Saturday, October 26, 2019

Computer Fraud

Computer Fraud Task 1 (6.c)Importance and Effectiveness of Legal Regulation in Computer Fraud Introduction In todays world due to the advancement in the modern technology there has been always problem arising related with computers especially computer fraud misuse. People who are using computers are deceived in many ways like program fraud, system hacking, e-mail hoax, auction, retail sales, investment schemes, information hacking, virus/worm attacks and people claiming to be experts on subject areas. Anyone who uses the computer with an internet connection is a potential candidate for being a victim of computer fraud. The computer fraud rate is increasing every day as the internet usage among the people increases, most of the people are using the computers and internet for a good cause but there are some people who are intentionally using the computers to bring down some organizations or business firms or to get peoples personal information. But due to the implementation of current legal regulations in each and every fields; the crime people started to get tracked down and are punished under the Computer Misuse Act, which may ultimately reduce the number of computer fraud rate in the future. Background Over the past decades the amount of financial, military and intelligence information, business data and personal information is stored on and transmitted by computers has increased by tremendous growth. All the major sectors like government and military operations entirely depend upon computers / internet for their work process and data transmission. The information which is stored and transmitted via internet will be vulnerable to attack from any unknown source; almost every organization has been affected in some way due to the computer fraud. â€Å"The British National Computer Centre reported that more than 80% of British organizations suffered security threat in the last two years† [5], most of the investigation revealed that the computer fraud occurred involves unauthorised access to computers via the internet. The current growth in the technology suggest that within a decade it will be possible for every person in the world to access all the information network including the security defence data and government departments personal information but it is in the hand of the people to make sure that they do not misuse the available information. Other than the increase in the number of computer users, there will be also increase in the number of computers per person. Each person will own and connect to hundreds of computers for information processing through network environment. In the future all the people will use computers in home appliances, phones, televisions, offices and automobiles; all these computers share the information to optimize the use of resources and to provide convenience in daily life which might result in a threat for computer fraud. In this context we will discuss about the detailed term of * Computer fraud * Causes for computer fraud * Types of computer fraud/attacks * Basic ways to prevent computer fraud apart from legal regulation. * Importance / Effectiveness of the legal regulation in computer fraud. Computer Fraud Basically computer fraud is defined as taking control access illegally or stealing information without others knowledge, computer fraud can take place in any form; it includes fraud committed by an employee of a company using the computer to steal funds or information from the work company, whereas some people use deception to gain access to individual resources. Therefore the type and the method carried out to do the computer fraud vary from people to people depending upon the need to do it. Causes for computer fraud Most of the computer fraud is done for the main purpose of gaining money either by stealing the needed information from big organizations/firms or directly stealing funds from big organizations/firms. There are few people who are not concerned about the money or information but they wanted to bring down the fame of the organization/firm so they reveal all the secrets of the particular organization and few people like hackers does the computer fraud/crime just for a fun. Types of computer fraud Computer fraud can be classified into many types depending upon the fraud committed but the major categorisations of fraud are mentioned below. All the computer crime/fraud taking place now a day comes under these main categories. o Internet auction/Bid sales fraud o Retail sales o Investment schemes o Identity theft o Phising o Credit card fraud o Information hacking o Email hoax o Virus/Worm attack o Letter scam o Ad ware All these types of computer frauds are caused mainly due to the advancement in the technology and crime is still growing around the world. Basic ways to prevent computer fraud apart from legal regulation The most important thing to do to prevent computer fraud is to be alert to the scams that are circulated over the internet so that it helps to safeguard the system and the information stored within the system, there are some basic rules to be followed in order to prevent the system from computer fraud o Users should be aware of not to publish any of their personal details on the websites or forums. o The organization/firms should not broadcast much of their business details on the internet. o Organizations/firms should ensure that they follow security policies, and procedures. o People working at homes or organization should ensure that before sending any personal information on the net should check for valid signatures. Internet auction/bid sales fraud o Understand the way how the auction/bidding works on the internet, think what is the need for the seller to sell it. o Check out what will be actions taken by the online seller if something goes wrong during transaction and shipment. o Try to find more information about the seller; if the only information you have is the business email id, check the Better Business Bureau where the seller/business is located o Examine the sellers feedback on previous sales, if the seller has good history and good feedback on previous sales; then there is no need to worry about the purchase. o Determine what method of payment the seller is asking for during the transaction. o Be aware of the difference in laws governing auctions between the U.K. and other countries like U.S, China. If a problem occurs with the auction transaction that has the seller in one country and a buyer in another country, it might result in a dubious outcome leaving you empty handed. o Be sure to ask the seller about when delivery can be expected and warranty/exchange information for the product. o To avoid unexpected costs, find out whether shipping and delivery cost are included in the auction price or are additional. o Finally, avoid giving out your social security or drivers license number to the seller, as the sellers have no need for this information. Credit Card Fraud o Do not give out credit card number online unless the site is both secure and reputable. Sometimes a tiny icon of a padlock appears to symbolize a higher level of security to transmit data. The icon is not a guarantee of a secure site, but may provide you some assurance. o Before using the site, check out the security software it uses; make sure your information will be protected. o Make sure you are purchasing product from a reputable/legitimate source. Once again investigate the person or company before purchasing products. o Try to obtain a physical address rather than merely a post office box and a phone number, call the seller to see if the number is correct and working. o Send them e-mail to see if they have an active e-mail address and be cautious about the sellers who use free e-mail service where a credit card was not required to open the account. o Do not purchase from sellers who will not provide you with this type of information. o Check with the Better Business Bureau to see if there have been any complaints against the seller before. o Check out other web sites regarding this person/company details. o Be cautious when responding to special offers. o Be cautious when dealing with individuals/companies from outside your own country. o If you are going to purchase an item via the Internet, use a credit card since you can often dispute the charges if something does go wrong. o Make sure the transaction is secure when you electronically send your credit card somewhere. o You should keep a list of all your credit cards and account information along with the card issuers contact information. If anything looks suspicious or you lose your credit card contact the card issuer immediately. Investment Fraud o Do not invest in anything based on appearances. Just because an individual or company has a flashy web site does not mean it is legitimate. Web sites can be created in just a few days. After a short period of taking money, a site can vanish without a trace. o Do not invest in anything you are not absolutely sure about. Thoroughly investigate the individual or company to ensure that they are legitimate. o Check out other web sites regarding this person/company. o Be cautious when responding to special investment offers; inquire about all the terms and conditions dealing with the investors and the investment. Importance of the legal regulation in computer fraud After all the basic discussion about the concepts and the causes of computer fraud, we are going to discuss about the legal regulation issues related with the computer fraud which tells how the legal regulations prevent or reduce the increasing computer fraud rate in todays developing world of technology, Most of the law reform is achieved by modifying and extending existing law to cope with new situations rather than by the introduction of completely new legislation.This can sometimes make it difficult to find a single place where the whole of an area of law is clearly set out. The Computer Misuse Act was enacted in 1990 and it remains the primary piece of UK legislation focusing on the misuse of computer systems. It covers computer frauds such as hacking and the deliberate spread of viruses and was created to prevent unauthorized access or modification of computer systems and to prevent criminal elements from using a computer to assist in the commission of a criminal offence or fro m impairing or hindering access to data stored in a computer. â€Å"In 2004, MPs specifically, the All-Party Internet Group (APIG) began a review of the CMA, on the basis that this legislation was created before the emergence of the Internet and therefore required updating† [5]. The Act was seen to focus too much on individual computers and not enough on computer networks. In addition some of the definitions used in the 1990 Act need updating. The final report outlined several recommendations to the government for changes to the CMA. In March 2005, APIG called for amendments to the CMA to address the threat from denial of service attacks. The Computer Misuse Act was passed in 1990 to deal with the problem of hacking/other threats of computer systems. In the early days hacking/other computer fraud related issues was not taken very seriously by the law and the impression was that it is mischievous rather than something which causes serious loss to organizations. However, with developments in technology the issue has become more serious and legislation was introduced to recognize three key offences: o Unauthorized access to computer material, Example: Finding or guessing someones password and then using that to get into a computer system and have a look at the information. o Unauthorized access with intent to commit further offences. The key to this offence is the addition of intent to commit further offences. It therefore includes guessing or stealing a password and using that to access material or services without the consent of the owner. o Unauthorized modification of computer material. This could include deleting files, changing the desktop set-up or introducing viruses with the deliberate intent to impair the operation of a computer. Effectiveness of legal regulation in computer fraud ( Conclusion) All the above mentioned computer fraud issues was not taken seriously until the legal regulation was made properly, and due to the implementation of legal law of Computer Misuse Act, the effectiveness caused a tremendous change by punishing all the illegal users of the computer system. Below example shows the consequence for an ‘Unauthorized Access to system. Incident Unauthorized Access to Communications Systems Provision Computer Misuse Act Section 1 Description Cause a computer to perform any function with the intention of securing access to any program or data held in a computer, if this access is unauthorized and if this is known at the time of causing the computer to perform the function. Sanction A fine and/or a term of imprisonment not exceeding 6 months was sentenced for the illegal user. Total number of words in the Task1 report: 2500 Signed [ ] Task 2 (2)Do legal developments in law relating to Software copyright and Patents help or harm the cause of information system security Information system security acts as the protection of information system against unauthorized access or modification of existing information whether in storage, processing or transit stage. The information system ensures to safeguard all the stored information. Information security covers not just information but the entire infrastructures that facilitate access and use of information. The primary concern to organizations is the security of valuable information which can be anything from a formula to a customer list or organizations valuable information to financial statements. Three widely accepted elements of information system security are: o Confidentiality Ensuring information is only accessed by authorized users. o Integrity Safeguarding the accuracy and completeness of information. o Availability To ensure that authorized user have secure access to information when required. Law relating to Software Copyright and Patents In early 1970s there was a debate concerning about whether there is a need to make a copyright for the softwares or not, but later on it was decided that all the developed software needed to be copyrighted and if needed it can also be patented under the UK Copyright, Design and Patents Act 1988. The UK law for copyright and patent helped the organizations from misuse of their developed softwares/concepts. Some organizations try to steal the concepts/parts of code from developed software of other organization and try to utilize them in their developing software product. But due to the software copyright and patent law, all the leading software organizations like ‘Microsoft started to make copyright for their parts of developed code, so that no other organizations can use their part of code for developing other applications, this helped most of the organizations to develop a unique software product. Legal requirement for Information Security Keeping valuable information secure is not only a matter of good organization practice it is also a legal requirement. Since 1999 in UK and most parts of the world, there is a statutory obligation on all organizations to maintain minimum levels of security. Organizations that fail to meet the minimum security requirements may face enforcement action by the UK Government via the Information Commissioners Office. â€Å"Enforcement action can take any form and the Information Commissioners powers are not limited. Organizations that want to be relatively safe can choose to implement BS7799† [2], that is a voluntary standard which helps to ensure that sensitive information is handled by an organization in a professional and secure manner, it can done by making the organization to classify the sensitivity of information and to provide necessary control access to it. Legal developments in laws relating to software copyright and patents ‘help the information system security (Conclusion) As discussed earlier, the main work of information system security is to provide a secure environment for the information storage and processing, in the past decades when there was no legal laws for software copyright and patents, hackers used to break the information system and get the needed information/softwares; they are not really afraid of anything because there was not any law stating that taking/hacking the softwares/information was a crime which caused a big problem for the software developing organizations but now due to the development of legal laws; if a person tries to hack the information system security, he can be sentenced to prison due to the current state of law. So the development of the legal laws relating to software copyright and patents did help the information system security to make a secure environment. Total number of words in the Task2 report: 500 Signed [ ] Task 3 (4)Evaluate the proposition that Data protection laws are an unnecessary burden on legitimate public and commercial data collection The Data Protection Act was originally started on 1984 but later the existing act was replaced by the new Data Protection Act of 1998[DPA 1998], the â€Å"new act of 1998 implemented the EU Data protection Directive 95/46† [3]. The DPA relates to the protection of personal information that includes names, email addresses, financial details, personal documents and photographs. Personal information is everywhere and because it is generally impossible to separate personal information from other organizations information, most observers agree that the security standards required by the Data Protection Act are the minimum that must be applied to organization IT Systems as a whole. The security of information is so important to most organizations that, regardless of what the law require, organizations generally implement levels of security that are as high as budgets and technology. Data Protection Act of 1998—Personal Data Security The main legal requirements are set out in Principle 7 of the Data Protection Act 1998 says that all organizations must take â€Å"Appropriate technical and organizational measures against unauthorized or unlawful use and against accidental loss, damage or destruction, of information.† [4] Today, all computerized processing of personal data, structured manual records, and even some unstructured manual records are subject to provisions of the DPA 1998, including the right of the individual to access the data which is held about them. Together with the Freedom of Information Act 2000 (FOIA 2000), the DPA 1998 has forced a re-think of organizations good practice in personal data handling, new approaches to records management and made organizations consider more carefully their obligations to those whose data they hold. The FOIA 2000 extends the rights of the individual to access their data which had already existed under the DPA 1998. The definition of data is widened, as far as public authorities are concerned; to include all other recorded information held by a public authority. However, there are limits to the data subject rights that apply to this additional category of data. A request by an individual for information about him or herself is exempt under the FOIA 2000 and should be handled as a subject access request under the DPA 1998. In certain circumstances such a request may involve the release of associated information in which case the provisions of sections 7(4) and (5) of the DPA 1998 should be used to determine whether it is appropriate to release the third party information. Where an applicant specifically requests information about a third party or where responding to a request for information would involve the disclosure of personal information about a third party which is not also personal information about the applicant, the request falls within the remit of the FOIA 2000. However, the authority must apply the Data Protection Principles when considering the disclosure of information relating to individuals. An authority must not release third party information if to do so would mean breaching one of the Principles. Conclusion Even though the DPA secures the users personal information/data, there are some problems/burden exist for the legitimate users/public facing the Data Protection Act, according to DPA there is no exemption for back-up of data/information. In practice it will be unlikely that a data subject want access to data back-up and there is nothing to prevent a controller confirming that a data subject wishes to access only the most recent records. The back-up data which provides that automated data processed to replace other data which has been lost, destroyed or impaired are exempt from section 7 during the first transitional period ending on 23 October 2001; but this is not a general exemption for back-up data in the traditional sense. Total number of words in the Task3 report: 500 Signed [ ] Bibliography o Andrew Terrett., The Internet, Business Strategies for Law firms, (2000, Law Society, London) o Bobbie Johnson., ‘UK computer laws are ridiculous, April 30, http://technology.guardian.co.uk/news/story/0,,1763989,00.html o ‘Computer Fraud and its Acts, April 30, http://www.itwales.com/999573.htm o ‘Concepts of Patent work, May 1, http://www.patent.gov.uk/about/consultations/conclusions.htm o ‘Data protection effect on senior management, May 2, http://www.jisc.ac.uk/index.cfm?name=pub_smbp_dpa1998 o ‘Data protection law, The key change, May 1, http://webjcli.ncl.ac.uk/1998/issue4/widdis4.html o David Icove. and Karl Seger, Computer Crime, (1995, OReilly Associates, USA) o David S. Wall., Cyberspace Crime, (2003, Darmouth Publishing Company , Hants, England) o Douglas Thomas. and Brian Loader, Cyber crime, (2000, Routledge publication , London) o ‘Facts on copyright, May 1, http://www.intellectual-property.gov.uk/faq/copyright/what.htm o ‘Fraud law reforms, April 30, http://www.bcs.org/server.php?show=conWebDoc.1149 o ‘Fraud Tips, April 30, http://www.fraud.org/internet/intset.htm o ‘Hacking and other computer crime, April 30, http://www.met.police.uk/computercrime/#SO6 o Ian Lloyd., Information Technology Law, (1997, Reed Elsevier Ltd, Halsbury, London) o Joshua Rozenberg., Privacy and the Press, (2005, Oxford university press Inc , USA) o Michael Levi., Regulating Fraud, (1987, Tavistock Publication , London) o ‘New laws for computer fraud, April 30, http://www.thisismoney.co.uk/news/article.html?in_article_id=400895in_page_id=2 o ‘Summary of Intellectual property rights, May 1, http://www.copyrightservice.co.uk/copyright/intellectual_property o Susan Singleton., Data protection The New Law, (1998, Jordans Publication , Bristol) o ‘UK Data protection laws are chaotic, May 2, http://www.theregister.co.uk/2004/11/17/data_protection_laws_chaotic/

Friday, October 25, 2019

Circadian Rhythms: Experiment :: essays research papers

Circadian Rhythms: Experiment Circadian Rhythms are the times of day that you get either hungry, tired, or energetic. This paper is to describe an experiment that I have thought up that will test to see if circadian rhythms differ from people who perceive themselves as night-time people and people who perceive themselves as morning people. What is your hypothesis?   Ã‚  Ã‚  Ã‚  Ã‚  My hypothesis is that night-time people's circadian rhythms are extremely different than morning people's circadian rhythms. What population are you going to study? How will you sample this population?   Ã‚  Ã‚  Ã‚  Ã‚  Participants for my experiment will be ninety-nine undergraduate female students from Iowa State University. Prior to the experiment all participants will have to fill out a questionnaire. This questionnaire will primarily determine if they feel themselves as being either morning or night types of people. Subjects for my experiment will be randomly chosen from these questionnaires. I will select three night-time people and three morning-time people. I will then give each of them a journal. In this journal each subject will write in it the time that they become hungry, or the time that they became tired. They will do this for three days. At the end of the three days they will come back to my laboratory. They will then be put in an isolation booths. In one of the booths there will be a clock that doesn't have the right time on it. In another one there will be a window so that they can see where the sun is. In the third one there will be no windows and no clocks. All they would have is a light bulb in the ceiling. All the booths will have a bed and a bright red button on the far wall. The button will be for ringing. They will ring when they are tired, hungry, or need to use the facilities. My assistants and I will record when they become hungry and when they become tired. They will be in this room for three days. At the end of the three days my assistants and I will make sure that they are all right and can return to the world unharmed. What is your independent variable(s)? What is your dependent variable? How will you measure the dependent variable?   Ã‚  Ã‚  Ã‚  Ã‚  My independent variable will be one of the three that I give a clock and another one that I give a view of where the sun is. The dependent variable will be the one that will be completely isolated. Without sunlight they will not know what time it is and therefore not know when to become tired or hungry.

Wednesday, October 23, 2019

Barriers of Effective Communication

Describe the barriers of effective communication. Introduction: If an individual (Sender) sends a message and the receiver interprets it in the same way as the sender had intended to express,the process of communication is said to be complete. But it is not always so. Certain barriers in communication affect the clarity, accuracy and effectiveness of the message. The barriers could be related to the communication system, mechanical devices being used, language or symbols being used for encoding, the sender and the receiver himself. There exist many barriers to communication and these may occur at any stage in the communication process.Barriers may lead to your message becoming distorted and you therefore risk wasting both time and money by causing confusion and misunderstanding. Effective communication involves overcoming these barriers and conveying a clear and concise message. Below are some common barriers to effective communication include: †¢ Physical Barriers: this has to do with poor or outdated equipment used during communications. Physical barriers are often due to the nature of the environment like background noise, poor lighting, temperatures that are too hot or too cold which in turn interfere with effective communication. Organizational Barriers: System design faults refer to problems with the structures or systems in place in an organization. This happens due to the physical distance between the sender and the receiver due to their task, power, and authority and status relationship. examples could be inefficient or inappropriate information systems, a lack of supervision or training, and a lack of clarity in roles and responsibilities which can lead to staff being uncertain about what is expected of them. †¢ Ambiguity of words/phrases or Semantic Barriers:Different people assign different meanings to one specific message. Hence the communicator must ensure that the receiver receives the same meaning. It is better if such words are avoide d by using alternatives whenever possible. †¢ Attitudes or Interpersonal Barriers: Another main barrier is the fear and mistrust that form the roots of our emotional barrier which stop us from communicating effectively with our co-workers. These are based upon relationships, values held and attitudes of the members involved.Shortage of time for subordinates, lack of trust, can be a major hurdle in effective communication. emotions like anger or sadness can taint objectivity. Also being extremely nervous,having a personal agenda can make communications less than effective. †¢ Cross cultural/ Geographical Barriers: This barrier arises due to time, geographic locations and the effect of time upon reception of the message. Social relationships, words, colors, symbols concepts of time and space and perception are barriers peculiar to different cultures. Language Barriers: this can seem like an easy one, but even people speaking the same language can have difficulty understandin g each other if they are from different generations or from different regions of the same country. Slang, professional jargon and regional colloquialisms can even hurt communicators with the best intentions. †¢ Information Overload: it takes time to process a lot of information and too many details can overwhelm and distract the audience from the important topics. Keep it Simple and short. Insufficient Knowledge of the Subject: If the sender lacks specific information about something, the receiver will likely receive an unclear or mixed message. For example: Have you shopped for an item such as a computer, and experienced how some salespeople can explain complicated terms and ideas in a simple way ? Others cannot. †¢ Lack of Basic Communication Skills: The receiver is less likely to understand the message if the sender has trouble choosing the precise words needed and arranging those words in a grammatically-correct sentence. Lack of Sensitivity to Receiver: A breakdown in communication may result when a message is not adapted to its receiver. Recognizing the receiver’s needs, status, knowledge of the subject, and language skills assists the sender in preparing a successful message. one can improve effective organizational communication is by changing one’s thoughts and feelings with one’s colleague. In this way, we don’t just break down communication barriers, but also build relationships that work successfully for long.

Tuesday, October 22, 2019

Economic Reform essays

Economic Reform essays The Great Depression was the worst economic slump ever in U.S. history. It ranked as the worst and longest period of high unemployment and low business activity in modern times. The depression began in late 1929 and lasted for about a decade. Many factors led to the onset and continuation of the depression; however, the main cause for the Great Depression was the combination of uneven distribution of wealth throughout the 1920's, and the extensive stock market speculation that took place later during the same decade. Money was distributed intermittently between the rich and the middle-class, between industry and agriculture within the United States, and between the U.S. and Europe. This imbalance of wealth created an unstable economy. Other factors included overproduction and Americans not receiving wages to purchase those goods, foreign tariffs, and the federal reserves tight money polices. Not only was the United states being affected by the economy, the people were as well. The excessive speculation in the late 1920's kept the stock market artificially high, but eventually lead to large market crashes. Black Thursday became known to Americans on October 24th of 1929. Thousands of stockholders lost large sums of money. Many of these stockholders were even wiped out. Banks, factories, and stores closed and left millions of Americans jobless and penniless. During this period, Americans lost their money from banks shutting down because their money was not ensured. As the losses added up, suicide, violence, and divorce rates sky rocketed. During the Great Depression, radio brought Americans together in a mental aspect. Every Saturday night families would gather around to listen to President Roosevelts fire side chats. Since television was not invented yet, Roosevelt would give speeches over the radio to keep Americans updated on what was going on in Ameri ...

Monday, October 21, 2019

Lockes Government essays

Lockes Government essays The Declaration of Independence, written by Thomas Jefferson, and The Second Treatise on Civil Government by John Locke, are two similar works. Lockes work seems to have had an influence on Jefferson when he wrote the Declaration of Independence. Both works were written on government, what it should and should not be. Locke brings the view that the state exists to preserve the natural rights of its citizens. When governments fail in that task, citizens have the rightand sometimes the dutyto withdraw their support and event to rebel. Locke maintained that the state of nature was a happy and tolerant one, that the social contract preserved the preexistent natural rights of the individual to life, liberty, and property, and that the enjoyment of private rights the pursuit of happiness led, in civil society, to the common good. Lockes form of government is simple, yet confusing. Lockes government is broken down into four main areas, the State of Nature ( SN ), the State of War ( SW ), Civil Society ( CS ), and Political Society ( PS ). Locke begins by recognizing the differences between power, in general, and political power in particular. Locke believes political power to be, the power of a magistrate over a subject. (2) The subject remains under the magistrates rule by choice. This brings about the State of Nature. The SN is a state of perfect freedom, no one is controlling others and no one is being controlled, everyone is equal. Locke comes to say that the only way someone can rule over us is if we let them. By doing this we are not abandoning our SN, but remaining in it. It is ones choice to let another preside over them. Our SN is threatened though because we do not have complete control, therefore we come into the State of War. Under SW we have taken away others SN or given up our own. For us to get it back we ...

Sunday, October 20, 2019

Istoria scrisului si a tiparului Essays - Free Essays, Term Papers

Istoria scrisului si a tiparului Essays - Free Essays, Term Papers Istoria scrisului si a tiparului Scrierea, cifrele, suportul pentru scriere i uneltele de scris toate produse ale minii omeneti continu s ocupe un loc important n toate domeniile de activitate i n toate manifestrile culturale i tiinifice. De-a lungul istoriei, popoarele au inventat diferite semne cu ajutorul crora notau fapte, ntmplri, idei. Obiecte simbolice, cum sunt o pasre, un oarece, o sgeat i o broasc, menionate de Herodot,alctuiau mesajul sciilor ctre Darius, regele perilor, cnd a pornit expediia mpotriva lor. i astzi sunt cunoscute semne simbolice, ca porumbelul alb a lui Picasso flamura alb ridicat pe front i altele. Semnele mnemonice, de asemenea sisteme primitive de scriere, care au fost ntlnite n multe pri ale lumii, sunt prezentate de nodurile de sfoar, rboj etc. Pictografia i ideografia au permis oamenilor s dea unui desen o valoare aproximativ fonetic, ajungnd la un pas de alfabet. Ideografia n zilele noastre este reprezentat de semnele de circulaie, semnele de aritmetic, chimie, astronomie etc. Scrierea hieroglif egiptean a fost descifrat abia n anul 1822 de ctre Champollion. Acest scriere era constituit dintr-un complex de semne format din psri, animale , flori, peti etc., ce erau aternute pe papirus de scribi aflai n poziie eznd, cu picioarele ncruciate i cu tblia sprijinit pe genunchi. Scrierea hieratic egiptean se realiza de la dreapta spre stnga. Scrierea cuneiform, folosit prin anul 3100 .d.Hr. prin locurile n care astzi este Kuweitul, era constituit din semne de forma unor cuie i se practica de obicei stnd n picioare, cu tblia n mna stng. Instrumentul de scriere era o bucat de trestie sau un lemn rotund ascuit, iar scrierea se citea de la stnga la dreapta. Vechea scriere chinez este o scriere ideografic ce s-a pstrat pn n zilele noastre. Direcia de scriere pe acelai rnd era de sus n jos, iar rndurile se succedau de la dreapta la stnga. Sensul unui cuvnt n limba vorbit se schim dup poziia sa n cuprinsul frazei, dup gestul care-l nsoete i dup nlimea muzical a tonului. Dicionarul realizat prin secolul XV-XVI d.Hr. coninea 44440 de ideograme. Treptat numrul lor a fost redus, iar n prezent se scrie pe orizontal, concomitent cu popularizarea noului alfabet cu litere latine. Scrieri ideografice mai sunt i cele folosite n Insula Petelui, scrierea Maya etc. Scrierea silabic a devenit posibil cnd nivelul cultural a fost mai ridicat i spiritul de observaie mai accentuat. Astfel s-a ajuns s se neleag c un cuvnt este format din sunete ce se pronun printr-o singur deschidere a buzelor, deci n silabe. Desigur, astfel se reduce numrul semnelor i scrierea devine accesibil unui cerc mai larg de oameni.n aceast categorie intr scrierile japonez, cipriot .a. Alfabetul este urmarea fireasc a unei ndelungate evoluii, cel fenician avnd meritul de a fi dat natere tuturor scrierilor alfabetice n general. Scrierea cursiv fenician, care a aprut pe la nceputul anului 500 .d.Hr., se realiza cu ajutorul a 22 de semne pe tblie de calcar, ulcioare sau papirus, de la dreapta la stnga pe orizontal. Datorit legturilor comerciale ale fenicienilor, alfabetul s-a raspndit din apus pn n rsritul ndeprtat, aprnd alte tipuri de scrieri, cu diferenieri pronunate fa de cea fenician, aa cum le cunoatem i astzi: scrierile siriene, alfabetul ebraic, scrierea brahmi, alfabetul arab etc. Alfabetul consonantic i vocalic grecesc dovedete cert originea sa fenician prin ordinea literelor, formelor apropiate i semne deosebite pentru vocale. Construcia literelor greceti a evoluat continuu, pentru ca n secolul V .d.Hr. s fie adoptat un alfabet complet. n secolul al IV- lea .d.Hr. apare forma cursiv, cu trasare mai rapid, apar legturile ntre litere i scrierea livreasc, ce d natere literelor minuscule aproape de forma actual. Acelai secol aduce semnul de sfrit de propoziie, care era format din dou puncte, iar ca semn de ntrebare punctul i virgula. Alfabetul latin a aprut ca o variant a celui grecesc. Introdus prin intermediul etruscilor, alfabetul latin s-a impus destul de repede, adaptarea fiind uoar, limba latin avnd mai puine consoane dect greaca. Din alfabetele grecei arhaice au fost preluate sunete, unele au fost modificate, altele reaezate. n locul vechilor denumiri, latinii au desemnat literele dup sunetul lor. Ca i grecii, vechii romani foloseau foloseau n scrierea monumental numai litere capitale, din care au derivat literele mari de tipar. Minusculele au aprut abia n secolul al V-lea d.Hr., dezvoltndu-se diferit

Saturday, October 19, 2019

Alternative Education Options 2 Essay Example | Topics and Well Written Essays - 750 words - 1

Alternative Education Options 2 - Essay Example The school’s goal is to cost effectively attend to the needs of the school, enhance the environment and provide students with the platform to develop their skills and gain educational success. The set, benedict school philosophy is based on the 15000 year old Benedictine tradition. The school program differs from the other normal school programs in that its year is divided into summer phase, winter and spring phases. In summer the students gather for a five week program of till midday class while the freshmen have their five day classes overnight.in winter students have the regular school days and there is routine to the gym at 9:15 every morning. The spring phase concludes the academic year and students choose projects to work on for a period of four weeks. The school has firm discplinary policies. The school has about 18 groups with 20-30 members in each group where members are supposed to meet each day, participate in competitions as group and play an active role in operating the school. They are all responsible for each other. The student ratio is 13:1 a very effective structure. The school is run by the senior group leader, a beginning leader and four section leaders that cooperate in attaining the mission of the school. There is a great degree in uniformity in the school. They pray according to catholic programs and sing songs with the whole community in attendance. The student’s dress code acceptability is addressed by the headmaster and senior group leader and they have the right to authorize change at any time. Beginners wear gray and hoodies while members wear black. Students are not allowed to wear: hats, head-bands, ear muffs, gloves and may only wear one stud earring type. Sagging and hanging jewelry is not allowed. Black and brown Shoes should have no more than an inch heel and must be properly worn and tied. Any different form of shoe or dress is not acceptable. Family dynamics are intensely integrated in the school