Monday, November 25, 2019

AP LIt. Definition List #4 (poetry heavy) Essay Example

AP LIt. Definition List #4 (poetry heavy) Essay Example AP LIt. Definition List #4 (poetry heavy) Paper AP LIt. Definition List #4 (poetry heavy) Paper Essay Topic: Poetry Banneret In medieval times, a knight that lead troops into battle by holding the standard or banner of the king Pennon A flag, usually found on the end of a knights lance Trochaic pentameter Trochaic tetrameter is a meter in poetry. It refers to a line of four trochaic feet. The word tetrameter simply means that the poem has four trochees. A trochee is a long syllable, or stressed syllable, followed by a short, or unstressed, one. Iambic trimeter In ancient Greek poetry and Latin poetry, iambic trimeter is a quantitative meter, in which a line consists of three iambic metra and each metron consists of two iambi (i.e., a total of six iambic feet per line), though substitutions were common, such as spondees or tribrachs for iambs Trochaic tetrameter Trochaic tetrameter is a meter in poetry. It refers to a line of four trochaic feet. The word tetrameter simply means that the poem has four trochees. A trochee is a long syllable, or stressed syllable, followed by a short, or unstressed, one. Iambic tetrmeter Iambic tetrameter is a meter in poetry. It refers to a line consisting of four iambic feet. The word tetrameter simply means that there are four feet in the line; iambic tetrameter is a line comprising four iambs. Iambic pentameter a line of verse with five metrical feet, each consisting of one short (or unstressed) syllable followed by one long (or stressed) syllable, for example Two households, both alike in dignity. Beat a main accent or rhythmic unit Slant rhyme Half rhyme or slant rhyme, sometimes called near-rhyme or lazy rhyme, is a type of rhyme formed by words with similar but not identical sounds. In most instances, either the vowel segments are different while the consonants are identical, or vice versa. Exact rhyme Perfect rhyme - also called full rhyme, exact rhyme, or true rhyme - is a form of rhyme between two words or phrases, satisfying the following conditions: The stressed vowel sound in both words must be identical, as well as any subsequent sounds. For example, sky and high; skylight and highlight. Oxymoron a figure of speech in which apparently contradictory terms appear in conjunction Chiasmus a rhetorical or literary figure in which words, grammatical constructions, or concepts are repeated in reverse order, in the same or a modified form Caesura (in Greek and Latin verse) a break between words within a metrical foot. (in modern verse) a pause near the middle of a line. Epistrophe the repetition of a word at the end of successive clauses or sentences. Anapestic a metrical foot consisting of two short or unstressed syllables followed by one long or stressed syllable. Dactylic a metrical foot consisting of one stressed syllable followed by two unstressed syllables or (in Greek and Latin) one long syllable followed by two short syllables. Iambic An iamb is a literary device that can be defined as a foot containing unaccented and short syllables followed by a long and accented syllable in a single line of a poem (unstressed/stressed syllables). Trochiac To define trochaic meter as simply as possible, it is a line of poetry composed of trochees. Like the iamb that is favored in over 75% of English poetry, the trochee is a basic metrical unit called a foot consisting of two syllables. Spondaic A metrical foot, spondee is a beat in a poetic line which consists of two accented syllables (stressed/stressed) or DUM-DUM stress pattern. Spondee is a poetic device that is not very common, as other metrical feet like iamb and trochee. Panacea a solution or remedy for all difficulties or diseases.

Thursday, November 21, 2019

International Business Essay Example | Topics and Well Written Essays - 4500 words

International Business - Essay Example In short, international business is facing fewer constraints at present even though it faced plenty of barriers in the past. The mode of entry into overseas market by international companies is often attracted huge debates. Some companies are looking for alliances with a company in the target country whereas other companies are looking for merger and acquisition as a mode of entry strategy to expand their business to overseas countries. Even the same company opts for different mode of entries in different countries. For example, Wal-Mart established a business alliance with Bharti group in India as a mode of entry in India market. At the same time, they used mergers and acquisition as the mode of entry in European and South African markets. â€Å"Cross border mergers and acquisitions (M&As) are a main vehicle for foreign direct Investment. Yet despite its quantitative importance, the determinants of cross-border M&As are still not well-understood† (Brakman et al, 2008, p.1). G aughan (2007) explained M & A as a process in which two corporations combined together to form a single one. Moreover, only one corporation survives after the M & A while the merged corporation goes out of existence after the merger process (p.12). Merger and acquisition are one of the most popular business strategies in the modern business world. However, there are lots of concerns and debates about the success and failures of this business strategy. This is because of the fact that there are plenty of examples about the success and failure of the M & A deals in recent times. Some of the recent statistics show that the popularity of M&A as a mode of entry is decreasing in recent times. Some think the M&A cycle has already started to turn up. In the first three quarters of 2012, as the euro tottered and fear gripped the global economy, M&A activity worldwide was 17.4% lower than in the same period of 2011. Yet it surged in the fourth quarter, to the highest level of any quarter in t he past four years. This is one reason to expect more mergers this year, says a report by Wachtell, Lipton, Rosen & Katz, a law firm that specializes in M&A. However, Mr Moritz suspects that some deals in late 2012 were rushed through by companies that were worried about possible changes to the tax code. Most deals in 2013 will probably be fairly small, designed to strengthen or fill a gap in the buyer’s existing operations. These are known as â€Å"plug and play†. Transformational megamergers grew rarer in 2012, with only four deals topping $20 billion. That was the same as in 2011, and fewer than in each of the three previous years (Mergers Shall we?, 2013). From the above statistics, it is evident that business pundits are not sure about the success and failures of M & As. To merge or not to merge, that is the question. Whether it is nobler in the mind to suffer the pains of negotiation & integration or to defy global trends and find alternatives. This paper critica lly evaluates the arguments of the pro-merger and anti-merger schools and takes a conclusive position that global mega-mergers are a good policy to undertake in international business practice. Arguments in favor of M & A Miller (2008) pointed out that Edwin L. Miller (Author) †º Visit Amazon's Edwin L. Miller Page Find all the books, read about the author, and more. See search results for this author Are you

Wednesday, November 20, 2019

Carry Trade Essay Example | Topics and Well Written Essays - 1250 words

Carry Trade - Essay Example While on the one hand exports are down and production are down, on the other hand a large number of job losses is causing further slide in economy. This raises the curiosity about the importance of carry trade in this scenario. Carry trade, as the name suggests is the trading activity that one indulges by carrying forward the returns or losses of the holdings by an individual or a business entity. Yen has been a popular instrument amongst the trading community as an important tool for holding foreign exchange and dealing in financial transactions. Selling the Yen at lower interest rates and then using the funds for purchasing higher interest currencies like dollar or pounds would yield considerable profits. Such a carry trade prospered, with the hope of sustaining the higher swap ratio and lower interest rates on Yen. But, with western economies reeling under recession, the Yen has considerably become strong, resulting in some loss making propositions for Carry trades. This has broug ht the issue of carry trade in focus. ... Such a carry trade prospered, with the hope of sustaining the higher swap ratio and lower interest rates on Yen. But, with western economies reeling under recession, the Yen has considerably become strong, resulting in some loss making propositions for Carry trades. This has brought the issue of carry trade in focus. This study is an effort towards analyzing the trends in Carry trade over the years and its impact on the economic conditions of different countries. An effort will also be made to foresee the futuristic trends while analysing and comparing the development of the markets. Chapter-1: Introduction Economic activities, financial services, and banking have experienced quite a few changes in the last couple of decades. With the opening up of economies, the industrial activities saw an upsurge on global scale. The financial system around the world also saw need to have a matching regulatory mechanism. The exchange rates became more transparent while investments in one region or country poured in from different corners of the world. The differences in rates of interests, prices indices, exchange rates led to a trading system termed as carry trade. 1.1 Background of the Study For many years the trading in foreign exchange has been a simple process. It basically involved buying the currencies with the highest returns while selling those with the lowest. Such a 'carry trade' helped in creating high returns with low volatility. This trend continued for many years creating bumper returns for some investors. Some analysts considered that Carry Trade violated the fundamental theories explaining the markets like the uncovered interest rate parity (UIP). The UIP states

Monday, November 18, 2019

Hunting falcons Essay Example | Topics and Well Written Essays - 500 words

Hunting falcons - Essay Example The falcons are known to have a very high diving speeds compared to the other birds and can change directions very quickly. In terms of species number, more than 40 different species of falcon exists in different palaces of the world. However, the most common species of falcon is the peregrine falcon and the black falcon. The falcons also have great eyesight and have few predators that pose threat to their existence. In terms of distribution, peregrine falcon and the black falcon are the most widely distributed species of falcon throughout the world. The birds occupy most of the north America, pacific coast, Mexico and Central America all year round. In addition, studies have shown that peregrine falcons are also found in the Antarctica region. A more spectacular feature is that the peregrines also inhabit regions close to rivers due to the presence of target prays including fish. The falcons have no specific diet but their prey can be either on land or above the ground. For example, small birds in air contribute a large percent of prey above the ground. The falcons are able to prey on other birds because of their swift and calculative dives. On the ground, the falcon target on small animals like mice and frogs. Some species of falcons like the white backed vulture also do scavenge on body remains of bigger animals found on the ground. In addition to the small animals found on the ground, the snake eagles, which belong to the same class of falcons, preys mostly on snakes found on the ground. Lastly, the falcons also target fish and other small aquatic inhabitants found in rivers, lakes and oceans. On the other hand, falcons have adapted to their survival by having different features that enable them to get prey and survive in the different environmental conditions. For example, the snake eagles have very tough scales on their feet and have feathers surrounding their neck.

Saturday, November 16, 2019

Computer Break-In Ethics Essay

Computer Break-In Ethics Essay What do I define as Ethical? To me, ethical is equivalent to morally right. It can be thought of as the expression done when you consider the feelings of those who are or will be directly affected by your actions. Therefore, ethical behavior is to act in a way that is loving and respectful of the potentially affected person. Spafford uses a deontological assessment as his ethical system to consider and judge the computer break-ins; this assessment determines what is right by examining the process (action) over outcome (result). According to Spafford, another way to define ethical behavior is to ask: Would we view that act as sensible and proper if everyone were to engage in it? When paired side by side, Spaffords definition of ethical behavior is one and the same in comparison to my definition where the action is the subject analyzed and if loving and respecting the potentially affected person is the sensible and proper thing to do if everyone engaged in it. As the years go by, new technology is being developed and implemented. More and more companies upgrade their entire computer systems, computer professionals upgrade their skills, and database administrators become even more alert and responsive. Not to mention that all that advanced technology becomes increasingly complex and must come with solid security. I am suggesting that the security argument for a break-in becomes more and more obsolete especially 30 years from the publishing of Spaffords article. In fact, it will be obvious that the perpetrator had unethical motives because he or she is intelligent enough to know that such technology must come with tight security which is obviously critically monitored; thus, the excuse for probing to find a fault is inapplicable. Just as the security argument gets less applicable with the influx of new technology, the student hacker arguments loses its potency also. The first argument where student hackers claim they are doing no harm and changing nothing they are simply learning about how computer systems operate has two major problems: disbelief from perspective and little education scope. The computer lab director (or whoever is in charge) is automatically inclined to think the worst possible scenario after hearing news that a student hacked into the new University network. From his perspective, he simply cannot trust the students word that no harm was done. A good example is that of a home owner who just heard a burglar broke into his home. He immediately thinks of the valuable assets such as the television, jewelry, kitchen appliances and other such items. The very unlikely assumption is that the burglar is actually doing him a favor by testing of the locks in his house whether it is functional or not. Furthermore, there is little education about entire computer system operations gained in hacking. I can concede the fact that the hacker may learn proprietary information but full scope education of computer systems cannot be achieved through hacking. The second student hacker argument outlines that computers are expensive, and that they are merely furthering their education in a cost effective manner may have a slight edge in the modern society where technology becomes expensive but ultimately fails for the reason explained earlier that full scope, fundamental education is not possible through hacking particularly when the system is most likely complicated as it would be in futuristic times. The final student hacker argument where their creations [viruses] are intended to be harmless and that they are simply learning how to write complex programs is broken into two sub-arguments that I will analyze; I will start by addressing the second sub-argument. The second sub-argument may se em convincing in the fact that the student is learning how to write complex programs in an age where computer system are extensively complex, however, the entire argument fails when analyzing the first sub-argument. No company, institution, or individual cares if the virus was intended to be harmless because restoring the system is expensive. The economic factor in restoring system integrity of an already intricate system drains the entire argument of any influence. The argument that hackers break into systems to watch instances of data abuse and to help keep Big Brother at bay already presents a reason that is reasonable at the publishing of Spaffords article. This means that the argument gains a bit more credibility in the futuristic age where data abuse by corporations and government agencies will be almost rampant. One error of this argument presumes the hackers can prevent data abuse without offsetting network activities; secondly, the argument will always fail to provide comfort for any individual that his sensitive information is entrusted to hackers whose names are unknown. Even with the previously mentioned flaws, the social protector argument is relevant, at least considerable, in an age where even the simplest action of eating can be provided by robots.

Wednesday, November 13, 2019

A and P :: essays papers

A and P The Characters of John Updike's "A & P" In "A & P", John Updike develops his characters through the eyes of the main character, Sammy. Sammy works in a grocery store, and one day he observes three young girls as they come into the store. The whole time they are in the A & P, Sammy describes their appearance, behavior, and his impression of them in great detail. Sammy watches each of the girls as they look around the store, but there is one that catches his attention right as they walk in. He is so busy staring at her that he makes the customer he is "ringing up" very mad at him. Sammy describes the young girl as a "chunky kid, with a good tan and a sweet broad soft - looking can with those two crescents of white just under it..."(Updike, 105). He notices everything about the girl, even down to the fact that she does not have a tan line, so she must have just bought the bright green, two piece, bathing suit. He also notices that she is very conscience of being a little over weight, because she "..fumbled with the co okies, but on second thought she put the packages back". Sammy describes the next girl as a pretty girl, but not pretty enough to be called beautiful. He puts great detail in describing her appearance, and describes everything about her, from her long, frizzy hair, to her long neck, and the sunburns underneath her eyes. This girl is the tallest of the three, but he says that while she is " the kind of girl other girls think is very ‘striking' and ‘attractive' but never quite makes it....is why they like her so much". The last girl he describes is the one he thinks is the leader of the three girls, and even calls her the "queen" (Updike, 105). Sammy describes her as being a very self-assured girl, who is trying to teach the other girls how to be just like her. He states that "she had talked the other two into coming in here with her, and now she was showing them how to do it, walk slow and hold yourself straight". Sammy goes into the greatest detail describing the charact er. He talks about the color of her bathing suit, how her straps are pulled down, the style of her hair, and the manner in which she walks across the store.