Premium Essay

Cheating In The Trojan War

Submitted By
Words 458
Pages 2
When the words cheat, cheater, or cheating are mentioned, the first conclusion most draw are greatly negative. Cheating is the means gaining an unfair advantage over a system, players, or other instances, that help secure a victory. However, there were many instances throughout history where cheating has led extraordinary feats, that would not have been possible without deception. Without cheating, the United States of America would not exist and the ten-year long siege on the city of Troy would have claimed many more lives. During the American Revolution, the rebel American forces used lies and deception to win the war in favor of democracy. The new colonies originally had laws and regulations set up by the British, which gave the British the upper hand of how things were operated in the America’s. However as the colonists were continually mistreated and over taxed they decided to plan in secrecy, a way to overcome British rule. They resorted to cheating, by using guerilla warfare and ignoring the rules of engagement, set to previous wars. The American rebel colonists even attacked the British on a religious holiday to gain an …show more content…
Soldiers from Greece was been sent to fight the Trojans and to siege the city of Troy, but were grossly unsuccessful, costing many Greeks, and Trojans lives of this long war. Seeing that there recent tactics of fighting fair were becoming futile, the Greek’s decide to cheat. They create a giant wooden horse and offer it to the Trojans as gift to end the war. The Trojans gladly accept and bring the large horse into their city. However, overnight, a small group of Greeks deployed out of the wooden horse and opened the gates for the rest of the army to come in and overtake the city. Cheating was utilized to gain the unfair advantage in the final battle, but ultimately ended in the end to the ten-year blood

Similar Documents

Premium Essay

Why Is Cheating Wrong

...Is cheating always wrong? People have been debating this question for decades. The dictionary definition of cheating is; an act of deception, fraud, trickery, imposture or imposition. Some say that there are times when it is acceptable, for example, in a case where someone's life or safety is threatened. Others may say that no matter the case, cheating is always wrong, no questions asked, such as in the case of cheating on a test. In multiple mythology stories, combat or survival tactics may be mistaken for cheating. It is all a matter of perspective. Cheating is not wrong when pertaining to issues of safety or survival, but in an exam setting it would be, therefore cheating is not always wrong. One example where cheating would not be wrong, is when someone’s life or safety is at stake. If someone had been kidnapped or taken and held against their will in some manner, this person may use deception or trickery to escape. For example, sneaking out at night or while the person is away. That’s not cheating; it’s just doing what is necessary in the situation at hand to protect someone's well-being. In this sense it is practically self-defense, not cheating in any way. Doing so protects the person...

Words: 596 - Pages: 3

Premium Essay

Helen Of Troy Research Paper

...Greek mythology tells of a woman whose actions sparked a ten year war, destroyed an entire city, left thousands dead, and changed the entire course of Greek mythology. This woman is Helen of Troy, daughter of Zeus and the most beautiful woman in the world. The reason the war took place was because of her, and the entire war seemed to revolve around which group- the Greeks or the Trojans- got to take her back. Helen of Troy plays the role of a villain in the Trojan War because she ran off with a Trojan prince while she was married, was very intimate with many men throughout the war, and was unfaithful to both sides of the war. To illustrate how self-interested this woman is, I will first point out that Helen of Troy decided to run off with...

Words: 1065 - Pages: 5

Premium Essay

Circle

...book The war has its roots in the wedding of King Peleus and the sea- nymph Thetis. When the gods decide not to invite Eris, she is angered and introduces Discord to the banquet hall in the form of a golden apple inscribed with the words “For the Fairest.” The vain goddesses argue over who deserves the apple, and the field is narrowed down to Athena, Hera, and Aphrodite. Paris, the son of King Priam of Troy, is selected to judge. All three try to bribe Paris: Hera offers power, Athena offers success in battle, and Aphrodite offers the most beautiful woman in the world—Paris chooses Aphrodite. Unfortunately, the most beautiful woman in the world, Helen, is already married to King Menelaus of Sparta. Visiting Menelaus, Paris, with Aphrodite’s help, betrays his host’s hospitality and kidnaps Helen back to Troy. All the Greek kings have at one time courted Helen, so her mother has made them all swear to always support whomever she might choose. When Helen is abducted, the only men who resist conscription are Odysseus, who does not want to leave his home and family, and Achilles, whose mother knows he is fated to die at Troy and holds him back. In the end, however, they join the rest of the Greeks and sail united against Troy. En route, the fleet angers Artemis, who stops the winds from blowing. To appease her, the chief of the Greeks, Agamemnon, is forced to sacrifice his own daughter, Iphigenia. The battle goes back and forth for nine years. The Trojans, led by Priam’s...

Words: 2467 - Pages: 10

Free Essay

The Age of Lead

...the fight and the three male gods [Zeus (the youngest), Poesidon (middle), Hades (the eldest)] draw lots to see who will rule. Zeus becomes ruler of the heavens, and king of the gods, Poesdion ruler of the seas and Hades is ruler of the underworld. * Zeus marries Metis (goddess of wisdom), she was the one who gave him advice to poison his father. When she becomes pregnant he gets worried that their offspring will overpower him the way he did to his father. He swallows Metis. * He gains her wisdom and starts to have headaches. Athene is born from the forehead of Zeus reliving him from his headaches. * Zeus marres his sister Hera and they have two sons, Ares and Hephaestus, and one daughter, Hebe. * Hera is jealous of his cheating and attempts an uprising which fails. She is punished by being...

Words: 2326 - Pages: 10

Premium Essay

Challenges to Criminal Law Makers

...Challenges to Criminal Law Making in the New Global Information Society: A Critical Comparative Study of the Adequacies of Computer-Related Criminal Legislation in the United States, the United Kingdom and Singapore Warren B. Chik* Introduction Computer and Internet usage is on the rise due to lower costs of computer ownership and connectivity as well as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries...

Words: 24175 - Pages: 97

Premium Essay

Engineer

...Challenges to Criminal Law Making in the New Global Information Society: A Critical Comparative Study of the Adequacies of Computer-Related Criminal Legislation in the United States, the United Kingdom and Singapore Warren B. Chik* Introduction Computer and Internet usage is on the rise due to lower costs of computer ownership and connectivity as well as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries...

Words: 24175 - Pages: 97

Free Essay

Cyber Crime in Bangladesh

...Chapter 1 INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become...

Words: 14728 - Pages: 59

Premium Essay

Computer Ethics

...Computer ethics Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Maner in the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. The importance of computer ethics increased through the 1990s. With the growth of the Internet, privacy issues as well as concerns regarding computing technologies such as spyware and web browser cookies have called into question ethical behavior in technology. Identifying issues Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, Collins and Miller proposed a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue. In solving problems relating to ethical issues, Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts...

Words: 6774 - Pages: 28

Free Essay

Crimes in Cyber Café and Its Rules and Ragulation, Perspective Bangldesh

...2012 JAGANNATH UNIVERSITY DEPARTMENT OF LAW Shakil Ahmed 3rd Batch [CRIMES IN CYBER CAFÉ AND ITS RULES AND RAGULATION] The study investigates the cyber café rules around Bangladesh: law and reality. It evaluates whether the guideline for cyber café owners’ and users are properly maintained or not. This study also reveal how crime occurred on the cyber café and why and it also investigate whether the guidelines are sufficient or not. At last this study recommend some point by which we can maintain our cyber café institution properly and by how we can reduce crime occurred on the cyber café. Index Abstract ………………………………………………………………………...………. 2 2 2 2 2 2 2 2 3 5 5 5 5 6 7 8 8 9 13 14 17 17 19 1. Introductory part ………………………………………………………….……..…. 1.1 Aim of the study ……………………………………………….……….... 1.2 Object of the study ……………………………………………...……….. 1.3 Methodology ……………………………………………………….......... 2. Definition ………………………………………………………………….….......… 2.1 Cyber café ……………………………………………………….……..... 2.2 Necessity ……………………………………………………………….... 3. Amount of cyber café around Bangladesh …………………………………..………. 4. Law regarding cyber café ……………………………………………………....…… 4.1 BTRC ………………………………………………………………...….. 4.2 CCOAB …………………………………………………………….…..... 4.3 Guidelines ……………………………………………………….…..….... 4.4 Law and its Reality……………………………………………………...... 4.4.1 Reality in Dhaka………………………………………....… 4.4.2 Reality on other area ……………………………………..... 5. Crime in cyber café …………………………………………………………............. 5.1 Case...

Words: 6680 - Pages: 27

Free Essay

Assignment on Cyber Crime

...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...

Words: 6414 - Pages: 26

Premium Essay

Ffsfsd

...Presents MINI-RESEARCH STRATEGIES & MODELS Mini-Research Activities Increase Student Achievement Support the Mission of the 21st Century Librarian INCLUDES: LM_Net commentary on preventing of plagiarism vs. detection and punishment strategies The challenge to librarians of the Pew and N2H2 Study of student Internet use Doug Johnson strategies for Low Probability of Plagiarism (LPP) Mini-Research models and strategies curb plagiarism and develop writing and critical thinking Scientific-based research (SBR) supports the use of mini-research activities to increase student achievement © ProQuest LLC – May be reproduced for Educational Purposes September 2007 TABLE OF CONTENTS Topic Section Selected LM_Net Librarian Comments about Positive Strategies for Preventing Plagiarism Strategies for Creating Low Probability of Plagiarism Research Activities—Doug Johnson Bloom‘s Taxonomy of Higher-Order Thinking Skills (HOTS) and Mini-Research ProQuest Mini-Research Strategies Correlated to HOTS -- (Bloom‘s Taxonomy) Mini-Research Formal Model—Integrate Technology and Prevent Plagiarism Mini-Research Draft Summary Model Integrates Technology Methods and Skills Mini-Research Informal Model—Integrate Technology and Prevent Plagiarism Flexible Rubrics Model for Teacher Evaluation of Mini-Research Reports APPENDIX ProQuest Mini-Research Process vs. Traditional Research Renewed Emphasis on the Importance of Writing and Mini-Research Activities Scientific-based Research (SBR),...

Words: 11221 - Pages: 45

Free Essay

The Tudors

...everything from ancient Egypt and Indian philosophy to conceptual art and cosmology. Very Short Introductions available now: ANCIENT P H I L O S O P H Y Julia Annas THE ANGLO-SAXON AGE John Blair ANIMAL RIGHTS David DeGrazia ARCHAEOLOGY Paul Bahn ARCHITECTURE Andrew Ballantyne ARISTOTLE Jonathan Barnes ART HISTORY Dana Arnold ARTTHEORY Cynthia Freeland THE HISTORYOF ASTRONOMY Michael Hoskin ATHEISM Julian Baggini AUGUSTINE HenryChadwick BARTHES Jonathan Culler THE B I B L E John Riches BRITISH POLITICS Anthony Wright BUDDHA Michael Carrithers BUDDHISM DamienKeown CAPITALISM James Fulcher THE CELTS Barry Cunliffe CHOICETHEORY Michael Allingham CHRISTIAN ART Beth Williamson CLASSICS Mary Beard and John Henderson CLAUSEWITZ Michael Howard THE COLD WAR Robert McMahon CONTINENTAL PHILOSOPHY Simon Critchley COSMOLOGY Peter Coles CRYPTOGRAPHY Fred Piper and Sean Murphy DADAAND SURREALISM David Hopkins DARWIN Jonathan Howard DEMOCRACY Bernard Crick DESCARTES TomSorell DRUGS Leslie Iversen TH E EARTH Martin Redfern EGYPTIAN MYTHOLOGY Geraldine Pinch EIGHTEENTH-CENTURY BRITAIN PaulLangford THE ELEMENTS Philip Ball EMOTION Dylan Evans EMPIRE Stephen Howe ENGELS Terrell Carver ETH ICS Simon Blackburn THE EUROPEAN UNION John Pinder EVOLUTION Brian and Deborah Charlesworth FASCISM Kevin Pass mo re THE FRENCH REVOLUTION William Doyle FREUD AnthonyStorr GALILEO Stillman Drake GANDHI BhikhuParekh GLOBALIZATION...

Words: 34946 - Pages: 140

Premium Essay

Art of Deception

...THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak Scanned by kineticstomp, revised and enlarged by swift For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources...

Words: 125733 - Pages: 503

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Premium Essay

Mount Fuji

...Employers, job seekers, and puzzle lovers everywhere delight in William Poundstone's HOW WOULD YOU MOVE MOUNT FUJI? "Combines how-to with be-smart for an audience of job seekers, interviewers, Wired-style cognitive science hobbyists, and the onlooking curious. . . . How Would You Move Mount Fuji? gallops down entertaining sidepaths about the history of intelligence testing, the origins of Silicon Valley, and the brain-jockey heroics of Microsoft culture." — Michael Erard, Austin Chronicle "A charming Trojan Horse of a book While this slim book is ostensibly a guide to cracking the cult of the puzzle in Microsoft's hiring practices, Poundstone manages to sneak in a wealth of material on the crucial issue of how to hire in today's knowledge-based economy. How Would You Move Mount Fuji? delivers on the promise of revealing the tricks to Microsoft's notorious hiring challenges. But, more important, Poundstone, an accomplished science journalist, shows how puzzles can — and cannot — identify the potential stars of a competitive company.... Poundstone gives smart advice to candidates on how to 'pass' the puzzle game.... Of course, let's not forget the real fun of the book: the puzzles themselves." — Tom Ehrenfeld, Boston Globe "A dead-serious book about recruiting practices and abstract reasoning — presented as a puzzle game.... Very, very valuable to some job applicants — the concepts being more important than the answers. It would have usefulness as well to interviewers with...

Words: 78201 - Pages: 313