Sunday, March 31, 2019
Researching The Computer Forensics Investigation Plan
Re calculateing The Computer Forensics Investigation proposalThe purpose of this paper is to re baffle the basic methodo logies and the appropriate memberes that a figurer forensic police detective goes through in dischargeing an probe. It entrust give an idea to the reader around the g directioning and organization of an detective who is entangled in a computer link up criminal offence, the personal manners in which he will conduct the investigation a great deal(pre titulary) as basic preparation, implement of the required tools and techniques, skill and analysis of the entropy, part in giving testimony, use of forensic laboratories or the guidance of e genuinely the staff extending nether the principal(prenominal) tec and fifty-fifty readying ne cardinalrk forensics but of which argon related to his work.The Computer Forensics Investigation PlanA computer forensic investigates instruction that infraside be retrieved stochastic variable re cardi naltiveness media of a computer much(prenominal) as a potent disk, it is alike considered that to be a successful computer forensic the companionship of some different plat course of actions to perform computation is a must, for our scale we will consider you as the chief forensic investigator in the domain of Virginia, as a part of confidential enterprise you ar delegate the role of devisening the computer investigation of a suspected sad activity, we will see from your perspective how you should conduct widely the indispensable agencys.We dont retributive need science we need good science (Evans, 2004) continuously act major issues in preparing for an investigation. The disgust exposure is considered to be a precise sensitive smirch in terms of composeing proofs and conclusions which are in many shells actu every(prenominal) in every(prenominal)y vulnerable and sewer be very intimately be manipulated so supernumerary attention is needed in every(p renominal) aspect of recovery methods in fraternity to gain as much as likely.Before arriving at the paroxysm of crime, it is mandatory that you should forever and a day hit in a outlineatic approach in caper solving standardised making an initial assessment most the case thusly ascertain a preliminary approach to the case, subsequently that, create a expound memoriselist of the objectivity of the case, analyze the resources needed, call for all the risks and try the very scoop up to minimize them, in like manner outline all the details known about the case until thusly in a bodyatic manner much(prenominal) as the situation in which you will be arriving, the nature and precises of the case, the policesuit of computer forensic tools which will be needed at the case and to check on the specific direct carcasss in disposal which attention in the forensics investigation mathematical operation.Once at the crime painting, try to gather reason to prove that the suspect violated the company insurance or committed a crime, since this is a private sector investigation it implys corporeal businesses, another(prenominal) agencies of government are not conveyd much(prenominal) as justice en major powerment. The law enforcement agencies act jibe to the federal freedom of instruction act or laws of similar descent according to their territory in all unconscious process. Investigating and taking control of the computer possibility scene in the corporeal environment is considered to be much easier than in the turn environment because the incident scene is often the work stick, these workplaces drive selective informationbases of computer computer hardware and parcel product which bathroom also be flush toiletvass, right tools can be adopted to analyze a policy violation if any.Many companies either state their policy right away or show round warning, some carry out both whose purpose is to tell that they hold the exculpate r ight to inspect the computing assets of their respective subjects at will, in humanitarian to that constantlyy company must describe when an investigation can be initiated and allow the corporate investigators to know that under what circumstances they can examine the computer of an employee, if the investigator finds about the wrongdoing of the employee then the company can stick a criminal infirmity once against him.If any march is notice of a crime during the investigation then the get offment must be informed of the incident, checking the incident itself that it meets the elements of criminal law, work with the corporate attorney and also to see that you dont violate any other constitutional law in all the procedure.Preparing for a computer seizure for inquisition operation is champion of the most important point in conducting computing investigation. In order to do this, some answers from the victim and an source may be needed, informant can be a detective for the c ase, a witness, a arrive atler or any coworker to the specific some one and only(a) of fill. If you can identify the computing system, then estimate things much(prenominal) as how many computer systems to process and size of drive on the computer of the suspect, also determine which in operation(p)(a) systems and hardware are involved. Determining location of the differentiate and the cases type is very important, it allows to determine if computers can be removed. If the removal of the computers will cause pervert to the company then it should not be through in the interest of the company, problems in investigation may arise if the institutionalizes are most likely hidden, encrypted or ancestryd in some offsite, if the computers are not allowed to be interpreted for investigation then the investigator must determine the resources to acquire digital evidence and the proper tools which will be needed to set up data acquisition faster. in addition determine who is in fil m of the respective systems (in corporate environment, usually unitary persons assistance from the company is required in this regard). of all time keep some superfluousists who work on many different types of operating systems, servers or databases and abilityily educate those specialists in investigative techniques.Once arrived, securing the crime scene or the specific computer is the foremost priority of the investigation squad, the purpose is to preserve the evidence and keep the acquired entropy confidential. The investigative team should define a arrest perimeter utilize a special type of yellow barrier tape, it should also book the legal liberty to keep the un necessary people out but do not fail to comply the other law enforcers or obstruct nicety in any manner possible.Only overlord task force should handle the crime scene for evidence as any non professional law enforcer can manipulate or even overthrow the vital piece of evidence which may be very crucial in the overall scenario. Remember that corporate investigators does not seize evidence very often, more plan guidelines for processing an incident or crime scene goes as follows, keeping a journal to enumeration the activities, securing the scene in the sense of creation professional and courteous with onlookers, removing all those personnel office who are not associated with investigation, taking all the proper and necessary participateings in video of the area surrounding the computer, at the same time remunerative attention to all the major and minor details. Sketching the incident of the crime scene and checking the computers as soon as possible.While at the crime scene, dont ever cut the electrical power to a running system by pulling the plug unless it is an older Windows or DOS system (which in these days are very rarely found anywhere), instead apply a live acquisition by the proper acquisition methods if possible, when windup down computers with Operating Systems such as Windows XP or later variate of it or Linux/Unix then unendingly remember to perform a mean(prenominal) shut downdown of the system, this helps to prevent log sends.Try the very best to survive the data from the current applications as much safe as possible, powerful record all active windows or other shell sessions, and mental picture the scene.Also make notes of everything that is make even when copying the data from a live computer of a suspect, save open files to external storage medium such as a hard drive or on a interlocking share (if somehow the saving menti aned is make problems then save with some new titles), then close applications and shut down the computer.Further guidelines include on bagging and tagging the evidence which is d hotshot as follows, get-go assign a person to collect (and log) the evidence, then tag all the evidence which is collected with the birth date/time, sequential number or other features. Always keep two bump and different logs of evidence collected an keep control of the evidence at the crime scene.Always look for data related to the investigation such as passwords, PINs, passphrases, bank accounts and so on. Look at papers in places such as the drawers or even try to depend the garbage can. Collect all the related documents and media which is associated with investigation such as manuals or software/hardware. Using a technical foul advisor of gritty degree experience and knowledge is a must, technical advisor can help to list the tools which are required to make progress at the crime scene, it is the person which can guide the investigation team about where to locate data and help the team in extracting the log records or other evidence form braggy servers. The advisor can also create or help to make a search patternee by determination what is needed by the investigators for the reassert.More brief responsibilities of the technical advisor includes to know the aspects of the seized systems, to di rect the main investigator on intervention sensitive material, helping in securing the crime scene, helping to plan the dodge for search and seizure (documenting it), document all the activities and helping in conducting the search and seizure. text fileing all the evidence in the lab is also a necessary process, which involves in recording the activities and findings as the investigators work this can be d one and only(a) by maintaining a journal to record the move interpreted as the investigator process evidence. The main objective is to produce the same results when the main investigator or any other repeat the steps that were taken to collect evidence, a journal serves as reference that documents all the methods that have been used to process evidence.For proper documenting the evidence, always create and use an evidence detainment form, which serves the pursual personas such as identify who has handled the evidence and identify the evidence itself, properly listing all tim e and date of the intervention of the evidence. other information can also be added to the form such as specific section listing and chop value, try to include any other detailed information that might need for reference. test forms or labels are present in the evidence bags that can be used to document the evidence.Forensic ToolsAlways take lease the tools using information from incidents and crime scenes, the initial receipt field kit out should be airheaded in weight and easy to transport form one place to another. An addition to the initial kit is the huge solvent field kit which must include all the necessary tools.The items in an initial response field kit may include one digital tv camera or 35mm camera with film and flash, one flashlight, one laptop computer, one large capacity drive, one IDE ribbon cable (ATA-33 or ATA-100), one SATA cable, one forensic boot media containing the preferred utility, one FireWire or USB triple wire protect external bay, ten evidence log forms, one notebook or dictation recorder, ten computer evidence bags (antistatic bags), cardinal evidence labels, twenty tape and tags, one permanent ink marker, ten external USB devices such as a thumb drive or a larger portable hard drive.(cited in Nelson, Phillips Stewart , 2004)Tools in an extensive response field kit may include varieties of technical manuals ranging from operating systems references to forensic analysis guides, one initial response field kit, one portable PC with SCSI card for DLT tape drive or suspects SCSI drive, two electrical power strips, one additional hand tools including bolt cutters, pry bar and hacksaw, one pair of leather gloves and available latex gloves ( assort sizes), one hand truck and luggage cart, ten large garbage bags and large cardboard boxes with packaging tape, one rubber bands of assorted sizes, one magnifying glass, one ream of print paper, one elfin brush of cleansing dust fro suspects interior CPU cabinet, ten USB thumb dr ives of varying sizes, two external hard drives (200 GB or larger) with power cables, assorted converter cables and five additional assorted hard drives for data acquisition.When choosing an appropriate tool, the investigator must be sure that the tool is properly functioning, and that the right person handles it during the investigation. In order to prepare the investigators team, investigator must review all the facts, plans and objectives with the entire team assembled, the main objectives of the scene processing should be to collect evidence and untroubled it. The speed of the response from the team is very crucial as it can cause evidence such as digital evidence to be lost.LaboratoryA computer forensics lab is a place where computer forensics conduct investigation, storehouse evidence and house the necessary equipment, hardware and software. A typical lab manager duties involve many tasks such as proper management for case study, helping to digest reasonable consensus for e ffective decisions, keep everyone up to date with proper ethics and any modifications if do, keeping a financial account and proper check and balance of the entire facility, keeping it updated according to latest trends in engine room and promoting the required quality assurance, appoint a schedule that suits everyone, estimating the possibleity of investigators and assessing their requirements, proper estimation of results ( preliminary or final) or when they are expected, strictly manage all lab policies and keep an overall look on the caoutchouc and auspices of the entire facility. The staff members have duties which include knowledge and culture of equipments relating to computer systems such as Operating systems and their file types, software and hardware. Other staff duties include knowledge and training of technical skills, investigative skills, deductive reasoning. Planning lab budget involves making proper divisions in be on all bases from daily to annual expenses , gathering the available data of the past expenses and use it to predict or prepare for any future day costs. The main expense for a lab comes from the trained personnel or the equipment they use such as hardware or software devices in their disposal. Always estimate the number of computer cases the lab expects to cover, always being notified about the turn upments in technology in the respective field, try to make assessment about the computer related crimes ( their kinds), and use this information to plan ahead lab requirements and costs.While making good computer technology available is important, the costs and benefits of upgrading all computers to state of the art must be weighed. (cited in schwabe, 2001)Check statistics from the Uniform Crime Report, identify the specific software used to commit crimes. If youre setting a lab for any private corporation, remember to check the inventory of computing such as software or hardware, previous reported problems and the ongoing and future advancements in related computer technology. Managing time is also a major concern when choosing on the computing equipment for the purchase. Most of the investigation is conducted in the lab, so it should be secure as evidence may is very crucial and cannot afforded to be lost, manipulated, damaged, destroy or corrupted. Always put emphasis in providing a secure and safe environment, keep proper inventory control of the assets (inform in advance if more supplies are needed). A safe and secure facility should always preserve the evidence data and keep it as it is, the stripped requirements for a secure facility are a medium or small sized room with true walls form the floor to ceiling, proper fasten mechanism provided with the door entranceway, secure container and log for visitors. Almost all of the workers in the facility should be attached the same level of assentingion. Always brief the staff about the security policy, it is a must. The evidence lockers used in th e lab must be kept secure enough such that any unauthorized person may not access it at all, some recommendations for securing storage containers include locating the containers in a properly defined restricted area, limiting people who will have the access to the storage containers, keeping a record on the authority of everyone who has access to the containers and keeping the containers locked when not in use.If a combination of locking system is used, then provide equal measure of security for both the content of the container and the combination, always destroy the combinations that were previously held when setting up new combinations, only those persons who have the proper authority should be allowed to change the lock combinations, try to change the combination every three or six months or whenever required. When using a key padlock, authorize a personnel as the main key custodian, keep duplicate keys and print sequential be on all of them, keep a registry which has a recor d of keys that are assigned to the authorized personnel, conduct audits on weekly or monthly basis, try to place keys in a secure container afterwards taking an inventory of keys, keep the level of security the same for all the keys and evidence containers, replace the old locks and keys on an annual basis and dont use a master key for several locks.Containers should be strong, safe and as much indestructible as possible with external padlock system and a cabinet inside, try to get a media safe if possible (to protect evidence form damage), keep an evidence storage room (if possible) in lab and keep a well organized evidence log which is used to keep update on all the make when the container of the evidence is opened or closed. Always maintain a security policy and enforce it (log signing in for visitors in a way that those personnel are considered to be visitors who are not assigned to lab, these visitors should always be escorted in all times), using indicators (visible and/or a udible) is also a necessity inside lab premises, install an intrusion alarm system and hire a guard force for your lab.In civil litigation, investigator may return the evidence after using it (when issued a breakthrough order),if the investigator cannot retain the evidence then make sure it make the correct type of copy( copy in cases of data from disks or other hard drives, logical or bit stream), ask the supervisor or your client attorney on the requirements, you should usually only have one chance, create a duplicate copy of the evidence file, make minimum two images of evidence(digital) using separate methods, try to copy the host protected part of a disk, size is the biggest concern ( such as in raid redundant array of independent disks) systems which have terabytes of data),Some investigation needs to be conducted in the laboratory because of the proper tools and technicians available in that respect who know how to deal with the evidence correctly without tampering it, In vestigator might need to have the proper permission of the authority in charge if it wants the system moved to the laboratory, when permission provided, the investigator have a given time frame in which it must perform its task and then deliver the system back to where it came from.Log filesLog files are those which lists all the actions that have happened, such as in Web servers which maintain log files to list every request made to the main Web server, using the log file analysis tools, the drug user can gave a very good assessment of where the visitors came from or how often they return or even how they go through a site, in addition to log files there are cookies, when used, they enable the Webmasters to log far more detailed information about the user on how it is accessing a site.Logs are also considered to be an independent, machine-generated record of what happened within a network for both system and user activity. When set up properly, and with the appropriate due care, l ogs can provide an unvarying fingerprint of system and user activity. In many cases, the logs tell a story as to what genuinely happened in an incident. They can tell you what systems were involved how the systems and people behaved what information was accessed who accessed it and precisely when these activities took place. (Cited in Musthaler, 2010)Given the overview of logs on what they can provide, the regulations such as the PCI DSS (payment card industry DSS), the FRCP (civil procedures federal rules), the HIPAA (which is an act regarding the health insurance) and many other regulations, all consider logs and log management to be the very basic and essential necessity for proper and efficient data management. Logs can be used to capture many vital sources of information which beside protecting the core data can also help in supporting forensic analysis and incident response if a data breach has occurred or other forms of electronic crime, such as fraud.The overall log monit oring can be hurdled because of the extremely large bill of fair data capture and the unwillingness, lack of will or errors in properly managing, analyze and correlating that data. The overall conclusion (in mismanagement) can cost hugely as if some suspicious activity or breach really happens, then a lot of time ( possibly many months ) may require to detect the taint, there is even no guarantee if the fault will be detected. In order to have logs admissible in court as evidence of a crime, an organization must prepare and execute due care with the log data.Log data must be viewed and treated like a primary evidence source. hither are some best practices that can help ensure log data and log management practices properly support forensic investigations. throw away a clear corporate policy for managing logs across the entire organization. Document what is being logged and why, as well as how the log data is captured, stored and analyzed. operate that 100% of log-able devices an d applications are captured and the data is unfiltered. Have centralized storage and belongings of all logs, with everything in one place and in one format. insure the time synchronization of logs to facilitate correlating the data and retrieving data over specific timeframes. Ensure the separation of duties over logs and log management systems to protect from potential internal threats such as a super user or administrator turning off or modifying logs to conceal illicit activity. Always maintain backup copies of logs. Have a defined retention policy that specifies the retention period across the organization for all log data. Organizations should work with legal counsel to determine the best time frames and have log data incorporated into an overall data retention policy. Have a defined procedure to follow after an incident. Test the incident response plan, including the retrieval of backup log data from offsite storage. (Musthaler, 2010)Further quotes form Brian Musthaler inclu de,If an incident or data breach is suspected, there are several steps to take right awayIncrease the logging capability to the level best and consider adding a network sniffer to capture additional detail from network traffic. In an incident, its better to have more data rather than less. set aside the rotation or destruction of existing logs to prevent the loss of potential evidence. Get backup copies of the logs and make sure they are secure. Deploy a qualified investigations team to determine the situation. (Musthaler, 2010)With the appropriate care, logs can provide satisfying forensic evidence when and if it is needed, as far as the job of a computer forensic investigator is concerned, his log begins when he starts an investigation, logs can be made of many things such as events, system security, firewall, audit, access and so on. (cited in PFI, 2010)Equipment can be recorded in the log by many ways, audio logs can be made which can store audio files, picture logs can be ma de which can store digital pictures taken during an investigation. Equipments are recorded according to the type of its table of contents with the appropriate tools. The final log is stored at the very end after possibly remodifying or revising previous logs.Data acquisitionFor the process of acquiring data in an investigation, we will consider following techniques, in that location are two types of data acquisition, static acquisition and live acquisition which basically involves the following four type of acquisition techniques, bit-stream disk-to-disk, bit-stream disk-to-image file, sparse and Logical. Bit-stream disk-to-image file is the most common method, it makes many copies and all of the copies made are replications of the overlord drive bit-by bit, similar type of process is happening in day-after-day scenario concerning a common personal computer, when we copy and paste files from one place to another or when we make multiple copies of a data file then the exact copy of the original data file is made available in many places. It is very simple, easy and with very nominal training can be performed on the head system accordingly it is the most preferred method as well. The tools used in it are EnCase, ProDiscoer, FTK, SMART.Disk-to-disk method (bit-stream) is applied in the case of disk-to-image copy being unrealistic mainly due to hardware or software errors or incompatibilities, this problem comes when at most of the time dealing with very old drives. It adjusts rank disks geometry to match the drive of the suspect (geometry of track configuration), tools used in this form are SafeBack, EnCase, , and Snap Copy.Logical acquisition and Sparse acquisition are used when the total time of the investigator is very short and the butt disk is very large. This type of acquisition only searches and retrieves the selected file which is of crabbed interest, comparing this to Sparse acquisition which deals with data collection but again the data collecte d is very nominal.Data analysisData analysis(for a computer forensic investigator) includes mostly examining digital evidence which depends on the following main factors, the nature of the case, the amount of data to process, the search warrants and court orders and the company policies. Scope creep happens when investigation expands beyond the original description which should be avoided in all cases. Few basic principles apply to about the entire computer forensics cases such as the approach taken depends largely on the specific type of case being investigated.Basic steps for all computer forensics investigations for analysis include the following points such as for target drives, using only recently wiped media that have been reformatted and inspected for computer viruses, noting the condition of the computer when seized, removing the original drive from the computer to check date and time values in the systems CMOS, record how to acquire data from the suspects drive, process the data methodically and logically, listing all folders and files on the image or driveAlso try to examine the contents of all data files in all folders starting at the root directory of the volume partition, try to recover all the file contents that are password-protected and can be related to the investigation, identifying the function of every executable file that does not match known hash values and maintain control of all evidence and findings and also document everything as being progressed through the examination.Refining and modifying the investigation plan includes ascertain the scope of the investigation and what the case requires, determining if all the information should be collected and what to do in case of scope creep. The main aim should be to start with a plan but remain tensile in the face of new evidence.Data can be analyzed using many tools from the forensic toolkit such as supported file systems (FAT12/16/32, NTFS, Ext2fs, and Ext3fs). FTK can a very powerful to ol that can analyze data from several sources including image files from other vendors, it produces a case long file. FTK also analyzes compressed files, reports can also be generated in it using bookmarks. Other analyze tools include searching for keywords (indexed search, live search or using advanced searching techniques such as stemming). In order to identify different types of data such as images, electronic mail and so on, the investigator should examine the data format and then according to that format, it should deal with the file with the appropriate tool.Working with law enforcementThe status of individuals under law is no longer in doubt individuals are subjects of law and as such are accorded rights. Yet rights are illusory without the adjective capability to enforce them. They are no more than high-minded principles if individuals whose rights have been violated have no avenue for complaint and relief. (Cited in Pasqualucci, 2003)thither are basically two types of comp uter investigations, public and private(corporate), the public investigations involve government agencies responsible for criminal investigation and prosecution, the organizations involved must detect legal guidelines provided to them by the authority, other legal rights such as law of search and seizure helps in protecting rights of all people including suspects.Of the quotidian problems of the criminal justice system itself, certainly the most delicate and credibly the most difficult concern the proper ways of dealing one after another with individuals.(Cited in Winslow, 1968)Investigator working with the law enforcement must always quell by the federal and constitutional laws in conducting and performing entire process of investigation. Criminal cases at law enforcement goes through three main steps, first the victim (any individual or company) will contact the law enforcement mode by making a complaint, then acting on behalf of that complaint, the investigator will be assig ned by the government authority to conduct a balanced and proper investigation and will be asked to present all the findings directly to the law agency, the investigator will interview the complaint and will write a report about the crime, police police blotter may provide a record of clues to crimes that have been committed previously (related to the ongoing investigation). The investigator collect, delegate and process the information related to the complaint. As the investigator build a case, the information is turned over to the prosecutor.An adjuration is a sworn statement of support of facts about evidence of a crime which is submitted to a judge to request a search warrant the judge must approve and sign a search warrant before it can be used to collect evidence. The chain of custody is the route the evidence takes from the time investigator finds it until the case is closed or goes to court, throughout the case, the evidence is confiscated by the investigator who has the p roper right under the law to maintain and keep the evidence immutable.Other concerns which need to be addressed when bringing law enforcement to the scene is that the officers should follow proper procedure when acquiring the evidence such as in digital evidence which can be easily altered by an overeager investigator, special concerns should be given to the information on storage media such as hard disks which are password protected.Network forensicsNetwork forensics is the job of finding the information about how a perpetrator or an attacker gained access to a network, it involves systematic tracking of incoming and outgoing traffic to find out how an attack was carried out or how an event occurred on a network, the forensic expert should be very well experienced and be familiar with many previously related cases of network because the intruders which the network forensic searches for always leave some sort of trail behind, this trail
Saturday, March 30, 2019
The English Languages Explosion Over The World English Language Essay
The incline Languages Explosion Over The World position Language EssayAglobal lyric poem,is a row utter interlanded estateally, which is marked by some people as a winkment language, the most popular atomic look 53 being English. A wide lam of the lexical units in the English language were taken from German, Latin, French and other(a) European countries. A large portion of the word borrowing uses as main source the French language justifying English language simile for foreign linguistic process as well as mixed vocabulary. lechatelierite D. (2003 7-10) argues that Languages have a knock-down(prenominal) relation between dominance and heathen power. The main reason that the languages exist is because of a strong power-base, political and military or economic.Linguists argues whether the simplicity of the English language is the main reason of it decent a global language. Generally, nothing is considered to be easy. It generally depends on who the savant is. Ellis suggested that success depends on the visiter and not on the language that unrivalled is learning. Some factors that have a significant role in fashioning a person learn a foreign language ar his motivation, age, aptitude, cognitive style and personality. While learning another language angiotensin-converting enzyme can observe that some languages appear to be more severe than others. There are some languages that have almost the same patterns or similar soundings of the words which make them simpler to remember and learn. For example Greek has m whatsoever similar words with Italian. However, there are languages that have a uneven pronunciation or spelling and they are not similar to any other languages, like for example German.English is a very rough-and-ready language, that it is proved by the many ingrained and non- primeval spillers all over the world. correspond to David Crystal (2003) Statistics suggest that nearly a quarter of the worlds population is already fluen t or content in English. For example, Chinese has more native verbalizeers, however it is a more complicated language in name of grammar, verbs, meaning of the words, etc. However, some linguists have different points of view as to weather a language becoming global depends on the number of people speaking it . Crystal D. (2002 7-10) claims that Why a language becomes a global language has little to do with the number of people who speak it. Furthermore, English can attend one to express various meanings. That is occurrence because English language not only has a lot of words with different meanings but excessively has various different types of syntax which help the speakers to be more accurate and to give more emphasis to a particular point if it is needed. Another interesting point is that the writing of English language is simple. There are even languages that have hundreds of letters in their alphabets that could have a different meaning when pronounced differently, like Ch inese. The roman alphabet is considered to be very easy to learn and surely overmuch easier than the Chinese writing system which is very difficult for most people. Moreover, the roman print alphabet in English language is very phonetic, rather than acknowledgment based, hence it can help to describe the actual sounds of words or phrases.On the other hand, there are some poor features of English language. For example there could be words written in one way and then read in another way and a lot of people may get confused, especially if ones native language is not English. The encumbrance in English is mostly apparent when we go in different areas in England there are different slipway of pronunciation, making it difficult for someone who speaks English as a second language to understand people from different areas such as Wales, Ireland, and Scotland. Also, non- native speakers like people from India and Pakistan have a different accent.Since English language is so widely spok en, many people believe is vital to learn as a second language. People seem to have make the right decision, as it is spoken in a wide geographic area. A lot of people believe that English is the language of trade. It is straight that English has been introduced in the field of Business for a lot of years. In addition, English is a language that is been used in films, music, television, and in a lot of more technological features like World Wide mesh (internet). A big amount of population of the world watches Hollywoods movies. This expansion also led to the increase in popularity of English language. Moreover, English has enabled a harsh confabulation means between people of different backgrounds. For example, a German may not need to learn Indian in locate to communicate with someone from India if both individuals speak English. Hence, English has helped to diminish authoritative cultural barriers between nations. However, there are cultural differences between countries and nations. The archives of a nation may influence to their willingness to learn or speak another language than their own.The meaning of the word brilliant is very strong and quite dominant. We can never assume that English is winner to other languages, it has become an easy way of communication but each nation will consider their own language as being meaning(a) to them. A language has many components such as grammar, vocabulary and rules of usage. So it is not easy to say that English is superior to other languages. A linguistic myth analyses that fact. It explicates that there fact that some languages are superior to others is not true and it has no basis in linguistic fact. Linguists explain that some languages are more useful than others, at a condition period of history.To sum up, English is being considered as an easier language to learn than some others, like for example Chinese but the level of difficulty also depends on the individual learner. Moreover, English can ind eed be regarded as a global language, but, in my opinion, it cannot be considered as superior to other languages. In fact, every single language has its special characteristics and shipway of expression. English has simply developed to be an easy way of communication between various nations.
Role Of The Women Of Hamlet English Literature Essay
Role Of The Women Of settlement side Literature EssayThe women of William Shakespe ars settlement appear to be frail, passive figures employ as pawns and dying prematurely after the mistreatment of men. However, there is more to Gertrude and Ophelia than meets the eye. make up though small t avouch is certainly non a do work found on women, both female characters argon more active than their vices and virtues previously lead us to believe. A closer inspection reveals that the true eccentrics these female characters took on had purpose these women were not as passive as they reckon at first glance.Our first perception of Gertrude isinfluenced by Hamlets response to learning she has married her brother-in-law after he has slay her husband.Hamlet shows anger and disillusion toward her, believing that she should remain loyal to the memory of his father the king. Yet, there is no evidence that she knows of the murder Claudius has committed. It appears she has allowed hersel f to be seduced by Claudius, solely once over again there is no evidence of whether the seduction has taken place in the first place the death of King Hamlet or afterwards.Gertrude finds herself in a condition where she is conflicted by the roles different men wish her to play. She feels mostwhat guilty close to her sons disappointment in her, but feels that she can do nothing roughly the situation due to her relationship with Claudius. Claudius also has expectations of her, including his wish that she disregard Hamlet and remain loyal only to him.It could be said Gertrude is so mercurial she lacks virtue, however, in hazard II, scene IV, she shows motherly concern for Hamlets welf be and makes plans to tattle with him in her chamber. After Hamlet accuses her of lust, she does not make excuses for herself she openlyadmits her shortcoming. What redeems Gertrude is her last-place act of loyalty to her son.In the final act, when Claudius pours the pois hotshotd wine, Gertrud e claims thirst while stretch for the goblet. Claudius warns her not to drink nevertheless, she does, knowing it was poured for Hamlet, and as she dies, she tellsher sonthat the drink is poison for him. In her sacrifice of herself for her son, there is redemption for Gertrudes lust, immaturity, and fickleness. She has now shown, not passivity, but strength and loyalty.The role of Ophelia is presented as a gentle, loyal, obedient, and young woman who is meant to be the love of Hamlets sustenance, even though he rarely thinks of her or considers her in his plans. Most of the time Hamlet just appears to be cruel to her, as if he is just using her as a pawn, as is so when Ophelia tells her father that Hamlet appears to her to be looking and acting like a crazy man. It expects very likely he is just using Ophelia as part of his plot to absorb the word out that he is insane.Ophelia is an prototype of a perfect missy who obeys her father without argument. Even when she is asked to re ject Hamlet whom she believes is the love of her life, she responds subserviently that she will obey, and meets with Hamlet to deceive him. Polonius also uses his daughter for his own reasons, which in this case, is to spy on Hamlet. This actually becomes a spell point in the play. Hamlet reveals his complicated feelings for Ophelia as well as the depth by which he is hurt and betrayed by her. As Ophelia tries to gift his gifts his feelings become evident. Hamlet becomes defensive refusing to accept the return, and responds with, I never gave you aught. He accordingly continues to express his anger and disgust with women and humanity as he tells her, Get thee to a nunnery why wouldst thou be a breeder of sinners? This hurts Ophelia mentally as well as physically since he has propel her round a bit and she expresses this with her own thoughts.Oh, what a noble drumhead is here oerthrown. The courtiers, soldiers, scholars, eye, tongue, sword The expectancy and rose of the fair st ate, The glass of way of life and the mold of form, The observed of all observers, quite, quite down And I, of ladies most dismount and wretched, That sucked the honey of his music vows, Now see that noble and most monarch reason, Like gratifying bells jangled, out of tune and harsh That unmatchd form and give birth of blown youth Blasted with ecstasy O, woe is me, To have seen what I have seen, see what I seeBasically, Ophelia is saying, Wow, he seemed like such a wonderful guy before his words to me were so sweet and I let myself fall for him, and now hes gone(a) totally gone around the bend. Ophelias perfection also becomes her downfall, unfortunately she has no voice nor does she seem to have any obvious heroine qualities and one thing of interest that comes to straits is her lack of desire to defend herself.Even with all this being said, Ophelias life and death have a profound influence on some of the most important characters in the play, including Hamlet. Her own madn ess has importance in the play. It gives Ophelia the freedom to do and say what she could not before. She passes out flowers to the court and gives columbine and fennel to Claudius, this is a jab at the king since these flowers were representative of ingratitude and infidelity at the time. This is where she loses her innocence, and this loss of innocence finishes with her eventual suicide. At the time, suicide was a sin against God and people that committed suicide were not allowed a proper funeral. Ophelias innocence is somewhat preserved by allowing her a funeral even though her death was at her own hand.Looking closely, Ophelias role appears to be a precursor for Shakespeare to foreshadow future events. In her coal scuttle scene, her brother and father warn her to stop seeing Hamlet. This warning could be said to foretell her future conflict with Hamlet. At the beginning of Act II, when Ophelia rejects Hamlets advances he goes off-the-wall, there are two ways to interpret the scene, one possibility being that after Hamlet warns Horatio and Marcellus that he will regurgitate an antic disposition on he acts crazy when meeting with Ophelia to get the word out there that he is mad. Another possibility is that Hamlet was genuinely distraught by Ophelias recent rejection. Anyway you look at it these scenes with Ophelia seem to foreshadow things to come.We begin to realize also that Ophelia is not as passive of a character as originally thought. She is obviously a tool for Shakespeare, but also for Hamlet and Polonius, as the plot thickens around her.After Ophelias death Hamlet is reminded of his deep feelings for her, which had been hidden due to his arrested development with vengeance and his lack of trust in women. Ophelias death also deepens Laertes require for vengeance. He already has much reason to kill Hamlet, since Hamlet had murdered his father and driven his sister mad, but Opherlias suicide is that last little(a) push over the edge that drives a nd justifies Laertes revenge.As it turns out Ophelia is the common performer that brings together Hamlet and Laertes. She is the reason for their irrational actions, and in a swerve of fate, the being that brings them great emotional turmoil. None of this has she done intentionally, yet she becomes her own play within a play. Our focus on Hamlet and his sufferings are set aside, as Ophelias story shocks us when she suddenly breaks, is driven mad, and then commits suicide.To one that simply reads the play and thinks nothing more about it, these women may seem trivial. However, those taking the time to think about Gertrude and Ophelia are rewarded with the knowledge that each of these characters is woven into a role that affects and motivates a main character. They are the characters that passive, as they may seem, actually spur the men in the play to further advance the plays central action. Clearly the roles Gertrude and Ophelia take on are a contribution to the terrible events that occur in Hamlet, making for a perfect dramatic tragedy.Work CitedShakespeare, William. Hamlet, Literature and Its Writers A Compact knowledgeability to Fiction, Poetry, and Drama. 4th ed. Ed. Ann Charters and Samuel Charters. Boston Bedford/St. Martins, 2007 1252-1354.
Friday, March 29, 2019
The Influence Of Tests On Teaching Backwash
The Influence Of Tests On Teaching BackwashIn the force field of foreign talking to teach and instruction, there be two kinds of irrelevant views nigh the kinship betwixt the linguistic communication examination and the style educational activity. i side is that the phrase mental evidenceinging should be cognise as the secondary doer for the linguistic process statement. match to Davies (1968 5), the steady-going adjudicate should follow and emulator the pedagogy. This is a point of controversy to about of researchers and teachers. The some other side asserts that the alliance between breeding and examen is should regarded as casenership among each other. (Hughes, 2003 3) That is ordinarily accepted among many scholars and teachers. Moreover, the phrase demonstrate is expected to support the good instruction and prat be used as the corrective watching and countion to the bad pedagogics. Further to a greater extent than, the influence of audit ioning on belief and nurture is delimitate as consequence which fundament be each adept or harmful. (Hughes, 2003) Although, the test potbelly reach the teaching on several(prenominal)(prenominal) faces such(prenominal)(prenominal) as curriculum, materials, teaching method and content, berth and behavior, and information (Alderson W completely, 1993), the creative activity and the disposition of the influence would be refered near elements such as the teacher, the school, the test itself. (Spratt, 2005 Alderson Wall, 1993) Therefore, In addition, the beingness and the personality of the race will be close to(prenominal)(predicate) in various teaching and examen consideration as well. (Alderson Wall, 1993) In the first let out I array the complicated phenomenon of the style test lavation in the language teaching generally.Specifically, there is a very taut connection between the College side of meat TestCETand college side teaching in mainland mainland china. (Gu, 2005 Li, 2009 Ceng, 1999 Shao, 2003) The CET is proved that it is an effective message of cardment for its go out sens accurately reflect the College face teaching and learn n wizard twain of one university at contrastive dresss and different universities at the homogeneous stage. (Gu, 2005) With a spacious number of elements which butt affect the CET and the college position teaching and eruditeness, in second straggle of this essay I discuss the existence and the character of the CET backwash.However, there are a great many of impuissance which shouldnt be neglected, it is eager to find out some personal manners and means to fulfil the beneficial washback of the CET to assist the college teaching efficiently. In the last part of this essay, I will give some suggestion how to heighten the beneficial backwash of the CET with the theory of foreign language attainment.The influence of tests on teaching- backwash1.1 Definition of BackwashThe influence of testing on teaching and education which send packing be either beneficial or harmful is defined as backwash (it is known as washback as well). (Bailey, 1996 259 Buck, 1988 17 Hughes, 2003 1). consort to Taylor (2005), the backwash of tests has affected on numerous aspects of educational processes for a prospicient time. It could believe that language tests backwash has been influencing on language teaching and acquirement constantly. As Hughes (20031) points that the test which is regarded as a signifi fag endt one could dictation all relative teaching and learning activities. Specifically, the term backwash has been regarded as the way in which tests influence on teaching such as designs of curriculum, choices of teaching materials, and conductions of classes. (Hughes, 20032) Therefore, the testing is feeding an meaning(a) role in what is taught in teaching context and how it is underway.However, the backwash of language tests would be regarded as either posit ive or banish. When the testing exerts the beneficial influence on language teaching, it could call forth the good teachings and reflect the bad teaching correctively as well. And the testing pot play the role in language teaching as a partner of that process, which is perceived as an accurate relationship between teaching and testing. (Hughes, 20032) Otherwise, when a tests content and testing techniques are aimed to assess the cut back language major power only such as some tests doesnt test learners necessary language abilities ( comprehend, oration, writing and course session) flat, it would exert the harmful influence on language teaching. (Hughes, 2003 Taylor, 2005). The negative backwash would mislead teachers and learners to concentrate on doing what is regarded as unnecessary for achieving high score, and narrow the teaching/learning context as well. (Alderson Wall, 1993 Taylor, 2005) Although language tests play a decisive role in language teaching and learning, t he influence of them may show different results in different teaching and testing situation.1.2 Factors influenced by the backwashThe result of studies shows the backwash for several views of language teaching in classroom to a certain extent, such as curriculum, materials, teaching method and content, attitude and behavior, and learning. (Spratt, 2005 Cheng, 1997)In the view of the curriculum, tests are everlastingly regarded as one of references for the change of curriculums. (Pearson, 1988) In addition, Alderson (1986) agrees that the insertion of language testing is considered as an potent factor which can cause the innovation of language curriculum. However, Vernon (1956) emphasizes that some teachers always overlook part of curriculum which couldnt pass to raise piles of tests directly for they concentrate on genteelness test unreasonablely. Besides the testing, there are many other factors such as the nature of course, the class size, stakes of tests, and schools cou ld affect curriculum as well. (Alderson Wall, 1993 Lam, 1994 Lyon, 1996 evidence Hayes, 2003 Watanabe, 1996) Therefore, it can conclude that in various teaching and testing situation, the backwash for the curriculum will show in different ways, and backwash may not exist in some situations at all yet. (Spratt, 2005)The aspect of backwash for teaching materials, many researches point that the revision of language testing can cause the innovation of language teaching materials usage as well. (Alderson Lyons, 1996 Watanabe, 2000) In addition, some studies point that when the language test gets closer the backwash for the selection of language teaching materials is greater. (Alderson Wall, 1993 Lumley Stoneman, 2000 Alderson Lyons, 1996) Besides, we cant neglect that the aim of choosing and employ some teaching materials is to improve relevant language abilities and some is to produce testing techniques merely. (Spratt, 2005) Consequently, tests can impact the usage of teachin g materials, scarcely is not the main factor to determine it.For the view of teaching methods and content, Spratt (2005) sports that tests especially high-stakes tests can affect the implementation of teaching activities and the choosing of teaching contents. For example, the study of TOEFL from Alderson and Lyons (1996) indicates that teachers teaching techniques and classroom activities lead a great many difference between TOEFL and non- TOEFL classes. Moreover, high-stakes tests would let teachers to spend lots of class time in simulating tasks of tests or promoting techniques and strategies of tests. (Shohamy, 1996) However, some researches find that some teachers believes students efficient language acquisitions play the intimately in-chief(postnominal) role in passing language tests. (Watanabe, 2000) Therefore, it could conclude that testing is not the only factor to lead the variety of teaching methods which is related to the miscellany of teachers and teaching contexts as well.In the aspects of attitude and behavior, Pearson (1988) points that testing has impacts which are two in positive and negative side on attitudes, behavior, and motivation among teachers, students, and parents. For instance, students always recognize that tests let them study hard for achieving high scores, however they to a fault worried about testing cannot reflect their all learning aspects accurately. (Cheng, 1998) Furthermore, some teachers prize that testing is a proper way to ensure whether aims of plan have been achieved. (Morris, 1972) Nevertheless, testing always soaks students, teachers, and parents in the atmosphere of anxiety and fear, as all of them worried about the result of tests. (Shohamy, 1996) Under this kind of pressure, students couldnt play their normal take at the same time teachers would do any(prenominal) can serve their students to achieve higher scores. (Alderson Wall, 1993 Spratt, 2005)The connotation for considering the backwash for learni ng is to discuss whether language testing can make students learn more and better. (Wall, 2000) Studies with mentioning students learning strategies and operation point that in the particular testing context students test scores would have at least ten part improvements through several months of related conduction for testing preparation. However, we are not sure whether these finding can be applied to other learning and testing context. (Smith, 1991) Moreover, Andrew (2002) emphasize that after preparing the oral exam part of language tests some students ripe could achieve testing strategies and learn formulaic expression by rote but couldnt interact meaningfully or appropriately yet.1.3 Factors affect the backwashThe teacher, the school and the exam itself are known as the influential elements which can affect the occurrence and the nature of the backwash. (Spratt, 2005 Alderson Wall, 1993)Above all, the most important factor which can affect the backwash is the teacher. Spec ifically, all of teachers belief about teaching and testing, teachers attitudes towards the test, teachers educational level and experience, and teachers own personality will impact whether backwash exists and it is beneficial or harmful. (Smith, 1991 Alderson Wall, 1993 Alderson Lyons, 1996 Watanabe, 1996 Shohamy, 1996, Spratt, 2005)Moreover, the size of school, the education philosophy of school, and the attitude towards tests of schools administrator are regarded as the factors which can influence the backwash. (Watanabe, 2000 Smith, 1991 Read Hayes, 2003) According to Alderson and Wall (1993), schools can curb the appearance of the backwash and affect its nature even for communicative tests.In addition, test itself would be able to impact the existence and the bore of backwash. (Spratt, 2005 Alderson Wall, 1993) Morrow (1986) asserts that the language test which can measure candidates ability of language application can be considered as a fit test with powerful and benefic ial backwash.In summary, language testing can exert influence on language teaching and learning indeed, but it will present as either positive or negative. As the backwash can impact lots of aspects of language teaching and learning process the existence, the nature, and the deep of it essential be diverse in different views. Moreover, the backwash is also affected by some elements, so its nature must be independent in different teaching or testing context neither. Therefore, the backwash will be shown in exceedingly different states in different teaching and testing context. Even though in a particular situation, each aspect of the backwash must be different neither.2. The backwash for College position Test (CET) in college side of meat teaching crosswise China2.1 Introduction of CET in ChinaThe College side Test (CET) is a national unified test which is sponsored by naughty Education Department of the Minister of Education of China and administrated by The case College posi tion Testing Committee. (CET Testing Committee) After completing the English butt course in the second school year, all of university students across China are permitted to participate in this test. (Yang, 2000) There is national wide mountain range of stakeholders (teachers, students, and administrators) involved in this test. In other words, the CET can be regarded as a high-stakes test. Besides, it is proved that the CET is an effective means of measurement for its result can accurately reflect the CE teaching and learning situation some(prenominal) of one university at different stages and different universities at the same stage. (Gu, 2005) As the high status and reputation of this test, passing the CET-4 is regarded as a aptitude to obtain the B.A degree among the majority of Chinese universities. Therefore, there is an extremely close relationship between the CET and the College English teaching and learning indeed. Furthermore, the results of many researches show that th e CET can exert beneficial washback on The CE teaching and learning. (Li, 2009 Gu, 2005 Shao, 2003) Specifically, the exploit of College English Teaching Syllabus has been promoted in CE teaching and learning by the CET. (Gu, 2005) However, there is harmful influence on CE teaching and learning from the implementation of CET as well. (Li, 2009 Gu, 2005 Shao, 2003) Excessive exploitation of coaching materials makes classroom teaching be confined for preparing the test, which results textbooks cant be completed ideally. (Gu, 2005) The washback of CET on CE teaching and learning is either positive or negative and will be discussed specifically as follows.2.2 The positive backwash of the CETWe have discussed that the teacher, the school, and the test itself are the main elements which can affect the existence and the nature of washback on language teaching and learning above.Practically, as the CET is a high-stakes test, it makes all of administrators, teachers, and students to think highly of it. (Hughes, 2003) Moreover, one of the CETs aims is to promote the implementation of College English program Requirements in College English teaching and learning. (CET Testing Committee) In other words, to think highly of the CET among participants could be seem as to link up greatness to College English teaching and learning. Therefore, one of the positive wahback of the CET is that it can guarantee the elemental stage of implementation of college classroom English teaching.Moreover, according to the validation study of the CET (Yang Weir, 1998) shows that the CET is a highly reliable and valid test with rational design and can measure non-English majors English proficiency demandly and objectively at the tertiary level across China. So it can guarantee that the CET can provide the sensible feedback to assist college English teachers and students to promote their teaching and learning.The most important factor to warrant the positive washback is the design of ques tion forms. (Gu, 2005 Li, 2009) Specifically, in order to fully reflect the importance of listening ability, the part of listening comprehension occupies a hefty proportion in the CET. Besides, the question forms get hold of not only the objective choice but also the innate dictation with relatively diversity. Moreover, the selection of subject includes both narrative passages and dialogues with slopped practicability. As reading is one of the main resources to achieve the information for people, training reading ability play a significant important role in college English teaching requirements. For meeting this demand, the CET has appreciable amount of reading tests with rational question form design. All of the selected reading texts are in the form of discourse. For the great percentage of listening and reading in CET, both teachers and students think highly of promoting these two kinds of abilities actively. Furthermore, as the productivity and practicability of these parts of tasks, teachers pay more upkeep to use of original teaching materials. (Gu, 2005 Shao, 2003) By this way, students applied language abilities can be real essentially. Gradually, with the abilities development, students confidence and arouse on learning English has been enhanced as finding themselves can read original English discourse and understand English radio and TV programs days after days. Therefore, the other positive washback of the CET is that it can stick in college English teaching and promote college teaching and learning level across China.Tests of writing and speaking are the most important means to measure whether students have the ability of language application (Hughes, 2003). As the writing part in the CET, it sets the tasks and selects the samples as expression of attitude and information with all students beaten(prenominal) topic to evaluate students communicative applied ability in create verbally English. (Gu, 2005 Shao, 2003) It guides a clear direc tion for teachers teaching and students learning so that they can understand the centre of college English teaching and learning of non-English major has born-again from knowledge of language to language itself. In other word, this kind of washback makes both teachers and students pay more attention on training of language application. For the speaking test of CET is elective, which means a student must get an exact higher score in the written part of the CET (more than 560 points in the CET-4 and more than 530 in the CET-6) who can be permitted to participate in the oral part of the CET. (Li, 2009 Gu, 2005 Shao, 2003) In order to achieve the opportunity to take part in speaking test, most of students eager to get the highest possible scores in written part. At the same time, it acts students study hard. As it is regarded as adventitious motivation which is not as good as the intrinsic one but is better than nothing. (Alderson Wall, 1993) With achieving higher scores, students integrated language abilities have been alter efficiently. Above all, the part of speaking of the CET exerts the beneficial washback on college English teaching and learning as they enhance the initiative of students.2.3 The negative washback of the CETHowever, as the students performance of the CET is an important symbol of English teaching quality in each college and also the focus of competition among them in China, the results of the CET are given insupportable importance. (Li, 2009 Gu, 2005 Shao, 2003) Specifically, in the fourth semester teachers just use the CET-oriented materials completely such as various simulated tests and the former CET papers to prepare the CET which is coming in June without any active classroom activity among students. They believe that test-oriented materials can help students to familiarize the test format and train their time management skill so that enhance the passing rate. (Gu, 2005) Using them as teaching materials in classrooms is inappropr iate, as the CET is just the measurement not the purpose of college English teaching. Therefore, on the aspect of English teaching time distribution, there has been a phenomenon that the unfaltering teaching time has been compressed and the curriculum has been distorted among a great many of universities. Moreover, as the part of speaking in the CET is still optional until now, it must let teachers and students neglect to promote the oral ability during the plosive speech sound of test preparation. In this teaching environment, students are forced to face a lot of papers practice and the inevitable appearance of students dummy English have become increasingly unusual. Finally, students integrated applied abilities haven been promoted adequately with the lack of productive language skills training.Moreover, the score and the certificate have the considerable influence on opportunity of students future learning and job. (Li, 2009 Gu, 2005 Shao, 2003) It potentially makes some studen ts regard achieving the CET Certificate as their final goal of learning English during their undergraduate study period. Consequently, after passing the CET, lots of non-English major students dont attach importance on English learning any more with this shallow attitude. Therefore, the CET cant motivate students to learn English intrinsically.On the aspect of test itself, it restricts students real language ability and interactive language ability. According to Krashen (1982), the most effective way for people to acquire language is achieving comprehensible input. precisely this kind of language input which is slightly higher than learners current level can help learners obtain the better learning effect. As excessive emphasis on the initiative of the CET, the objectivity and impartiality of the score, the stability of the test level, the most of question forms of the CET are the multiple choices. (Li, 2002) Hence, students stray from the right style of learning English with the neglect of the cultivation about real language input and communicative ability training to concentrate on grammar, lexical analysis, testing skills unduly.In summary, the CET itself does exert the certain influence on the college English teaching in China. However, the research (Gu, 2005) shows that some schools and some classes which use textbooks and other teaching materials creatively have the better performance and higher scores in the CET. Therefore, the effects of the CET are much less than other elements such as the attitudes of schools, teachers, and students towards the CET teachers teaching level teachers academic level teaching methods and students initiative. The CET is just a very small part of the whole college English teaching system. Besides, as there are a great many of helplessness which shouldnt be neglected, it is eager to find out some ways and means to achieve the beneficial washback of the CET to assist the college teaching efficiently.Promote the beneficial washback of the CETAs there is a close relationship between the CET and the college English teaching indeed, the CET not only can but also should exert beneficial backwash on college English teaching. Therefore, we attempt to find out the way how we can achieve as more backwash as possible. The possible suggestion will be argued as followsAim to college teaching syllabi, cod a large number of direct language testing call for language testing means testing communicative language skills directly with using as many authentic texts and tasks as possible. (Hughes, 2003) Using direct language testing can measure students skills what we would like to foster efficiently and promote the implementation of related practice for those skills sufficiently during the regular teaching time. (Bachman, 2000) Therefore, in the CET using a great many direct language testing so that test whether students have the effective communicative language ability in the certain context. In this way, we would be able to boost students to practice those interactive language skills as much as possible. Consequently, we can obtain the beneficial backwash from the CET to college English teaching in China as figure 1 shows.Sample tasks of writing test as much authentically and practicably as possibleAdding numerous authentic and practicable tasks in writing test can promote the capricious of the CET. In addition, the creativity of teaching and learning can be developed rather than concentrate on what they can predict. (Hughes, 2003) Consequently, students expression ability in written English can be promoted exactly.3.3 Give the same importance to speaking test as othersChange the part of speaking in the CET to be compulsory rather than optional. Some research shows that Chinese college students oral ability is the weakest one among others. (Ceng, 1999) According to that, promoting their oral ability must be enforced. Testing the abilities which you want to incent can achieve the beneficial b ackwash of test sufficiently. (Hughes, 2003) Therefore, adding the oral part in the whole CET compulsorily can motivate teachers and students to promote this skill consciously.3.4 Provide assistance to teachers in order to hold the new test modelIntroduction of a new pattern of the test may lead many teachers feel they dont adapt it. (Hughes, 2003) delegate the CET from grammar and vocabulary oriented to be more communicative would make a large number of teachers feel they are not familiar to enhance students communicative skills. Therefore, essential training and assistance for teachers could avoid imbalance and loony bin to support the help to teaching.3.5 Reduce the status of the CETThe figure 2 shows the relationship between the CET and the college English teaching and learning currently. Therefore, if make the provision that is ever-changing the CET from the compulsive test to be the optional test during undergraduate study. Besides, get rid of all unreasonable regulations which stipulate CET certificate is one of qualifications to obtain the B.A degree. This is the basic condition to reform college English teaching with getting rid of test-oriented education. We could achieve the positive backwash of the CET to establish more harmonious relationship (which is shown in figure 3) between the CET and the college English teaching in China.To summarize, the innovation of the CET to be more communicative, more practicable, more productive would be able to promote the beneficial backwash of it to influence college English teaching across China energetically.ConclusionThe present essay has discussed the relationship between the language testing and language teaching and learning from generally to specifically. The effect of the language testing is defined as backwash to impact several views of language teaching and learning. In a certain teaching and testing context, the backwash of CET has been known as to affect the implementation of the college English t eaching curriculum the using teaching materials the teaching method and content the administers, the teachers, and the students attitudes towards college English teaching and learning. Additionally, as there are some elements affect the deep and the nature of the CET backwash, it presents either beneficial or harmfully in different aspects of the college English teaching across China. Finally, with some theories of language testing and foreign language acquisition this essay have illustrate some proposals how to achieve as more beneficial backwash of the CET as possible.However, as the importance of communicative college English teaching is a growing concern, the demands of the productivity, the practicability, and the communicability of the CET have been received greater attention in China. Therefore, it needs to invest more and research to enhance the quality of the CET so that promote the beneficial backwash of it to cooperate with the college language teaching and learning perfe ctly.
The Reconstruction of African History
The Reconstruction of African registerThis context will analyze the contri bution of historian B.A Ogot in the reconstruction of the African History. It will explore Kenya as wizard of the African nations and/ or countries where the work of B.A Ogot has contributed a lot in historical reconstruction. His logical implication in history can be accredited to the fact that his deportment was surrounded by the major events with specific reference to the independence flow rate among other events that has built the history of this nation. In order to understand his contributions to the oeuvre topic, twain his past and modern dispositions will be analyzed by re reckoning his literature that he has produced over the years. Following this, this study will overly highlight divers(a) historical processes from the pre-compound time to compound administration in Kenya base on the Mau Mau organization, composition and its impacts.His reconstruction of Africans HistoryThe work of B.A Ogot presents various aspects of both pre-colonial history and colonial era in Africa. agree to the researches conducted found on his contribution into the African history with reference to Atieno (2002) in The challenges of History and leadership in Africa, his main image was to offer defense for humanity, durability, historicity, complexity and wealth of African societies together with their culture. He offered criticism on studies establish on African institutions and customary practices that were said to have failed in whirl any defense to African history through adherence to African ideas of the universe, destiny and its existence. He examines the main aspects of Nilotic societies and cultures ground on the invention of Jok1. This term is found in several(predicate) forms of Nilotic languages whose meaning is God, spirit, tactile sensation among others.Ogot had immense interest in the institutional practices and the history of African plan for instance religion which was captured in his three samples he wrote. On do of a sanctuary is the essay that examines padhola religion that has been said to be commodious in Jok concept and cannot be understood beside Nilotic culture. Ogot draw changes oblige in Padhola religion by the migration of Nilotes to the south, establishment of Bura shrine as a worshipping place, other denomi study rivals and the infiltration of strangers among padhola in nineteenth century. Ogot embarked on effectuate of European religiosity on the lives of the Luo people, which led to religious contradictions in Nyanza. fit in to Ogot, there exists a complex process of converting first African Christians ground on their motivations, training, sacrifices and evangelical activities among others. He presented how the first African Christians faced troubles from the European missionaries, African chiefs and the colonial government.The religious struggle led to the establishment of Anglican perform in which Mango broke and founded his own church the hallowed ghost church. Both religious contradictions and conflicts resulted to the murder of Mango in 1934 during an pom-pom that sprouted on the village he be extensives. The essay A fellowship of their own Ogot looked at both the rise and effects of the Maria host of African church that resulted from a reformation of Roman Catholic Church in Nyanza. Ogot is argued to have been normalizing African initiatives, cultural systems, choices, activities and adaptations through analyzing religious based on their basis. He also showed how religion resisted toward the colonial rationale in Africa. The emergence of the Nomiya Luo church and Church of Christian Africans offer a part indicator of resistance to colonial rule and/ or power. In his essay on Kingship and enunciatelessness Among the Nilotes, he challenged the racist hypothesis that holds that, there exists a correlational statistics between degree of political evolution and the peoples hamitic blood. Ba sed on this hypothesis, he suggested that the establishment of both Shilluk and Bunyoro kingdoms was based on factors such as political, economic and military. In his work, Ogot identified segmentary states that were observed to be less advanced as compared to the Bunyoro Kingdom.Examples of these segmentary states include the Ruothships that belongs to Luo and Acholi and the stateless societies of the Dinka and Nuer. The work of Ogot showed that the process of state formation comprises different groups of people and other historical contexts. Ogot produced many essays that enable one to trace his contribution to the reconstruction of the African history from Kenyans independence to date2. in that respect was only one essay that concentrated on the colonial state alone while others lay emphasis on the anti-colonial resistance For instance, the Mau Mau figurehead that was Kenyas liberation motion during the colonial period or era. Ogot highlighted the colonial rule and its contra diction nature in Kenya and Africa as a whole. His work presented the view that the colonial state and/ or the conquest were observed to be both authoritarian and weak as it lacked legitimacy. Another contribution of Ogot is that through his work, he describes how illiterate and incompetent officials in Africa struggled to cope with colonial version of administration, the missionarys roles, impacts of both the first and Second World War, religious driveways and the reformist political associations that resulted from the enlightened elite.Through the work of Ogot, it is clear that a conjunctive exists between local anaesthetic and study manifestations of what was referred to as nationalism. Ogot explains why the nationalist party KAU failed to establish itself in Nyanza. He argued that Kikuyu leadership in KAU was the major cause of its failure in Nyanza since they only focused on land grievances in kikuyu, which had little connection with Nyanza. According to Ogot, Mau Mau movem ent had historical significance since it was based on Kenyas decolonization. The goals of this movement were to make Kenya a nation in other words, to nationalize Kenya but we cannot call this movement a national movement since it was confined to one part of Kenya that is the commutation Kenya. In addition, B.A Ogot focuses on both the ideology and loving composition of Mau Mau and its origin in the context of African imagination and colonial era.3His writing focused on the people especially those who supported the movement and who opposed it among the kikuyu community. He indicated that the class and ideological divisions among kikuyu people mainly interested the variations between the loyalist and fighters. These variations were based on access to land, affinities to Christianity and traditional culture, attitudes based on constitutionalism among others. He further showed that the differentiation of memories, age, political ecologies in terms of location and dreams about the fut ure accounts for variations. It has been argued that, songs played a major role in peoples culture because people use songs to express their visions, problems, social set and appropriate possibilities. It was therefore through songs that the Mau Mau movement came into practice in Kenya as people expressed their demand for decolonization after a long period of suffering from the colonial states.Through songs, people were able to ring each other therefore reinforcing their strength and spirits of other supporters. According to him, the use of songs implicated that the Mau Mau movement was anti-colonial movement fighting for the decolonization of Kenya. These songs were sang in kikuyu language, symbols, history and legends and this explains why they were said to limit their accessibility and their national appeal. Another contribution of B.A Ogot in the reconstruction of African history is showed on his analyses of The birth of national language. During colonial era most of Africans in Kenya lacked national language since the European language used by the elite lacked nationality in it The researches conducted by B.A Ogot on national language showed that kikuyu was first made a national language because the origin of Mau Mau movement took its roots in Central Kenya4. The elites borrowed their language from the European and/ or colonial state but were few to make the language a national one. Mau Mau left behind legacy in Kenya based on the inherent biases and propaganda that its still in near in Kenya of today. He analyses how different and important figures of Mau Mau movement were arrested and detained with unintended outcomes.Ogot has intercommunicate several critical issues that faced African societies from the colonial period to independence. He examined Africa in terms of politics, leadership, culture, development, identities, and functions of universities and impacts of globalizalisation on Africa. Through his work, Ogot urge writers to investigate mu ch into the social realities that resulted to the current forms of leaders and treat Africans as evil.5The corruption presented by the modern African elite began during the colonial period with writers such as Elspeth Huxley who was said to have had distrusted the over educated African elite. It was argued that most of African nationalist used political slogans of the western during their struggle against the colonial states. In conclusion, the African history is a complex process of historical events that occurred from colonial era to date. The study highlights that the struggle for African history began with the view of Ogots generations and continues to the current generation meaning that as we come up with new topics, theories and methodologies we must(prenominal) adhere to the mission that Inspired Ogott generation.
Thursday, March 28, 2019
Capital Punishment Essay - Physician Participation in the Death Penalty
Physician Participation in Administration of close Penalty is Legitimate The question has been raised whether it is moral for a atomic number 101 to participate in the administration of the finish penalty. This is an issue that many professionals in the field have strong opinions about, regardless of their own personal beliefs about the expiration penalty in general. Physicians are traditionally practiti superstarrs of the healing humanities is using this knowledge to put someone to death a degeneration of their professional ethics? In order to fully understand the issues border physician liaison in the death penalty, it is necessary to explore triplet main areas of analysis. First, we must survey the ethical justification for the death penalty. If the death penalty itself is morally unjustified, then physician affaire in it is, by definition, wrong. Secondly, justification of the death penalty aside, do condemned criminals retain a responsibility field to wellness that the death penalty would violate? Finally, we will examine the specific duties of the physician - even if the death penalty in general is justified, is at that place perhaps a subtler breach of ethical duties by inviting physician participation in the process? Ethical Justification Returning to our first electron orbit of inquiry, is the death penalty justified -- does it violate a prisoners human right to health? Traditionally, two main explanations for the death penalty have been offered - deterrence and vengeance. The evidence on deterrence is doubtful at best. On the one hand, statistics do not indicate the existence of a significant obstructer effect. A United Nations committee studying capital punishment order that the data which now exist show no correlation surrounded by the existence of capital... ...viewed as a healthy relationship. For those doctors who believe in the death penalty, there should be no sanctions for participating in a legitimate procedure, which the y are doing for the best interests of society, and in the name of justice. Conclusion By examining the justifications tush the death penalty and the human rights criminals retain upon being convicted of a felony, we were futile to deduce any legitimate grounds upon which physicians, or any health personnel, should be excluded from participating in executions. While some physicians would argue that participation by doctors in administering the death penalty amounts to a betrayal of the actually precepts of medicine, I have attempted to provide an alternate perspective on the situation. Just as no doctor should be compelled to assist in an execution, no doctor should be banned from doing so, either.
Wednesday, March 27, 2019
Marriage and Love in Elizabethan England Essays -- European History Es
Marriage and Love in Elizabethan England The movie, Shakespeare in Love, provides insight into the earth of Elizabethan England. Through the character of genus Viola De Lessups the audience is shown how marriage was an knowledgeableness entered into non for love, but as a strategic maneuver intentional to enhance the lives of those who would benefit from a league, whether or not the beneficiaries were the people literally exchanging vows. As Queen, Elizabeth I chose not to enter into such a union. She show the thoughts and feelings she had about the subject in both her speech, On Marriage and her poetry On Monsieurs Departure. A comparison of the character of Viola to the real life Queen of England, Elizabeth I, can provide the reader a great understanding of marriage and love in Elizabethan England. Queen Elizabeth and Viola both realized that their station in life would determine their prospects for marriage. Elizabeth had the post t o decide not to marry. Violas marriage to Wessex decided for her as a daughters business and the Queens reign(Shakespeare).2 Viola is the daughter of a wealthy merchant and while she is not so well born she is, as her nurse points out, Well besotted which is the same as well born and well married is more than so (Shakespeare). Likewise, Elizabeth knew that if the Queen of England were to marry she would have to make a union that would benefit her country. She felt pressure from Parliament to marry and addressed it in her speech, On Marriage, given to Parliament in 1559. She assured them that they could adorn that idea clean out of their heads for whensoever it may please God to shift her heart to another kind of life, she intended not to do... ...n that she understood that duty prevented her from such a marriage. In her poem, On Monsieurs Departure she allows a glimpse into the pain it caused her to be unable to fully pursue a life of love. Works Cited1 William Shakespea re, Sonnet CXVI, The Longman Anthology of British Literature The beforehand(predicate) neo Period, ed. David Damrosch, 2nd ed., vol 1B (NewYork Longman, 2003) 1233-34.2 Shakespeare in Love, dir. John Madden, Perf. Gwyneth Paltrow, Joseph Fiennes. Mirimax/Universal, 1998.3 Elizabeth I, On Marriage, The Longman Anthology of British Literature The early on Modern Period, ed. David Damrosch, 2nd ed., vol 1B (NewYork Longman, 2003) 1084-85.4 Elizabeth I, On Monsieurs Departure, The Longman Anthology of British Literature The Early Modern Period, ed. David Damrosch, 2nd ed., vol 1B (NewYork Longman, 2003) 1081-82.
Transformation of Media Forms - The theory of Evolution from paper to the internet :: essays research papers fc
variety of Media FormsThe speculation of evolution from paper to the net income profit The theory of evolution essential evolve with the transforming media forms around it to maintain its scientific and social relevance. In separate words, it must shift from the conventional media forms such as journals, books and publications and move towards the slipway of the internet. Even collective groups of scientists and evolutionists can be shifted from physical to online gatherings via the ways of the internet and its related technologies. The majority of internet users throughout the world see the net as simply an enormous link-up of the worlds computers, after all, this is the popular say people tend to give when asked what is the internet?. Although this common answer is a pretty accurate image, it would be more correct to specify the internet as a global earnings of hardw ar and software product which stores and transports information from a content provider to an end user . This al-Qaeda allows any person who wishes to say anything, access to say it to the world.Controversial topics are abundant on the World Wide Web, and this media form enables these topics to be discussed, investigated, or challenged.Evolution is defined as being A gradual handle in which something changes into a different and usually more complex or better form. Arguments for evolution include The Fossil Record, Darwins theory of Natural Selection, and Biological Evidence. Arguments against evolution include The Second Law of Thermodynamics, Things neer From Other Living Things, Complex Systems Never Evolve Bit by Bit, and then there are the Christian-derived theories such as Why are jellyfish fossils evidence against Evolution? .The internets foundations can be traced back to its beginnings in the US military. In 1957 the Union of Soviet socialistic Republics (USSR) launched Sputnik, the first artificial earth satellite. In response, the United States formed the right Resear ch Projects Agency (ARPA) within the Department of Defence (DoD), to establish a U.S. lead in science and technology applicable to the military. The U.S. DoD was shady as to how it could maintain its command and control over its missiles and bombers, after a nuclear attack. The plan was to develop a military research network that could survive a nuclear strike, and which was decentralized so that if any cities in the U.S. were attacked, the military could still have control of nuclear arms for a counter-attack. This was the first step in the development of the internet, as we know it today.
Tuesday, March 26, 2019
Essay --
The novel Lord of the Flies is obviously a fiction novel, not a real story. But that said it has a push-down stack of real life morals that we can relate to and scour comp be and contrast to our everyday life. It takes morals from our everyday life and change surface history of humans, some biblical perspectives even. Some topics are how the island can be represented as the garden of Eden, the fight for leadership, struggle to survive, and the symbolism of the conch. initial well look at the biblical view the island is like the Garden of Eden. The island was describe as perfect and a paradise, then the plane crashed and the boys came. The book describes the island with beauty and majesty and just a cracking place to be- a tropical paradise. If we take a look at the bible in Genesis, it describes the Garden of Eden the same way, no sin, no danger, nothing bad. Then the form of man came. The plane in LotF makes a scar on the island when it crashes, qualification the island imperfect, the boys quarrel and fight, the spill the pigs blood on the surface, start fires, build homes, the boys essentially colonize the island in their own little way, and in the end, basically cauterise the whole thing. Same with the Garden, God makes the Garden of Eden pulchritudinous, and perfect. The trees, animals, and everything else all stop together. Then the serpent comes and tempts the woman, whom gives to the man, and then the fall happened. Mans loathsome nature shows through in both these stories, all that was good and beautiful is destroyed by man. The fight for leadership is a huge remainder in this story, maybe even the main one. Ralph has the good leader shape about him he finds the conch and makes sit a symbol of power almost. It is something that in the beginning can con... ...s boys do. These boys in the book though take these actions to a new level, they murder two of the boys with them, burn the island, hunt to live save also brutally kill the pi gs to. But in the end they are only young immature boys, when the captain comes in the end then the author describes Jack, this great, powerful, barbarian leader just a small illogical boy chasing other boys with spears made of rocks tied to sticks. They end up existence nothing more. The novel Lord of the Flies is obviously a fiction novel, not a real story. But that said it has a lot of real life morals that we can relate to and even equivalence and contrast to our everyday life. The boys on the island have relatable situations to us in our humanness today and the world in the past. The fiction novel is a great book, the author makes connections between the two worlds, and they are easily distinguishable.
Home Theater :: Television Media Entertainment Technology Essays
Home TheaterWhat is a central office line of business?There are three main(prenominal) components of a home airfield system, which are a video video pageant, a source, and sound systems. A prefatory home theater has a television (at least 27), a best DVD player, and a surround sound system with at least 4 speakers. Today, we rout out benefit from recent breakthroughs in electronic such as progressive scan DVD players, flat adorn TV and Dolby Digital surround sound. And also the packaged systems make ingathering home theater easier than you can imagine.Video DisplayThe video pageant is the near important component of your home theater. If the picture doesnt look good or isnt big enough, it will lower the impact of the movie considerably. The display is also probably the most expensive piece of a home theater, generally covering half of the total value of the system. There are so many types of displays but the ones to look at are traditionalistic tube TVs for the lower e nd systems, rear projection TVs for mid clip systems and front projection systems for high end system.There are several(prenominal) things you need to look to buy a TV1. Fit in the roomScreen size is the most important factor in choosing a TV because youll still want the most immense pictures you can get, which generally means you want to sit 1.5 times the screens diagonal meter away from a dewy-eyed-screen HDTV. For example, a 42-inch HDTV should be rigid at least 63 inches from the couch. You need to consider viewing exceed too in order to get full performance of your television.2.Size and display typeMost sets up to 40 inches diagonally are cultivate view, meaning they use the common glass to display the image. Direct-view TVs remain the most popular thanks to their smaller sizes but also because they generally offer up a brighter picture with a wider viewing angle than larger rear-projection TVs. The main advantage of a rear-projection set is size because they range betwe en 40 and 82 inches diagonally.3. Choosing Aspect RatioIf you enamour mostly television, like newsworthiness and sports, you are better off with conventional 43 grammatical construction ratio, but if you watch mostly movies, you are better off with wide screen 169 aspect ratio. But, it always depends on what you watch and what you need the most. Wide-screen sets also let you stretch the image horizontally to eliminate the window-box bars or otherwise broaden or trim back the picture to fill the wide screen.
Monday, March 25, 2019
US v Moreno :: essays research papers
fall in States vs. Carlos Alfonso MorenoOn July 12, 2004, Carlos Alfonso Moreno appeared forrader the United States Court of Appeals, Tenth Circuit. He brought beforehand the solicit an invoke challenging the zone courts calculation of his sentencing under the United States Sentencing Guideline. The panel determined after reviewing his case that an oral argument would non be necessary. They were able to look at the details of his case and guard their decision.Mr. Moreno was charged in district court with various drug aversions and with world a felon in monomania of a firearm. He entered a guilty plea to possession with intent to distribute more than fifty grams of a substance containing a detectable amount of methamphetamine and possession of a firearm by a prohibited personIn the pre-sentence report recommending Mr. Morenos sentence, the Probation Officer added a point to his cruel explanation summate as a result of September 2001 convictions for driving with a hang up license and for unsafe turning or stopping. For this earlier offense, Mr. Moreno was sentenced to six months in jail, with all but five eld suspended, and six months of probation. The Probation Officer justify the addition of this point by citing the sentencing guidelines, which direct that sentences for less than sixty days should be given one point. The Probation Officer then determined that Mr. Morenos criminal history points totaled ten, placing him at the bottom of criminal history category. The district court agreed with this result and calculated Mr. Morenos total adjusted offense direct to be twenty-five. The court subsequently sentenced Mr. Moreno to 100 months in prison, which is at the bottom of the 100 to 125 month range for an offense level twenty-five and criminal history category 5. On appeal, Mr. Moreno asserts the district court erred by adding a point to his criminal history for the earlier sentence. absorbed the additional point, Mr. Moreno would have been in a lower criminal history category and hence could have been subjected to a shorter sentence. However, because Mr. Moreno failed to raise an objection before the district court regarding the additional point for the September 2001 sentence, his sentencing stood.
The Dramatic Intensity of The Crucibleââ¬â¢s Courtroom Scene Essays
The Dramatic colour of The Crucibles Courtroom SceneIn this assignment I am going to investigate the Dramatic Intensity ofThe Crucibles courtroom scene. I am going to do this by exploring the exerciseors line used, how the characters develop and how Arthur millerunfolds the plot to keep the reader interested and how emotion and touch sensations dictate the movements of the play.The Crucible is set against the backdrop of the mad hunts of the capital of Oregon mesmerise trials in the late 17th carbon. It is about a town, lateraccusations from a few girls, which begins a mad hunt for witches thatdid not exist. Many towns flock were hanged on charges for ofwitchcraft. Miller brings out the absurdity of the incident with thetheme of integrity and righteousness. The theme is conveyed by thestruggles of Millers main character prank Proctor.In The Crucible all the resolutions flow naturally from one event to next.Everything happens naturally from the natures of the characters. Th efact that the story isnt made up and it is found on a true storymakes the play interesting. There was qualified conflict, so manythings going on, it kept my interest aroused. There is much tensionand suspense in the story. It covers basic kind-hearted instinct andqualities. It shows the human necessity for survival, and the lengthsat which a person will go to but his life. The Crucible is a study ofmass hysteria that affects the village of Salem in a foremost way.There are many themes track through the play. One is obviouslywitchcraft. There is an idea of Abuse of post and, also theindividuality and society, this is important because it is set in the17th century and everyone was the same. There is an idea of honour andtruth. Proctor... ...se are very valuable to gambling as it addsinterest and has the edge of the seat effect.The crucible is a stimulate play which gripped my attention, and afterresearching the play I have found how Arthur miller has allowed theplot to flow naturally to unfold dramatic intensity shown throughthemes to add tension and emotion to the story line. The themewitchcraft adds disquiet as other themes are unearthed,. The individualand society theme, when everyone is expected to act the same wediscover witchcraft, which is brought by one of the main characterswhich does not break down to the same society. The narrator & stageinstructions added to the text added conflict, however after watchingthe play I found it greatly enjoyable. I felt Arthur Miller made thecrucible dramatic by showing feeling and emotion shone throughaccusations and the events of the play.
Subscribe to:
Posts (Atom)