Monday, September 30, 2019

Life with Brother Phil

One never realizes how easy life is when you are a child. Of course your â€Å"job† is to go to school and it seems as if life is hard; the responsibility of getting up and going to school, getting good grades, getting along with friends, parents, and siblings. However, as you get older, you realize how safe and protected you were.Summers actually meant free time and for me it meant true fun and games with my brother Phillip. Philip was the type of boy even the adults trusted. When something happened and adults needed to get to the â€Å"bottom† of the story, they turned to Philip knowing he’d tell them the truth despite any consequences.During this particular summer, Philip had invented a game similar to tag but which had us running through each other yards instead. The object of the game was to tag each other and then send them to the â€Å"nuthouse† set up in our yard. Ahhh, the memories of that summer and of the crazy games Philip dreamed up will give me pleasant dreams for life. Now, years later as we have grown up, some of that innocence has become lost. As I search Phillip’s eyes today, I no longer see the little boy of yesteryear with his eyes all aglow.Today Phillip is in Guantanamo Bay, Cuba as a photographer. One would think that this creative little boy could use that imagination and creativity through the lens of the camera, but that is not the case where he lives. His pictures tell the story of the landscape; a landscape awash with dirt, broken coral and a quiet, discontent shoreline. And a story of a big brother who grew up from a bright starry eyed child into an adult who sees the real world as ugly as it truly is behind the eyes of a camera.

Sunday, September 29, 2019

Computer Operating Systems

ICT 100: Introduction to Information and Communications Technology Unit 3: Operating Systems Objectives: ? ? ? ? ? ? ? Define the term software Differentiate between system software and application software Define the terms operating system and utility program Identify the types of operating systems Explain the boot process of a computer Describe the functions of an operating system Identify common utility programs Software, also called a program, consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them.The two categories of software are system software and application software. System Software System software consists of the programs that control or maintain the operations of the computer and its devices. System software serves as the interface between the user, the application software, and the computer’s hardware. It includes the following: 1. Operating Systems 2. Library Programs 3. Utility Programs Operating Systems An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources.Every computer needs an operating system to act as an interface between the user and the computer hardware. It allows the user to perform tasks without having to know how they are done. For example, a user can give a command to save a file on disk without having to know where the file will be stored or how it will be retrieved again. When a command is given to print a document, the user does not have to be concerned with the details of how the printer works – a program called a device driver takes care of the details. ICT 100 – Operating Systems Page 1 of 9The operating system that a computer uses sometimes is called the platform. With purchased application software, the package or specifications identify the required platform (operating system). A cross-platform program is one tha t runs the same on multiple operating systems. Application programs are usually written to work with a particular operating system, so that a word processor, which works with Windows, will not work on an Apple Mac, which has a different operating system. When purchasing application software, ensure that it works with the operating system installed on your computer or mobile device.The Bootstrap Process The process of starting or restarting a computer is called booting. When turning on a computer that has been powered off completely, you are performing a cold boot. A warm boot is the process of using the operating system to restart a computer. A warm boot properly closes any running processes and programs; however, it does not save any unsaved work. Thus, always remember to save your work before rebooting (restarting) a computer. Each time you boot a computer, the kernel and other frequently used operating system instructions are loaded, or copied, from storage into the computer†™s memory (RAM).The kernel is the core of an operating system that manages memory and devices, maintains the computer’s clock, starts programs, and assigns the computer’s resources, such as devices, programs, data, and information. The kernel is memory resident, which means it remains in memory while the computer is running. Other parts of the operating system are nonresident, that is, these instructions remain on a storage medium until they are needed. When you boot a computer, a series of messages may appear on the screen. The actual information displayed varies depending on the make and type of the computer and the equipment installed.The boot process, however, is similar for large and small computers. The steps of the bootstrap process are given and explained below: Step 1: The power supply sends a signal to the components in the system unit. When you turn on the computer, the power supply sends an electrical signal to the components in the system unit. Step 2: T he processor finds the ROM chip(s) that contains the BIOS. The charge of electricity causes the processor chip to reset itself and find the ROM chip(s) that contains the BIOS. The BIOS (pronounced BYE-ose), which stands for basic input/output system, is firmware that contains the computer’s start-up instructions.ICT 100 – Operating Systems Page 2 of 9 Step 3: The BIOS performs the POST, which checks components, such as the mouse, keyboard, and adapter cards. The BIOS executes a series of tests to make sure the computer hardware is connected properly and operating correctly. The tests, collectively called the power-on self test (POST ), check the various system components including the buses, system clock, adapter cards, RAM chips, mouse, keyboard, and drives. As the POST executes, LEDs (tiny lights) flicker on devices such as the disk drives and keyboard.Beeps also may sound, and messages may appear on the screen. Step 4: The results of the POST are compared with data in a CMOS chip. The POST results are compared with data in a CMOS chip. CMOS is a technology that uses battery power to retain information when the computer is off. The CMOS chip stores configuration information about the computer, such as the amount of memory; type of disk drives, keyboard, and monitor; the current date and time; and other startup information. It also detects any new devices connected to the computer.If any problems are identified, the computer may beep, display error messages, or cease operating — depending on the severity of the problem. Step 5: The BIOS may look for the system files on a USB flash drive or on an optical disc drive or may look directly on drive C (hard disk). If the POST completes successfully, the BIOS searches for specific operating system files called system files. The BIOS may look first to see if a USB flash drive plugged in a USB port or a disc in an optical disc drive contains the system files, or it may look directly on drive C (th e designation usually iven to the first hard disk) for the system files. Step 6: The system files and the kernel of the operating system load into memory (RAM) from storage (i. e. , hard disk). Once located, the system files load into memory (RAM) from storage (usually the hard disk) and execute. Next, the kernel of the operating system loads into memory. Then, the operating system in memory takes control of the computer. Step 7: The operating system loads configuration information, may request user information, starts several background processes, and displays the desktop on the screen. The operating system loads system configuration information.Necessary operating system files are loaded into memory. On some computers, the operating system verifies that the person attempting to use the computer is a legitimate user. Finally, the desktop and icons are displayed on the screen. The operating system executes programs in the Startup folder, which contains a list of programs that open a utomatically when you boot the computer. ICT 100 – Operating Systems Page 3 of 9 Figure 1 The bootstrap process Shut down options including powering off the computer, placing the computer in sleep mode, and hibernating the computer.Sleep mode saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state. If, for some reason, power is removed from a computer that is in sleep mode, any unsaved work could be lost. Hibernate, by contrast, saves any open documents and programs to a hard disk before removing power from the computer. Operating System Functions Operating systems perform the following functions: (1) manage resources, (2) manage backing store, (3) handle interrupts, (4) provides a user interface, (5) provide networking capabilities, (6) provide security. . Manage Resources The operating system keeps track of all resources (CPU, disk, memory, files, input and output devices etc. ). Through scheduling it decides what process gets what resource, when it gets it, ICT 100 – Operating Systems Page 4 of 9 how much and for how long. This is called allocation of resources. Resources can also be taken away from a process. This is called de-allocation of resources. Memory Management Computers are capable of holding several programs in memory simultaneously so that a user can switch from one application to another.The purpose of memory management is to optimize the use of random access memory (RAM). The operating system allocates, or assigns, data and instructions to an area of memory while they are being processed. Then, it carefully monitors the contents of memory. Finally, the operating system releases these items from being monitored in memory when the processor no longer requires them. If there is no memory management then one program might accidentally address the memory space occupied by another. This would result in corrupting programs with potentially disastrous results.Virtu al memory is used when sufficient physical RAM is not available. Part of a hard disk is allocated to be used as if it were main memory. The speed of access is very slow compared to RAM access speed. File Management The file management part of an operating system has four basic functions: 1. To allocate space on the storage device to hold each file stored, and to deallocate space when a file is deleted. Space is usually divided into fixed size allocation units (addressable blocks) of say 512 or 1024 bytes. 2. To keep track of the allocation units occupied by each file.Files may be split over several allocation units, not necessarily contiguous (i. e. together). A file may initially occupy one unit of 512 bytes, and then when updated by a user, need extra space which may have to be found somewhere else on the disk. 3. To control file access rights and permissions. 4. To map logical file addresses to physical addresses. For example, a physical disk may be split into several logical dri ves C, D, E, F, G. Managing Programs Some operating systems support a single user and only one running program at a time. Others support thousands of users running multiple programs.How an operating system handles programs directly affects your productivity. A single user/single tasking operating system allows only one user to run one program at a time. A single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time. When a computer is running multiple programs concurrently, one program is in the foreground and the others are in the background. ICT 100 – Operating Systems Page 5 of 9 The one in the foreground is the active program, that is, the one you currently are using.The other programs running but not in use are in the background. A multiuser operating system enables two or more users to run programs simultaneously. Networks, servers, mainframes, and super computers allow hundreds to thousands of use rs to connect at the same time, and thus are multiuser. A multiprocessing operating system supports two or more processors running programs at the same time. Multiprocessing involves the coordinated processing of programs by more than one processor. Multiprocessing increases a computer’s processing speed. 2.Manage Backing Store The operating system is responsible for the transfer of data from secondary storage (e. g. disk) to memory and vice versa. It also has to maintain a directory of the disk so that files and free spaces can be quickly located. 3. Handle Interrupts The operating system detects interrupts (such as the click of the mouse or a process indicating that it is finished with the processor) and then performs the necessary task (such as allowing the processor to be used by another process). 4. Provide a User Interface You interact with software through its user interface.That is, a user interface controls how you enter data and instructions and how information is d isplayed on the screen. The operating system acts as a user interface between the user and the machine. Command-Line Interface To configure devices, manage system resources, and troubleshoot network connections, network administrators and other advanced users work with a commandline interface. In a command-line interface, a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions. Graphical User Interface Most users today work with a graphical user interface.With a graphical user interface (GUI), you interact with menus and visual images such as buttons and other graphical objects to issue commands. Many current GUI operating systems incorporate features similar to those of a Web browser, such as links and navigation buttons (i. e. , Back button and Forward button). Some GUI operating systems provide access to command-line interfaces. Menu-driven Interface User is presented with a range of options from whi ch to choose ICT 100 – Operating Systems Page 6 of 9 Form Interface A user interface in which the computer outputs separate prompt and response fields for a number of inputs.Natural Language – the interface consists of standard languages such as English, Spanish, French, and Dutch etc. 5. Provide Networking Capabilities Some operating systems have networking capabilities built in, others are creating specifically for managing networks, e. g. server operating systems. Networking capabilities include organizing and coordinating how multiple users access and share resources on a network. Resources include hardware, software, data, and information. For example, a server operating system allows multiple users to share a printer, Internet access, files, and programs.The network administrator, the person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network. The network administrator also uses the server operating system to install software and administer network security. 6. Provide Security Computer and network administrators typically have an administrator account that enables them to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network.Settings include creating user accounts and establishing permissions. These permissions define who can access certain resources and when they can access those resources. For each user, the computer or network administrator establishes a user account, which enables a user to access, or log on to, a computer or a network. Each user account typically consists of a user name and password. A user name, or user ID, is a unique combination of characters, such as letters of the alphabet or numbers that identifies one specific user. Many users select a combination of their first and last names as their user name.A user named Henry Baker might choose H Baker as his user name. A password is a private combination of characters associated with the user name that allows access to certain computer resources. Some operating systems allow the computer or network administrator to assign passwords to files and commands, restricting access to only authorized users. After entering a user name and password, the operating system compares the user’s entry with a list of authorized user names and passwords. If the entry matches the user name and password ICT 100 – Operating Systems Page 7 of 9 ept on file, the operating system grants the user access. If the entry does not match, the operating system denies access to the user. To protect sensitive data and information further as it travels over a network, the operating system may encrypt it. Encryption is the process of encoding data and information into an unreadable form. Administrators can specify that data be encrypted as it travels over a network to prevent unauthorized users f rom reading the data. When an authorized user attempts to read the data, it automatically is decrypted, or converted back into a readable form. Types of Operating SystemsOperating systems can be divided into the three following types: 1. Stand-alone 2. Server 3. Embedded Stand-Alone Operating System A stand-alone operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device. Some stand-alone operating systems can work in conjunction with a server operating system (here it functions as a client operating system); others include networking capabilities allowing users to set up small networks (e. g. home or small business network). Examples of currently used stand-alone operating systems are Windows 7, Mac OS X, UNIX, and Linux.Server Operating System A server operating system is an operating system that is designed specifically to support a network. These operating systems can support all sizes of networks from small to large-sized networks and Web servers. A server operating system typically resides on a server and provides client machines with access to resources. Examples of server operating systems include Windows Server 2008, UNIX, Linux, Solaris, and NetWare. Embedded Operating System The operating system on mobile devices and many consumer electronics, called an embedded operating system, resides on a ROM chip.Most handheld computers and small devices use embedded operating systems. Popular embedded operating systems today include Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, embedded Linux, and Symbian OS. ICT 100 – Operating Systems Page 8 of 9 Library Programs A library program is available to all users of a multi-user computer system, typically to carry out common tasks required by everyone. For example a routine that searches for lost files or restores corrupted files may be stored in a library. Utility ProgramsA utility program, also calle d a utility, is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs. Most operating systems include several built-in utility programs. Users can also buy stand-alone utility programs. Utility programs perform common tasks that thousands of computer users need to do at some time or another, such as searching for files, viewing images, backing up files and disks, uninstalling programs, defragmenting disks, burning optical discs, and so on.One common utility is compression software such as WinZip that ‘zips’ files so that they occupy less space. This is very useful if your want to transmit a graphic or large data file over the Internet, as the transmission time will be much reduced. References Shelly, G. B, Vermaat, M. E. (2010). Discovering Computers 2011. Boston, MA: Course Technology Daley, B. (2008). Computers Are Your Future 2007. Upper Saddle River, NJ: Pearson Education Heathcote, P. M, Langfield, S. (2004). ‘A’ Level Computing, 5th edition. Oxford: Payne-Gallway Publishers Ltd ICT 100 – Operating Systems Page 9 of 9

Saturday, September 28, 2019

Criminal justice , organized crime Term Paper Example | Topics and Well Written Essays - 2000 words

Criminal justice , organized crime - Term Paper Example This present paper aims at discussing crime, justice and organized crime in Italy and outlining the effects of Italian Mafia o business government. Back in the 20th century, the Italian government imposed any laws (anti-racketeering laws) to end this illegal activity as well as weakening the Mafia group. Nevertheless, these types of illegal activities still take place in the country’s business currently. During the 19th centuries, a large group of Italian immigrants, most of them farmers, unskilled workers, and artisans moved to American to search for better paying jobs and economic opportunities, as well (Beare and Naylor 34). The number of Italians immigrants was mostly high in the New York town with a maximum of 250,000 immigrants for the year 1880 to 1910. The majority of these immigrants were law-abiders. However, most of the big groups involved themselves with criminal activities, therefore forming neighborhood gangster groups. In the 1920s, the period of the prohibition era, the time when the U.S. government made its 18th amendment to the country’s constitution mainly to ban the production, transportation, and selling of illicit beverages in the country (Finckenauer and Yuri 56). The Italian Mafia group alongside with other ethnic groups unlawfully, started to associate themselves with liquor activities as well as transforming themselves to perform other criminal activities such as money laundering, smuggling, and bribing the police officers as well as any other public officers (Albini 47). Typically, the entire Italian Mafia group had some hierarchies with each hierarchy being headed by its own boss. The boss with a lot of authority and could receive some amount of money from any moneymaking criminal activity performed by the members of his group. The vice chairperson of any group was second-in-commander and below this commander

Friday, September 27, 2019

Legal and Ethical Considerations Research Paper Example | Topics and Well Written Essays - 750 words

Legal and Ethical Considerations - Research Paper Example The document is significant because both the contractor and the client  are protected  in terms of legal and ethical issues. Contracts  provide  terms and conditions that are either verbal or written (Susan and Katherine, 2000). In this context, we  review  how conflicts arise due to disagreements between the client and the contractor whereby part of the  crucial  details  has been omitted  in the contract documents and; therefore, this eventually affects the  progress  of the intended project. In the project, that  is intended  to help the community and the hospital by the provision of water supply whereby a water reservoir is to built, the contractor and the management team of the BAMC disagree on the ongoing  project  of  reservoir  construction. The disagreement occurred because the location of the reservoir  is situated  on  hard  granite rocks that require  expertise  and heavy machinery to blast the rocks before construction  i s commenced. ... Some of the mutual solutions that the contractor and the management team decided include the relocation of the reservoir site. The  reservoir  is supposed  to help the community and the hospital; therefore, the location should be at a central location. On the other side, if the  entire  location  is composed  of the hard rocks, then the  management  personnel of BAMC should reconsider the  compensation  of the contractors because the rocky  place  will require heavy  machinery  for blasting the rocks and this may be quite  costly  to the contractors. For a  consensus  to be achieved, both parties need to  comply  to the need of the other so that no  party  feels oppressed. A matter of  vast  concern  to contractors is how they can  make  stability  between quality and  security  against expenditure. Contractors  want  to  plan  a product that is of high quality but the  business  administrators  want  to  maintain  a low cost in the expense of quality product. At the end of this, various issues, which include business, official, and ethical issues, arise (Creswell, 2002). The  business  matters evolve around what organizations must do in order to  compete  in the business sector. The officially authorized and  moral  issues centers around what the organization should do. The contractor has a legal  responsibility  to  grant  safe  services and products. However, the contractor is legally responsible only for contractual  indemnity  and not for any additional destruction that the client may incur.  Although if the contractor commits fraud  deliberately, then he or she may be criminally  accountable  for the fraud committed. There are  various  challenges that are facing

Thursday, September 26, 2019

The Zonk Air Accident Research Paper Example | Topics and Well Written Essays - 1000 words

The Zonk Air Accident - Research Paper Example The research paper "The Zonk Air Accident" talks about the air accident that occurred at the Tahoe Airport on the 7th of November 2010. This paper also contains a conclusion, which is a summary of the major points contained in it. This paper takes a stand that there are a variety of factors responsible for the air accident involving the Zonk aircraft. These factors range from poor weather conditions, the inefficiency of the pilot, and poor management from the company. One of the causes that are given for the fatal air accident is the inefficiency of the new pilot, which was brought about because of lack of experience and inadequate training. The pilot was new hired, and he had done a total of 300 hours in flight. Of these 300 hours, the pilot had done 50 hours on twin engine air craft’s, and only 15 hours on the air a model of PA 31 (Weil, 2012). Furthermore, the pilot did not have sufficient training on meteorological conditions. He only had some 5 hours of such kind of training (Weil, 2012). Furthermore, before the accident, the pilot had only flown some three air craft’s for the Zonk Company, and before flying the aircraft, he did not fly for the company for a period of 10 days. This is an indication that the pilot was not experienced and qualified enough to handle this aircraft. Because of inadequate training in meteorology, the pilot was unable to navigate in the harsh weather conditions. And the management is also to blame because they allowed an inexperienced pilot to fly such kind of a plane.

Wednesday, September 25, 2019

Theories of Justice (Nozick's theory of distributive justice, compared Essay

Theories of Justice (Nozick's theory of distributive justice, compared to Rawls ) - Essay Example Out of the four theories of distributive justice, the only theory that has the most reliability is "justice as entitlement. This Nozickian theory is frequently thought as a response to Rawls' "justice as fairness" for the reason that it is a theory of extremes in comparison. "Whilst Rawls uses the original position to generate a model of fairness, he, does not take critically the distinction between persons since it extremely limits people's rights to utilize their own natural and social possessions" [5]. Robert Nozick's "Entitlement Theory" establishes a system of distribution that permits for holdings to be attained as well as transferred by means of legitimate means. This is in disagreement to a redistributive type of justice, like Rawls', which is an effort to level the difference by taking from a little to give to others who don't have as much. Nozick's form of distribution consists of the respect for people as well as their holdings by means of allowing the free market to be a basis of society. Thereby, the government's role in the economic sector would be minimal, allowing for increased productivity levels for those that engage in the free market. The rights of the citizens, and of legal aliens, of a liberal democratic state should not be infringed upon through the use of taxation or illegitimate transfers of holdings; self-ownership is a right that all people in a liberal (the broad sense) state could agree on. Taxation is a form of forced labor by Nozick's account. Rawls' would argue that taxation is fundamental in maintaining public institutions and goods that benefit all in some cases and those in most need. "Taxation would provide those most needy with a base-needs minimum. Nozick's objection to redistribution is that it uses some people as "means to other people's ends" This derives from Immanuel Kant's notion that we should not "treat others as means to our own or other people's ends, but as ends in themselves."[6] I agree with Nozick that taxation for re-distributive purposes is forced labor because it treats people as means; taxes also pay for street light, and the police and defense. These are things that we all benefit from; therefore some taxes (though forced) are beneficial to society as a whole and thus should be implemented. The involuntary transfer from the richer to the poorer caused by taxation is a violation of a person's rights, but if it can be proven that the taxes they pay are advantageous to their own purposes then some might consider voluntarily paying taxes. I think the problem arises when fairness is being questioned. Fairness is hard to come by when taxation is being argued. It wouldn't be fair for some have to pay more for the same service that others pay less. Those that do not have the means would argue that taxing the rich more is fair. Hence, the raising and lowering of taxes, alternates with the change of parties heading this nation in particular. When speaking of how Rawls and Nozick have different view points their ideas of the "separateness of persons," Adam Swift says: "What if I am one of the people made unhappy for the sake of other people's happiness"[6]. This is a question we must consider

Tuesday, September 24, 2019

Urban planing and policy law Coursework Example | Topics and Well Written Essays - 1250 words

Urban planing and policy law - Coursework Example Most cities across the world carry almost more than half of the total population, hence the decisions made by governments, business community and individuals have fundamental impacts on cities consequently on the populace. This requires policies to moderate such decisions and subsequent policies. Secondly, critical challenges need to be solved to secure lasting production and sustainability. Te complexity of these urban issues calls for a national approach, which is articulate and well understood to guide city development and expansion for the sole purpose of improving urban lives. For continued prosperity and wellbeing of the city population, the governments should ensure that, the cities meet the needs of the present and future cohorts and sustaining economic expansion without compromising the natural resources. For these reasons, the National City policy becomes a fundamental element of having a healthy city population. Transportation Policy Pressure of the continued growth of pol lution adds pressure on the existing resources and facilities. In the past, high population in cities has congested roads and this led to expansion to fit the ever-growing population. However, this option is proving to be unsustainable due to the growing cost of building roads. In addition, there is less appropriate land for new roads. According to the vision 2030, most nations across the globe have resolved that urban transport policy and development should not be a one-body orientated, but instead distributed to diverse organizations to help come up with viable policies, which can solve the current trends in transport (INTERNATIONAL ITF/OECD SYMPOSIUM ON TRANSPORT ECONOMICS AND POLICY, 2010). These efforts might not provide the same service to every person but each urban resident will enjoy access to a reasonable standard of service. It is imperative to note that, incorporation of regional and local transport systems promotes competent modes of the transport. For instance, the pas senger reform policy is fundamental in planning transport services at the municipal borders and across other regional. This uniformity across municipals and other regions help in improving the universal level of transport systems and thus adding the value of attractiveness of public transport services to users. Urban polices on transport systems are significant both in the main cities and around the suburbs. Majority of the populace lives in the city suburbs, which are far from the services and jobs. This implies the as day counts, journeys to work, schools, supermarkets, social places among others are increasingly becoming distant. Hence, policy development on transport systems should be concentrated on solving challenges such as a reduction of dependency on the car and stopping urban fragmentation (INTERNATIONAL ITF/OECD SYMPOSIUM ON TRANSPORT ECONOMICS AND POLICY, 2010). The overall essence, of the transport policy should be focused on land use planning, which will provide consid eration on the impacts on traffic and divide between diverse modes of travel. Some of the fundamental aspects of urban transport policy include Vehicle efficiency and emission

Monday, September 23, 2019

IBM in 2009 Case Study Example | Topics and Well Written Essays - 250 words

IBM in 2009 - Case Study Example IBM was facing competition from low-cost network servers in the markets. In addition, the markets had alternative products, which were cheap, for example, the PCs. The company faced the challenges of owning their own softwares. They relied on the software from Microsoft. In addition, they did not have their own specialized application software. The company acquired assets worth $3 billion from lotus. The asset added to the general capital of the company. The company has the risk of losing customers, if they do not provide experts who would advise clients on the new business model (Charles & Gareth 85-87). There are questions that the management has to answer if they want a new model to be a success. They have to ask themselves where the company would get the resources for outsourcing and consultation. In addition, they should determine the best marketing tools of making the internet advertisement a success. The management has to ask themselves how they will improve the customer experience if they want to transform the company into a customer driven corporation (Marsh 100). For a company to get the best outsourcing and consultancy resources, the paper recommends for the management to upgrade its computer solutions into the state-of-the art. In addition, the company has to hire experts to conduct internet marketing. Lastly, IBM has to produce goods that meet the customers taste (McDonald

Sunday, September 22, 2019

Competitive Analysis and Competitive Strategy of Apple Doing Business Research Paper

Competitive Analysis and Competitive Strategy of Apple Doing Business in China - Research Paper Example The firm should devise ways to leverage the current strategies to make the firm to be more competitive than its rival firms are. However, the Apple’s weaknesses are the major challenges that have given its competitors to perform well in the Chinese market. To deal with such a problem, the firm should implement new strategies that would minimize or eliminate its weaknesses, thus improving competitiveness in the market. Apple Inc. is an American company that designs and fabricates hardware for computers, programming software and other consumer gadgets. The organizations best-known hardware items are the Macintosh line of machines, the iPod, the iPhone, and the iPad, with all the products having met the international standards and are significantly unique from other competitors’ products. Apple began in 1976 and has since created an exceptional notoriety in the consumer gadgets field. Nonala and Kenney (1991) highlighted that the individuals who use Apple hardware have a tendency to be excited about and dependable to the items while the individuals who do not use Apple items frequently scrutinize them as being overpriced. With the arrival of the iMac in 1998, Apple could put to rest some its past disappointments. The uncommon achievement of the iPod sets the stage for future items, including the best selling cell phone ever, the Apple iPhone, the MacBook line of convenient machines, and the A pple iPad proclaimed in 2010. As indicated by rankings of brands carried out universally, the estimation of Apples brand doubled to $76 billion in 2012 as compared to the preceding year. The organization is regularly expanding year by year and has set a high record among organizations grade. Apple Inc targets both low-level clients and high-level clients by releasing by introducing different standard phones with different pricing in China. The commodities target people of all ages to maximize the profit margins of the firm. China is the second largest

Saturday, September 21, 2019

The red room by H.G Wells Essay Example for Free

The red room by H.G Wells Essay The Red Room is a spine chiller written by H.G Wells. The story is set at Lorraine Castle where a specific room is preoccupied by ghastly spirits. This story The Red Room is about a man (narrator) who seeks spirits inside Lorraine Castle, with his only protection as his revolver. The spirit welcomes the man in an uncomfortable manner, moving furniture, candles going out without smoke and other procedures which the spirit posses. His excuse for the cause of this terror is that ghosts are not inquisitive in this room but is this mans nature (fear) itself that is broader. Already this has begun where effectively you contrast imagery and excitement, making the story feel haunted and more spine chilling. These contrasts of images appear suddenly such as castle that develops other imagery haunted. This opens the story up well that makes the beginning scene effective scaring the audience and increasing their interests in the story. The narrator in the story plays important parts showing he is unaware of the possible outcomes that may occur, this makes his character more significant. The way this makes the narrator to become more significant is the change of character. At the beginning of the story the man (narrator) represents himself as a calm and still person. The way that the narrator has expressed this is that it will take a very tangible ghost to frighten me. This characteristic soon changes where he starts to hallucinate becoming superstitious of the ghastly happenings that occur around him before he enters the red room. darkness closed upon me like the shutting of an eye, wrapped about me in a stifling embrace sealed my vision. Again the man shows another change towards his attitude in which he expresses his outer fear, talking broader, louder than he is whispering. This makes the narrator more significant in the story than any other character The man with the withered arm is an old character, living at this castle for eight-and-twenty years that has not yet glanced at a ghost before his eyes. Its your own choosing said the man with the withered arm, when the coughing has ceased for a while. This quote shows imagery that the old man is withered on one of the two arms he has, also the way he walks indicates some other imagery that does not appeal to the story but in the audiences mind instead. Other than imagery and description that he is withered and old there is a sign of repetition. The quote above Its you own choosing replicates, the withered man repeats this throughout the story, also this points to the audience a phrase that replicates in their minds. Another character the old woman, again a person who has past her age in living both by her appearance and her attitude. The description of her pale eyes indicates that death is not far away spending most of her time staring at the fire. This nights of all nights The quote above is a repetition explaining about that tonight something will happen which has never occurred before for some time. This also shows that the old woman could be either very superstitious or indeed psychic, predicting the future of tonight that something will happen. The further character in the story is another man but older and is described in more detail than the other characters in the story. These include a crutch that held him steadily, and eyes that were small, bright, and inflamed. A monstrous shadow of him crouched upon the wall and mocked his action as he poured and drank This personification shows human characteristics monstrous shadow that the audience sees as a technique in creating a spine chiller. The audiences reaction in this personification is imagery of the old man drinking with a monstrous shadow above his head enlarged onto the wall behind him. There is to my mind something inhuman in senility, something crouching and  atavistic; the human qualities seem to drop from old people insensibly day by day This quote is described as the change of mood appealing to the old people living in Lorraine castle. Human qualities seem to drop from old people, indicate that they are becoming closer to death when loosing their human qualities. This mood also relates back to old peoples appearance for example, how they illustrate their repetitions to the man (narrator) and also the audience. An additional character the young Duke was a person who tried to get his revenge upon the ghostly spirits to end his superstition. He had begun his dying, for he had opened the door and fallen headlong down the steps. This indicates he was pushed by his superstition to end his vigil. His gallant attempt to conquer the ghostly tradition of the place. Shows his ambition in finishing the fears that haunt Lorraine Castle. Although the young duke does not exist with the different characters in the story, but I think he brought the plot into reality allowing the man (narrator) to play the important character. If the duke were to succeed with his ambition, and conquer the ghostly tradition then the whole plot will become entirely different. Throughout this spine chilling story I have grasped shocking imagery that gives this story suspense. The author used this imagery to create an atmosphere against good vs. evil or man vs. nature, except this time nature wins the ending of the story. I have noticed that fear (nature) is stronger than superstition because fear controls both the inner and the outer person allowing them to then become superstitious. Other ways in which the author expresses atmosphere is the use of personification. Metaphors and similes can sometimes be expressed as personification where the surroundings are intangible and inanimate. An example of how the author used this metaphor personification is ocean of mystery, where the atmosphere of the ocean is mystery, this cannot be seen nor touched therefore it is personification. These are more techniques that the author uses in creating suspense full of  spine chilling events.

Friday, September 20, 2019

Employability as Educational Performance Indicator

Employability as Educational Performance Indicator Definition of Employability Employability has been used as a performance indicator for higher education institutions (Smith et al, 2000) and represents a form of work specific (pro) active adaptability that consists of three dimensions: career identity, personal adaptability and social and human capital (Fugate et al, 2004). At the same time, Knight and Yorke (2004) have put forward the four broad and interlocking components of USEM account of employability: Understanding (of the subject discipline) Skilful practices in context Efficacy beliefs Meta-cognition Nabi (2003) mentioned that employability is about graduates possessing an appropriate level of skills and attributes, and being able to use them to gain and remain in appropriate employment. From a human resource development view, employability is a concept that emerged through the 1990s along with a growing perception among employees that they cannot count on their employers for long-term employment. Employability is a promise to employees that they will have the skills to find new jobs quickly if their jobs end unexpectedly (Baruch, 2001). Prior to this, Harvey (2001) has defined employability in various ways from individual and institutional perspectives. Individual employability is defined as graduates being able to demonstrate the attributes to obtain jobs. Commonly, institutional employability relates to the employment rates of the university graduates. However, Harvey argued that employment outcomes of graduates are not an indicator of institutional employability. He presented an employability-development model shown in Figure 1. The model illustrated a multi-perspectives view of employability with all related stake-holders. Employability and Higher Education: Key issues Despite the burgeoning research on employability and availability of a wide range of models purporting to explain it, employability itself remains a contentious concept open to a ‘plethora of micro-interpretations (Harvey, 2003). This can make the task of curriculum development particularly difficult. [p5] The growing importance of employability According to McNair (2003), graduate employability has become a more important issue for institutions. This is: because of the changing nature of the graduate labour market, mass participation in HE, pressures on student finance, competition to recruit students and expectations of students, employers, parents and government (expressed in quality audit and league tables). On a broader level, it has been noted that higher education, through the generation and dissemination of knowledge, directly impacts economic competitiveness on a national and international level (Brown et al, 2003; CIHE, 2003; UUK, 2007; DIUS, 2008). The significance of the UK HE system to the wider economy has been generally acknowledged since the Robbins Report was published in 1963. However, this relationship has been made more explicit in recent years and it was with the publication of the Dearing Report (1997) that the connection found prominent expression. Dearing strongly expressed the need for a globally competitive economy containing highly skilled, highly trained and highly motivated graduates who could perform effectively on the worlds stage. This coupled with the further development of human-capital theory (Becker, 1975), which asserts that one role of government is to provide and nurture conditions which will increase the pool of skilled labour, has created a fertile forum for the discourse of ‘employability to flourish. The changing nature of the graduate-labour market Dearing (1997) stated that ‘learning should be increasingly responsive to employment needs and include the development of general skills, widely valued in employment; however, the labour market is changing dramatically and at a much faster pace than in the past. Emerging markets and rapid expansion of the knowledge economy means that the same set of employability skills which were in demand ten or even five years ago may not be required in the evolving graduate-employment market. Employers are increasingly seeking flexible recruits who can work effectively in the ‘de-layered, down-sized, information-technology driven and innovative organisations in existence today (Harvey et al, 1997: 1). Employers are seeking people who can do more than just respond to change, they need those who can lead change. McNair (2003) comments on the speed of labour-market development and notes that a higher percentage of the workforce is employed in small and medium enterprises (SMEs), a trend also reflected in graduate-employment statistics. While this may offer opportunities to gain early responsibility in less structured and hierarchical work environments, graduates need to have the skills to create rewarding graduate roles role in what Purcell and Elias (2004) refer to as ‘niche-graduate occupations. Niche-graduate occupations are those: where the majority of incumbents are not graduates, but within which there are stable or growing specialist niches that require higher education skills and knowledge (Purcell and Elias, 2003: 5). Students therefore need to be equipped with skills which enable them to ‘grow jobs to graduate level. HE has been criticised by some as being too slow to recognise the changing nature of the labour market and is producing graduates who are ill equipped to deal with the realities of graduate employment (CBI, 2006). Government policy to widen participation in HE, aiming to increase the proportion of 18-30 year olds to 50 per cent by 2010, will no doubt have a significant impact on the supply of graduates in the labour market. According to Elias and Purcell (2004) participation rates in UK HE almost doubled in the decade 1991-2001, from 1.2 million students to 2.1 million. Such rapid expansion has raised concerns that the increase in the number of highly qualified individuals may not be coupled with an equivalent rise in demand for their skills and qualifications (Brown and Hesketh, 2004; Brynin, 2002; Keep and Mayhew, 1996, 1999 in Elias and Purcell, 2004). While Elias and Purcell (2004) conclude that the expansion of HE at the end of the twentieth century has been primarily positive, Purcell et al (2005: 16) express concern that ‘the fit between the supply of graduates and employers demand for their knowledge and skills clearly falls some way short of ideal. There are mixed reports about whether demand for graduates will be affected by increasing participation in higher education. The supply of graduates has been steadily rising and there were 258,000 graduates in 1997 compared with 319,000 in 2007 (HESA, 2007). Despite rising numbers leaving HE, according to DIUS (2008), demand for graduates remains high and the latest report by the Association of Graduate Recruiters (AGR 2007) suggests that the number of graduate vacancies increased by 15.1 per cent in 2007. Both DIUS and AGR do however raise concerns about the mismatch between what employers are looking for and the skills graduates possess (see Chapter 2 for a more detailed analysis of skills). Despite much controversy about the impact of increasing student numbers, it is indisputable that graduates are facing a changing, more competitive labour market and they need to be prepared accordingly. The changing nature of the higher education landscape Beyond pressures facing graduates in the labour market, universities are facing increasing demands to account for what they do and prospective students and parents are becoming discerning ‘customers when shopping for the most suitable HEI (McNair, 2003). Given the importance of employability in the equation, institutions cannot overlook the significance of developing this aspect of provision. Allison et al (2002) allude to the pressures facing HEIs as evidenced by the publication of increasing numbers of performance indicators and guidance documents such as the QAA Code of Practice for Careers Education, Information and Guidance (2001) and the Harris Review of Careers Services (2001). Yorke and Knight (2002: 4) have expressed some concern about the way in which statistics on employment rates used in league tables can distract HEIs from the important task of enhancing employability. They state that: once employment rates become an institutional performance indicator (HEFCE, 2001), there is a pernicious backwash as institutions seek to ‘improve their scores since they know that these scores will end up in the so-called ‘league tables published in the press. Consequently: there is a danger that maximising the score will command more institutional attention than fulfilling the educational aim of enhancing employability. Higher Education in the UK has gone through considerable change during the last two decades. The move from an elitist system to one of mass participation has been highly significant. Shelley (2005) indicates that the number of 18-30 year olds in HE rose from 12 per cent in the 1980s to 43 per cent by 2002. This he points out has not been matched with commensurate levels of funding and between 1977 and 1997 government expenditure per student fell by 40 per cent. In recent years however funding levels have improved with HEFCE announcing a figure of  £6,706 million in recurrent funding for 2006-07 to universities and colleges in England (HEFCE, 2006). Increased funding levels have led to systems of accountability being put in place. These in turn have led to the development of managerial practices intended to promote new efficiency and customer-focused, customer-led policy frameworks which should ensure success in a new competitive market. In the eyes of commentators such as Bekhradnia (2005) the last decade has seen a mixture of successes and failures of managerial initiatives. For some commentators (e.g. Brown and Lauder, 1999; Green, 1993) these policy directives coupled with the emphasis placed on the contribution of HE to the global economy has led to the ‘marketisation and the ‘commodification of HE and its teaching. Brown and Lauder (1999) contend that there has been a movement towards a ‘neo-Fordist approach to HE in which teaching and learning is now emulating the Fordist manufacturing processes of the early twentieth century. This concept was characterised by the production assembly line ‘just-in-time unitisation production methods of manufacturing industries. For HE this manifests itself in several ways which Brown and Lauder describe as: learner organisations with emphasis on ‘numerical flexibility (i.e. outcome-related education and cost-driven agendas), mass production of standardised products (i.e. modularisation/unitisation of curricula), and emphasis on quality systems to ensure standardisation which result in a bland mechanistic experience of learning. [p9] Given the apparent consensus among the key stakeholders about which skills are important and on the need to address employability in HE, it seems strange that there is so little commonality in approaches taken by universities to enhance employability. There remains considerable debate on how best enhancement of employability can be achieved, and indeed the extent to which HE can influence this aspect of student development. In an extensive review of HE provision, Little (2004: 4) concludes that while there is: international concern that higher education should enhance graduate employability, there is little evidence of systematic thinking about how best to do it, let alone any model that can be badged as ‘best practice and adopted wholesale. Developing a common understanding of how to enhance employability is a highly complex issue, although Knight (2001) believes government and others persist in treating it in much the same way as ‘innovation, as ‘something simple, to be planned, delivered and evaluated (Knight, 2001 cited in Lees, 2002: 1). Attempting to form a coordinated and holistic approach to skill development, government has introduced many programmes and initiatives to promote skill development and these seem to have had some impact. The DfEE Higher Education Projects Fund 1998-2000, for example, included projects to develop key and transferable skills and Harvey, Locke and Morey (2002) have reviewed the trends in institutions approaches to embedding employability. They note that there has been a shift in HE from developing the specific employability skills within specialist modules to a more holistic approach where institutions are embedding employability and skills throughout the curriculum. They present examples of employability initiatives from different HEIs which were highly varied and based on differing philosophies. Perhaps it is inevitable that institutions and even individual departments and academics will vary widely in their approaches to developing employability as they will be operating in the context of their own frame of reference about education, and will be dealing with students who will vary hugely in their ability and ambitions. However, it is clear from the research on employability skills that the attributes which employers value and educators recognise as important are very similar, and there is hope that such consensus in thinking can contribute to a more coherent approach to curriculum development.

Thursday, September 19, 2019

The Master Speed by Robert Frost Essay -- Robert Frost Poem Master Sp

'The Master Speed' by Robert Frost Throughout the poem The Master Speed, Frost addresses the idea that marriage is a sacred bond that must be treasured all through our lives. The main reason for the apparent matrimony theme was due to the engagement of Frost's daughter. Because of this great influence over his life, Frost reiterated the advice to his daughter to stay at 'the master speed'; in order to fully enjoy the rest of her life as well as her future commitment. By this Frost suggests that one should not rush through life but instead take in life, nice and slow so that it may be savored. Frost first presents this idea by metaphorically discussing the spectacular abilities his daughter possesses but refuses to use. In the first quatrain, the poet suggests that his da...

Wednesday, September 18, 2019

The Prejudiced Message of Merchant of Venice :: Free Merchant of Venice Essays

The Prejudiced Message of Merchant of Venice The Merchant of Venice portrays a prejudiced message. This is first evident in Act one when Shylock openly says to himself, "I hate him because he is a Christian....May my people be cursed if I forgive him!" All throughout the book the Christians are battling with the Jews and neither of them will listen to the other because their hearts are filled with intense prejudice. Antonio proves that he is unwilling to change his feelings toward Shylock when he says, "I'm likely to call you names again, spit on you again, and shun you again." They don't seem to realize that their prejudiced attitudes could get someone (Antonio) killed. There are different times during the play that Shylock could be viewed as a villain and other times that he could be seen as a sympathetic character. When he doesn't allow his daughter, Jessica to marry Lorenzo just because he's a Christian, that's when we start to think that Shylock just isn't a very nice guy. But he was also the target of a lot of prejudice himself. Antonio didn't like him because he was a Jew, and he let Shylock know his feelings. However, two wrongs don't make a right. In other words, just because Antonio hated Shylock and spit in his face, there's no reason why Shylock couldn't just show Antonio love or just stay away from him. Shylock chose to get revenge, so he probably would be viewed as a villain. Prejudice doesn't get anyone anywhere.

Tuesday, September 17, 2019

Union Organizing

Labor Relations Week 6 Final Paper Union Campaigning Process Campaigning is something that is done in many aspects of life. It breaks down to basically creating arguments to sell yourself or your company to a group of people. President hopefuls set out on a campaign trail every four years to try and get people to vote for them. I always thought that this was the only form of campaigning, but I was incorrect. Employers and Unions both use campaigning to get workers to either avoid, or join a union. Each side has their own tactics and goals to achieve. I plan to analyze both sides and show the pros and cons of each. Employer campaign tactics start with four key factors that determine voting decisions. These factors are job dissatisfaction, union instrumentality, general union attitudes and collective social identity. Employers try to provide information to employees consisting of pro-company, anti-union information. Employers use many tactics during their campaign process to attempt to get their workers to avoid joining a union. Some of these include sending out letters or email messages with negative aspects of the union organization, or supervisors meeting with employees individually or in small groups. Another tactic that works to the advantage of employers is utilizing its private property rights to prohibit outside organizations from entering the workplace and interacting with their workers. A drawback to that tactic is that they have to maintain the rule for all organizations, and not just unions. One of the more common tactics is the captive audience meeting. This is typically a group meeting held in the workplace during work hours, where employees listen to management describe their antiunion and pro-company presentations. These meetings are completely legal as long as they are not within 24 hours of an election. Employers need to be careful not to cross lines in regards to their tactics. Some of them can be considered illegal if they are overly aggressive or threatening. Some of these employer tactics are heavily debated due to their difficulty to measure and observe, so that kind of has the National Labor Relations Board (NLRB) keeping an eye on employer tactics, and how they run their campaign. They want to ensure that there is no threatening of workers, or any other funny business going on. Union campaign processes also target the four key factors of worker complaints within a company. Union organizers use a vastly different set of tactics to get their information out, and attempt to get a union organized within a workplace. No matter how closely labor laws attempt to regulate the balance of rights during union and employer campaigning processes, the employers always seem to have more power over their property, and their employees. Unions need to get creative with their campaigning. Unions have some disadvantages against them because they cannot show workers instant results. Instead they make a lot of what seems like empty promises that they need to fulfill if they are successful during their campaign. One of their tactics that they use to get in contact with workers is by accessing the Excelsior List. The Excelsior List is simply a list of the names and addresses of employees eligible to vote in the election. Employers must provide this list to the union organizers to comply with a rule the NLRB established in 1966. Unions then utilize the list to send out mailings or set up home visits by a union representative to speak with the worker directly. A distinct disadvantage to using this list is that a lot of workers may view it as an invasion of privacy, and choose not to speak with the union representative. Alternatively, with the advance of technology, unions are now utilizing the Internet and web pages to help distribute information without violating an employee’s privacy. In comparison with employer campaigning, unions definitely have a more passive approach. Unions also have to recognize that different campaign tactics work better for different sets of workers. There is a lot to consider when establishing a campaign. Now, there can be significant problems with each side of the campaign process. Each side has to maintain their role while providing the necessary information desired, and stay within the legal guidelines set forth by the NLRB. Employers must be careful not to make any of their statements seem like threats of unemployment or wage deduction. Our textbook explains this perfectly. â€Å"Predictions based on objective facts that some events will likely occur because of forces beyond the employers control are legal; statements that convey the impression that these events are inevitable or at the discretion of the employer are threats. (McGraw-Hill, page 246) Employers tend to be watched more closely in these circumstances, since they have a more direct access to their workers, obviously. While the NLRB cannot monitor everything, the workers can report any inappropriate behavior should it occur. For instance, while a campaign is in process and an election is approaching, employers are not allowed to question workers on their stance regarding unions. This could lead to an employee giving his or her stance, and the employer terminating the employment to avoid them voting for the union, which is not allowed. Also, if employers choose to activate their privacy protection, and choose not to allow solicitors, they must remain active and apply that rule to all organizations, not just unions. Employers tend to have the advantage in the campaign process, since they can hire consultants and reach the workers directly, as stated. Some of these consultants can make matters worse, by starting rumors, telling lies and blowing things out of context. Our text outlines a particularly extreme case in which â€Å"a 17 year employee with no record of violence challenged his plant manager to let the employees talk to a union organizer. The following day the employer notified the local sheriff that this employee was threatening workers so the sheriff’s deputies surrounded him at gunpoint on his way to work and forcibly took him to the local hospital. Based on what the employer told the sheriff, the employee was involuntarily committed to a mental hospital. He was held for two weeks against his will and forcibly injected with anti-psychotic drugs until a lawyer could obtain his release. This happened in 1999, in South Carolina. † (McGraw-Hill, p. 248) Reading that is a real eye-opener to how serious this subject can get. The union side of campaign runs into fewer issues, mainly because of their lack of contact with workers. They are only permitted certain things, and often lack the funds to do much more than their mailings and home visits. One thing that they do have to their advantage is anonymity. Some unions are so bold as to send some of their paid union organizers into an employer to try to get hired as employees! They are referred to as â€Å"salts†, since the union thinks they â€Å"salt† or enrich the workplace by spreading news about union in non-work areas to attempt to organize the workers. I think this is actually a brilliant idea to get in under the radar and make some headway if you’re a union trying to organize. And actually, it is considered legal, after the Supreme Court ruled that they are employees protected against discrimination in hiring and firing. (McGraw-Hill, p. 247) Some states are considered at-will, or right to work states, and there are special rules for them regarding unions. â€Å"The Taft-Hartley Act outlawed the ‘closed-shop’ rule regarding unions. Closed shop referred to employees at unionized workplaces being required to join the union as a condition of employment. The Act did permit a new ‘union shop’, which required all new employees to join the union after a minimum period of time after their hire. Under ‘union shop’ rules, employers are obliged to fire any employees who have avoided paying membership dues necessary to maintain membership in the union; however the union cannot demand that the employer discharge an employee who has been expelled from membership for any other reason. † (Wikipedia) Some people think that there should be limits set forth to campaigning and union organizing. I agree that there should be some limits set to both sides of this debate. I think that unions should not be allowed to make home visits and invade their privacy. I also think that there should be more strict rules enforcing policies for the employers. I think that it is unfair for employers to discipline their workers simply for getting information on other options for their benefits and happiness. I don’t know how they can enforce these things in the future, but it simply is not fair for employees to be discriminated against, or put in fear of their jobs or benefits. That could be considered bullying. I think that maybe when it comes to union elections, the NLRB should send in more representatives, and maybe they can have a debate with employer management, and a union organizer, to allow both sides of an argument to be heard in a fair and dignified way, as opposed to simply campaigning, and talking bad about the other side. References: Wikipedia: http://en. wikipedia. org/wiki/Taft-Hartley_Act Textbook: Budd, Labor Relations: Striking a Balance, Second Edition. McGraw-Hill 2008.

Monday, September 16, 2019

American Revolution (DBQ) Essay

In the time period of 1860 and 1877, constitutional and social developments occurred in America that amounted to a revolution. Some constitutional developments were the Secession of 1860, the Emancipation Proclamation, and Amendments 14 and 15. Some social developments were the Freedmen’s Bureau, the Civil Rights Act of 1875, and Congressional Reconstruction. Put together, all these developments led to a revolution. Prior to 1860 the United States was already split into opposing sides fighting for power. Although these conflicts never reached the battlefield, the slave’s states and Free states were always competing for representation in congress. South Carolina felt that certain powers were restrained from them and it imperiled their continued existence as sovereign states (DOC A). So, as the leader, they declared secession with several states following shortly after. They were then called the Confederate states of America. This was so revolutionary because the Union destroyed everything in the South and it led to the strengthening of Federal Power over the states. The Emancipation Proclamation was intended to be the cure of slavery once and for all. In the early years of the Proclamation it could only be extended to Union controlled areas. It allowed blacks freedom of movement and religion. Shortly after, Amendments 14 and 15 were created that gave the freed men more rights. Amendment 14 gave freedmen citizenship and equal protection under the law. Amendment 15 gave them the right to vote and resulted in black legislators in the state and federal government.

Sunday, September 15, 2019

Advantage of Semester System Essay

1. The greatest advantage of this system is that it reduces the load on the studentsand Inculcates regular study habits. 2. Since academic year is divided into 2 semesters it provides upward mobility – the Student can clear the backlog in one or many subjects even after moving to the next semester. 3. Best part is that it enables the students to learn at their own pace. 4. Well if you compare it to an annual system, it keeps students busy all year round with the same level of burden instead of the piling up of work at the end of the year. 5. In semester system, Student all time attach with study. Studies which is good for the Students. 6. The main advantage of semester system. Student busy all the year. He know, If he Does not study, he will fail. >> Easy learning >> Attach with studies. >> Remain in class>> No absence. >> Grip on knowledge. >> Respect of teachers increases. >> Scheduled work plan. Disadvantage of Semester SystemAs a disadvantage of the Semester system, I would point out the lack of recovery that students can make due to limited time, in comparison to Annual systems. Time is too short in Semester system. Students don’t understand many chapters. Today the topic under discussion is the topic which is being frequently discussed by us since the Karnataka University introduced the semester scheme for the degree courses. I strongly believe that semester scheme is extremely beneficial for the students. It is a sign that we are marching towards the development because almost all the developed countries have adopted the semester scheme which means this system must be having some unique qualities which are favorable for the students. First of all, the semester based method makes teaching and learning more scientific. It is good for the students as the syllabus is broken up into units that are to be learnt in a specific time frame. Moreover, as testing and evaluation are done in a continuous manner student can be sure of a more realistic assessment of their academic capabilities than what is done in the annual scheme. The actual process of learning is also more methodical in this scheme. Each topic to be covered in the syllabus is allotted a learning time. The student learns not just by taking down notes during a lecture, but he has to do self study; visiting the library, browsing the net and preparing for seminars and presentations. This results in comprehensive learning of the topic at hand. Many British universities tried changing from the three terms per year system to the American semester system of two sessions per year, in the 1990’s. Some changed but found the system unworkable and returned to the original British system from 2002 onwards. It seems that there are difficulties with semesters, for British universities, and disadvantages for both universities and students. In Britain, changing over to the semester arrangement of the academic year was coupled with changing to modular degrees. Huddersfield University was the first university in Britain to change to the semester system, but returned to the three-term year in 2003. Glamorgan University also returned from two fifteen-week semesters to the traditional three-term year in 2003. Some British universities, including Kingston University (Surrey), have a hybrid semester system and modular degrees. They have a three-term year but teaching is divided into two semesters running from September to July. . The semester system has certain disadvantages both for universities and for students. Most Universities introduced the semester system to accommodate the modular degree and this was difficult for both academics and students. The two systems were introduced together, as part of the scheme to expand higher education. Modular systems work on a credit system, each module counting for credit towards the student’s final degree. University teaching and learning is very different in Britain, to some other countries. In Britain, students have responsibility for their own learning, and tutors and lecturers do not control or lead students to knowledge but rather suggest where they might look to find that knowledge. British undergraduates do much more self-directed and independent study and reading, than in other countries. Students are they expected to think things through and come to their own conclusions and then to explain those conclusions, backing their conclusions with logical reasoning based on the facts. Simply regurgitating the facts that you tutor has taught on the course will not earn a British university degree. Lecturers and tutors do not tell students how to learn, or think and university learning in Britain is more than being force fed facts. Hence, in the United Kingdom, a student reads for a degree. The semester and modular system, therefore, caused academics some problems. Academics felt that the modular/semester system meant that students were sitting too many examinations,simply to complete a module rather than as a necessary part of the learning process. For some subject areas, they also felt that modular learning encouraged compartmentalization of knowledge, rather than applying new knowledge to the subject as a whole, and that it discouraged lateral thinking. In other subject areas, they felt that the modular/semester system only allowed a surface knowledge of a particular topic area, whereas year-long study allowed both in-depth study and the necessary reflection and thinking that the subject requires.

Nick Names Formation in Lendang Nangka Sasak Menu-Mene Varity and Arabic Languages

NICK NAMES FORMATION IN LENDANG NANGKA SASAK MENU-MENE VARITY AND ARABIC LANGUAGES A Research Writting An NT Language and Culture Final Assignment Lecturer : Dr. Kamaludin Yusra By Samsul Bahri/12J012060/A ENGLISH EDUCATION GRADUATE PROGRAM MATARAM UNIVERSITY 2013 Acknowledgement I would like to express my gratefull and appreciation to my honourable lecturer Dr. Kamaludin Yusra, who would like to wait patiently for months for a word from me, then respond sympatically and constsructively within days. This assigment is written to accomplish a final task for Nusa Tenggara Languages Culture and Contact.I am interested to focus my study on Sasak varity nicknames formation as I found them important points to discuss to defining how nicknames in Sasak varity language are formed. So far I found it is hard to do this as the previous research for this merely. I tried hard to focus this research because lack of academic writting background knowledge and references. These are my become obstacles to do this research writting. But this first experience I hope will be my best teacher to do better in the future. I am afraid there are some mistakes in this simple research proposal, I do hope there will be some suggestions to make it better.Samsul Bahri CONTENTS Acknoledgementi Contentsii A. Introduction1 B. Research Questions3 C. Review of Literarture3 D. Research Methodology10 * Population10 * Sample11 * Data Collection11 * Data Analysis11 E. Discussion 11 F. Conclussion55 References Nick Names Formation in Lendang Nangka Sasak Menu-mene Varity and Arabic Languages Abstract This research paper discussed about nicknames formation in LendangNangka Sasak meno-mene dialect and Arabic nicnames. Most of sasak names are influenced by Arabic names as Islam is predominantly religion for Lendang Nangka village inhabitats.As names is identity of a person its has very strategic role for human being. Naming custom varies greatly from people to people. Terms relates personal names such as p ersonal name, family names, given names and Nick name. The nicknames formation in some cases similar to Arabic language. In Lendang Nangka Sasak meno-mene language. The meaning of Nicknames also has it own place in the dialect. A nickname is usually familiar or humorous but sometimes pointed or cruel name given to a person or place . Nicknames formations in the dialect through process of truncation (shortened), phonological process(replacing a stressed vowel and a onsonant), psychical characteristic and attributes. Nicknames also related to close friend and social solidarity. While in Arabic nicknames formation has its own way to form it. This research uses descriptive research methodology. The method used in this research is descriptive method. The goal of this research is to describe the formation, structure and meaning of the names in Lendang Nangka Sasak meno-mene varity language and Arabic. The population of this research the inhabitants of Lendang Nangka village. This reserac h studies about the personal names and nicknames. There are 6357 names.The data are gained from primary and secondary sources. Keywords: Sasak varity, Arabic, Personal Names, Nicknames, formation, truncation, phonological, Physical Characteristic, Lendang Nangka, menu-mene dialect. A. Introduction A name is inseparable circumstance to human being, place or thing. A name is a word or term used for identification. Names can identify a class or category of things, or a single thing, either uniquely, or within a given context. A personal name identifies a specific unique and identifiable individual person. Though Indonesia is home to many diverse ethnic groups and languages.Those exaggerated the varies greatly between these groups in names. The dominant ethnic group is the Malay people (whose languages include Indonesian, Javanese). Generally, all Indonesians have one or more given names. Some ethnic groups also use a family name or clan name, other groups use a patronym. Some Indonesia ns have neither a family name nor a patronym. (Salahudin Ahmad,1999). Personal names are considered as important part for personal identity. Sasak people consider names has special meaning, and there is a special practise to do in naming new born baby as one of the life cycle in Sasak people.As predominantly religion, islamic naming system influences most of Sasak names. Islam is closely relate to arabic naming system although it is not totally influenced the Sasak names. Islamic naming system are used commonly in Sasak muslim good followers. Lendang Nangka village inhabitants are muslim. The inhabitants of Lendang Nangka village are consider as moderate muslim. This makes sense that naming system is not totally following Islamic naming system although many of the people in the villages use Arabic names such as Muhammad, Ahmad, Abdurrahman, Abdullah, Wahid, Syafi’i, Siti Aisah, Siti Hadijah, Mariam, etc. nd some others Arabic root terms such as Nurul Hayati, Nurul Aini, Laitu l Fitri which they considered as Islamic naming systems. On the other hand many personal names are influenced by non Arabic names, western, Hindus and Javanese, or by their own creation naming systems. And the last naming system is naming by local Sasak names (although there is no written rules about this but this is just based on the local story and information). Relate to the topic of this research a name in short form is called Nickname.According to Free Online Dictionary(2009): nickname is a descriptive name added to or replacing the actual name of a person, place, or thing. Where as The Wordsworth Concise English Dictionary(1988) defines Nickname as a name given in contempt or sportive familiarity. A nickname is â€Å"a usually familiar or humorous but sometimes pointed or cruel name given to a person or place† (Oxford Dictionary Online, 2012), as a supposedly appropriate replacement for or addition to the proper name†.Nicknames may based on a person's name or vari ous attributes such as (in majority the example taken from American names) : Tittle (â€Å"Bones† for a forensic scientist,†Doc† for a doctor ,†Sparky† for an electrician, Geek for a computer technician, â€Å"Sarge† for a military Sergeant, Moneybags for a wealthy person, Sir or Ma'am for a person of a higher rank); Physical characteristics (Weight: â€Å"Fatso† or â€Å"Slim† for a person who is overweight or thin, respectively. Height: â€Å"Beanpole† for a person who is tall, â€Å"Shortie† or â€Å"small-fry† for a short person. Haircolour: â€Å"Red†, â€Å"Ginger†, â€Å"Ranga†, or â€Å"Bluey† for a person with red hair. Blondie† a girl with blonde hair. Baldness: â€Å"Chrome dome† for a person whose scalp reflects the light. Complexion: â€Å"Pinky† for a person with Rosacea, â€Å"Zit† or â€Å"pizza-face† for severe acne, various racial s lurs for skin color. ; Personality (Talkative: â€Å"Motormouth†, â€Å"Chatterbox†, â€Å"Ratchet-Jaw†, â€Å"ChattyKathy† Cautious: â€Å"Nervous Nellie† Pessimistic: â€Å"Sad Sack† Negative: â€Å"Debbie Downer†, Glamorous: â€Å"Stunning Signe†, Boring: â€Å"Plain Jane†, Typical: â€Å"Average Joe†. This Research paper focuses on the analysis of nick names formation in Lendang Nangka Sasak meno-mene varity and Arabic languages.This topic is based on the personal names of Sasak and their relationship to Arabic personal names. As we know naming system in Sasak names are moslty influnce by religious aspects. So far I found that it an interesting topic to disscuss about nick names formation as it is merely found the academic writting of how the Sasak nick name are formed. I prefer to specify the Sasak menu mene varity as it is my origin language and it is interesting to relate the naming system with Arabic as bo th of them uses mostly use Arabic personal names as the inhabitants considered Islam belivers.B. Research Question * What are the naming systems in Sasak meno-mene varity and Arabic language? * What are the meaning of Lendang Nangka Sasak Meno-mene varity and Arabic personal names? * How are Arabic and Lendang Nangka Sasak meno-mene varity nicknames formed? * Does Arabic nicknames formations contribute to Lendang Nangka Sasak nicknames formations? C. Review of Literature According to Merriam-Webster (2012) name is Word or phrase that constitutes the distinctive designation of a person or thing . By a name we can identify each other.In general term, a name is a label for a noun – a person, place or thing. Naming customs vary greatly from people to people. Some names carry information about our roots, such as family or clan names, which are generally inherited. Terms relates personal names such as personal name ,family names, given names and Nick name. In some cases they are ve ry simple, such as those of many Indonesians names who use just a single name. On the other hand, names could also be very complex such traditional Chinese (Wikipedia, 2007).A given name, in Western contexts often referred to as a first name, is a personal name that specifies and differentiates between members of a group of individuals, especially in a family, all of whose members usually share the same family name or surname. Arabic names were historically based on a long naming system; most Arabs did not simply have given/middle/family names, but a full chain of names. This system was in use throughout the Arab world. The given name is always followed by the father's first name, then the father's family surname. Example Name Muhammad ibn Saeed ibn Abd al-Aziz al-Filasteeni. Wikipedia, 2007). The study of personal names has attracted a number of scholars over the years. There are many views regarding the way in which personal names are bestowed. This section aims to provide a overv iew of what previous scholars have found as far as personal naming is concerned. Scholars such as Koopman (1986; 1989), Thipa (1983; 1987), Herbert (1990; 1995), Saarelma-Maunumaa (1996; 1999), Stayt (1931), Monnig (1967), Mbiti (1969), Moyo (1996), Kimeyi (1989), Dickens (1985) and Bosch and De Klerk (1995) have based their discussions on some of the personal naming patterns.As far as African traditional culture is concerned, the selection of personal names is influenced by many factors. Most of these factors are diverse among cultures; nevertheless, there are some areas where they overlap. Jayaraman (2005: 176) provides the following explanation of the Hindu tradition of personal naming practices: a name not only reveals a person’s self-identity, but also his or her cultural, sectarian, varna, and caste identities. Further, it is believed to signal one’s spiritual worth not only in this world, but also in the next.In everyday life, Hindus give great significance to a personal name. As this study on Tshiven? a names will reveal, the naming ceremony of a child is an important event. It is also traditionally one of the major life circle rituals for a Hindu. In Southern India, it is usually performed on the twelfth day of a child’s life. Customarily, some Hindus, who believe that even days are lucky for girls and uneven ones lucky for boys, hold that a boy should be named on the eleventh day and a girl on the twelfth.When the ceremony is to occur, and mainly in the case of the first child, both the father’s and the mother’s relatives visit the house where the mother gave birth (usually her natal home). Here, the guests are entertained with traditional sweets specially prepared for the occasion. There are various considerations in the choice of a name. However, one essential element in the selection of a name in all parts of India is the birth star of a person. Most Hindus consult an astrologer to decide the appropriate name.In the south, as in other parts of India, names may tell of the joy and expectations of parents of newborn children. For example, if a child is born to a couple many years after marriage, he may be endearingly named after some precious metal or gem, such as Ratnam (diamond), Sona (gold), Banghru (gold) or Muthu (pearl). Naming may also be related to other family experiences. For example, in Tamilnadu, if a family has experienced high child mortality, a surviving child may be named Pichi (gift of god) if male, or Pichiamma if female. Elements of idiosyncrasy and creativity are also apparent in Indian naming customs.For example, an eminent professor of Telugu in Andhra Pradesh gave his daughter one of the longest names encountered: Sri Arunachala Kadambavana Sundari Prasunnamba Kanyaka (the blessed virgin who is beautiful and carries with her the radiance of sunshine, the fragrance of garden flowers, and the presence of God). Bean (1980:309), in his research on the bestowal of childrenâ €™s names, found that it is often the duty of the parents, but may also be the duty of a senior kinsman or of a ritual specialist, and the participation of members of a larger community is also required ( e. . Ga names are bestowed by the senior patriarchal relatives). Bean’s (1980) view that the role of the ritual forms part of a child’s acceptance into his family group, is in a way similar to views given by other scholars such as Mbiti (1967), Monnig (1967), Koopman (1989) and Stayt (1931) on the role of the rituals that accompany name-giving ceremonies. Andrei A. Avram paper looks into the structural properties of Japanese and English truncated names. Name truncation is considered to be a word-formation process and is analyzed from the perspective of Prosodic Morphology.Japanese and English truncated names are shown to be subject to strict prosodic requirements. Also discussed is the relation between name truncation and prosodic minimality in the two languages. Abigail study the ways in which truncation in Indonesian enriches our understanding of possible patterns of prosodic morphology and the nature of prosodic word requirements. The structure of the paper is first describe the patterns of truncation in Indonesian. He consider the question of word minimality and evidence for word minimality based on the stress facts of Indonesian.He describe and consider the implications of two classes of subminimal words in Indonesian, including a class of words containing schwa and the short forms of terms of address and personal names. Both of these classes of words highlight the fact that word well-formedness and word minimality may be violable properties. He return to the question of truncation as prosodic morphology and briefly consider the Indonesian facts in light of recent theoretical claims about the nature of truncation. Langendonck (2008) made a nice survey to prove the universality of sources of surnames.Accordingly, they are derived roughly from the same sources across linguistically and culturally unrelated languages. For instance, in the English speaking countries, most surnames of British origin fall into several types: occupations (eg Smith, Baker), personal characteristics (eg Short, Brown), geographical features (eg Hill, Lee) place names (eg Flint, Hamilton) patronymicsii(eg Richardson, Johnson) matronymics (eg Marriott from Mary) and paternal, from patronage (eg Hickman meaning Hick's man). In French, people are named, following the same traditions: Legrand( the tall), le Carpentier (carpenter), le Parisien(from Paris).The same sources of surnames are true of the Spanish-speaking countries: Delgado (thin), Molinero(miller), Aleman from (Germany). In Russian, one finds the same: Tolstoy (fat or stout), Portnov (tailor),Moskova (from Moscow). Romanians follow the same procedures in deriving their surnames: Barbu(bushy bearded), Fieraru(Smith), Munteanu(from the mountains) Moldoveanu(from Moldova). In Netherlands , the Dutch adopt the same path in forming theirs : De Groot(the great), Van Weert( of the city Weert) (ibid). During the pre-Islamic period and onward, Arabs used to follow certain traditions in choosing their personal names.Roughly, the same traditions have been followed in modern Arabic dialects. In classical Arabiciv, some names were chosen by tribes for various reasons: (1) to threaten their enemies (eg Muqatil: fighter, Ghalib: winner, Asad: lion) (2) to express their optimism of their sons (eg Sa6yd: happy, Malik: owner, Najy: rescued) (3) to involve the sense of roughness of land or trees (eg :al a : thorny tree, hajar: stone) or (4) the newly born child is named depending on what his father comes across while the child's mother is being in labour.For instance, if the father meets a fox, the child will be named accordingly: Thalaba. The same holds true of dog: kalib, crow: Ghurab (Ibin Duraid, d. 321H ,nd:5f) (see also Altha’aliby, d. 430 H, 2007: 406f) Ibin Qutaybah( d. 276 H, 1999:67) adds that some people's names are taken from names of plants(eg alqamah: colocynth) others from people's characteristics or attributes(eg al-kareem: generous, al-shuja6: brave). In the Arabian Peninsula, females were named as males. This is attributed to the fact that the tribal societies at that time need e seen greater in number by others so that they would think a lot before invading each other. After the rise of Islam, the tradition of naming persons by the use of plants' or animals' names went on; and other factors for naming had become involved. For instance, beautiful names were chosen (al-Rabii: Spring) and got widely spread due to the Prophet's position against the choice of ugly names. He (P. B. W. H) recommended that parents should select beautiful names that bring happiness and satisfaction to newly born children.In surveying the traditions that Arabs followed in naming persons during the pre- and post-Islamic period, one finds that the same traditions have been roughly adopted by modern Arabic native speakers (Murad, 1984:36, 46). Al-Samaray (1961:4) adheres to a rather distinct view in that classical Arabic is no longer the variety spoken all over the Arab homeland i. e. different Arabic colloquial dialects are in use. This has had its impact on the way the PNs are used or chosen in every Arabic speaking country (see 2. 2. 1 below). However, Al-Samaray (p. ) does not state that the traditional ways of naming became totally absent(see 2. 2. 2 below). Ulaiq (2001:12ff) further indicates that PNs in SA and modern Arabic dialects are attributed to: 1. Natural phenomena (eg Qamar; the moon, kawkab: planet, Hilal; Crescent) 2. The sequential order of the newborn child which has sometimes a part to play in naming him or her(eg Faryd; the unique, Walyd; the alone, Rabia; the fourth). 3. Well-known or outstanding figures such as poets, heroes, wise men, presidents, artists or leaders (e. g Siina; Avicenna; Saladdiin, AbdulNasir). . Gran dfathers' or grandmothers' names to glorify them specially the eldest son. 5. Harmony of the names so as to be of the same musical tone of the family members (eg Ranny, Rajjy, Wally, Haddy). 6. Particular occasions or events(eg Ramadhan: the fasting month, Najjah; success, Zilzal: earthquake) 7. The fear of envy in that ugly names are attributed to infants (as some people believe) to keep them away from being envied. Nevertheless, this tradition has become of a very minor role to play due to the spread of education and knowledge in the Arab homeland.Sasak is a Western Malayo-Polynesian language spoken on the island of Lombok, Nusa Tenggara Barat province in eastern Indonesia (Austin, 2000, 2001). It is closely related to Samawa (spoken on the western half of Sumbawa Island to the east of Lombok) and Balinese, and sub-groups with them as a member of the Western-Malayo-Polynesian branch of Austronesian . Relate to this research, the study of Sasak language has been done by many resear chers, but in the other hand the study about Sasak nicknames is very hard to find.Acoodring to Austin (2000, 2001) Sasak language shows a wide range of local dialect variation in lexicon and syntax, which is the topic of ongoing investigation. There is also sociolectal variation with high, middle and low speech styles (Nothofer, 2000). Data for this paper is drawn from the Central and Southern varieties identified by their speakers as Meno-Mene, Meriaq-Meriku and Menu-Meni Sasak. As predominantly Islam believer Sasak and Arab people they mostly based their naming system on Islamic principles.The fact that this is the right of the father is shown by the principle that the child is ascribed and attributed to the father, as Allaah says, â€Å"Call them (adopted sons) by (the names of) their fathers, that is more just in the Sight of Allaah†. It is also allowed for the parents to allow others to name the child, since our Prophet (SAW) used to name some of the children of his Comp anions. The name should carry a good and praiseworthy meaning as the Messenger (SAW) said, â€Å"On the Day of Resurrection, you will be called by your names and your fathers names, so make your names good. (Abu Dawood) It is recommended to call oneself a servant of Allaah (Abdullaah) or the servant of any of the names of Allaah. Then it is recommended to name a child after a prophet, due to the hadeeth, â€Å"call yourselves by the names of the Prophets† (Abu Dawood) and the hadeeth, â€Å"a son was born to me this night and I called him after my forefather Ibraaheem† (Muslim) Then it is recommended to name the child after any pious person in the hope that it will become like him/her. Then it is recommended to name by any name which has good meaning.It is forbidden to name a child with a name that denote servitude to other than Allaah, for example Abd an-Nabi, Abd ar-Rasool etc, just as it is forbidden to name them with names that are particular to the Unbelievers li ke George, Michael, Susan etc. The names of tyrants and evil personalities should be avoided such as Fir'awn, Qaroon, Abu Lahab etc.. Likewise it is disliked to name with the names of the Surahs of the Qur'aan like ‘Taa Haa' or ‘Yaa Seen' as is reported from Imaam Maalik and others. There is no authentic hadeeth which ascribes the above two as being names of the Prophet (SAW).As the influencing of globalization era, naming sytem also influences Lendang Nangka Sasak naming system. It is very common to find personal naming influnced by western names such, Heri from Harry, Linda, Tina, Sandi etc. More examples of differents names are presented in appendixes and in next discussion. D. Research Methodology This research uses descriptive research methodology. The method used in this research is descriptive method. The goal of this research is to describe the formation, structure and meaning of the names in Lendang Nangka Sasak meno-mene varity language and Arabic.A similar vi ew is expressed by Djaya Sudarma (2006:16). He said that this method is a descriptive overview of the characteristics of the data accurately in accordance with the nature of the data itself. The statement was supported by Sudaryanto Djayasudarma (1993:62) who argued that the descriptive method focused on giving a full overview on the actual state of the object under investigation. This study also used qualitative approach. this study is also related to research data that is not in the form of numbers, but in the form of words or phrases (Sudaryanto, 1993:62).Sudaryanto opinion is supported by Arikunto (1998:193) who states that qualitative research is a desecriptive research because this study attempted to describe the data with the words or phrases that are separated by categories to obtain conclusions. Based on the explanation above, the writer can say that the research is descriptive qualitative research means is intended to provide a clear picture of the process of the formation , structure and phrase user names Lendang Nangka Sasak menu- mene varity * Population The population of this research is the inhabitants of Lendang Nangka village.Relates to the topic of this research the total names of the subject are 6357 names of Lendang Nangka inhabitants personal names. * Sample From total 6357 names there one hundreds personal names are taken as sample. Those samples are catagorized as first 100 hundred the most popular names in Lendang Nangka village * Data Collection There are two sources of data collection : Primary and secondary data. The primary data are obtained directly from local people of Lendang Nangka village by questioning to the paticipants and observation. Secondary Data source are taken from monography of local village office.Data source are in the form list of names local inhabitants. The number of the is 6357 personal names in the village (appendix†¦ ). Those total names will be group into the group of similarities of each names(appendix †¦ ). * Data Analisys. After all data are obtained the next step is to analize the data. Analysis is an effort to study and process the data to find out the conclussion. Each group will be analized based on their formation and the form of the names, and their originals. All data are put into some cataogries: 1. Their similarities pharase and sylabble 2. Base 3.Ending word or prosodic 4. Meaning After all data are determined to their group. The next step is to analyse the process of each names become nicknames based on phenomena and observation. After all data collected , the next process is sorting names into their catagory using spread sheet Ms-Office Excell 2007 sorting system. For further analysis will be discussed in disscussion part . E. Disscussion The topic of this discussion will focus on the study of Lendang Nangka Sasak menu-mene varity names while on the other hand Arabic names disscus in not too deep discussion and analyis.The discussion will also be based on some t heories and names. 1. Names Generally a name is a label for a noun – a person, place or thing. More specifically a name is a label for a specific person, place or thing. These are sometimes called proper names. A name is a word or term used for identification. Names can identify a class or category of things, or a single thing, either uniquely, or within a given context. According to Merriam-Webster(2012) name is Word or phrase that constitutes the distinctive designation of a person or thing . By a name we can identify each other.In general term, a name is a label for a noun – a person, place or thing. : look at the following examples: | Person| * Heri * Megawati Sukarno Putri * Harun Al-Rasyid * Lalu Serinata * TGH. Muhammad Zainul Majdi| Name —– Noun| Thing| * Meja (Table) * Harimau (Tiger) * Lendang Nangka | | Place| * Hotel * Lombok Sumbawa * Lendang Nangka * Bima| 2. Personal names Relate to personal names, naming customs vary greatly from people to people. Some names carry information about our roots, such as family or clan names, which are generally inherited.Terms relates personal names such as personal name , family names, given names and Nick name. In some cases they are very simple, such as those of many Indonesians names who use just a single name. On the other hand, names could also be very complex such traditional Chinese(Wikipedia, 2007). A given name, in Western contexts often referred to as a first name, is a personal name that specifies and differentiates between members of a group of individuals, especially in a family, all of whose members usually share the same family name or surname.Arabic names were historically based on a long naming system; most Arabs did not simply have given/middle/family names, but a full chain of names. This system was in use throughout the Arab world. The given name is always followed by the father's first name, then the father's family surname. Example Name Muhammad ibn Saeed ibn Abd al-Aziz al-Filasteeni. Sasak people naming system is considered as simple naming system such Muhammmad Amin, Aminah, Hadijah, Amir Mas’ud, Samsul Bahri. The names mostly influences by Arabic names or words as most Sasak people are moslem.While in Greek using more complete name as follows: personal name(s) + patronymic + family name e. g. a son whose father’s name was Georgios might be called Spyros Georgiou Kyprianos same as in Bulgarian names: personal name(s) + patronymic + family. e. g. Emil Petrov Christov (Wikipedia, 2007). A modern Chinese usually has (1) a surname (â€Å"family name†) or xing and (2) a given name (â€Å"first name† or â€Å"Christian name†), or ming (or mingzi ), always in that order. Thus Deng Xiaoping is Mr. Deng with the personal name Xiaoping the same way John Jones is Mr.Jones with the personal name John. (Lelia, 1961). 3. Sasak language, personal names and origins a. Sasak language. The Sasak language is spoken on the island of Lombok (immediately east of Bali) by around 2. 5 million speakers (roughly 85% of the population of Lombok, which was recorded as 2,950,105 in 2005. It shows great internal variation, both geographical and social, with a complex linguistic ecology (Austin 2003) Sasak has traditionally been classified into five dialects: meno mene, ngeno-ngene, meriyaq-meriku, kuto-kute, and nggeto-nggete.However, this classification does not seem to accommodate the reality of the actual variation existing in Sasak, because there are also other dialects such as menu-meni and menung-mening. For instance, menu-meni speakers do not always agree to be in the category of meno-mene speakers, although the reason for this is hard to tell (Mahyuni, 2007). As Mahyuni stated that menu-meni speakers do not always agree to be in the category of ngeno-ngene speakers. I preassumed, The sasak language which the people in Lendang Nangka (Where I live) east Lombok may categorized as meno-meni speakers even t hough located in the region of ngeno-ngene dialect.Despite of category by A. Teeuw. In circumstance of geographic location, Lendang Nangka is surrounded by ngeno-ngene dialect speakers such, Jurit village in the east, Danger village in the south, Sangiang in the west and Borok Lelet in the north. Based on historical information, the inhabitants’ anchestor of Lendang Nangka were from the area of district Kopang Central Lombok (where as it is considered as menu-mene dialect speakers). b. Sasak personal Names In fact, Sasak do not generally use the Western naming practice of a given first name and a family last name nor arabic system which is consist of full chain of names.In general, the form Sasak personal names fall into the following categories: * A single name: Sahnep, Mahrap, Mahyan, Marep, Serinata, Sahnun, Sapnah, Riadah, Muhammad, Ahmad, Abdullah, Lasmi, Sintiawati, Kartika, Indra, Subawae, etc. * Two (or more) names without a family name: Muhammad Safi’i, Siti A minah, Safaril Ahyak, Yusran Ahmadi, Samsul Hadi, Laelatul Fitri. * Names for documentary system (marital certificate, passport, birth certificate): This category is based on Indonesian formal rule. A name following by father’s name: Sahudin bin Muhammad (M), Fitriah binti Sahidun (F). Names based on the first child ( After a spouse has their first child bornt). Amaq/mamiq Sahudin (First child name is Sahudin, while Amaq means father so meaning The father of Sahudin). While the wife could be Inaq/Meme Sahudin (Inaq means mother so meaning the mother of Sahudin. In fact the of the father has his own personal name Abdurrahman or the mother’s personal name Aminah. * Noble personal name Lalu is added before a male personal name, such as: Lalu Suparlan, Lalu Serinate. Baiq is added before female personal name, such as: Baiq Hikmah, Baiq Mustiare. c. Origin of Sasak names.There is not specific informations about the original Sasak Names in spite of the fact that some of Sasa k names are not found in other language names (Sahnep, Mahrep, Segep, Sinarep, Senep, Sahne, Amsiah, Rumlah, Sene, Selihan, Mahnan, Serinate (? ). The following description of the origin of Sasak names which are based on the language, culture and religious influences: * Arabic word derived names Since Islam is the main religion for Sasak people , it is veryobviously to find Arabic first names as personal names in Sasak names such as Abdullah, Abdurrahman, Siti Aminah, Siti Hadijah. * Sanskrit derived namesAs the influenced of former ruler of Balinese in Lombok we will find some similarities in Sasak and Balinese such as in language and culture. Sanskrit derived names-names that may sound Hindu-influenced such as Indra, Bayu, Surya, Wisnu, Rama, , Bima, Dewi, Sri, Laksmi, Saraswati, Sintawati, etc. * Popular and Honored person Names Sasak people also use personal names following popular names taken honored person such as names of former presidents (Sukarno, Suharto, Megawati, Habibi) , celebrity names (Desi Ratnasari, Rano Karno, Herman Felani, Anjasmara), sport champions names (Alan Budi kusuma, Verawaty, Rudi Hartono). Etc. * Western namesDue to the influence of Western popular culture and celebrities, many non- Sasaksalso have shortened Western names like Sandy, Ricky, Alan, Meri (Marry), Linda, Amanda, Cindy,Heri (Harry), Meri (Marry), Sintia (Chintia) etc. The names can be found through Sasak family in suburb even in rural community. * Parents own Creation names. Some parents created their child names with their own idea and meaning. Such as persons who were born in certain times . Juliawati for a person who was born in July, Agustina in August, Oktaviana in October, Ramadani in Ramadhan month, Laelatul Fitri in the night before Iedl Fitri day, Purnawati in full moon night. . Lendang Nangka Sasak Meno-mene varity 100 Top names. So far there is no specific rules in Sasak naming sytem. Since most of Sasak people are muslim naming system is much closely relate d to Arabic names, although it is not totally follow the personal naming system for Arab people. Sasak personal names are similar to most Indonesian moslem names although some names appear as they are influences by western and Hindus names. Some other names are created by parents own creation which they based on other peoples names, time, place, nature, plants or thing they considered good names.The top 100 hundred names of 6357 names mostly used in Lendang Nangka Sasak village as shown in the following table: Table. 1. Top 100 names in Lendang Nangka Sasak Meno-mene varity No. | NAMES| Total names| %| No. | NAMES| Total names| %| 1| SAMSUL (+ †¦. )| 37| 0. 58| 51| anti| 11| 0. 17| 2| Abdullah (+†¦ )| 34| 0. 53| 52| DIAN| 11| 0. 17| 3| SUMIATI| 29| 0. 46| 53| HAERIAH| 11| 0. 17| 4| JUMAKYAH| 27| 0. 42| 54| HARNI| 11| 0. 17| 5| JUNAIDI| 25| 0. 39| 55| LINA| 11| 0. 17| 6| MULIANI| 23| 0. 36| 56| MARIANI| 11| 0. 17| 7| SAPRI| 22| 0. 35| 57| NURUL AENI| 11| 0. 17| 8| Agus+| 20 | 0. 31| 58| RIPAAH| 11| 0. 7| 9| ahmad+| 20| 0. 31| 59| SAMSUDIN| 11| 0. 17| 10| ERNA( +)| 20| 0. 31| 60| SENIWATI| 11| 0. 17| 11| LIA| 20| 0. 31| 61| SUPRIADI| 11| 0. 17| 12| Aisah| 19| 0. 30| 62| ZAKIAH| 11| 0. 17| 13| RIZAL| 19| 0. 30| 63| Adi| 10| 0. 16| 14| SRI ASMAWATI+| 19| 0. 30| 64| ana| 10| 0. 16| 15| MULIADI| 18| 0. 28| 65| HAERUNI| 10| 0. 16| 16| NURHASANAH| 18| 0. 28| 66| HENDRI| 10| 0. 16| 17| HAMDIAH| 17| 0. 27| 67| HERI| 10| 0. 16| 18| IRWAN| 17| 0. 27| 68| HERIANTO| 10| 0. 16| 19| ROHANI| 17| 0. 27| 69| HERMAN| 10| 0. 16| 20| EKA| 16| 0. 25| 70| JULIANA| 10| 0. 16| 21| HAERANI| 16| 0. 25| 71| LIANA| 10| 0. 16| 2| NURHAYATI| 16| 0. 25| 72| MAHYUNI| 10| 0. 16| 23| ROZI| 16| 0. 25| 73| MAWARDI| 10| 0. 16| 24| Aminah| 15| 0. 24| 74| PAJRI| 10| 0. 16| 25| At| 15| 0. 24| 75| PATIMAH| 10| 0. 16| 326| IDA| 15| 0. 24| 76| RONI| 10| 0. 16| 27| MAHNUN| 15| 0. 24| 77| ROSIDI| 10| 0. 16| 28| NURUL +| 15| 0. 24| 78| SALMIAH| 10| 0. 16| 29| SAPIAH| 15| 0. 24| 79| SUHAILI| 10| 0. 16| 30| SURIANI| 15| 0. 24| 80| YANTI| 10| 0. 16| 31| Ani| 14| 0. 22| 81| YULIANI| 10| 0. 16| 32| NUR| 14| 0. 22| 82| ZAKRAH| 10| 0. 16| 33| NURAENI| 14| 0. 22| 83| Ahyar | 9| 0. 14| 34| YULIANA| 14| 0. 22| 84| andri+| 9| 0. 14| 35| Andi| 13| 0. 0| 85| ari| 9| 0. 14| 36| JUMARTI| 13| 0. 20| 86| DEDI| 9| 0. 14| 37| RINA| 13| 0. 20| 87| IWAN| 9| 0. 14| 38| Anah| 12| 0. 19| 88| MAHINUN| 9| 0. 14| 39| DEWI| 12| 0. 19| 89| NURUL| 9| 0. 14| 40| DIANA| 12| 0. 19| 90| PENDI| 9| 0. 14| 41| EDI| 12| 0. 19| 91| RIANAH| 9| 0. 14| 42| ELI| 12| 0. 19| 92| RIKA| 9| 0. 14| 43| HAMDI| 12| 0. 19| 93| SAHNUN| 9| 0. 14| 44| JOHAERIAH| 12| 0. 19| 94| SITI+| 9| 0. 14| 45| LINDA| 12| 0. 19| 95| SUMARNI| 9| 0. 14| 46| MARNI| 12| 0. 19| 96| SUPARDI| 9| 0. 14| 47| MULIANA| 12| 0. 19| 97| US| 9| 0. 14| 48| PADLI| 12| 0. 19| 98| anto| 8| 0. 13| 49| RENI| 12| 0. 19| 99| AYU| 8| 0. 3| 50| SAPRUDIN| 12| 0. 19| 100| HALIMAH| 8| 0. 13| |   |   |   |   | OTHERS|   | 79. 05| The following table data is to d escribe the use of Arabic names Abdullah which is popular as Arabic name, the total number of inhabitants using Abdullah first names is 36 people: e. Other popular form of Lendang Nangka Sasak Meno-mene varity. From the analysis of the data it is found that many of Sasak personal names characteristic has similar final sylables such as ,-udin, -ni, -di, -man, -ti, -ah, -na, -wan. The following are data show names with the characteristic above: * Names with final sylable u–din Names with final sylable di * Names with final sylable –man * Names with end sylable –na * Names with end sylable –run * Names with end sylable – wan * Names with end sylable -un * Names with end sylable –to and – no * Names with end sylable –ah By observing the data above mostly naming system in Sasak meno-mene are very simple and it is tend to have similar names by using similar final sylables. 4. Arabic names, meaning and origins Arabic names were histor ically based on a long naming system; most Arabs did not simply have given/middle/family names, but a full chain of names.This system was in use throughout the Arab world. The given name is always followed by the father's first name, then the father's family surname. Some surnames have a pre-fix of ibn- meaning son of (ould- in Mauritania) The surnames follow similar rules defining a relation to a clan, family, place etc. Some Arab countries have differences due to historic rule by the Ottoman Empire or due to being a different minority. For example : * Muhammad ibn Saeed ibn Abd al-Aziz al-Filasteeni Ism – Muhammad (Proper name). Muhammad: praised. Nasab – Saeed (Father's name). Saeed: happy Nasab – Abd al-Aziz (Grandfather's name).Abd al-Aziz: Servant of the Magnificient. Nisbah – al-Filasteenee (The Palestinian). Filasteen: Palestine. Muhammad Saeed, son of Abdul-Aziz, the Palestinian This person would simply be referred to as â€Å"Muhammad† or by relating him to his first-born son, e. g. :†Abu Kareem† (father of Kareem). To signify respect or to specify which Muhammad one is speaking about, the name could be lengthened to the extent necessary or desired. During the pre-Islamic period and onward, Arabs used to follow certain traditions in choosing their personal names. Roughly, the same traditions have been followed in modern Arabic dialects.In classical Arabiciv, some names were chosen by tribes for various reasons: (1) to threaten their enemies (eg Muqatil: fighter, Ghalib: winner, Asad: lion) (2) to express their optimism of their sons (eg Sa6yd: happy, Malik: owner, Najy: rescued) (3) to involve the sense of roughness of land or trees (eg ala : thorny tree,hajar: stone) or (4) the newly born child is named depending on what his father comes across while the child's mother is being in labour. For instance, if the father meets a fox, the child will be named accordingly: Thalaba. The same holds true of dog: k alib, crow: Ghurab (Ibin Duraid, d. 21H ,nd:5f) Ibin Qutaybah(d. 276 H,1999:67) adds that some people's names are taken from names of plants(eg alqamah: colocynth) others from people's characteristics or attributes(eg al-kareem: generous, al-shuja: brave). In the Arabian Peninsula, females were named as males. This is attributed to the fact that the tribal societies at that time need be seen greater in number by others so that they would think a lot before invading each other. After the rise of Islam, the tradition of naming persons by the use of plants' or animals' names went on; and other factors for naming had become involved.For instance, beautiful names were chosen (al-Rabii: Spring) and got widely spread due to the Prophet's position against the choice of ugly names. He (P. B. W. H) recommended that parents should select beautiful names that bring happiness and satisfaction to newly born children. In surveying the traditions that Arabs followed in naming persons during the pre - and post-Islamic period, one finds that the same traditions have been roughly adopted by modern Arabic native speakers (Murad, 1984:36, 46). Al-Samaray (1961:4) adheres to a rather distinct view in that classical Arabic is no longer the variety spoken all over the Arab homeland i. . different Arabic colloquial dialects are in use. This has had its impact on the way the PNs are used or chosen in every Arabic speaking country (see 2. 2. 1 below). However, Al-Samaray (p. 5) does not state that the traditional ways of naming became totally absent(see 2. 2. 2 10 below). Ulaiq (2001:12ff) further indicates that personal names in SA and modern Arabic dialects are attributed to: 1. Natural phenomena (eg Qamar; the moon, kawkab: planet, Hilal; crescent) 2. The sequential order of the newborn child which has sometimes a part to play in naming him or her(eg Faryd; the unique, Wayd; the alone, Rabia; the fourth). . Well-known or outstanding figures such as poets, heroes, wise men, presidents, artists or leaders (eg Siina; Avicenna; Saladdiin, AbdulNasir). 4. Grandfathers' or grandmothers' names to glorify them specially the eldest son. 5. Harmony of the names so as to be of the same musical tone of the family members (eg Ranny, Rajjy, Wally, Haddy). 6. Particular occasions or events(eg Ramadhan: the fasting month, Najjah; success, Zilzal: earthquake) 7. The fear of envy in that ugly names are attributed to infants (as some people believe) to keep them away from being envied.Nevertheless, this tradition has become of a very minor role to play due to the spread of education and knowledge in the Arab homeland. 5. Nicknames According to Oxford Dictionary A nickname is â€Å"a usually familiar or humorous but sometimes pointed or cruel name given to a person or place, as a supposedly appropriate replacement for or addition to the proper name, or a name similar in origin and pronunciation from the original name. A nickname is sometimes considered desirable, symbolising a for m of acceptance, but can often be a form of ridicule. Nicknames in Sasak language relates to definition above is quiet similar in function and meaning.The topic disscussion in this research relates to Nicknames formation in Lendang Nangka Sasak meno mene varity comparing to nick names formation in Arabic. This topic become the main discussion because most of Lendang Nangka inhabitants personal names are influenced by Arabic naming system. 5. 1. Nicknames formation. As the main focus on this response paper, nicknames formation is based on Lendang Nangka Sasak meno-mene varity. Nicknames formation in Sasak meno-mene varity in LendangNangka has some characteristics: 5. 2. Truncation the given names Truncation means to shorten by or as if by cutting off. The free dictionary online) 5. 2. 1. Truncate the base name by separate back part of base name as illustrated below: Base namenickname (truncated) – Gunilahilok – Haeriahiok – Sinarepayep – Sadahadok Nickname s (Truncated names) shows tendency to begin with a consonant and end with consonant, even their base starts with a consonant and end with a consonant. While the others following nicknames(truncated) names tend to begin with a consonant and ends with a consonant even the base names starts with a vowel and ends with a consonant: Base namenickname – Aminahminok – Andipendot – Aguscegos – Akramkeram – Amircemor – Amingemong Abdillahdilok – Ahmad gamek 5. 2. 2. Truncate the primary stressed syllable of the names as follows: Base namesNicknames (truncated names) – At’harhar – Rukiahkiah/kiok – Sakdahdah/dok – Samsulsul -SamsudinSam 5. 2. 3. Truncate the secondary stressed syllable of the names as in the following example: Base namesNicknames (truncated names) – Samsudinudin – Tarminimini – Hamdandan – Jumlahlah/lok 5. 2. 4. Truncate names on the segmental of onset consonants rep lace randomly: Base namesNicknames (truncated names) – SakdahCedok – MuhamadGamek – SirCing – HasimTacim – MahrepGayep 5. 2. 5. Phonological Process. Stressed vowels occasionally change /a:/ into /o/ as follows : Base namenickname -Abdillahdilok -Samsiahsiok -Aminahinok -Rukiahkiok * Changing stressed vowel /a:/ into // ? Base name Nicknames -SatriawanAwen -SuparmanMamen -JarkasiKejer -SunardiSuner -AhmadAmek -JumakyahJume’ * Changing stressed vowel /i/ into /o/ as follows: Base name Nicknames -Mulyandiendot – Mulianieno’ – Muliaticetot – Santisentot – Samsul Hadiedot * Consonants may also be subject to change. /s/ is replaced by /c/ in middle position: Base name nick name -NasirAcing -HasanAcan Muhasimacim -Muhsankucan -MuhsinKucin -LusianiUci -HasanahCanok -MahsunAcun * /r/ is replaced by /? / at the close position Base name Nicknames -Munirning -Tahira’ing -Zakiraking -JaharAhang -MunawarAweng * / r/ is replaced by /y/ in the mid position Base name Nicknames -Idrusyus -Zakrahayah/ayok -Mustarahgayek -Mahrupayup -Mahrapayap -Mehrameyam -Sahrumayum -Sahuriuyi * /k/ is replaced by /h/ at the close position Base name Nicknames -ZakrahAyok – Hasanahcanok – Riadahadok – Sakdahcedok – Ramdahmendok – Sakdiahdiok – Abdillahdilok – Darmilahilok Sapirahirok – Jumlahjlok * /b/ is replaced by /p/ at the close position Base namenickname -Zaenabjenap – Assegabsegep – Mustajabajap – Rajabajap – Habibabip * /z/ is replaced by /j/ at the onset position Base namenickname – ZaenabJenap – Zulkarnainkejung – Zaenuddinjen – Zarkasikejer – Zulkiplijul * /l/ is replaced by /ng/ at the close position Base name nickname -Samsulancung – Sulhiahcung – Mulianahmung – Yulianiyung * /f/ is replaced by /p/ at the random position Base name nickname – Gafarapar â₠¬â€œ Irfanipan – Sarifayip – Mussannifsanip – Halifalip 5. 2. 6.Nicknames also formed by dropping a consonant in random position, as described below: Base name nickname -Ehsanesan -Irfanipan -Ilhamiham -Ahsipasip -Mahsanasan 5. 2. 7. Nicknames formation also made by giving attributes to specific person such as following: – Kaktuan is for a person who has done hajj for example: Base namenicknames -Hajjah Kurniawatikak tuan kur -Haji Abdillahkak tuan dilok -Hajjah Samsiahkak tuan iok * Tuaq(uncle) and inaqrari (aunt) is to address someone feel close related to the speaker even he is not a relative of the speaker, as following example: Base namenicknames Salehtuaq aleh -Zaenuddintuaq jen -Syamsiahinaq rari iok -Rumlahinaq rari melok * Semeton/meton/ton (brother/sister) usually refers to male is to address between friends at same age and to show friendliness, even though they are not relatives in between and usually meton or ton is stand alone without nicknam es. * Arik/adik (younger brother/sister)usually refers to male is to address to younger person and to show friendliness, even though they are not relatives in between and usually arik or adik is stand alone without nicknames. Kakak/akakArik/adik (older brother/sister) usually refers to male/female is to address to younger person and to show friendliness, even though they are not relatives in between and usually kakakor kak is stand alone without nicknames. * Amaq keke /bapak keke(father) usually refers to male is to address to elder married person and to show friendliness, even though they are not relatives in between and often amaq keke or bapak keke is stand alone without nicknames to show closer feeling. Inaq keke (mother) usually refers to address to elder married person and to show friendliness, even though they are not relatives in between and usually arik or adik is stand alone without nicknames. without to show closer feeling. 5. 2. 8. Nicknames also formed by physical chara cteristic and personality such as: -â€Å"Dakoh† for a person who is overweight -â€Å"keyek† for a person who is thin,. -â€Å"ranjo or belo† for a person who is tall, -â€Å"cendek or dendek/dandak† for short person. -â€Å"Bijang†, â€Å"ambok† for a person with blonde hair and grey hair respectively. â€Å"butak† for a person with bald head. -â€Å"melong† is for big eyes person. -â€Å"bireng† for a person with dark skin, -â€Å"bodak† for a person with white skin. ; Personality; -â€Å"nyerenceng† is for talkative person, -â€Å"beleke†, is for a person who laugh a lot -â€Å"kembo’†is for easy crying person – â€Å"bingis† for high tempered person. 6. Nick Names in Arabic. According to Zawaedah : Studying nicknames relates to Arab world is important for national security because they are used as aliases. Instead of using one’s real name, one may use a nicknam e to hide their identity.A term for such usage is â€Å"nom de guerre† (i. e. war name). Resistance fighters, terrorists, and guerilla fighters use pseudonyms to hide their identities and protect themselves and their families from harm. A nickname is a name that identifies a person, place, or event that is different from the formal given name of the referent. Nicknames are often not legally registered in one’s official documents. Examples: Muammar Qathafi: Al? Akh al? Aqid ‘Brother Colonel’ Amin al? qawmiyyah al? Arabiyyah: ‘Keeper of Arab Nationalism’ Sahib al? Kitab al? Akhdar : ‘Owner of the Green Book’Zuwaedah stated that Studying nicknames is important for national security because they are used as aliases. Instead of using one’s real name, one may use a nickname to hide their identity. A term for such usage is â€Å"nom de guerre† (i. e. war name). Resistance fighters, terrorists, and guerilla fighters use pseu donyms to hide their identities and protect themselves and their families from harm. Understanding the pseudonyms used by radical groups sheds light on their future intentions, perceptions, motivations, and connection to the cause. (Guidere, 2006).Abu Hamza al-Muhajir (Abu Ayyub Al-Misri) : chief of Al-Qaeda in Iraq. Hamza Ibn Abd Al? Muttalib: Prophet Mohammad’s uncle. One of the bravest protectors of Islam. Muhajir: he immigrated to Iraq to fight. Or it could refer to â€Å"hijra†of companions of Mohammad from Mecca to Medina. In Arab world nicknames are used for : * Friendly daily conversations (face to face, on the phone, letters, e- mails, etc). Used for endearment or respect. * Monarchs may be known by other nicknames. * ‘Nabaz’ nicknames used to insult others (ex. Enemies), or used in the formation of swear words. Concealing identity: * Computer users: Chartrooms, e? mails, blogs, used asâ€Å"usernames†. * Literary pen names –publishi ng authors. * Stage names (ism shuhra)? actors, singers, dancers, etc. * Criminals, terrorists, etc (takhallus) –especially the leaders have pseudonyms. 7. Types of Arabic nicknames 1. Asma’ Dal’ Hypocoristics 2. Kunya Abu X 3. Nasab Ibn X patronymics 4. Laqab description 5. Nisba origin of person 6. Nabaz insulting names 1. Asma’ Dal Hypocoristics Arabic hypocoristic formation is very generative. Generation is largely based on the root of the name (Zawaydeh and Davis, 1999). Khalid† has the following Jordanian and Egyptian nicknames: * Khalluuude * Khalkuleeh * Khaluudi * Khalluuude * Khukhu * Khalkhul * Dido * Khokha When a full name has an affixal consonant, be it a prefix, suffix, or infix, the affixal consonant does not appear in the hypocoristic. Hypocoristic contains only root consonants, regardless of what other consonants may be in the name. * MuhammadHammud * AhmadHammud * HamidHammud 2. Kunya In the Arab tradition, after a person gets mar ried and has a child, s/he is called by the name of his eldest son (or daughter). Abu Muhammad ‘father of Muhammad’ * Um Muhammad ‘mother of Muhammad’ Highly used in the Arab World, and Muslims in general (ex: Afghanistan, Pakistan). Some Kunyas are metaphorical. The second word uses a positive or negative attribute. * Abu Al? Khayr‘father of goodness’ * Abu Dhubab‘father of flies’ Not every Abu X is just a nickname. It could be also a surname. Ex. Palestinian surnames: * Abu Hadeeda‘father of iron’ * Abu Minshaar‘father of a saw’ * Abu Sham’a‘father of a candle’ Used daily as an honorific to show respect to elders. Used by young men to address each other, for fun.Even one who is not married, or doesn’t have a son may be called Abu X. As a â€Å"nom de guerre†. For example, â€Å"Abu† nicknames were popular among PLO leaders. * YasirArafat Abu Ammar * MahmoudAbbasAb u Mazen A terrorist may be known by a Kunya name. in India, the nickname â€Å"Abu Al? Qama†was used by a member of the terrorist group Lashkar? e? Taiba in the Mumbai terror attacks 3. Nasab Nasab is a patronymic or a metronymic name. The word â€Å"Ibn† or â€Å"bint† (i. e. son/ daughter of) followed by the father’s name. Was used more frequently as an alias in historic times.The person was known as â€Å"son of X† instead of his first name. A chain of names reflects one’s genealogical ancestors. Example: * Ibn Khaldoun —- : Abd ar? Rahmanibn Muhammad ibn Muhammad ibn Muhammad ibnal? Hasan ibn Muhammad ibn Jabir ibn Muhammad ibn Ibrahim ibn Abd ar? Rahman ibn Khaldun. Nasab .. current usage It is a standard way of reporting names in Saudi Arabia, and the Arabian Gulf. The head of the House of Saud:Muhammad bin Saud bin Muhammad bin Muqrinbin Murkhanbin Ibrahim bin Musa bin Rabi’abin Mani’bin Rabi’aal? MuraydiAl ? Dur’aal? banafiAl?Adnani Used online as alias names. Next word could be a colloquial or MSA adjective, a noun, a person’s name, or a place name. * Ibn Falastine‘son of Palestine’ * Ibn Hajar‘son of a stone’ 4. Laqab This is a description of the person, that could be considered a title of nobility. It is often a two-word phrase, which often indicates the person’s occupation, importance, or appearance. Originally, it was used as a nickname, and later adopted to be a title given to important people. * Sayfal? Din ‘The sword of the religion’ * Nasiral? Dawla‘the helper of the dynasty’ * Al? Jahiz‘the goggle? eyed’A physical or personal quality. The phrase could be metaphorical. These could also be used as surnames. Al? Tawil‘the tall one’(could be a surname) Al? Andalibal? Asmar‘the dark nightingale’(Singer Abd Al? HalimHafiz) * Expressing adoration or reliance on God, or li neage to the Prophet. Some use compound structures with words such as â€Å"Allah†, â€Å"Abd†, â€Å"al-Din†, â€Å"al-Islam†, â€Å"al-Dawlah†, or words used in titles: * Al? Ra’is Al? Mu’min‘the faithful president’Anwar Al? Sadat * Amir Al? Mu’minin‘prince of the believers’HusniMubarak * Sayfal? Islam‘sword of Islam’Osama Bin Laden 5. NisbaAn adjective derived from the place of origin, birth, residence, or occupation. It could be also a clan, tribe, or family. Formed by adding –iyy/-iy at the end of the word. Usually preceded by al- definite article. This form is also used for surnames. * Abu Ayyubal? Misri (from Egypt) * Salahal? Din Al? Ayyoubi (founder of Ayyoubi dynasty – conquered crusaders) * Al? Ansari: fighters born in Iraq (Ansaral? Sunna group) * This type of structure is used frequently to coin new surname aliases. 6. Nabaz Nabaz could be metaphors that are used to describe somebody that is disliked or considered to be an enemy. Jihadi style writings use such metaphors abundantly. Comparing the process of nicknames formation in Sasak meno-mene varity and Arabic, both process in nicknames formation in general it is quite different. The process of formation nicknames basis in Arabic is basis those six basis. This basis is not common in Sasak meno-mene varity. F. Conclussion From the discussion we can conclude as follows: * Personal names in Lendang Sasak meno-mene varity mostly influenced by Arabic word and names. * Arabic names and Sasak names has similarities relates to Islamic way system of naming based on the hadist. There is no special rules in Sasak meno-mene varity in forming nick names compare to Arabic nicknames which on those 6 basis. * Most of Sasak nicknames formation are not influenced by Arabic nicknames formation. Sasak Personal names * Muhammad (personal names) become Amek (Nickname) While in Arabic names: * Muhammad (persona l names) becaome Hammuud (Nickname). * The similarity in nicknames formation is in the Arab tradition, after a person gets married and has a child, s/he is called by the name of his eldest son (or daughter). * Abu Muhammad ‘father of Muhammad’ Um Muhammad ‘mother of Muhammad’ While in Sasak tradition after a person get married he / she is called by his ledest son (or daughter) * Amaq Udin â€Å"father of Udin† * Inaq Udin â€Å" mother of Udin† * Mamiq Bambang â€Å" father of Bambang† * Meme Santi â€Å" mother of Santi† * Based on my onservation and analysis I found that the nicknames formation in Lendang Nangka nicknames varity are based on Truncation of personal names, phonological changing process, physical characteristic, attributions in term of social solidarity, friendliness and intimate. BiblographyIbin Duraid(d. 321H,n. d)Al-Ishtiqaq(Derivation). Revised by AbdulSalam Harron. Cairo: Al-Khanachy Publishing House. Ibin Qu taybah (d. 267H. 1999) Adeb Al-Katib( The Writer's Literature). Beirut: Al-Resalah Publishers. Jaszezolt, K. M. (2002) Semantics and Pragmatics: Meaning in Language and Discourse. London: Longman. John and Levitt, J. (1975) â€Å"People Have Names† in Wallace, A. & Stageberg, N. (eds. ) Introductory Readings on Language. New York: Rinehart and Winston. pp146-154. Dictionary of Islamic Terms. Damascus: Dar Al-Yamamah. Langendock,V. 2008) Theory and Typology of Proper Names. http //www. degruyter. de/cont/. Retrived on 17th of January 2008. Murad, A. K. ( 1984) Asma? Al-Nass: Ma anyha wa ASbab Al-Tasmiah Biha( People's Names: Their Meanings and Reasons of Naming by them). Vol. I. Baghdad: Dar Al-Huriah for Printing. Nina(2008) A Survey of the History of English Place Names. http //www. sca. org. Retrieved on 19th of February 2008. Pollock,J. L. (1982) Language and Thought. New Jersey: Princeton University Press. Al-Samaray, I. (1961)†Al-alam†(Proper Names) in Journa l of Faculty of Arts Vol. III.Baghdad University. pp3 -18. AlTha aliby,A. A. (d. 430H. 2007)Fiqih Al-lUghah wa Sirru Al-rabiah(Language Philology and the Secret of Arabic). Beirut: DarAl-Ma’rifah. Ulaiq,B. M. (2001)Al-Wafy fi Al-asma? Al-arabiah wa Ma6anyha( The Complete Text in Arabic Personal Names and their Meanings). Beirut: Dar Al-amra?. Ullmann,S. (1962)Semantics: An Introduction to the Science of Meaning. Oxford. Basil Blackwell. http://en. wikipedia. org/wiki/Nickname. Accesed on :11/1/2012 7:25:30 PM http://oxforddictionaries. com/definition/english/nickname. 2012 Oxford University Press.