Friday, May 15, 2020

My Career Goals Carlos Garcia - 1123 Words

I met up with my client, Carlos Garcia, and he is seeking counsel if being a Math Professor suit him. Before I tell him to go and pursue a career in the educational field, I have to carefully consider if his personal and academic strengths fits his career option, if being a Math Professor will support his lifestyle, and if his career goal part of the growing job market in the economy. I set up an interview with Carlos so that I will know more about him. During the assessment, I found out what his strengths and weaknesses are, and what drives and motivates him as well. Carlos developed the passion for teaching math as he was helping out his classmate when he took a math class. He enjoys teaching Math and he feels good working around with†¦show more content†¦The workforce in the U.S. is becoming more diverse as immigrants continue to migrate. As provided in this data, there will be further employment opportunities opening, and the number one area that is increasing is the edu cation and health care services. Carlos’ career target is part of the growing area of the economy that needs more employees. As the standards of each career nowadays are getting higher, the demand for new teachers are high on demand. Math Professors are a big help in molding students, since math skills, hone one’s critical thinking skills. Since according to the Bureau of Labor and Statistics being a teacher is part of the growing professions in the United States, Carlos has a chance to land a career, and the salary is likely to support his lifestyle. During his career and lifestyle assessment at the website, cacareerzone.org, it mentions there on how much Math Professors earn annually. A Math Professor earns an average of $88,910, making around $38,420 and $148,660. With this kind of salary range, he can pay for his house’s monthly mortgage, bills, his car, have the luxury to travel for fun, and still be able to help out his family. His attitude and work value suit his career option. According to California Career Zone (cacareerzone.org) a Math Professor should be good at interacting with people. According to Carlos, he loves working with other people. As a matter of fact, he

Wednesday, May 6, 2020

Study Questions For A Midsummer Night - 2329 Words

Study Questions for A Midsummer Night’s Dream Name: Daniel M. Tayts Please answer the following questions in complete sentences on your own paper. ACT I, SCENE I 1. How is Hippolyta’s reasoning concerning how quickly the next four days will pass different from that of Theseus? Note how Shakespeare portrays the patience and calmness of Hippolyta in contrast to the impatience and need for action of Theseus. Hippolyta believe that the next four days will pass very quickly. Theseus, on the other hand, is very impatient, and believes that the next four days will move by very slowly. He is extremely impatient, and wants to take action, without having to wait for so long. 2. Why has Egeus brought his daughter and her two suitors to†¦show more content†¦Because she has had a close relationship with his mother, and wants to care for him since she is now deceased. 5. What does Oberon send Puck to find? He sends puck to find the magical flower that is purple in order to get revenge on Titania. 6. What are Oberon’s plans for Titania? He plans to squeeze the juice from the flower in her eyes, so when she wakes up she falls in love with a feral animal. 7. How does Helena react to Demetrius’s verbal abuse? She just listens and takes it, seemingly ignoring it. She just says that she loves him. 8. What is her response to his threats of physical abuse? Surprisingly, she continues to ignore it and profess her love to him. 9. In what way is Helena’s behavior inappropriate for Athenian women? Athenian women were supposed to display unquestioned obedience, so when she defied him, she defied man as a whole. 10. What does Oberon tell Puck to do about Demetrius and Helena? He directs Puck to squeeze the juice out of the magical flower into the â€Å"Athenian Man’s† eyes ACT II, SCENE II 1. Why does Oberon want Titania to wake and fall in love with some vile thing? B/c when the flower wears off, she would feel very guilty and ashamed of herself for ever loving something like that. 2. Why does Hermia insist Lysander sleep a little ways from her? Because they aren’t married yet, and she doesn’t feel comfortable about it yet 3. Why does Puck anoint Lysander’s eyes? B/c he saw the â€Å"Athenian Man† lying in theShow MoreRelatedEssay about Reason and Love in A Midsummer Night’s Dream1757 Words   |  8 PagesReason and love in A Midsummer Night’s Dream Shakespeare’s A Midsummer Night’s Dream is often read as a dramatization of the incompatibility of â€Å"reason and love† (III.i. 127), yet many critics pay little attention to how Shakespeare manages to draw his audience into meditating on these notions independently (Burke 116). The play is as much about the conflict between passion and reason concerning love, as it is a warning against attempting to understand love rationally. Similarly, trying to understandRead MoreLove and Marriage in Renaissance Literature Essay973 Words   |  4 Pageswere admirer and adored by their lovers. Furthermore, intense love between men and women became a central subject in European literature, like between Tristan and Iseult, Lancelot and Guinevere, or Aeneas and Dido. But it was not question of marriage. Actually, marriage and love did not match very well together but then Renaissance literature developed the concepts of love and marriage and recorded the evolution of the relation between them. In the Renaissance poetry,Read MoreLove and Marriage in Renaissance Literature1228 Words   |  5 Pageslove with women who were admirer and adored by their lovers. Furthermore, intense love between men and women became a central subject in European literature, like between Tristan and Iseult, Lancelot and Guinevere, or Aeneas and Dido. But it was not question of marriage. Actually, marriage and love did not match very well together but then Renaissance literature developed the concepts of love and marriage and recorded the evolution of the relation between them. In the Renaissance poetry, Donne, in TheRead MoreWho Caused Macbeth s Ill Fate : The Witches Or Himself?1902 Words   |  8 Pagesof witchcraft has been around for thousands of years; it can be seen in many diverse areas of our daily lives. Take for example children’s stories – several books/movies use a witch as their main antagonist. Where did witches begin? To answer this question , witches have been around as long as there has been a devil in religious tales. Sometimes, they are not even called ‘witches’ in certain religions, but you can be sure that each religion has its own idea of witchcraft or devil worship. The lateRead MoreRobins Epilogue in A Midsummer Night’s Dream3107 Words   |  13 PagesIn A Midsummer Night’s Dream, Shakespeare masterfully crafts a play with three very different viewpoints that can be interpreted, when woven together, in a number of ways that range from seemingly obvious interpretations to ones much more subtle. He ends the play with an apology that is just as elusive as the play’s interpretation. If one looks past the obvious, however, one can begin to piece together a possible message that mortals, no matter the power they hold on earth, are subject to far greaterRead MoreWilliam Shakespeare s Romeo And Juliet977 Words   |  4 Pagesthem the simple question of, who is the greatest writer known to the planet. Many will respond with a likely sarcastic response, but tell you of the man known as William Shakespeare. He’s most popular for his drama play called Romeo and Juliet, but holds credentials in the literary department for much more than that. He’s written dozens of plays, many dramas such as MacBeth and Hamlet, with some noteworthy comedies for the time period like Much Ado about Nothing and A Midsummer s Night Dream. WhileRead MoreA Midsummer Nights Dream and Scene1024 Words   |  5 PagesA Midsummer Night’s Dream Study Questions ACT I, SCENE I - Due Date ____________________ 1. How is Hippolyta’s reasoning concerning how quickly the next four days will pass different from that of Theseus? 2. Why has Egeus brought his daughter and her two suitors to Theseus? What does Egeus expect him to do? 3. What was the proper role for women/daughters in Athenian society according to Egeus and Theseus? 4. What is Theseus’s ruling concerning Hermia? 5. How does Lysander’s comment about Demetrius’sRead More Importance of Speech in Much Ado About Nothing, A Midsummer Nights Dream, and Richard III2277 Words   |  10 PagesImportance of Speech in Much Ado About Nothing, A Midsummer Nights Dream, and Richard III Speech is often the strongest indicator of personality and motivation in Shakespearean histories and comedies. Each turn of phrase is a small insight into the essence of the character. Stringing together each line from the mouth of the character allows the audience to discover each nuance created by Shakespeare. By connecting the actions to a manner of speech, which mirrors those actions, ShakespeareRead MoreBaller1443 Words   |  6 PagesA Midsummer Night’s Dream Study Questions Write answers in full sentences. Name_______________________ Act I, Scene i 1. Who is Theseus? Why is he anxious for the rising of the new moon? 2. What does he tell Philostrate to do? 3. Why is Egeus angry? Why has he come to see Theseus? 4. What are your impressions of Hermia? Whom does she love? Quote 5. What was the proper role for woman/daughters in Athenian society according to Egeus and TheseusRead MoreWilliam Shakespeare s Romeo And Juliet1231 Words   |  5 Pagesor more generallyâ€Å"a play within a play†, i.e a play where the author stagged, at some time, an other theater play inside this one. Many of his plays can be qualified as â€Å"plays within plays† and espacially Hamlet and A Midsummer Night s Dream. Therefore, it is interesting to study these plays to know – and learn – more about this process. I) Act III scene 2 Hamlet is undoubtly one of the Shakespeare s most famous plays which was written between 1598 and 1601. It relates the story of Hamlet

Tuesday, May 5, 2020

Conceptual Models and Design Methodology †Free Samples to Students

Question: Discuss about the Conceptual Models and Design Methodology. Answer: Introduction: The Wireless Local Area Networks or WLANs with higher speed are extremely popular in all sectors of the world (Vinel, 2012). These sectors are the most important sectors for any society. The main standard for the WLANs is the IEEE 802.11. The specification of this 802.11 standard is that it specifies the physical layer and the MAC or medium access control for the WLANs. For the physical layer of the WLANs, this particular standard has four typical standards. They are the 802.11a, 802.11b, 802.11g and 802.11n (Bayraktaroglu et al., 2013). The comparison and contrast between 802.11a and 802.11b are as follows: Key Aspects 802.11a 802.11b 1. Range of Frequency Up to 5 GHz Up to 2.4 GHz 2. Speed or Rate in Mbps 6, 9, 12, 18, 24, 36, 48, 54 1, 2, 5.5, 6, 9, 11, 12, 18, 22, 24, 33, 36, 48, 54 3. Modulation Binary Phase Shift Keying, Quadrature Phase Shift Keying, 16 Quadrature Amplitude Modulation 64 Quadrature Amplitude Modulation (Orthogonal Frequency Division Multiplexing) Differential Phase Shift Keying, Differentially Quadrature Phase Shift Keying, CCK (Direct Sequence Spread Spectrum, FH and IR) 4. FEC Rate 1/2, 2/3, 3/4 NA 5. Base Rate Up to 6 Mbps Up to 1 or 2 Mbps 6. Functions Providing eight PHY modes and transmitting data (Naraei, Amiri Saberi, 2014). Serves as the interface between physical layer and host device and the robustness features are Packer Fragmentation and Cyclic Redundancy Check or CRC. The above table clearly defines about the comparisons and contrasts between the two typical standards of 802.11, which are the 802.11a and 802.11b. Both of them work in the physical layer. The 802.11i standard enhances the 802.11 with various innovative mechanisms of security for ensuring the integrity and confidentiality of messages (Alasmary Zhuang, 2012). Some of the new mechanisms are the additions, and others are the absolute replacements of the procedures of 802.11. 802.11i also allows any other standard of IEEE which is the 802.1x port authentication algorithm, for providing a specific framework to obtain a strong management of keys and mutual authentication (De Cristofaro et al., 2013). The authentication procedure that starts at first is normally carried out by following two distinct ways. One way is to utilize the Pre-Shared Key or PSK and the second way is to follow the exchange of EAP via 802.1x. This EAP exchange is called as the EAPOL. The authentication server is needed or required to be present during the following of EAP exchange (Vinel, 2012). The procedure of EAP exchange makes sure that client device or the client station is to be authenticated wit h the help of an access point. Once the pre shared key or the authentication of 802.1x is completed, a new shred secret key is created (Naraei, Amiri Saberi, 2014). This is known as the PMK or pair wise master key. Thus, the 802.11i allows for a client device to be authenticated against an authentication server with the help of the EAP exchange. A VPN or a virtual private network is nothing but an extension of a private network that allows its users to transmit any type of data or information in public networks with utmost security (Uskov, 2012). The applications that are run on a virtual private network get all the advantages from the security, functionality and management of the network. This VPN works just like the several devices of computing connected directly. This private network is normally created with the help of an establishment of a typical point to point connection virtually by dedicated connections and of course by certain traffic encryption. The encryption algorithm helps the communication to be safe and secured from any type of intrusion in a point to point communications on a public network (Uskov, 2012). The main advantage that VPN provides to the point to point connection on a public network is that it acts like a wide area network or WAN. ZeeTechis a multinational company of export and import. There are five offices with forty employees in each office. Around four hundred daily clients or customers are attended daily by these offices (Naraei, Amiri Saberi, 2014). They have thought of implementing a Wireless Metropolitan Area Network or WMAN technology in their company, which will link all the five offices and moreover, will provide a mobile wireless access to the field workers as they have to travel in various sites. ZeeTech has thought of implementing one Wireless Metropolitan Area Network in each of its five offices. There are few technologies of WMAN (Vinel, 2012). The best technology should be implemented in ZeeTech for their business amongst all the other technologies. There are three types of standards for WMANS. They are the HiperMAN, HiperACCESS and IEEE 802.16. The HiperMAN or the High Performance Radio Metropolitan Area Network is the technology that provides a solution for broadband wireless for any Metropolitan Area Networks (Wang, Zhu Gomes, 2012). HIPERMAN normally operates between the radio frequency range of 2 GHz and 11 GHz. The main advantage of this technology is that it enables flexible mesh network deployments. The HiperACCESS or the High Performance Radio Access is the technology that provides broadband access to small and medium sized enterprises. It even provides backhaul for the mobile systems like WCDMA, GSM, CDMA2000 and GPRS (Wang, Zhu Gomes, 2012). This particular technology was developed for providing a broadband system with but rates that ranges up to 100Mbit/sec approximately. However, the most widely deployed rate is about 25Mbit/sec. It is mainly developed for the higher frequency bands like the 40,5 to 43,5 GHz band. The IEEE 802.16 Wireless MAN technology mainly specifies the air interface for these networks. This technology follows the connection of first mile/last mile in the WMANs (Bayraktaroglu et al., 2013). It mainly aims at the significant utilization of bandwidth between 10 to 66 GHz and further helps to define a MAC layer, supporting the various physical layer specifications. The HiperACCESS technology of WMAN would be the best technology for ZeeTech. This provides a greater speed and also mobile communication (De Cristofaro et al., 2013). Moreover, it provides Backhaul, which means it helps in cellular tower connection, enterprise networks and Wi-Fi connections. It is cost effective and ZeeTech can easily afford it. Conclusion Therefore, from the above discussion it can be concluded that ZeeTech is a multinational company that deals with export and import business. This particular company has five offices in Melbourne. All the offices have about forty employees working and around four hundred customers or clients are attended regularly in these five offices. ZeeTech has decided to implement a Wireless Metropolitan Area Network or WMAN technology in all of their five offices. This will help in linking up the networks of all the five offices and also will provide a mobile wireless access for the workers who travel regularly to various sites across the city for their jobs. ZeeTech should select HiperACCESS technology for their WMAN implementation. Discuss the three different multiple access technologies used with 2G: time division multiple access (TDMA), code division multiple access (CDMA), and global system for mobile communications (GSM). The main three multiple access technologies that are utilized with 2G are the Time Division Multiple Access or TDMA, Code Division Multiple Access or CDMA and the Global System for Mobile Communications or GSM. The description is given below: i) TDMA: The Time Division Multiple Access is a procedure of accessing the channel for all types of networks that are shared medium. TDMA enables all the users in sharing the similar frequency channel (Ma, Leung Li, 2014). This sharing is done by segmenting a specific signal into various slots of time. The transmission is done rapidly by the users. This particular technology is utilized with 2G. ii) CDMA: The Code Division Multiple Access or CDMA is the procedure of accessing the channel, similar to TDMA. However the difference between two is that CDMA is utilized by several technologies of radio communications (Glisic Leppnen, 2013). The data or the information can be transmitted by several transmitters in a single channel of communication simultaneously. For this particular reason, various users can share frequencies. This particular technology is also utilized with 2G. GSM: The Global System for Mobile Communication or GSM is the mobile system of telephony that works digitally (De Cristofaro et al., 2013). This particular communication utilizes the various TDMA technologies within it. This is utilized in all over the world. References Alasmary, W., Zhuang, W. (2012). Mobility impact in IEEE 802.11 p infrastructureless vehicular networks.Ad Hoc Networks,10(2), 222-230. Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B. (2013). Performance of IEEE 802.11 under jamming.Mobile Networks and Applications,18(5), 678-696. De Cristofaro, E., Du, H., Freudiger, J., Norcie, G. (2013). A comparative usability study of two-factor authentication.arXiv preprint arXiv:1309.5344. Glisic, S. G., Leppnen, P. A. (2013).Wireless communications: TDMA versus CDMA. Springer Science Business Media. Ma, L., Leung, H., Li, D. (2014). Hybrid TDMA/CDMA MAC Protocol for Wireless Sensor Networks.JNW,9(10), 2665-2673. Naraei, P., Amiri, I. S., Saberi, I. (2014).Optimizing IEEE 802.11 i Resource and Security Essentials: For Mobile and Stationary Devices. Syngress. Uskov, A. V. (2012, June). Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance. InTrust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on(pp. 1042-1048). IEEE. Uskov, A. V. (2012, May). Information security of mobile VPN: Conceptual models and design methodology. InElectro/Information Technology (EIT), 2012 IEEE International Conference on(pp. 1-6). IEEE. Vinel, A. (2012). 3GPP LTE versus IEEE 802.11 p/WAVE: Which technology is able to support cooperative vehicular safety applications?.IEEE Wireless Communications Letters,1(2), 125-128. Wang, J., Zhu, H., Gomes, N. J. (2012). Distributed antenna systems for mobile communications in high speed trains.IEEE Journal on Selected Areas in Communications,30(4), 675-683.