Friday, March 13, 2020
Free Essays on Islam Jibreel Hadith
Man has contemplated the idea of faith through out human history. From the moment he realised his existence he began to question, who are we? What are we? where are we going in this vast ocean of obscurity?. It is only through a select group of people where we can receive these answers of infallible truth. People who have chosen to accept greatness and people who have had greatness thrust upon them. To further understand the motives of such people we must further understand the definition of faith from hemisphere to hemisphere. According to Collins English Dictionary faith from a purely contemporary Western point of view ââ¬Å"Faith: n. which describes a strong or unshakeable belief in something, esp. without proof or evidence, 2.a specific system of religious beliefs, 3. In Christianity, a trust in God and in his actions and promises, 4. A conviction of the truth of certain doctrines of religion, esp. when it is not based on reason, 5. Complete confidence or trust in a person, remedy etc. 6. Any set of firmly held principles or beliefs. 7. Allegiance or loyalty, as to a person or cause. From the Anglo-English word ââ¬Å"feidâ⬠which means indeed or really or Latin ââ¬Å"Fidesâ⬠which means trust or confidence. â⬠To explain faith from an Islamic point of view through a simple definition as listed above will not do the complex concept justice, In Islam faith takes on many shapes, forms, colours and manifestations. It is a blend of harmony and balance that can only be explained from a divine dialogue between the final Messenger of Allah, The Prophet Muhammad (peace be upon him) and the Arch Angel Jibreel, the following hadith has been narrated by Hadrat Umar (RA) and compiled by Imam Sharaf al-Din Yahya and Ibn Sharaf al-Nawawi. ââ¬Å"It was related on the authority of Umar (RA), who said: One day, as we were sitting with the Messenger of Allah, there came upon us a man in very white clothes and intensely black hair. No sign of journey was... Free Essays on Islam Jibreel Hadith Free Essays on Islam Jibreel Hadith/ Man has contemplated the idea of faith through out human history. From the moment he realised his existence he began to question, who are we? What are we? where are we going in this vast ocean of obscurity?. It is only through a select group of people where we can receive these answers of infallible truth. People who have chosen to accept greatness and people who have had greatness thrust upon them. To further understand the motives of such people we must further understand the definition of faith from hemisphere to hemisphere. According to Collins English Dictionary faith from a purely contemporary Western point of view ââ¬Å"Faith: n. which describes a strong or unshakeable belief in something, esp. without proof or evidence, 2.a specific system of religious beliefs, 3. In Christianity, a trust in God and in his actions and promises, 4. A conviction of the truth of certain doctrines of religion, esp. when it is not based on reason, 5. Complete confidence or trust in a person, remedy etc. 6. Any set of firmly held principles or beliefs. 7. Allegiance or loyalty, as to a person or cause. From the Anglo-English word ââ¬Å"feidâ⬠which means indeed or really or Latin ââ¬Å"Fidesâ⬠which means trust or confidence. â⬠To explain faith from an Islamic point of view through a simple definition as listed above will not do the complex concept justice, In Islam faith takes on many shapes, forms, colours and manifestations. It is a blend of harmony and balance that can only be explained from a divine dialogue between the final Messenger of Allah, The Prophet Muhammad (peace be upon him) and the Arch Angel Jibreel, the following hadith has been narrated by Hadrat Umar (RA) and compiled by Imam Sharaf al-Din Yahya and Ibn Sharaf al-Nawawi. ââ¬Å"It was related on the authority of Umar (RA), who said: One day, as we were sitting with the Messenger of Allah, there came upon us a man in very white clothes and intensely black hair. No sign of journey was...
Wednesday, February 26, 2020
Pick a chemical industry or book chapter Essay Example | Topics and Well Written Essays - 1500 words
Pick a chemical industry or book chapter - Essay Example Modern technology, as we know it today, greatly depends on silicon-based products. The majority of building stone, clays and silica are the silicon products and vastly used in the construction industry. Glass, polymers, silicon-metals and ceramics and semiconductors made from silicon are low cost allow for high quality packaging (Wilamowski & Irwin 145). The final commodities of silicon are absolutely necessary in the modern world because of our immense dependence on this element. If silicon based commodities are short the world economy might collapse. Technology and construction industry cannot survive without silicon-based products. Structural compounds such as silicate minerals or silica, also known as crude silicon dioxide, form the backbone of the construction industry. Portland cement is a crucial and commodity of silicon. It is usually combined with gravel and sand to make concrete. Silicon is also used to make a ceramic called firebrick. Natural aluminium phyllosilicates form s an essential component of the whiteware ceramics. Similarly porcelain is often used in art projects and for domestic purposes. Silica-based soda lime glass or the common glass that is used in homes is also a silicon product. And finally fiberglass, glass fibers and optical fibers (including glassful) are the end products of silicon element that form the backbone in ceramics industry. The majority of industry produced silicon is kept in ferrosilicon alloy form. About 15% of the worlds production of metallurgical grade silicon is used in semiconductors. The element used for this purpose is highly refined and only forms a fraction of the total production. Siliconââ¬â¢s crystalline nature gives it significant electrical and mechanical advantages (Maluf & Williams 13). The monocrystalline silicon form is used in integrated circuits and in terms of leverage (comparing the quantity produced against its usage) the highly refined form is extremely valuable in the electronics
Sunday, February 9, 2020
Tsunami Essay Example | Topics and Well Written Essays - 1000 words
Tsunami - Essay Example People who lost their lives were as many as 250 000 across the shores of the Indian ocean and millions of people were displaced from their homes and their livelihoods destroyed. Countries that were directly affected by the earthquake include Indonesia, Maldives, the Seychelles, Somalia, Sri Lanka, Thailand and Yemen. The livelihoods of people were greatly affected especially the poor people who depended on the ecosystem and natural resources for survival. People lost their food stores and the shops in the coastline were greatly affected. Impact on environment/pollution Environmental impact assessment showed that there are great damages to both human and natural resources. The damage could have been larger but the natural resources also provided a first line defense to the tsunami effects. The damage needed an environmental reconstruction programme that cleaned the hotspots, carried the rehabilitation of the livelihoods and ecosystem, and strengthens environmental policies. The water and soils within the periphery of the coastal systems were greatly contaminated thus interfering with the coastal ecosystems (Samarajiva 14). Inland waters, wetlands, and agricultural lands that support people with food were greatly salinated thus affecting the agricultural yields. Shallow wells and ground water supplies in the small islands and in the coastal lands were greatly affected since their fresh waters were also salinized with the waters that overflowed from the ocean. About 90% of the toilets on the badly affected highlands and coastal regions lost and the waters contaminated with sewage. The living conditions were greatly affected since the survivors stood great chances of contaminating water borne diseases. In Sri Lanka; more than 25% of the wells become contaminated when the waters from the saline Indian Ocean and sewerage treatment systems mixed with them (UNEP 15). Waterborne diseases and vector borne diseases increased considerably resulting to high mortality rates along affected coastlines. The environmental infrastructure like water and sanitation systems together with disposal sites were tampered and greatly damaged. Contamination from waste deposits caused health and environmental problems that threatened livelihoods for several years. Most lives were saved due to the enormous humanitarian response that was quickly mobilized across the globe with appropriate mitigation measures put in place to improve environmental standards (Dawson & Stewart 17). Production of goods and services/Economic impact The economic activities in the coastline and the coastal highlands were greatly affected by the tsunami. Sources of daily income and food were totally destabilized leaving people vulnerable to hunger and thirst. Many of the victims were involved in fisheries prior to the attack but they are left with no source of income since their boats were destroyed and the aquatic system destabilized. Mangrove systems and the aquaculture provided a sustainable balance in the coastal systems that were greatly interfered with in the course of mangrove attack (UNEP 19). Rice crops in islands were seen to be yellowing in the field few weeks after the deadly tsunami, an indication that they were drying out. Soil conditions doubled their salt content needed by plants
Thursday, January 30, 2020
Psychological Factors of the Issue Essay Example for Free
Psychological Factors of the Issue Essay Psychological factors include motivation, perception, learning, beliefs and attitudes. These factors are largely unconscious and that a person cannot fully understand his own motivations. People decide based on what h perceives as dictated by his environment that serves as the stimulus and not necessarily that which is real. In marketing, perceptions are more important than reality. Characteristics of Adolescence Adolescence is often a period of stress and conflict, particularly in Western society. The adolescent confronts a host of new, varied and difficult problems of adjustment within a brief period of time. The adolescent attempts to acquire a sense of identity, a sense of who one is and where one is going. Every adolescent wants to be popular. They commonly think, â⬠What can I do to have all the kids at school like me? â⬠ââ¬Å"What can I do to feel I belong to a group? â⬠ââ¬Å"How can I be popular with both girls and boys? â⬠ââ¬Å"What kinds of clothes will make me feel like I am one of them? â⬠Sometimes adolescents go to great lengths to be popular. In some cases, parents go to even greater lengths to try to insulate their adolescents from the rejection and to increase the likelihood that they will be popular. Students show off because it gets attention and makes their peers laugh. Parents set up elaborate parties, buy clothes for their teens and drive adolescents and their friends all over in the hope that their sons and daughters will be popular (Santrock, John). Dr. Riesman in his study of the basic changes taking place in the American characters during the twentieth century (that is, from inner-directed to outer-directed) found that our growing pre-occupation with acts of consumption reflects the change. This pre-occupation, he noted, was particularly intense (and intensively encouraged by product makers). He characterized the children of America as ââ¬Ëconsumer trainees. ââ¬â¢ (Santrock, John). The adolescent confronts a host of new, varied and difficult problems of adjustment within a brief period of time. Physiological changes ââ¬â rapid body growth, sexual maturity, increases in sex hormonesoften precipitate special conflicts and self-doubts. Almost simultaneously, the adolescent is expected to achieve independence from the family, establish satisfying relationships with peers of both sexes, decide on ââ¬â and prepare for ââ¬â a set of consistent moral principles to guide decisions and actions. Fashion, therefore, lures the adolescents to try something new and not get stuck with the traditional ways of dressing and doing things. Back then in the 60s, the clothes that the ââ¬Å"old schoolâ⬠hip hop artists donned were expressions of individuality but they even carried a purpose which was a functional one. The Puma branded sneakers that sported fat-laces and sweatsuits were all the rave back then. The colorful clothing which also had resemblance to the beautiful graffitis on the walls were also very popular back then. The dress-code of being loose and comfortable became a style of dressing which identified all those people as exceptional and unpretentious. Because the people in the ghettos had limited resources, they made the most out of what they had. The style and the fashion sense that they sported spoke of a willingness to create a style of their own despite several constraints (Wikipedia 2004). In the hip-hop culture today, fashion has undoubtedly become more stylish, more pronounced and more accessible in this day and age. It has indeed come a long way in the past twenty or so years. Ever since its inception, it has been proven to be a driving force in the fashion scene. From its modest beginnings in the ââ¬Å"ghettosâ⬠of the African-American suburbs of New York, the hip hop fashion has transcended race, culture, gender as well as international borders as you will now see different ethnicities and races who have adopted their own hip hop style. The one thing that will immediately identify a person if he listens to hip hop or not is by the way they dress and what they put on themselves. Today, the hip hop clothing and apparel industry grosses over a billion dollars but despite its popularity among people who have the money to spend for the type of look they are sporting, it is still accessible by even the youngest boy in hopes of making it big in the future as an advocate of the hip hop music and fashion (Wikipedia 2004)
Wednesday, January 22, 2020
Evening of Bluegrass :: essays research papers
An Evening with the Dickel Brothers It was 9:30 on a chilly Thursday night when our little trio finally found a parking space in the Richmond District. Already drunk, we wove quickly through the neighborhoods by foot. Finally we arrived at the Last Day Saloon, uneasy that we had not purchased tickets in advance for what was sure to be one of the highlights of this years San Francisco Blue Grass and Old Time Festival ââ¬â the fabulous Dickel Brothers. Our fears of a sellout were quickly allayed, as was the sense of unease that having four quarts of Irish whiskey strapped to ones person tends to instill. We were home free, for now, anyway. After purchasing our tickets, we proceeded upstairs to catch the opening act, which, to our delight, turned out to be five perfectly agreeable old geezers calling themselves the Roadoilers. Their sound was pure old-school bluegrass, heavy on melody, light on lyrics. Their artful rendering of the Bill Monroe standard Uncle Penn, made for a memorable encore. Next up, we were subjecte d to the shrill vocal styling of The Stairwell Sisters. Donââ¬â¢t get the wrong idea, I am certain that the particular brand of old-time mountain music that the sisters are peddling is faithfully rendered. The problem for me was simply that the clog-happy cutsieness of their presentation was enough to make even the most dyed in the wool harmony junkie run gasping for the nearest fire exit. And that is exactly what we did. à à à à à We figured the most sensible course of action was to hole up in the alleyway outside the club and wait for the fervent toe tapping to subside. I had barely finished my first cigarette when a lanky figure dressed something akin to Tom Joad on his way to church approached our little assemblage. I recognized him at once as Stephen Dickel, banjo player of the headlining band. ââ¬Å"Anyone know where a fellah can get a bottle of whiskey in this neighborhood?â⬠, he asked plaintively. Jill shrugged, explaining that we were from the East Bay, and thus, had little idea where he might try. Jill, apparently sensing the desperation in his face, thrust a small flask of Bushmills into his hand. After a great deep swallow, he proceeded to explain his sad situation. ââ¬Å"This goddamn hippy club issued only two drink tickets to each of us. How, for the love of Mary, do they expect us to play in this condition?
Tuesday, January 14, 2020
Dream Team â⬠Media Analysis Essay
George and Lennieââ¬â¢s dream is the most commonly mentioned in the novel, they want to live the American dream and have their own land and home. Although Crooks tells them he ââ¬Å"never seen a guy really do itâ⬠their determination is beyond that of normal men. They crave the freedom from ordered working life and less responsibility. George desires the relief from the burden of supervising Lennie, on the ranch he constantly has to watch him to ensure he is no danger to himself or others. He talks of how he could ââ¬Å"live so easyâ⬠without Lennie and it seems to be a private dream of his to marry and raise a family without the childish weight of Lennie upon him. He has cared for Lennie for a large part of his life and wants happiness for both of them without the strain of rules and the risk of characters such as Curley. Lennieââ¬â¢s only dream at first glance seems to be having his rabbits, however at a closer look the rabbits are his way of relating to their entire dream, he connects all other aspects of free life with them such as growing crops to feed them. He loves hearing the story of ââ¬Å"how its gonna beâ⬠, his own dreams are based on what George tells him is good and bad. Candy is desperate to join in with Lennie and George and their dreams have become his. Since his dog died he has nothing left on the ranch to encourage dreams and he seems to have given up, the chance to be part of a reasonably realistic project motivates him again and he is willing to give everything to be part of it, ââ¬Å"Iââ¬â¢d make a will anââ¬â¢ leave everything to you guys case I kick off. â⬠All of Candyââ¬â¢s dreams seem to have be worn away by life on the ranch, the loss of his hand also seems to symbolise a large loss mentally for without his hand he cannot realistically dream of working his own land and living alone. For Candy life on the ranch seems to be a reminder of lost dreams rather than hopeful ones and this could explain his eagerness to be part of Lennie and Georgeââ¬â¢s. He is also aware that he is old and becoming closer to the end of his job and possibly his life. ââ¬Å"Theyââ¬â¢ll can me purty soon. Jusââ¬â¢ as soon as I canââ¬â¢t swamp out no bunk houses theyââ¬â¢ll put me on the county. â⬠He dreams of ending his life in happiness and not in poverty and discomfort surrounded by bad memories. Curleyââ¬â¢s wife is in many ways like Lennie and George, she tell her dream like its real and could happen at any time to escape the loneliness of the ranch. She tells as many people as she can about her dream as though she wants to make it more real for herself. Her conversation with Lennie reveals her desperation to make this dream come true, she hangs onto the man who could put her in ââ¬Å"pitchersâ⬠, so sure he did write to her and someone else ruined her dream. It is these fantasies she uses to escape her life which is heavily restricted by her husband who wants to control her to comply with his own dreams, she wishes to be free to fulfil the life she desires. Her way of telling the story of her dream is almost sad as she clings to any glimpse of it so desperately it is clear how unhappy she is. All the dreams expressed by these characters are what drive them in the novel and can determine how they express their feelings and how they act. Niki Holdsworth Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE John Steinbeck section.
Monday, January 6, 2020
Network Security Practices Essay - 804 Words
Todayââ¬â¢s corporate infrastructure is not the same as it was 10 years ago. In the past you were able to control the amount of attacks on a network because of the reasonable number, which is not the case today. At any given time an organizations network will be attacked or try to be attacked several hundred times in one day. For larger more well-known organizations this number could grow significantly. To ensure your organization is not one of the ones on the 10ââ¬â¢oclock news you have to ensure you have proper security practices in place to secure your network. Most people in the security field agree that good security policies are necessary to keep intruders out and keep the users along with the information on their network safe. The best wayâ⬠¦show more contentâ⬠¦Having this type of accountability will help you in having a better understanding and provide for a good foundation for enforcing security across the organization. This area should also cover the different types of data each person handles on a daily basis. It should clearly outline the different categories that data will fall into whether it be internal, external, general use or confidential. By doing so you now allow the employees to have a better understanding of what data they can manipulate and data that has to stay the same. 2. Remote Access Policies ââ¬â users are always going to want to access the office network from a remote site. We have to ensure that there are policies in place that allow them to do so but in a safe manner. If they are going to remotely access the network it has to be done in accordance with the security policies of the organization and not on their terms. This should include using a laptop or remote connection software that has been pre-approved by the organizations security team, keeping IPââ¬â¢s in a safe place, making sure that if they are accessing the network from a laptop to ensure that hard drive is encrypted. This will prevent anyone from gaining access the sensitive information if it is ever lost or stolen. Lastly not everyone should be granted remote access to the network; this privilege should only be given to people who have a legitimate need for it. 3. Network Connected Devices ââ¬â Once a device is connected to theShow MoreRelatedBest Practices For Network Security2439 Words à |à 10 PagesBest Practices for Network Security Network security, in this technological age, should be one of the most important items of concern for any business owner or network administrator. Since just about every company out there is connected to and conducts some sort of business over the Internet, just about every one of them is at risk from outside threats. This means that they should take certain steps in order for them for them to conduct their business securely. Beyond the initial steps, it mustRead MoreSecurity Monitoring1041 Words à |à 5 PagesSecurity Monitoring Mobin Bahrami University of Phoenix Information Systems Risk Management CMGT/442 June 22, 2012 Brian Hoff Intro Security monitoring is an important factor in keeping any organization network safe as various attacks are on a rise. A company constantly must practice monitory techniques to keep their data safe. The first step is to scan the internal and external environment and identify information technology risks before they become a problem. The key is to be proactiveRead MoreEssay about Network Security Monitoring Tools873 Words à |à 4 PagesThere are numerous network security devices and tools available to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. When acting alone, the current generation of security devices has an exceedingly difficult time providing an effective defense against such threats, and the situation is particularly grim for targeted or novel attacks. It has been demonstrated that a number of interoperable systemsRead MoreTechnological Advancements for Mabuhay Airlines 706 Words à |à 3 Pagessmall airline company providing direct flight from Manila, Philippines to all points of the country. Serving the nation for more than two decades, MAL has become one of the most respected airlines with new and modern fleet of aircraft and a route network that serves 29 domestic points. MAL offers a wide arrays of online services such as view Flight Schedule, Book a Flight, Manage Booking, express service (extrack) that track and trace your cargo online and find out what types of cargo we carry forRead MoreThe Security Of A Home Network1352 Words à |à 6 Pages Yu Lun Chou 1730799 MADS 6638 Computer Security Admin. George Thucydides 4/26/2016 Table of content Introduction Inventory Vulnerability Test Protection Support Incident Response Introduction Information play an essential role in everywhere. For a company, in order to run the company well, information management is a necessary skill, and leaking information, odds are , causes significant damage to the company. Even though a private network will not have as great damage as an organizationRead MoreWorldwide Network Security7789 Words à |à 32 PagesMARKET ANALYSIS Worldwide Network Security 2012ââ¬â2016 Forecast and 2011 Vendor Shares John Grady IDC OPINION The worldwide network security market grew by 6.1% in 2011. The total market, which includes firewall, unified threat management (UTM), intrusion detection and prevention (IDP), and virtual private network (VPN) solutions, reached $7.4 billion in 2011. UTM revenue saw the strongest growth at 17.4% and reached $2.2 billion. The IDP market saw more moderate growth at 4.5%, reaching $1.9Read MoreEssay about Technical Security Policy Proposal for Small Company1064 Words à |à 5 PagesTicTek Inc is a small company with about a hundred employees and one facility. The company sells home security electronics online. The devices are manufactured by a third party company and shipped to TicTek, whereupon they are warehoused until they are purchased through the companyââ¬â¢s website. The warehouse staff prepares and ships customer orders in the same facility which houses the office staff and management. TicTek has a few major stockholders, but the majority of the companyââ¬â¢s stock is o wnedRead MoreElements Of Network Security Essay1618 Words à |à 7 PagesElements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and attachments. 2. Threats to network infrastructureRead MoreBuilding a Cyber-Security Policy1061 Words à |à 5 Pages Organizations which rely on network infrastructure for their business operation must utilize security technology to protect the network from harmful actions of automated attacks as well as malicious human activity. It is also important to enact policies and guidelines for the employees of the organization, which in many regards can be the weakest link in the chain of security. According to a survey by The Ponemon Institute (2012), ââ¬Å"78 percent of respondents said their organizations have experiencedRead MoreSecurity Assessment and Recommendation1458 Words à |à 6 PagesRunning head: POTENTIAL WEAKNESSES Security Assessment and Recommendations Security Assessment and Recommendations I have been charged with the task of identifying potential security weaknesses and recommending solutions for Quality Web Design (QWD). The project was completed in two phases. The first phase of the project specifically identified and defined two potential security weaknesses: software and policy. The second phase recommends solutions to these potential weaknesses. I chose a
Subscribe to:
Comments (Atom)