Friday, January 24, 2020

Symbols, Symbolism and Feminism in Ibsens Hedda Gabler Essay example -

Symbolism and Feminism in Hedda Gabler  Ã‚     Ã‚  Ã‚   Henrik Ibsen's A Doll's House painted the picture of a strong and independent woman standing up to an oppressive and dominating society; the lead character, Nora, abandons not only her husband, but her entire family, in an effort to discover herself and become a liberated woman.   The play is known for its universal appeal, and the strong blow it dealt to a male-dominated society, by showing not only that a woman could break free from the restraints which society placed upon her, but that men were actually quite powerless in the face of a strong woman; Nora's husband, Torvald, is left weeping as she leaves him at the close of the play.   Ã‚  Ã‚  Ã‚  The strong feminist themes which were the defining elements of A Doll's House are equally evident in the play Hedda Gabler, though the latter seems to be lacking the directness, clarity, and strength of the former, in regards to its feminist ideals.   Hedda and Thea, the two female leads, posses within them both admirable and detestable female traits, and only in combination with each other can the characters reveal the true feminist message of the play.   In order to assist the reader in understanding these concepts, and to illustrate the distinct differences between the two characters, Ibsen uses symbolism.   The symbolic nature of hair, Lovborg's manuscript, and General Gabler's pistols, often seem to strip Hedda of her feminine characteristics, and emphasize the femininity of Thea.   Ã‚  Ã‚  Ã‚  During the time in which this play was written, and as is very true in modern times, a mark of feminine beauty was long, abundant, flowing hair.   Even today, short hair is often considered to be a mark of a more liberated female, and it has been used to charact... ...ety." Thesis. Brigham Young U, 1990. Dyhouse, Carol. "Mothers and Daughters in the Middle-Class Home: c. 1870-1914." Labor and Love: Women's Experience of Home and Family 1850-1940. Ed. Jane Lewis. New York: Blackwell, 1986. 27-45. Gilbert, Sandra M., and Susan Gubar. The Madwoman in the Attic: The Woman Writer and the Nineteenth-Century Literary Imagination. New Haven: Yale UP, 1979. Ibsen, Henrik.   Hedda Gabler.   New York:   Dover, 1990. Lewis, Jane. "Introduction: Reconstructing Women's Experience of Home and Family." Labor and Love: Women's Experience of Home and Family 1850-1940. Ed. Jane Lewis. New York: Blackwell, 1986. 1-26. Lyons, Charles R. Hedda Gabler, Role and World. 1990. Twayne's Masterwork Studies 62. Boston: Twayne, 1991. Salomà ©, Lou. Ibsen's Heroines. Ed. and trans. Siegfried Mandel. Redding Ridge: Black Swan, 1985.   

Thursday, January 16, 2020

Enthalpy change and Hess’s law. Essay

Introduction: Enthalpy is the total energy of a system, some of which is restored as chemical potential energy in the chemical bonds. During reactions, bonds are broken and formed. As a result, all reactions are accompanied by a change in the potential energy of the bonds, and hence an enthalpy change. This enthalpy change of reaction can be measured and is given the symbol H. The temperature of a system is a measure of the average kinetic energy of the particles present. Therefore, during a reaction, as bonds are broken and formed, there is a change in this average kinetic energy and this will result in a change in the temperature of the system. On the other hand, heat is the measure of the total energy of the substance. When the temperature of a substance increases or decreases, heat energy is absorbed or released from the environment. In order to measure this change in temperature, the following formula can be used:- Heat energy = m.C.T †¦Ã¢â‚¬ ¦where, m= mass of the substance C= specific heat capacity T= change in temperature Aim of experiment: – This particular experiment focuses on Hess’s law. Hess’s law states that the total enthalpy change on converting a given set of reactants to a particular set of products is constant, irrespective of the way in which the change is carried out. For this experiment, the conversion of NaOH to NaCl by two different routes was used and the change in enthalpy for each path was measured to test Hess’s law. Route one: – NaOH + 2M HCl 2M NaCl 2M NaCl + H2O 1M NaCl Route two: – NaOH + H2O 2M NaCl 2M NaOH + 2M HCl 1M NaCl Materials: – beakers, NaOH, 2M HCl, stopwatch, thermometer, pipettes, measuring cylinder Methods: – for the first route, 4g of NaOH was weighed. Then using a measuring cylinder 50 ml of 2M of HCl was measured and poured into a can. A thermometer was used to record the temperature of the hydrochloric acid in the can. Afterwards NaOH was added into the can. Using stopwatch and a thermometer the change in temperature was measured as 2M of NaCl was being formed. Once the temperature of the 2M NaCl was stable, 50 ml of water was added to change the sodium chloride into 1M of NaCl. Using stopwatch and thermometer the change in temperature was recorded. For the second route, 4g of NaOH was weighed. Then to form 2M of NaOH, 50 ml of water was added. A thermometer and stopwatch was used to monitor the change in temperature. Then 50ml of HCl was measured. Then its temperature was measured. These two solutions were then mixed together in a can. The temperature change was measured using a thermometer and stopwatch. Results for route one. In table1.1, the temperatures of NaOH and 2M HCl before the reaction began were 22.5à ¯Ã‚ ¿Ã‚ ½0.1à ¯Ã‚ ¿Ã‚ ½c. In table1.2, the temperature of 2M NaCl was 57.5à ¯Ã‚ ¿Ã‚ ½0.1à ¯Ã‚ ¿Ã‚ ½c before 50ml of water was added to it. Graph 1.2 temperature changes when 50 ml of water was added to 2M of NaCl to form 1M of NaCl. Results for route two. After 50ml of water was added to 4g of NaOH to form 2M of NaOH, it had a temperature of 32.4à ¯Ã‚ ¿Ã‚ ½0.1à ¯Ã‚ ¿Ã‚ ½c. On the other hand, 2M of HCl had a temperature of 22.5à ¯Ã‚ ¿Ã‚ ½0.1 cà ¯Ã‚ ¿Ã‚ ½. For table 1.3 the beginning temperature of these two reactants is the mean value of their temperature that is 27.4à ¯Ã‚ ¿Ã‚ ½0.1à ¯Ã‚ ¿Ã‚ ½c. This was done because there was not enough time to wait until both reactants reach the same temperature. Table 1.4 temperature changes during the addition of 50ml of water to 4 g of NaOH to form 2M of NaOH. Table 1.3 temperature changes during the reaction of 2M of NaOH with 2M of HCl to form 1M of NaCl. Graph 1.3 temperature changes during the reaction of 2M of NaOH with 2M of HCl to form 1M of NaCl. Graph 1.4 temperature changes during the addition of 50ml of water to 4 g of NaOH to form 2M of NaOH. Discussion To test Hess’s law the temperature change in each of the routes during the reaction can be used. The formula for heat change, which is found in the introduction section of this report, is also useful. For this particular experiment, water that is the byproduct in the formation of sodium chloride is used as a way of finding the enthalpy change. The density of water is taken to be 1g/ml and is used to determine the mass of the solutions. The specific heat capacity of water is 4.18 (g-1k-1). Route one: – To form 2M of NaCl the change in temperature () was 71.6 – 22.5= 49.1à ¯Ã‚ ¿Ã‚ ½c. The mass of the solution of NaOH and 2M of HCl was found to be 50g by using the density of water as 1g/ml and the volume of the solution being 50ml. change in enthalpy is:- Heat change= m. c. = = 10.2 KJ The change in enthalpy in changing 2M of NaCl to 1M of NaCl can be calculated in the same way where the mass of the solution becomes 100 g when 50 ml of water is added. The change in temperature was -17.6 à ¯Ã‚ ¿Ã‚ ½c. Heat change= m. c. = = -7.3 KJ The sum of the two changes in enthalpy will give a value of 2.9 KJ. Route two: – the change in temperature in forming 2M of NaOH from NaOH was 9.9à ¯Ã‚ ¿Ã‚ ½c. To do this 50 ml of water was added and the mass of the solution was 50 g. using the formula the change in enthalpy can be calculated as follows:- Heat change= m. c. = = 2.0 KJ Once 2M of NaOH was formed, 50ml of 2M of HCl was added to form 1M of NaCl, which is the final product. The change in temperature was 8.5à ¯Ã‚ ¿Ã‚ ½c. The mass was 100g and the change in enthalpy was Heat change= m. c. = = 3.5 KJ The sum of the two changes of enthalpy is 5.5 KJ. Conclusion: – The change in enthalpy for the formation of 1M of NaCl using route one was 2.9 KJ. Using route two it was 5.5 KJ. There is a significant difference of 2.6 KJ. This shows that the experiment done did not prove the Hess’s law effectively. This may be due to certain factors that will be discussed below. Limitation: – There could be lose of heat to the surrounding environment that can have vital effect on the results of the experiment. Human error and mistake matter in this kind of experiment. Instead of using a simple thermometer appropriate can be used. Improvements:- the use of data pro logger or calorimeter can minimize the human and device error in measuring temperature and can be better than simple thermometer. Using insulator such as Styrofoam cups to prevent heat from escaping to the surrounding.

Tuesday, January 7, 2020

The Importance of Cyber Security - 1093 Words

Internet is a growing source for communication. With so many people online, many have figured out ways to steal from others. Whether it be their Identity, money, or self a-steam, many are ripped of their belongings through the internet. Email and instant messaging are an easy way to not only communicate but send along important Information to one another. The newest and one of the most used, is social media websites, or a website that a profile is created and one can share pictures, thoughts, and message logs. Social media is a great way to keep in touch with friends and family, but because of the increasing use and lack of protection from cyber security, more and more people are becoming victims of cyber bullying, or the teasing and discrimination of others through online sources. The internet not only offers communication tactics, but also ways to keep track of your finances and shop from home. Identity theft through hacking is well known among the ones who risk putting their perso nal banking information online. Because of all the crime, the demand for cyber security is steadily increasing. With job opportunities for people even fresh out of college, cyber security is a job field worth taking a look at. Cyber Security is one of the top job majors college students should consider due to the high increase of Cyber bullying, Identity theft, and Online communication abuse. Cyber Security should be be a job field that college students consider because cyber security is neededShow MoreRelatedImportance of Cyber Security1744 Words   |  7 Pageslives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, â€Å"The President identified cybersecurity as one of the top priorities of his administration in doin g so, directed a 60-day review to assess polices.† (United States Executive OfficeRead MoreCyber Defense And Security Issues789 Words   |  4 PagesUnderstanding cyber defense and security issues such as cyber-crime and cyber-attacks ensure efficient functioning of information systems. Cyber-attacks are real, unexpected and increasing in numbers according to Naumovski and Kenkov (2014) cyber defense is emerging as a high priority with the increased use of information technology. Naumovski et al. (2014) noted that understanding cyber defense and security issues would ensure efficient operation of information systems. Naumovski et al. (2014)Read MoreThe Internet And Its Effects On The Environment1538 Words   |  7 Pagesthe Canadian government has published â€Å"Canada s cyber security strategy: For a stronger and more prosperous Canada†, a strategic platform to secure the Canadian cyberspace. However, although embracing cyber technology and obtain considerable advantages from it, the Canadian cyber security strategy does not reflect as a comprehensive strategic framework. This essay argues that the strategy lacks of substantial elements to deal with a wide range of cyber threats in today’s modern world. For this reasonRead MorePrevention / Containment Measures For Cyber Threats1406 Words   |  6 Pages1. Prevention/Containment Measures for Cyber Threats. Protecting classified documents or valuable information is very hard against any kind of cyber-terrorism, there are no universal safeguards. There is no existence of any agreement or policy to define cyber-terrorism. Threats can come from hackers, criminal group or terrorist group; governments use computers and internet to attack without knowing the victims. It is not easy to stop such attacks but not impossible to stop if following basic preventionRead MoreThe Prospect And Challenges Of Cyber Security Insurance922 Words   |  4 Pages2.0 Introduction This chapter presents the prospect and challenges of cyber security insurance among It practitioners in the United Kingdom based on the literature that had been reviewed in the process of writing this paper. This chapter will draw upon results of earlier studies and reports to provide a theoretical framework to answer the research questions of the paper. 2.1. Cyber security and its importance to the modern lives In line with technological advances and the evolution of the internetRead MoreAmerica And Its Homeland Security Online Essay1587 Words   |  7 PagesAmerica and Its Homeland Security Online Abstract: Everyday security is provided by the states and federal government. These tasks get more difficult as new technology introduces itself. Cybersecurity is one of the most popular security sectors in today’s world. There is not only cyberbullying going on in the world. Terrorism can be planned and sent from person to person over the internet. People’s identities are being stole to help carry out these terrorist acts and this is just the being of itRead MoreThe Threat Of Cyber Security1452 Words   |  6 PagesThe purpose of this briefing is to: †¢ Clarify the importance of cyber security in marketing †¢ Educate employees on the importance of cyber security in the workplace †¢ Explain to marketer why they are targets of cyber security attacks †¢ Educate employees on how they can prevent cyber attacks Informing and educating employees on why cyber-attacks are becoming more prevalent and how to identify and prevent them gives an organization ease of mind. A cyber breach or attack is inevitable, however mitigatingRead MoreThe Impact Of Stuxnet Worm On The World s Nuclear Facilities1340 Words   |  6 Pagesautomatically activates other copies of the worm on the same network, and it activates its rootkit, which allows it to hide its processes and activity on the local computer as well as the entire computer network. Kaspersky Lab, an international software security group operating in almost 200 countries and territories worldwide, concluded that the attack â€Å"is a one-of-a-kind, sophisticated malware attack backed by a well-funded, highly skilled attack team† and that the â€Å"attack could only be conducted withRead MoreInformation Is A Source Of Power In International Relations.967 Words   |  4 Pagesfunctioning of a state. However, when any state places enough impor tance on a resource of power, that resource becomes a target. An attack on informational structures of a state are cyber-attacks or â€Å"the use of computational technologies in cyberspace for malevolent and destructive purposes in order to impact, change, or modify diplomatic and military interactions between entities† Cyber-attacks are increasingly becoming daily security threats in both private and public sectors of a state. In 2016Read MoreCyber Threats931 Words   |  4 PagesTOP FIVE CYBER SECURITY THREATS FOR 2012 11 August 2012 ABSTRACT The ten cyber security threats in the IT world are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, and everything physical can be digital. This paper discusses what these threats are, how to defeat and/or demonstrate proficiency in defeating the cyber threats, and the rising