Tuesday, December 24, 2019
A Comparative Study Of Classroom Teachers Perceptions...
Research Article Selected: A comparative study of classroom teachersââ¬â¢ perceptions towards inclusion. by K.H. Pritchard (2014). Summary of Article: Literature review The basis of this article is to evaluate the characteristics that impact teacherââ¬â¢s perceptions of inclusion in the classroom. There is a general consensus that the single most important predictor of successful inclusion is the attitude of the general education teacher (Golmic Hansen, 2012). The study surveyed both elementary and secondary teachers to determine if there was a difference in perception when it came to teaching students with special needs in their general education classroom. The study looked at several different factors including but not limited to teacherâ⬠¦show more contentâ⬠¦The numerical data was then analyzed electronically using the SPSS database. Participants for this study were randomly chosen regular education teachers ranging from kindergarten through twelfth grade. Randomized participants received an electronic message with a link to complete a survey. The survey questions asked participants to agree/disagree/remain neutral on statements such as ââ¬Å"students with disabilities cant be trusted with responsibilities in the classroomâ⬠or ââ¬Å"students with disabilities should be educated in regular classrooms with nondisabled peersâ⬠. Participants answered the survey questions and turned it back into an generator called Survey Monkey which condensed the information of the survey as well as provided demographic information. That information was then put onto a spreadsheet so the researcher could adequately analyze the data. The researcher analyzed factors mentioned above such as gender, years of experience, and number of training hours concerning inclusion. This data was also compared to results from a study conducted 30 years earlier by Tallent (1986). Results: The main research question that Pritchard tried to answer was ââ¬Å"What are the key identifiable characteristics that impact teachers perceptions towards inclusion?â⬠Of the participants used, 44% were elementary (K-5) teachers and 56% were secondary teachers (6-12). Seventy-seven percent were female and 23% were male. There were
Monday, December 16, 2019
Midaq Alley as the Woman Free Essays
The women of the Middle East would continue to uphold their traditional image, even though in their heart of hearts many of them may be yearning for plain liberty.à The chief character of Naguib Mahfouzââ¬â¢s Midaq Alley (1992) is a woman by the name of Hamida, who must put up acts to stay true to her traditions, at the same time as she yearns for something beyond the ordinary.à Yet, her passage into a world where men and women must be considered equal is a narrow one. We will write a custom essay sample on Midaq Alley as the Woman or any similar topic only for you Order Now As a matter of fact, her life is the Midaq Alley, which ââ¬Å"resembles a ââ¬Ëtrap,ââ¬â¢ with walls on three sides, making darkness one of its pervasive features (Deeb).â⬠à What is more, there is a very narrow entrance and an equally narrow exit to the small alley ââ¬â away from the big, outside world ââ¬â that the Middle Eastern woman has come to represent in Mahfouzââ¬â¢s novel (Deeb). Yet, Hamida is not the kind to give up easily.à She sneers at her husbands-to-be simply because she wants something better than them, most definitely a life that is more prosperous, and outright superior, that is, the big, outside world.à She considers her husbands-to-be as nonentities because she thinks she can achieve well for herself without them.à At the same time, she is bounded by Middle Eastern customs and culture to choose one prospect and get married like ordinary girls (Mahfouz). Hamida admires the women who have escaped their marital bonds.à She is especially inspired by the factory girls she knows ââ¬â who all happen to be Jewish.à She informs her mother about the same, ââ¬Å"If you had seen the factory girls!à You should just see those Jewish girls who go to work.à They all go about in nice clothes.à Well, what is the point of life then if we canââ¬â¢t wear what we want? (Mahfouz)â⬠According to Middle Eastern customs for women, Hamida must control her true desires before the cultural expectations that are attached to all women.à All the same, Mahfouz brings to the mindââ¬â¢s eye the picture of Middle Eastern women that are longing to free themselves from the bonds of patriarchy, and all the rules of society that are connected to the same.à Apparently, the Middle Eastern women would also like to free themselves from the difficult clothing they are forced to wear. Perhaps they would like breaks from such clothing.à While women such as Hamida may genuinely face a problem with restrictive customs, Mahfouz also describes the ââ¬Ëproperââ¬â¢ girls that are not expected to show their desires anyway.à Boys of the Middle East, on the contrary, are allowed various other facilities, also according to the author.à Boys are permitted, among other things, access to sex, nightlife, and friendships outside the family (Mahfouz). When Hamida gets married to Abbas, she only does so to escape her motherââ¬â¢s home.à Escape seems to be her only wish.à She turns into a prostitute as soon as her husband leaves home for an indefinite period of time.à But, does she find her eventual escape route through this act?à It appears that while many Middle Eastern women may be searching for escape routes from traditions, once and for all, it was only Hamida who actually managed to escape.à Whether she had dreamt of reaching a brothel or not is not the point of Mahfouzââ¬â¢s tale. The fact remains that Hamida had no choice to live a liberated life as a Middle Eastern woman, except as a prostitute.à Most Middle Eastern women would shun the idea of prostitution altogether, calling it a major sin.à However, Hamida was so desperate to escape that she defied the common image of the Middle Eastern woman to truly escape her cultural constraints, once and for all.à Whether she also found happiness is not the concern of the author either.à Hamidaââ¬â¢s liberation, on the other hand, is an important message of Midaq Alley (Mahfouz). Hamida was the kind who merely upheld the traditional image of the Middle Eastern woman, just as many other Middle Eastern women probably do.à At the same time, she was desperate enough to express her suppressed desires of liberation that she chose the career of prostitution so as to escape all associations with the patriarchal traditions.à Perhaps, therefore, Mahfouzââ¬â¢s writing is a warning for the extremely strict movements that reduce people to suppressed desperation, which eventually bursts into crimes and various other problems (Mahfouz). Works Cited Deeb, Marius. ââ¬Å"Najib Mahfuzââ¬â¢s Midaq Alley: A Socio-Cultural Analysis.â⬠à Bulletin (British Society for Middle Eastern Studies), Vol. 10, No. 2 (1983), pp. 121-130. Mahfouz, Naguib. Midaq Alley. Reprint edition. New York: Anchor, 1992. à How to cite Midaq Alley as the Woman, Essay examples
Sunday, December 8, 2019
Hadoop and Cloud Computing in Genomics â⬠Free Samples to Students
Question: Discuss about the Hadoop and Cloud Computing in Genomics. Answer: Introduction This assignment is the analysis on the big data applications threats and the mentioned ways which is taken by the company to minimize the threats of the big data. The given assignment discusses about an organization known as the European Union Agency for Network and Information Security (ENISA) which has been the network center and working in the Information technology field to study the threat which can compromise the security of any nation (Kimwele, 2014).. The ENISA also assists the European nation bodys members regarding the improving network and its securities of the Information technology field. The big data concept which is the collection of the wide data which is both complex and not understandable the main purpose of big data is to draw some meaningful pattern or the algorithm from these data which will help them to study and analyze how a customer is performing various activities like shopping and accounting transaction. The source of the big data can come from anywhere be it a bank or hospitals(Kitchin, 2014). The data entered in these organizations is the big data which is utilized by the company. Various companies have reported that the application of the big data has helped them in understanding their customers and take proper decision according to the situation. Thus the big data application is not going to rise in the coming days and used in all the sectors of the company for doing business. The big data has application in the government sector which includes the military and the intelligence system. Despite of all the advantage of the big data the article enlists varies limitation and drawbacks of using big data. Though the big data has huge application it also has privacy and security threat to the country and the company. There are various threats related to the big data some of them are: The usage of the big data has not only put the ordinary and common data at risk but also the private and the confidential data at the risk(Walker 2014). The high replication and the outsourcing of the big data are the new type of the ways which has resulted in breaching and the leakage of the data. The big data usage has posed the threat to the privacy of the people which has compromised the security of the data. At the time of creation of the link in the case of the big data the collection of the big data is the major cause of the penalization the extra creation of the link is the major cause of the leakage of the information and data. The stake holders in the big data such as the data owners or the data transformers or the data providers differ in their view about the usage and security of the data their idea may conflict which make it a difficult environment for them to operate and devise a proper security plan for the data which compromise the security of the data. Lastly in various sectors of the information and communication technology (ICT). Different professionals are trying to apply their own privacy and security laws which are best according to them but on the overall security of the data it significantly decreases(Halenar, 2012). The big data rising pattern is embracing the Security-by-default principle though it is still in the early stage it has proved to be quite beneficial and highly practical in compare to the cost and effort in the invested in the ad hoc solution at the later time. The given assignment later focuses that there has been the huge gap between the issues of the big data and the counter measures designed to tackle the problems of the big data(Kayworth Whitten, 2012). Analyzing the gap the assignment has enlisted some of its own counter measure which can solve the limitation of the big data. The assignment further raises a valid question regarding current trend of the countermeasures for adapting the existing solutions which can be used against the current trends of the countermeasures for adapting the solution which is against the traditional data threats. The current environment of the big data is currently focused on the amount of the big data. The countermeasures which is currently existing is has been devised to counter the scalabilities of the big data which does not fit the big data problems which results in the partial and ineffective approach to the protection of the big data(Chen Zhang, 2014). The given assignment enlists some of its own guidelines and the countermeasures for the next generation of the data. These are: Firstly it tells to stop following the existing approach to the traditional data and work in defining the major data problems. Secondly it tells to identify the gaps and find the required needs for the current practices and to work in planning the specific definition and the specific standardization activities. Thirdly it tells to invest in training and teaching the IT professionals about the big data and aware them about the correct measures of usage of the big data(ODriscoll, Daugelaite Sleator, 2013). Fourthly it tells to work in defining the correct tools and to measure the security and privacy for the for the protection of Big Data and it environments. Fifthly it tells to analyze and find the assets to the big data and accordingly select the solutions which have minimal risk and threats.The assignment enlists some of the major threats which have been listed below: Threat due to Information leakage/sharing due to human error Threat due to Leaks of data via Web applications (unsecure APIs) Threat due to inadequate design and planning or incorrect adaptation. Threat due to inception of the information. Threat: Violation of laws or regulations / Breach of legislation / Abuse of personal data Threat: Failures of business process Above all the enlisted major threats the threat due to Leaks of data via Web applications (unsecure APIs) can be listed as the significant threat above all major threat(Labrinidis Jagadish, 2012). All other threat is due to the negligence of the human activity or failure in protecting the data. These major threats can be controlled by employing the correct person but the second major threat is due to the but the breaching of the data due to Web applications (unsecure APIs) is the breach which can take place due to the software which do not have enough capability to protect the data. According to the assignment various user of the big data has claimed that the security is the least concern for them while using the big data. The new software component designed for the big data is generally with the service-level authorization, but there are few utilities which is available to protect the core features and application interfaces (APIs). The big data are designed on the web service mode ls. The application interfaces (APIs) has become main target for all the cyber attack like in the case of like the Open Web Application Security Project (OWASP) which comes in the list of top ten and there are few solutions which can be used to stop them. The security software vendor Computer Associate (CA) and various other related sources find out via report that the data breaches are due to not a secure application interfaces (APIs) the social networks which includes the yahoo ,face book and snap chat and also in various photo and video sharing apps(Crossler et al 2012). The given assignment also gives the example of the Semantic Web technologies through its injection of its SPARQL code. It says that the flaw in the big data security is common and in the newly available languages like RDQL and the SPARQL where both are read-only query languages. There utilization has introduces a new vulnerabilities in the big data which was already present in the flaw of old-style query language s. The misuse of the languages is well aware and is dangerous for the usage. The collection of these new languages has already given the tool to check the user and minimize the risk. There are other big data software products for an example Monod, Hive and Couched who also suffers from the traditional threats which includes the execution of the code and the remote SQL injection(Provost Fawcett, 2013). The assets targeted by these threats belong to group Data and asset type Storage Infrastructure models (such as Database management systems (DBS) and Semantic Web tools). The threat agent is a person or organization who has the capability and clear intention to plant threats related to certain application like the big data and use them to spread cyber terrorism. Therefore it is crucial for the user to be well aware about the threats and to stay away from them as far as possible. Some of the threat agents are: Corporations: the cooperation category comes under the company which is involved in the offensive tactics. The cooperation is considered to be the threat agents as this cooperation spreads the cyber terrorism to gain the competitive advantage in the market by attacking its rival companies(Singh Khaira, 2013).Depending upon the cooperations market power and its sector the corporations generally acquires significant capabilities which can range from the singe technology up to human engineering intelligence, especially in their area of expertise. Cyber criminals: the cyber criminals are the threat agent who spreads the virus online and hack and breach the organization data for the financial reason. They hack into the companies data and steal the private and the confidential data to demand the ransomed from the company to give back the data like the winery ransomwae attack in the year 2017. Cyber terrorist: The difference between the cyber criminals and the terrorist that their demand above the financial reason. They want to destabilize the countrys political, social and religious base and spread terror in the country. They operate at the international level and spread the hatred message online to provoke the people. Online social hackers (activists): The social hackers are the threat agents mainly target the children and girls and torture them mentally promoting the cyber bully machines (Al-Aqrabi et al 2012). Script kiddies: they are basically unskilled or incapable hackers who use the programme and scripts of the hackers to hack the computer system. Employees: This category of the threat agent includes the employees who works for the particular organization and have access to the data of the company. They can be the security guards or the data operation manager. Nation states: Nation state is the rising threat which has become prominent in the recent times. Threat agent due to the deployment of sophisticated attacks that are considered as cyber weapons through the capability of these malware The above described threat agents are responsible for all the cybercrimes in the nation. In order to be protected from these threat agents. People should disclose their private information like photo or any private information. The hackers utilize this information to target these people and mentally torture them for the money. Secondly the company needs to keep tab on their employees of their activities against and stealing of the data. The ETL is full form is extraction, transformation, and loading. It is defined as the stages from the data is extracted from the desired location to the data is transformed into the desired target and finally to the loading where the data is loaded to deliver to the desired destination(Ackermann, 2012). According to the target requirement and last phase is the loading phase it is the phase in which the data is loaded into its warehouse and ready for the delivery. For the better performance of the ETL various steps are enlisted: Loading the data incrementally: for the better and efficient access of the data. The data should be arranged into certain pattern which can be increasing or decreasing according to the user demands this will help in better management of the data and it will to find the record afterward as the user will remember the pattern. The partition of the large tables: For better and efficient access to the data the large data table are divide into the smaller table so that data of the table can be easily seen ad be accessed. It will also it will help in quicker and efficient access of the data. It will allow easier switching of the data and quick insertion, deletion and updating of the table. Cutting out the extra data: another way the data can be simplified by cutting and eliminating the unwanted data. The data table should be regularly analyzed and the extra data should be eliminated for efficient access to the data. Usage of the software: there is software available in the market which can be used to simplify the work of reducing the data. The software can be the hardtop. It uses the HDFS application which segments data into the small part and make them into simple cluster. The data which is duplicated through which the system maintains the integrity automatically. The given assignment discusses about an organization known as the European Union Agency for Network and Information Security (ENISA) which has been the network center and working in the Information technology field to study the threat which can compromise the security of any nation (Ackermann et al 2012). It enlists the securities which include the usage of the big data which are not only the original data but the confidential data which are at risk as with the high replication of the big data for the purpose of storage and the outsourcing of the big data these type of the technology are new ways of the breaching and the leakage of the data. Secondly the big data are posing threat to the privacy of the individual which has the impact on the data protection. The given assignment later focuses that there has been the huge gap between the issues of the big data and the counter measures designed to tackle the problems of the big data. Analyzing the gap the assignment has enlisted some of its own counter measure which can solve the limitation of the big data. The assignment further raises a valid question regarding current trend of the countermeasures for adapting the existing solutions which can be used against the current trends. The assignment also enlists 5 major threats related to the data mining. The assignment also enlists threat agent such as cooperation, people, cybercrime which spreads the online hacking. Thus it can be conclude that the organization is not happy with the current security of the big data and it also recommended various countermeasures from its own side what can be done to prevent the misuses of the big data. References Ackermann, T. (2012).IT security risk management: perceived IT security risks in the context of Cloud Computing. Springer Science Business Media. Ackermann, T., Widjaja, T., Benlian, A., Buxmann, P. (2012). Perceived IT security risks of cloud computing: Conceptualization and scale development. Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., Zhan, Y. (2012, April). Investigation of IT security and compliance challenges in Security-as-a-Service for Cloud Computing. InObject/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on(pp. 124-129). IEEE. Amanpartap Singh, P. A. L. L., Khaira, J. S. (2013). A comparative review of extraction, transformation and loading tools.Database Systems Journal BOARD, 42. Boyd, D., Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon.Information, communication society,15(5), 662-679. Chen, C. P., Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data.Information Sciences,275, 314-347. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R. (2013). Future directions for behavioral information security research.computers security,32, 90-101. Halenar, R. (2012). Real Time ETL Improvement.International Journal of Computer Theory and Engineering,4(3), 405 John Walker, S. (2014). Big data: A revolution that will transform how we live, work, and think. Kayworth, T., Whitten, D. (2012). Effective information security requires a balance of social and technology factors. Kimwele, M. W. (2014). Information technology (IT) security in small and medium enterprises (SMEs). InInformation Systems for Small and Medium-sized Enterprises(pp. 47-64). Springer Berlin Heidelberg. Kitchin, R. (2014).The data revolution: Big data, open data, data infrastructures and their consequences. Sage. Labrinidis, A., Jagadish, H. V. (2012). Challenges and opportunities with big data.Proceedings of the VLDB Endowment,5(12), 2032-2033. Loske, A., Widjaja, T., Buxmann, P. (2013). Cloud Computing Providers Unrealistic Optimism regarding IT Security Risks: A Threat to Users?. McAfee, A., Brynjolfsson, E., Davenport, T. H. (2012). Big data: the management revolution.Harvard business review,90(10), 60-68. ODriscoll, A., Daugelaite, J., Sleator, R. D. (2013). Big data, Hadoop and cloud computing in genomics.Journal of biomedical informatics,46(5), 774-781. Provost, F., Fawcett, T. (2013). Data science and its relationship to big data and data-driven decision making.Big Data,1(1), 51-59. Rakes, T. R., Deane, J. K., Rees, L. P. (2012). IT security planning under uncertainty for high-impact events.Omega,40(1), 79-88. Tankard, C. (2012). Big data security.Network security,2012(7), 5-8. Understanding big data: Analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media.
Saturday, November 30, 2019
Rape as a Tool of War in DRC
The Democratic Republic of Congo (DRC) has undergone a series of war over the past fifteen years. The first war that broke out in 1996 and ended in 1997, ousted long time ruler Mobutu Sese Seko and brought to power Laurent Kabila, a rebel leader supported by Rwanda and Burundi (HRW 35).Advertising We will write a custom essay sample on Rape as a Tool of War in DRC specifically for you for only $16.05 $11/page Learn More The second war from 1998-2003, started when Laurent Kabila disagreed with his initial backers, propelling Rwanda and Uganda to invade the east of the country. The war led to the death of approximately 5.4 million people. Sexual violence was widespread and sometimes systematic. Rival groups used it as a tool of war to deliberately terrorize civilians, to exert control over them or punish them for perceived collaboration with the enemy. Reports indicate that armed groups would abduct women including young girls and use them as sexual slaves (HRW 40). Many of the crimes committed amounted to crimes against humanity. In fact, women affirmed that the war was being fought on their bodies (HRW 43). Sexual violence continued in the Congo throughout the peace process and the national elections in 2006. In Eastern Congo, new armed groups emerged leading to continued perpetration of rape cases. Reports indicate that sexual violence against women continued in North Kivu in 2008 due to intense fighting between rival groups (HRW 44). Incidences of rape propagated by civilians have notably increased in the recent past. This is due to an increase of demobilized combatants who have reintegrated into society amid poor rehabilitation measures in society. The brutalization of society that has eroded protective social norms also contributes to these crimes (HRW 45). These atrocities against women have led to the crowning of Congo as the worst place on earth to be a woman. The Congolese national army (FARDC) is considered as the key perp etrators of sexual violence. The army came into place after the installation of the transitional government in June 2003 (HRW 56). This army brought soldiers from all the leading rebel groups as well as former government army together. The strategy aimed at creating harmony. Officer and commander groups were divided up between them. In addition, the transitional government introduced a new policy called mix-up in which new brigades were formed comprising of soldiers from main rival groups.Advertising Looking for essay on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More This policy targeted to break former chains of command and enhance the integration of former enemy combatants into new units. A rapid integration process that took place in 2009 saw estimated 12,000 combatants from rebel groups join the national army. The national army was estimated to have close to 60,000 soldiers after, the integration process. The national ar my encountered long standing problems that included indiscipline, pay, command and control and contributed further to the world scale abuses committed with impunity by the Congolese soldiers. Since they had been deployed throughout the country, the soldiers formed the largest perpetrators of rape cases. Since the army was characterized by gross misconduct, army officers could not stop sexual violence or punish undisciplined soldiers. The war in the Democratic Republic of Congo led to a serious economic crisis. First, the war caused massive destruction on the local infrastructure. This caused a reduction in the local production of the country. Secondly, the war brought to a halt the local banking industry. Entrepreneurs could not access funds to revive the local infrastructures and get their businesses running. Foreign investors and international lending institutions withdraw their support. The rebel leaders took control of trans-border commerce (Vlassenroot and Raeymaekers 56). The rebel leaders also led to the formation of informal tax payments systems. Business men who wanted to progress had to form friendly relationships with the rebel leaders who controlled the movement of goods. The businessmen had to pay pretax on custom duties to get favors from the military leaders. The situation derailed anyone who thought of running a business in the Congo. Consequently, manufacturers and traders had to deal with a steep increase in prices of imported household products. In addition, prices for local agricultural products rose. The war led to a shift from local production, to the importation of already made products from foreign countries. In conclusion, it can be noted that the war in the Democratic Republic of Congo significantly affected women. Fighting parties used the women as tools of war. Women were raped by soldiers of their rival groups in retaliation and held hostage in exchange for their husbands. The situation worsened further when rebel groups sprang up and propagated sexual violence against women. Women literally run away from soldiers and the armed bandits. The transitional government army that comprised of soldiers from chief rival groups had gross misconduct amongst its soldiers.Advertising We will write a custom essay sample on Rape as a Tool of War in DRC specifically for you for only $16.05 $11/page Learn More The armyââ¬â¢s main intention was to create harmony amongst the rival groups. However, gross misconduct and poor coordination prevailed in the army. The women suffered extensive physical and psychological effects. Despite of the vast economic potential of the Democratic republic of Congo, the country has not realized its expected economical returns. The series of wars destabilized the countryââ¬â¢s economy. Works Cited Human Rights Watch (HRW). Soldiers who Rape, Commanders who condone: Sexual Violence and Military Reform in the DRC. New York: HRW, 2009. Print. Vlassenroot, K. and Ra eymaekers, T. Conflict and Social Transformation in Eastern DRC. Massachussets: Academia Press, 2009 Print. This essay on Rape as a Tool of War in DRC was written and submitted by user Esmeralda Wilkinson to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Tuesday, November 26, 2019
A Bridge to Wiseman essays
A Bridge to Wiseman essays "A bridge to wisemans cove" is a lively and adventurers story of a young boys journey who is seeking for an answer. Carl is a person who is trying to find self- discovery and self-worth you see this in different ways throughout this novel. His journey is tuff and at the end when you think it is over he realizes his worst nightmare. At the start of the novel we see that Carl can be shy at times and doesnt handle some situations well. But he is a very bright person but is looking for love and attention. Carl realized straight away what was happening when he overheard a conversation that his sister Sarah had with their Aunt Beryl. He knew somehow that when Sarah said that they would only be there for a few weeks that she ment till their mother came back or she was going to leave them there while she enjoys the rest of her life. Carl changes a lot as he goes on to live with Harley at their Aunt Beryls home at Wattle beach. At the start when they hear about going to wattle beach they had mixed emotions. Them being that they were looking forward to going to the beach but didnt want to live with their auntie because she is very strict. Aunt Beryl tells call in order to live with her he would need to find a job. So Carl quits school and goes in search for a job to make money to live with their auntie. Carl realizes that the working life is tough especially at his age with the last name as Matt. There also werent many businesses that needed his help. He finally got a job and grows up into a young man. Carl becomes upset after finding out the reason that Matt is such a hated name. ...
Friday, November 22, 2019
Creating and Using Resources in Visual Basic 6
Creating and Using Resources in Visual Basic 6 After Visual Basic students learn all about loops and conditional statements and subroutines and so forth, one of the next things that they often ask about is, How do I add a bitmap, a wav file, a custom cursor or some other special effect? One answer is resource files. When you add a file using Visual Studio resource files, theyre integrated directly into your Visual Basic project for maximum execution speed and minimum hassle packaging and deploying your application. Resource files are available in both VB 6 and VB.NET, but the way theyre used, like everything else, is quite a bit different between the two systems. Keep in mind that this isnt the only way to use files in a VB project, but it has real advantages. For example, you could include a bitmap in a PictureBox control or use the mciSendString Win32 API. MCI is a prefix that usually indicates a Multimedia Command String.à Creating a Resource File in VB 6 You can see the resources in a project in both VB 6 and VB.NET in the Project Explorer window (Solution Explorer in VB.NET - they had to make it just a little bit different). A new project wont have any since resources arent a default tool in VB 6. So lets add a simple resource to a project and see how that is done. Step one is to start VB 6 by selecting a Standard EXE project on the New tab in the startup dialog. Now select the Add-Ins option on the menu bar, and then the Add-In Manager... This will open the Add-In Manager dialog window. Scroll down the list and find VB 6 Resource Editor. You can just double-click it or you can put a check mark in the Loaded/Unloaded box to add this tool to your VB 6 environment. If you think youre going to use the Resource Editor a lot, then you can also place a check mark in the box Load on Startup and you wont have to go through this step again in the future. Click OK and the Resources Editor pops open. Youre ready to start adding resources to your project! Go to the menu bar and select Project then Add New Resource File or just right-click in the Resource Editor and select Open from the context menu that pops up. A window will open, prompting you for the name and location of a resource file. The default location will probably not be what you want, so navigate to your project folder and enter the name of your new resource file into the File name box. In this article, Ill use the name AboutVB.RES for this file. Youll have to confirm the creation of the file in a verification window, and the a AboutVB.RES file will be created and filled into the Resource Editor. VB6 Supports VB6 supports the following: A string table editor(Edit String Tables...)Custom cursors - CUR files(Add Cursor...)Custom icons - ICO files(Add Icon...)Custom bitmaps - BMP files(Add Bitmap...)Programmer defined resources(Add Custom Resource...) VB 6 provides a simple editor for strings but you have to have a file created in another tool for all of the other choices. For example, you could create a BMP file using the simple Windows Paint program. Each resource in the resource file is identified to VB 6 by anà Idà and a name in the Resource Editor. To make a resource available to your program, you add them in the Resource Editor and then use the Id and the resource Type to point to them in your program. Lets add four icons to the resource file and use them in the program. When you add a resource, the actual file itself is copied into your project. Visual Studio 6 provides a whole collection of icons in the folder... C:\Program Files\Microsoft Visual Studio\Common\Graphics\Icons To go with tradition, well select the Greek philosopher Aristotles four elements - Earth, Water, Air, and Fire - from the Elements subdirectory. When you add them, the Id is assigned by Visual Studio (101, 102, 103, and 104) automatically. To use the icons in a program, we use a VB 6 Load Resource function. There are several of these functions to choose from: LoadResPicture(index, format)à for bitmaps, icons, and cursors Use the VB predefined constantsà vbResBitmapà for bitmaps,à vbResIconà for icons, andà vbResCursorà for cursors for the format parameter. This function returns a picture that you can use directly.à LoadResDataà (explained below) returns a string containing the actual bits in the file. Well see how to use that after we demonstrate icons. LoadResString(index)à for stringsLoadResData(index, format)à for anything up to 64K As noted earlier, this function returns a string with the actual bits in the resource. These are the values that can be used for format parameter here: 1 Cursor resource2 Bitmap resource3 Icon resource4 Menu resource5 Dialog box6 String resource7 Font directory resource8 Font resource9 Accelerator table10 User-defined resource12 Group cursor14 Group icon Since we have four icons in our AboutVB.RES resource file, lets useà LoadResPicture(index, format)à to assign these to the Picture property of a CommandButton in VB 6. I created an application with fourà OptionButtonà components labeled Earth, Water, Air and Fire and four Click events - one for each option. Then I added aà CommandButtonà and changed the Style property to 1 ââ¬â Graphical. This is necessary to be able to add a custom icon to the CommandButton. The code for each OptionButton (and the Form Load event - to initialize it) looks like this (with the Id and Caption changed accordingly for the other OptionButton Click events): Private Sub Option1_Click() à à à Command1.Picture _ à à à à à à LoadResPicture(101, vbResIcon) à à à Command1.Caption _ à à à à à à Earth End Sub Custom Resources The big deal with custom resources is that you normally have to provide a way to process them in your program code. As Microsoft states it, this usually requires the use of Windows API calls. Thats what well do. The example well use is a fast way to load an array with a series of constant values. Remember that the resource file is included into your project, so if the values that you need to load change, youll have to use a more traditional approach such as a sequential file that you open and read. The Windows API well use is theà CopyMemoryà API. CopyMemory copies block of memory to a different block of memory without regard to the data type that is stored there. This technique is well known to VB 6ers as an ultra fast way to copy data inside a program. This program is a bit more involved because first we have to create the a resource file containing a series of long values. I simply assigned values to an array: Dim longs(10) As Longlongs(1) 123456longs(2) 654321 ... and so forth. Then the values can be written to a file calledà MyLongs.longsà using the VB 6 Put statement. Dim hFile As Long hFile FreeFile() Open _ à à à C:\your file path\MyLongs.longs _ à à à For Binary As #hFile Put #hFile, , longs Close #hFile Its a good idea to remember that the resource file doesnt change unless you delete the old one and add a new one. So, using this technique, you would have to update the program to change the values. To include the file MyLongs.longs into your program as a resource, add it to a resource file using the same steps described above, but click theà Add Custom Resource...à instead of Add Icon... Then select the MyLongs.longs file as the file to add. You also have to change the Type of the resource by right clicking that resource, selecting Properties, and changing the Type to longs. Note that this is the file type of your MyLongs.longs file. To use the resource file you have created to create a new array, first declare the Win32 CopyMemory API call: Private Declare Sub CopyMemory _ à à à Lib kernel32 Alias _ à à à RtlMoveMemory (Destination As Any, _ à à à Source As Any, ByVal Length As Long) Then read the resource file: Dim bytes() As Byte bytes LoadResData(101, longs) Next, move the data from the bytes array to an array of long values. Allocate an array for the longs values using the integer value of the length of the string of bytes divided by 4 (that is, 4 bytes per long): ReDim longs(1 To (UBound(bytes)) \ 4) As Long CopyMemory longs(1), bytes(0), UBound(bytes) - 1 Now,à this may seem like a whole lot of trouble when you could just initialize the array in the Form Load event, but it does demonstrate how to use a custom resource. If you had a large set of constants that you needed to initialize the array with, it would run faster than any other method I can think of and you wouldnt have to have a separate file included with your application to do it.
Thursday, November 21, 2019
1) Unit of work for listening and speaking skills for ESL primary Essay
1) Unit of work for listening and speaking skills for ESL primary Enlish classroom. 2) An stating the rationale, theoretical principles, reflection for th - Essay Example Not all aspects of the text chat and face-to-face environments are similar. In text chat, it is possible for several participants to participate simultaneously. This unit is designed for the pupils of primary level around the age of 10 years. This unit contains some dialogues, narratives and some interesting and absorbing exercises for enhancing listening and speaking capabilities of pupils. The topic of unit is quite interesting. The unit revolves round the unlucky Friday 13th. It focuses on the superstitious aspect of western culture. The topic of unit not teaches language skills but it also introduces non-native pupils to the culture of the western society. The unit theme is quite absorbing and motivating. Pupils would automatically try to speak about the unfortunate incidents took place in the life Emily on that unlucky Friday. A lesson plan is a comprehensive and predetermined schedule of every activity of teacher in classroom for achieving optimal results. A lesson plan can be of many forms and types. It usually depends on time span, style of educator and type of subject to be taught. But the basic and main objective of any type of lesson plan is to provide teacher a pre-planned line of action for presenting materials and interacting with learners. The lesson plan should not be merely a action plan but it should provide a useful link between objectives of curriculum and material to be taught. Motivate students by telling them about the poor Emily who faced lot of hardships on unlucky Friday. Tell the students background of Friday 13th that is considered unlucky. Tell them how much hardships she faced on that particular day but how boldly she faced them. Encourage students to be bold if such situation may arise in their daily routine. It will create intimacy with the character. Tell the students the how important is listening for correct speaking. Tell them
Subscribe to:
Posts (Atom)