Saturday, May 23, 2020

Review Of The Crucible - 1448 Words

Megan Fair Mrs. Hagerty Honors English February 4, 2015 The Damaging Impacts of Jealousy in The Crucible In a healthy community everyone helps each other, supports each other and everyone is working towards being happy. In a healthy community the people need laws, trust, respect, and collaboration. However in the real world jealousy can easily creep into our lives and destroy our relationships. When trust is broken people lose respect in people and then get jealous. In his play The Crucible Arthur Miller exposes the damaging results that jealousy has on a community through the character of Abigail Williams. Motivated by jealousy Abigail, the orphaned niece of Reverend Parris, is doing everything that she can to get her former lover, John Proctor, back. John Proctor is a man of good character, who did make a mistake, but he regrets what he had done and he resents Abigail. While in the forest with Tituba and the other girls Abigail has asked Tituba to conjure up the spirits and place a charm on John’s wife Elizabeth Proctor, Abigail forces the girls from the forest to continue the lies she started. Abigail is constantly lying to people in the community about what really happens, her accusations lead to innocent people being hanged because of these lies. Placing the charm on someone from the community can hurt people who are highly respected in the community, even though the charm has no magic power or effect they believe that it does. The lying of Abigail and the girlsShow MoreRelatedReview Of The Crucible 1291 Words   |  6 Pagesdifferent. People in today’s society tend to relate this topic to politics because it is most commonly occurs within that faction of society. Corruption is a reoccurring theme throughout The Crucible, it shows through the political, McCarthyism, religious and personal reasons of the Colonial Era. The Crucible takes place in the early England colonies in Salem, Massachusetts during what we know as the witch trials. It is based on a group of girls involved in â€Å"witch like† activities, who begin to accuseRead MoreReview of The Crucible Essay1479 Words   |  6 PagesReview of The Crucible The Crucible was set in Salem, Massachusetts, 1692. The government was a theocracy, ruled by god through religious officials. Hard work and church consumedRead MoreThe Crucible Movie Review839 Words   |  4 PagesThe Crucible The movie the crucible is based upon a play that was written by an author by the name of Arthur Miller. The movie is based around the Salem witch trial which took place in Salem, Massachusetts in 1692. Where a bunch of young girls in the community of Salem had just simply went into the woods with an African American slave woman named tituba to create a love potion for young men to fall in love with them like any other normal young girl might think would just be fun. The girls were thenRead MoreThe Crucible Play Review : An Overall Look And Detailed908 Words   |  4 PagesThe Crucible Play Review With an Overall Look and Detailed Look into Specific Design Aspects Garrett L. Mize Lonestar College- Kingwood Author Notes Garrett L. Mize, Student at Lonestar College. Garrett L. Mize, Still a Student at Lonestar College. This research was self funded by the parties named. Correspondence concerning this article should be addressed to Garrett Mize, Kingwood TX, 77381 Contact: mize.garrett@gmail.com I attended â€Å"The Crucible†, at Lonestar College. The playRead MoreAnalysing the Historical Content of the Crucible1409 Words   |  6 PagesIn this essay, I intend to analyse the historical content of The Crucible and its relevance in today s society. I believe that Arthur Miller s life and his experience of McCarthyism strongly influenced the writing of The Crucible. McCarthyism, named after Joseph McCarthy was a period of intense anti-communism, which occurred in the United States from 1948 to about 1956. During this time the government of the United States persecuted the Communist party USA, its leadership, and many others suspectedRead MoreThe Witch Hunt in The Crucible and During the Time of McCarthyism1356 Words   |  6 Pages In this essay, I intend to analyse the historical context of The Crucible and its relevance in today’s society. I believe that Arthur Miller’s life and his experience of McCarthyism strongly influenced the writing of The Crucible. McCarthyism, named after Joseph McCarthy was a period of intense anti-communism, which occurred in the United States from 1948 to about 1956. During this time the government of the United States persecuted the Communist party USA, its leadership, and many others suspectedRead MoreThe Effects Of Hysteria In The Crucible1489 Words   |  6 Pagesfor. Hysteria is a major leader in past and present day society when it comes to how people act and think in different situations. The Crucible provides great examples with how hysteria can affect a group of people. Back in Salem, Massachusetts 1692, hysterics swept the town, creating storms of emotion. Everyone is wondering, what to do? What to think? In The Crucible, Arthur Miller uses the effects of mass hysteria to reveal his purpose of using it in his writing, how society at that time reacts toRead MoreHysteria In The Crucible1474 Words   |  6 Pagesamong groups, is a major leader in past and present day society when it comes to how pe ople act and think in different situations. The Crucible provides great examples with how hysteria can affect a group of people. Back in Salem, Massachusetts 1692, hysterics swept the town, creating a storm of emotions. Everyone wondering, what to do? What to think? In The Crucible, Arthur Miller uses the effects of mass hysteria to reveal his purpose of using it in his writing, how society at that time reacts toRead MoreThe Crucible By Arthur Miller Essay1552 Words   |  7 PagesTrust, Honor and Faith is what is questioned in Arthur Miller â€Å"The Crucible†. The Crucible is about the Salem witch trials. Several young girls claim to be afflicted by witchcraft. The afflicted girls accuse people in the town of witchcraft, often choosing victims who they or their families dislike. The main antagonist Abigail Williams with the other girl’s accusations resulted in the arrests and death of many people in the community of Salem. Arthur Miller wrote this play during the time of theRead MoreThe Crucible By Arthur Mills Essay1690 Words   |  7 Pagesname! Because I cannot have another in my life! Because I lie and sign myself to lies! Because I am not worth the dust on the feet of them that hang! How may I live without my name? I have given you my soul; leave me my name! (Miller, 133) As The Crucible commences, Arthur Mills transports the reader to 17th century Salem, Massachusetts, to reenact the affliction of the Salem Witch Trials, ultimately leading to regret and fatality. Miller utilizes his troubled experience with McCarthyism to ad vance

Monday, May 18, 2020

How Hair Detangler Works and Recipes to Make It

If you have long hair, chances are youve experienced the pain and frustration of trying to comb out snarls. Hair detangler is like a magical elixir, able to smooth away your cares with the spritz of a pump or wave of your hand. How does it work? Its an example of chemistry in action. Hair Detangler Basics Although there are many possible ingredients in hair detangler, they all work by altering the surface of your hair. Hair detangler is a type of hair conditioner that smooths your hair by coating it with an oil or polymer and/or by acidifying it so that the hairs surface tightens up, smoothing the scales on the hairs outer surface or cuticle and imparting a positive electrical charge to prevent the static that can worsen tangles. Common Chemicals in Hair Detanglers If you check the ingredients list of a hair detangler, youll likely see one or more of these ingredients: Silicone (e.g., dimethicone or Cyclomethicone), a polymer that adds gloss to hair by binding to its surface.Acidifier, a ​chemical that lowers the pH of the detangler, strengthening the hydrogen bonds between keratin molecules in hair, smoothing and tightening each strand.Hydrolyzed Protein helps to repair damaged keratin, smoothing the broken edges so strands of hair dont catch on each other as much.Cationic Surfactants binds to the negatively charged keratin, becoming the new smoother surface of the hair.Oils fill in the pores of dry or damaged hair, making it softer, more pliable, and less likely to tangle. Homemade Hair Detangler If you dont have detangler on hand, you can mix up some yourself. There are several options: Dilute regular hair conditioner. Spritz a mixture of 2 tablespoons conditioner in 16 ounces of water onto damp hair.Fill a spray bottle with the following herbal hair detangler mixture: 8 ounces distilled water1 teaspoon aloe vera gel10-15 drops grapefruit seed extract1-2 drops glycerin1-2 drops essential oil (e.g., lavender, jojoba, chamomile) Rinse hair with rainwater (usually acidic) or make your own acidifying rinse by adding 2 tablespoons apple cider vinegar to an empty 20-ounce water bottle. Fill the remainder of the bottle with water and use the mixture to rinse clean hair.Rub tangled dry hair with a dryer sheet prior to combing it out.

Tuesday, May 12, 2020

Driving Under the Influence of Alcohol Essay - 1628 Words

Driving under the influence of alcohol has been a major issue in America, spanning all the way back to more than 50 years ago (Raymond). Many accidents are caused from drinking and driving yearly, resulting in thousands of deaths and injuries involving innocent people. When alcohol is mixed with driving a motor vehicle, there are no limits to who may be at risk. This means that drunk driving has been harming, hurting and killing many innocent people in America. Over the years I have witnessed many aftermaths of drunk driving accidents and have heard of multiple accidents resulting from alcohol use involving people I know, and people I do not know. Sometimes, in accidents like these, all parties involved may walk away from the accident with†¦show more content†¦I plan to explore what kind of things America currently does to fight this issue,what they have done in the past, and what they plan to do in the future. I also wish to show how this affects society and prove that anyo ne may be impacted by drunk driving. Drinking and driving needs to be stopped, and when society comes together as one to tackle a problem such as this, anything is possible. The only thing left to do is fight this war and observe the outcome. First and foremost, the legal blood alcohol content while driving in the U.S. is currently at .08%. This is relatively high compared to many countries. A research article on Science Daily reports that â€Å"More than 100 countries around the world have limits set at BAC 0.05 percent or below†. Some may argue that this limit of .08% needs to be reduced, while some see it the other way around and they agree with this amount. In reality, blood alcohol content is very sensitive in the fact that just being a small margin above or below .08% can really make a difference regarding the level of impairment for the drinker. Studies at the University of California conclude that they â€Å"find no safe combination of drinking and driving -- no point at which it is harmless to consume alcohol and get behind the wheel of a car†. Their data from experimentation with intoxicated drivers also suggests and supports the idea of reducing the legal BAC inShow MoreRelatedDriving Under The In fluence Of Alcohol1945 Words   |  8 PagesDriving under the influence of alcohol not only presents a danger to the driver, but also to every other motorist or pedestrian near the roadway. Being intoxicated impairs ones judgment, vision and reaction time, all of which is critical when operating any motor vehicle. Motor vehicle accidents are the leading cause of death for Americans aged 6–27 and alcohol is a big factor to those numbers (jstor). Every 20 minutes, someone will die in an alcohol related traffic accident. Most people think itRead MoreMyths around Driving Under the Influence of Alcohol1173 Words   |  5 Pagespast few years, therefore there have been many myths on how to not obtain a DUI or a DWI. New York became the pioneer state in which, they made to first drunk driving laws in 1910, followed shortly after California then the other forty-eight states followed. These DUI laws stated that a driver could not operate a vehicle while under the influence, although intoxication was not defined by legislature at this period of time. Then in the 1930’s committees wanted to make the roads safer. So The AmericanRead MoreThe Dangers Of Driving Under The Influence Of Alcohol And Drugs Along With Texting While Driving861 Words   |  4 PagesL. (2016). Texting, drugs, and driving: A triple threat to driving safety? Journal of Ergonomics, 6 (2), 1-4. http://dx.doi.org/10.4172/2165-7556.1000154 This journal explains the dangers of driving under the influence of alcohol and drugs along with texting while driving. This journal is useful in identifying the risks associated with intoxicated driving. It can also help in determining the effects of alcohol exposure in contrast to drugs and texting while driving to see if there are any performanceRead MoreProblems with Drinking and driving1340 Words   |  6 Pages  Driving under the influence, driving while intoxicated, drunken driving, drunk driving, operating under the influence, drinking and driving, or impaired driving is the crime of driving a motor vehicle while impaired by alcohol or other drugs including those prescribed by physicians. In the case of alcohol, a drunk drivers level of intoxication is typically determined by a measurement of blood alcohol content or BAC. A BAC measurement in excess of a specific threshold level, such as 0.05% or 0Read MoreDriving Under the Inluence and Driving While Impaired1549 Words   |  6 Pagesregarding drunk driving is constantly being drawn up, debated, and passed in the United States. Many states are working to make the penalties for drunk driving much harsher, especially for repeat offenders (Xavier). Currently, in every state, the minimum punishment for convicted drunk drivers involves the automatic loss of their licenses for a period of time determined by the state (Xavier). An offender’s driver’s license should be automatically suspended or revoked after a drunk driving conviction andRead MoreDrinking and Driving Essay1487 Words   |  6 Pagesâ€Å"Every single injury and death caused by drunk driving is totally preventable† says David J. Hanson, a drunken driving activist. Drinking and driving is a serious crime in all fifty states. The rules and laws may vary among the states. In Illinois, it is illegal to operate a motor vehicle with a blood-alcohol concentration (BAC) or .08 percent or more. A driver also can be convicted of DUI with a BAC of more than .05 if additional evidence is present (DUI Laws par. 1). According to the Nation HighwayRead MoreAlcohol Abuse At An Event944 Words   |  4 PagesAlcohol Abuse at an Event In 2013, statistics show that â€Å"87% of people aged from 18 and older† (NIH), consume alcohol at some point in their lifetime. Why do people go to a party and consume alcohol? It may be all caused by pressure: social pressure and peer pressure. Alcohol has detrimental effects, both physical and mental health. Alcohol’s detrimental effects lead to the results of drinking and driving, antisocial behaviour, and it causes self embarrassment. Alcohol should not be served at anRead MoreDrunk Driving Cause And Effect Essay1173 Words   |  5 Pages Driving while under the influence of alcohol has been an issue over the years. It has caused many car crashes and some even fatal accidents. Not only will it cause pain and suffering on the victim but to the family and friends around the victim it could be very devastating. For many, one drink can be the one mistake that could follow them for the rest of their life. There are many ways to prevent drunk driving but how will they be implemented? Every 53 minutes in America, someone is killed inRead MoreThe Effects Of Alcohol Abuse On The Body1644 Words   |  7 PagesAlcohol abuse can also cause short-term effects to the body. Although there are many different short-term effects, the most common happens to be a hangover which is a â€Å"group of symptoms experienced by a person after a heavy consumption of alcohol† (Alcoholic 1). Symptoms of a hangover often consist of nausea, fatigue, thirst, headache, diarrhea, and sensitivity to light and noise. The severity of a hangover depends on several factors; these factors include the amount of alcohol consumed, the levelRead MoreEssay about Causes and Effects of Drunk Driving830 Words   |  4 Pages Cause and Effect Essay on: Drunk Driving Driving a vehicle while under the influence of alcohol is one of the most dangerous things you can do. There is a mass of research evidence to show that driving performance and reaction times are seriously affected by alcohol. Our law in Georgia states, â€Å"that it is illegal to operate a motor vehicle if your blood alcohol concentration (BAC) exceeds .10%. Georgia observes a per se law. (Craft) If you drink and drive, you are not only a danger

Wednesday, May 6, 2020

The Watergate Scandal An Ethical Breach - 2253 Words

Watergate Scandal and Ethics Watergate Scandal has been considered as one of the darkest chapters in American history. The event not only refers to unethical use of power by the public representatives but also levied great deal of attention on the mechanism of surveillance over the activities of public servants. Watergate scandal provides ethical directions not only to public servants but also provides ethical guidelines to the lawyers and media representatives as well. This incident reveals how ethical lines were crossed time and again by the politicians, legal attorneys and media for their own purposes. Ignoring the righteousness of the outcomes, events like these cause severe damage to the publics trust vested in these authorities which takes a long time to restore. Watergate scandal clearly defines new law graduates and junior lawyers what not to do. The subject is of such fundamental importance that John Dean, who was the White House Counsel in 1973 and was disbarred after pleading guilty of forfeiting confidentiality, has been involved in delivering lectures on Ethical values for lawyers and the course is made mandatory by the Illinois Supreme Court for the lawyers practicing in the same state. Ad per Dean, if these ethical obligations would have been known to the lawyers back then and if we would have complied with it, such event would not have occurred in the first place. The Watergate Scandal drew a great deal of attention towards the regulations applicable toShow MoreRelatedEssay on Ethics and Corruption in Governments Around the World1384 Words   |  6 PagesEthics are the means by which one can decide what actions are permissible and what actions are not. Government ethics constitutes the application of ethical rules and norms to the government. It covers issues of honesty and transparency in government, political corruption, police corruption, bribery, legislative ethics, regulatory ethics, conflict of interest, avoiding the appearance of impropriety, open government, and legal ethics. In India, bureaucracy is arranged in a way that people can moveRead MoreOn April 29, 1974 A Relatively Unknown Freshman Member1790 Words   |  8 Pagesillegal and unethical activity surrounding what is now known as â€Å"Watergate†. That woman was Barbara Jordan. After the Watergate scandal broke wide open, the American people had their faith in politicians shaken to the core and trust was at an all-time low. How, then, could the people trust politicians to right the wrong that had been done? What words could be said that would show the people that something good could come from this scandal? Enter Barbara Jordan. A skilled attorney, Jordan became the firstRead MoreEssay on Investigative Reporting is the Driving Force in Journalism2455 Words   |  10 Pageshe joined the paper, the scandal of the Profumo affair broke so he began to produce a weekly detailed account of what had happened, digging deeper into the background story. Shortly after that, the first truly investigat ive article written by Hall was an account of the life and misdeeds of Rachman, the corrupt slum landlord. In the course of his 20 years on the paper, he was associated with some of its most important investigative stories, including the Philby spy scandal, thalidomide, and the remarkableRead MoreEssay on World Phone Hacking Scandal2506 Words   |  11 PagesThis was when the public became aware of an ongoing investigation into a scandal that had started years before. Every corporation faces ethical decisions on a daily basis, including the news media. While a news outlet may not have to worry about consumer safety or environmental factors as much as a factory or another type of company, unethical practices do occur. The way in which information is obtained is highly regarded ethical practice in the journalism world. Hacking into cellphones and voicemailRead MoreInternational Management67196 Words   |  269 Pagesto face in the coming years. x DOH New and Enhanced Themes and Structure †¢ †¢ †¢ †¢ †¢ †¢ Thoroughly revised and updated chapters to reflect the most critical issues for international managers. Greater attention to and focus on a global and ethical perspective on international management. All new opening World of International Management features written by the authors on current international management challenges; these mini-cases were prepared expressly for this edition and are not available

Drm Exma Ii Free Essays

Chapter 6 1. Which of the following is a purpose of the SQL standard? A)To specify syntax and semantics of SQL data definition and manipulation B)To specify minimal and complete standards, which permit different degrees of adoption in products C)To define the data structures and basic operations for SQL databases D)All of the above Answer: D Level: ModeratePage Ref: 312 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 2. The benefits of a standardized relational language include: A)application longevity. We will write a custom essay sample on Drm Exma Ii or any similar topic only for you Order Now B)reduced training costs. C)cross-system communication. D)All of the above Answer: D Level: ModeratePage Ref: 313 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 3. The _____ is the structure that contains descriptions of objects such as tables and views created by users. A)SQL B)schema C)catalog D)master view Answer: B Level: EasyPage Ref: 314 Topic: The SQL Environment AACSB Use of Information Technology, Analytic Skills 4. _____ is a set of commands used to control a database, which includes security. A)DML B)DDL C)DCL D)DPL Answer: C Level: EasyPage Ref:315 Topic: The SQL Environment AACSB Use of Information Technology . _____ is a set of commands used to update and query a database. A)DML B)DDL C)DCL D)DPL Answer: A Level: EasyPage Ref: 315 Topic: The SQL Environment AACSB Use of Information Technology 6. DDL is typically used during which phases of the development process? A)Implementation B)Physical design C)Analysis D)All of the above Answer: B Level: DifficultPage Ref: 314, 315 Topic: The SQL Environment AACSB Use of Information Technology, Analytic Skills 7. The SQL command _____ defines a logical table from one or more tables or views. A)create table B)alter table C)create view D)create relationship Answer: C Level: EasyPage Ref:319 Topic: Defining A Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology 8. Any create command may be reversed by using a ________ command. A)truncate B)drop C)delete D)unpack Answer: B Level: EasyPage Ref: 319 Topic: Defining a Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology, Analytic Skills 9. The first in a series of steps to follow when creating a table is to: A)identify columns that must be unique. B)identify each attribute and its characteristics. C)create an index. D)identify columns that must be null. Answer: B Level: ModeratePage Ref: 319 Topic: Defining a Database in SQL Subtopic: Creating Tables AACSB Use of Information Technology, Analytic Skills 10. The SQL command _____ adds one or more new columns to a table. A)create table B)alter table C)create view D)create relationship Answer: B Level: EasyPage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology, Analytic Skills 11. What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2)); A)Alters the Customer_T table to accept Type 2 Varchars B)Alters the Customer_T table to be a Type 2 Varchar C)Alters the Customer_T table, and adds a field called â€Å"Type† D)Alters the Customer_T table by adding a 2-byte field called â€Å"Varchar† Answer: C Level: ModeratePage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology 12. What does the following SQL statement do? Delete from Customer_T where state = ‘HI’; A)Deletes all records from customer_t where the state is equal to HI B)Removes the customer_t table from the database C)Deletes all records from the customer_t table D)None of the above Answer: A Level: ModeratePage Ref: 326 Topic: Inserting, Updating, and Deleting Data Subtopic: Deleting Database Contents AACSB Use of Information Technology, Analytic Skills 13. What does the following SQL statement do? Update Product_T Set Unit_Price = 775 Where Product_ID = 7 A)Changes the price of a unit called Product_T to 7 B)Changes the unit price of Product 7 to 775 C)Changes the length of the Unit_Price field to 775 D)Updates the Product_T table to have a unit price of 775 Answer: B Level: ModeratePage Ref: 327 Topic: Inserting, Updating, and Deleting Data Subtopic: Updating Database Contents AACSB Use of Information Technology, Analytic Skills 14. Which of the following is a technique for optimizing the internal performance of the relational data model? A)Avoiding indexes on secondary keys B)Clustering data C)Not reporting statistics to save machine resources D)Using random index organizations Answer: B Level: ModeratePage Ref: 327 Topic: Internal Schema Definitions in RDBMSs AACSB Use of Information Technology 15. Indexes are created in most RDBMSs to: A)provide a quicker way to store data. B)decrease the amount of disk space utilized. C)provide rapid random and sequential access to base-table data. D)increase the cost of implementation. Answer: C Level: ModeratePage Ref: 328 Topic: Internal Schema Definition in RDBMSs Subtopic: Creating Indexes AACSB Use of Information Technology 16. In an SQL statement, which of the following parts states the conditions for row selection? A)Select B)From C)Where D)Group By Answer: C Level: EasyPage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 17. What does the following SQL statement do? Select * From Customer Where Cust_Type = â€Å"Best† A)Selects all the fields from the Customer table for each row with a customer labeled â€Å"best† B)Selects the â€Å"*† field from the Customer table for each row with a customer labeled â€Å"best† C)Selects fields with a â€Å"*† in them from the Customer table D)Selects all the fields from the Customer table for each row with a customer labeled â€Å"*† Answer: A Level: ModeratePage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 18. What result will the following SQL statement produce? Select Avg(standard_price) as average from product_v; A)The average of all products in product_v B)The average standard_price of all products in product_v C)The average price of all products D)None of the above Answer: B Level: ModeratePage Ref: 331 Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 19. Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A)How many products are in the Product Table? B)How many products have product descriptions in the Product Table? C)How many characters are in the field name â€Å"Product_Description†? D)How many different columns named â€Å"product Description† are there in table Product_T? Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 20. What results will be produced by the following SQL query? Select sum(standard_price) as total_price from product_v where product_type = ‘WOOD’; A)The total price of all products that are of type wood B)The total price of all products C)The standard_price of the first wood product in the table D)The standard_price of any wood product in the table Answer: A Level: DifficultPage Ref: 331 Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 21. Which of the following counts ONLY rows that contain a value? A)Count B)Count(*) C)Tally(*) D)Checknum Answer: A Level: ModeratePage Ref: 331,332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 22. Which of the following will produce the minimum of all standard prices? A)Select standard_price from product_v where standard_price = min; B)Select min(standard_price) from product_v; C)Select standard_price from min(product_v); D)Select min(standard_price) from product_v where standard_price = min(standard_price); Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 23. What will result from the following SQL Select statement? Select min(product_description) from product_v; A)The minimum value of product_description will be displayed. B)An error message will be generated. C)The first product description alphabetically in product_v will be shown. D)None of the above. Answer: C Level: DifficultPage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 24. Which of the following is the wildcard operator in SQL statements? A) B) * C) = D) Answer: B Level: EasyPage Ref: 332, 333 Topic: Processing Single Tables Subtopic: Using Wildcards AACSB Use of Information Technology, Analytic Skills 25. What result set will the following query return? Select item_no from order_v where quantity 10; A)The item_no of all orders that had more than 10 items B)The order_id of all orders that had more than one item C)The order_id of all orders that had more than 10 items D)The item_no of all orders that had 10 or more items Answer: A Level: ModeratePage Ref: 333 Topic: Processing Single Tables Subtopic: Using Comparison Operators AACSB Use of Information Technology, Analytic Skills 26. Which of the following is true about the SQL statement? Select * From Product Where Quantity = 1 Or Quantity = 2; A)All fields will be selected from the Product table for products that have a quantity of 1. B)All fields will be selected from the Product table for products that have a quantity of only 2. C)All fields will be selected from the Product table for products that have a quantity of 1 or 2. D)None of the above. Answer: C Level: ModeratePage Ref: 333-336 Topic: Processing Single Tables Subtopic: Using Boolean Operators AACSB Use of Information Technology, Analytic Skills 27. What result set will the following query return? Select item_no, description from item where weight 100 and weight 200; A)The item_no and description for all items weighing less than 100 B)The item_no for all items weighing between 101 and 199 C)The item_no and description for all items weighing between 101 and 199 D)The item_no for all items weighing more than 200 Answer: C Level: ModeratePage Ref: 336, 337 Topic: Processing Single Tables Subtopic: Using Ranges for Qualification AACSB Use of Information Technology, Analytic Skills 28. To eliminate duplicate rows in a query, the _____ qualifier is used in the SQL Select command. A)alter B)distinct C)check D)specific Answer: B Level: EasyPage Ref: 337, 338 Topic: Processing Single Tables Subtopic: Using Distinct Values AACSB Use of Information Technology 29. What result set is returned from the following query? Select customer_name, telephone from customers where city in (‘Boston’,’New York’,’Denver’); A)The customer_name and telephone of all customers B)The customer_name and telephone of all customers living in either Boston, New York or Denver C)The customer_name and telephone of all customers living in Boston and New York and Denver D)The customer_name of all customers living in Boston, New York or Denver Answer: B Level: ModeratePage Ref: 339 Topic: Processing Single Tables Subtopic: IN and NOT IN with Lists AACSB Use of Information Technology, Analytic Skills 30. To get all the customers from Hawaii sorted together, which of the following would be used? A)Order By B)Group By C)Having D)Sort Answer: A Level: EasyPage Ref: 339, 340 Topic: Processing Single Tables Subtopic: Sorting Results: The ORDER BY Clause AACSB Use of Information Technology, Analytic Skills 31. A single value returned from an SQL query that includes an aggregate function is called a(n): A)agate. B)scalar aggregate. C)vector aggregate. D)summation. Answer: B Level: EasyPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 32. Multiple values returned from an SQL query that includes an aggregate function are called: A)vector aggregates. B)scalar aggregates. C)agates. D)summations. Answer: A Level: EasyPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 33. Which of the following can produce scalar and vector aggregates? A)Order By B)Group By C)Having D)Sort Answer: B Level: ModeratePage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 34. What will be returned when the following SQL statement is executed? Select driver_no,count(*) as num_deliveries from deliveries group by driver_no; A)A listing of all drivers, sorted by driver number B)A listing of each driver as well as the number of deliveries that he or she has made C)A count of all of the deliveries made by all drivers D)None of the above Answer: B Difficulty: DifficultPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 35. What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = ‘MA’ group by driver_no; A)A listing of all drivers who made deliveries to state = ‘MA’, sorted by driver number. B)A listing of each driver who made deliveries to state = ‘MA as well as the number of deliveries that each driver has made to that state. C)A count of all of the deliveries made to state = ‘MA’ by all drivers. D)None of the above. Answer: B Difficulty: DifficultPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 36. Which of the following finds all groups meeting stated conditions? A)Select B)Where C)Having D)Find Answer: C Level: EasyPage Ref: 341, 342 Topic: Processing Single Tables Subtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 37. What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) 2; A)A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries B)A listing of all drivers C)A listing of the number of deliveries greater than 2 D)A listing of all drivers who made more than 2 deliveries Answer: A Level: DifficultPage Ref: 341, 342 Topic: Processing Single Tables Subtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 38. Which of the following is true of the order in which SQL statements are evaluated? A)The select clause is always processed first. B)The select clause is always processed last. C)The select clause is processed before the order by clause. D)The group by clause is processed before the where clause. Answer: C Level: DifficultPage Ref: 329 Topic: Processing Single Tables AACSB Use of Information Technology 39. A _______________ view is materialized when referenced. A)virtual B)dynamic C)materialized D)base Answer: B Level: ModeratePage Ref: 342 Topic: Using and Defining Views AACSB Use of Information Technology 40. A view may not be updated directly iF it contains: A)the distinct keyword. B)derived columns and expressions in the select clause. C)uses the group by or having clause. D)all of the above. Answer: D Level: EasyPage Ref: 345 Topic: Using and Defining Views AACSB Use of Information Technology Chapter 7 1. A join operation: A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view. D) is used to combine indexing operations. Answer: B Level: EasyPage Ref: 358 Topic: Processing Multiple Tables AACSB Use of Information Technology 2. A join in which the joining condition is based on equality between values in the common columns is called a(n): E) equi-join. F) uni-lateral join. G) natural join. H) both A and C. Answer: D Level: EasyPage Ref: 358 Topic: Processing Multiple Tables Subtopic: Equi-join AACSB Use of Information Technology 3. A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): I) equi-join. J) natural join. K) multivariate join. L) inner join. Answer: B Level: EasyPage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 4. The most commonly used form of join operation is the: M) outer join. N) union join. O) equi-join. P) natural join. Answer: D Level: ModeratePage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 5. A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): Q) natural join. R) equi-join. S) outer join. T) union join. Answer: C Level: EasyPage Ref: 361 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 6. In which of the following situations would one have to use an outer join in order to obtain the desired results? U) A report is desired that lists all customers who placed an order. V) A report is desired that lists all customers and the total of their orders. W) A report is desired that lists all customers, the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). X) There is never a situation that requires only an outer join. Answer: C Level: DifficultPage Ref: 361,362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology, Analytic Skills 7. One major advantage of the outer join is that: Y) information is easily accessible. Z) information is not lost. [) the query is easier to write. ) All of the above. Answer: B Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 8. A type of join implemented in SQL-1999 and by extension SQL-2003 that returns all of the data from each table that is joined is called a(n): ]) outer join. ^) inner join. ) union join. `) intersect join. Answer: C Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Union Join AACSB Use of Information Technology 9. A type of query that is placed within a WHERE or HAVING clause of another query is called a: a) master query. b) subquery. c) superquery. d) multi-query. Answer: B Level: EasyPage Ref: 340 Topic: Processing M ultiple Tables Subtopic: Subqueries AACSB Use of Information Technology 10. _________ takes a value of true if a subquery returns an intermediate results table which contains one or more rows. e) In f) Having g) Exists h) Extents Answer: C Level: ModeratePage Ref: 367 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 11. In SQL, a _____________ subquery is a type of subquery in which processing the inner query depends on data from the outer query. i) correlated j) paired k) natural l) inner Answer: A Level: ModeratePage Ref: 368 Topic: Processing Multiple Tables Subtopic: Correlated Subqueries AACSB Use of Information Technology 12. A ______________ ____________ is a temporary table used in the FROM clause of an SQL query. m) correlated subquery n) derived table o) view table p) None of the above. Answer: B Level: ModeratePage Ref: 369 Topic: Processing Multiple Tables Subtopic: Using Derived Tables AACSB Use of Information Technology 13. The UNION clause is used to: q) combine the output from multiple queries into a single result table. r) join two tables together to form one table. s) find all rows that do not match in two tables. t) None of the above. Answer: A Level: EasyPage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 14. In order for two queries to be UNION-compatible, they must: u) both have the same number of lines in their SQL statements. ) both output compatible data types for each column and return the same number of rows. w) both return at least one row. x) All of the above. Answer: B Level: ModeratePage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 15. Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: y) using the if-then-else construct. z) using the immediate if statement. {) using the CASE keyword in a statement. |) using a subquery. Answer: C Level: ModeratePage Ref: 372 Topic: Processing Multiple Tables Subtopic: Conditional Expressions AACSB Use of Information Technology 16. Explicit commands to manage transactions are needed when: }) a transaction consists of just one SQL command. ~) multiple SQL commands must be run as part of a transaction. ) autocommit is set to off. ) None of the above. Answer: B Level: DifficultPage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 17. User-defined transactions can improve system performance because: ) transactions are processed as sets, reducing system overhead. ) transactions are mapped to SQL statements. ) speed is improved due to query optimization. ) All of the above. Answer: A Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 18. An interactive command that can be used to dynamically control a user session for appropriate integrity measures is: ) rollback. ) rollforward. ) set autocommit. ) expunge. Answer: C Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology, Analytic Skills 19. If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle? ) dba_tab_privs ) dba_tab_comments ) dba_table_label ) dba_tables Answer: D Level: ModeratePage Ref: 378 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 20. What results would the following SQL statement produce? select owner, table_name from dba_tables where table_name = ‘CUSTOMER’; ) A listing of all customers in the customer table ) A listing of the owner of the customer table ) A listing of the owner of the customer table as well as customers ) An error message Answer: B Level: ModeratePage Ref: 379 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 21. User-defined data types: ) can be a subclass of a standard type. can behave as an object. ) can have defined functions and methods. ) can have all of the above. Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL AACSB Use of Information Technology 22. A new set of analytical functions added in SQL:200n are referred to as: ) OLAF Functions ) MOLAP Functions ) Average Functions ) O LAP Functions Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology 23. RANK and DENSE-RANK are examples of: ) Ceilings ) Door Functions ) Window Functions ) Moving Functions Answer: C Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology, Analytic Skills 24. All of the following are new data types added in SQL:200n EXCEPT: ) BIGINT ) BIT ) MULTISET ) XML Answer: B Level: ModeratePage Ref: 381 Topic: SQL: 2003 Enhancements and Extensions to SQL Subtopic: New Data Types AACSB Use of Information Technology, Analytic Skills 25. The MERGE command: ) Allows one to combine the INSERT and UPDATE operations ) Allows one to combine the INSERT and DELETE operations ) Joins 2 tables together None of the above. Answer: A Level: ModeratePage Ref: 382 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Other Enhancements AACSB Use of Information Technology, Analytic Skills 26. Extensions defined in SQL-99 that include the capability to create and drop modules of code stored in the database schema across user sessions are called: ) stored procedures. ) Persistent Stor ed Modules. ) flow control modules. ) None of the above. Answer: B Level: ModeratePage Ref: 383 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Programming Extensions AACSB Use of Information Technology 27. A named set of SQL statements that are considered when a data modification occurs are called: ) stored procedures. ) treatments. ) triggers. ) trapdoors. Answer: C Level: EasyPage Ref: 384 Topic: Triggers and Routines AACSB Use of Information Technology 28. While triggers run automatically, ______________ do not and have to be called. ) trapdoors ) routines ) selects ) updates Answer: B Level: ModeratePage Ref: 386 Topic: Triggers and Routines AACSB Use of Information Technology 29. SQL-invoked routines can be: ) procedures. ) functions. ) All of the above. ) None of the above. Answer: C Level: EasyPage Ref: 386 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 30. All of the following are advantages of SQL-invoked routines EXCEPT: ) flexibility. ) efficiency. ) sharability. ) security. Answer: D Level: ModeratePage Ref: 387 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 31. A procedure is: ) stored within the database. ) given a unique name. ) called by name. ) All of the above. Answer: D Level: ModeratePage Ref: 387, 388 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 32. Embedded SQL consists of: hard-coded SQL statements included in a program written in another language. ) SQL encapsulated inside of other SQL statements. ) SQL written into a front-end application. ) SQL translated to a lower-level language. Answer: A and C are both plausible answers. Level: EasyPage Ref: 389 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 33. In order to embed SQL inside of a nother language, the ________ _______ statement must be placed before the SQL in the host language. ) GET SQL ) EXEC SQL ) RUN SQL ) SQL SQL Answer: B Level: ModeratePage Ref: 390 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology, Analytic Skills 34. Dynamic SQL: ) is used to generate appropriate SQL code on the fly, as an application is processing. ) is quite volatile. ) is not used widely on the Internet. ) creates a less flexible application. Answer: A Level: EasyPage Ref: 390 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 35. On-line transaction processing is: ) A system used for reporting only. ) A system used in transaction-oriented applications that involves real-time processing of SQL transactions. ) A set of tools that provides users with a graphical view of data. ) None of the above. Answer: B Level: EasyPage Ref: 391 Topic: OLAP SQL AACSB Use of Information Technology 36. OLAP systems differ from OLTP systems in several ways except: ) Size ) Processing ) Queries ) Physical Storage Answer: B Level: EasyPage Ref: 392 Topic: OLAP SQL AACSB Use of Information Technology Chapter 8 1. Which of the following have affected the way businesses use computing systems to meet the demand of the competitive marketplace? A)GUI evolutions B)Networking advances C)Communication changes D)All of the above. Answer: D Level: ModeratePage Ref: 403 Topic: Introduction AACSB Use of Information Technology 2. Which of the following is a component of processing logic? A)Input B)Output C)Retrieval D)Business rules Answer: D Level: EasyPage Ref: 404 Topic: Client/Server Architectures AACSB Use of Information Technology 3. A device that manages file operations and is shared by each client PC on a LAN is called a: A)file server. B)file processor. C)database server. D)fat client. Answer: A Level: EasyPage Ref: 405 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 4. In a file server architecture, which of the following is performed by a client? A)Provides significant LAN traffic B)File storage C)User interface processing D)All of the above. Answer: C Level: ModeratePage Ref: 404 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 5. Which of the following is true about file servers on a LAN? A)Each client must devote memory to a full version of its DBMS. B)Not much data movement is generated. C)The DBMS copy has little responsibility. D)Application programmers need little knowledge about DBMSs. Answer: A Level: ModeratePage Ref: 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology . Which of the following is NOT a limitation to using file servers on local area networks? A)Considerable data movement is generated across the network. B)Each client workstation must devote memory to a full version of the DBMS. C)Stored procedures can be run on the file server. D)The DBMS copy in each workstation must manage the shared database integrity. Answer: C Leve l: ModeratePage Ref: 405, 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 7. A(n) _____ is a module of code written in SQL or some proprietary language to run business rules on a server. A)SQL program B)select module C)select procedure D)stored procedure Answer: D Level: EasyPage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 8. Which of the following is an advantage of stored procedures? A)Data integrity improves when fewer applications access the procedure. B)The layers get cleaner. C)Stored procedures result in fatter clients. D)Performance improves for compiled SQL statements. Answer: D Level: EasyPage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 9. Which of the following is not a disadvantage of stored procedures? A)Writing stored procedures takes more time than writing an application in Visual Basic or PowerBuilder. B)Decreases in network traffic are realized. C)Stored procedures are proprietary and not easy to move from one RDBMS to another. D)Each client must be loaded with the application to be used at that location. Answer: B Level: ModeratePage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 10. A PC configured to handle user interface with little or no local storage is called a: A)server. B)fat client. C)thin client. D)workstation. Answer: C Level: EasyPage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 11. Which of the following is true about three-tier architectures? A)Less scalable than two-tier B)Increased risk C)More technological flexibility D)All of the above Answer: C Level: ModeratePage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 12. _____ is the process of assigning pieces of application code to clients or servers. A)Application partitioning B)Modularizing programs C)Code distribution D)Program breakup Answer: A Level: EasyPage Ref: 410 Topic: Partitioning an Application AACSB Use of Information Technology 13. Which of the following is not a common distribution logic for two-tiered server environments: A)Fat Client B)Tall Client C)Thin Client D)Distributed Answer: A Level: ModeratePage Ref: 411 Topic: Partitioning an Application AACSB Use of Information Technology 14. Which of the following is true of mainframes in the client/server environment? A)Managers have a difficult time moving between platforms. B)Supporting distributed environments is easier than mainframe support. C)Migrating from mainframes to client/server is a relatively simple process. D)All of the above. Answer: A Level: ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 15. Moving mission critical applications to client/server environments is likely to cause serious problems in the transition from the pilot phase to production unless: A)Developers rewrite all code for the system. B)Brand new hardware is purchased. C)Developers anticipate scalability issues and address them as they develop code D)None of the above. Answer: C Level; ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 16. ____ is any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A)User interface enhancers B)Middleware C)Interface managers D)MPP Answer: B Level: EasyPage Ref: 413 Topic: Using Middleware AACSB Use of Information Technology 17. Which of the following does not connect applications to databases over networks? A)Asynchronous RPC middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)SMP Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 18. Which of the following could send and receive email, while the client works on other things? A)ORBs middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)MOM Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 19. Microsoft’s Transaction Server and IBM’s CICS are examples of: A)Asynchronous Remote Procedure Call (RPC) B)Synchronous RPC C)MOM D)ORB Answer: B Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 20. ______________ makes it possible for applications to send objects and request services in an object-oriented system. A)MOM B)RPC C)ORB D)API Answer: C Level: EasyPage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 21. A(n) _____ is a set of application routines that programs use to direct the performance of procedures by the computer’s operating system. A)API B)MOM C)RPC D)LAN Answer: A Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 22. Which of the following is true of moving to client/server environments? A)Functionality must be delivered all at once. B)There are no hidden costs. C)Services can be placed appropriately. D)None of the above. Answer: C Level: EasyPage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 23. Which of the following is NOT a benefit of moving to client/server environments? A)Functionality can be delivered in stages to end users. B)Business process reengineering is facilitated. C)Network traffic and response times are increased. D)Users are encouraged to utilize the application’s functionality. Answer: C Level: ModeratePage Ref: 416, 417 Topic: Client/Server Issues AACSB Use of Information Technology 24. The most common bottleneck in a client/server environment is the: A)users B)software C)network D)company politics Answer: C Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 25. In order to establish client/server security: A)Network security must be established B)Biometric authentication must be used C)Server security must be established D)Both A and C Answer: D Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 26. Multi-tier make sense if all of the following environments except: A) More than 100 users B)High-volume transaction processing C)Workgroups D)Real-time processing Answer: C Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 27. Which of the following is not a parameter that must be specified in order to establish an ODBC connection? A)Specific ODBC driver needed B)Back-end server name to connect to C)JDK version D)Database name to connect to Answer: C Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 28. Which of the following is a distinguishing characteristic of Level-2 API capabilities? A)Send and receive partial results B)Call a translation library C)Commit or rollback transactions D)Prepare and execute SQL statements Answer: B Level: ModeratePage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 29. An application programming interface that enables an application program to process RDBMS databases meets the: A)object linking and embedding standard. B)open database connectivity standard. C)multi-platform connectivity standard. D)open source standard. Answer: B Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 30. Which of the following parameters must be defined in order to establish an ODBC connection? A)ODBC driver B)Back-end server name C)Database name to connect to D)All of the above Answer: D Level: ModeratePage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology. Analytic Skills 31. The ability to call a translation library is a distinguishing characteristic of: A)Core-API ODBC conformance. B)Level-1 API ODBC conformance. C)Level-2 API ODBC conformance. D)Level-3 API ODBC conformance. Answer: C Level: DifficultPage Ref: 418 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 32. JDBC is similar to ODBC EXCEPT: A)ODBC is language independent and JDBC is not. B)ODBC can be used to execute SQL queries on a server while JDBC does not have this capability. C)ODBC can run on multiple platforms, while JDBC is platform specific. D)None of the above. Answer: A Level: ModeratePage Ref: 385 Topic: Using JDBC to Link External Tables Stored on a Database Server AACSB Use of Information Technology, Analytic Skills Chapter 9 1. The analysis of summarized data to support decision making is called: A)operational processing. B)informational processing. C)artificial intelligence. D)data scrubbing. Answer: B Level: EasyPage Ref: 461 Topic: Introduction AACSB Use of Information Technology 2. The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is: A)subject-oriented. B)integrated. C)time-variant. D)nonvolatile. Answer: A Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology 3. When we consider data in the data warehouse to be time-variant, we mean: A)that the time of storage varies. B)data in the warehouse contain a time dimension so that they may be used to study trends and changes. C)that there is a time delay between when data are posted and when we report on the data. D)none of the above. Answer: B Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology, Analytic Skills 4. Which of the following advances in information systems contributed to the emergence of data warehousing? A)Improvements in database technology, particularly the relational data model B)Advances in computer hardware, especially affordable mass storage and parallel computer architectures C)Advances in middleware products that enabled enterprise database connectivity across heterogeneous platforms D)All of the above Answer: D Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data Warehousing Subtopic: A Brief History AACSB Use of Information Technology 5. Which of the following factors drive the need for data warehousing? A)Businesses need an integrated view of company information. B)Informational data must be kept together with operational data. C)Data warehouses generally have better security. D)None of the above Answer: A Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data Warehousing Subtopic: The Need for Data Warehousing AACSB Use of Information Technology 6. Which of the following organizational trends does not encourage the need for data warehousing? A)Multiple, nonsynchronized systems B)Focus on customer relationship management C)Downsizing D)Focus on supplier relationship management Answer: C Level: ModeratePage Ref: 463–464 Topic: Basic Concepts of Data Warehousing Subtopic: Need for a Companywide View AACSB Use of Information Technology 7. Informational systems are designed for all of the following EXCEPT: A)running a business in real time. B)supporting decision making. C)complex queries. D)data mining. Answer: A Level: ModeratePage Ref: 466 Topic: Basic Concepts of Data Warehousing Subtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 8. Operational and informational systems are generally separated because of which of the following factors? A)A data warehouse centralizes data that are scattered throughout disparate operational systems and makes them readily available for decision support applications. B)A properly designed data warehouse adds value to data by improving their quality and consistency. C)A separate data warehouse eliminates contention for resources that results when informational applications are confounded with operational processing. D)All of the above Answer: D Level: EasyPage Ref: 466 Topic: Basic Concepts of Data Warehousing Subtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 9. A data mart is a(n): A)enterprisewide data warehouse. B)smaller system built upon file processing technology. C)data warehouse that is limited in scope. D)generic on-line shopping site. Answer: C Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 10. One characteristic of independent data marts is complexity for end users when they need to access data in separate data marts. This complexity is caused by not only having to access data from separate databases, but also from: A)the possibility of a new generation of inconsistent data systems, the data marts themselves. B)lack of user training. C)denormalized data. D)incongruent data formats. Answer: A Level: DifficultPage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 11. All of the following are limitations of the independent data mart EXCEPT: A)separate extraction, transformation, and loading processes are developed for each data mart. B)data marts may not be consistent with one another. C)there is no capability to drill down into greater detail in other data marts. D)it is often more expedient to build a data mart than a data warehouse. Answer: D Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology, Reflective Thinking 12. A dependent data mart: A)is filled with data extracted directly from the operational system. B)is filled exclusively from the enterprise data warehouse with reconciled data. C)is dependent upon an operational system. D)participates in a relationship with an entity. Answer: B Level: ModeratePage Ref: 470 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 13. An operational data store (ODS) is a(n): A)place to store all unreconciled data. B)representation of the operational data. C)integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users. D)small-scale data mart. Answer: C Level: EasyPage Ref: 471 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 14. A logical data mart is a(n): A)data mart consisting of only logical data. B)data mart created by a relational view of a slightly denormalized data warehouse. C)integrated, subject-oriented, detailed database designed to serve operational users. D)centralized, integrated data warehouse. Answer: B Level: ModeratePage Ref: 472 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 15. All of the following are unique characteristics of a logical data mart EXCEPT: A)logical data marts are not physically separate databases, but rather a relational view of a data warehouse. B)the data mart is always up-to-date since data in a view is created when the view is referenced. C)the process of creating a logical data mart is lengthy. D)data are moved into the data warehouse rather than a separate staging area. Answer: C Level: EasyPage Ref: 472 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 16. The real-time data warehouse is characterized by which of the following? A)It accepts near-real time feeds of transaction data. B)Data are immediately transformed and loaded into the warehouse. C)It provides near-real-time access for the transaction processing systems to an enterprise data warehouse. D)All of the above Answer: D Level: EasyPage Ref: 473-474 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 7. Data that are detailed, current, and intended to be the single, authoritative source of all decision support applications are called _____ data. A)reconciled B)subject C)derived D)detailed Answer: A Level: EasyPage Ref: 475 Topic: Data Warehouse Architectures Subtopic: Three-Layer Data Architectures AACSB Use of Information Technology 18. A database action that results from a tran saction is called a(n): A)transition. B)event. C)log entry. D)journal happening. Answer: B Level: EasyPage Ref: 476 Topic: Some Characteristics of Data Warehouse Data Subtopic: Status Versus Event Data AACSB Use of Information Technology, Analytic Skills 19. Data that are never physically altered once they are added to the store are called _____ data. A)transient B)override C)periodic D)complete Answer: C Level: EasyPage Ref: 477 Topic: Some Characteristics of Data Warehouse Data Subtopic: Transient Versus Periodic Data AACSB Use of Information Technology 20. Which of the following is an objective of derived data? A)Ease of use for decision support systems B)Faster response time for user queries C)Support data mining applications D)All of the above Answer: D Level: EasyPage Ref: 481 Topic: The Derived Data Layer Subtopic: Characteristics of Derived Data AACSB Use of Information Technology 21. .A star schema contains both fact and _______ tables. A)narrative B)cross functional C)dimension D)starter Answer: C Level: ModeratePage Ref: 481 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 22. The level of detail in a fact table determined by the intersection of all the components of the primary key, including all foreign keys and any other primary key elements, is called the: A)span. B)grain. C)selection. D)aggregation. Answer: B Level: EasyPage Ref: 485 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 23. Conformed dimensions allow users to do the following: A)share nonkey dimension data. B)query across fact tables with consistency. C)work on facts and business subjects for which all users have the same meaning. D)all of the above. Answer: D Level: ModeratePage Ref: 488-489 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 24. An expanded version of a star schema in which all of the tables are fully normalized is called a(n): A)snowflake schema. B)operational schema. C)DSS schema. D)complete schema. Answer: A Level: EasyPage Ref: 492 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 25. All of the following are ways to handle changing dimensions EXCEPT: A)overwrite the current value with the new value. B)for each dimension attribute that changes, create a current value field and as many old value fields as we wish. C)create a new dimension table row each time the dimension object changes. D)create a snowflake schema. Answer: D Level: ModeratePage Ref: 494 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 26. The use of a set of graphical tools that provides users with multidimensional views of their data is called: A)on-line geometrical processing (OGP). B)drill-down analysis. C)on-line analytical processing (OLAP). D)on-line datacube processing (ODP). Answer: C Level: EasyPage Ref: 500 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 27. OLAP tools that use the database as a traditional relational database are called: A)ROLAP tools. B)MOLAP tools. C)slice and dice. D)none of the above. Answer: A Level: ModeratePage Ref: 500-501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 28. Rotating the view of a multidimensional database for a particular data point is called data: A)cubing. B)drill-down. C)dicing. D)pivoting. Answer: D Level: ModeratePage Ref: 501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 29. Going from a summary view to progressively lower levels of detail is called data: A)cubing. B)drill-down. C)dicing. D)pivoting. Answer: B Level: ModeratePage Ref: 502 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 30. Which of the following data mining techniques identifies clusters of observations with similar characteristics? A)Case reasoning B)Rule discovery C)Clustering and signal processing D)Neural nets Answer: C Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 31. Which of the following data-mining techniques searches for patterns and correlations in large data sets? A)Case reasoning B)Rule discovery C)Signal processing D)Neural nets Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 32. Which of the following data mining applications identifies customers for promotional activity? A)Population profiling B)Target marketing C)Usage analysis D)Product affinity Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 33. Which of the following is true of data visualization? A)It is easier to observe trends and patterns in data. B)Correlations and clusters in data can be easily identified. C)It is often used in conjunction with data mining. D)All of the above. Answer: D Level: ModeratePage Ref: 503 Topic: The User Interface Subtopic: Data Visualization AACSB Use of Information Technology, Analytic Skills Chapter 10 1. High quality data are data that are A) Accurate B)Consistent C)Available in a timely fashion D)All of the above Answer: D Level: EasyPage Ref: 524 Topic: Managing Quality Data AACSB Use of Information Technology, Analytic Skills How to cite Drm Exma Ii, Essay examples

Post Cold War Security in Japan through ARF Essay Example For Students

Post Cold War Security in Japan through ARF Essay Post-Cold War Security of Japan through ARFThe end of the Cold War brought a dramatic turn in the world history. The collapse of bipolar balance brought the need to normalize poor diplomatic relations and also to reassure and mature pre-existing strong diplomatic ties between states. Japan was certainly not an exception to this need. The importance of playing a lager role in regional and global security as a way of ensuring its security interests grew in Japan as the proceeding balance of power, or pre-existing security, became unreliable to her. Indeed, she initiated the regional security entity called the ASEAN Regional Forum (ARF) to strengthen Asia-Pacific security. But why did Japan take the role to propose such an institution? What is Japans stake in this regional security entity? Why is the entity based on multilateralism? And finally, how much can the ARF achieve to strengthen Asia security?Questions like these are crucial to be answered in examining Japans security relations with her neighbor Asian countries. In this paper, I argue that multilateral regional security entity is crucial and is the only way to secure herself in the post-Cold War era. The ARF, thereby, is a necessary international institution to succeed in guaranteeing profitable diplomatic relations for Japan as well as other countries including Asian and non-Asian states. For Japan, the end of the Cold War meant a shift from reactive state to cautious leader to become a normal country, as a politician Ichiro Ozawa puts, that is acceptable to the world and the ARF is the best possible opportunity for Japan to attain such a goal. During the Cold War, Japan pursued an isolationist and much of a passive strategy in regional security. Much of her effort has been rather put into economic strength based on the Yoshida doctrine found after the defeat of the World War II. To begin with, Japan has been relying heavily on the US in terms of security issues and thus entrusted her stake in regional security in American hands. First of all, despite Japans renunciation of military force, her nuclear deterrence has been guaranteed by the US. Yukio Satoh states in Asian-Pacific Process of Stability and Security American nuclear forces will continue to be the only deterrent Japan can rely on against any nuclear threat, be it from the Soviet Union, China or elsewhere (Satoh, 38). In terms of nuclear deterrence, US-Japan security arrangement has been providing an indispensable amount of security guarantee to Japan. Second, Japans sea-lane has been protected by US military presence in the Pacific. According to Satoh from the Persian Gulf region, Japan imports about seventy percent of her oil (Satoh, 38). Then he continues, given that the scope of defense operations by the Japanese Maritime Self-Defense Forces is limited to a distance of 1,000 nautical miles, Japan has to depend upon the American capability to ensure freedom of navigation in order to secure the inflow of oil and other vital commodities (Satoh, 38). Therefore, Japans preservation of her interests has once again assured by her alliance with the US. Third, much of Asian security relations have been relying on the US. The United States bilateral security arrangements with many Asian countries have indirectly linked Japan with other Asia states. Using the hub-and spokes model, the US overall became a go-between for Asian nations including Japan. The model was based on US security treaties with Japan, South Korea, Australia, the Philippines and Thailand. Gary Smith in Mulitlateralism and Regional Security in Asia: The ARF and APEC7s Geopolitical Value notes, the US is the largest partner in each of these security arrangements and everything flows back and forth to Washington (Smith). In another words, Japans diplomatic relations with her neighbor countries has been severely relying on the US and at the same time, she passively has been serving as a platform for American security arrangements in Asia. Furthermore, there has been the problem of mistrust between Japan and other Asian countries since WWII, which inevitably brought Japan to be passive and indirect in involvement of her regional security matters. Japans past record of brutal aggression for her grand plan of the Greater East Asian Co-prosperity during the war has harbored deep suspicions about Japan among Asian countries. The bitter memories of the Japanese annexation of Korea and its military invasion of China and other countries still affect her diplomatic relations with these countries. Any form of rebuilding military presence in Japan will still be threat to many of her neighbors and thus, Japan can easily provoke a tense arms race in the region. For example, during the 1970s, Japan saw an opportunity playing a larger role in regional politics after the American withdrawal from Indo-China. However, this soon caused anti-Japanese riots during then-Prime Minister Tanakas visit to Southeast Asia in 1974. The growing economic strength and US withdrawal from the region reminded the vivid memories of Japans aggression during WWII and became threatening to Asian countries. Japan thus announced the Fukuda doctrine, once again renouncing any intention to become a military power. In order to reassure this doctrine, it became important for Japan to maintain alliance with the US and play a passive role behind the US. China sees merit in the US-Japan alliance in terms of preventing Japan from becoming a big military power, claims Satoh (Satoh, 36). Japans formation of alliance with the US gives credibility that she will not become a big military power to her neighbors. Japan during the Cold War did not need to and also could not afford to take a serious role in Asian security. However, Japans passive regional security involvement came under question with the end of the Cold War. The collapse of Soviet Union noted the withdrawal of the US presence in Asia. As the Cold War faded, US troop declined from 141,000 in 1988 to 98,000 in 1992 (Johnstone). This was accompanied with her withdrawal from Philippines in 1991. At the same time, the US was facing severe economic recession. She faced a budgetary problem to maintain military presence in Asia as well as domestic argument that Washington should concentrate on domestic problems before international security arrangements. Thus, Japans security guarantee by the US started to become unreliable. At the same time, Chine emerged as a major power in Asia. Chinas economic and military power hinted a threat to Japan after the war. Without guaranteed US protection, Japan became exposed to too much danger from her neighbor power. Thus, at the same time Japan needed to secure good relationship with China, she also thought China as a possible alternative to the United States. This idea was well accompanied with her increasingly successful economic cooperation with other Asian countries. By 1991, Japan exported more to Asia than to the United States, notes Chris Johnstone in Japan and Asia: What Happened? (Johnstone). Particularly with China, Japan imports a large volume of raw materials. Johnstone claims that approximately 50 percent of Japanese trade is now with Asia (Johnstone). Thus, potential US withdrawal from protecting Japan coinciding with Japans increasing economic transaction with Asia shifted Japans focus to partnerships in security. The Red Scare EssayFor other Asian countries, they gained voice in the regional security affairs, preventing US-Japan alliance to take a strong leadership role in their security. New relations became possible for many nations without antagonizing either Japan or China. There seemed to be fair amount of reasons for every country to engage in the security entity for everyone. Finally, through the confidence building measure of a multilateral system, Japan as well as other members would gain military information of others. Japans security relations with her neighbors have been antagonized and instable due to her aggression in the 1930s and 40s. Distrust from her neighbors has put Japan under a constant retaliation threat. Thus, military capability transparency was crucial for Japan to gain security in the region. Even in General context, realistically speaking, military transparency is what every country can benefit for her security. Therefore, through multilateral security entity, every member, including Japan, mutually gains a piece of military information of others without hostile mood. An Asian security entity originally suggested under ASEAN, Japan thus pushed for a multilateral security system under ASEAN. The result is the establishment of the ASEAN Regional Forum (ARF) in 1993. The forum aims to develop a more predictable constructive pattern of relations for the Asia-Pacific through political and security cooperation (Ortuoste). In another words, it is not a collective defense organization, nor is it a collective security entity against a specific enemy. Also, the system is mostly based on talks and consensus, rather than constructive voting. In terms of military capability transparency, defense policy document of each member is on voluntary basis. Quality and quantity may vary depending on how much a member wants to be open. While some may see this casual character of ARF as a weakness, such non-supranational entity is necessary and inevitable for Asian security once again for the on-going distrust problem among countries. Indeed, there are cases of Asian security progress made under the ARF. By the joining of North Korea in the ARF, Japan and South Korea, the two prominent Asian countries concerned of North Korea, are able to build diplomatic relation with the state. Though not quite solved, the issue over South China Seas has been brought on the table numerous times where countries are able to voice with frankness. Despite its consensus and volunteer based dialogues, countries are gradually progressing towards trust and confidence. Yet, the ARF still faces limitations. For example the Forum still finds difficulty in conflict management. In the case of North Korean missile crisis, in which North Korea launched missiles and in which one of them flew over Japan, Japan did not consult the Forum but rather sought help from the US. Hardly anything was mentioned in the Forum. Moreover, North Korea claims that it was a satellite experiment and its actuality is yet to be found. Perhaps the most prominent crit icism may come in the case of East Timor crisis. Contribution to resolve the problem did not arise in the dialogues. Wade Huntley and Peter Hayes, authors of East Timor and Asian Security, notes, the ARFs capacity to function as the fulcrum for regional security coordination and dialogue has been crippled, and it is unlikely that the ARF or nascent regional institutions will regain any major role in security deliberations or outcomes in the near future. With no other meaningful autonomous security institutions on the horizon, the path is again clear for big powers to contend for hegemony in the region (Huntley and Hayes). Perhaps, the current mechanism of the ARF is too loose and casual to actually solve conflicts. Yet, in spite these criticisms, I argue that the ARF should be seen as a long-term investment for Asian security. The Forum has so far made a minimum contribution. It has created a place for countries to come together and discuss their problems, which has not been done be fore in the region. Members are launching new diplomatic relations with each other as mentioned above. It has made the ground base for a stable regional environment. The organization is still eight years old. It is too cruel to determine its success now. Now that it has achieved the minimal trust level among states to form a collective identity as Asians, the institution shall gradually revise its mechanism for much efficiency. The mission for the ARF to become a prominent security entity is yet to be accomplished. Specific target of the institution needs to be identified at the same time managing the pace of the ARF so that no member would feel pressured or would feel that it is waste of time. It may also need a defined structure for much efficient dialogues. The ARF has much to progress and its success is certainly in the hands of member states. Especially for Japan, how she is going to play the role of leader, as a current economic superpower in the region, without intimidating t he rest of the members will be one of the keys to her success in the regional security. Japan has made much of a course change in Asian security in the post-Cold War era. Her continuous commitment to the multilateral institution is crucial for her to gain trust from her neighbors and to become a normal country. Bibliography:1.Dosch, Jrsh. PMC, ARF, and CSCAP: Foundations for security architecture in the Asia-Pacific? Canberra: Strategic and Defense Studies Center and The Australian National University, 1997. 2.Huntley, Wade, and Peter Hayes. East Timor and Asian Security. Northeast Asia Peace and Security Network Special Report 23 Feb. 2000. 24 Mar. 2001 3.Johnstone, Chris. Japan and Asia: What Happened? Global Reporting Network Publications. No.49 8 Feb. 1999. 24 Mar. 2001 http://www.nyu.edu/globalbeat/pubs/ib49.html4.Midford, Paul. Japans leadership role in East Asian security multilateralism: the Nakayama proposal and the logic of reassurance. The Pacific Review 13.3 (2000): 367-397. 5.Ortuoste, C, Maria. Reviewing the ASEAN Regional Forum and its Role in Southeast Asian Security. Asia-Pacific Center for Security Studies. 27 Sept. 2000. 24 Mar. 2001. http://www.apcss.org/Paper_Reviewing_ASEAN_Forum.htm6.Satoh, Yukio. Asian-Pacific Process for Stability and Security. Japans Post Gulf International Initiatives. Japan: Ministry of Foreign Affairs Aug. 1991: 34-45. 7.Smith, J. Gary. Multilateralism and Regional Security in Asia: The ASEAN Regional Forum (ARF) and APECs Geopolitical Value. The Weatherhead Center for International Affairs No.97-2 Feb. 1997. 24 Mar. 2001. http://data.fas.harvard.edu/cfia/cfiapubs/pdfs/97-02.pdf

Friday, May 1, 2020

Anthology Styles Modernism - Politics

Question: Discuss about the Anthology Styles for Modernism, Politics. Answer: Introduction: The dream is misleading by providing an impression of a real-life occurrence. People think that it is good to dream. They believe that they can develop real imaginations in dreams. They also think that they are capable of foreseeing the truth in dreams. There is a belief that they would be able to discover all their secret wishes that are hidden in the dark. The writer describes that people could lie during nights, but at the same time it provided an opportunity whereby the same people could discover the truth (Meyer, 2002). The people believed that their dreams provided an avenue whereby they could discover the truth. You were always present in my dreams. You were friendly and happy. I believe I would never find another person like you says the narrator. The narrator believes that all the events that transpired in the dream were true. However, this is false. It was just an illusion. It is for the reason that the narrator desires that a real life occurrence would present itself so that all the events that transpired in the dream can take place in the open (Eagleton, 2008). Metaphor and similes The narrator makes a comparison between the events that transpired in the dream and the activities that take place in the actual scenario. Luxi Xu takes about the ordeals that go through his mind at night as he dreams. He compares the events of the dream to the events that take place during the day. The narrator further declares that it would be his wish if the events of the dreams become real. Thematic considerations: Theme of Alienation The activities that take place in the narrators dream are contrary to what took place during his real life scenario. It is his wish that he can bridge the gap between the two scenarios. He says that he is useless in his dreams. Besides, he resembles his shadow when he tries to relate the dream to the actual scenario (Johnson, 2013). He concludes by the say that states that an individual should always stop dreaming when the reality becomes better than the events in the dream. This is because the dream mirrors the events that are expected to happen during a reality scenario. It is the wish of the narrator that all his dreams can be real. He says that no one wants his existence because all the events that unfold during his dreams fail to translate into reality (Carlsen, 1989). Individual in nature The theme comes out when the unfolding in the narrator life is quite different from what happens in the dream. He wishes that his dreams would come true, but that is not the case. The happenings in nature are very independent and are not influenced by what takes place during his dreams. The narrator claims that he is non-existence in both his dreams and in reality (AP Express Publishers, 2002). He believes that he is not wanted at all. He is a shadow of himself. He claims that his light might have been extinguished a while ago. This is because the events in his dream and reality cannot add up. He has no power to influence the events that take place in his life. At the same time, his dreams appeal to him. He, therefore, wishes that the events in his dream could take place in his actual life (Eagleton, 2008). Descriptive styles The narrator provides a detailed description of the events that unfolded in his dream. He describes how he had his friend I his dream. The friend was friendly and happy and therefore offered a lot of comfort to the narrator. The narrator went ahead and swore that he could never find such a great friend from any part of the world (AP Express Publishers, 2002). However, the narrator further described how he developed hatred within his heart because the friend only appeared in the dream and not in real life. It was his wish that the friend could appear in real life and not in a dream as had happened (Trotter, 2013). The narrator further goes ahead and describes all the events that took place in the dream. He also describes the feelings that he had towards the events that took place in the dream. The readers are well informed through his detailed description. The readers of the narrative are therefore able to tell the mood of the narrator as they read through the article without necessarily having to meet the narrator in person (Strunk, 2007). Narrative style The writer narrates the events that unfolded in a dream. It is a short, interesting story. Anyone would be willing to sit down and listen to it. The author describes the imaginations that took place in the dream. He then tries to relate them to the events that take place in a real life scenario. The two fails to add up, and he is disappointed. The author wishes that the events in the dream would occur in a real-life scenario (Trotter, 2013). Persuasive style The author of the story provides reasons and justification to convince the readers of the story. He provides a detailed and step by step development of events in the dream. He describes how he ran in the dream. He says that he couldnt believe in himself because he is not a sportsman yet he ran very fast in the dream (Meyer, 2002). From the kind of descriptions that are provided by the narrator, one is persuaded to continue reading all through. One also develops a sense of trust in the story. No one can dismiss the story as a mere fiction. The author has done a great job. He narrated the story in such a way that everyone would develop the feeling that the dream was real. He has selectively picked the exact words to describe his ordeals in the dream and those in his real life situation (Carlsen, 1989). References AP Express Publishers. (2002). Major Themes in African Literature. AP Express Publishers. Carlsen, G. R. (1989). Perception: themes in literature. Webster Division, McGraw-Hill,. Cover, F. (2014). Committed Styles: Modernism, Politics, and Left-wing Literature in the 1930s. Oxford University Press. Eagleton, T. (2008). Literary Theory: An Introduction. U of Minnesota Press. Johnson, D. S. (2013). Greek Literature in Late Antiquity: Dynamism, Didacticism, Classicism. Ashgate Publishing, Ltd. Meyer, M. J. (2002). Literature and Music. Rodopi,. Strunk, W. (2007). The Elements of Style. Filiquarian Publishing, LLC.,. Trotter, D. (2013). Literature in the First Media Age. Harvard University Press.