Thursday, October 31, 2019

Audit Assignment Example | Topics and Well Written Essays - 1500 words

Audit - Assignment Example In the course of the financial statements audit, an auditor is subject to the audit risk and he/she commits it if his/her audit opinion is inappropriate. This arises where the financial statements are materially misstated, making them be presented unfairly and fail to conform with the applicable financial reporting framework. To this extent, this paper aims at identifying the possible audit risks as presented in the case of Cupcake Co and the possible actions that the auditor is likely to take in each case. It will also discuss the benefits that accrue from conducting a risk assessment at the planning stage of the audit. According to this paper’s analysis, Cupcake Co is likely to suffer the loss of cash through theft. As presented in the case, the company keeps a sufficiently large amount of cash for the purposes of giving back change. The internal control of Cupcake Co has failed in its control over the cash, making it susceptible to improper diversions, as well as being misused. From the case, there was no separation of duties in cash handling. When such a case subsists such that a single department or individual is entrusted with both asset custody and their record keeping, there is a potential risk of frauds, in that, such assets can be stolen. In addition, accounting records falsifications to hide events can be done. In such a scenario, the management would have difficulties in holding a specific employee accountable in case errors or fraud is detected. To respond to this audit risk, the auditor can ask the management of Cupcake Co to state the internal controls they use to control their cash. The auditor will seek clarification on whether duties are segregated in the handling of cash. The auditor can also perform some analytical procedures such as the prevailing trend in the cash balance relative to the previous year’s balances. There could be an audit risk arising from the

Tuesday, October 29, 2019

Developing in the relationships Essay Example for Free

Developing in the relationships Essay Once Marco and Rodolpho are in the house and settled down they start to introduce themselves a bit more fully to the family. Marco acts as a father figure to Rodolpho, comes across as down to earth which contrasts with Rodolpho who just Dreams, and has no sense of proportion. Rodolpho is very loud and forward, I have a nice face, but no money.  The first sign of trouble arises not long into the cousins arrival when Rodolpho starts to sing Paper Doll. Eddie does not give positive reactions from this. Miller uses visual tension with Eddie rolling up a newspaper and showing an explicit look to show the friction in the house  Once the cousins have been there for a while Eddie tells Beatrice that he aint been feelin good. This shows tension between the couple. Eddie admits to Beatrice They bother me since they came. this increases the dramatic tension; is Eddie anticipating that something bad is going to happen? Friction is suggested when Eddie says he Cant talk about it Eddie is not giving Beatrice enough attention and their relationship is on a rocky stage, which is affecting their emotional and sexual relationship. Beatrice is becoming worried about this problem and asks Eddie When am I gonna be a wife again? This is a euphemism and shows the break down in verbal communication between the married couple. Beatrice wants Eddie to confront his problem because of the trouble he is having with expressing his emotions. The failure of communication within the marriage is affecting the physical relationship. Beatrice is feeling ignored and craves the attention of her husband even though he is neglecting her and putting her in the background of his life. On the video the tension between Eddie and Beatrice is very clear as when Eddie is talking about sex he cannot look his wife in the eye and share his feelings. The relationship between the family is showing Beatrice to have developed some jealousy towards Catherine as Catherine is getting more attention from Eddie than she is. The relationships have become implicit and have now more reason to question the developing relationship between Eddie and Catherine to be more than just a father daughter relationship. This developing relationship becomes more apparent near the end of act one when Eddie is on his way home from work and he bumps into Catherine and Rodolpho who seem to be getting on well. Eddie becomes upset at the fact that maybe Rodolpho has won over the affection of Catherine and Eddie has been unsuccessful. Once Eddie and Catherine are alone, Eddie tries to tell Catherine that Rodolpho is using her for an American passport. The audience now question the reality of what Eddie has told Catherine but at the same time we are asking if Eddie is only saying this in hope that Catherine will believe this and dump Rodolpho. The stage directions add to the dramatic tension, as Catherine is smiling but tense. It is as if you can feel the friction in the air. We sympathise with Catherine as she only wants to grow up and Eddie is holding her back and still treating her like a child. Eddie is doing this because he is scared at the fact that Rodolpho is taking his Baby away. But is this fair to Catherine and also to Beatrice?  There is a lot of jealousy developing in the relationships; Eddie is jealous of Rodolpho because of the feelings Catherine has for him and Beatrice is jealous of Catherine because she gets more attention paid to her than Beatrice but she will not admit it, Beatrice asks Catherine, You think Im jealous of you honey? I think when reading the script you can see Beatrices plan of getting Catherine out the house. If Catherine marries Rodolpho, the two of them will be out the house and she will be able to have her husband back. Beatrice asks Catherine,  You wanna get married, or dont you wanna get married! she tries to make out to her that Eddie will not like Rodolpho but she should have realised by now that If it was a prince came here for you it would be no different implying that no man will ever be right for her in his eyes. Beatrice tells Catherine that she should become more independent and if you act like a baby and he be treatin you like a baby. These are Beatrices hints to make her realise the fact that she is not a child and should not be constantly relying on Eddie. Eddie goes to see Alfieri and from the meeting they have Miller presents Eddie to be irrational and confused. We pity Eddie and feel sympathetic as we can foresee tragedy, as it is inevitable. While Eddie is speaking to Alfieri, Eddie makes Rodolpho out to be effeminate as he can sing and sew.  Later that evening when Eddie arrives home there is still friction between Eddie and Rodolpho. Catherine resumes annoyed with Eddie so she torments Eddie by playing paper doll on the phonograph and then asks Rodolpho to dance, knowing that this will torment Eddie by seeing the pair together. Rodolpho recognises the tension and tells Catherine that he is too tired to dance, of trying to calm the situation. Beatrice makes Rodolpho get up and dance but Rodolpho can feel Eddies eyes on his back. While dancing with Rodolpho, Catherine is flaunting her independence and both Catherine and Beatrice are revolting Eddie. Marco and Rodolpho are deferential and recognise the tension and friction that is in the house. Eddie is still trying to show Rodolpho up and prove to Catherine that Rodolpho is effeminate by having a Masculinity contest of boxing. In the Sicilian community the men are always seen to be big, strong, and able to look after and protect the women. By Eddie hitting Rodolpho he tries to show Rodolpho up and make him look weak. Rodolpho gets his own back by asking Catherine to dance. He becomes provocative once he realises Eddies plan. Eddie humiliated Rodolpho by showing to Catherine hes more masculine and then Rodolpho shows Eddie that he can hit him in the stomach but he is the winner overall because he can still get Catherine. The ending of Act one is poignant and creates more visual and dramatic tension than verbal tension, which has been more common so far in the book. Marco shows Eddie that he will stand up for Rodolpho and uses a chair like a weapon and as a silent threat that has more meaning than words. The visual tension lets the audience see and feel the tension. Before now Eddie has felt in charge but Marco has turned things around after the chair-lifting test, Eddies grin vanishes as he absorbs his look. This is dramatically effective in both the script and in the video as the audience can almost feel the tension in the living room. Act one finishes and act two starts. Act two brings about development in the characters relationships. The development is mainly the disintegration of the relationships, but also new relationships are developing.  When Catherine and Rodolpho are alone in the house for the first time we see Catherine actually share her emotions and express what she has been feeling. Now we see the closeness of their relationship as Rodolpho now calls Catherine my little girl. This indicates that Rodolpho has taken Eddies Baby and so when he comes home after a heavy drinking session and realises the pair are together, he orders Rodolpho to Pack it up and move out. Catherine wants to move out with him but Eddie will not let her go. Eddie kisses Catherine when she announces she is leaving, As she strives to free herself he kisses her on the mouth. This is wrong and immoral; Eddie is shaming her. But then we see Rodolpho stand up for Catherine. Suddenly Eddie kisses Rodolpho. This is a dramatic change in relationship. At the start of this scene Catherine loves Eddie in a father daughter way, then, by the end of the scene she is staring at him in horror and says, Ill kill you. This is a very emotional scene whereby we see two relationships dramatically change; Catherine and Rodolpho want to get married and have stood up to Eddie, and Catherine has change her feelings towards Eddie and is now frightened by him. This scene makes us question the characters, as we are shocked and embarrassed. With this scene the books drama is more effective as we are able to read what is going on in the house with Rodolpho and Catherine, yet at the same time we can read the stage directions and see that Eddie is staggering along the side walk outside the house after a heavy drinking session. With the play we only see one picture at a time and it doesnt feel very realistic as you dont see the two scenes going on a t the same time.

Saturday, October 26, 2019

Wireless Vulnerabilities Threats And Countermeasures Information Technology Essay

Wireless Vulnerabilities Threats And Countermeasures Information Technology Essay Introduction to Network Security maintains its focus on the network and its vulnerabilities, protocols, and security solutions. It includes network architecture, the functions of layers in a typical network, and network based attacks including header, protocol, and authentication attacks. Bottom-up approach, it provides understanding of the vulnerabilities and mechanisms of each layer of network security. In any stadium there is network security plan in order to control all the events occurred in the stadium like ticketing selling, consumable purchases, seating arrangement and others. By using the wireless technology and mobiles we can plan the top level network security in the plan, the steps taken in this are all the members in the wireless channel have one wireless mobile. From the mobiles all the members can give the information to channel that means it is a server. All the decisions taken by the empires are by the wireless only, the video channel also very much useful in controlling the stadium. Consider the cricket stadium Chinnaswamy, Cricket Stadium in Bangalore, INDIA. The boundary line of the stadium is marked by the rope and here the boundary line is called as the perimeter of the stadium having field diameter of 140 to 160 yards. Score board has to display scores and sometimes should work as a third empire for keen observation and all this setup should work with wireless technology because wired transmission cannot be implemented over there. This stadium with a seating capacity of 55,000. Features of the stadium: The entire stadium is equipped with the very sensitive digital cameras, short and long distance explosive detectors. Totally it have 29 closed circuit television cameras, in this 29 cameras five of them are very highly sophisticated which are having the 360 degree of vision and all these will covers all the corners of the stadium. Trained marshals will operate the 29 closed circuit television cameras (CCTV), nearly 20 trained marshals are there in the stadium. These marshals having the helmets which are with sensitive cameras and sensitive detectors which are capable for covering the explosives which are happened around of 300 meter, this is called as OSD(on-screen display) camera which in the helmet and it is directly connected to the CMS(central monitoring system) vehicle. This CMS vehicle is standing outside the stadium, so whatever the marshal see and do, each and every point of the stadium and things happening in the stadium are very clearly seen in the CMS (central monitoring s ystem) vehicle. The entire system works on SNMP(simple network management protocol). Total stadium can be seen in the CMS vehicle, and another important thing is that empires decisions for example take the out and not out decisions it can be displayed on the big digital screen. The runs taken by the both the teams will be displayed on the digital screen in stadium. At the heart of the modern stadium is a communications system capable of supporting the innovative new services and applications customers are looking for. Organizing and hosting events requires a complete communications foundation essential to satisfying the communication needs of fans, guests, corporate employees, service and security staff, event organizers, press and media. It is that to provide all the components needed to build a complete, converged, secure and reliable communications system. Security, communication and services are the main aspects at the stadiums now-a- days. The organizers and event managers should be able to satisfy the complete communications foundation essential to satisfying the communication needs of fans, guests, corporate employees, service and security staff, event organizers, press and media. And also the communication system which provides all the components needed to build a complete, secure and consistent communications system. Converged IP/Ethernet Core: Stadiums support the communications needs of events with much number of users. Moreover, the supporting infrastructure is shared by different groups with different needs including stadium corporate users, media and press and event promoters. It is important to the make the event successful with High-speed, consistent and secure communication which doesnt fails. With reliable, secure, high-performance, intelligent Ethernet connectivity the enterprise LANs can intelligently prioritize real-time business communications like voice, video and multimedia services. Voice communications: Voice communications are important in any environment and mainly in the stadiums. IP networks provide the strength and quality of service that voice service requires. Converging voice and data over IP maximizes network efficiency, streamlines the architecture, reduces capital and operating costs, and opens up new service opportunities. It would be secure for organizations of all sizes to use voice over IP (VoIP), with IP PBXs (Private Branch Exchange). Today the global markets have a complete variety of IP phones, including desktop phones with displays, rugged wireless handsets, and PC-based softphones. All of these access devices operate seamlessly across the range of IP-enabled platforms and applications. Mobility: The nature of the stadium environment is mobile. Staff move constantly on making the event successful and provide the security at the top level. For the users, it is essential to have the access to key information and communication tools and allows them to roam and remain in touch no matter where they are. In WLAN IP Telephony services, we have a large choice of mobile desktops and handsets. Voice calls can be placed from laptops or PDAs(Personal Digital Assistant) using soft phones and employees can be equipped with voice over WLAN handsets that support multiple functions extremely useful for stadium staff, such as text messaging, conferencing and a push-to-talk feature that allows groups of handsets to behave as walkie-talkies. With this, the good coverage can be assured in areas which are difficult to reach with public areas. Wireless Mesh Network extends the reach of Wireless LANs securely and cost-effectively for situations where cabling for the LAN network is not in place or too costly to deploy. Implementing new Technologies With a comprehensive communications infrastructure as the base, stadiums have the foundation on which to build an intelligent environment filled with new, media-rich applications and services capable of creating new revenue opportunities and improving the overall fan experience. Wireless ticketing kiosks: Premium seats for sporting events and concerts can be expensive. Stadiums can leverage wireless technology to implement standalone, mobile kiosks that attract fans to upgrade their existing tickets for an event onsite. Digital signage directs patrons to the kiosk during the event. The fan simply inserts his ticket, checks a map of available seats, uses a touch-screen to select the new seat and inserts his credit card to pay. The machine keeps the old ticket and provides the upgrade. The stadium fills the seats closer to the action and generates revenue that would have been lost. It creates a win-win for the guest, the team and the stadium. Stadium owners can use the same kiosk to encourage customers to buy tickets for future events while guests are onsite and in the mood to buy. The kiosk can advertise upcoming events and attract fans waiting to exit after watching a game or seeing a concert. The terminal shows a list of available events and allows users to follow the same simple steps to purchase a ticket. Additionally, stadium owners can use the kiosk to capture and collect valuable information about its customer base. The kiosk can advertise loyalty programs and contests that offer incentives for fans to provide personal data that helps the stadium better understand and communicate with its audience base. Public safety and security: With thousands of people attending major events at one time, public safety and security is critical. Stadiums can leverage the communications system to offer digital security options including digital video surveillance and RFID (Radio-Frequency Identification) tagging and tracking. For example, stadiums can improve security threat detection with high-resolution IP cameras that provide full surveillance of the crowd using pre-sets by section: operators can select a stadium section and automatically receive all video from that section in multiple views. Operations staff can set rules to govern detection of left bags, perimeter entry, threshold crossing and loitering receiving alarms if any of the rules are breached Stadiums can improve event response through video feeds and text alerts that are transmitted manually or automatically to remote PDAs, laptops or offsite responders. All responders can be linked together automatically via dedicated audio conferencing channel. RFID tags can be used to locate and dispatch the closest security personnel to an emergency situation, ensuring a timely response. ABOUT NETWORK SECURITY AND TO FIND THREATS Vulnerabilities, Threats and Countermeasures Wireless networking has many advantages. Network configuration and reconfiguration is easier, faster, and less expensive. But, wireless technology creates new threats and alters the existing information security risk profile. Wireless networking alters the risks associated with various threats to security, the security objectives remain the same as with wired networks, preserving confidentiality, ensuring integrity, and maintaining availability of the information and information systems. Wireless Networks present a host of issues for network managers. Unauthorized access points, broadcasted SSIDs, unknown stations, and spoofed MAC addresses are just a few of the problems addressed in WLAN troubleshooting. Wireless Vulnerabilities, Threats and Countermeasures The wireless networks consist of four basic components: The transmission of data using radio frequencies; Access points that provide a connection to the organizational network and/or the Client devices (laptops, PDAs) and Users. Each of these components provides an avenue for attack that can result in the compromise of one or more of the three fundamental security objectives of confidentiality, integrity, and availability. Wireless Network Attacks Malicious association Malicious associations are when wireless devices can be actively made by crackers to connect to a network through their cracking laptop instead of a access point (AP). These types of laptops are known as soft APs and are created when a cracker runs some software that makes his/her wireless network card look like a legitimate access point. Once the cracker has gained access, he/she can steal passwords, launch attacks on the wired network, or plant trojans. Since wireless networks operate at the Layer 2 level, Layer 3 protections such as network authentication and virtual private networks (VPNs) offer no barrier. Wireless 802.1x authentications do help with protection but are still vulnerable to cracking. The idea behind this type of attack may not be to break into a VPN or other security measures. Most likely the cracker is just trying to take over the client at the Layer 2 level. Ad-hoc networks Ad-hoc networks can pose a security threat. Ad-hoc networks are defined as peer-topeer networks between wireless computers that do not have an access point in between them. While these types of networks usually have little protection, encryption methods can be used to provide security. Identity theft (MAC spoofing) Identity theft (or MAC spoofing) occurs when a cracker is able to listen in on network traffic and identify the MAC address of a computer with network privileges. Most wireless systems allow some kind of MAC filtering to only allow authorized computers with specific MAC IDs to gain access and utilize the network. However, a number of programs exist that have network sniffing capabilities. Combine these programs with other software that allow a computer to pretend it has any MAC address that the cracker desires, and the cracker can easily get around that hurdle. Man-in-the-middle attacks A man-in-the-middle attacker entices computers to log into a computer which is set up as a soft AP (Access Point). Once this is done, the hacker connects to a real access point through another wireless card offering a steady flow of traffic through the transparent hacking computer to the real network. The hacker can then sniff the traffic. One type of man-in-the-middle attack relies on security faults in challenge and handshake protocols to execute a de-authentication attack. This attack forces AP connected computers to drop their connections and reconnect with the crackers soft AP. Man-in-the-middle attacks are enhanced by software such as LANjack and AirJack, which automate multiple steps of the process. What once required some skill can now be done by script kiddies. Hotspots are particularly vulnerable to any attack since there is little to no security on these networks. Denial of service A Denial-of-Service attack (DoS) occurs when an attacker continually bombards a targeted AP (Access Point) or network with bogus requests, premature successful connection messages, failure messages, and/or other commands. These cause legitimate users to not be able to get on the network and may even cause the network to crash. These attacks rely on the abuse of protocols such as the Extensible Authentication Protocol (EAP). Network injection In a network injection attack, a cracker can make use of access points that are exposed to non-filtered network traffic, specifically broadcasting network traffic such as Spanning Tree (802.1D), OSPF, RIP, and HSRP. The cracker injects bogus networking re-configuration commands that affect routers, switches, and intelligent hubs. A whole network can be brought down in this manner and require rebooting or even reprogramming of all intelligent networking devices. Signal-Hiding Techniques In order to intercept wireless transmissions, attackers first need to identify and locate wireless networks. There are, however, a number of steps that organizations can take to make it more difficult to locate their wireless access points. The easiest and least costly include the following: Turning offthe service set identifier (SSID) broadcasting by wireless access points, Assign cryptic names to SSIDs, Reducing signal strength to the lowest level that still provides requisite coverage or Locating wireless access points in the interior of the building, away from windows and exterior walls. More effective, but also more costly methods for reducing or hiding signals include: Using directional antennas to constrain signal emanations within desired areas of coverage or Using of signal emanation-shielding techniques, sometimes referred to as TEMPEST, 1 to block emanation of wireless signals. Encryption The best method for protecting the confidentiality of information transmitted over wireless networks is to encrypt all wireless traffic. This is especially important for organizations subject to regulations. Securing Wireless Access Points Insecure, poorly configured wireless access points can compromise confidentiality by allowing unauthorized access to the network. Use anti-virus and anti-spyware software, and a firewall Computers on a wireless network need the same protections as any computer connected to the Internet. Install anti-virus and anti-spyware software, and keep them up-to-date. If your firewall was shipped in the off mode, turn it on. Change your routers pre-set password for administration The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router. Hackers know these default passwords, so change it to something only you know. The longer the password, the tougher it is to crack. Allow only specific computers to access your wireless network Every computer that is able to communicate with a network is assigned its own unique Media Access Control (MAC) address. Wireless routers usually have a mechanism to allow only devices with particular MAC addresses access to the network. Some hackers have mimicked MAC addresses, so dont rely on this step alone. Training and Educating Users Notice that Figure 1 also includes users as the fourth basic component of wireless networking. As is the case with wired security, users are the key component to wireless networking security. Indeed, the importance of training and educating users about secure wireless behavior cannot be overstated. To be effective, user training and education needs to be repeated periodically. The Security Policy To maintain a secured wireless network security, we need to apply these policies, so that the wireless network can be protected by the major threats and vulnerabilities. Computer Acceptable Use. A general document covering all computer use by eventstaff, including desktop, mobile, home PCs, and servers. Password. A description of the requirements for password protecting computer systems, the rules for choosing passwords, and how the password policy is enforced. Email. This policy covers the use of email sent from any email address and received at any computer system. Web. A specification of what browsers may be used, how they should be configured, and any restrictions on which sites event staff can visit. Mobile Computing and Portable Storage. A description of who owns the mobile computing and portable storage on the network, how they are supported, and what specific devices (if any) are authorized for use on the network. Remote Access. A policy stating who can access what information from which locations under what circumstances. Internet. A description of your Internet-facing gateway configuration, stating what is allowed in and out, and why. Wireless. A specification stating how wireless access will be managed on the network and how access points will be plugged in, secured, and maintained; who is allowed to use them; and under what circumstances. Servers. A statement of the standards for servers, what services are enabled or disabled by default, and important distinctions between production, test, and development environments. Incident Response Plan. No policy is complete until it also specifies what to do when defenses fail: what is considered a security incident; who gets called; who is authorized to shut things down if needed; who is responsible for enforcing applicable local laws; who speaks for the company. Standards: Workstations: Approval for workstation connection must be obtained as part of the standard workstation installation process handled by Information Technology Services, or authorized departmental technical personnel. Other devices (including, but not limited to, network components such as hubs, routers, switches, wireless access points, printers and other communication devices): Approval to connect devices other than workstations must be expressly obtained from Information Technology Services/Network Services. Vendors/visitors can obtain a physical connection access to the University network through Information Technology Services on a per visit basis. This access will be granted for a specific period of time Mail servers may not be run outside of Information Technology Services. Guidelines: Accounts Definition and use of departmental accounts and shared accounts should be restricted as much as possible. Only those functions needed by the user should be made available through such accounts. Servers 1. SSL should be implemented on Web servers if account log-in is required. 2. Run intrusion detection system where appropriate 3. Store backups offsite on a monthly basis. 4. Install firewall system where appropriate 5. Application updates must be performed every 30 days. 6. Run file integrity checker such as Tripwire daily. 7. Periodically test backups for integrity. Passwords 1. should not use any words found in dictionary of any language 2. should not use any combination of letters of a users real name, username, initials or nickname 3. should not use any combination of a famous persons name 4. should not use any combination of a spouses, girlfriends, boyfriends, or childs name 5. should not use any personalized numbers Workstations 1. Turn off workstations overnight. 2. Work-related files should be stored on the Novell cluster in the staff members home directory or the departments work directory 3. Implement periodic backups 4. Logging: a. should be enabled to record: i. successful and unsuccessful login attempts. ii. system and application errors. CONCLUSION: We introduce the top level network security plan in the stadium to control the things happening. So by this we can create the safe atmosphere to the audience in the stadium. We can prevent the things inside the stadium only but out side the stadium we cant, so the government have to come forward and give the external security to the stadium. Because of the terrorism attacks the government has to be very careful in giving the security to the stadium. For this each and every person who entering into the stadium is first checked with bomb squad and also by the wireless detector. By this we can provide the safety to people and the players in the match.

Friday, October 25, 2019

The Minister’s Black Veil Essays -- Minister?s Black Veil Essays Paper

The Minister’s Black Veil The story â€Å"The Minister’s Black Veil† is symbolic of the hidden sins that we hide and separate ourselves from the ones we love most. In wearing the veil Hooper presents the isolation that everybody experiences when they are chained down by their own sins. He has realized that everybody symbolically can be found in the shadow of their own veil. By Hooper wearing this shroud across his face is only showing the dark side of people and the truth of human existence and nature. Hooper left the dark shroud on because he has realized that secret sin is a veil that can never be lifted from anybody until the day of their death. In a quote from the story Mr. Hooper says, â€Å"There is an hour to come, when all of us shall cast aside our veils. Take it not amiss, beloved friend, if I wear this piece of crepe till then.† By saying this Mr. Hooper expresses the feeling that while human beings are alive on the earth a veil shows their face. Hooper promised himself and made a life task of playing a mirror to the people around him. The veil cannot be lifted until the freedom of truth can be observed. The minister’s friends and neighbors are so upset by the veil because the veil becomes a wall between himself and his congregation. The first response is one of curiosity which then turns in suspicion. They cannot understand the meaning for the wearing of the black veil and in turn the people become very uncomfortable around him. The veil and it color ...

Wednesday, October 23, 2019

Classical music Essay

It is Saturday March 1 2008 and I have woken with an excited feeling in my stomach. Today, I am being treated to something I have never experienced before and I am looking forward to what is in store. My father, is taking me to a classical concert. I am 18 years old and big band music is not really my style, I appreciate music but of the modern variety rather than the old school kind. My father loves classical music and plays it constantly in his study. His favourite composer is Leonard Bernstein so it is today, with great animation, he is taking me to encounter his love of this music. We are attending the Waukegan Concert Chorus which is at 624 Douglas Ave, Illinois, the concert is a tribute to Bernstein & Williams; namely, In Remembrance of Bernstein & Williams. My father assures me that although my liking of music may not be to his taste, I will go away from the concert feeling uplifted and appreciative of what I have heard. Our journey takes us to Waukegan during the early evening and as we approach the venue I can feel a buzz in the air. Other attendees are heading towards the seating area and as my father and I locate where we are sitting, I am somewhat satisfied that we have seats near to the front. My father explained in the car, on the way, even though it is the music you are listening to, it is also just as important to watch the performance. Before me is a huge orchestra; perhaps the biggest I have ever seen, not that I have seen many. There is a plethora of various noises coming from the ensemble and as each musician tunes in their instrument and plays small excerpts from their music stand, it is perhaps unbelievable that any kind of harmony will occur at all. However, the moment the conductor enters the room, there is an eerie silence, almost as if someone had turned the musicians off by a control button. The conductor is a gentleman who turns to his audience and bows his head, turning and repeating this gesture to his orchestra. As the first piece of music is played I feel myself vibrating with the enormity of the noise. For many years I have heard my father’s classical records being played from behind the study door but to be present at a live performance was truly exhilarating. One of my favourites in terms of familiarity was West Side Story. The introduction sounded amazing; upbeat and vibrant, the instruments seemed almost alive. Even closing my eyes, which I actually did, I could hear each piece of equipment as it was used. The brass and woodwind instrumentalists brought intrigue and manoeuvre to the story of the piece being played whilst the drums added the extra element of spirit in the arrangement. Despite the variety of instruments played and the different roles they played within the piece, the unity came together with such an intensity, I was taken aback by its impact. The formation and structure of the concert allowed me to lose myself within the music, it was almost as if I were watching the musical itself. This perhaps was the purpose of the concert itself, it worked with an effortless outcome. As the flutes and violins played ‘I Feel Pretty’, I felt almost compelled to stand up and sing as the notes poured through the air. The tempo was light in places and amplified in others; the exaggeration of drama was as apparent as the subtlety of tenderness applied to the nature of the story. Its volume was deafening yet tolerable as each instrument alerted itself naturally within the composition. On occasion I did look around at other spectators, like moths to a flame, transfixed faces and total satisfaction and appreciation of what was before and around them. I did relate to this. As the concert came to an end, I did feel somewhat saddened that it was all over. The climax of the music was a crescendo of brilliance and I am pleased to say, my father’s original prediction of how I would feel, was absolutely correct. I felt euphoric and inspired by such a performance. I had attended the concert with an open mind and allowed myself to absorb the instruments intentions; I felt all the raw emotions of West Side Story and even the pieces of music played I had heard for the first time, still brought me a sense of appreciation.

Tuesday, October 22, 2019

Free Essays on Sililoquy

I went to work as any other day, walking around the mall with my best friend, staring, gazing into every transparent glass containing items for my wish list, leaving me with â€Å"wants†, yet will never become possessions. My phone rang, as my mother, carefully, yet failing to hide her tears, told me my cousin (Joshua), two years of age, had drowned. I felt your struggle I thought you had encountered. The splash of water, as it skillfully entered your windpipes, devouring your lungs until your eyes became bloodshot red, as you gasped for that last breath of air, only to swallow more water. And then, slowly your heart stops beating as your body swam along, allowing the current to be your guide. Your body drifted down the canal, but your soul drifted towards heaven. I held my uncle close, my shoulder accepting his tears and cries unheard for his beloved son. Nothing, no pain can ever compare to the injection of a lost loved one I was given when I hugged him, as I felt every breath of sorrow moisten my chest. His firm grip on my shirt held me without a thought of letting go, as he shed his tears on me, seeping through me shirt, my pores, through my soul and directly to my heart. The sharp pain causing your breaths to shorten and uncontrollable tears to fall with no bottom to reach. I heard his unheard cries for his son. That was a want that could never be fulfilled. That was a missing piece that could never be found. A child, every child, is certainly a gift from God. The creation of every human being, the growth, the heart, the mind; never knowing the capabilities it will endow. Never knowing the fullest extent of it’s imagination, enabling them to do anything, and everything it desires; and to take effect into my life is truly one of the many mysterious ways God has worked, in my life, and everyone’s life. Joshua, two years into this earth and yet I feel he has accomplished more than a man, yet no less than an ange... Free Essays on Sililoquy Free Essays on Sililoquy I went to work as any other day, walking around the mall with my best friend, staring, gazing into every transparent glass containing items for my wish list, leaving me with â€Å"wants†, yet will never become possessions. My phone rang, as my mother, carefully, yet failing to hide her tears, told me my cousin (Joshua), two years of age, had drowned. I felt your struggle I thought you had encountered. The splash of water, as it skillfully entered your windpipes, devouring your lungs until your eyes became bloodshot red, as you gasped for that last breath of air, only to swallow more water. And then, slowly your heart stops beating as your body swam along, allowing the current to be your guide. Your body drifted down the canal, but your soul drifted towards heaven. I held my uncle close, my shoulder accepting his tears and cries unheard for his beloved son. Nothing, no pain can ever compare to the injection of a lost loved one I was given when I hugged him, as I felt every breath of sorrow moisten my chest. His firm grip on my shirt held me without a thought of letting go, as he shed his tears on me, seeping through me shirt, my pores, through my soul and directly to my heart. The sharp pain causing your breaths to shorten and uncontrollable tears to fall with no bottom to reach. I heard his unheard cries for his son. That was a want that could never be fulfilled. That was a missing piece that could never be found. A child, every child, is certainly a gift from God. The creation of every human being, the growth, the heart, the mind; never knowing the capabilities it will endow. Never knowing the fullest extent of it’s imagination, enabling them to do anything, and everything it desires; and to take effect into my life is truly one of the many mysterious ways God has worked, in my life, and everyone’s life. Joshua, two years into this earth and yet I feel he has accomplished more than a man, yet no less than an ange...