Free Essay

Eng 95

In:

Submitted By marielish22
Words 2578
Pages 11
Borough of Manhattan Community College City University of New York Department of English

Disobedience as a Psychological and Moral Problem by Erich Fromm

For centuries kings, priests, feudal lords, industrial bosses and parents have insisted that obedience is a virtue and that disobedience is a vice. In order to introduce another point of view, let us set against this position the following statement: human history began with an act of disobedience, and it is not unlikely that it will be, terminated by an act of obedience. Human history was ushered in by an act of disobedience according to the Hebrew and Greek myths. Adam and Eve, living in the Garden of Eden, were part of nature; they were in harmony with it, yet did not transcend it. They were in nature as the fetus is in the womb of the mother. They were human, and at the same time not yet human. All this changed when they disobeyed an order. By breaking the ties with earth and mother, by cutting the umbilical cord, man emerged from a pre-­‐human harmony and was able to take the first step into independence and freedom. The act of disobedience set Adam and Eve free and opened their eyes. They recognized each other as strangers and the world outside them as strange and even hostile. Their act of disobedience broke the primary bond with nature and made them individuals. "Original sin," far from corrupting man, set him free; it was the beginning of history. Man had to leave the Garden of Eden in order to learn to rely on his own powers and to be come fully human. The prophets, in their messianic concept, confirmed the idea that man had been right in disobeying; that he had not been corrupted by his "sin," but freed from the fetters of pre-­‐human harmony. For the prophets, history is the place where man becomes human; during its unfolding he develops his powers of reason and of love until he creates a new harmony between himself, his fellow man and nature. This new harmony is described as "the end of days," that period of history in which there is peace between man and man, and between man and nature. It is a "new" paradise created by man himself, and one which he alone could create because he was forced to leave the "old" paradise as a result of his disobedience. Just as the Hebrew myth of Adam and Eve, so the Greek myth of Prometheus sees all of human civilization based on an act of disobedience. Prometheus, in stealing the fire from the gods, lays the foundation for the evolution of man. There would be no human history were it not for Prometheus' "crime." He, like Adam and Eve, is punished for his disobedience. But he does not repent and ask for forgiveness. On the contrary, he proudly says: "I would rather be chained to this rock than be the obedient servant of the gods. " Man has continued to evolve by acts of disobedience. Not only was his spiritual development possible only because there were men who dared to say no to the powers that 1

be in the name of their conscience or their faith, but also his intellectual development was dependent on the capacity for being disobedient-­‐-­‐disobedient to authorities who tried to muzzle new thoughts and to the authority of long-­‐established opinions which declared a change to be nonsense. If the capacity for disobedience constituted the beginning of human history, obedience might very well, as I have said, cause the end of human history. I am not speaking symbolically or poetically. There is the possibility, or even the probability, that the human race will destroy civilization and even all life upon earth within the next five to ten years. There is no rationality or sense in it. But the fact is that, while we are living technically in the Atomic Age, the majority of men-­‐-­‐including most of those who are in power-­‐-­‐still live emotionally in the Stone Age; that while our mathematics, astronomy,and the natural sciences are of the twentieth century, most of our ideas about politics,the state, and society lag far behind the age of science. If mankind commits suicide it will be because people will obey those who command them to push the deadly buttons; because they will obey the archaic passions of fear, hate, and greed; because they will obey obsolete clichés of State sovereignty and national honor. The Soviet leaders talk much about revolutions, and we in the "free world" talk much about freedom. Yet they and we discourage disobedience-­‐-­‐ in the Soviet Union explicitly and by force, in the free world implicitly and by the more subtle methods of persuasion. But I do not mean to say that all disobedience is a virtue and all obedience a vice. Such a view would ignore the dialectical relationship between obedience and disobedience. Whenever the principles which are obeyed and those which are disobeyed are irreconcilable, an act of obedience to one principle is necessarily an act of disobedience to its counterpart, and vice versa. Antigone is the classic example of this dichotomy. By obeying the inhuman laws of the State, Antigone necessarily would disobey the laws of humanity. By obeying the latter, she must disobey the former. All martyrs of religious faiths, of freedom and of science have had to disobey those who wanted to muzzle them in order to obey their own consciences, the laws of humanity and of reason. If a man can only obey and not disobey, he is a slave; if he can only disobey and not obey, he is a rebel (not a revolutionary); he acts out of anger, disappointment, resentment, yet not in the name of a conviction or a principle. However, in order to prevent a confusion of terms an important qualification must be made. Obedience to a person, institution or power (heteronomous obedience) is submission; it implies the abdication of my autonomy and the acceptance of a foreign will or judgment in place of my own. Obedience to my own reason or conviction (autonomous obedience) is not an act of submission but one of affirmation. My conviction and my judgment, if authentically mine, are part of me. If I follow them rather than the judgment of others, I am being myself; hence the word obey can be applied only in a metaphorical sense and with a meaning which is fundamentally different from the one in the case of "heteronomous obedience." But this distinction still needs two further qualifications, one with regard to the concept of conscience and the other with regard to the concept of authority.

2

The word conscience is used to express two phenomena which are quite distinct from each other. One is the "authoritarian conscience" which is the internalized voice of an authority whom we are eager to please and afraid of displeasing. This authoritarian conscience is what most people experience when they obey their conscience. It is also the conscience which Freud speaks of, and which he called "Super-­‐Ego." This Super-­‐Ego represents the internalized commands and prohibitions of father, accepted by the son out of fear. Different from the authoritarian conscience is the "humanistic conscience"; this is the voice present in every human being and independent from external sanctions and rewards. Humanistic conscience is based on the fact that as human beings we have an intuitive knowledge of what is human and inhuman, what is conducive of life and what is destructive of life. This conscience serves our functioning as human beings. It is the voice which calls us back to ourselves, to our humanity. Authoritarian conscience (Super-­‐Ego) is still obedience to a power outside of myself, even though this power has been internalized. Consciously I believe that I am following my conscience; in effect, however, I have swallowed the principles of power; just because of the illusion that humanistic conscience and Super-­‐Ego are identical, internalized authority is so much more effective than the authority which is clearly experienced as not being part of me. Obedience to the "authoritarian conscience," like all obedience to outside thoughts and power, tends to debilitate "humanistic conscience," the ability to be and to judge oneself.

The statement, on the other hand, that obedience to another person is ipso facto submission needs also to be qualified by distinguishing "irrational" from "rational" authority. An example of rational authority is to be found in the relationship between student and teacher; one of irrational authority in the relationship between slave and master. Both relationships are based on the fact that the authority of the person in command is accepted. Dynamically, however, they are of a different nature. The interests of the teacher and the student, in the ideal case, lie in the same direction. The teacher is satisfied if he succeeds in furthering the student; if he has failed to do so, the failure is his and the student's. The slave owner, on the other hand, wants to exploit the slave as much as possible. The more he gets out of him the more satisfied he is. At the same time, the slave tries to defend as best he can his claims for a minimum of happiness. The interests of slave and master are antagonistic, because what is advantageous to the one is detrimental to the other. The superiority of the one over the other has a different function in each case; in the first it is the condition for the furtherance of the person subjected to the authority, and in the second it is the condition for his exploitation. Another distinction runs parallel to this: rational authority is rational because the authority, whether it is held by a teacher or a captain of a ship giving orders in an emergency, acts in the name of reason which, being universal, I can accept without submitting. Irrational authority has to use force or suggestion, because no one would let himself be exploited if he were free to prevent it.

Why is man so prone to obey and why is it so difficult for him to disobey? As long as I am obedient to the power of the State, the Church, or public opinion, I feel safe and protected. In fact it makes little difference what power it is that I am obedient to. It is 3

always an institution, or men, who use force in one form or another and who fraudulently claim omniscience and omnipotence. My obedience makes me part of the power I worship, and hence I feel strong. I can make no error, since it decides for me; I cannot be alone, because it watches over me; I cannot commit a sin, because it does not let me do so, and even if I do sin, the punishment is only the way of returning to the almighty power.

In order to disobey, one must have the courage to be alone, to err and to sin. But courage is not enough. The capacity for courage depends on a person's state of development. Only if a person has emerged from mother's lap and father's commands, only if he has emerged as a fully developed individual and thus has acquired the capacity to think and feel for himself, only then can he have the courage to say "no" to power, to disobey.

A person can become free through acts of disobedience by learning to say no to power. But not only is the capacity for disobedience the condition for freedom; freedom is also the condition for disobedience. If I am afraid of freedom, I cannot dare to say "no," I cannot have the courage to be disobedient. Indeed, freedom and the capacity for disobedience are inseparable; hence any social, political, and religious system which proclaims freedom, yet stamps out disobedience, cannot speak the truth.

There is another reason why it is so difficult to dare to disobey, to say "no" to power. During most of human history obedience has been identified with virtue and disobedience with sin. The reason is simple: thus far throughout most of history a minority has ruled over the majority. This rule was made necessary by the fact that there was only enough of the good things of life for the few, and only the crumbs remained for the many. If the few wanted to enjoy the good things and, beyond that, to have the many serve them and work for them, one condition was necessary: the many had to learn obedience. To be sure, obedience can be established by sheer force. But this method has many disadvantages. It constitutes a constant threat that one day the many might have the means to overthrow the few by force; further more there are many kinds of work which cannot be done properly if nothing but fear is behind the obedience. Hence the obedience which is only rooted in the fear of force must be transformed into one rooted in man's heart. Man must want and even need to obey, instead of only fearing to disobey. If this is to be achieved, power must assume the qualities of the All Good, of the All Wise; it must become All Knowing. If this happens, power can proclaim that disobedience is sin and obedience virtue; and once this has been proclaimed, the many can accept obedience because it is good and detest disobedience because it is bad, rather than to detest themselves for being cowards. From Luther to the nineteenth century one was concerned with overt and explicit authorities. Luther, the pope, the princes, wanted to uphold it; the middle class, the workers, the philosophers, tried to uproot it. The fight against authority in the State as well as in the family was often the very basis for the development of an independent and daring person. The fight against authority was inseparable from the intellectual mood which characterized the philosophers of the enlightenment and the scientists. This "critical mood" was one of faith in reason, and at the same time of doubt in everything which is said or thought, inasmuch as it is based on tradition, superstition, custom, power. The principles sapere

4

aude and de omnibus est dubitandum-­‐-­‐" dare to be wise" and "of all one must doubt"-­‐-­‐were characteristic of the attitude which permitted and furthered the capacity to say "no."

The case of Adolf Eichmann is symbolic of our situation and has a significance far beyond the one which his accusers in the courtroom in Jerusalem were concerned with. Eichmann is a symbol of the organization man, of the alienated bureaucrat for whom men, women and children have become numbers. He is a symbol of all of us. We can see ourselves in Eichmann. But the most frightening thing about him is that after the entire story was told in terms of his own admissions, he was able in perfect good faith to plead his innocence. It is clear that if he were once more in the same situation he would do it again. And so would we-­‐and so do we.

The organization man has lost the capacity to disobey, he is not even aware of the fact that he obeys. At this point in history the capacity to doubt, to criticize and to disobey may be all that stands between a future for mankind and the end of civilization.

5

Similar Documents

Free Essay

Zsfdzfdzf

...================================================================== Robin Hood – The Legend of Sherwood v1.0 Readme file – October 25th, 2002 ================================================================== Thank you for purchasing Robin Hood – The Legend of Sherwood. The Spellbound Team wishes you a lot of fun with their new game. This readme file contains useful information that could help you to solve problems with the game. ================================================================== CONTENTS Getting Started · System Requirements · DirectXtm and driver information · Installing and starting the game · Uninstallation Problems and Solutions · Performance optimisation on slow systems · Known problems · Technical Support ================================================================== GETTING STARTED ================================================================== System Requirements ------------------------------------------------------------------ OS: Windows 98/ME/2000/XP CPU: 233 MHz Intel Pentium II or similar CPU RAM: 64 MB CD/DVD-ROM speed: 4x Hard drive space: 1GB available Video: 4 MB RAM and DirectXtm-compatible Sound: DirectXtm compatible sound device Input: Keyboard, Mouse Recommended: CPU: 500 MHz Pentium III or similar CPU RAM: 128 MB DirectXtm and driver information ------------------------------------------------------------------ ...

Words: 1079 - Pages: 5

Premium Essay

Nt1110

... Oregon. TASK Make a report on the Windows Control Panel with screen shots and your experience with control panel. The Control Panel for Windows7 on a Network Control Panel for a PC Control Panel The Control Panel is a part of the Microsoft Windows graphical user interface which allows users to view and manipulate basic system settings and controls via applets, such as adding hardware, adding and removing software, controlling user accounts, and changing accessibility options. Additional applets can be provided by third party software. The Control Panel has been an inherent part of the Microsoft Windows operating system since Windows 2.0, with many of the current applets being added in later versions. Beginning with Windows 95, the Control Panel is implemented as a special folder, i.e. the folder does not physically exist, but only contains shortcuts to various applets such as Add or Remove Programs and Internet Options. Physically, these applets are stored as .cpl files. For example, the Add or Remove Programs applet is stored under the name appwiz.cpl in the SYSTEM32 folder. In recent versions of Windows, the Control Panel has two views, Classic View and Category View, and it is possible to switch between these through an option that appears on either the left side or top of the window. Many of the individual Control Panel applets can be accessed in other ways. For instance, Display Properties can be accessed by right-clicking on an empty area of the desktop...

Words: 549 - Pages: 3

Free Essay

, Mkjhl

...Windows Enabler Overview: Windows Enabler is a program that runs on Microsoft Windows 95/98/Me/NT4.0/2000. It allows the user to enable disabled windows and controls such as buttons and tick boxes and choose menu options that would normally be disabled. This is obviously a very dangerous practice if used recklessly but having said that, you’d be surprised at how often it comes in handy. Windows Enabler has a very simple user interface; it appears as an icon in the system tray and can be turned on and off simply by clicking on it. Windows enabler may be freely distributed as long as the entire package (or a superset) is distributed unaltered. Installing: Windows Enabler is a very simple utility and does not ship with an install program. The installation process is simple; just copy the two files (“Windows Enabler.exe” and “EnablerDLL.dll”) somewhere on your system and run “Windows Enabler.exe” to run the program. I normally place a shortcut to “Windows Enabler.exe” in my “Startup” program group so Windows Enabler is always available! Windows enabler does not make any registry entries or use any data files so uninstalling is accomplished by simply deleting its files (“Windows Enabler.exe” and “EnablerDLL.dll”). Using Windows Enabler: To run Windows Enabler execute the file “Windows Enabler.exe”; the simplest way to do this is to place a shortcut to it somewhere on your system such as the desktop, the start menu or the “Startup” program group. When Windows Enabler...

Words: 595 - Pages: 3

Premium Essay

A Malicious Program That Secretly Integrates Itself Into Program or Data Files.

...Summary A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run. Disinfection & Removal Automatic Disinfection Allow F-Secure Anti-Virus to disinfect the relevant files. For more general information on disinfection, please see Removal Instructions. Technical Details The CIH virus was first located in Taiwan in early June 1998. After that, it has been confirmed to be in the wild worldwide. It has been among the ten most common viruses for several months. CIH has been spreading very quickly as it has been distributed through pirated software. History It seems that at least four underground pirate software groups got infected with the CIH virus during summer 1998. They inadvertently spread the virus globally in new pirated softwares they released through their own channels. These releases include some new games which will spread world-wide very quickly. There's also a persistent rumor about a 'PWA-cracked copy' of Windows 98 which would be infected by the CIH virus but F-Secure has been unable to confirm this. Later on, CIH was distributed by accident from several commercial sources, such as: • Origin Systems website where a download related to the popular Wing Commander game was infected • At least three European PC gaming magazines shipped magazines where the cover CD-ROM was infected - one of them even included a note inside advising users to disinfect their...

Words: 693 - Pages: 3

Premium Essay

It Diploma Course

...Ping tool is a computer network administration utility used to test the reachability of a host on an Internet Protocol network and to measure the round-trip time for messages sent from the originating host to a destination computer. Ping stands for Packet Inter Net Groper and its syntax is PING [options] destination_host 4. List steps used in creating a network layout (4 Marks) 5. Discuss the net watcher as a network tool (4 Marks) The Net Watcher is a system tool in Microsoft Windows 95 and in Windows 98 that is used for monitoring shared resources on other computers that are running on Windows 95 and Windows 98. Remote administration must be enabled on the computers to be monitored by using the Passwords Utility in the Control Panel. The Net Watcher can be referred to as the Windows 95 and the Windows 98 equivalent of the more powerful Windows NT tool Server Manager and the Windows 2000 tool Computer Management. The Net Watcher shows all the current connections to a computer running Windows 95 or 98, along with the names of the connected users, the printers and files that are in use and the level of access that is granted. The computer administrator can use the Net Watcher to close the files that are in use, disconnect particular users from the shared...

Words: 339 - Pages: 2

Premium Essay

Mr Eguiguren

...career. EDUCATION: NJ State Dept of Workforce Development Certified Fork Lift Operator Windsor Institute of Technology M.C.S.E., M.C.S.A., C.I.W., MSOFFICE, AND A+. Alpha Train Computer Corp. Client Server Technician Program Chubb Institute Data Center Support Program De-Vry Technical Institute Electronic Technician Program Middlesex County College Associate Degree in Business Highlights of qualifications: HARDWARE: AS400, IBM Compatible, Mainframe, MS Office, Lotus Notes. Software: Microsoft Exchange, Phone Access Linkup, Electronic Mail, Visual Basic, SQL, MS Windows 95, JCL, MVS, SNA. Manager & Server, 1.2 & 2.0 SQL Server, and ARCServe, MS-DOS 6.x, Windows 3.1, W95 – 98, Windows NT, MS Office Suite Applications, Ms Outlook, Ghost, Palm Pilot Software, Internet Explorer, Netscape Navigator, Microsoft SMS 1.2/2.0. Operating Systems: Installed Windows 95, Windows3.1, Windows NT 4.0, Windows 98, Windows 2000-, Windows NT 3.51 & 4.0, Unix, and PERL Script. Topology/: Token Ring and Ethernet, IPX/SPX, TCP/IP, NetBEUI, Protocols NETBIOS. EXPERIENCE: Bankers Life and Causality 05/10-09/11 Life Insurance Sales AT&T Mobility 10/07-08/09 Retail Sales Consultant * Sales and service of clients to suit their needs for wireless communications. * Complying with customer service needs and proper guidance with their equipment. * Receiving cash/credit/debit payments and assisting clients with...

Words: 642 - Pages: 3

Premium Essay

Effective Managerial Skills

...Microsoft to future successful. After that, Microsoft found an instant success where they launch the window 3.0 which is offered an improved set of windows icons and application like file manager and program manager where still being used today. Microsoft doing a magazine advertising and received endorsement from the top computer magazine in the industry is another key for successful. This strategy can increase the named of Microsoft and making Microsoft windows and Microsoft office the must have software in the world. This campaign has given the name to Microsoft and they are able to get more market share. Another Microsoft strategy is used of slogan “Where Do You Want To Go Today”. This slogan has been used when they launch Windows 95 and Windows...

Words: 321 - Pages: 2

Free Essay

Web Assignemnt 1

...d. Supply chaining 3. Friedman argues that 8/9/95 is a significant date in the history of globalization. Why? a. Netscape went public, ushering in the Internet boom, which led to massive investment in fiber optics and other high tech infrastructure b. Bill Gates and Microsoft introduced Windows 95, which revolutionized the way in which companies manage information c. NAFTA was ratified by the governments of the U.S., Mexico and Canada, forming the world's largest free trade area d. Bill Clinton signed a free trade accord with China, the last major bastion of Communism in the world 4. Friedman mentions many companies that are using information technology to better serve their customers and enhance their position in the marketplace. Which of the following is a company he does NOT discuss? a. Southwest Airlines b. McDonald's c. Jet Blue d. Apple Computer 5. The owner of an American manufacturing company closes his factory in Canton, Ohio and opens a new one in Canton, China. According to Friedman, this is an example of: a. Outsourcing b. Offshoring c. Insourcing d. Open-Sourcing 6. Friedman argues that 11/9 is a critical date in the history of globalization. Why? a. Friedman is dyslexic; terrorists struck the Twin Towers in New York on 9/11 - not 11/9 b. The Berlin Wall fell on 11/9/89, symbolizing the end of Communism c. Bill Gates and Microsoft introduced Windows 95 on 11/9/95, which revolutionized the...

Words: 633 - Pages: 3

Premium Essay

Ad User and Group Account Creation

...1 Open Active Directory Users and Computers. 2 In the console tree, right-click the folder in which you want to add a user account. (Active Directory Users and Computers/domain node/folder) 3 Point to New, and then click User. 4 In First name, type the user's first name. 5 In Initials, type the user's initials. 6 In Last name, type the user's last name. 7 Modify Full name to add initials or reverse order of first and last names. 8 In User logon name, type the user logon name, click the UPN suffix in the drop-down list, and then click Next. 9 If the user will use a different name to log on to computers running Windows 95, Windows 98, or Windows NT, then you can change the user logon name as it appears in User logon name (pre-Windows 2000) to the different name. 10 In Password and Confirm password, type the user's password, and then select the appropriate password options. To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure. For more information, see Default local groups, Default groups, and Using Run as. To open Active Directory Users and Computers, click Start, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Users and Computers. To add a user, you can also click...

Words: 317 - Pages: 2

Free Essay

Microbio

...Command & Conquer™: Yuri’s Revenge™ LATE BREAKING NEWS FROM THE FRONT Copyright 2001 Electronic Arts Inc. All rights reserved. Westwood Studios™ is an Electronic Arts™ brand. Version #: 1.001 November 12th, 2001 For latest news and updates visit WWW.WESTWOOD.COM - - TOP SECRET - - Commander: Thanks for your continued participation in the global war effort against the madman Yuri. Our boys at the Lab have come up with some modifications for your arsenal that should improve your battle experiences. Review the following bulletin from Command Headquarters with great care. Commit it to memory. Your understanding of these could be crucial to your victory or defeat on the battlefield! Good Luck. --President Michael Dugan CHANGES & FEATURE UPDATES: General: • To maximize game performance for all game modes, it’s best to set the game’s resolution to 640 x 480 pixels. The higher the resolution setting, the slower the game’s performance, especially on lower end PCs. • Another way to maximize WOL game performance is to never adjust the Internet Connection Slider (in WOL Options Screen). The game determines the optimal setting before starting the battle. This is often confused by users in believing moving this slider will increase the game’s speed, which it does not. • PCs with more than one CD Rom device caused the game to launch slowly. This has been fixed. Units & Structures: ...

Words: 3997 - Pages: 16

Premium Essay

Network

...DHCP client may be incorrect. For example, a client may acquire its IP address from a DHCP server, but the DNS records would not reflect the IP address acquired nor provide a mapping from the new IP address to the computer name (FQDN). In Windows 2000, DHCP servers and clients can register with DNS to provide this update service if the DNS server supports DNS with dynamic updates. The Windows 2000 DNS service supports dynamic updates. A Windows 2000 DHCP server can register with a DNS server and update pointer and address (A) resource records on behalf of its DHCP-enabled clients using the DNS dynamic update protocol. The ability to register both A and PTR type records lets a DHCP server act as a proxy for clients using Microsoft Windows 95 and Windows NT 4.0 for the purpose of DNS registration. DHCP servers can differentiate between Windows 2000 and other clients. An additional DHCP option code (option code 81) enables the return of a client's FQDN to the DHCP server. If implemented, the DHCP server can dynamically update DNS to modify an individual computer's resource records with a DNS server using the dynamic update protocol. This DHCP option permits the DHCP server the following possible interactions for processing DNS information on behalf of DHCP clients that...

Words: 429 - Pages: 2

Premium Essay

Hello

...NT1110 Computer Structure and Logic Week 7 Unit 9 Quiz 1. Biometrics is used to authenticate based on: a. something you know. b. something you are. c. something you have. d. something you do. 2. Which of the following is used to encrypt an entire hard disk? a. EFS b. NTFS c. BitLocker d. Local Audit Policy 3. Which file system provides the most features? a. FAT b. FAT16 c. FAT32 d. NTFS 4. An example of something a user knows used for authentication is a: a. retina scan. b. thumbprint. c. PIN. d. signature. 5. A firewall that protects against malicious traffic inbound and outbound is called a/an __________ firewall. a. one-way b. two-way c. pass through d. filtering 6. Files encrypted with EFS cannot be opened by: a. the user who encrypted them. b. EFS key holders. c. administrators. d. guest users. 7. Which is not a good password management technique? a. Changing passwords periodically b. Enforcing a minimum password length c. Telling a friend your password in case you forget it d. Preventing old passwords from being reused NT1110 Computer Structure and Logic Week 7 Unit 9 Quiz 8. Sending an email that tricks a user into providing personal information is a form of: a. baiting. b. phishing. c. pretexting. d. Trojan horsing. 9. Which is not a Windows account level? a. Administrator b. Guest c. Limited d. Supervisor 10. Which permission is needed to access and run programs? a. List b. Modify c. Read and execute d. Write 11. This is a graphical file-management...

Words: 591 - Pages: 3

Premium Essay

Ako Si Itlog

...Command & Conquer™: Yuri’s Revenge™ LATE BREAKING NEWS FROM THE FRONT Copyright 2001 Electronic Arts Inc. All rights reserved. Westwood Studios™ is an Electronic Arts™ brand. Version #: 1.001 November 12th, 2001 For latest news and updates visit WWW.WESTWOOD.COM - - TOP SECRET - - Commander: Thanks for your continued participation in the global war effort against the madman Yuri. Our boys at the Lab have come up with some modifications for your arsenal that should improve your battle experiences. Review the following bulletin from Command Headquarters with great care. Commit it to memory. Your understanding of these could be crucial to your victory or defeat on the battlefield! Good Luck. --President Michael Dugan CHANGES & FEATURE UPDATES: General: • To maximize game performance for all game modes, it’s best to set the game’s resolution to 640 x 480 pixels. The higher the resolution setting, the slower the game’s performance, especially on lower end PCs. • Another way to maximize WOL game performance is to never adjust the Internet Connection Slider (in WOL Options Screen). The game determines the optimal setting before starting the battle. This is often confused by users in believing moving this slider will increase the game’s speed, which it does not. • PCs with more than one CD Rom device caused the game to launch slowly. This has been fixed. Units & Structures: ...

Words: 5820 - Pages: 24

Premium Essay

Control Panel

... Oregon. TASK Make a report on the Windows Control Panel with screen shots and your experience with control panel. The Control Panel for Windows7 on a Network Control Panel for a PC Control Panel The Control Panel is a part of the Microsoft Windows graphical user interface which allows users to view and manipulate basic system settings and controls via applets, such as adding hardware, adding and removing software, controlling user accounts, and changing accessibility options. Additional applets can be provided by third party software. The Control Panel has been an inherent part of the Microsoft Windows operating system since Windows 2.0, with many of the current applets being added in later versions. Beginning with Windows 95, the Control Panel is implemented as a special folder, i.e. the folder does not physically exist, but only contains shortcuts to various applets such as Add or Remove Programs and Internet Options. Physically, these applets are stored as .cpl files. For example, the Add or Remove Programs applet is stored under the name appwiz.cpl in the SYSTEM32 folder. In recent versions of Windows, the Control Panel has two views, Classic View and Category View, and it is possible to switch between these through an option that appears on either the left side or top of the window. Many of the individual Control Panel applets can be accessed in other ways. For instance, Display Properties can be accessed by right-clicking on an empty area of the desktop...

Words: 549 - Pages: 3

Free Essay

Antonio Illescas, Systems Engeeniering

...SINFOCORP SRL Manual para crear Instalador VB.NET Tutorial para crear instalador de Proyecto en Visual Basic .NET Carlos Hidalgo Lache 1 SINFOCORP SRL Manual para crear Instalador VB.NET PROGRAMAS DE INSTALACIÓN Introducción Una vez que una aplicación VB.NET ha sido desarrollada, comprobada y compilada, debe ser instalada en las máquinas cliente donde será utilizada en el futuro. En ese proceso el entorno .NET suministra una serie de métodos y herramientas para realizar programas instaladores dependiendo del tipo de aplicación creada y de las características de dicha máquina cliente. El programa instalador debe ocuparse de cargar la aplicación en la máquina cliente así como cualquier otro archivo o recurso que ésta emplee en su funcionamiento, ya sea en el estado actual o en el futuro previsto. Se distinguen tres tipos de instalaciones: instalación XCOPY programa instalador de aplicación programa instalador de módulo Instalación XCOPY Es el método más sencillo de instalación y no precisa el uso de ninguna herramienta de Visual Studio.NET por lo que constituye un método accesible a cualquier desarrollo. Se basa en el proceso de copia de la carpeta de la aplicación en la máquina cliente utilizando para ello el comando XCOPY de MSDOS disponible en cualquier sistema Windows. Para utilizarlo debe accederse a la línea de comandos desde Inicio Þ Todos los Programas Þ Accesorios Þ Símbolo del Sistema y la sintaxis a emplear es XCOPY ruta_carpeta_origen...

Words: 4418 - Pages: 18