Monday, December 30, 2019

Gatsby and Daisy, Tom and Myrtle, and George and Gatsby’s...

After Gatsby, Daisy, and Tom leave Tom’s house along with Nick and Jordan, they end up going to a suite at the Plaza Hotel in New York City (Fitzgerald 178). Tom starts arguing with Gatsby about Gatsby’s bad habit of calling everyone â€Å"old sport.† This leads to him accusing Gatsby of lying about Gatsby actually attending Oxford. Gatsby gives him permission to ask him any question he would like after he informs Tom that he went to Oxford for five months because he was in an army program. Tom, angry about Gatsby’s reaction, asks him about his feelings for Daisy. He then tells Tom that Daisy loves him and that she never really loved Tom. Tom throws up Gatsby bootlegging in Gatsby’s face. When Daisy realized that Tom had out bested Gatsby as she observed the two argue, she then starts feeling closer to Tom. During the process, Nick all of a sudden realized that it was his thirtieth birthday (Fitzgerald 180). Nick is a veteran of World War I who grad uated at Yale University. His family is from the Midwest. His dad taught him when he was young that he should never judge others (Baker). Everyone eventually decided to leave and head back home with Gatsby and Daisy in the lead. On the drive home, Tom, Nick, and Jordan stop at the sight of the disturbing scene right along the valley that filled with ashes (Fitzgerald 186) A Greek man ran up and told them that someone got ran over very badly with a car. He then describes the woman out to be Myrtle Wilson. After the man explained thatShow MoreRelatedF. Scott Fitzgerald’s Expression of Temptation, Deceitfulness, and Jealousy in The Great Gatsby1252 Words   |  6 PagesF. Scott Fitzgerald’s book The Great Gatsby was a remarkable book. Fitzgerald Made the characters of the book as real and as personal as possible. Three characteristics stood out in the novel to me. Tom’s Jealousy of Gatsby relationship with his wife, Gatsby’s lies about who he is and his lif e, and Daisy’s ways to tempt Gatsby to fall in love with her. The novel was inspired by the way he fell in love with his wife Zelda. The novel The Great Gatsby displays deceitfulness in many of its charactersRead More Death of a Dream in Fitzgeralds The Great Gatsby Essay1480 Words   |  6 PagesGatsby and the Death of a Dream      Ã‚  Ã‚  Ã‚  In The Great Gatsby, Fitzgerald creates the roaring twenties by showing the division of society.   The Buchanans live on one side, East Egg, and Jay Gatsby lives on the other side, West Egg.   The Buchanans belong to the socialites, yet their lives have no meaning.   Gatsby tries to chase the American Dream, yet his idea is tarnished.   He throws parties to try and fit in with the socialites.  Ã‚   Gatsbys pursuit of the American Dream is doomed because he triesRead MoreAffairs, Nick, and Gatsby in Fitzgeralds The Great Gatsby1255 Words   |  6 Pagesreader in The Great Gatsby. Gatz was a poor person that changes his name to Gatsby. Tom was a cheater and was unfaithful to Daisy. Daisy was a flirt and rich. Myrtle is a poor women that lived over her and her husband’s garage shop. Myrtle would let Tom push her around because he was a rich man that would let Myrtle forget that she was poor. â€Å"She never loved you, do you hear he cried. She only married you because I was poor and she was tired of waiting for me (Fitzgerald 139)†. Tom is married toRead MoreF. Scott Fitzgerald s The Great Gatsby1583 Words   |  7 Pages F. Scott Fitzgerald’s The Great Gatsby is renowned for its intricacy as well as the vast levels of symbolism that are present within it. The multitude of symbols allows for many interpretations of The relationships that take place within F. Scott Fitzgerald’s The Great Gatsby, when viewed through a psychoanalytic perspective, are seen as being hindered by each character’s aversion to emotional intimacy and their personal insecurities. Tom and Daisy Buchanan’s relationship is based not on a desireRead MoreLoneliness in the Great Gatsby1398 Words   |  6 PagesThroughout F. Scott Fitzgerald’s The Great Gatsby, the unfortunate reality of loneliness consumes the lives of the majority of the characters. The time period portrayed in this novel, the 1920’s, had brought about several changes for people. It was highly common for large groups of people to join together for parties with endless drinking, dancing and celebrating. However, when the night was over and the festivities finished, most people were forced right back into their regular everyday lives feelingRead MoreEssay about Paradoxical Role of Women in the Great Gatsby1333 Words   |  6 PagesThe women in The Great Gatsby appear to be free-spirited, scorning norms of what the nineteenth century would have considered proper female behavior; this essay investigates just how independent they really are. Women play a paradoxical role in Fitzgerald’s The Great Gatsby, a novel dominated by the eponymous hero and the enigmatic narrator, Nick Carraway. With the background of Gatsby’s continual and lavish parties, women seem to have been transformed into â€Å"flappers,† supposedly the incarnationRead MoreBetrayal in the Great Gatsby Essay766 Words   |  4 PagesBetrayal in F. Scott Fitzgerald’s â€Å"The Great Gatsby† The Great Gatsby is a novel written by F. Scott Fitzgerald in 1925. It is recognized as the â€Å"Great American Novel† as it shows great wealth, partying, jazz music and many other aspects of the â€Å"American Dream†. In his novel, he displays a lot of symbols, and themes including wealth, greed, and the most vivid, betrayal. Betrayal can upset many people and ruin many people. Betrayal was demonstrated throughout the entire novel with a lot of connectionsRead MoreFitzgerald s Pursuit Of Wealth1487 Words   |  6 PagesFitzgerald’s Pursuit of Wealth F. Scott Fitzgerald, ‘’who was not only part of the irresponsible and extravagant life of The Roaring Twenties, but he also helped named this era, The Jazz Age with his novels.’’(Mescal Evler 587) The Roaring Twenties gave people the opportunity to become wealthy. Many people at the time of this era were making a lot of money and partying. Fitzgerald most well-known novel, The Great Gatsby, was based on The Roaring Twenties. In The Great Gatsby, Fitzgerald makes usRead MoreThe Great Gatsby by F. Scott Fitzgerald756 Words   |  3 Pagespages of Scott Fitzgerald’s novel, The Great Gatsby. The voice of Nick Carraway, chronicles the summer of 1922 that transpires in the vicinity of Long Island, New York. This locale is divided into the East Egg, populated by those with old money and the West Egg, inhabited by those with new money. The pursuit of money and pleasure mark this era and far exceed the pursuit of more noble goals. The interactions of Nick Carraway, Jay Gatsby, Daisy and Tom Buchanan and Myrtle and George Wilson propel theRead MoreThe Great Gatsby By F. Scott Fitzgerald Essay1247 Words   |  5 Pagestragic love story revolving around Jay Gatsby and his ambitious pursuit of happiness. Jay Gatsby, arguably the central character in the novel, perseveres and overcomes his poverty-stricken life. By keeping a low profile and participating in the illegal bootlegging of alcohol for several years, Gatsby acquires an immense amount of wealth and exhibits it, his grand mansion for example, in a hope to manifest a wealthy and respectable image. Fitzgerald intertwines Gatsby s mansion along with the residences

Sunday, December 22, 2019

Sundiata/ Things Fall Apart Essay - 1236 Words

Andrea C. Mathis Dr. T. P. Mahadevan Introduction to Humanities I 21 October 2014 Revised: 1 December 2014 Make Believe Creatures Historically Africa has been partly constructed by journals, books, etc. written by white hand. It is believed by many that one cannot truly talk about the land, unless they have lived the land. Two particular novels and oral epics that depict this perspective, the perspective of the colonized, are Things Fall Apart, written by Nigerian author Chinua Achebe, and Sundiata by author Djibril Tamsir Niane. At the end of Things Fall Apart, the District Commissioner, who was the British colonial administrator put in place to govern the Igbo society, is shown writing a book he plans to call the Pacification of the†¦show more content†¦Not only would the British colonial showcase how the natives were unprivileged, but also how they were savage. In seek of revenge, Ikemefuna had been residing in the Okonkwo’s household and after three years must now be killed. The oldest clan elder of Umuofia seeks Okonkwo and tells him, â€Å"that boy calls you father, [so] do not bear a han d in his death†. Okonkwo disobeys the advice from authority and joins the party to kill Ikemefuna in fear of appearing weak. His actions are too close to killing a kinsman; which leads to the importance to Okonkwo how he is perceived to the clan that he will exhaust all levels of savagery even if it means violating tribal laws. Gender roles played a crucial part to the understanding of the people of Umuofia; especially to Okonkwo. But just as in today’s world, one person of a group cannot define the entire group, it was the same back then, which further proves how the District Commissioner’s view of Umuofia would not represent the entire clan, let alone Africa as a whole. Okonkwo’s motivation behind his views of patriarchy stem from his father Unoka; he wanted to be such a great man of the tribe, unlike his â€Å"agbala† of a father. Okonkwo’s son â€Å"[n]woye knew that it was right to be masculine and to be violent, but somehow he still preferred the stories that his mother used to tell, and which she no doubt still told to her younger children†¦but he now knew that they were for foolish women

Saturday, December 14, 2019

How convincingly the book creates a sense of social environment in which subject grew up Free Essays

Frank McCourt has used the main themes of his autobiography Angela’s Ashes convincingly to create a sense of social environment he grew up in. Main themes include poverty, pauperized living conditions, poor sanitation and power of the Catholic Church. Alongside the main themes, McCourt uses symbols, memories, vivid descriptions, outside and narrative comments and events relating to the main themes. We will write a custom essay sample on How convincingly the book creates a sense of social environment in which subject grew up? or any similar topic only for you Order Now Poverty is the leading cause of pauperized living condition as well as poor sanitation, these lead to the social environment Frank spent his childhood growing up in. The living conditions in the slums of Limerick itself details Franks environment. The McCourt family leaves New York for a new start in Ireland and settle in Limerick during the depression. The Deprsssion symbolize hardship for many. Alcohol is a major concern that affects the McCourt’s. Malachy’s alcohol problem makes his family suffer. Any chance of the basic needs of survival is dependent on Malachy’s wages. â€Å"Are you coming home so that we can have a bit of supper or will it be midnight with no money in your pocket and you singing Kevin Barry and the rest of that sad songs†. Angela is asking Malachy if the kids will be fed tonight or will they starve. The fact Malachy drinks way the money convinces us the family have no other means of survival and healthy state of living. Without money we sense and imagine the state they live in. â€Å"Out in the Atlantic Ocean great sheets of rain gathered to drift slowly up the River Shannon and settle forever in Limerick. The rain dampened the city from the feast and the Circumcicin to New Year’s Eve. It created a cacophony of hacking coughs, bronchial rattles, asthmatic wheezes, consumptive croaks. It turned roses into fountains, lungs into bacterial sponges†. Franks description of Limericks sums up the environment. Miserable weather creating misery and diseases taking lives of many. McCourt’s description gives us a visual images that somehow convinces us how miserable the conditions are. Franks gets a job delivering newspaper. One day there is an emergency and mayhem erupts. McCaffey and Frank and another boy Eamon are to rip out page 16 of the John O’ London’s Weekly. Ever single issue in the city no matter what people say. Here the boys are hysterically running around town ripping out the pages on birth control. McCaffrey shows such determination when the shopkeeper has said they have sold many issues he demands their names that they are in danger of losing their â€Å"immortal souls† This event convinces us the power of the Catholic Church is and the it impact on society. Birth control in â€Å"the holiest city† was banned. A one page article emphasizes the lengths Catholics go to protecting their religious beliefs. McCaffrey’s biggest customer Mr. Hutchinson in cursing him for storming into his shop and creating havoc, and McCaffrey replies to him † See what happens when you’re not a member of the True Church†. Protestants and Catholics dispute over religion. People in Frank’s Community are greatly religious. School masters makes sure you know everything about Christ. Malachy treats the portrait of the Pope as though it is sacred and valuable. The honor of the Catholic Church is overwhelming and creates a sense of how holy the society is. The fact people followed the rules and were faithful to the Church gives us a sense of how religious the environment was. McCaffrey was prepared to go lengths to protect the faith and beliefs fellow Catholics. Frank has many memories of his childhood. There has been pain, misery and some happy times. The memories of his small house in Roden Lane holds many memories. In winter, downstairs floods, the family are forced to move upstairs. â€Å"It’s like going away on our holiday to a warm foreign place like Italy,† Malachy assures the kids. Abandoning downstairs convinces us, the flood is extremely bad. We sense the condition are undesirable and deplorable. Convincingly this house creates a sense of social environment, the state of the house simply shows it. Symbol of the environment are seen in this book. The lavatory in the McCourt’s rented home is a communal toilet shared by 12 families. It symbolizes poor-sanitation and lack of finances. It emphasizes the need for cleaner conditions, † the lavatory will kill us all with diseases,† Angela’s says. In fact it is a concern, their health is at risk of germs that fill the household. Frank is awakened at night by sounds of people emptying their chamber pots suggesting no privacy. People coming in and out. It convinces us how rundown the society is. They can only afford one toilet a lane for 12 families. I can imagine from the lavatory the house is shabby making the society just as bad. We sense poor hygiene creating a sense in our mind of how Frank grew up. McCourt himself said if he † were to pick a symbol for my life, and image, it would be that lavatory that all the people emptied their buckets into. † Franks childhood was about surviving each day and feeding his family, his goal to reach America. He says, the lavatory symbolizes his life struggling to get through each day. Angela’s Ashes includes many details used to create a sense of Frank’s childhood social environment. Throughout the book many descriptions of memorable experiences and sights are used to detail the surrounding he grew up with. This whole book is about dealing with the slums and the dreadful conditions that we strongly sense in our heads. After reading Angela’s Ashes you will be left with many visuals McCourt has got you to create and picture in your head that make out his â€Å"miserable Irish Catholic Childhood†. How to cite How convincingly the book creates a sense of social environment in which subject grew up?, Papers

Friday, December 6, 2019

A7D Affair - Business Ethics Management Case Study

Question: Discuss about theBusiness Ethics for Case Studies and Selected Readings. Answer: Introduction In the A7D Affair, the whole scene revolves around the four-disk brake designing and its defect. The designing of the four-rotor 106 pound brake promised by the B.F. Goodrich Company for LTV. The charge came under the most experienced and able engineer, named, John Warren. He is known for his engineering skills (Tannsjo, 2008). Moving on to the next step, the testing of the brake was to take place and it was assigned to the newcomer Searle Lawson. He does not have too much experience but carries all the competencies needed for the same job. During testing, he came across, that the brake produces too much heat and broke down into parts. This led to the decision that the designing of the product does not take place effectively leading to the most negative outcomes. The whole thing was communicated to the project manager named Robert Sink. But, nothing, positive came out, and it makes the person in great trouble and was forced to develop the false reports claiming about the successful testing and that got approved further. Ralph Gretzinger also became proactive and supported Lawson to not to be a part of this scam (Shaw, 2010). Russell Line, the senior executive in the company, even after knowing all the pertinent facts does not take any stringent steps and was very much comfortable with the falsifications to be carried upon. In the future point of time, the committee does not come to any effective decision. Russell Line was promoted to the higher position, and became Production Superintendant and his position was taken by Robert Sink. Ralph Gretzinger and Searle Lawson resigned from their respective positions. Ralph became the newspaper reporter, and Searle Lawson acquired the position of engineer for the LTV and handed over with the A7D project. Reason The whole situation that took place was not a mistake rather it was planned and knowingly done under the supervision of the key authorities of the company. After gaining all the insights about the product quality and safety, nothing effective took place. At the end, this cost too much to the company as they were to produce the five-disk brake and that too by not taking compensation for the same. In the company, the people working were very much unethical and immoral. They do not make use of the ethical moves and it turns up highly difficult and complex also. The conditions turn out to be totally varying and create trouble on the part of the company. At this point, it can be very well understood that the part that goes bad was groupthink and destructive obedience. In B.F. Goodrich Company, one cannot see groupthink given too much of importance and concern. B. F. Goodrich, a highly regarded US manufacturer of high technology products, with intent and conscious, submitted a dangerous aircraft braking system to the U.S. Air Force for in-flight testing. This is the most unbelievable part and it comes out due to involvement from the part of the insiders within the company (Jennings, 2011). Destructive obedience can also be very well seen that the obedience from the part of the subordinates was moving towards massive destruction and damage. In the case, it can be very much clear that the obedience from the part of the subordinates was not right enough and does not do anything good for the company as well as for the employees. Ideas of Immanuel Kant In the words of Kant, the area to be taken into account is that the duty and reason are to be taken together. Along with this, it is effectively stated that the intentions behind an act said to be more of significant than the calculations of the aftermaths to be received. The theory proposed was Deontological Theory. As per this theory, the person is held liable for the duty to carry upon any of the task (Waluchow, 2003). This appears to be an approach to ethics that concentrates on the correctness or inappropriateness pertaining to the actions performed. It hardly looks upon the effects that come out after action take place. The ultimate aim is to look upon the intentions behind before judging the resultants from the same (Ferrell, Fraedrich Ferrell, 2012). This particular theory clearly states that the behavior of B. F. Goodrich in the A7D Affair was not ethical. It can also be understood in a way that the intentions behind were not at all clean and all that goes on was purely planned as well. This can be very well understood that the key authorities at the business level get involved in this scam and due to their wrong intentions consequences come out to be pungent in its nature. Lack of integrity and honesty can also be very well seen and discovered in this particular case (Kant, 2013).. References Ferrell, C.O., Fraedrich, J. Ferrell, L. (2012). Business Ethics: Ethical Decision Making and Cases. 9th ed. Natorp Boulevard, Mason: Cengage Learning. Jennings, M. (2011). Business Ethics: Case Studies and Selected Readings. 7th ed. Natorp Boulevard, Mason: Cengage Learning. Kant, I. (2013). Groundwork of the Metaphysics of Morals. Greenwich Street: Simon and Schuster. Shaw, H.W. (2010). Business Ethics. 7th ed. Boston, MA: Cengage Learning. Tannsjo, T. (2008). Understanding Ethics. George Square: Edinburgh University Press. Waluchow, W.J. (2003). The Dimensions of Ethics: An Introduction to Ethical Theory. Orchard Park, NY: Broadview Press.

Thursday, November 28, 2019

Bradbury s depiction of schools driven by technol Essays

Bradbury' s depiction of schools driven by technology and sport joins previous speculative works which expressed skepticism at technology's relevance and ethical role in the classroom or the library. In her survey of how books and libraries appear in futuristic texts, Katherine Pennavaria shows how, from the late nineteenth century , science fiction routinely showed adulterated or merely artefactual texts being transmitted through increasingly tyr annical or sinister technology. Doctored or hi-tech t exts can only produce a simulacrum of the process of basic understanding (what pre-modern culture would have called lectio ) and meditative reading ( meditatio ), for there is nothing behind these texts . There is a r esulting erosion of citizens' ability to think critically, discern misinformation, avoid irrelevance, and compose new texts. The faculty of individual and communal discernment was under particular threat during the 1950s as the House Unamerican Activities Committee (HUAC) sought an unprecedented level of censorship. T he American Library Association's 1953 statement "The Freedom to Read" argued that the ord inary individual's exercise of " critical judgement " was the bulwark against g overnment-sponsored suppression (Preamble). Bradbury shows an educational system which works to erode the faculty of critical judgment by systematically eroding students' experience of, or hunger for "the extended discussion that serious thought requires...[and] the accumulation of knowledge and ide as into organized collections" (ALA, Preamble). Clarisse's poignant objection shows a natural preference for human interlocutors in the face of redundant, transparent technology . Credible, meaningful memory is an integration of the human (the true, the authentic) and the litera ry (the beautiful, the worthy). Bradbury argues that this synthesis is contained in the authentic, mem ory-feeding text, not a thin and inauthentic technological medium. Where formal schooling fails to stymie intellectual growth, other mechanisms of social control work more punitively against it. The burni ng of the old woman in Part One remains one of twentieth-century fiction's most poignant representations of cultural biblioclasm . The old woman meets the Firemen with a quotation from Foxe's Booke of Martyrs : "Play the man, Master Ridley; we shall this day light such a candle, by God's grace, in England, as I trust shall never be put out " (43). By appropriating Hugh Latimer's words, the old woman evidences her reading and the ethical use of this reading. She has integrated Latimer's words so completely into her memory that this speech act both reveals her attitude to the curr ent context, and conflates it with Hugh Latimer's . The two contexts are brought to bear on the atemporal res oppression of the innocentof which they are only temporal instances. I n her analysis of people using others' literary words in extremis , Mary Carruthers remarks on the profound integration between affect, ethical awareness, and recollective memory which is required to perform this . The point at which a reader " speaks again " another's words shows that "the student of the text, having digested it by re-experiencing it in memory, has become not its interpreter, bu t its new author, or re-author" (210). Once again, the relevance of Aristotle's comment about knowledge being composed of the memories of others is evident in Bradbury's novel. Carruthers comments that

Monday, November 25, 2019

Can the Militarization of Space by the United States be Justified Yes essays

Can the Militarization of Space by the United States be Justified Yes essays Background and Overview. Any introduction of weaponry into space territories must take into consideration the controlling national and international laws. According to Georg Schwarzenberger and Bin Cheng (2004), the evolution of space law can be traced to President Dwight D. Eisenhower's introduction of the concept into the United Nations in 1957 as an overall part of disarmament negotiations. After the successful launchings of the Soviet satellite Sputnik 1 in 1957, followed by the U.S. satellite Explorer 1 in 1958, both the United States and the Soviet Union assumed an active role in the development of international space policy. At this time, it was established that traditional laws of sovereignty that allow any nation to claim for itself uninhabited and uncivilized lands were not viable concepts for space territories; further, it was determined that individual nationals should not be allowed to extend the boundaries of their dominion indefinitely into the space regions above them; however, a claim of sovereignty has already been made by certain equatorial states over portions of the geostationary orbit, some 22,000 miles above the Earth In 1959, the path for peaceful exploration of space was established through a permanent Outer Space Committee formed for the purpose of maintaining the United Nations Charter and other international law in space. The Nuclear Test Ban Treaty was signed in 1963, followed by an Outer Space Committee resolution designed to prohibit nuclear weapons testing in space. Later in 1963, the United Nations General Assembly adopted the Declaration of Legal Principles Governing the Activities of States in the Exploration and Use of Outer Space as one of the first efforts by the international community to set up a legal regime for outer space; however, this Declaration did not specifically recognize the military possibilities of outer space (Jas...

Thursday, November 21, 2019

Wk5 Progress a Assign. INTL304 Assignment Example | Topics and Well Written Essays - 500 words - 1

Wk5 Progress a Assign. INTL304 - Assignment Example Measurement and signatures intelligence is a form of material sampling intelligence collection which detects, locates and explains those characteristics which are possessed by the target objects. The data which is collected from these objects is then translated into understandable target characteristics. It is used to avail needed intelligence to commander all through the spectrum of operations so as to give them a full understanding. Raw information which is to be later processed is to be collected through materials acquisition intelligence collection. A number of sources can be used to collect this important data. Signals intelligence is the first source whereby interception of signals between people is done. This is done by the National Security Agency which collects processes and reports the signal intelligence. Imagery intelligence is also collected from visual photography and radars sensors by the National Geospatial Intelligence Agency. The central Measurement and Signature intelligence organization identifies and describes the characteristics of specific targets through use of scientific and technical intelligence. To collect intelligence from human sources, the Central Intelligence Agency, Department of State and the FBI are used. Intelligence is also collected from the publicly available information such as print and mass media by the Foreign Broadcast Information Service and the National Air and space Intelligence center. Lastly, the information available in the imagery and geospatial data is collected by the National Geospatial Intelligence Agency1. With increase in nuclear attacks threats, there is a change in demand for innovation of technologies, which can identify the origin of a detonated nuclear weapon. The tool, which carries out this particular task, has the capability of collecting and identifying the radioisotopes

Wednesday, November 20, 2019

Exam Assignment Example | Topics and Well Written Essays - 500 words - 6

Exam - Assignment Example American system has two levels of government with equal powers but separate roles (federal system) while in British system parliament is the sole legislative body (Unitary system) (Rogerdarlington 1). Social contract theory is the concept that defines the existence of relationship between the government and the people as hinged on the agreement between the two whereby citizens obeys government rules in exchange for social protection and liberty (Dooley  & Patten, 79). Both Jon Locke and Rousseau views the hardships of the state of nature as the main cause of people’s submission to the authority and that no one has power to rule another person unless by social agreement. According to Locke, the state of nature provides humans with absolute liberty from any government laws and punishments but cannot do anything they wish since they are subject the commandments of God hence should not cause any harm to others. However, Rousseau perceives that the human liberty was corrupted over time and the only way to regain it is by reuniting politically and upholding democratic principles. Though both the US and France have presidential system of government they have some similarities and differences (Joseph, Kesselman  & Krieger 112). Both governments have executive, legislative and judicial branches. The US president is directly elected while the election France is by direct suffrage. The US is headed by president at the apex of power while in France the executive powers are shared between the president and Prime Minister (Joseph et al 112). Also, France president has special powers such as emergency powers, appointing civil and military officers without approval of legislature and powers to dissolve the national assembly while the US president has none of these powers. The concept of â€Å"Third Rome† was promulgated by monk Philotheus postulating Moscow as the third Rome because of its supremacy, God’s choice of the city to fulfill His mission and unity of the people.

Monday, November 18, 2019

Drug and Alcohol Addiction Research Proposal Example | Topics and Well Written Essays - 500 words

Drug and Alcohol Addiction - Research Proposal Example This research will begin with the statement that drug and alcohol addiction has been one chief source of various ills in our society which deserves to be addressed seriously for an intensive permanent resolution. We can never deny the fact that somewhere in history, alcohol drinking and substance use have heretofore prevailed to be part of our culture and we have often found a great deal of change through them in terms of economy and socio-political affairs from societal to global scale. Like poverty and the cold war between nations, drug and alcohol addiction is an appalling crisis that would not cease to torment and misshape the moral sphere of living. On this ground, I have decided to conduct further research on drug and alcohol addiction, being a subject area of huge significance especially in determining certain causes or factors if issues that emerge out of trouble within the family, search for identity, the problem with career, and several other more personal conflicts.  To me, it is quite essential to examine individual concerns that are directly influenced by addiction to alcohol and drug since an addicted drug user or alcohol drinker eventually affects other people in his circle. As observed in reality, every person who has abused the use of drugs and alcohol bears a negative impact on the lives of others who may commit quality-of-life crimes themselves. Moreover, studies demonstrate that drug and alcohol addiction is widely associated to cases of human trafficking, murder, sexual assault, theft and robbery, juvenile delinquencies, different forms of violence, suicide, and other criminal or unlawful acts that run contrary to promoting ethics, health, and life of peace. The paper would aim as well to cover discussion of the existing measures implemented by the American government, how effective these measures are, and what else can be done to improve such measures on preventing and possibly finding solutions to eradicate drug and alcohol addiction co mpletely among the youth.

Saturday, November 16, 2019

Benefits of Network Management Tools

Benefits of Network Management Tools 1. Introduction These are the various network management tools used by network manager to verify network connection, monitor network packets, analyse captured packets, troubleshoot network connectively failure, diagnosing network slow performance and identify source of incident in order to make the network available 24 hours seven days a week. 1.1 Benefits of Network Management Tools Network manager benefits from network monitoring tools in so many ways as described below Easy migration from old legacy application to new technologies For example when network administrator is migrating form a legacy IOS based application to LWAPP using Airwave Management Platform software tool for wireless network management, net work administrator is provided with centralized control for Wi-Fi networks where roaming data and information as well as historical data are kept as airwave gives a common platform to manage the devices. This is beneficial to the network manager because it makes it easy for migration from old legacy applications to new technologies and makes it easy to monitor the network usage all the time Quick identification of network or server failure when the server of a portion of the network is down, before users get to notice the failure network administrator receives a warm and rectified the fault and providing the network manager with means of monitoring and providing network availability round-the-clock. Using network-monitoring tool like ipMonitoring with attributes such as such as reporting, user tracking, access point configuration management and rogue AP discovery, network administrator is able to monitor any networked device on the corporate intranet and TCP/IP LAN and receive alerts immediately depending the administrators configuration of receiving alerts; this can be received through alarm, e-mail, or third-party software when a connection fails. Diagnosis and troubleshooting, Network monitor can be used to diagnose why the server computer is not communicating with the clients computers on the network on a local area network, for example network administrator can configure network monitor to capture all the frames on the network, this includes source and destination address of the computer sending and receiving frames, protocols used as well as part of message sent. Net work administrator analyses this information to locate the source of problem on the network and troubleshoots it. Checking for connectivity of a computer online for example using ping command to check if a computer is online helps network manager for example when user calls and said they can logon to networked computer to troubleshoot and diagnose the network manager uses ping to find out if the computer in on the network or not. This is beneficial to the administrator because it helps him to identify where the problem is originating. 1.2 Structure of management information Structure of management information is a network component used in network management which is used in simple network management; its main role is to define set of module identity, object type and notification type. Structure of management information shows how related managed objects such as object names, types of data that can be stored in an object and how its transmission over the network for example action done to retrieve vale of an object with codes 2. Use Datagram Protocol User datagram protocol is a transport layer protocol that is used to send packets to computers in networked environments. User Data Protocol has the following advantages over Transport Control Protocol Connectionless When communicating with two computers on the network, user data protocol doesnt negotiate connection between the two client computers but just transfers data as its received No Connection State User data protocol doesnt maintain and doesnt keep track of any parameters such as buffers sent, congestion control and rate which data is transfer for example when used in server environment, user data protocol is able to support more active clients if a particular application is run over it because it doesnt acknowledge packets being sent or received. Small packet header over head User data protocol has got a smaller header of 8bytes of overhead making it faster in transferring data Unregulated send rate, user data protocol doesnt have congested control mechanism and data is sent at rate, which it has been generated by the application in use for example taking into account the CPU, clock rate at the source of data. 2.1 Applications layer protocol used by User data protocols as Transport layer protocol Domain Name Service Is a database like that converts the computers fully qualified domain name that are easy to be remembers such as www.yahoo.com into IP address such as 201.171.25.0. 6 that are then used by computers to connect/ communicate with each other Steaming multimedia This is the continuous transfer of video, voice and digital data that is received and showed/displayed in real time for example podcast and webcast Routing protocol Routing protocol is used to determine which path to be used to sent/ transmit data packets across a network. 2.2 Reasons why UDP is preferred over TCP Domain Name Service User data protocol is preferred over transport control protocol because its used by DNS for name queries and because the information exchange between UDP and DNS is small in size for example the packet size sent through UDP is not greater than 512 bytes. Streaming multimedia Streaming multimedia its used by UDP because it compresses audio files in to small packets of data that makes it easy to transmit and continuously streaming and transmitting audio files whenever their audio data drops. This doesnt break or cause delay on audio broadcast. The streamed data is sent by the server application to the client application stores the stream data the then displays the data received in real time or playing the voice streamed files as soon as its buffered. Routing protocol On routing protocol, User data protocol is preferred because routing table updates are sent periodically and some of the data is lost a long the way and updates need to be resent so its up to date on network layer which is impossible with transport control protocol 2.3 Controversial use of UPD in multimedia applications The use of user data protocol for streaming multiple media application is controversial because user data protocol doesnt have congestion control which is much needed to prevent the network from going into a state in which less or no work can be done, for example if a users sends high bit rate video are sent without using congestion control, user will be unable to see the video messages because of the packet overflow at the router. 2.4 Adaptive congestion control scheme One scheme that would force the use of adaptive congestion control is real time communication scheme which has building reliability into applications that will force the use of congestion control, for example in mobile application where congestion control is built though the application run over user data protocol, it acknowledges and retransmit packets that get loss during transmission Applications that perform congestion control user the network more efficiently for example with bits rates being controlled, the network will not go into a state where it can not be used 2.5 Advantage of Adaptive congestion scheme Better performance of the network for example in the case of video when small bit are sent and controlled, the performance improves as the bandwidth will be enough to support bit rates It ensures that all packets sent reach destination 3. Exchange between Dhcp Server and Client Computers DHCP Server and Client Computers See Appendix (i) For clients to receive IP addresses from dhcp servers TCP/IP need to be con figured to get IP addressed automatically on the TCP/IP properties dialogue box. Dhcp client computers that are configured to obtain IP address automatically request and receive IP configuration upon booting the client computer. Dhcp clients get IP addresses and other configuration each time the client computers are started and join the network. Dhcp server assigns IP address to a client from a predefines scope for a given duration of time and if that duration expires the IP address is released to the scope and can be assigned to another client but if the duration is longer than the lease time, the client requests for and extension before the lease expires. 3.1 Router and Components A router is a device that connects one or more computer to create a network environment for example a modem. A router has the following major components Input port Is the point is direct connection for physical link and it is the point at which incoming packets enters the port. Input port provides functions such as performing the data link layer encapsulation and encapsulation, a route lookup and sending packets to output port via switching fabric as well as proving quality of service guarantees input port classify the in a predefined service level Output port Output ports stores packets that are forward via the switching fabric and transmits or schedule packets for service on an output link performing both the reverse data link and physical link functionality as done in input port Switching Fabric This connects input ports and output ports Routing processor Executes routing protocols, creates and forward routing tables which is used in packet forwarding and performs management functions within the router. 3.2 Internet Protocol version 4 Internet protocol version 4 is the protocol that is widely in use in most corporate networks and it uses network layer protocol and its used as internetwork layer protocol on the internet 3.3 Internet protocol version 6 Internet protocol version 6 is the update version of internet protocol version 4 with much more address space. Its mostly used on the internet bone in Asian countries. Protocol Structure of an IPV4 header See Appendix (i) Protocol Structure of an IPV6 header See Appendix (iii) Due to the depletion of internet protocol version four and lager routing tables, internet version 4 has been updated to version 6 that provides better security, more address space. This has made internet version 6 more advantageous in some ways as discussed below. Internet protocol version 6 address space 3.4 Advantages of internet version 6 Internet protocol version 6 has got more address space as compared to internet version 6 for example version 6 has got 128-bit address space which allows for flexible creation of multilevel, hierarchical and routing infrastructure which is not that possible with internet protocol version 4 Internet protocol version 6 has got in built security which is standard and mandate, its offered in all implementation and has no changes the application, for example security features such as authentication on packet signing , data encryption and end-to end DHCP, DNS and IPv6 mobility is provided for in security model. 4. Wired Equivalent Privacy WEP is the short term for Wired Equivalent Privacy for a security protocol used in wireless local area network that operates at a data link layer and has a security that can be turned of and on again as defined in 802.11b standards. This standard has been set by the Institute of Electrical and Electronics Engineering The main aim of Wireless Equivalent Privacy was to provide security via 802.1wireless network where data is sent from one end point to another. For example Key security features of WEP was meant to offer the following Confidentiality Wireless Equivalent Privacy is used to prevent data transmitted on the network from being eavesdropped by some whom the information is not meant to be communicated. Unauthorised access to wireless network Wireless Equivalent Privacy used to prevent unauthorised access to the network Data integrity, to prevent the alteration of data being transmitted 4.1 Advantages of Wired Equivalent Privacy WEP uses a 2.4 gigahertz radio frequency which provides clear signal for its lower than other frequencies and can travel through wall without affecting frequency. WEP is relatively cost effective for example the cost of a router and Wi-Fi card is normally below  £55 which makes it cost effective for both big corporations, and home users 4.2 Disadvantages of Wireless Equivalent Privacy Static encryption key which is used by all the devices on the network make it very easy for packets to be intercepted and crack what the key is making it very vulnerable to hackers. For example when a router is set up on the network, the encryption used by the router is then used by almost all the device on the network Weak keys made it easier for it to guessed and cracked when used at the access point Initialisation vector in WEP is also ways reused, for example if a user who connects with WEP to access wireless network uses the same key over and over changes, this key can easily be cracked WEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be determined 4.3 Difference between WEP and WPA Wireless Equivalent Privacy standard 802.11 and Wireless Fidelity Protected Access are different in so many ways for example WEP uses 128bit with 24 integrity value, while WPA used 128 bite with a 48 bit integrity value. WPA has features such as Temporarily Key Integrity Protocol which dynamically changes the keys used for encryption while Key in WEP are static and is shared by all device on the network. The combined used of 48bit integrity values and TKIP, AES makes WPA more security strong as compared to WEP. Weak keys made it easier for it to guessed and cracked when used at the access point. Initialisation vector in WEP is also ways reused for example if a user who connects with WEP to access wireless network uses the same key over and over changes, this key can easily be cracked. WEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be determined These weaknesses among others called for a better standard to be adopted which will provide wireless network with better security and this led to the improvement of 802.1 to WPA. 4.4 Wireless Fidelity Protected Access WPA stands for Wireless Fidelity Protected Access for local area network base on the specification of 802.11. This standard was designed to improve on the security weakness of Wired Equivalent Privacy. 4.5 Advantages of WPA WPA provides added authentication features to basic WEP which provides for stronger encryption mechanisms. The added features includes Advanced Encryption standards protocol as used in WPA2, Temporary key Integrity Protocol as used in WPA. When use in windows 2003 environment, WPA provides the strongest wireless security. WPA has back ward compatibility for older applications that use WEP this doesnt call for upgrade. The use of 802.1x Radius servers provides administrators with means of auditing and logging incidents. 4.6 Disadvantages of WPA The set up of the pre-shared key is difficult and it not beneficially to home users with less technical knowledge. It has more over head as compared to WPE. Its incompatible with pre 1998 windows operating systems and doesnt support older firmware. Its major fall is the denial of service attacks which can leave the whole network shutdown due to constant different keys that are generated and interpreted by the network as some kind of attack. 4.7 Comparing WPA and WEP features WPA has enhanced featured that is based on WEP standard. The features in WAP include temporarily key integrity protocol and 802.1 x. This features provides dynamic key integrity and mutual authentication to most wireless local area networks 48-bit initialisation vectors Like Wireless Equivalent Protocol, Temporal Key Integrity Protocol uses the RC4 stream cipher provided by RSA security for frame body decryption and CRC for each frame before transmission but the difference here is that WPA has added feature Temporal Key Integrity Protocol that uses a 48bit initialisation vectors that has reduced the re-use of initialisation vectors. This has brought about data confidentiality. While WEP encryption is based on 128bit with 24 integrity value, which means the keys are of smaller size and integrity value making it easy for hackers to crack the keys as the initialisation vector seeds to WEP algorithm coded, this feature has been enhanced by the 48 bit integrity vector in WPA. Data Encryption When data packets are sent, it encrypted separately with RC4 cipher stream, generated by b4 bit RC4 key, the key consist 24 bit initialisation vector Pre-Packet key Construction and Distribution WPA generates a new encryption key automatically for each client, for example WPA uses unique and different key for each 802.11 frames and avoid the use of same key as in WEP. This automatic key generation makes it impossible for WPA keys to be cracked by hackers While in WEP the same key is shares by all the devices on the network is static which means due it its unchanging nature, its a lot easy for the shared key to be modified Message Integrity codes The use of Michael prevents against attacks and forgeries, WPA uses a secrete 648bite authentication key that will be shared only between the source and destination where during the process of authentication tagging function takes place and message integrity code. For forgeries to be identified, the destination receiver inputs source into verification predicate and creates another tag code and it this both matches then the message is considerers authentic is created to detect bit flipping and changes to the source and destination. Unlike WEP that uses 4 byte integrity check value to the standard payload. The receiving client calculates the integrity check value and if the values do match then there is a chance that frames were not tempered with and in case data Counter mode/ CBC-MAC This is a data confidentiality protocol used for packet authentication and data encryption. For confidentiality for example CCMP uses the advanced encryption standards in counter mode and for encryption and data integrity CCMP deals with Cipher Blocking Chaining Message Authentication Code making this standard more secure as compared to WEP which has got no encryption mode EAP encapsulation over LAN, this is the key standard use n key exchange that is not used in WEP for example this protocol allows for a four way key handshake as well as a group key handshake while in WEP there is only a two way key handshake. The IEEE802.1x as used in WPA2 provided a sure means of authenticating and controlling user traffic to secure networks 5. A Disaster Recovery Plan Is the process of restoring access to the main business applications, data, hardware and software that is required to start the system operational, Disaster Recovery Plan provides information on how to handle information that may be lost or corrupted during the disaster as well as proving team leaders with procedures of restoring information and data. 5.1 Major steps in disaster recovery process Notification procedure This is the action taken by disaster team members as soon as emergency occurs. In the notification stage, systems can be restored functions on a limited basis. For example in a data centre when database team leader receives alert on his/her computer that a file within the database is corrupt, this alert can be sent to the team assessment team either automatically by the system or mailed to the assessment team to analyse the damage Analyse the extent of the damage The analysis of the damaged cause should be done as soon as possible to determine the level of damage to the applications for example if it a power outrage has occurred in the data centre, the analysis should be able to detailed the applications affected, origin of the incident, work areas that have been affected and if there is another source of power to run the database the this can be powered on for example in case there is UPS backup while further investigation in the outrage is carried Activation of the plan Depending on the damage cause by disaster and the out come of analysis, the disaster recovery team can make a decision to activate the plan. For example in the case of data centre if the entire database server is down, the team looks at the possible way that the system can be restored with a minimal time, planning for team communication procedures, then the respective team leaders will notify staff members about and start working on their respective tasks to restore the system as agreed by the team members. Execution stage Recovery process at this stage can be looked at under Sequence of Recover activities and Recovery procedures and depending on what has been defined in the data recovery plan for example in case of ordering database, this can be done manually while recovery process is done Sequence of Recovery activities Recover process should be carried out according the priority of each disaster and level of disaster damage from the results got from the analysis. For example if the database sever is recovered and this is the main critical business system, then this should be restored first before other servers and all the disaster recovery team should carried out the restoration process as in the disaster recovery plan,. If the business has to be transferred to another site then the critical files associated with the service has to be transferred depending on the plan. For example a plan to transport IT equipment and important data files. Recovery process This includes having access to the damaged IT equipment in case of the data centre this could database servers, corrupt files, informing users of the applications, getting backup if its not in house, restoring critical systems such operating systems, SQL database, testing the system before if goes operational and connecting the system on the network and informing uses of the application of the success of the restoration. Rebuilding process Ones the recovery process has been usefully, the disaster team recovery embarks on the process of transferring all the data recovered back to the original system, or may be totally system that can best support the functionality of data service being offered. The disaster recovery team will continue to monitor for any reoccurrence of incidents, make the necessary network and infrastructure connections, bring down the contingency system upon which the application was running and when the all system is stable the data centre staff can be able to use the original system after full restoration of data Update the disaster recovery plan If new procedures are find out during the process of recovery, it‘s updated on the recovery plan documentation which will be used again in case the same disaster occurs again 5.2Business Continuity and Disaster Recovery Plan The IT business continuity and disaster recovery plan for the IT department that I currently work in seeks to deal with the how best to handle emergency in the event of disasters and how best to minimise risk of damage, provide emergency services and recover to normalcy of service operations The Business Continuity Institute defines business continuity planning as â€Å"A holistic management process that identifies potential impacts that threaten an organisation and provides a framework for building resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand and value creating activities† 5.3 Aims of Business Continuity Planning Preventing a disaster At the initial planning stage, the critical areas of service operation of Information Technology is identified, for example within the Information Technology department where I work, servers for crucial systems, hot sites and training of the disasters team leaders are laid down. This initial planning stage is carried out with the aim of minimising the impact of disasters on Information technology resources and services; this also ensures that the department is able to recover as fast as possible from a disaster. Continuity The procedure of running a Information services using minimum resources during a disaster, this prevents the organisation from being put out of services both internally and externally. For example running applications for only crucial systems to continue operation while recovery is on the process Recovery The procedures that are required to restore all systems and resources are identified. This helps in bring all the resources and system to full operation, for example backing up data from off site centre. 5.4 Contingency Plan activation The activation of the organisations IT service continuity plan can be started at any time. The decision of activating the plan will be the sole responsibility of Estates and Security department with the assistant of officer in charge and contingency plan can not be started without the instruction being issued by Estates and security department with assistance from the Officer in charge. In case emergency occurs during business working hours, members of disaster recovery team will be gathered and depending on the level and mature or damage the Information technology team will be contacted If the emergency occurs out of business working hours, security is required to call the head of security or his/her deputy who will get in touch with the disaster recovery team with the help of the officer in charge and then the decision to initiate the Information communication technology business continuity plan If the team leaders are not available in the event of the emergency the deputy will take the responsibility and in the event where both the team leader and deputy are not available, next person on the list takes responsibility. 5.5 Emergency Management Team Team leader: Head of information Technology department who is responsible for over seeing all the information system services Deputy team leader: Systems Manager Responsible for all the systems applications such as the servers, back up and liaison between the off sites third party centres Team member: Database Administrator Responsible for; Internal databases and well as internal sites Ensure that a domain account has been set up for the SQL services. The admin backup and standard jobs from SourceSafe InstallationSQL Server 2000 Customise the jobs to ensure that server names and paths are correct Team member: Information Technology Security officer Responsible for the security of the internal sites and well as blocking unsafe sites Team member: Network Engineer Responsible for network connectivity and test our network devices from within our network Run test network script using DOS command Test access to the web services -Use government secure intranet network PC or dial-up PC belonging to web team in OCPD to check connection to all websites -Use nslookup to connect to wb-dns1 internal to the organisation and check that website names can be resolved Test email -An email should be sent to [emailprotected] and echo. These should respond by sending an email back 5.6 Disaster Recovery Plan Is the process of restoring access to the important system data, hardware and software that is required to start the system operational, Disaster Recovery Plan provides information on how to handle information that may be lost or corrupted during the disaster as well as proving team leaders with procedures of restoring information and data. 5.7 The main Objectives of the Information Technology Recovery Team The Recovery Teams main duties/ task are to: Prevent damages to Information Communication Installations Decide the requirements of senior management for other Departmental Recovery Teams and work accordingly to meet the requirements. Carry out tasks that lead to the provision of restoring all Information Communication service to normality as started by the Recovery Team within the disaster constraints or limits. 5.8 Disaster Recovery Team Team leader: Head of Estates and Security Responsible for the safe of the building as well as staff and members of the public Deputy team leader: Site Contractor Responsible for building and central service Team member: Head of security Responsible for staff and public safety 5.9Recovery Site The recovery site will be informed by the Information Technology Departmental recovery team leader and the assistant by Disaster recovery Team in case the team leader is absent. The site is located about 3 miles a way from the organisation, In case of serious incidents, the site can be contacted by information recovery mobile phone. 6. Assumptions With regard to the following case scenarios below, the disaster recovery team can take actions base on case scenario that is relative to the real disaster. Its the organisations policy that when incidents occur, staffs are evacuated from the building and entry to the site is not permitted unless staff members are informed by head of Estates and Security. 6.1 Case Scenarios Building Non-disruptive These case scenarios may include: Disaster in the staff car park not affecting the building Gas licking the building basement Suspicious package found in the public lockers Building is partly destroyed Scenarios in this case may include: Flood affecting the whole building Apart of the sever room that supports site B of the building is partly destroyed A part of fame room in site A where frame cabinets E8a and E8b are located is partly destroyed. IT store room is also partly affected. Building is completely destroyed Scenario in this case is: Server Room on site A of the building including cabinets room E1 and E2 are completely destroyed. 6.2 Building Non-disruptive 6.3 Actions In these case scenarios, all the information technology equipment are not destroyed. The disruption did call for evacuation of staff for healthy and safe issues and as soon as the build is cleared safe, staff members will be allowed in and operations will resume. 6.4 Building is partly destroyed In these case scenarios, some IT equipment are affected partly, it may escalate to a major for example the part destruction of server room in site A and the cabinet room where E8a and E8a may cause staff on this site to loss access to network resources. Here nothing can be done till staff members are not allowed to enter the building. Ones members are allowed in the building, all the equipment in the area affected can the

Wednesday, November 13, 2019

Personal Narrative- Parties :: Personal Narrative Essays

Personal Narrative- Parties Every weekend there is a party somewhere. Whether it is out at the "Momma," the lake, or even at someone's house, it is the "cool place" to be. Last year, I arrived at the Halloween dance not wearing a costume but expecting to have a great time with all of my friends dancing and listening to music. I overheard someone talking about a party that was going to start at Mary's house. Being invited to go with all of my friends, I didn't want to be the wimp of the group, so I decided to go along. I drove away from the dance thinking that I would only stay for a little while at the party. Pulling into the driveway, I instantly knew that this wasn't a good idea. My hands were shaking, and I had goose bumps all over my arms and legs. "What if my parents find out?" I thought. How would I be able to explain being at a party to them? I was supposed to be at the dance. I looked at the trailer and saw people going in and out. Can I still leave? I was going to leave. However, I stepped out of my car and could hear the music playing from someone's system. It was the song "Joker" by the Steve Miller Band. The aroma of the trailer could be smelt outside, and the Jack Daniels was being circulated like popcorn at a baseball game. I looked inside and saw people sitting on a dark pumpkin-colored couch playing cards. They were hanging out in the kitchen. People were going to and from the small 70's size refrigerator popping the tops off of their beers and letting them fall on the floor which was covered in dirt, pieces of broken dry wall, and glass from a broken window. The looks on people's faces were that of sheer fun, they were making fools out of themselves, and, even if they hated it, they weren't going to stop. I found Mary, who was gloating with the thoughts of her fantastic party, and behind her rose a voice that I recognized very well. I looked and saw Tonya staggering down the concrete steps of the trailer. She was laughing hysterically and talking in a loud, uncontrollable voice. Supporting herself on the car next to us, she looked at me through her almost psychotic eyes and started to rummage through her pockets and babble.