain espoused Line model. After returning to the war ministry in 1929, Maginot built upon the CDFs success, securing government funding for a full-scale defensive line. There was plenty of opposition, including the Socialist and Communist parties, but Maginot worked hard to convince them all. Although he may not have visited every government ministry and office in person—as the legend states—he certainly used some compelling arguments. He cited the falling numbers of French manpower, which would reach a low-point in the 1930s, and the need to avoid any other mass bloodshed, which might delay—or even stop—the population recovery. Equally, while the Treaty of Versailles had allowed French troops to occupy the German Rhineland, they were obliged to leave by 1930; this buffer zone would need some sort of replacement. He countered the pacifists by defining the fortifications as a non-aggressive method of defense (as opposed to fast tanks or counter attacks) and pushed the classic politi cal justifications of creating jobs and stimulating industry. How the Maginot Line Was Supposed to Work The planned line had two purposes. It would halt an invasion long enough for the French to fully mobilize their own army, and then act as a solid base from which to repel the attack. Any battles would thus occur on the fringes of French territory, preventing internal damage and occupation. The Line would run along both the Franco-German and Franco-Italian borders, as both countries were considered a threat; however, the fortifications would cease at the Ardennes Forest and not continue any further north. There was one key reason for this: when the Line was being planned in the late 20s, France and Belgium were allies, and it was inconceivable that either one should build such a massive system on their shared boundary. This did not mean that the area was to go undefended, for the French developed a military plan based on the Line. With large-scale fortifications defending the southeastern border, the bulk of the French army could gather at the northeastern end, ready to enter—a nd fight in—Belgium. The joint was the Ardennes Forest, a hilly and wooded area which was considered impenetrable. Funding and Organization In the early days of 1930, the French Government granted nearly 3 billion francs to the project, a decision which was ratified by 274 votes to 26; work on the Line began immediately. Several bodies were involved in the project: locations and functions were determined by CORF, the Committee for the Organization of the Fortified Regions (Commission dOrganization des Rà ©gions Fortifà ©es, CORF), while the actual building was handled by the STG, or Technical Engineering Section (Section Technique du Gà ©nie). Development continued in three distinct phases until 1940, but Maginot did not live to see it. He died on January 7th, 1932; the project would later adopt his name. Problems During Construction The main period of construction took place between 1930–36, implementing much of the original plan. There were problems, as a sharp economic downturn required a switch from private builders to government-led initiatives, and some elements of the ambitious design had to be delayed. Conversely, Germanys remilitarization of the Rhineland provided a further, and largely threatening, stimulus.In 1936, Belgium declared itself a neutral country alongside Luxembourg and the Netherlands, effectively severing its previous allegiance with France. In theory, the Maginot Line should have been extended to cover this new border, but in practice, only a few basic defenses were added. Commentators have attacked this decision, but the original French plan—which involved fighting in Belgium—remained unaffected; of course, that plan is subject to an equal amount of criticism. The Fortress Troops With the physical infrastructure established by 1936, the main task of the next three years was to train soldiers and engineers to operate the fortifications. These Fortress Troops were not simply existing military units assigned to guard duty, rather, they were an almost unparalleled mixture of skills which included engineers and technicians alongside ground troops and artillerymen. Finally, the French declaration of war in 1939 triggered a third phase, one of refinement and reinforcement. Debate Over Costs One element of the Maginot Line that has always divided historians is the cost. Some argue that the original design was too large, or that the construction used too much money, causing the project to be downsized. They often cite the dearth of fortifications along the Belgian border as a sign that the funding had run out. Others claim that the construction actually used less money than was allotted and that the few billion francs were far less, perhaps even 90% less than the cost of De Gaulles mechanized force. In 1934, Pà ©tain obtained another billion francs to help the project, an act which is often interpreted as an outward sign of overspending. However, this could also be interpreted as a desire to improve and extend the Line. Only a detailed study of government records and accounts can solve this debate. Significance of the Line Narratives on the Maginot Line often, and quite rightly, point out that it could easily have been called the Pà ©tain or Painlevà © Line. The former provided the initial impetus—and his reputation gave it a necessary weight—while the latter contributed a great deal to the planning and design. But it was Andrà © Maginot who provided the necessary political drive, pushing the plan through a reluctant parliament: a formidable task in any era. However, the significance and cause of the Maginot Line go beyond individuals, for it was a physical manifestation of French fears. The aftermath of World War I had left France desperate to guarantee the safety of its borders from a strongly perceived German threat, while at the same time avoiding, perhaps even ignoring, the possibility of another conflict. Fortifications allowed fewer men to hold larger areas for longer, with a lower loss of life, and the French people jumped at the chance. The Maginot Line Forts The Maginot Line was not a single continuous structure like the Great Wall of China or Hadrians Wall. Instead, it was composed of over five hundred separate buildings, each arranged according to a detailed but inconsistent plan. The key units were the large forts or Ouvrages which were located within 9 miles of each other; these vast bases held over 1000 troops and housed artillery. Other smaller forms of ouvrage were positioned between their larger brethren, holding either 500 or 200 men, with a proportional drop in firepower. The forts were solid buildings capable of withstanding heavy fire. The surface areas were protected by steel-reinforced concrete, which was up to 3.5 meters thick, a depth capable of withstanding multiple direct hits. The steel cupolas, elevating domes through which gunners could fire, were 30–35 centimeters deep. In total, the  Ouvrages  numbered 58 on the eastern section and 50 on the Italian one, with most able to fire upon the two nearest positions of equal size, and everything in between. Smaller Structures The network of forts formed a backbone for many more defenses. There were hundreds of casements: small, multi-story blocks located less than a mile apart, each providing a secure base. From these, a handful of troops could attack invading forces and protect their neighboring casements. Ditches, anti-tank works, and minefields screened every position, while observation posts and forward defenses allowed the main line an early warning. Variation There was variation: some areas had far heavier concentrations of troops and buildings, while others were without fortresses and artillery. The strongest regions were those around Metz, Lauter, and Alsace, while the Rhine was one of the weakest. The Alpine Line, that part which guarded the French-Italian border, was also slightly different, as it incorporated a large number of existing forts and defenses. These were concentrated around mountain passes and other potential weak points, enhancing the Alps own ancient, and natural, defensive line. In short, the Maginot line was a dense, multi-layered system, providing what has often been described as a continuous line of fire along a long front; however, the quantity of this firepower and the size of the defenses varied. Use of Technology Crucially, the Line was more than simple geography and concrete: it had been designed with the latest in technological and engineering know-how. The larger forts were over six stories deep, vast underground complexes that included hospitals, trains, and long air-conditioned galleries. Soldiers could live and sleep underground, while internal machine gun posts and traps repelled any intruders. The Maginot Line was certainly an advanced defensive position—it is believed that some areas could withstand an atomic bomb—and the forts became a marvel of their age, as kings, presidents, and other dignitaries visited these futuristic subterranean dwellings. Historical Inspiration The Line was not without precedent. In the aftermath of the 1870 Franco-Prussian War, in which the French had been beaten, a system of forts was constructed around Verdun. The largest was Douaumont, a sunken fortress showing hardly more than its concrete roof and its gun turrets above ground. Below lies a labyrinth of corridors, barrack rooms, munitions stores, and latrines: a dripping echoing tomb...(Ousby, Occupation: The Ordeal of France, Pimlico, 1997, p. 2). Aside from the last clause, this could be a description of the Maginot Ouvrages; indeed, Douaumont was Frances largest and best-designed  fort of the period. Equally, the Belgian engineer Henri Brialmont created several large fortified networks before the Great War, most of which involved a system of forts located set distances apart; he also used elevating steel cupolas.The Maginot plan used the best of these ideas, rejecting the weak points. Brailmont had intended to aid communication and defense by connecting some of hi s forts with trenches, but their eventual absence allowed German troops to simply advance past the fortifications; the Maginot line used reinforced underground tunnels and interlocking fields of fire. Equally, and most importantly for the veterans of Verdun, the Line would be fully and constantly staffed, so there could be no repeat of the undermanned Douaumonts swift loss. Other Nations Also Built Defenses France was not alone in its post-war (or, as it would later be considered, inter-war) building. Italy, Finland, Germany, Czechoslovakia, Greece, Belgium, and the USSR all built or improved defensive lines, although these varied hugely in their nature and design. When placed in the context of Western Europes defensive development, the Maginot Line was a logical continuation, a planned distillation of everything people believed they had learned so far. Maginot, Pà ©tain, and others thought they were learning from the recent past, and using state of the art engineering to create an ideal shield from attack. It is, therefore, perhaps unfortunate that warfare developed in a different direction. 1940: Germany Invades France There are many small debates, partly among military enthusiasts and wargamers, as to how an attacking force should go about conquering the Maginot Line: how would it stand up to various types of assault? Historians usually avoid this question—perhaps just making an oblique comment about the Line never being fully realized—because of events in 1940, when  Hitler  subjected France to a swift and humiliating conquest. World War II had begun with a  German invasion of Poland. The Nazi plan  to invade France, the Sichelschnitt (cut of the sickle), involved three armies, one facing Belgium, one facing the Maginot Line, and another part-way between the two, opposite the Ardennes. Army Group C, under the command of General von Leeb, appeared to have the unenviable task of advancing through the Line, but they were simply a diversion, whose mere presence would tie down French troops and prevent their use as reinforcements.  On May 10th 1940 , the Germans northern army, Group A, attacked the Netherlands, moving through and into Belgium. Parts of the French and British Army moved up and across to meet them; at this point, the war resembled many French military plans, in which troops used the Maginot Line as a hinge to advance and resist the attack in Belgium. The German Army Skirts the Maginot Line The key difference was Army Group B, which advanced across Luxembourg, Belgium, and then straight through the Ardennes. Well over a million German troops and 1,500 tanks crossed the supposedly impenetrable forest with ease, using roads and tracks. They met little opposition, for the French units in this area had almost no air-support and few ways of stopping the German bombers. By May 15th, Group B was clear of all defenses, and the French army began to wilt. The advance of Groups A and B continued unabated until May 24, when they halted just outside Dunkirk. By June 9th, German forces had swung down behind the Maginot Line, cutting it off from the rest of France. Many of the fortress troops surrendered after the armistice, but others held on; they had little success and were captured. Limited Action The Line did take part in some battles, as there were various minor German attacks from the front and the rear. Equally, the Alpine section proved wholly successful, halting the belated Italian invasion until the armistice. Conversely, the  allies  themselves had to cross the defenses in late 1944, as German troops used the Maginot fortifications as focal points for resistance and counter attack. This resulted in heavy fighting around Metz and, at the very end of the year, Alsace. The Line After 1945 The defenses did not simply disappear after the Second World War; indeed the Line was returned to active service. Some forts were modernized, while others were adapted to resist nuclear attack. However, the Line had fallen out of favor by 1969, and the next decade saw many  ouvrages  and casements sold to private buyers. The rest fell into decay. Modern uses are many and varied, apparently including mushroom farms and discos, as well as many excellent museums. There is also a thriving community of explorers, people who like to visit these mammoth decaying structures with just their handheld lights and a sense of adventure (as well as a good deal of risk). Post War Blame: Was the Maginot Line at Fault? When France looked for explanations in the aftermath of World War II, the Maginot Line must have seemed an obvious target: its sole purpose had been to stop another invasion. Unsurprisingly, the Line received severe criticism, ultimately becoming an object of international derision. There had been vocal opposition  before  the war—including that of De Gaulle, who stressed that the French would be able to do nothing but hide behind their forts and watch Europe tear itself apart—but this was scant compared to the condemnation that followed. Modern commentators tend to focus on the question of failure, and although opinions vary enormously, the conclusions are generally negative. Ian Ousby sums up one extreme perfectly: Time treats few things more cruelly than the futuristic fantasies of past generations, particularly when they are actually realised in concrete and steel. Hindsight makes it abundantly clear that the Maginot Line was a foolish misdirection of energy when it was conceived, a dangerous distraction of time and money when it was built, and a pitiful irrelevance when the German invasion did come in 1940. Most glaringly, it concentrated on the Rhineland and left Frances 400-kilometer border with Belgium unfortified. (Ousby,  Occupation: The Ordeal of France, Pimlico, 1997, p. 14) Debate Still Exists Over Blame Opposing arguments usually reinterpret this last point, claiming that the Line itself was wholly successful: it was either another part of the plan (for instance, fighting in Belgium), or its execution that failed. For many, this is too fine a distinction and a tacit omission that the real fortifications differed too much from the original ideals, making them a failure in practice. Indeed, the Maginot Line was and continues to be portrayed in many different ways. Was it intended to be an utterly impenetrable barrier, or did people just begin to think that? Was the Lines purpose to direct an attacking army around through Belgium, or was the length just a terrible mistake? And if it was meant to guide an army, did somebody forget? Equally, was the security of the Line itself flawed and never fully completed? There is little chance of any agreement, but what is certain is that the Line never faced a direct attack, and it was too short to be anything other than a diversion. Conclusion Discussions of the Maginot Line have to cover more than just the defenses because the project had other ramifications. It was costly and time-consuming, requiring billions of francs and a mass of raw materials; however, this expenditure was reinvested into the French economy, perhaps contributing as much as it removed. Equally, military spending and planning were focused  on  the Line, encouraging a defensive attitude that slowed the development of new weapons and tactics. Had the rest of Europe followed suit, the Maginot Line may have been vindicated, but countries like Germany followed very different paths, investing in tanks and planes. Commentators claim that this Maginot mentality spread across the French nation as a whole, encouraging defensive, non-progressive thinking in government and elsewhere. Diplomacy also suffered—how can you ally with other nations if all you are planning to do is resist your own invasion? Ultimately, the Maginot Line probably did more to ha rm France than it ever did to aid it.

Wednesday, May 13, 2020

No Two Snowflakes Alike - True or False

Youve likely been told no two snowflakes are alike -- that each is as individual as a human fingerprint. Yet, if youve had the chance to closely examine snowflakes, some snow crystals do look like others. Whats the truth? It depends how closely you look. To understand why theres dispute about snowflake similarity, start by understanding how snowflakes work. How Snowflakes Form Snowflakes are crystals of water, which has the chemical formula H2O. There are multiple ways water molecules can bond and stack with each other, depending on the temperature, air pressure, and concentration of water in the atmosphere (humidity). Generally the chemical bonds in the water molecule dictate the traditional 6-sided snowflake shape. One a crystal starts forming, it uses the initial structure as the basis to form branches. The branches may continue to grow or they can melt and reform depending on conditions. Why Two Snowflakes Can Look the Same Since a group of snowflakes falling at the same time form under similar conditions, theres a decent chance if you look at enough snowflakes, two or more will look the same to the naked eye or under a light microscope. If you compare snow crystals at the early stages or formation, before they have had a chance to branch out much, the odds that two of them might look alike is high. Snow scientist  Jon Nelson at Ritsumeikan University in Kyoto, Japan, says snowflakes kept between  8.6 ºF and 12.2 ºF (-13 ºC and -11 ºC) maintain these simple structures for a long time and can fall to Earth, where it would be hard to tell them apart just looking at them. Although many snowflakes are six-sided branched structures (dendrites) or hexagonal plates, other snow crystals form needles, which basically look much like each other. Needles form between 21 °F and 25 °F and sometimes reach the ground intact. If you consider snow needles and columns to be snow flakes, you have examples of crystals that look alike. Why No Two Snowflakes Are Alike While snowflakes might appear the same, at a molecular level, its very nearly impossible for two to be the same. There are multiple reasons for this: Water is made from a mixture of hydrogen and oxygen isotopes. These isotopes have slightly different properties from each other, altering the crystal structure formed using them. While the three natural isotopes of oxygen dont significantly affect crystal structure, the three isotopes of hydrogen are distinctly different. About 1 in 3,000 water molecules contains the hydrogen isotope deuterium. Even if one snowflake contains the same number of deuterium atoms as another snowflake, they wont occur in the exact same places in the crystals.Snowflakes are made up of so many molecules, its unlikely any two snowflakes are exactly the same size. Snow scientist  Charles Knight with the National Center for Atmospheric Research in Boulder, Colorado estimates each snow crystal contains around 10,000,000,000,000,000,000 water molecules. The number of ways these molecules can arrange themselves is nearly infinite. Each snowflake is exposed to slightly different conditions, so even if you starte d with two identical crystals, they wouldnt be the same as each by the time they reached the surface. Its like comparing identical twins. They might share the same DNA, but they are different from each other, especially as time passes and they have unique experiences.Each snowflake forms around a tiny particle, like a dust mote or pollen particle. Since the shape and size of the starting material isnt the same, snowflakes dont even start out alike. To summarize, its fair to say sometimes two snowflakes look alike, especially if they are simple shapes, but if you examine any two snowflakes closely enough, each will be unique.

Wednesday, May 6, 2020

Essay About Twttin Free Essays

Hint, Bryon Douglas, who needs to go through his personal journey, has a friend, Mark, who is a tedious person who is endangering Bryon, and causes Bryon to aka a life-changing decision in order to fully mature; I once had to go on a profound personal journey to adapt to middle school. In this â€Å"then† period, Bryon was influenced by Mark. For example, on page 23, Bryon and Mark had the following conversation still in the mood for a little action? ‘Sure’ said† By â€Å"action† Mark meant fighting. We will write a custom essay sample on Essay About Twttin or any similar topic only for you Order Now This shows that Mark influenced Bryon. He was probably so influenced by Mark who was his best friend from childhood. Mark grew into a manipulative and disarming teen. Bryon was doing illegal and irresponsible actions, but he felt bad about hem. However Mark,had no regrets. In Baryon’s current lifestyle he is a calm person who stands up for the right and legal things. At this time, he is no longer friends with Mark because Mark was in prison due to Baryon’s calling the cops on Mark for selling drugs. On page 154 Bryon narrated â€Å"l ended up with straight As that semester†¦ † After his transformation, he had better logic. L developed and changed in order to survive middle school by pacing my work. I became more earnest about how much time I have to complete something and when I should start. In conclusion, Bryon matured because he abandoned Mark and made a personal exploration of who he really is; I made a rough choice for the better to adapt to middle school. Byron made his personal journey by calling the police on Mark as an act of self preservation because Byron saw Mark doing something really dangerous, and realized that he did not want to be Mark’s friend. Knew it was a bad idea to put things off to the last minute, even though it pained me to give up on my free time. Change is inevitable. How to cite Essay About Twttin, Essays

Sunday, May 3, 2020

Opportunities in Making Business with Computing- myassignmenthelp

Question: Discuss about theOpportunities in Making Business with Mobile Computing. Answer: Introduction The concept of mobile computing, smartphone, android, iPhones and many more are getting a lot of attention. So much is happening across the world based on mobile computing and the pace is gaining a lot of speed. In the current world, there is number of business leader along chief data manager that are faced with a lot of decisions associated with mobile computing and it ranges from simple options of whether to properly embrace the concept of mobile computing and with more complexed decision making like what platform of mobile to use for instance IOS, Android or Windows and for what purpose it can be used (Botta et al., 2016). Project Objective The objective of the report is to identify the opportunities associated with the mobile phone in current tine and its impact of companys performance. Project Scope Applications are playing a very important role in an exceptional manner by adopting mobile in the current consumer based space. All kind apps are used for every possible thing and it goes from looking for things in nearby location to checking the latest news of the world or simple activity of playing games. The mobile phones are becoming an important part of our routine lives that company expects it to be an effortless flow in the business survival as well as become a crucial part associated with how people will work (Hansmann et al., 2013). Literature Review Mobile devices can mean or associate with any wireless collection of data, interactions as well as presentation based device which ranges from smart phone to many more advanced technologies like RFID based tags and readers. But the main attention here is primarily on the personal computing machines like tablets, PCs and smartphones. Following are the capabilities for developing the required business value: Ability to provide enriched experience visually: every company looked on in complete awe when the publications starts appearing on newly released gadgets. Integration of print, videos, image and sound in high amount of resolution in the right format (Hashem et al., 2015). The same kind of interactive and multimedia based work is present in digital based sales kit that permit sales executives to demonstrate the assorted products that ranges from furnishing to complicated electrical tools in a clear as well as easy to use communicative platform. An ability to deal with data whenever required: one of the best thing in mobile computing is associated with important, right data at fingertips of the people that have updated data about customers buying pattern and product preference to data associated with competitors operations in the area that surrounds the location of consumers. (Balasubramaniam, 2015) Ability of users to collect important data at source based on time and to move through the process chain rapidly: this ranges from collection of data for the customers next order in addition to sending it in wireless manner to the supervisor so that the collection is updated information about the inventories of product in the warehouse that uses barcode reader associated with mobile device (Hu et al., 2015). Ability to enforce the procedure: the process ranges between the decision to make sure that the field sales workforce have right and updated information about the present pricing, promotion as well as discount schemes to make sure that field sales as well as services based staff can be placed in its right direction. (Basha, Umar Abbas, 2014) Methods in which mobile phone and application can create value for business Following are the number of steps to consider while planning the adoption of mobile computing technology: Start the business not with the right platform and understand the processes in the business that can gain advantages from mobile computing. It is very to get completely amazed by the updated smartphone or other devices in this category. But, it is also normal to stay clear with practical kind of approach when recognizing mobile computing options (Kietzmann et al., 2013). Here it is very important to initiate the process with value chain procedure and the business analytics process in the company. It is also important to use traditional process based scan tools, recognize the business challenges, areas where the company is not actually meeting customer service based expectations. Understanding of the process that can improve the mobile computing and understand the overall value of improvement: once the company is clear with the fundamental cause of such challenges as well as pain points, one must ask which of them can be improved by the usage of mobile computing (Bertini, Ctarci et al., 2009). For instance, an industrial based product company operate in a country like Thailand was highly disappointed with the mean time from when the product can be offered until payment is taken. The organization also analyse the order based fulfilment procedure as well as also discover that it look for three to five orders also. The organisation can now look to make it right by covering all kind of people like truck driver with mobile based point of delivery system that can permit the consumer to sign on an Enterprise Digital help that will print a delivery based document for the retaining the customer and suddenly transmit the signed document back to billing section and the reason is that the invoice can be properly prepared as well as issued on same dates (Lamsfus et al., 2015). There is one more example, where the Thai organisation sells products by using the vans of cash (Buyya et al., 2009). Because of nature of the product, they usually transform the policy for pricing as well as discount and promotions schemes. At any given time, the price or change in promotion, sales staff must contact the field sales staff. (Deepak Pradeep, 2012) There is also time when communication is not complete or it can be delayed and the results become quite inconsistent by nature with new prices or promotion and usually th e lost amount of sales or revenue. Research Questions/Hypothesis Primary Question How mobile phone and application in it can help in creating value in business? Secondary Questions What kind of business process or workforce can function will gain advantage from the introduction of mobile computing? What kind of applications are required to support the business process or workforce? Research Design and Methodology Qualitative research The qualitative research is called or termed as exploratory research and it is also utilised to get more benefit from the clarity in many basic reason, motivations and views. It also helps in providing an insight into issue or helps in developing ideas or hypotheses for many kinds of potential level quantitative research. This research will help in uncovering the prevailing trend in opinions and further dive far deeper into the issue. The collection method used here will be mix of unstructured or semi-structured methods. Some common kind of techniques consist of focus group, interview at individual level and observations (Laudon and Laudon, 2016). The complete sample size is primarily small and the current respondent are selected to fulfil the quota. Quantitative research Another kind of research used in report is quantitative research that can quantify the issue by ways of developing numerical information that can further change into many usable kinds of statistics. It is also utilised to quantify the approach, views, attitude and other discussed elements. Quantitative method of data collection is very structured than qualitative data collection ways. The method consists of many kinds of surveys like paper based surveys, online surveys or for that matter mobile survey (Sultan, 2014). It will also consist of face to face interaction, telephonic interviews and many more. Research Limitations The study has some limitations as well. The finding will have to be interpreted in a careful manner. Firstly, like any other studies, the research discussed here was restricted by the methods used to perform the same. Secondly, the study is done in a cross-sectional method and can be assessed the perception in surveys of the obligations at the time. Time Schedule (Research plan) Conclusion Everything these highly depend on the speed of the broadband and the concept of Wi-Fi hotspots are also becoming more common with increased communication also meant that data can be transferred rapidly and the concept of mobile video calls is completely do-able. The concept of mobile computing is now making everything perfect as well as feasible and studies have turned over the management of old fear of people will not work properly from home is now an old concept (Turner et al., 2014). Employees working from home must put in record of number of hours they contributed and are more impactful since it lacks the interruption from other employees. Reference Balasubramanian, T. (2015) 'Mobile Computing An Introduction With Issues In Mobile Security', International Journal of Review and Research in Applied Sciences and Engineering, vol. 7, no. 1, pp. 15-19. Basha, A.D., Umar, I.N. and Abbas, M. (2014) 'Mobile Applications as Cloud Computing: Implementation and Challenge', International Journal of Information and Electronics Engineering, vol. 4, no. 1, Jan, pp. 36-40. Bertini, E., Catarci, T., Dix, A., Gabrielli, S., Kimani, S. and Santucci, G. (2009) 'mobile computingand society', International Journal of Mobile Human Computer Interaction, vol. 1, no. 1, Jan-Mar, pp. 20-41. Botta, A., De Donato, W., Persico, V. and Pescap, A., 2016. Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, pp.684-700. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009) 'Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility', Future Generation Computer Systems, vol. 25, pp. 599-616. Deepak, G. and Pradeep, B.S. (2012) 'Challenging Issues and Limitations of Mobile Computing', Int.J.Computer Techology Applications, vol. 3, no. 1, Jan-Feb, pp. 177-181. Hansmann, U., Merk, L., Nicklous, M.S. and Stober, T., 2013.Pervasive computing handbook. Springer Science Business Media. Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of big data on cloud computing: Review and open research issues.Information Systems,47, pp.98-115. Hu, Y.C., Patel, M., Sabella, D., Sprecher, N. and Young, V., 2015. Mobile edge computingA key technology towards 5G.ETSI White Paper,11(11), pp.1-16. Kietzmann, J., Plangger, K., Eaton, B., Heilgenberg, K., Pitt, L. and Berthon, P., 2013. Mobility at work: A typology of mobile communities of practice and contextual ambidexterity.The Journal of Strategic Information Systems,22(4), pp.282-297. Lamsfus, C., Wang, D., Alzua-Sorzabal, A. and Xiang, Z., 2015. Going mobile: Defining context for on-the-go travelers.Journal of Travel Research,54(6), pp.691-701. Laudon, K.C. and Laudon, J.P., 2016. Management information system. Pearson Education India. Sultan, N., 2014. Making use of cloud computing for healthcare provision: Opportunities and challenges.International Journal of Information Management,34(2), pp.177-184. Turner, V., Gantz, J.F., Reinsel, D. and Minton, S., 2014. The digital universe of opportunities: Rich data and the increasing value of the internet of things.IDC Analyze the Future.