Sunday, May 24, 2020

I Died For Beauty, By William Shakespeare - 875 Words

Permanent Death One of the many goals of humanity is to live indefinitely and if this is not possible to be remembered to keep the memory of one’s self alive. Shakespeare preservation fantasy is just one way to attempting immortality. The article by Kunin which is summarized below discusses the idea of preservation through poetry where the subject or the author are made immortal by the poems never ending life. Emily Dickinson poem â€Å"I died for beauty—but was scarce.† Entertains the idea that poems do eventually have a death without resurrection where they are forever forgotten by humanity. Kunin discusses the preservation fantasy as Shakespeare viewed it, humans can be immortalized by poetry keeping the thoughts of the author alive. In Shakespeare sonnet number twelve the speaker discussed several means of immortality but finally settles on poetry to be the elixir of life because of its durability through time and the ability to preserve a person without consent and without diluting who they are with sexual reproduction. Kunin describes poems as â€Å"completely written so that it can be removed from time and so that it can shelter other objects, such as the speaker, from the effects of time. (Kunin pg.93)† The argument here is since a poem is written it can be rewritten word for word so it never loses value and can be transferred from one medium to another without any harm to the poem. This aspect of poems gives them the ability to survive longer than any physical objectShow MoreRelatedWilliam Shakespeare s Poem, I Died For Beauty But Was Scarce876 Words   |à ‚  4 Pagesalive. Shakespeare preservation fantasy is just one way of attempting immortality. The article by Kunin which is summarized below discusses the idea of preservation through poetry where the subject or the author are made immortal by the poems never ending life. Emily Dickinson poem â€Å"I died for beauty—but was scarce.† Entertains the idea that poems do eventually have a death without resurrection where they are forever forgotten by humanity. Kunin discusses the preservation fantasy as Shakespeare viewedRead MoreEssay on The Life of William Shakespeare1042 Words   |  5 PagesLife of William Shakespeare William Shakespeare is one of the most identifiable icons of England. Shakespeare was one of the greatest and most influential playwright and poet during his lifetime. He is known as the greatest dramatist of all time due to his many poems and plays, such as â€Å"Shall I Compare Thee To A Summers Day?† and Romeo and Juliet. However, despite being so well known in the world of literature, there is not much known about the childhood of William Shakespeare. William ShakespeareRead Moreâ€Å"All of me† by John Legend is the theme song for The Tragedy of Romeo and Juliet by William1100 Words   |  5 PagesTragedy of Romeo and Juliet by William Shakespeare. In the year 2013, the record label GOOD - Colombia released the album Love in the Future. Legend sings, â€Å"â€Å"Cause all of me / Loves all of you / Love your curves and all your edges / All your perfect imperfections / Give your all to me / Ill give my all to you / Youre my end and my beginning / Even when I lose Im winning / Cause I give you all of me / And you give me all of you, oh† (John Legend).This song and the lyrics I chose epitomises what it meansRead MoreMy Mistress Eyes By William Shakespeare Analysis1505 Words   |  7 Pages William Shakespeare is considered the greatest English-speaking writer in history and is known as England’s national poet. William Shakespeare was born in Stratford, England. He was born on April 23, 1564, which is the same date that we celebrate his death in the year of 1616, just fifty-two years later. Shakespeare’s father, John Shakespeare, was a man of many trades. Although John’s earliest occupation was a tenant farmer, a glove maker, and a whittawer (tanner of hides). John’s social statusRead More Authorship debate Essay1599 Words   |  7 PagesWilliam Shakespeare’s works being just that is a notion most accept; however, there has been a lot of evidence and arguments by historians, who opt to challenge this notion, arguing that Shakespeare was the pen name of Edward de Vere, the Earl of Oxford had to conceal his authorship for social and political reasons. After careful examination of historian’s evidence this theory doesn’t m easure up and it was indeed Shakespeare, who was the genuine author. The world has come to accept that William ShakespeareRead MoreA Very Brief Biography of William Shakespeare1609 Words   |  6 PagesWilliam Shakespeare William Shakespeare, man with intelligence, creativity, and with great passion for love, was one of the most prestige playwright, poet, and actor from the British Literature. He contributed his whole life writing some of the finest and well known plays and poems that are still highly valued in the present literary world. Shakespeare’s conventional themes for most of his plays and poems are about universal matters such as love, jealousy, and beauty which were common focus duringRead MoreResearch Paper on Shakespeare1586 Words   |  7 PagesEnglish II November 6th, 2012 Shakespeare William Shakespeare is one of the most well respected and time honored man of all time. His unique style, mysterious life and amazingly written sonnets make him the most studied and analyzed men to ever walk the planet. William Shakespeare, born in Stratford-upon-Avon, he was baptized on April 26th 1564, but his actual birth date is unknown. Shakespeare was the third child of John Shakespeare and Mary Arden. William had two older sisters, Judith andRead MoreHamlet Vs Oronoko Essay1264 Words   |  6 PagesThe play Hamlet by William Shakespeare and Oroonoko by Aphra Behn both have a love story in their writings. Hamlet is drawn to Ophelia’s beauty, while Oroonoko is attracted to Imoinda. Throughout both writings, we begin to notice that there are many differences in each of the characters and how their personalities begin to alter based on their past experiences. Hamlet’s father was killed and his mother married his uncle, whom later became King. Oroonoko was the last of a royal family, but later wasRead MoreWilliam Shakespeare s Much Ado About Nothing1285 Words   |  6 PagesMuch Ado About Nothing, is a comedic play by William Shakespeare thought to have been written in 1598 and 15 99, as Shakespeare was approaching the middle of his career. (Wikipedia) This timeless play is generally considered one of Shakespeare’s best comedies, because it combines a cheerful mood with an intricate series of deceptions and miscommunications. It’s known for its hilarity, honor, shame and court politics. Shakespeare depicts different kinds of loving relationships- romantic love, familyRead MoreWilliam Shakespeare s Sonnets : The Greatest Of All Love Poems1465 Words   |  6 PagesWilliam Shakespeare’s sonnets are considered the greatest of all love poems. The collection contains 154 poems portraying themes of love such as beauty, lust, and estrangement. First published in 1609, these works have remained a popular subject in the world of literature for centuries to come. â€Å"Shakespeare has completely dominated the English-speaking state over the last four hundred years.† When thinking of Shakespeare, his famous plays such Hamlet and Romeo and Juliet are usually the first to

Wednesday, May 13, 2020

Enterprises networking Online Book Company Amazing Books - Free Essay Example

Sample details Pages: 31 Words: 9397 Downloads: 9 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Introduction In the assigment, I search book informtion, order information , other information of three online book shops .I write recommendation of amazing book company upon the researching of informtion for the three online book shops. Don’t waste time! Our writers will create an original "Enterprises networking Online Book Company Amazing Books" essay for you Create order https://www.seekbooks.com.au/popcat.asp?catmain=COM000000catsub=COM012000storeURL=seekau This website describes the author name of book. Describe book description information of book, book of ISBN, book publisher, date of publisher, format of book, number of pages of book, language information and stock availability information. Order information If u want order u click add to cart button. And u can type number in Quantity u need. Also describes total information. If u want remove item in your shopping basket, click on the Delete button. Other information This website shows other information of Shipping Costs and Delivery Times. https://www.whsmith.co.uk/CatalogAndSearch/ProductDetails-Grow+Your+Own+Drugs+-33732817.html This website describes brief description of book, book of ISBN, Published Date, Publisher, imprint and pages and also describes full description of book. Order information This website give order information of ordering items with different availability, pre-orders, ordering from Whsmith Jersey, order receipt, order confirmation, ordering by phone, ordering from our partners, changing your order, cancelling your order. Other Information This website gives other information of 3 Ways to Save at WHSmith.co.uk This Week clearance offers. https://www.whsmith.co.uk/Support/help-ordering-change-orders.aspx https://www.coop-bookshop.com.au/bookshop/ Book information This website describes international standard book number (ISBN), publisher, edition, format of book, member Price and availability information and also give description of information. https://www.coop-bookshop.com.au/bookshop/show/9781741668377 Order information If your order totals $200 or more before any discounts are applied, a Receipted Delivery charge of $1.60 will be added to your postage costs. Receipted Delivery is a signature on delivery service. For overseas orders, Australia Post international charges apply, plus a $2.00 handling fee. https://www.coop-bookshop.com.au/bookshop/html/postage.html Other service information If you are a member, this online book company gives reservation and special orders services. They give 10-20% discount RRP members of this online book company. The member pricing too many purchases made in bookshops, through mail order or through the Co-op on-line bookshop. The member price can decrease price across promotions and products. This online book company gives 20% discount for the period between 21/04/2009 to 27/04/2009. https://www.coop-bookshop.com.au/bookshop/html/membership.html Recommendation Book information I do recommendation for the Amazing Books website. I choose the book information for the Amazing book website are author name of book, ISBN, Publication date, Number of pages, Price, description of book. Order information It should have quantity of book u order, total cost, Delete button for remove the item in your shopping basket, Delivery Company and delivery time for order. Other information It should describe Member information, Member price, and discount for much order and promotion period. A. The information required from your recommendations made in Task 1. Book information I do recommendation for the Amazing Books website. I choose the book information for the Amazing book website are author name of book, ISBN, Publication date, Number of pages, Price, description of book. Order information It should have quantity of book u order, total cost, Delete button for remove the item in your shopping basket, Delivery Company and delivery time for order. Other information It should describe Member information, Member price, and discount for much order and promotion period. B. The methods and hardware for recording new stock items, including their location in a large warehouse. 1. RFID for recording new stock items RFID is the technology that uses radio waves to automatically identify items. An RFID system consists of an antenna and a transceiver, which read the radio frequency and transfers the information to a processing device (reader) and a transponder, or RF tag, which contains the RF circuitry and information to be transmitted. The antenna provides the means for the integrated circuit to transmit its information to the reader that converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can analyze the data. RFID are used for recording new stock items and their location for stock in of receipt of ordered items. 2. Barcodes for recording new stock items Barcode has a various way for encoding numbers and letters by using a combination of bars and spaces of varying widths. Think of barcodes as another way of writing since barcodes replace keying data. In business, the correct use of BARCODES can reduce inefficiencies and increase companys productivities. Barcodes are easy, fast and an exact way of entering data. A barcode doesnt include descriptive data. Typically barcode has ID data encoded in it, and data is used by a computer to look up all detail information associated with the data. 3. WIRELESS PORTABLE BARCODE SCANNERS for recording new stock items A wireless solution is the perfect one when you need to collect information at a far location, and need the information instantly. A wireless portable barcode scanner is built into a terminal, and uploads data to the host as its scanned, exactly and instantly. Wireless portable barcode products can allow the user scan the information at the point-of-activity, which makes it ideal for industry. 4. The methods for recording new stock items The methods for recording new stock items involve deducting each order, new stock item received, and maintain a cumulative balance. Stock record card method is the most basic style of stock record and it can be hand-written or keyed where the stock is located and the maximum and minimum quantities to be held in stock. C. The methods and hardware for processing order. Order processing starts with the receipt of an order from a customer. It may be obtained by a salesperson, be telephoned in, or arrive by mail. Regular buyers and sellers are often linked electronically. As the buyers inventories become low, an electronic purchase order is generated. It is communicated to the seller, whose computers will determine that the goods are available, and the seller. 1. Phone Order Sometimes customer wants to hear a friendly and sometime online connection is not good for made order for the customer and so, the customer made order by phone. Phone orders are made customer satisfy because the customer can tell the point of that they want. 2. Online order Nowadays, the most people use the internet and if they want to buy something, they made order from online. Ordering online is easy, fast, and safe because online orders are usually used credit cards payment. Customers can purchase product by sending an order to a business which will consists details information of which products they want to purchase and how many. Order can be received Pass the post on order forms. This will need to be entered as records on the orders file onto the computer. Online. Customer can send order by using email or over the Internet. This order would be saved in the orders file. The order file would contain fields with information about item details and quantities the date of the order money owing or received from the customer. customer detail In online order process, it will need Credit Card Processing Verification Tool. It is check any credit card number to ensure its legitimacy. It can download free and using this tool to instantly eliminate fraudulent orders and invalid card numbers. Barcode for processing order When the barcode is scanned, information is sent to the computer and placed in the desired application. Its used to scan in the order number from the packing slip and its used to scan the serial numbers of the products being shipped, which also helps when tracking inventory. If the order has items that have serial numbers, click on the Add Serial # link, and scan the serial number barcodes from the products for that order. A. The methods and hardware for recording items dispatched. An invoice is sent requesting the amount of money due for the order when the goods are dispatched. The customer may give by cheque. If you pay for your item using PayPal, or the seller marks the item on their eBay page as Payment Received, the payment status in eBay will be updated automatically to show as Payment Sent. Although, if you paid using another payment method and you manually marks the item as Payment Sent, the seller is not notice automatically. Receipt Printer Any serial printer that supports direct serial (RS232) connection or any printer that connects parallel, via USB or Ethernet and is supported by a compatible OPOS driver. Both current Samsung OPOS and Epson drivers have been tested and are compatible with EPOS-Excel. HP Printer Duplex for LaserJet 8000 8100 8150 This HP printer duplex assembly allows automatic printing on both sides of the paper and handles booklet printing. Epson LX-300+II Dot Matrix Printer Designed for demanding work environments, the Epson LX-300+II offer the speed, reliability and user-friendly features you need for critical business requirements and get powerful performance, plus easy system integration with Parallel and Serial ports, as well as fast USB connectivity. This compact performer presents the perfect value for your busy workgroup, tackling high-volume, multipart print jobs with ease. The Epson LX-300+II prints up to 337 characters per second (12 characters per inch) in High-speed Draft Mode and handles up to 5-part forms. With its narrow format and durable, 9-pin technology, this hard-working printer handles virtually any task, including inventory reports, spreadsheets, receipts, invoices, packing slips, check runs and customer shipping labels. Plus, its compact size makes it ideal for that busy workroom with limited counter space. At 49 dB, the Epson LX-300+II is quieter than most impact printers. Built to handle all your critical tasks, the Epson LX-300 +II features multiple paper paths for greater versatility. It also includes eight built-in bar codes so you can customize documents as needed. D. The process for determining and flagging up stock reorder levels. Every business needs how to determine the stock levels. There are 3 level of stock average. They are maximum stock level, minimum stock level and reorder level. Maximum Stock Level the maximum ever held in storage. The stock total will not usually be this high. Maximum Stock Level = Amount used each month x Months between orders x 3 Minimum Stock level When the stock level of an item falls below the minimum quantity, it is time to reorder the product. There are some instances where it is difficult to maintain accurate stock levels because it is impractical to record each individual material disbursement. Stock in hand + Stock received Stock used = Balance left Re-order Stock Level this figure gives a quick reference to see when you need to re-order. When the stock reaches this level, or below, you will need to re-order supplies on the next ordering date. Re-order Level = (amount used each month) x (Months between orders) x 2 The reorder level is the sum of the safety stock and the forecast requirement within the replenishment lead time or the overall lead time for articles produced in-house. Re-order level approach Average stock levels stay more or less the same and are less responsive to changes in demand. There is a risk of stock outs with inexpected rising demand but outstanding re-supply orders can be chased. E. Other hardware for the complete system. Printer Epson C-58 Colour Printer. Handheld computer Modern or FTP link 80 GB HDD(7200 rpm) UPS 600 VA (Power tree) Classic 2 GB DDR3 Memory Recommendation For amazing book store, used RFID and barcodes as a hardware for recording new stock items. RFID are used for recording new stock items and their location for stock in of receipt of ordered items. Barcodes are used for recording new stock items and their location for stock in of receipt of ordered items. Using barcodes as a hardware for processing order is convenience and for use to scan in the order number from the packing slip. Use Receipt Printer is suitable because it can support direct serial connection or any printer that connects via USB, parallel or Ethernet and is supported by a compatible OPOS driver. Network Topologies There are four basic types of Network Topology. They are Star Topology Ring Topology Bus Topology Mesh topology Definition of star topology Star topology also call star network. It is the most common of used of network topologies. In star Topology there is a central connection point called the hub which is a computer hub or sometimes just a switch where computers and devices are connect to a central hub. This is topology has only one central server node. All nodes are connected to a central node. Central device received or sent data. In the star topology, data transmitting between nodes is pass to the central node which transmit again the data to other nodes. Advantages of star topology If there is a failure in cable, only one computer will affect and it will not affect the entire network. It is simple in function so it is easy to mange. It is easy to troubleshoot because the problems can be easily located in this network. It is easy to install. It is easy to find the defects and to remove the parts. Transmitting data to unnecessary nodes can control. Disadvantages of star topology All the computers connected to a central hub would be disconnected when the central hub fails. All the operations of computers are depending upon the operation of the central server. The network may be slow if there are many nodes. It require more length of cable than a linear topology. Ring Topology Ring topology also known as ring network. Data travels from node to node. Packet of data is passed only in one direction, receive data node to node. This topology has only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A token, or small data packet, is continuously passed around the network. When a device needs to transmit, it reserves the token for the next trip around, then attaches its data packet to it. The receiving device sends back the packet with an acknowledgment of receipt, then the sending device puts the token back out on the network. Data are passed in one direction only, being received by each node and then transferred to the next node. Advantages of ring topology Network server is not managing the connectivity between the computers. Ring networks are moderately easy to install. Using token ring can create much larger network Disadvantages of ring topology A single break in the cable can disrupt the entire network. The failure of a single node of the network can cause the entire network to fail. The movement or changes made to network nodes affects the performance of the entire network. Linear bus topology The topology consists of main cable with a terminator at each end. Nodes are connected to the linear cable. A bus network uses a multi-drop transmission medium, all node on the network share a common bus and thus share communication. This allows only one device to transmit at a time. Data frames include source and destination addresses, where each station monitors the bus and copies frames addressed to itself.Computer connect this network will check these address and then receive and accept the data.If data sends in parallel, network use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method for prevent data collision. Advantages of linear bus topology The computers are easy to connect. If one of the station fails, the other are not affect. Not need very much length of cable than a star topology. The complexity of wire is low. Disadvantages of linear bus topology If the main cable is a break, the whole network is shut down And so, this can become problem. Terminators are need. Definition of mesh topology In a mesh topology, the nodes are connected directly all other nodes. Each node can transmit, receive and routing data. This topology connects devices with multiple paths so redundancies exist. This topology is used mostly for wireless network. There are two types of mesh topology. They are fully mesh and partial mesh. Advantage It is reliable. No gateway computer so nodes can create their own paths. Disadvantage This topology can cause redundancy of many of the network connections. Need very much cable than the LAN topologies. Network Media There are four basic types of network cables. They are Fiber Optic cable Coaxial cable Unshielded Twisted pair cable (UTP) Shielded twisted pair Cable (STP) Fiber Optic Cable Fiber Optic Cable is a technology uses glass (or plastic) threads (fibers) to transmit data. It consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. The advantages of fiber optic cable are it has high greater bandwidth so they can be used over greater distance than copper cable. Fiber optic cables are thinner and lighter than metal cable so it reduce size and weight and that it keep environmental protection and overall system economy. The disadvantage of fiber optic cable is that the cable is expensive to install. In addition, they are more fragile than wire and are difficult to splice. Coaxial Cable The coaxial cable is transmission line for high-frequency signals and carries both video and audio singals. The coaxial cable is used by Satellite Company. It also used by cable TV between the community antenna and user homes and business. There are two types of coaxial cables. They are thin coaxial and thick coaxial. Advantages of Coaxial Cable It is highly resistant to signal interference it can support greater cable lengths between network devices than twisted pair cable. Disadvantages of Coaxial Cable Great noise. High installation cost. More expensive than twisted pair cable. It is difficult to install. Unshielded Twisted pair cable Unshielded twisted pair cable is composed of pair of wires. Unshielded twisted pair cable (UTP) is used in a variety of networks. UTP computer networking and used to connect devices in a Local area network. it may react to radio or electrical interference. Advantages of unshielded twisted pair cable It is easy to install. It is low cost of materials. It is less expensive than other types of networking media. It costs less per foot than any other type of LAN cabling. Disadvantages of unshielded twisted pair cable No additional shielding to protect the medium from noise. It may react to radio or electrical interference. Recommendation I choose Fiber Optic Cable and star topology for build stock control system in Amazing book store. I think star topology is most suitable for the amazing book company because it is easy to mange and simple in function. It also has good performance. Failing one cable can affect only one computer and not affect the whole of network. If one of the computer fail does not effect other devices and computers in the network. I choose UTP cable for the amazing book company. It is easy to install, low cost of materials. By using this cable, it can get many benefits. Other cable are not suitable for this site because fiber optic cable is easy fragile and difficult to splice. Coaxial cable is difficult to install, great noise and have high installation cost. So, it is the best using the UTP cable. Keep database and connect to the workstation of website for the updating or recording information of book. When the customer buy or look detail information, the serve check the company database and display the information to the customer such as prices, discount, available quantity. In any business, delivery system is important for product. Different business use different delivery methods. I investigate the electronic systems that could be used for recording the transfer of packages from Amazing books to the courier depot, then to the courier vehicle, and finally to the customer. The amazing book company uses the courier for delivery the package to the customer. Firstly, the amazing book company registers in the courier website. The courier company give the invoice ID and password to enter and look the delivery information of package in the website. The amazing book company gives the invoice ID and password to the customer can enter and look the package information. The courier company made delivery product by ship or car or air. The courier company website describes air delivery time information, ship delivery time information and car delivery time information in the website. The website also describe the delivery time information, overseas delivers informatio n, price information depend upon the location. The packages are carried by ship1-8days. So, the customer needs to know that information. So, the website admin need to repair and update the delivery information. And also need to send e-mail that describes the delivery information. The website also describes the package arrive location information for the customer. So, the customer can know their package arrive location. If the late condition of package such as when the ship meet the storm and so the delivery package can late. The customer can worry that their product are not arrive at right time. So, the website needs to give that information to the customer and amazing book company. The customer can change the delivery information option using the invoice ID and password but the delivery option can not change after the order has been confirmed. If goods are damaged due to courier or something, the website describe damage package and the website admin send mail. The customer can pay website by credit card when the delivery is complete. The website also describes insurance of package. Website admin always update website information. Website admin also describes the site map of website and help system. AIDC (Automatic Identification and Data Capture) is also requires in delivery system and it is automatically methods of identifying objects, collecting data about them, and entering that data directly into bar code. As software Rifidi is require for RFID(Radio frequency identification, it is to provide a development tool that greatly simplifies the way RFID application are developed. That software also defined RFID Tags and RFID Readers. Recommendation I think RFID (Radio frequency identification) is necessary for the delivery system because it is need to identify the product and quick for delivery process. And also use RFID software of Rifidi. Use OCR(Optical Character recognition) and OMR(Optical Mark Recognition) in delivery system. OCR use for printed text recognition and OMR use for marks recognition. Not only small business but also large business needs one important duty. That duty is to prevent theft. So, you need to know the method of how to prevent theft and monitoring staff and when theft occurs how you adjust stock levels. Choosing good character staff To prevent theft for stock control system, we will choose good character employee because the employee can thieve the stock easily in the company. So, choosing good character employee is important in any business. When hiring a new employee, you must take job application that have a section inquiring about criminal history. We will also need strictly control of staff. We also restrict the position of staff for entering of stock room. We should train the staff in dealing with thieves and set up a clear policy. We must set up rules for stock room such as when the staff out the stock room make checking the staff body, the staff that enters the stock room must sign in the stock entering file and restrict taking other things to the stock room. We set up the electronic thing that monitor staff. Keeping security guard men for stock room We should keep two types of security guard men for stock room, the first type of security guard men for looking stock room at day duty and the other type of security guard men for at night. Using fingerprint for prevention theft To prevent theft we should use stock security method, hardware, software and network. As hardware, we should use fingerprint in entering stock room. Using CCTV for prevention theft To prevent theft we should use stock security method, hardware, software and network. As hardware, we should use CCTV in stock room and check every 24 hours. Keeping the user name and password for prevention of theft To prevent theft we should keep user name and password in stock room. We should change the password one time in a month for security. We give the password and user name only to the authorized person. If there are unsuccessful 3 times attempt log in, we should close workstation. And after about 30 minutes, we should allow to type the user name and password again. Otherwise, we keep the security alarm system that connects to the user name and password system and the security alarm that ring when there are many times unsuccessful attempt log in. Other method for prevention theft We should always check report that include product in and out of stock and always check stock level. We should allow only authorized person to enter stock. When the stocks arrive, we should check the product list in delivery note and we should use RFID (Radio Frequency Identification) for check product quantity. We should keep delivery bay secure. We need good record for stock secure. We should also keep track of when stock is sold, used, replaced or thrown away. We need also monitoring the staff to prevent theft. We should use many tool and install security cameras and surveillance mirrors for monitoring the staff and recording staff activitiesbyCCTV cameras. Adjusting stock level when theft occurs The thieving of stock can be staff in our business or thieve from the outside. However, when the theft occurs in our business we need adjusting stock level and resolving the problem. If the customer orders are stolen, we give information that your orders are stolen and wait the customer and make the order for customer again. If our stock are stolen, we check the supplier delivery product quantity and the product that arrive in our stock quantity. If supplier wrong delivery the product, we give information to the supplier that you delivery the wrong product quantity. We should record that how many products are stolen. Recommendation Use the software, hardware and network requirement to reduce the threat of stock theft. I keep the fingerprint in entrance of stock room. Use username and password to enter the stock room. Keep CCTV for monitoring the staff and recording the staff activities. Use the stock security software for control stock room with computer. If the theft occurs in my stock, I give information that your orders are stolen and wait the customer. And then, make the order for customer again. We should fill the product units that are stolen in our stock. Task 1 Introduction In the assigment, I search book informtion, order information , other information of three online book shops .I write recommendation of amazing book company upon the researching of informtion for the three online book shops. https://www.seekbooks.com.au/popcat.asp?catmain=COM000000catsub=COM012000storeURL=seekau This website describes the author name of book. Describe book description information of book, book of ISBN, book publisher, date of publisher, format of book, number of pages of book, language information and stock availability information. Order information If u want order u click add to cart button. And u can type number in Quantity u need. Also describes total information. If u want remove item in your shopping basket, click on the Delete button. Other information This website shows other information of Shipping Costs and Delivery Times. https://www.whsmith.co.uk/CatalogAndSearch/ProductDetails-Grow+Your+Own+Drugs+-33732817.html This website describes brief description of book, book of ISBN, Published Date, Publisher, imprint and pages and also describes full description of book. Order information This website give order information of ordering items with different availability, pre-orders, ordering from Whsmith Jersey, order receipt, order confirmation, ordering by phone, ordering from our partners, changing your order, cancelling your order. Other Information This website gives other information of 3 Ways to Save at WHSmith.co.uk This Week clearance offers. https://www.whsmith.co.uk/Support/help-ordering-change-orders.aspx https://www.coop-bookshop.com.au/bookshop/ Book information This website describes international standard book number (ISBN), publisher, edition, format of book, member Price and availability information and also give description of information. https://www.coop-bookshop.com.au/bookshop/show/9781741668377 Order information If your order totals $200 or more before any discounts are applied, a Receipted Delivery charge of $1.60 will be added to your postage costs. Receipted Delivery is a signature on delivery service. For overseas orders, Australia Post international charges apply, plus a $2.00 handling fee. https://www.coop-bookshop.com.au/bookshop/html/postage.html Other service information If you are a member, this online book company gives reservation and special orders services. They give 10-20% discount RRP members of this online book company. The member pricing too many purchases made in bookshops, through mail order or through the Co-op on-line bookshop. The member price can decrease price across promotions and products. This online book company gives 20% discount for the period between 21/04/2009 to 27/04/2009. https://www.coop-bookshop.com.au/bookshop/html/membership.html Recommendation Book information I do recommendation for the Amazing Books website. I choose the book information for the Amazing book website are author name of book, ISBN, Publication date, Number of pages, Price, description of book. Order information It should have quantity of book u order, total cost, Delete button for remove the item in your shopping basket, Delivery Company and delivery time for order. Other information It should describe Member information, Member price, and discount for much order and promotion period. Review for Task 1- I search the information from the internet about the book website that include how book information give to the customer, order information to the customer and other information for the customer. Then, I made the task 1. I write the recommendation for the task 1. I know and get more knowledge about how the websites give book information to the customer and how describe the book information by making Task 1. Task 2 A. The information required from your recommendations made in Task 1 Book information I do recommendation for the Amazing Books website. I choose the book information for the Amazing book website are author name of book, ISBN, Publication date, Number of pages, Price, description of book. Order information It should have quantity of book u order, total cost, Delete button for remove the item in your shopping basket, Delivery Company and delivery time for order. Other information It should describe Member information, Member price, and discount for much order and promotion period. B. The methods and hardware for recording new stock items, including their location in a large warehouse. 1. RFID for recording new stock items RFID is the technology that uses radio waves to automatically identify items. An RFID system consists of an antenna and a transceiver, which read the radio frequency and transfers the information to a processing device (reader) and a transponder, or RF tag, which contains the RF circuitry and information to be transmitted. The antenna provides the means for the integrated circuit to transmit its information to the reader that converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can analyze the data. RFID are used for recording new stock items and their location for stock in of receipt of ordered items. 2. Barcodes for recording new stock items Barcode has a various way for encoding numbers and letters by using a combination of bars and spaces of varying widths. Think of barcodes as another way of writing since barcodes replace keying data. In business, the correct use of BARCODES can reduce inefficiencies and increase companys productivities. Barcodes are easy, fast and an exact way of entering data. A barcode doesnt include descriptive data. Typically barcode has ID data encoded in it, and data is used by a computer to look up all detail information associated with the data. 3. WIRELESS PORTABLE BARCODE SCANNERS for recording new stock items A wireless solution is the perfect one when you need to collect information at a far location, and need the information instantly. A wireless portable barcode scanner is built into a terminal, and uploads data to the host as its scanned, exactly and instantly. Wireless portable barcode products can allow the user scan the information at the point-of-activity, which makes it ideal for industry. 4. The methods for recording new stock items The methods for recording new stock items involve deducting each order, new stock item received, and maintain a cumulative balance. Stock record card method is the most basic style of stock record and it can be hand-written or keyed where the stock is located and the maximum and minimum quantities to be held in stock. B. The methods and hardware for processing order. Order processing starts with the receipt of an order from a customer. It may be obtained by a salesperson, be telephoned in, or arrive by mail. Regular buyers and sellers are often linked electronically. As the buyers inventories become low, an electronic purchase order is generated. It is communicated to the seller, whose computers will determine that the goods are available, and the seller. 1. Phone Order Sometimes customer wants to hear a friendly and sometime online connection is not good for made order for the customer and so, the customer made order by phone. Phone orders are made customer satisfy because the customer can tell the point of that they want. 2. Online order Nowadays, the most people use the internet and if they want to buy something, they made order from online. Ordering online is easy, fast, and safe because online orders are usually used credit cards payment. Customers can purchase product by sending an order to a business which will consists details information of which products they want to purchase and how many. Order can be received Pass the post on order forms. This will need to be entered as records on the orders file onto the computer. Online. Customer can send order by using email or over the Internet. This order would be saved in the orders file. The order file would contain fields with information about item details and quantities the date of the order money owing or received from the customer. customer detail In online order process, it will need Credit Card Processing Verification Tool. It is check any credit card number to ensure its legitimacy. It can download free and using this tool to instantly eliminate fraudulent orders and invalid card numbers. Barcode for processing order When the barcode is scanned, information is sent to the computer and placed in the desired application. Its used to scan in the order number from the packing slip and its used to scan the serial numbers of the products being shipped, which also helps when tracking inventory. If the order has items that have serial numbers, click on the Add Serial # link, and scan the serial number barcodes from the products for that order. C. The methods and hardware for recording items dispatched. An invoice is sent requesting the amount of money due for the order when the goods are dispatched. The customer may give by cheque. If you pay for your item using PayPal, or the seller marks the item on their eBay page as Payment Received, the payment status in eBay will be updated automatically to show as Payment Sent. Although, if you paid using another payment method and you manually marks the item as Payment Sent, the seller is not notice automatically. Receipt Printer Any serial printer that supports direct serial (RS232) connection or any printer that connects parallel, via USB or Ethernet and is supported by a compatible OPOS driver. Both current Samsung OPOS and Epson drivers have been tested and are compatible with EPOS-Excel. HP Printer Duplex for LaserJet 8000 8100 8150 This HP printer duplex assembly allows automatic printing on both sides of the paper and handles booklet printing. Epson LX-300+II Dot Matrix Printer Designed for demanding work environments, the Epson LX-300+II offer the speed, reliability and user-friendly features you need for critical business requirements and get powerful performance, plus easy system integration with Parallel and Serial ports, as well as fast USB connectivity. This compact performer presents the perfect value for your busy workgroup, tackling high-volume, multipart print jobs with ease. The Epson LX-300+II prints up to 337 characters per second (12 characters per inch) in High-speed Draft Mode and handles up to 5-part forms. With its narrow format and durable, 9-pin technology, this hard-working printer handles virtually any task, including inventory reports, spreadsheets, receipts, invoices, packing slips, check runs and customer shipping labels. Plus, its compact size makes it ideal for that busy workroom with limited counter space. At 49 dB, the Epson LX-300+II is quieter than most impact printers. Built to handle all your critical tasks, the Epson LX-300 +II features multiple paper paths for greater versatility. It also includes eight built-in bar codes so you can customize documents as needed. D. The process for determining and flagging up stock reorder levels. Every business needs how to determine the stock levels. There are 3 level of stock average. They are maximum stock level, minimum stock level and reorder level. Maximum Stock Level the maximum ever held in storage. The stock total will not usually be this high. Maximum Stock Level = Amount used each month x Months between orders x 3 Minimum Stock level When the stock level of an item falls below the minimum quantity, it is time to reorder the product. There are some instances where it is difficult to maintain accurate stock levels because it is impractical to record each individual material disbursement. Stock in hand + Stock received Stock used = Balance left Re-order Stock Level this figure gives a quick reference to see when you need to re-order. When the stock reaches this level, or below, you will need to re-order supplies on the next ordering date. Re-order Level = (amount used each month) x (Months between orders) x 2 The reorder level is the sum of the safety stock and the forecast requirement within the replenishment lead time or the overall lead time for articles produced in-house. Re-order level approach Average stock levels stay more or less the same and are less responsive to changes in demand. There is a risk of stock outs with inexpected rising demand but outstanding re-supply orders can be chased. Other hardware for the complete system. Printer Epson C-58 Colour Printer. Handheld computer Modern or FTP link 80 GB HDD(7200 rpm) UPS 600 VA (Power tree) Classic 2 GB DDR3 Memory Recommendation For amazing book store, used RFID and barcodes as a hardware for recording new stock items. RFID are used for recording new stock items and their location for stock in of receipt of ordered items. Barcodes are used for recording new stock items and their location for stock in of receipt of ordered items. Using barcodes as a hardware for processing order is convenience and for use to scan in the order number from the packing slip. Use Receipt Printer is suitable because it can support direct serial connection or any printer that connects via USB, parallel or Ethernet and is supported by a compatible OPOS driver. Review for Task 2- I use the internet for search the information of computerized stock control system. I investigate 4 computerized stock control systems for the task 2. I write the recommendation for the computerized stock system. By making task 2, I increase the knowledge about what hardware and methods are more convenience for the stock control system to record new stock items, what hardware are more reliable for order processing and much know what hardware for recording items dispatched. Task 3 Network Topologies There are four basic types of Network Topology. They are Star Topology Ring Topology Bus Topology Mesh topology Definition of star topology Star topology also call star network. It is the most common of used of network topologies. In star Topology there is a central connection point called the hub which is a computer hub or sometimes just a switch where computers and devices are connect to a central hub. This is topology has only one central server node. All nodes are connected to a central node. Central device received or sent data. In the star topology, data transmitting between nodes is pass to the central node which transmit again the data to other nodes. Advantages of star topology If there is a failure in cable, only one computer will affect and it will not affect the entire network. It is simple in function so it is easy to mange. It is easy to troubleshoot because the problems can be easily located in this network. It is easy to install. It is easy to find the defects and to remove the parts. Transmitting data to unnecessary nodes can control. Disadvantages of star topology All the computers connected to a central hub would be disconnected when the central hub fails. All the operations of computers are depending upon the operation of the central server. The network may be slow if there are many nodes. It require more length of cable than a linear topology. Ring Topology Ring topology also known as ring network. Data travels from node to node. Packet of data is passed only in one direction, receive data node to node. This topology has only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A token, or small data packet, is continuously passed around the network. When a device needs to transmit, it reserves the token for the next trip around, then attaches its data packet to it. The receiving device sends back the packet with an acknowledgment of receipt, then the sending device puts the token back out on the network. Data are passed in one direction only, being received by each node and then transferred to the next node. Advantages of ring topology Network server is not managing the connectivity between the computers. Ring networks are moderately easy to install. Using token ring can create much larger network Disadvantages of ring topology A single break in the cable can disrupt the entire network. The failure of a single node of the network can cause the entire network to fail. The movement or changes made to network nodes affects the performance of the entire network. Linear bus topology The topology consists of main cable with a terminator at each end. Nodes are connected to the linear cable. A bus network uses a multi-drop transmission medium, all node on the network share a common bus and thus share communication. This allows only one device to transmit at a time. Data frames include source and destination addresses, where each station monitors the bus and copies frames addressed to itself.Computer connect this network will check these address and then receive and accept the data.If data sends in parallel, network use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method for prevent data collision. Advantages of linear bus topology The computers are easy to connect. If one of the station fails, the other are not affect. Not need very much length of cable than a star topology. The complexity of wire is low. Disadvantages of linear bus topology If the main cable is a break, the whole network is shut down And so, this can become problem. Terminators are need. Definition of mesh topology In a mesh topology, the nodes are connected directly all other nodes. Each node can transmit, receive and routing data. This topology connects devices with multiple paths so redundancies exist. This topology is used mostly for wireless network. There are two types of mesh topology. They are fully mesh and partial mesh. Advantage It is reliable. No gateway computer so nodes can create their own paths. Disadvantage This topology can cause redundancy of many of the network connections. Need very much cable than the LAN topologies. Network Media There are four basic types of network cables. They are Fiber Optic cable Coaxial cable Unshielded Twisted pair cable (UTP) Shielded twisted pair Cable (STP) Fiber Optic Cable Fiber Optic Cable is a technology uses glass (or plastic) threads (fibers) to transmit data. It consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. The advantages of fiber optic cable are it has high greater bandwidth so they can be used over greater distance than copper cable. Fiber optic cables are thinner and lighter than metal cable so it reduce size and weight and that it keep environmental protection and overall system economy. The disadvantage of fiber optic cable is that the cable is expensive to install. In addition, they are more fragile than wire and are difficult to splice. Coaxial Cable The coaxial cable is transmission line for high-frequency signals and carries both video and audio singals. The coaxial cable is used by Satellite Company. It also used by cable TV between the community antenna and user homes and business. There are two types of coaxial cables. They are thin coaxial and thick coaxial. Advantages of Coaxial Cable It is highly resistant to signal interference it can support greater cable lengths between network devices than twisted pair cable. Disadvantages of Coaxial Cable Great noise. High installation cost. More expensive than twisted pair cable. It is difficult to install. Unshielded Twisted pair cable Unshielded twisted pair cable is composed of pair of wires. Unshielded twisted pair cable (UTP) is used in a variety of networks. UTP computer networking and used to connect devices in a Local area network. it may react to radio or electrical interference. Advantages of unshielded twisted pair cable It is easy to install. It is low cost of materials. It is less expensive than other types of networking media. It costs less per foot than any other type of LAN cabling. Disadvantages of unshielded twisted pair cable No additional shielding to protect the medium from noise. It may react to radio or electrical interference. Recommendation I choose Fiber Optic Cable and star topology for build stock control system in Amazing book store. I think star topology is most suitable for the amazing book company because it is easy to mange and simple in function. It also has good performance. Failing one cable can affect only one computer and not affect the whole of network. If one of the computer fail does not effect other devices and computers in the network. I choose UTP cable for the amazing book company. It is easy to install, low cost of materials. By using this cable, it can get many benefits. Other cable are not suitable for this site because fiber optic cable is easy fragile and difficult to splice. Coaxial cable is difficult to install, great noise and have high installation cost. So, it is the best using the UTP cable. Keep database and connect to the workstation of website for the updating or recording information of book. When the customer buy or look detail information, the serve check the company database and display the information to the customer such as prices, discount, available quantity. Review for Task 3- I search the information from the internet and reference information for the task 3. I know about the network topology and network cable than before I am not making the task 3. Task 4 In any business, delivery system is important for product. Different business use different delivery methods. I investigate the electronic systems that could be used for recording the transfer of packages from Amazing books to the courier depot, then to the courier vehicle, and finally to the customer. The amazing book company uses the courier for delivery the package to the customer. Firstly, the amazing book company registers in the courier website. The courier company give the invoice ID and password to enter and look the delivery information of package in the website. The amazing book company gives the invoice ID and password to the customer can enter and look the package information. The courier company made delivery product by ship or car or air. The courier company website describes air delivery time information, ship delivery time information and car delivery time information in the website. The website also describe the delivery time information, overseas delivers informatio n, price information depend upon the location. The packages are carried by ship1-8days. So, the customer needs to know that information. So, the website admin need to repair and update the delivery information. And also need to send e-mail that describes the delivery information. The website also describes the package arrive location information for the customer. So, the customer can know their package arrive location. If the late condition of package such as when the ship meet the storm and so the delivery package can late. The customer can worry that their product are not arrive at right time. So, the website needs to give that information to the customer and amazing book company. The customer can change the delivery information option using the invoice ID and password but the delivery option can not change after the order has been confirmed. If goods are damaged due to courier or something, the website describe damage package and the website admin send mail. The customer can pay website by credit card when the delivery is complete. The website also describes insurance of package. Website admin always update website information. Website admin also describes the site map of website and help system. AIDC (Automatic Identification and Data Capture) is also requires in delivery system and it is automatically methods of identifying objects, collecting data about them, and entering that data directly into bar code. As software Rifidi is require for RFID(Radio frequency identification, it is to provide a development tool that greatly simplifies the way RFID application are developed. That software also defined RFID Tags and RFID Readers. Recommendation I think RFID (Radio frequency identification) is necessary for the delivery system because it is need to identify the product and quick for delivery process. And also use RFID software of Rifidi. Use OCR(Optical Character recognition) and OMR(Optical Mark Recognition) in delivery system. OCR use for printed text recognition and OMR use for marks recognition. Review for Task 4- I investigate the electronic system from the internet and get information. Then I do task 4 and look the information that search from the internet as a reference and write recommendation. I get more knowledge concerning delivery system by finishing task 4. Task 5 Not only small business but also large business needs one important duty. That duty is to prevent theft. So, you need to know the method of how to prevent theft and monitoring staff and when theft occurs how you adjust stock levels. Choosing good character staff To prevent theft for stock control system, we will choose good character employee because the employee can thieve the stock easily in the company. So, choosing good character employee is important in any business. When hiring a new employee, you must take job application that have a section inquiring about criminal history. We will also need strictly control of staff. We also restrict the position of staff for entering of stock room. We should train the staff in dealing with thieves and set up a clear policy. We must set up rules for stock room such as when the staff out the stock room make checking the staff body, the staff that enters the stock room must sign in the stock entering file and restrict taking other things to the stock room. We set up the electronic thing that monitor staff. Keeping security guard men for stock room We should keep two types of security guard men for stock room, the first type of security guard men for looking stock room at day duty and the other type of security guard men for at night. Using fingerprint for prevention theft To prevent theft we should use stock security method, hardware, software and network. As hardware, we should use fingerprint in entering stock room. Using CCTV for prevention theft To prevent theft we should use stock security method, hardware, software and network. As hardware, we should use CCTV in stock room and check every 24 hours. Keeping the user name and password for prevention of theft To prevent theft we should keep user name and password in stock room. We should change the password one time in a month for security. We give the password and user name only to the authorized person. If there are unsuccessful 3 times attempt log in, we should close workstation. And after about 30 minutes, we should allow to type the user name and password again. Otherwise, we keep the security alarm system that connects to the user name and password system and the security alarm that ring when there are many times unsuccessful attempt log in. Other method for prevention theft We should always check report that include product in and out of stock and always check stock level. We should allow only authorized person to enter stock. When the stocks arrive, we should check the product list in delivery note and we should use RFID (Radio Frequency Identification) for check product quantity. We should keep delivery bay secure. We need good record for stock secure. We should also keep track of when stock is sold, used, replaced or thrown away. We need also monitoring the staff to prevent theft. We should use many tool and install security cameras and surveillance mirrors for monitoring the staff and recording staff activitiesbyCCTV cameras. Adjusting stock level when theft occurs The thieving of stock can be staff in our business or thieve from the outside. However, when the theft occurs in our business we need adjusting stock level and resolving the problem. If the customer orders are stolen, we give information that your orders are stolen and wait the customer and make the order for customer again. If our stock are stolen, we check the supplier delivery product quantity and the product that arrive in our stock quantity. If supplier wrong delivery the product, we give information to the supplier that you delivery the wrong product quantity. We should record that how many products are stolen. Recommendation Use the software, hardware and network requirement to reduce the threat of stock theft. I keep the fingerprint in entrance of stock room. Use username and password to enter the stock room. Keep CCTV for monitoring the staff and recording the staff activities. Use the stock security software for control stock room with computer. If the theft occurs in my stock, I give information that your orders are stolen and wait the customer. And then, make the order for customer again. We should fill the product units that are stolen in our stock. Review for Task 5- In task 5, I write about the prevention of theft and monitoring the staff and when the theft occurs how adjust stock level. This task give many knowledge about how protect the stock, how monitor the staff and when theft occurs how adjust stock level. So, I know more about if the stock theft occurs how I will do. Reference https://personal.cityu.edu.hk/~dcykcho/dco3310/lecture5/sld024.htm https://personal.cityu.edu.hk/~dcykcho/dco3310/lecture5/sld020.htm https://www.dolphinmaritime.com/software/workabout/stock.html https://www.bola.biz/operations/stock/systems.html https://www.corditek.co.uk/stock_control.php https://www.dmcsoftware.co.uk/sage-200/sage200-stockcontrol.aspx https://www.answers.com/topic/automatic-identification-and-data-capture https://www.a1express.com/ https://www.rifidi.org/ https://www.theteacher99.btinternet.co.uk/theteacher/gcse/newgcse/module9/task6.htm https://www.britannica.com/EBchecked/topic/431437/order-processing https://answers.yahoo.com/question/index?qid=20090709192719AARgdHk https://www.barcodediscounters.com/aboutbarcode.html https://www.businesslink.gov.uk/bdotg/action/detail?type=RESOURCESitemId=1073792659

Wednesday, May 6, 2020

Spirit Bound Chapter Twelve Free Essays

string(29) " ways to tame troublemakers\." WHICH WAS CONFIRMED WHEN WE finally stumbled back to the Royal Court. I wasn’t the only one in trouble, of course. Lissa was summoned to the queen for chastising, though I knew she’d suffer no actual punishment. We will write a custom essay sample on Spirit Bound Chapter Twelve or any similar topic only for you Order Now Not like Eddie and me. We might be out of school, but we were technically under the jurisdiction of the official guardians now, which meant we faced as much trouble as any disobedient employee. Only Adrian escaped any consequences. He was free to do whatever he wanted. And really, my punishment wasn’t as bad as it could have been. Honestly, what did I have to lose at this point? My chances of guarding Lissa had already been sketchy, and no one had wanted me as a guardian except Tasha anyway. A crazy Vegas weekend–which was our cover story–was hardly enough to dissuade her from taking me on. It was enough, however, to make some of Eddie’s prospects withdraw their requests for him to be their guardian. Enough still wanted him that he was in no danger of losing a good position, but I felt horribly guilty. He didn’t breathe a word to anyone about what we’d done, but each time he looked at me, I could see the condemnation in his eyes. And I saw a lot of him in the next couple days. It turned out guardians had a system in place to deal with those who were disobedient. â€Å"What you did was so irresponsible that you might as well be back in school. Hell, elementary school, even.† We were in one of the offices in the guardians’ headquarters, being yelled at by Hans Croft, the guy in charge of all the guardians at Court and someone who was instrumental in guardian assignments. He was a dhampir in his early fifties, with a bushy gray-and-white mustache. He was also an asshole. The scent of cigar smoke always encircled him. Eddie and I were sitting meekly before him while he paced with his hands behind his back. â€Å"You could have gotten the last Dragomir killed–not to mention the Ivashkov boy. How do you think the queen would have reacted to the death of her great-nephew? And talk about timing! You go off party-hopping right when the guy who tried to kidnap the princess is running loose. Not that you would know that, seeing as you were probably too busy playing slot machines and using your fake IDs.† I winced at the reference to Victor, though I suppose I should have been relieved that we were above suspicion for his escape. Hans read my grimace as an admission of guilt. â€Å"You might have graduated,† he declared, â€Å"but that does not mean you are invincible.† This whole encounter reminded me of when Lissa and I had returned to St. Vladimir’s, when we’d been chastised for the same thing: recklessly running off and endangering her. Only this time, there was no Dimitri to defend me. That memory made a lump form in my throat as I remembered his face, serious and gorgeous, those brown eyes intense and passionate as he spoke up for me and convinced the others of my value. But no. No Dimitri here. It was just Eddie and me alone, facing the consequences of the real world. â€Å"You.† Hans pointed a stubby finger at Eddie. â€Å"You might be lucky enough to slide out of this without too many repercussions. Sure, you’ll have a black mark on your record forever. And you’ve totally screwed up your chances of ever having an elite royal position with other guardians to support you. You’ll get some assignment though. Working alone with some minor nobility, probably.† High-ranking royals had more than one guardian, which always made protection easier. Hans’s point was that Eddie’s assignment would be lowly–creating more work and danger for him. Casting him a sidelong glance, I saw that hard, determined look on his face again. It seemed to say he didn’t care if he had to guard a family by himself. Or even ten families. In fact, he gave off the vibe that they could drop him alone into a nest of Strigoi and he’d take them all on. â€Å"And you.† Hans’s sharp voice jerked my gaze back to him. â€Å"You will be lucky to ever have a job.† Like always, I spoke without thinking. I should have taken this silently like Eddie. â€Å"Of course I’ll have one. Tasha Ozera wants me. And you’re too short on guardians to keep me sitting around.† Hans’s eyes gleamed with bitter amusement. â€Å"Yes, we are short on guardians, but there’s all sorts of work we need done–not just personal protection. Someone has to staff our offices. Someone has to sit and guard the front gates.† I froze. A desk job. Hans was threatening me with a desk job. All of my horrible imaginings had involved me guarding some random Moroi, someone I didn’t know and would possibly hate. But in any of those scenarios, I would be out in the world. I would be in motion. I would be fighting and defending. But this? Hans was right. Guardians were needed for the Court’s administrative jobs. True, they only kept a handful–we were too valuable–but someone had to do it. One of those someones being me was too awful to comprehend. Sitting around all day for hours and hours†¦ like the guards in Tarasov. Guardian life had all sorts of unglamorous–but necessary–tasks. It truly, truly hit me then that I was in the real world. Fear slammed into me. I’d taken on the title of guardian when I graduated, but had I really understood what it meant? Had I been playing make-believe–enjoying the perks and ignoring the consequences? I was out of school. There would be no detention for this. This was real. This was life and death. My face must have given away my feelings. Hans gave a small, cruel smile. â€Å"That’s right. We’ve got all sorts of ways to tame troublemakers. You read "Spirit Bound Chapter Twelve" in category "Essay examples" Lucky for you, your ultimate fate’s still being decided. And in the meantime, there’s a lot of work that needs to be done around here that you two are going to be helping with.† That â€Å"work† over the next few days turned out to be menial manual labor. Honestly, it wasn’t too different from detention, and I was pretty sure it had just been created to give wrongdoers like us something awful to do. We worked twelve hours a day, much of it outdoors hauling rocks and dirt to build some new, pretty courtyard for a set of royal town houses. Sometimes we were put on cleaning duty, scrubbing floors. I knew they had Moroi workers for these kinds of things, and probably they were being given a vacation right now. Still, it was better than the other work Hans would give us: sorting and filing mountains and mountains of paper. That gave me a new appreciation for information going digital†¦ and again made me worry about the future. Over and over, I kept thinking about that initial conversation with Hans. The threat that this could be my life. That I would never be a guardian–in the true sense–to Lissa or any other Moroi. Throughout my training, we’d always had a mantra: They come first. If I had really and truly screwed up my future, I’d have a new mantra: A comes first. Then B, C, D†¦ Those work days kept me away from Lissa, and the front-desk staff within our respective buildings went out of their way to keep us apart too. It was frustrating. I could keep track of her through the link, but I wanted to talk to her. I wanted to talk to anyone. Adrian stayed away too and didn’t bother with dreams, making me wonder how he felt. We’d never had our â€Å"talk† after Las Vegas. Eddie and I often worked side by side, but he wasn’t speaking to me, which left me with hours of being trapped with my own thoughts and guilt. And believe me, I had plenty of things to intensify my guilt. Around Court, people didn’t really notice workers. So whether I was inside or outside, people were always talking like I wasn’t there. The biggest topic was Victor. Dangerous Victor Dashkov on the loose. How could it have happened? Did he have powers no one knew about? People were afraid, some even convinced he’d show up at Court and try to kill everyone in their sleep. The â€Å"inside job† theory was running rampant, which continued to keep us above suspicion. Unfortunately, it meant a lot of people now worried about traitors within our midst. Who knew who might be working for Victor Dashkov? Spies and rebels could be lurking at Court, planning all sorts of atrocities. I knew all the stories were exaggerated, but it didn’t matter. They all came from one kernel of truth: Victor Dashkov was walking the world a free man. And only I–and my accomplices–knew it was all because o f me. Being seen in Las Vegas had continued to provide an alibi for the prison break and had made what we’d done seem even more rash. People were aghast that we’d let the Dragomir princess run off while there was a dangerous man on the loose–the man who’d assaulted her! Thank God, everyone said, that the queen had pulled us out of there before Victor found us. The Las Vegas trip had also opened up a whole new line of speculation–one that involved me personally. â€Å"Well, that doesn’t surprise me about Vasilisa,† I overheard a woman say while I was working outdoors one day. She and some friends were strolling along toward the feeders’ building and didn’t even see me. â€Å"She’s run away before, right? Those Dragomirs can be wild ones. She’ll probably go straight back to the first party she can find, once they catch Victor Dashkov.† â€Å"You’re wrong,† her friend said. â€Å"That’s not why she went. She’s actually pretty levelheaded. It’s that dhampir that’s always with her–the Hathaway girl. I heard she and Adrian Ivashkov went to Las Vegas to elope. The queen’s people just barely got there in time to stop them. Tatiana’s furious, especially since Hathaway declared nothing will keep her and Adrian apart.† Whoa. That was kind of a shock. I mean, I guessed it was better for people to think Adrian and I were running off than for them to accuse me of aiding and abetting a fugitive, but still†¦ I was kind of amazed at how that conclusion had come about. I hoped Tatiana hadn’t heard about our so-called elopement. I was pretty sure that would ruin whatever progress she and I had made. My first real social contact came in the form of an unlikely source. I was shoveling dirt into a raised flower bed and sweating like crazy. It was nearing bedtime for Moroi, meaning the sun was out in full summer glory. We at least had a pretty site while working: the Court’s giant church. I’d spent a lot of time at the Academy’s chapel but had rarely visited this church since it was set far from the main buildings of the Court. It was Russian Orthodox–the predominant Moroi religion–and reminded me a lot of some of the cathedrals I’d seen while actually in Russia, though not nearly as big. It was made of beautiful red stonework, its towers topped with green-tiled domes, which were in turn topped with golden crosses. Two gardens marked the far boundaries of the church’s extensive grounds, one of which we were working on. Near us was one of the Court’s most remarkable sites: a giant statue of some ancient Moroi queen that was almost ten times my height. A matching statue of a king stood on the opposite side of the grounds. I could never remember their names but was pretty sure we’d gone over them in one of my history classes. They’d been visionaries, changing the Moroi world of their time. A figure appeared in my periphery, and I assumed it was Hans coming to give us another awful chore. Looking up, I was astonished to see it was Christian. â€Å"Figures,† I said. â€Å"You know you’ll get in trouble if someone sees you talking to me.† Christian shrugged and sat on the edge of a partially completed stone wall. â€Å"Doubt it. You’re the one who’ll get into trouble, and I really don’t think things can get any worse for you.† â€Å"True,† I grunted. He sat there in silence for several moments, watching me shovel pile after pile of dirt. Finally, he asked, â€Å"Okay. So how and why did you do it?† â€Å"Do what?† â€Å"You know exactly what. Your little adventure.† â€Å"We got on a plane and flew to Las Vegas. Why? Hmm. Let’s think.† I paused to wipe sweat off my forehead. â€Å"Because where else are we going to find pirate-themed hotels and bartenders who don’t card very much?† Christian scoffed. â€Å"Rose, don’t bullshit me. You did not go to Las Vegas.† â€Å"We’ve got plane tickets and hotel receipts to prove it, not to mention people who saw the Dragomir princess hit it big on slot machines.† My attention was on my work, but I suspected Christian was shaking his head in exasperation. â€Å"As soon as I heard three people had broken Victor Dashkov out of prison, I knew it had to be you. Three of you gone? No question.† Not far away, I saw Eddie stiffen and glance around uneasily. I did the same. I might have been desperate for social contact, but not at the risk of dangerous parties overhearing us. Our crimes getting out would make garden labor seem like a vacation. We were alone, but I still pitched my voice low and attempted an honest face. â€Å"I heard they were humans hired by Victor.† That was yet another theory running wild, as was this one: â€Å"Actually, I think he turned Strigoi.† â€Å"Right,† Christian said snidely. He knew me too well to believe me. â€Å"And I also heard one of the guardians has no memory of what made him attack his friends. He swears he was under the control of someone. Anyone who had that kind of compulsion could probably make others see humans, mimes, kangaroos†¦.† I refused to look at him and slammed the shovel hard into the ground. I bit my lip on any angry retort. â€Å"She did it because she thinks Strigoi can be restored to their original form.† My head shot up, and I stared at Eddie in disbelief, astonished he’d spoken. â€Å"What are you doing?† â€Å"Telling the truth,† replied Eddie, never stopping his work. â€Å"He’s our friend. You think he’s going to report us?† No, rebel Christian Ozera was not going to report us. But that didn’t mean I wanted this out. It’s a fact of life: The more people who know a secret, the more likely it is to leak. Unsurprisingly, Christian’s reaction was not all that different from everyone else’s. â€Å"What? That’s impossible. Everyone knows that.† â€Å"Not according to Victor Dashkov’s brother,† said Eddie. â€Å"Will you stop it?† I exclaimed. â€Å"You can tell him or I will.† I sighed. Christian’s pale blue eyes were staring at us, wide and shocked. Like most of my friends, he rolled with crazy ideas, but this was pushing the crazy line. â€Å"I thought Victor Dashkov was an only child,† Christian said. I shook my head. â€Å"Nope. His dad had an affair, so Victor’s got an illegitimate half-brother. Robert. And he’s a spirit user.† â€Å"Only you,† said Christian. â€Å"Only you would find something like this.† I ignored what appeared to be a return to his normal cynicism. â€Å"Robert claims to have healed a Strigoi–killed the undead part of her and brought her back to life.† â€Å"Spirit has limits, Rose. You might have been brought back, but Strigoi are gone.† â€Å"We don’t know about spirit’s full range,† I pointed out. â€Å"Half of it is still a mystery.† â€Å"We know about St. Vladimir. If he could restore Strigoi, don’t you think a guy like him would have been doing it? I mean, if that’s not miraculous, what is? Something like that would have survived in the legends,† argued Christian. â€Å"Maybe. Maybe not.† I retied my ponytail, replaying our encounter with Robert in my mind for the hundredth time. â€Å"Maybe Vlad didn’t know how. It’s not all that easy.† â€Å"Yeah,† agreed Eddie. â€Å"This is the good part.† â€Å"Hey,† I shot back at him. â€Å"I know you’re mad at me, but with Christian here, we really don’t need anyone else making snide comments.† â€Å"I don’t know,† said Christian. â€Å"For something like this, you actually might need two people. Now explain how this miracle is supposedly done.† I sighed. â€Å"By adding spirit to a stake, along with the other four elements.† Spirit charms were still a new concept to Christian too. â€Å"Never thought of that. I guess spirit would shake things up†¦ but I can’t imagine you staking a Strigoi with a spirit-charmed stake would be enough to bring them back.† â€Å"Well†¦ that’s the thing. According to Robert, I can’t do it. It has to be done by a spirit user.† More silence. I’d rendered Christian speechless yet again. At last he said, â€Å"We don’t know that many spirit users. Let alone any who could fight or stake a Strigoi.† â€Å"We know two spirit users.† I frowned, recalling Oksana in Siberia and Avery locked away†¦ where? A hospital? A place like Tarasov? â€Å"No, four. Five, counting Robert. But yeah, none of them can really do it.† â€Å"It doesn’t matter because it can’t be done,† Eddie said. â€Å"We don’t know that!† The desperation in my own voice startled me. â€Å"Robert believes it. Victor even believes.† I hesitated. â€Å"And Lissa does too.† â€Å"And she wants to do it,† Christian said, catching on quickly. â€Å"Because she would do anything for you.† â€Å"She can’t.† â€Å"Because she doesn’t have the ability or because you won’t let her?† â€Å"Both,† I cried. â€Å"I’m not letting her anywhere near a Strigoi. She’s already†¦Ã¢â‚¬  I groaned, hating to reveal what I’d discovered in our time apart through the bond. â€Å"She got a hold of a stake and is trying to charm it. So far, she hasn’t had much luck, thank God.† â€Å"If this were possible,† began Christian slowly. â€Å"It could change our world. If she could learn†¦ â€Å" â€Å"What? No!† I’d been so eager to get Christian to believe me, and now I wished he hadn’t. The one saving grace in all this was that with none of my friends thinking it was possible, none of them had given any thought to Lissa actually trying to fight a Strigoi. â€Å"Lissa’s no warrior. No spirit user we know is, so unless we find one, I’d rather†¦ † I winced. â€Å"I’d rather Dimitri died.† That finally made Eddie stop working. He threw down his shovel. â€Å"Really? I never would have guessed that.† Sarcasm to rival my own. I spun around and strode toward him, my fists clenched. â€Å"Look, I can’t take this anymore! I’m sorry. I don’t know what else to say. I know I screwed up. I let Dimitri get away. I let Victor get away.† â€Å"You let Victor get away?† asked Christian, startled. I ignored him and continued shouting at Eddie. â€Å"It was a mistake. With Dimitri†¦ it was a weak moment. I failed in my training. I know I did. We both know it. But you know I didn’t intend the damage I caused. If you’re really my friend, you have to know it. If I could take it back†¦Ã¢â‚¬  I swallowed, surprised to feel my eyes burning. â€Å"I would. I swear I would, Eddie.† His face was perfectly still. â€Å"I believe you. I am your friend, and I know†¦ I know you didn’t mean for things to turn out like they did.† I sagged in relief, surprised at how truly worried I’d been about losing his respect and friendship. Looking down, I was startled to see my fists balled up. I relaxed them, unable to believe I’d been that upset. â€Å"Thank you. Thank you so much.† â€Å"What’s all this shouting?† We both turned and saw Hans heading toward us. And he looked pissed off. I also noticed then that Christian had practically vanished into thin air. Just as well. â€Å"This isn’t social time!† growled Hans. â€Å"You two still have another hour left today. If you’re going to get distracted, then maybe you should be separated.† He beckoned to Eddie. â€Å"Come on. There’s some filing with your name on it.† I shot Eddie a sympathetic look as Hans led him away. Yet I was relieved it wasn’t me off to do paperwork. I continued my labors, my mind spinning with the same questions I’d had all week. I had meant what I said to Eddie. I wanted so badly for this dream of Dimitri being saved to be true. I wanted it more than anything–except Lissa risking her life. I shouldn’t have hesitated. I should have just killed Dimitri. Victor wouldn’t have escaped. Lissa wouldn’t have given Robert’s words a second thought. Thinking of Lissa pushed me into her mind. She was in her room, doing some last-minute packing before going to bed. Tomorrow was her Lehigh visit. Unsurprisingly, my invitation to go with her had been revoked in light of recent events. Her birthday–something that had been horribly overlooked in this mess–was this weekend as well, and it didn’t seem right for me to be apart from her during it. We should have been celebrating together. Her thoughts were troubled, and she was so consumed by them that a sudden knock at the door made her jump. Wondering who could be visiting her at this hour, she opened the door and gasped to see Christian standing there. It was surreal to me too. Part of me still kept thinking we were in our school dorms, where rules–theoretically–kept guys and girls out of each other’s rooms. But we were no longer there. We were technically adults now. He must have gone straight to her room after seeing me, I realized. It was astonishing how quickly the tension ratcheted up between them. A bundle of emotions burst into Lissa’s chest, the usual mix of anger, grief, and confusion. â€Å"What are you doing here?† she demanded. The same emotions were in his face. â€Å"I wanted to talk to you.† â€Å"It’s late,† she said stiffly. â€Å"Besides, I seem to remember you don’t like talking.† â€Å"I want to talk about what happened with Victor and Robert.† That was enough to startle her out of her anger. She cast an anxious look into the hallway and then beckoned him inside. â€Å"How do you know about that?† she hissed, hastily shutting the door. â€Å"I just saw Rose.† â€Å"How did you get to see her? I can’t see her.† Lissa was as frustrated as me over how our superiors had been keeping us apart. Christian shrugged, careful to maintain a safe distance between them in the suite’s small living room. Both of them had their arms crossed defensively, though I don’t think they realized how they were mirroring each other. â€Å"I snuck into her prison camp. They’ve got her shoveling dirt for hours.† Lissa grimaced. With the way they’d kept us separated, she hadn’t known much about my activities. â€Å"Poor Rose.† â€Å"She’s managing. Like always.† Christian’s eyes turned toward the couch and her open suitcase, where a silver stake lay on top of a silk blouse. I doubted that shirt would survive the trip without a million wrinkles. â€Å"Interesting thing to bring on a college visit.† Lissa hastily shut the suitcase. â€Å"That’s none of your business.† â€Å"Do you really believe it?† he asked, ignoring her comment. He took a step forward, his eagerness apparently making him forget about wanting to keep away. Even as distracted as she was by the situation, Lissa immediately became aware of their new proximity, the way he smelled, the way the light shone on his black hair†¦. â€Å"Do you think you could bring back a Strigoi?† She turned her attention back to the conversation and shook her head. â€Å"I don’t know. I really don’t. But I feel like†¦ I feel like I have to try. If nothing else, I want to know what spirit in a stake will do. That’s harmless enough.† â€Å"Not according to Rose.† Lissa gave him a rueful smile, realized what she was doing, and promptly dropped it. â€Å"No. Rose doesn’t want me going anywhere near this idea–even though she wants it to be real.† â€Å"Tell me the truth.† His gaze burned to her. â€Å"Do you think you have any chance of staking a Strigoi?† â€Å"No,† she admitted. â€Å"I could barely throw a punch. But†¦ like I said, I feel like I should try. I should try to learn. To stake one, I mean.† Christian pondered this for a few moments and then gestured toward the suitcase again. â€Å"You’re going to Lehigh in the morning?† Lissa nodded. â€Å"And Rose got cut from the trip?† â€Å"Of course.† â€Å"Did the queen offer to let you bring another friend?† â€Å"She did,† admitted Lissa. â€Å"In particular, she suggested Adrian. But he’s sulking†¦ and I’m not really sure if I’m in the mood for him.† Christian seemed pleased by this. â€Å"Then bring me.† My poor friends. I wasn’t sure how much more shock any of them could handle today. â€Å"Why the hell would I bring you?† she exclaimed. All her anger returned at his presumption. It was a sign of her agitation that she’d sworn. â€Å"Because,† he said, face calm, â€Å"I can teach you how to stake a Strigoi.† How to cite Spirit Bound Chapter Twelve, Essay examples

Tuesday, May 5, 2020

Doll House Essay Research Paper Animal Imagery free essay sample

Doll House Essay, Research Paper Animal Imagery in Henrick Ibsen # 8217 ; s A Doll House Animal imagination in Henrick Ibsen # 8217 ; s drama, The Doll House is a critical analyzing tool for the character development of Nora and Torvald Helmer the chief characters in this drama. The drama is a three-act drama that takes topographic point in the Helmer abode, in # 8220 ; A room furnished comfortably and tastily, but non extravagantly. # 8221 ; ( pg.3 ) It # 8217 ; s the Christmas season at the abode as it # 8217 ; s told early in the drama. Torvald asks Nora what she would wish for Christmas. Nora wants for money, because, unknown to Torvald, she owes a big amount to Nils Krogstad for a promissory note loan he had given to her. The narrative goes on, and Torvald finds out about the note. The choler he directs at Nora goes off when he opens another missive from Krogstad with the note in it, stating that the note did non hold to be paid back. We will write a custom essay sample on Doll House Essay Research Paper Animal Imagery or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Even after this, Nora decides to go forth Torvald, stating that he # 8220 ; neer understood [ her ] # 8221 ; and that he # 8220 ; neer loved [ her ] . # 8221 ; That, in my sentiment was the truth. Nora Helmer was a sensitive character. She had been babied all of her life, by her male parent, and by Torvald. She truly didn # 8217 ; Ts have excessively many concerns or duties. She didn # 8217 ; t even have to care for the kids ; the amah would normally take attention of them. Talking stereotypically she was your mundane homemaker. She neer left the house, largely because her hubby was afraid of the manner people # 8220 ; would talk. # 8221 ; In my sentiment non excessively many people knew of their matrimony, and that was they manner Torvald wanted it to be. It truly wasn # 8217 ; t her mistake she was the manner she was. It was largely Torvald # 8217 ; s for botching her. Ibsen uses originative, but effectual, carnal imagination to develop Nora # 8217 ; s character throughout the drama. He has Torvald name his married woman # 8220 ; his small lark # 8221 ; or # 8220 ; sulky squirrel # 8221 ; or other carnal names throughout the drama. He uses a batch of # 8216 ; bird # 8217 ; imagery-calling her many different bird names. It seems to me that the name he uses straight relates to how Torvald feels about her at the clip. He has something about him that observes the temper of the people that he is about, like subsequently in the narrative when he says to Nora # 8220 ; Did you detect what good liquors Rank was in this eventide? # 8221 ; ( pg. 55 ) The animate beings Ibsen chooses to utilize are related to how Nora is moving, or how she needs to be portrayed to the reader. For illustration non even a twelve lines into Act I, Torvald asks ( mentioning to Nora ) , # 8220 ; Is that my small lark chittering out at that place # 8221 ; and # 8220 ; Is that my squirrel hustling about? # 8221 ; A lark is a songster ; a happy, unworried bird. It is can besides be used as a verb that means to prosecute in spirited merriment or gay buffooneries. A squirrel is rather the antonym: it is a little, furred gnawer. If you are to squirrel away something, you were concealing or hive awaying it, sort of like what Nora was making with her bag of macaroons. Torvald calls her these names to suit the state of affairs. Nora was decidedly a unworried adult female, merely like a lark, and Torvald refers to her as such: # 8220 ; my small lark. # 8221 ; When he says that, Nora is traveling around the room and humming with a unworried spirit that would resemble a lark. Whenever she is in this temper, Torvald refers to her as his # 8220 ; small lark. # 8221 ; On the other manus, Nora must be some kind of scro unge, because Torvald besides refers to her as his â€Å"little squirrel.† He asks if â€Å"that is my squirrel hustling about? † It seems that possibly Ibsen was utilizing this imagination to demo that Nora was burying something deep down inside-maybe the macaroons or the cognition of the promissory note-and that Torvald might hold known about it ( but I doubt it ) and she felt ashamed. Throughout the drama Torvald refers to Nora as his lark, or songbird ; two birds that are stereotypically peaceable, unworried, happy birds. At least from what you can state. On the inside the birds may hold many battles, but they don # 8217 ; t demo it, much like Nora avoids demoing her feelings and concerns. Torvald can # 8217 ; t state the difference. He thinks Nora is ever happy, neer sad, and energetic-characteristics of the vocal bird ( at least on the exterior ) . Subsequently, in Act II, Nora tells Torvald that she would # 8220 ; be a faery and dance for you in the moonlight. # 8221 ; A faery is a beautiful animal that flies around and mystifies, much like Nora wants to make for Torvald when she dances. She wants Torvald to be happy with her, because she knows he is traveling to happen out about the note. In Act II, Nora is imploring Torvald to allow Krogstad maintain his occupation at the bank-which Torvald is the manger for-so Krogstad won # 8217 ; t inquire for the money back the she owes him. Nora gets rather worked up about all of this. Torvald eventually calms her down, and notices her # 8220 ; frightened dove # 8217 ; s eyes. # 8221 ; A dove has ever been a symbol of peacekeeping, and Ibsen uses it to demo her attempts to keep peace and order. Torvald notices that she is merely seeking keep things right, and refers to her as a dove. The carnal imagination is consistent throughout the drama, normally with mentions to happy, cheerful animate beings. In Act III the note is discovered, but besides dismissed because of another missive from Krogstad. Nora is seeking to quiet down after Torvald gets angry with her for his treachery. He comforts her, stating # 8220 ; I have wide wings to shelter you under # 8221 ; and that he will maintain her, despite the incident, # 8220 ; I will protect you like a hunted dove that I have rescued out of a hawk # 8217 ; s claws. # 8221 ; Torvald is stating that he will protect her like something that was a gift from God, and he will utilize everything in his power to watch over her. I personally think he is a selfish adult male who wouldn # 8217 ; t care if anything happened to her, every bit long as nil happened to him. He treats her like she is a babe. Even though in some senses of the word she is, but non to the point where she can # 8217 ; Ts take attention of herself, she i s merely fighting a small spot. Torvald thinks that he needs to be at that place to watch out for her, and that she would be nil without him. That # 8217 ; s why Nora decides to go forth him. She doesn # 8217 ; t necessitate his # 8220 ; broad wings # 8221 ; to shelter her. She doesn # 8217 ; t need to be rescued. She needs to go forth this adult male, and even when she does he is still worried about what people will state. I don # 8217 ; t like overprotective persons like that, and that # 8217 ; s why I don # 8217 ; t like Torvald. In decision carnal imagination in this drama is used to demo the sort of individual Torvald is, and the sort of individual he would wish Nora to be ( or at least how he sees her ) . In this drama, it is critical in the character development for both characters, demoing truly how both sides perceive the doll house