Thursday, August 27, 2020

Wastewater Treatment Essay Example For Students

Wastewater Treatment Essay The purpose behind me doing this report is on the grounds that I was unable to go to class enoughto handle the idea of Wastewater Treatment. This report is an outline of eachstage of the treatment of sewage. I have incorporated an outline of a run of the mill sewageplant. A) Primary Treatment The wastewater that enters a treatment plantcontains trash that may stop up or harm the siphons and hardware. The materialis evacuated by screens, and is scorched or covered. The wastewater then passesthrough a comminutor (processor), where all the natural material, for example, leavesare mushed littler so they can be expelled later. 1) Grit Chamber Back inthe day, long restricted channel-molded settling tanks, known as coarseness chambers, wereused to expel all the inorganic substances like sand, residue, rock, andcinders. These chambers were made to permit inorganic particles 0.008 in. orbigger to settle at the base while the littler particles and the majority of theorganic material that stay in suspension go through. Today, winding flowaerated coarseness chambers with container bottoms, or clarifiers with programmed scrapperarms are utilized. The coarseness is evacuated and discarded as sterile landfill. Gritbuild up can reach from 3 to 8 cubic feet per1 million gallons of wastewater. 2)Sedimentation With the coarseness evacuated, the wastewater goes into a sedimentationtank, where the natural materials expelled. The technique for sedimentation canremove around 20 to 40 percent of the biochemical oxygen request and 40 to 60percent of the suspended solids. The huge young men in the business utilize a chemicalprocess known as coagulation and flocculation in the sedimentation tank. Ireally dont think a lot about this subject so Im going to proceed onward. 3)Flotation The option in contrast to sedimentation is a treatment called buoyancy, inwhich air is constrained into the wastewater under weights of 25 to 50 lbs for each sq. in. The wastewater, is packed with air, is then discharged into an open tank ;there the rising air bubbles cause the suspended solids to ascend to the surface,where the are wisked away. Buoyancy can evacuate in excess of 75 percent of thesuspended solids. 4) Digestion is a microbiological procedure thatchanges the synthetically perplexing muck to methane, carbon dioxide, and a harmlessfertilizer. The responses happen in a shut tank or digestor that is oxygendeficient. The change occurs after a progression of responses. First thesolid matter is made solvent by catalysts, at that point the substance is aged by agroup of corrosive creating microbes, diminishing it to basic natural acids such asacetic corrosive. The natural acids are then set out to methane and carbon dioxideby microorganisms. The muck that is to thick is warmed and added to the digester asmany times as could be expected under the circumstances, where it sits for 10 to 30 days and is deteriorated. Absorption decreases natural issue by 45 to 60 percent. 5) Drying The digestedsludge is place on sand beds for air drying. Air drying needs dry, warm weatherfor it to work. A few plants have covers over the sand beds. Dried muck deepest cases is utilized as a manure due to the 2 percent nitrogen and 1percent phosphorus content. B) Secondary Treatment After expelling 40 to 60percent of the suspended solids and 20 to 40 percent of the BOD5 in the primarystage by physical assets, the optional treatment organically decreases theorganic material that remained in the fluid stream. Optional treatment containskeeping and accelerating natures procedure of waste removal. Vigorous bacteriain the oxygen change the natural issue to stable structures, for example, CO2 , water,nitrates, and phosphates. The new natural material that is made is an indirectresult of organic treatment forms, and is evacuated before the wastewateris dumped into the streams. 1) Trickling Filter In this procedure, a waste streamis sent over a bed or section of some sort of permeable medium. A clingy film ofmicroorganisms covers the medium and goes about as the expulsion operator. The organicmatter in the waste stream is consumed by the film and changed to carbon dioxideand water. In the event that the streaming channel step precedes the sedimentation stage itcan expel around 85 percent of the BOD entering the plant. 2) Activated SludgeThis stage is an oxygen consuming procedure that includes clingy ooze particles that havemillions of effectively developing microorganisms remained together by a coagulated ooze. .u42be2612465e1e9a5df7ae6e03b0af4b , .u42be2612465e1e9a5df7ae6e03b0af4b .postImageUrl , .u42be2612465e1e9a5df7ae6e03b0af4b .focused content territory { min-stature: 80px; position: relative; } .u42be2612465e1e9a5df7ae6e03b0af4b , .u42be2612465e1e9a5df7ae6e03b0af4b:hover , .u42be2612465e1e9a5df7ae6e03b0af4b:visited , .u42be2612465e1e9a5df7ae6e03b0af4b:active { border:0!important; } .u42be2612465e1e9a5df7ae6e03b0af4b .clearfix:after { content: ; show: table; clear: both; } .u42be2612465e1e9a5df7ae6e03b0af4b { show: square; progress: foundation shading 250ms; webkit-change: foundation shading 250ms; width: 100%; mistiness: 1; progress: obscurity 250ms; webkit-change: murkiness 250ms; foundation shading: #95A5A6; } .u42be2612465e1e9a5df7ae6e03b0af4b:active , .u42be2612465e1e9a5df7ae6e03b0af4b:hover { darkness: 1; change: haziness 250ms; webkit-progress: haziness 250ms; foundation shading: #2C3E50; } .u42be2612465e1e9a5df7ae6e03b0af4b .focused content zone { width: 100%; position: relativ e; } .u42be2612465e1e9a5df7ae6e03b0af4b .ctaText { outskirt base: 0 strong #fff; shading: #2980B9; text dimension: 16px; textual style weight: striking; edge: 0; cushioning: 0; text-enrichment: underline; } .u42be2612465e1e9a5df7ae6e03b0af4b .postTitle { shading: #FFFFFF; text dimension: 16px; textual style weight: 600; edge: 0; cushioning: 0; width: 100%; } .u42be2612465e1e9a5df7ae6e03b0af4b .ctaButton { foundation shading: #7F8C8D!important; shading: #2980B9; fringe: none; fringe sweep: 3px; box-shadow: none; text dimension: 14px; text style weight: intense; line-tallness: 26px; moz-outskirt range: 3px; text-adjust: focus; text-enhancement: none; text-shadow: none; width: 80px; min-tallness: 80px; foundation: url(https://artscolumbia.org/wp-content/modules/intelly-related-posts/resources/pictures/basic arrow.png)no-rehash; position: supreme; right: 0; top: 0; } .u42be2612465e1e9a5df7ae6e03b0af4b:hover .ctaButton { foundation shading: #34495E!important; } .u42be2612465e1e9a5df7ae6e 03b0af4b .focused content { show: table; tallness: 80px; cushioning left: 18px; top: 0; } .u42be2612465e1e9a5df7ae6e03b0af4b-content { show: table-cell; edge: 0; cushioning: 0; cushioning right: 108px; position: relative; vertical-adjust: center; width: 100%; } .u42be2612465e1e9a5df7ae6e03b0af4b:after { content: ; show: square; clear: both; } READ: Criminology EssayOrganic matter is absorbed by the floc and changed to oxygen consuming yield. Thereduction of BOD changes between 60 to

Saturday, August 22, 2020

Accounting Theory and Current Issue Positive Accounting Demand

Question: Depict about the Accounting Theory and Current Issue for Positive Accounting Demand. Answer: Bookkeeping research has different branches among which positive bookkeeping is the examination which manages occasions in certifiable circumstances and attempts to change over them in bookkeeping exchanges .Here the factors are chosen by the requirements of the individual and a deliberate methodology for example positive bookkeeping approach is followed in fathoming their questions. This examination is as opposed to the regularizing bookkeeping as this exploration targets finding the best ideal strategies for bookkeeping that ought to be obviously executed in various cases. The positive bookkeeping hypothesis has been propounded by Ross L. Watts and Jerold L. Zimmerman from the University of Rochester. It centers around the real practices which are applied in the field of bookkeeping. It is a help for the organizations, lenders, borrowers and partners. It helps in recognizing the means the bookkeeping firms will take in certain pre decided conditions and the effect of such strides o n its stake holders(Watts and Zimmerman 1978,1986,1990).But, it has been discovered that numerous organizations at their administration level trying to get the most extreme benefit follow illicit strategies and neglects to accomplish the expected goals of the association which is a disadvantage, this occasionally prompts the issue of crafty conduct. Firms can target expanding their benefit over the long haul by satisfying the goals of the positive bookkeeping hypothesis , for that the firm ought to deal with the bookkeeping approaches adequately , staying up with the latest with most recent happenings in the field of bookkeeping and fund. Strategies that help in diminishing the general expenses of activity ought to be received to build the benefits of the firm. Care ought to be taken that the bookkeeping strategies set up by the bookkeeping board ought to be earnestly followed so as to diminish the hazard factor in bookkeeping choices in various circumstances. Also, the strategies f or bookkeeping followed should be adaptable so as to alter them as per the circumstances. Various strategies for positive bookkeeping research are analyzed through the investigation of a relegated article. This paper is a basic examination of the article titled Half a Defense of Positive Accounting Research composed by Paul V Dunmore from the University of Massey, Wellington, New Zealand which is primarily focused on the idea of Positive Accounting Theory or PAT(Popper 1959). The paper talks about the significance of positive bookkeeping research and various areas of the paper are consequences of the logical tasks, which shows the different occasions on the planet are reliant on one another in this manner setting a case of circumstances and logical results relationship(Kuhn 1970) Similarly, PAT which is a piece of bookkeeping research likewise shows the circumstances and logical results relationship in the bookkeeping rehearses. This infers for each activity there is an equivalent and inverse response and likewise on account of bookkeeping practice there additionally exis t a circumstances and logical results relationship. By changing over the genuine circumstances in bookkeeping terms the circumstances can be comprehended in a vastly improved way. The writer talks about the thinking procedure about the individuals where he gives a case of the scholars who would not glance through Galileos telescope since they considered most it was at that point known and the unexplored part had just been defiled by the demon spirits. From this, he needs to group that individuals need to keep to the information about the common things they as of now have and don't have any desire to upgrade and open their brains to the new research and hence bringing about the background of the upgrades in the field of knowledge(Fogarty and Markarian,2007).The creator clarifies how the speculation choices have improved throughout the decade utilizing the positive bookkeeping research procedure and furthermore the partners can comprehend the wording identified with the bookkeeping af tereffects of the organizations. The creator likewise clarifies that the idea of positive research is a lot more extensive than the term Positive Accounting Theory as proposed by Watts and Zimmerman. He likewise talks about that following foreordained examples is additionally essential as our predecessors did however leaving from them is similarly imperative to see new open doors which may bring about the further turns of events. As we are very much aware of each open door there is an equivalent likelihood of its prosperity and disappointment therefore its the human conduct which can be the integral factor in such situations(Watts and Zimmerman 1978,1986,1990). As indicated by the creator, the greater part of the scientists are utilizing subjective and quantitative methodology in their examination work yet creator proposes Poppers basis. This standard is broadly acknowledged as it follows certain means and experiences a methodical methodology. It accentuation on the subjective and quantitative approach.The process includes cautious perception and afterward the advancement of thoughts on a starter premise. Here the factors are chosen information is organized , tables are made. The following significant advance is to follow the distortion hypothesis. As indicated by this hypothesis a proper information is gathered based on proof accessible and testing is done to discover in which circumstances the hypothesis is a triumph and where it comes up short. It is enthusiastically prescribed to utilize this procedure as this gives numerous exact outcomes. The creator likewise bolsters the misrepresentation of hypothesis by giving the instances of Pion eer 10 and 11 airplane which were propelled during the 1970s and these were the first to cross our close planetary system and enter the interstellar space(Popper 1959) Years of perceptions of the above airplanes it has been discovered that they have made lesser excursion as anticipated which shows the lacking of the absolutely and precise data around then. The creator likewise remarks that the speculations ought to be made increasingly exact with the end goal that every single part of it is clear so the conclusive outcomes are useful in nature, henceforth keeping away from the shortcoming of the factual theory testing strategy, as indicated by which the testing of the information is done uniquely on measurements figure not on the pragmatic information . The creator has set out specific focuses to be remembered for the achievement of the positive research strategy . Right off the bat we ought to follow the testing of models hypothetically and as precisely as could reasonably be expected and we can even go further and utilize the specific logical demonstrating strategy to improve the achievement pace of our model and if any mistake happens we should try to beat it in the following turn. When the demonstrating is done at that point utilizing quantitative and subjective techniques we can put it under testing. He clarifies the improvement of the model through the case of review expenses model created in another ongoing article. The creator has a view point that techniques for bookkeeping ought to be legitimate and observe reasonable standards in this manner he accepts more in estimation of ideas through exact strategies instead of simply testing as this region is commonly disregarded during the time spent bookkeeping research(Davila and Foster, 2007). There is consistently a deficiency of information really taking shape of a decent bookkeeping hypothesis which the writer demonstrates by citing a case of Mendeleevs groups of three guideline where despite having inadequate information he made the principal intermittent table and later examinations and looks into helped in altering his idea and we got our new occasional table, additionally there ought to be constant replication of the past investigations that are led. This aides in finding any restrictions in the outcomes and if any inspecting blunder is there in the discoveries which can be adjusted at a later stage. Every one of these techniques when received aides in conquering the past mix-ups and performing better in further research operations(Crombie,1994). Positive bookkeeping procedure is a wide idea and its utilization in reality circumstances is far not quite the same as the manner in which it ought to have been really polished this has been affirmed by a review indicating a wide hole in the hypothetical and down to earth use of the Positive bookkeeping hypothesis strategy. It is still not related with the down to earth circumstances in life because of which wanted results are not accomplished. The perception may not be 100% right and may have numerous misconceptions(DeAngelo, 1981). Notwithstanding, even these perceptions help in building a circumstances and logical results relationship and in plainly mapping all the easygoing procedures that are happening on the planet. So to lessen the blunder rate and get the exact outcomes it is a need to interface the circumstances to bookkeeping terms and afterward get the precise outcomes. The creator makes a significant point that the bookkeeping research that is done these days isn't up to the gauges and has recommended more current and better methodology get the ideal and progressively exact outcomes in the field of bookkeeping. The creator says that better subjective and quantitative techniques ought to be created and executed and accentuation ought to be put on the right testing of the hypothetical data and utilizing the upsides of systematic displaying better models ought to be made(Lee,1997)There is likewise a prerequisite for better estimation with the goal that the models are sufficiently skilled to be thoroughly tried. Indeed, even the human conduct is profoundly erratic and these positive bookkeeping procedures can end up being an aid in understanding the human needs and conduct. As portray prior all this present reality circumstances can be depicted in the positive bookkeeping terms by building up a circumstances and logical results relationship. The variou s factors of the circumstances and logical results relationship should be appropriately contemplated and diverse genuine circumstances can be changed over In bookkeeping exchanges which can be later settled by positive bookkeeping approach. Notwithstanding, positive bookkeeping research in the more extensive viewpoint can be viewed as a piece of a more extensive scholarly undertaking of logical research which means to plainly look at the circumstances and logical results connections betwee

Friday, August 21, 2020

Need Help Writing Term Paper?

Need Help Writing Term Paper?Are you facing the problem of needing help writing term papers? Many students often find themselves at this stage and wonder how to get through this particular challenge. The first thing you should do is realize that the process of writing is a critical aspect of your education and therefore you should expect to struggle with this.Don't get stressed out as this may cause you to give up on writing your term paper before you even start. This is a huge setback that is well worth your while to overcome. There are plenty of tips that you can implement that will help you overcome this problem.It is also important that you know how to structure your essay when it comes to structure. You will find that you can be in total control of how your paper is structured and even include more details if you want to. The key is to make sure that you keep your sentences short and simple. Also, the fewer the words the better. You can go for a maximum of three hundred words pe r paragraph.Another thing you will want to keep in mind is that your term paper is not going to be a straight forward 'useful' product. It will not make a lot of sense if you try to stick to a standard format. Instead, you should make the most of the format and vary the structure you use to fit the topic of your paper.Since you will have very little time to write this particular paper, the best idea is to figure out how much time you have to get started on your project. Then choose a topic that is within this time frame. Next, work on your structure. If you need help, check out these tips.If you decide to write your term paper in the third person, then this is probably a good idea. However, if you are too embarrassed to write this way, then use the first person. This way you can be honest and direct, while still making it easy for others to read. Take a look at these tips.You should never need help writing term paper. You can always talk to an advisor or tutor for a lot of help. Use what you learn from them. If you feel that you are confused about a particular point, then you should go back and read the material again. This will really help you.You can try out all of these tips when you need help writing term paper. There is no excuse not to. Instead, write a paper using the basic structure of your topic and focus on how to keep it simple. Keep in mind that you have just one day to write this paper and you should try and come up with as many effective solutions as possible.

Monday, May 25, 2020

Biography of Rebecca Nurse, Salem Witch Trials Victim

Rebecca Nurse (February 21, 1621–July 19, 1692) was a victim of the notorious Salem witch trials, hanged as a witch at 71 years of age. Despite being a fervent churchgoer and an upstanding member of the community—a newspaper of the day referred to her as saint-like and a perfect example of good Puritan behavior—she was accused, tried, and convicted of witchcraft and put to death without the legal protections Americans would come to enjoy. Fast Facts: Rebecca Nurse Known For: Hanged during the 1692 Salem witch trialsAlso Known As: Rebecca Towne, Rebecca Town, Rebecca Nourse, Rebecka Nurse. Goody Nurse, Rebeca NurceBorn: February 21, 1621 in Yarmouth, EnglandParents: William Towne, Joanna BlessingDied: July 19, 1692 in Salem Village, Massachusetts Bay ColonySpouse: Francis NurseChildren: Rebecca, Sarah, John, Samuel, Mary, Elizabeth, Francis, Benjamin (and sometimes Michael) Early Life Rebecca Nurse was born on Feb. 21, 1621 (some sources give this as her baptism date), in Yarmouth, England, to William Towne and Joanna Blessing. Her entire family, including several siblings, immigrated to the  Massachusetts Bay Colony  sometime between 1638 and 1640. Rebecca married Francis Nurse, who also came from Yarmouth, around 1644. They raised four sons and four daughters on a farm in Salem Village, now  Danvers, Massachusetts, 10 miles inland from the bustling port community of Salem Town, now Salem. All but one of their children were married by 1692. Nurse, a member of Salem Church, was known for her piety but also for occasionally losing her temper. She and the Putnam family had fought in court several times over land. During the witch trials, many of the accused had been enemies of the  Putnams, and Putnam family members and in-laws were the accusers in many cases. Trials Begin Public accusations of witchcraft in Salem Village began on Feb. 29, 1692. The first accusations were leveled against three women who werent considered respectable: Tituba, an Indian slave; Sarah Good, a homeless mother; and Sarah Osborne, who had a somewhat scandalous history. Then on March 12, Martha Corey was accused; Nurse followed on March 19. Both women were church members and respected, prominent members of the community. Arrested A warrant issued on March 23 for Nurses arrest included complaints of attacks on Ann Putnam Sr., Ann Putnam Jr., Abigail Williams, and others. Nurse was arrested and examined the next day. She was accused by townspeople Mary Walcott, Mercy Lewis, and Elizabeth Hubbard as well as by Ann Putnam Sr., who cried out during the proceedings to accuse Nurse of trying to get her to tempt God and dye. Several spectators adopted head motions indicating that they were in Nurses thrall. Nurse was then indicted for witchcraft. On April 3, Nurses younger sister, Sarah Cloyce (or Cloyse), came to Nurses defense. She was accused and arrested on April 8. On April 21, another sister, Mary Easty (or Eastey), was arrested after defending their innocence. On May 25, judges John Hathorne and Jonathan Corwin ordered the Boston jail to take custody of Nurse, Corey, Dorcas Good (Sarahs daughter, age 4), Cloyce, and John and Elizabeth Parker for acts of witchcraft committed against Williams, Hubbard, Ann Putnam Jr., and others. Testimony A deposition written by Thomas Putnam, signed on May 31, detailed accusations of torment of his wife, Ann Putnam Sr., by Nurses and Coreys specters, or spirits, on March 18 and 19. Another deposition detailed accusations of afflictions on March 21 and 23 caused by Nurses specter. On June 1, townsperson Mary Warren testified that George Burroughs, Nurse, Elizabeth Proctor, and several others said they were going to a feast and that when she refused to eat bread and wine with them, they dreadfully afflicted her and that Nurse appeared in the room during the taking of the deposition. On June 2, Nurse, Bridget Bishop, Proctor, Alice Parker, Susannah Martin, and Sarah Good were forced to undergo physical examinations by a doctor with a number of women present. A preternathurall Excresence of flesh was reported on the first three. Nine women signed the document attesting to the exam. A second exam later that day stated that several of the observed physical abnormalities had changed; they attested that on Nurse, the Excresence ... appears only as a dry skin without sense at this later exam. Again, nine women signed the document. Indicted The next day, a grand jury indicted Nurse and John Willard for witchcraft. A petition from 39 neighbors was presented on Nurses behalf, and several neighbors and relatives testified for her. Witnesses testified for and against Nurse on June 29 and 30. The jury found Nurse not guilty but returned guilty verdicts for Good, Elizabeth How, Martin, and Sarah Wildes. The accusers and spectators protested loudly when the verdict was announced. The court asked the jury to reconsider the verdict; they found her guilty after reviewing the evidence and discovering that she had failed to answer one question put to her (perhaps because she was nearly deaf). She was condemned to hang. Massachusetts Gov. William Phips issued a reprieve, which was also met with protests and rescinded. Nurse filed a petition protesting the verdict, pointing out she was hard of hearing and full of grief. On July 3, the Salem Church excommunicated Nurse. Hanged On July 12, Judge William Stoughton signed death warrants for Nurse, Good, Martin, How, and Wildes. All five were hanged on July 19 on Gallows Hill. Good  cursed the presiding clergyman, Nicholas Noyes, from the gallows, saying if you take away my life God will give you blood to drink. (Years later, Noyes died of a brain hemorrhage; legend has it that he choked on his blood.) That night, Nurses family removed her body and buried it secretly on their family farm. Of Nurses two sisters who also were charged with witchcraft, Easty was hanged on Sept. 22 and Cloyces case was dismissed in January 1693. Pardons and Apology In May 1693, Phips pardoned the remaining defendants accused of witchcraft. Francis Nurse died on Nov. 22, 1695, two years after the trials had ended. That was before Nurse and 21 others of the 33 who had been convicted were exonerated in 1711 by the state, which paid compensation to the families of the victims. In 1957, Massachusetts  formally apologized for the trials, but It wasnt until 2001 that the last 11 of those convicted were fully exonerated. On Aug. 25, 1706, Ann Putnam Jr. publicly apologized for the accusing of several persons of a grievous crime, whereby their lives were taken away from them, whom, now I have just grounds and good reason to believe they were innocent persons... She named Nurse specifically. In 1712, Salem Church reversed Nurses excommunication. Legacy The abuses of the Salem witch trials contributed to changes in U.S. court procedures, including the guarantee of the right to legal representation, the right to cross-examine one’s accuser, and the presumption of innocence instead of guilt. The trials as a metaphor for the persecution of minority groups remained powerful images into the 20th and 21st centuries, particularly in playwright  Arthur Millers The Crucible  (1953), in which he used events and individuals from 1692 allegorically for the anti-communist hearings led by Sen.  Joseph McCarthy  during the  Red Scare  of the 1950s. The Rebecca Nurse homestead still stands in Danvers, the new name of Salem Village, and is open to tourists. Sources Salem Witch Trials: American History. Encyclopedia Britannica.The Witchcraft Trial of Rebecca Nurse. History of Massachusetts blog.An Unexpected Turn in the Trials. The Salem Journal.

Friday, May 15, 2020

Boston Massacre Another American Revolution - Free Essay Example

Sample details Pages: 6 Words: 1668 Downloads: 6 Date added: 2019/08/16 Category History Essay Level High school Tags: Boston Massacre Essay Did you like this example? On the fifth of March, 1770, a patriot mob began to harass a British sentry outside the Custom House on King Street in Boston, Massachusetts. As the harassment escalated, Captain Thomas Preston was called for backup. During the confrontation, among the shouts and yelling, there were cries for the squad to â€Å"fire!†. Don’t waste time! Our writers will create an original "Boston Massacre: Another American Revolution" essay for you Create order The squad responded to this command and ended up killing several colonists. A black sailor names Crispus Attucks, ropemaker Samuel Gray, mariner James Caldwell were instantly killed. Samuel Maverick and Patrick Carr were mortally wounded and would die later. The â€Å"Massacre†, as it was named later, led to a concerted effort by resistance leaders to inspire the â€Å"ire of citizenry†.   Speeches, demonstrations, and propagandistic images fueled the growing flames of discontent towards the monarchy. In the end, this â€Å"massacre† and the anger resulting from it were integral in the march towards the eventual Revolutionary war.   Tensions in Boston, 1770, were high. During this time, over two thousand British soldiers were occupying the city of Boston, which was populated by by over sixteen thousand colonists. The soldiers were present in order to enforce Britain’s laws, which the colonists were rebelling against. They found the taxes repressive and rallied over the slogan â€Å"no taxation without representation†. Skirmishes, a fight between small bodies of troops, especially advanced or outlying detachments of opposing armies, between British and soldiers became very common. They also became popular between patriots, who were loyal to the colonies, and loyalists, who were loyal to Britain. In order to protest these taxes, patriots vandalized stores that sold British goods and intimidated their customers.   On February 22, a group of protesters of patriots attacked a store owned by loyalists. A customs officer, Ebenezer Richardson, made an attempt to break up the riot. He fired out his window and onto the crowd below. His gunfire struck and killed Christopher Seider, an eleven year-old boy, who was in the crowd. This attack further enrage patriots and protesters, and helped escalate their protests. Shortly after this event, another fight broke out between local workers and British soldiers. No serious injuries resulted from it, but it helped set up the violence that was yet to come.   On the fifth of March, 1770, Private Hugh White was guarding the Custom House on King Street. The Custom House was containing the King’s money. Shortly after White was stationed at his post, a group of colonists joined him, and threatened violence. The violence was much more aggravated than previous encounters, due to recent events leading up to the riot. After a short amount of violent barating from the colonists, White fought back and struck one of the colonists with his bayonet. In response to this, protesters threw snowballs, ice, and stones at him. Bells rung through the street, and sent a rush of male colonists to the streets. The bells were usually a warning for fire, so the men naturally responded to it.   As the assault on White continued, he fell and was forced to call for backup. In response to White’s panic, Captain Thomas Preston arrived at the scene with several British soldiers. The Captain feared mass riots and was afraid that they would lose the King’s money, which was being stored in the Custom House. Both the colonists and the soldiers feared that bloodshed was inevitable. During the confrontation, colonists were reported to have dared the soldiers to fire, and other to have begged them to hold their fire. Captain Thomas Preston later revealed that he was told the colonists had a plan to â€Å"carry White off his post and murder him†. The violence soon escalated, and the protesters attacked the soldiers with stick and clubs. As this ensued, someone supposedly yelled â€Å"fire!†. The reports were mixed on which side ordered the command, or if the shot was intentional or not. After the first shot, other soldiers opened fire on the crowd. The gunfire struck and killed five colonists were killed, and six were wounded. The dead colonists included; Crispus Attucks, Patrick Carr, Samuel Gray, Samuel Maverick, and James Caldwell. Crispus Attucks was one the first to die, and was of African and Native American descent. These deaths are commonly believed as the first deaths of the American Revolution. From the colonist’s point of view, the violence seemed to be caused by the soldiers (Appendix), but Captain Thomas Preston’s account tells a different story. He claims that there was never any intention to ensue violence of any form. He also makes the claim that he never order his men to â€Å"fire†. The Captain claims that the colonists threatened and instigated the soldiers with phrases like; â€Å"lobster scoundrels† or â€Å"come on, you rascals†. He then stated that he attempted to persuade the men to retire peacefully, but clearly failed. Captain Preston was then asked by his men is the guns were loaded, he replied yes, and he was also asked if they should fire, to which he replied no. He claimed to have witnessed a soldier to receive a serious blow from one of the protesters, which caused the soldier to veer a bit to the side and fire into the crowd. The Captain questioned this, but was then, too, hit with a club. Captain Thomas Preston claimed that the soldiers’ lives were in imminent danger and pressured into firing by the protesting crowd of colonists. The colonists yelled phrases like; â€Å"damn your bloods- why don’t you fire?†. Shortly after this confusion, three or four soldiers fired into the crowd. He claimed to have yelled â€Å"hold your fire† and â€Å"stop firing†, but it was too late. Following this riot, four to five thousand people gathered on the street next to the â€Å"massacre†. They claimed to have wanted the deaths of the Captain and his men. After hearing this, the soldiers dispersed out of fear. On October 24, 1770, about seven months after the â€Å"massacre†, the trial of the soldiers accused of murdering the colonists was taken place. One of the people questioned was Samuel Hemmingway, who decided to testify against the British soldiers, specifically Matthew Kilroy. Kilroy shot and killed Samuel Gray, the owner of a ropemaking shop. In Hemingways testimony to the crown, he stated that one evening, about a week before the â€Å"massacre†, he overheard Killroy say that â€Å"he would never miss an opportunity to fire on the inhabitants† and that he had wanted to ever since he landed†. A contrasting testimony to this is that of Dr John Jeffries for the Defense. Dr Jeffries was Patrick Carr’s surgeon, and operated on him after he was shot, and died four days later. Jeffries testifies that Patrick was new to this kind of violence, since he was originally from Ireland. He testifies that during his last conversation with Carr, he forgave the man who shot him, and understood that the man was just defending himself against the protesters. For this reason, Carr was denounced by Samuel Adams and other patriots, who were angry that they could not use him to stir up more anti-british sentiments. In the depositions of John Wilme and Jeffrey Richards, they claimed that the soldiers were making threatening claims and actions against the colonists. Wilme claimed that about ten days before the â€Å"massacre†, Christopher Rumbly of the 14th regiment talk very much against Boston. Wilme claimed that he heard Rumbly say that â€Å"blood will run in the streets of Boston†. Jeffrey Richardson made a somewhat similar statement, and he claimed that on the Friday before the violent protest, eight to ten armed soldiers came to Mr. John Gray’s ropemaking shop. They challenged the soldiers to fight them, and tried to instigate violence. The deposition of Ebenezer Bridgham and argument of Josiah Quincy for the defense, found the colonists to be at fault. Bridgham testified that the soldiers were defending themselves against the colonists, as they were striking their guns with sticks. He claimed the patriot group were calling them cowards for bringing arms against unarmed men, and daring them to fire as they hit them. Josiah Quincy made a similar argument for the defense, claiming that the words the colonists used to berate the British sentry were so demeaning and disrespectful helped to provoke the soldiers into such violence. He also claimed that the soldiers tried to procure peace by saying things such as â€Å"if they molest me upon my post, I will fire!† and â€Å"stand off! I am upon my station!†. Quincy suggest that these words served as a warning to colonists, and the soldiers were only trying to do their jobs. The verdict was announced nine months after the â€Å"massacre†, the fifth of December, 1770. The jury that decided the verdict did not contain a single Boston citizen. Matthew Kilroy and Hugh Montgomery were found guilty of manslaughter while the other six soldiers, James Hartigan, William McCauley, Hugh White, William Warren, and John Carroll, were acquitted. Kilroy and Montgomery were able to avoid the death penalty through â€Å"benefit of the clergy†, which was used a loophole for first-time offenders. It was an early English law which held that non-religious courts did not have any legal power over clergymen. After the soldiers had â€Å"prayed the clergy†, each one was branded on the thumb with and â€Å"M†, for manslaughter. This would be visible for any future oaths or handshakes, marking them as killer for the rest of their lives. Yet for many colonists, the branding was still not enough to bring justice to the victims of the â€Å"massacre† and the town of Boston. The violence of the riot and the treatment of the soldiers both increased the feelings of turmoil in Boston, and the colonies in general. The new laws and taxes enforced by Parliament onto the colonies already brought anger to the colonies, but the violence by the British soldiers helped increase this hatred towards the crown. The anger and feelings of injustice fueled by the â€Å"Boston Massacre†and the trial that followed helped add fuel to the growing fire that was the American Revolution.

Wednesday, May 6, 2020

How do Gold Cadillac and Country Lovers differ in their...

How do Gold Cadillac and Country Lovers differ in their presentation of Prejudice? Both Mildred Taylor (Gold Cadillac) and Nadine Gordimer (Country Lovers) grew up in cultures where racism was a part of their everyday life. This theme of racism is reflected strongly in their stories. Mildred Taylor’s experience of racism in the Southern States of America is reflected in the themes and setting of her writing. She was born in 1943, Jackson, Mississippi, the strongest racial prejudice sate found in America. In many of her college preparatory classes, Mildred Taylor was the only black student. She often found herself painfully embarrassed by the lacklustre portrait of black people as presented in history class. Similarly,†¦show more content†¦Due to the system of apartheid, Thebedi and Paulus cruelly murdered an innocent child. This not only destroys their reputation, but it also destroys Thebedi’s husband. He not only loved his wife, but he cared for the baby deeply, even though in his mind he had a feeling it was not his. The narrator of the Gold Cadillac is a young girl, perhaps the age of seven. We see the racial prejudice in the story as a young girl would see it, confused and baffled. This allows the story to me more truthful and innocent. Throughout, the little girl does not understand what is happening, and why is it is happening, especially because life in the South is different from the North. The action’s represented by the young girl, reflects how Mildred Taylor was when she was young. â€Å"In my early years the trip was a marvellous adventure†¦ but I grew up to realise†¦ that the jugs of water and lemonade were because we could not drink from the fountains marked ‘white only’† However, unlike Mildred Taylor, Nadine Godimer’s life does not mirror any of the characters presented in Country Lovers. The energetic tone of Gold Cadillac is achieved through dialogue. The reader is immediately engaged with the details of the family life. This reflects family ties and relationships, which produces a warm impression to the reader. We learn from the tone and the dialogue thatShow MoreRelatedMarketing Management 14th Edition Test Bank Kotler Test Bank173911 Words   |  696 Pagesis the process of aggressive selling and promotion to encourage the purchase of products that might otherwise be unsought by the consumer Answer: C Page Ref: 5 Objective: 2 Difficulty: Easy 5) ________ goods constitute the bulk of most countries production and marketing efforts. A) Durable B) Impulse C) Physical D) Luxury E) Intangible Answer: C Page Ref: 5 Objective: 2 Difficulty: Easy 6) As economies advance, a growing proportion of their activities focuses on the productionRead MoreMarketing Management Mcq Test Bank53975 Words   |  216 Pagesdecreases Answer: D Page Ref: 244 Objective: 2 AACSB: Reflective thinking Difficulty: Moderate 3 Copyright  © 2012 Pearson Education, Inc. Publishing as Prentice Hall 10) When a marketer expresses his or her vision of what the brand must be and do for consumers, they are expressing what is called ________. A) a brand promise B) a brand personality C) a brand identity D) a brand position E) a brand revitalization Answer: A Page Ref: 245 Objective: 2 AACSB: Analytic skills Difficulty: Easy 11)

Tuesday, May 5, 2020

CONTENT ON THE INTERNET FREE OR FETTERED Essay Example For Students

CONTENT ON THE INTERNET: FREE OR FETTERED? Essay Focus:This paper examines the nature of the problem caused by potentially offensive material on the Internet and summarizes current efforts to regulate content, along with reactions to those efforts. 1. Introduction: what is the problem?Earlier last year, anyone could have been forgiven for believing that the world had just discovered the Internet, and that it had, in the process, concluded that the Internet was awash with pornographic images, drugs information and general threats to the safety and good order of society. What was worse was that nobody appeared to be in charge of this new phenomenon: indeed, it was proudly proclaimed that no-one owns the Internet, except perhaps the millions of people throughout the world who contribute to it in various ways. This is seen in many quarters as its major benefit freely available information from numerous sources but it has also come rapidly to be regarded in some quarters as its most worrying feature. Everyone with access to the required technology is free to make material available via the Internet, and there appears to be no control over that material and so the cyberporn debate, amongst others, began on the WWW, in the media, an d in legislatures. As a result, suggestions have appeared which link the use of the Internet with the Oklahoma bombing, extremist political groups, the manufacture of ecstasy and other drugs, and with the ready availability of pornographic images and these are all problems which public libraries and schools are concerned about as they move towards providing access to the Internet. There were also fears that it was too easy to find this material inadvertently (as distinct from consciously searching it out): again it was felt that there was a threat to the innocent and the unwary, although an investigation, reported in the Guardian newspaper, estimated (Holderness, 1995) that the odds against finding a random pornographic image thus seem to be worse than 70,000:1. Given that a well-known British broadsheet newspaper recently listed the URL of a World Wide Web (WWW) site which included links to eight so-called top shelf magazines, inadvertent discovery can be regarded as a problem, although some commentators have denied this, saying that it requires effort to find these sites and to download images and so on. Inadvertent retrieval of offensive material is also less likely due to the increasing use of warnings placed at the start of WWW pages: my recent research suggests that the number of these warning signs appears to have grown considerably of 81 sites I investigated, 45% now have a warning notice which, amongst other things, requires users to be over the age of either 18 or 21. In some cases, users are required first to register by quoting a credit card number: this is not used to charge for access, simply to verify age, and a few sites have now begun to quote the Communications Decency Act as a reason for requiring proof of age. !Few if an y of the other sites actively prevent under-age users from accessing the pages, but at least there is no excuse for not knowing what the site contains. Of course, many would argue that such warnings will only serve to encourage access, especially by children and young people. It is not particularly difficult to find this material if one is consciously looking. The adult bulletin board systems advertise freely in many magazines, including some of the now well-established journals for the Internet, while telephone numbers of BBS and network addresses circulate freely in the newsgroups. On the WWW, the various search engines will retrieve Web pages with little difficulty, using keywords in sophisticated search strategies. Professor Harold Thimbleby suggested (Thimbleby 1995) at last years British Association meeting in Newcastle that 47% of the 11,000 most often repeated searches were pornographic, though it is very important to note that this does not indicate what proportion of the total number of searches this represents: unfortunately, Lycos will not release this information, so it is impossible to judge the relative extent of such searches (Whitney, 1996). Thus, enter the word sex on the Lycos search engine (which indexes over 130 million unique URLs, or Internet addresses) and you will told that there are 30,976 documents containing that term. However, of the first 50 URLs listed, 27 (54%) appeared not to contain pornographic images, but were instead either serious discussions of sexual matters, duplicate entries of one site, lists of newsgroups on the Internet, etc. Similarly, a search on drugs found 92% of the first 50 sites (17,504 were found) could not be considered as actively encouraging drug use, and of the first 50 documents listed under explosives, 60% stemmed from organizations with a legitimate interest in explosives such as professional institutions, etc. , although a number of the remaining sites were parts of The Terrorists Handbook, which does give recipes for bomb-making. The problem of accurately calculating the relative volume of potentially offensive material has confused the Internet since its growth first became noticeable. It is too easy to generate figures and then to use generalizations and apply them to the whole of the Internet to create the wrong impression, but it is often this false perception which generates so much concern in parents and legislators. This was a major criticism of the study by Marty Rimm last year which featured in Time Magazine , and was also used by US senators pushing through the Communications Decency Bill. Rimms study (Rimm, 1995) was interpreted by US Senators as proving that 83.5% of the Internet consisted of pornographic images, when in fact he only analyzed the adult sites and then extended his conclusion to the entire Internet. Examining only adult sites, it was hardly surprising that he could claim to have found a large percentage of such images. A more accurate figure has been calculated by Hoffman a!nd Novak , who point out that less than one-half of 1% (3% of 11%) of the messages on the Internet are associated with newsgroups that contain pornographic imagery. (Hoffman and Novak, 1995). The point appears to be that, while this material is available over the Internet, it is not there in the quantities which some people fear, though it is very difficult to change entrenched attitudes. A good friend who is a school librarian, told me recently that she is being given every encouragement to provide Internet access. Her first question was, But how do I stop the pupils finding all the pornography?. Once one page with the sought after material has been found, it is usually possible to link from that page to others on the same theme, just as one can follow citations in a journal article. Some WWW pages are simply that: links to other related pages, like bibliographies of their subject. The conclusion is that material which could give offense and which legislators in the UK, USA, Australia, Canada, Germany and New Zealand (to name but some of the countries actively investigating Internet content) are concerned about is there, but not in the quantities which some branches of the popular media would have us think. Having said that, it does appear that a lot of use is made of these sites, especially those providing the alleged pornographic images, though last year. The Guardian also found that the pornographic newsgroups generated much less traffic than, say a group listing job opportunities (Holderness, 1995). In a recent analysis, I found a high of 58,198 accesses per day and a low of 198 for 12 randomly chosen sites: the average daily figure for these sites was 14,578 accesses. Again, this figure must be treated cautiously, as it may not, in every case, represent the number of individuals accessing the site, but rather the number of times text or an image was!downlo aded: some accesses may result in multiple downloads. Some sites claim accesses far in excess of this: one million plus in a few months has been seen. This high level of demand is also a contributory factor in the rapid turnover of sites, which close down or are closed down regularly. The most frequent reason for closure is sheer overload on the server involved, which causes problems for other users: 41% of sites closed down in the course of one investigation and the single most frequently cited reason (58% of cases) was system overload. Concern over legal action or breaches of acceptable use policy tend to be less frequently cited as reasons for closure. The JANET Acceptable use policy in the UK already prohibits the use of JANET for a range of materials, including the obscene, libel and copyright infringement (UKERNA, 1995). We might also note that such sites have a relatively short life-span: 87% had been closed down within 6 months of start-up and 43% lasted only 2 months or less. So far, we have considered Internet access to the material which has caused most reported concern to various groups, but if we are considering the question of free or fettered access to networked resources, we might also look at a wide range of material which could be subject to criticism on completely different grounds, if only because of the rapidly increasing demands being placed on Internet bandwidth. Given that the original purpose of the Internet was academic research, why should such recreational material as home pages for football clubs, popular music groups, television or a students interests and hobbies be allowed space on servers? Somewhere on the Internet, Im told, is a list of one young mans CD collection: is this a sensible use of the resources? In the United States at least, the continuation of such sites (as well those containing the potentially more offensive material) are justified under the First Amendment, and they are symptomatic of the change in the na!ture of t he Internet from academic research tool to multi-media information resource. I want simply to raise the question here because it is part of the wider question of Internet regulation some universities do not permit students to maintain their own home pages because it is an inappropriate use of school resources. A further step in this direction has been taken by one British university which logs the thirty most popular URLs each week. The resulting list is examined and access to any sites which contravene user regulations may be blocked. This includes those sites which it is felt constitute a waste of university computing resources, and deliberate or reckless overloading of access links or of switching equipment is prohibited under the UKERNA JANET Acceptable use policy. So, to summarize this first part, we can say that there is material available over the Internet which causes concern in some quarters, either because of its content or because it is seen as a less than appropriate use of computing resources. We can also note that some degree of regulation is already in effect, especially in the university sector, though increasingly service providers are taking note of the problem. CompuServe, a major Internet provider, announced that it was blocking access to some 200 newsgroups, following complaints from the German Government about obscene materials which were being accessed from Germany. CompuServe say that there is no way in which they can selectively prevent access by users in one country, so their action applies to all CompuServe users. In addition, the German Land of Baden-Wrttemburg is investigating Deutsche Telekom to see if it can be considered as assisting in the dissemination of the views of a US-based neo-Nazi (Schofield, 1996)!. Comparing the two plays Essay4. How can we control the Internet?With that in mind, let us turn to ways in which some form of control can be exercised over the material which is currently found on the Internet. 4.1 Self-regulationThe most time-honored method is that of self-regulation: individuals or systems managers and administrators control what is made available from the systems under their control. It is they who have been responsible for most of the closures of sites which I mentioned earlier, primarily because of the load such sites place on the server, or because the material does not accord with an acceptable use policy. Many system administrators admit, however, that it is technically very difficult to control which sites their users access (as distinct from the material which users place online), though acceptable use policies are similarly relevant and there is some evidence of various monitoring procedures (which are made known to users) to ensure that use policies are adhered to. It would appear from a 1992 study, however, that obscene or harassing material is not the primary concern of systems administrators: the most frequently occurring incidents are virus infection and the printing o!f non-academic materials on university-owned printers (Stager, 1992). Complaints that, for example, the contents of BBS were obscene were mentioned by less than one third of the computer centre directors in this survey. There is also, as Stager has pointed out, a potential source of confusion in the minds of computer centre directors. More than two-thirds of those asked agreed that university-operated bulletin boards are subject to restrictions if their content is clearly libelous or obscene, but less than half agreed that they had a general understanding of what my campus community considers obscene. Again, we have the problem of defining our terms. I have already mentioned the growing use of warning signs as an example of self-regulation: they do not prohibit access, but no-one can be under any illusion about the content of such sites. Acceptable use policies on the part of organizations (such as universities and private sector companies) and of service providers must also count as self-regulation, and there are instances where these have been used to prohibit access to, and provision of, material judged to be offensive and/or illegal. The UKERNA guidelines are an example, since it as a result of these that many UK universities block access to the more controversial newsgroups, but many such institutions and providers have developed similar policies: many of these are available on the WWW. The British Computer Societys Schools Committee has produced guidelines to prevent computer misuse which recognize the existence of potentially offensive material and give advice on the development of a suitable policy (British Comput!er Soci ety Schools Committee). For many Internet and WWW users, self-regulation is the only way in which to control content, anything else being seen as an infringement of freedom of speech or civil liberty (especially in the United States). In the United Kingdom, this seems, for the moment, to be the route which will be taken by Government, which feels that a code of conduct is the best route forward, and presumably the Internet industry will now sit down to establish that code, preventing the storage and distribution of offensive material. 4.2. Parental/Teacher controlAs Internet access becomes a growing feature of schools and homes, parents worry about what their children are seeing and reading in class or in the privacy of their rooms, and teachers are concerned about the implications if, during one of their classes, a pupil stumbles across or goes looking for a pornographic image, a discussion on abortion rights, or where to buy marijuana. Many have argued that, rather than introduce sweeping legislation which will, it is claimed, be the end of the Internet, parents and teachers should take responsibility for their childrens actions. The analogy is often drawn with teaching our children to cross the road safely and to deal with traffic: we dont let them wander off on their own, but show them the dangers and how to avoid them. Gradually, as they learn and mature, they are allowed to do things on their own. Similarly, it is argued, parents should accompany their children on their first Internet surfing, pointing out the dangers in the process. To help parents and teachers in this, a number of software packages have been developed to shut out access to the more offensive material. Programs like NetNanny, CyberSitter, SurfWatch and Internet Filter block access to sites containing certain listed words: this stop list comes built-in to the software, but it can be added to by parents to suit specific requirements. In some cases, attempts to access prohibited sites are logged and can be inspected by parent or teacher, which could, if it was known, help to stop such attempts. There is even a version for business use: presumably it could also be used to prevent staff from wasting time surfing the Net!4.3 Government legislationHowever, anyone who has kept an eye on the scene over the last twelve months will be aware that the big (and now rather complicated) story in controlling the Internet is the passage of the Communications Decency Act (CDA) through the US Senate, initially accompanied by two other broadly similar bills, plus a fourth which is believed to take a slightly different line and could be more acceptable to the majority of Internet users. The amended CDA was passed by a single vote in a House/Senate conference committee and became effectively an amalgam of two bills passed by the House and the Senate respectively. The three most restrictive bills, which have come in for the most criticism, all seek to make it illegal to transmit indecent material and would make both online service providers and content providers liable. The fourth bill was thought to avoid such action and to empower parents and teachers to control Internet access. The CDA was passed at the beginning of February 1996, and signed into law on 8 February. It was immediately the subject of a law suit to the US Attorney General by the American Civil Liberties Union and 19 other complainants, who have succeeded in having some parts of the act declared unconstitutional: as a result, it is in abeyance at the time of writing. A similar suit has been filed by a coalition of industry and online organizations, including the American Library Association. The chief criticism directed at the act relates to its attempts to make service providers liable and to the fact that, at the last minute, the word indecent was substituted for the word obscene. The argument against this development is that the concept of indecent material is vague but more wide-ranging than obscene, and that it would include not only sexually explicit material but texts which are now regarded as classics of literature. The oft-quoted example is that this bill would prohibit the distribution of such classic works of fiction as Catcher in the Rye or Lady Chatterleys Lover , when most thought that this was a battle already won. The bill would also give the US Federal Communication Commission some authority to regulate online speech. It should be noted that opposition to the CDA is not limited to the online community and such organizations as Computer Professionals for Social Responsibility, the American Civil Liberties Union, or the Center for Democracy and Technology. Newt Gingrich has already suggested that such efforts are unconstitutional and the US Justice Department has said that the legislation is unnecessary (it believes it has all the legislation they need to prosecute where necessary). Other opponents have said that such legislation will only result in the creation of an underground Internet, where the material objected to will still circulate freely and could still be accessed by those in the know. Not only would this legislation prohibit literary works, but also the serious discussions of many topics and problems to do with sexual matters. There would be a threat to AIDS information, mutually supportive discussions of abuse and many other online forums which, enthusiasts claim, can be very important to those affected. Its effect on discussions of abortion rights have already been challenged as a breach of the US constitution. This is currently the only impending legislation which seeks to control content on the Internet: many other countries are investigating the question, and the UK government, for example, would prefer to establish a code of conduct, as I indicated earlier. However, I think we can be sure that, if the USA passes this or similar legislation, many other countries will face considerable pressure to do likewise: the pressure is already there in the French efforts to introduce European legislation. 5. ConclusionThe question of a free or fettered Internet is not an easy one: so many variables come into play, and in many instances we can only have a personal reaction to the problem of offensive material on computer networks. The overwhelming majority of Internet users agree on the need to protect our young people from this material, but the way to do so, they argue, is to involve parents and teachers and to educate our children, just as we educate them about the dangers of road traffic. The problem, it is argued, is not as serious as some would have us think, and legislation is too big a hammer for this particular nut: it would destroy more than it would protect. The next few months are going to be both interesting and crucial to the future shape of the Internet. ReferencesBritish Computer Society Schools Committee (1995) Preventing the misuse of computers in schools, Swindon, British Computer Society. CCTA Ethics Collaborative Open Group (1995) Superhighways Ethics Project: ReportFederal Department of Communications and the Arts, Australia (1995). Consultation paper on the regulation of on-line information services, 7 July 1995. The Guardian (1996). Singapor to censor Internet. 6 March, 12. Hoffman, D. and Novak, T. (1995) A detailed analysis of the conceptual, logical, and methodological flaws in the article: marketing pornography on the information superhighwayHolderness, M. (1995) In search of a sea of sex, The Guardian, 2 August,19. (Also available through the Guardian Online Archives search facility) Information Highway Advisory Council (1995) Connection, community, content: the challenge of the information highway. Final report of the Information Highway Advisory Council, Ottawa, Industry Canada. Merel, P. (1995) Response to consultation paper on the regulation of on-line information services, Electronic Frontiers AustraliaRimm, M. (1995) Marketing pornography on the information superhighway: a survey of 917,410 images, description, short stories and animations downloaded 8.5 million times by consumers in over 2000 cities in forty countries, provinces and territoriesSansom, G. (1995) Illegal and offensive content on the information highway: a background paper. Ott awa, Industry Canada; Spectrum, Information Technologies and Telecommunications Sector. Schofield, J. (1996) This comment is free for now, The Guardian Online, 26 JanuaryStager, S.F. (1992) Computer Ethics violations: more questions than answers. EDUCOM Review , 27 (4), 1992,Thimbleby, H. (1995) Problems in the global villageUKERNA (1995) JANET acceptable use policy, London, UKERNA, Whitney, T. (1996) Personal communication, 18 January.