Tuesday, December 24, 2019
The Death Penalty Is A Way Of Punish People - 1754 Words
Death Penalty The death penalty is a way to punish people because they have committed a crime. It has been around since the 18th century BC. According the article titled ââ¬Å"History of the Death Penaltyâ⬠written by Reggion, the death penalty wasnââ¬â¢t just for those who will kill others, but it was also for those who used ââ¬Å"magic, made insulting songs, the cutting or grazing of crops planted by a farmer, the burning [of] a house or a stack of corn near a house, cheating by a patron of his client, perjury, making disturbances at night in the cityâ⬠(Reggio 1). Today, in the 21st century, the death penalty is to punish those who have committed a capital murder. The death penalty has had many different forms. For example, in the 18 century BC theâ⬠¦show more contentâ⬠¦The death penalty has both pros and cons. The pros about having the death penalty legal are that it is cheaper than having someone in jail for life, death is simply a punishment, the killer wonââ¬â¢t b e able to kill anybody else, and people will be scared to kill others (deterrence). The cons about the death penalty are discrimination, itââ¬â¢s morally wrong, innocent people are wrongly executed, itââ¬â¢s an added cost to tax payers, the legal process itself takes long, and lastly some criminals suffer from mental illness. Analyzing both the pros and cons, I believe that the death penalty should become illegal in all states, not just some states. The reason being is because the government (no one in general) shouldnââ¬â¢t decide when a life should end. In this paper, I will present claims that will prove why the death penalty should become illegal in all states, rather than becoming legal in the remaining 19 states. The death penalty contradicts itself. One major point of the death penalty is to punish those who have committed a crime (capital crime). But, more specifically the point of a punishment is for a person to learn from their mistakes, but it could also be a time when a person can think about what they did. For example, when a child does something theyââ¬â¢re not supposed to do, a typical parent would usually put them on timeout, facing the wall for a while. Once they get out of timeout, a lot of the times they donââ¬â¢t
Sunday, December 15, 2019
Philosophy in Asia, Africa and America Free Essays
The general philosophy of life in Asia is based on the principle of Yin and Yang elements: the light and the dark, the positive and negative effect. It is a belief of balance and counter-balance and both have their opportunities and threats(ââ¬Å"Philosophy: Yin and Yang vs. Good and Evil,â⬠2007). We will write a custom essay sample on Philosophy in Asia, Africa and America or any similar topic only for you Order Now The Taoism principle of Way to happiness, the Buddhism philosophy that values love, wisdom, goodness, calm, and self-control in order to end worldly sufferings by following the Eightfold path and Confuciusââ¬â¢ social code of behavior. People base their lifestyle on luck, souls and spirits, reincarnation, the Nirvana and many others. These are the major religions of Asia and of the world that until now are still untainted. Western philosophy, which includes Europe, Canada, and U. S. A. , is based on Christianity, a religion with fundamentals of Good vs. Evil. This forms strong approach of ââ¬Å"rightsâ⬠and ââ¬Å"wrongsâ⬠. Under any condition an individualââ¬â¢s action is based on morality; either morally right or morally wrong (ââ¬Å"Philosophy: Yin and Yang vs. Good and Evil,â⬠2007). From the rationalism and empiricism, to politicism, determinism, collectivism (which human rights derived) and scientism which claim that science is the only knowledge which is exact and ultimate. Basically, there are four trends that can be regarded as the foundation of African Contemporary Philosophy in our present times. These trends are Ethnophilosophy (based on the myths, folk-wisdom and the proverbs of the people), Philosophic Sagacity (a reflection of a person who is acknowledged both as a sage and a thinker), Nationalist-ideological Philosophy (aims at seeking a true and a meaningful freedom for African people that can be attained by mental liberation and a return to genuine traditional African humanism wherever it is possible) and Professional Philosophy (consists of criticism and argument, which to them, are the essential characteristics and conditions for any form of knowledge to be judged as philosophy). Nowadays, African intellectuals work with other scholars outside Africa to carry out the works in African philosophy wherein, modern system of education are strongly influenced by the European countries and among those important political African thinkers influenced by western philosophy are Kwame Nkrumah, Kenneth Kaunda and Julius Nyerere. Nà ©gritude and pan-Africanism are considered the two most important philosophical interests out of all the intellectual movements in Africa in the twentieth century (Emagalit). How to cite Philosophy in Asia, Africa and America, Papers
Saturday, December 7, 2019
Network Protocols Assignment
Questions: 1. Describe what the term promiscuous mode means in relation to capturing network traffic with Wireshark and similar network traffic analysers. The Capture Options dialog allows the Name Resolution of Network Layer names. Describe what this means and describe how it could be used for capturing network traffic. 2. Describe the difference between a network switch and a network hub. Then explain how switched networks limit the network traffic that is visible to Wireshark in comparison to networks that used hubs. (Note switches are the technology used in todays computer networks) 3. In TCP/IP networking IP addresses are used to identify specific computers (or hosts) on the network, clients use ports numbers to specify a particular instance of a client program (for example a specific tab on a web browser) and servers normally use well known port numbers on which to listen for client requests. For instance ftp at the server uses ports 20 and 21. From the web or any other source determine the well-known port numbers of the following server programs: ftp data ftp control http NTP ssh 4. Also find the well know port numbers for 6 other network protocols and describe the function that each protocol performs. Answers: Promiscuous mode The promiscuous mode is the mode which is used to capture the network traffic that is flows through the Ethernet traffic and not the unicast traffic. With the promiscuous mode being activated, the multicast filter is switched off. All the packets that are received are delivered to the host. In case of capturing the traffic in an Ethernet traffic, instead of the Unicast traffic on which Wireshark, multicast and broadcast traffic is maintained, the filter is switched off. So it can be said that the promiscuous mode is necessary to switched on in order to capture the network traffic (Chappell, 2010). Name Resolution of Network Layer The name resolution attempts to convert few of the numerical address values into a format that can be read and understood by the humans. The name resolution acts as an interpreter that converts the numerical address value into a form that is readable by the humans. There are two wqays by which this can be done. They are done by calling system or network services or resolve from Wireshark specific configuration. The capture files are used to understand the information that will stay available after the captured packets are saved to a capture file (Merino, 2013). This is helpful in knowing a bit of the capture file content. Difference between a network switch and a network hub In case of a network, a device which filters and sends ahead the packets that are between the LAN segments. The switches are operational between the data link layer and the network layer of the OSI model. As a result, it supports the packet protocol. LANs which utilize switches to join segments are referred to as switched LANs or in some cases called as the Ethernet networks or the Ethernet LANs. But a connection point for devices in a certain network in a network is called as the Hub. The Hubs are commonly implemented to connect the segments of a LAN. A Hub contains multiple ports (Orebaugh, Ramirez and Burke, 2007). In case of a hub when a certain packet arrives a port, it is copied to the other ports and shared through the network. Nowadays, an Ethernet network utilizes switches which connect the Ethernet nodes together. This helps to increase the network performance by a great deal, but it becomes difficult at the time of capturing data using Wireshark. An Ethernet switch does the same job as that of an Ethernet adapter but the function is done inside the switch. The inference can be drawn from the from the traffic seen on the port that unicast address or addresses are utilised by the connector added to the port (Sanders, 2011). Port numbers of given server programs Sl. no servers port numbers 1 ftp data 20 2 ftp control 21 3 HTTP 80 4 NTP 119 5 SSH 2 Different other well-known port numbers are- BGP- the short Border Gateway Protocol has port number of 179. It is an exterior gateway routing protocol, which enable groups of routers to share routing information in case of efficient loop free routes, needs to be established. BGP is mostly used within and between internet service providers. LDAP- the lightweight directory access protocol bears the port number of 389. This port sets the protocols for the accessing of the information directories (Seagren and Noonan, 2006). DHCP client- the DHCP client is a protocol for the assignment of a dynamic IP address to the devices of a network. It has the port number of 546. With the help of dynamic addressing, it is possible to have different IP addresses at the same time. SNMP- the simple network management protocol is a set of protocols for the managing of complex networks. It bears the port number of 161. SQL server- the DBMS which responds to queries from the client machines are formatted in the SQL language. It bears the port number of 156 POP3- the Post Office Protocol is utilised to retrieve e-mail from the email servers in order to keep track of the messages. References Banerjee, U., Vashishtha, A. and Saxena, M. (2010). Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection.International Journal of Computer Applications, 6(7), pp.1-5. Chappell, L. (2010).Wireshark network analysis. San Jose, CA: Protocol Analysis Institute, Chappell University. Hnatyshin, V. and Lobo, A. (2008). Undergraduate data communications and networking projects using opnet and wireshark software.SIGCSE Bull., 40(1), p.241. Kumar, A. and Yadav, J. (2016). Comparison: Wireshark on different parameters.International Journal Of Engineering And Computer Science.
Subscribe to:
Posts (Atom)