Premium Essay

English Comparsion Essay

In:

Submitted By maddykc
Words 2037
Pages 9
During the early and mid 1900’s, African Americans are endless victims of discrimination. They are seen as outcasts and are treated horribly. The events of discrimination are shown very well in the novels A Summer of Kings by Han Nolan and Of Mice and Men by John Steinbeck. Both of the books clearly show the themes of racism, segregation and gender inequality throughout the content of their storylines. Having these forms of discrimination in both of the novels, make the readers realize how much suffering these innocent people had to go through every single day of their lives because of the cruel societies around them. Both of the novels have events within them showing the segregation, racism and gender inequality that are associated with the theme of discrimination. The events that they endure every day are horrible and these events have made a mark on history. Every event that shows discrimination is embedded in history and in A Summer of Kings and Of Mice and Men, the authors have shown these events clearly and made the suffering real enough to clearly understand as the reader.

In the book A Summer of Kings racism is a central issue. Han Nolan makes sure to inform the readers that the African-American people live in different cities than the white people do. King-Roy Johnston, who is a black man that has been accused of murdering a white man in Alabama. When he comes to live with her family, Esther’s neighbour Pip is not so happy about this when he says “You think you and this cold-blooded killer are going to become a couple? He’s a Negro and a cold-blooded killer. Are you crazy?” (Nolan 5). When Pip says this, it shows how separate and distant the two groups are, because they live in different cities they are being isolated from one another. It shows how cruel the society actually is; the African-Americans feel like they have to live in different

Similar Documents

Premium Essay

Eng102 Fiction Essay

...Writing resources and Requirements NOTE: Please use this as reference for each writing assignment! Your grade may be adversely affected if you do not follow all of these requirements. Email or call your instructor if you have questions. The required literary essays for this course demand careful planning, drafting, revising/editing, and correct documentation. The following resources and requirements provide instruction on writing, research, and avoiding plagiarism. Carefully review them before writing your literary essays. Plagiarism Plagiarism encompasses more than the use of printed sources without giving proper credit. It means handing in writing in the name of one person that another person has composed, revised, edited, or proofread without the instructor's approval. Accordingly, the following guidelines are set down, and you must study and understand them from the outset. The instructor will assume, since this issue is clearly discussed, that you will be responsible for understanding and applying it. Any fact that is not common knowledge, any idea, phrase, or paraphrase that is taken from a printed source, from a lecture, sermon, or radio broadcast must be documented. Any work submitted in English 102 will be understood to be the work of the student submitting it and his work alone. Taking credit for someone else's proofreading ability, suggestions, ideas, or words is plagiarism. An exception to this definition is group work assigned and directed by the instructor...

Words: 2080 - Pages: 9

Free Essay

Modelling Football Data

...Modelling Football Data By Renzo Galea A Dissertation Submitted in Partial Fulfilment of the Requirements For the Degree of Bachelor of Science (Honours) Statistics and Operations Research as main area DEPARTMENT OF STATISTICS AND OPERATIONS RESEARCH FACULTY OF SCIENCE UNIVERSITY OF MALTA MAY 2011 Declaration of Authorship I, Renzo Galea 25889G, declare that this dissertation entitled: “Modelling Football Data”, and the work presented in it is my own. I confirm that: (1) This work is carried out under the auspices of the Department of Statistics and Operations Research as part fulfillment of the requirements of the Bachelor of Science (Hons.) course. (2) Where any part of this dissertation has previously been submitted for a degree or any other qualification at this university or any other institution, this has been clearly stated. (3) Where I have used or consulted the published work of others, this is always clearly attributed. (4) Where I have quoted from the works of others, the source is always given. With the exception of such quotations, this dissertation is entirely my own work. (5) I have acknowledged all sources used for the purpose of this work. Signature: _______________________ Date: _______________________ Abstract Renzo Galea, B.Sc. (Hons.) Department of Statistics & Operations Research May 2011 University of Malta The main goal of this dissertation is to investigate the Bayesian modelling performance for ...

Words: 15822 - Pages: 64

Free Essay

التشفير وأمنية المعلومات

...الفصل الأول التعريف بتقنيات التشفير وأمنية المعلومات 1-1:المقدمة ( Introduction ): إن أمنية المعلومات ناتجة من الحاجة إلى تناقل المعلومات الخاصة لكل من العبارات العسكرية والدبلوماسيـة. هذه الحاجة هي قديمة بقدم الحضارة نفسها. الأسبان القدماء مثلا, شفروا عباراتهم العسكرية. أما بالنسبة للصين, فانه يكفي فقط كتابة العبارات بلغتهم المعروفة والتي تعبر لغة خاصة, وذلك لان القليل من الناس يستطيعون قراءة الحروف الصينية. كانت قنوات الاتصال في السابق بسيطة جدا وكانت ترتب بأسلوب يعتمد في تامين السري على استخدام مراسلين موثوقين. تعتمد الأمنية لمثل هذا التنظيم على كل من موضع الثقة للمراسل وقابليته في أن يبقى محتفظا بالمواقف أو المواقع التي فيها يمكن أن تتعرض العبارات للانتهاك. بسبب اكتشاف أنظمة الحاسبات واستخدام شبكات الحاسبة الواسعة بين الدول, فان القرن العشرين قد غير بصورة ملحوظة مدى مفاهيم الحماية. في الحاسبات المبكرة ( الأولى), فان الأمنية الفيزيائية ومعها سياسة الاختيار الملائم للكادر العامل في الحاسبة كان كافيا لتامين الأمنية. لكن هذا أصبح غير كاف وغير مرن بعد اكتشاف أنظمة حاسبات المشاركة الزمنية (Time-Sharing) والتي تتألف من عدة محطات طرفية موزعة في مساحة جغرافية واسعة. من الجدير بالذكر أن امن وسلامة اتصال,ت الالكترونية في بدء ظهورها لم يكن هاما لان معظم المعلومات المخزونة فيها لم تكن ذات حساسية كبيرة, بعكس ماهي عليه اليوم, إذ كلما ازدادت وارتفعت قيمة المعلومات المخزونة في الحاسبات الالكترونية كلما ازدادت الرغبة لدى بعض الأفراد لمحاولة الوصول إليها من اجل التخريب أو من اجل الكسب غير المشروع بواسطة بيعها إلى الجهات الراغبة بذلك, لذا فقد أصبح امن هذه المعلومات على درجة...

Words: 35136 - Pages: 141