...In Speak, by Laurie Halse Anderson, the protagonist, Melinda Sordino, is struggling with depression. She attends a party with her friends and upperclassmen before the start of freshman year. Melinda, wrapped in the thrill of her first party, drinks three beers and is asked by Andy Evans for a dance. She agreed, flattered that a senior would ask her for such a thing. However, he abuses Melinda’s intoxicated state and aggressively rapes her. Terrified and confused, she quickly calls the cops, though finds herself unable to speak. The other kids realize she’s calling the police, who arrest several of the partiers once they arrive. Abandoned by all her friends, Melinda starts school with the bad reputation of a “tattler”. Anderson uses symbolism such as the seasons, her art project, and the names of some chapters to portray Melinda’s depression and how she grows out of it. Anderson’s use of weather and seasons directly correlate to Melinda’s depression and how she deals with it. Melinda struggles with her depression during the first half of the book, which takes place during winter when she states that “The earth has frozen” (Anderson 65) in the chapter “Peeled and Cored”. She is stuck in a state of feeling cold and alone and has nobody to go to. With indifferent parents and no friends, she struggles to feel genuinely happy. This is also shown during a point in the book where “a minor blizzard blows outside” (Anderson 87) in the chapter “Rent Round 3” where Melinda’s guidance counselor...
Words: 946 - Pages: 4
...It's not hard to speak; between rumors and confessions, words spill from our lips all the time. After all, we all naturally enjoy verbalizing our thoughts and being listened to. Those who are unable, or unwilling, to gain such attention always have a reason. Usually, these individuals are the ones who have something important to share. Melinda Sordino - the main character of Speak by Laurie Halse Anderson - is the epitome of such a character, she had several reasons to be silent. Melinda took nearly a year to speak out because she was surrounded by people who wanted to speak more than listen. For her, every reason became another wall, blocking and limiting her capability to speak. The start of Melinda's degeneration into utter mental and physical seclusion was the scarring event that took place at a party over summer. It was then she unwillingly experienced her first sexual encounter with senior Andy Evans. From the first protest to the last (verbal or otherwise), Melinda's voice was not heard, not listened to, and not heeded. Consequently, when she called the police, the teen couldn't say that she had been raped before the voice on the other line made the decision to send aid. Police rushed in to find a rowdy crowd of partying teens with alcohol. The party attendees and her friends were quick to make a cursory assessment and a superficial inquiry of the truth before promptly labeling her as the Squealer. Subconsciously known or quietly acknowledged, a prison began to build...
Words: 822 - Pages: 4
...Alexa St. Angelo Mrs. Wahlberg Grade 10 Period 7 CP 11 March 2013 A Silent Outcast's Dark Secret The novel "Speak" written by Laurie Halse Anderson is a story known to most teens. Laurie Halse Anderson did a great job of interpreting many modern struggles most teens may face today. Not every teen is enjoying their high school experience or may have it as easy as their peers do. Freshman Melinda Sordino did not have her ninth grade year go as planned for her. Her story is told in this book. This is a powerful novel that is great for opening discussions and shining awareness on topics such as violence, sex, language, drinking, drugs and smoking. "Speak" tells the story of 13 year old Melinda Sordino, who has a rough first year of high school. The previous summer, Melinda busted a party by calling the cops. No one understood why she did so, and this one act of hers is what made her an outcast her freshman year. It was made known what she had done that night and people weren't easy on her for this. With her friends not talking to her and the constant judgment of those around her who didn't even know her, this caused Melinda unbelievable stress. Melinda, now a mute and friendless, only found comfort in herself but she could never remain eased for too long because there was something else that happened that night that was causing her nonstop stress. She couldn't find the voice to speak about what had happened to her, and she didn't have anyone she could talk about...
Words: 697 - Pages: 3
...Imagine a high schooler has everyone against them, but they haven’t done anything wrong. Deep inside they’re burning. Their best friend is now their worst enemy. Their parents don't even take time out of their day to ask them how they’re doing. All the teachers, always harassing them. The counselor tells them that they need help, but never taking the next steps of actually helping the student themselves. They have a secret sunk deep into their heart and mind. They have been raped by their ex-best friends new senior-boyfriend. Why bother even saying anything, no one will listen anyways. In the book Speak by author Laurie Halse Anderson, Melinda Sordino goes through exactly this. She experiences many turning points along her eventful 9th grade year at Merryweather High most negative, some positive. Not only does she get raped as an incoming 9th grader, but everyone in the whole school treats her as an outcast. Her family communicates with each almost always through short notes, never heart to heart conversation. All her friends, now hate her, and the only students willing to talk to her are the kids new to the district because they themselves feel as outcasts. At the very beginning of Speak, Melinda meets Heather, who helps her through her first few months of school, until she herself dumps Melinda for “better” friends. As Melinda traipsed through hating life and everything in it, she met Mr. Freeman, someone who actually believes in her. Eventually, even some of Melinda friends...
Words: 1457 - Pages: 6
...Recommend Switch and Router Author Note This assignment is being submitted on September 13, 2013, for N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. Recommend Switch and Router At the beginning of this course we were told to create a Cisco NOC environment for this ISP Company, and we were told to choose an ideal router for the job, the choices that we had were between the Cisco 1841 and the Cisco 2811. And I chose to use the Cisco 2811 router for this configuration for a lot of different reasons. But for this assignment I was asked that with knowing the security threats we face today if that would make me choose the 1841 over the 2811 and why? My answer is no I am going to stay with my current choice because he 2811 integrated service router provide the support in wire rate recital for synchronized services such as safety and voice and higher service to numerous T1/E1/DSL WAN rates. It also includes the on-board encryption; holds up to 1500 VPN channels with the AIM-EPI-PLUS module. Plus provides the antivirus protection hold up through system administration control. It secures the interruption anticipation as well as stateful cisco IOS firewall hold and other many more necessary safety characteristics. Here is a list of features this router provides. Cisco IOS Software Firewall, Secure Sockets Layer (SSL), Onboard VPN Encryption Acceleration, Network Admissions Control (NAC), Multiprotocol Label Switching (MPLS) VPN Support, USB eToken Support...
Words: 803 - Pages: 4
...R1> R1>en Password: R1#show run Building configuration... Current configuration : 963 bytes ! version 12.3 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname R1 ! ! ! enable secret 5 $1$XA/N$cs9QtuPIK5Y/RcThoNug2. ! ! ! ! ! ! ip cef no ipv6 cef R1#show run Building configuration... Current configuration : 963 bytes ! version 12.3 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname R1 ! ! ! enable secret 5 $1$XA/N$cs9QtuPIK5Y/RcThoNug2. ip cef no ipv6 cef ip ssh version 1 no ip domain-lookup spanning-tree mode pvst interface Loopback0 ip address 10.1.1.1 255.255.255.255 ! interface FastEthernet0/0 ip address 172.16.1.17 255.255.255.240 duplex auto speed auto ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0/0 ip address 192.168.10.1 255.255.255.252 clock rate 64000 ! interface Serial0/0/1 ip address 192.168.10.5 255.255.255.252 ! interface Serial0/1/0 no ip address clock rate 2000000 shutdown ! interface Vlan1 no ip address shutdown ! ip classless ! ip flow-export version 9 ! ! ! ! ! ! ! line con 0 password cisco login ! line aux 0 ! line vty 0 4 password cisco login ! ! ! end R1#conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#router ospf 10 ...
Words: 2242 - Pages: 9
...Patrick Schuyler February 22, 2015 Business Ethics Professor Christianson Unsolicited Emails Unsolicited emails do much more harm than good in this world. It is very unethical for online companies to send out any spam or unwanted emails to any person who makes a purchase online. Maybe a receipt email from the company you bought from is ok, but receiving emails without asking from companies with similar products is ridiculous. These unsolicited emails could always have the chance of opening up some type of virus onto the device you open it with. According to chapter four, they are considered to be an invasion of one’s privacy. Also, these unsolicited emails are wrong and unethical because society prospers through the struggle of market-places. An invasion of someone’s privacy is clearly thought of as unethical which is in essence what companies are doing when they send out unsolicited emails. What happens when you open a spam email and it crashes your computer? Would you say that the email has invaded your life in a bad way? The answer is yes. These businesses invade people’s lives by sending emails to people who never want them in the first place. Citizens have the right to their own lives and who enters them. No way should someone else force something into your life without approval. As John Locke states, “Though the earth and all inferior creatures be common to all men, yet every man has a property in his own person; this nobody has any right to but himself.” No...
Words: 559 - Pages: 3
...Name: Steve Stucots Date: 4/13/11 Professor: Frank Sive ------------------------------------------------- Operating and Configuring a Cisco IOS Device (20 points) Write a short paragraph (minimum three college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (10 points) In this lab I used the control line interface (CLI) to increase the number of lines in the history buffers, increased the inactivity timer on the console port, and stopped the attempted name resolution of mistyped commands. I also entered the logging synchronous command to synchronize unsolicited messages and debug privileged EXEC command output with the input from the CLI. Commands like these are helpful with working on Cisco devices. ------------------------------------------------- Copy and Paste the following screenshots from your Operating and Configuring a Cisco IOS Device lab below. Task 3: Change History Size to 100 lines (5 points) Task 5: Set the logging synchronous command (5 points) Performing Initial Router Setup (20 points) Write a short paragraph (minimum three college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important...
Words: 412 - Pages: 2
...Lab #1 – Assessment Worksheet Cisco Router Hardware & Software Discovery 1. What Cisco “show” command displays various information and details about the router or switch such as Model #, flash memory, RAM, IOS version and physical interfaces? Show Version 2. During the Instructor’s TELNET session to LAN Switch 1 and LAN Switch 2 – what was the captured terminal password for LAN Switch 1 and LAN Switch 2? Cisco 3. What is the size of the IOS file used for the Cisco 28xx Routers? 239Kb 4. What is the command used to enter the global configuration mode for interfaces on a Cisco Router or Switch? Router>enable 5. The default hexadecimal value of the configuration register setting for the Cisco 28xx Router is? 0x2102 6. What are the specific settings for the configuration hexadecimal value 0x2102? -ignores break -boots into ROM if initial boot fails -9600 console baud rate default value for most platforms 7. What is the key sequence used to interrupt the boot sequence of a router and initiate the password recovery sequence? Pause/Break key on the keyboard 8. Using the password recovery process how can you break the router boot sequence to see the router saved passwords and what can you do in that mode. Ctrl – C to skip to the initial setup procedure to view, change and delete passwords 9. What is the command used to back up the running-config file to TFTP? “copy running – config TFTP” 10. What process takes place...
Words: 277 - Pages: 2
...location. Core switches for each location: Cisco Catalyst 3950: * Has x2 gigabite uplink ports for a fiber connection to the Cisco core router. * Allows VLAN's, and trunking to other Cisco compatible devices. Lines for each location: This depends on what your needs are. They can be a normal T1, bonded T1's or a T3 line for increased bandwidth. You may also want to have a fail over ISDN line for redundancy reasons, and depending if you have a sever farm of not, you may need additional bandwidth. * Connection should be fiber (copper lines are more stable, but slower. Satellite is way to slow). * Connections should be T1/T3 lines, with a failover T1/T3 or ISDN line. Heres how the whole thing would play out (in a Cisco world at least): Global Network: * Each network should have a Cisco 2811, which will be the CPE of the network. * Each network should have a high speed fiber connection (type of connection will be determined on bandwidth consumption, along with need for VoIP). * Each network should have a failover line (T1/T3 or ISDN). Best practice is that both lines should be the same as the primary line. * MPLS should be used to connect all networks together, hence a third T1/T3 connection. If MPLS is not an option due to budgeting, site2site should then be used to unify file sharing between the networks. Internal network (at each location): * Cisco Catalyst switch should be used as the core switch. * There...
Words: 370 - Pages: 2
...Benefits of the Cisco Aironet 1130 AG series Access Point This series is a cost-efficient solution for a high-capacity, high-security, and enterprise-class WLAN. The device can be easily installed on walls, ceilings, and ceiling railways, with a padlock accommodation, to help prevent theft. The hardware-assisted AES Encryption provides high security without slowing performance (Cisco Systems, 2009). The power transmitions can be adjusted to allow access point coverage for different requirements. Cisco AirNet 1130AG has 15 non-overlapping channels, which provide fewer transmission errors and greater coverage. This series is available in two versions: unified or autonomous (Cisco Systems, 2009). The unified access point operates on the Lightweight Access Point Protocol (LWAPP). The device can automatically detect the best LAN Controller and download policies and automatically configures the system, so that manual intervention is not required. Cisco IOS software is required for autonomous access points and can operate with the Cisco Works Wireless LAN Solution Engine (WLSE). Using the autonomous access point will provide features and upgrades, so the business can have full advantage of the network, as requirements change. This device is certified to support IEEE 802.1x for user-based authentication, Temporal Key Integrity Protocol (TKIP) for WPA encryption, and Advanced Encryption Standard (AES) for WPA 2 encryption (Cisco Systems, 2009). These certifications also ensure interoperability...
Words: 760 - Pages: 4
...Lab 1 Assessment Questions 1. What Cisco “show” command displays various information and details about the router or switch such as Model #, flash memory, RAM, IOS version and physical interfaces? a. Show version 2. During the Instructor’s TELNET session to LAN Switch 1 and LAN Switch 2, - What was the captured terminal password for LAN Switch 1 and LAN Switch 2? b. Cisco 3. What is the size of the IOS file used for the Cisco 28xx Routers? c. 239Kb 4. What is the command used to enter the global configuration mode for interfaces on a Cisco Router or Switch? d. Router >enable 5. The default hexadecimal value of the configuration register setting for the Cisco 28xx Router is? e. 0x2102 6. What are the specific settings for the configuration hexadecimal value 0x2102? f. ignores break g. boots into ROM if initial boot fails h. 9600 console baud rate default value for most platforms 7. What is the key sequence used to interrupt the boot sequence for the router and initiate the password recovery sequence? i. Pause/break key on the keyboard 8. Using the password recovery process how can you break the router boot sequence to see the router saved passwords and what can you do in that mode? j. Ctrl – C to skip to the initial setup procedure to view, change and delete passwords 9. What is the command used to back up the running-config file to TFTP? k. “copy running – config...
Words: 279 - Pages: 2
...David Frank IT 320 Friday Homework Definitions a. Signified by a router prompt ending in “(config-if)#”. b. List of various functions provided by an IOS. c. Rudimentary OS that provides a basic interface; used for password recovery. d. Verifies hardware functionality during the boot process. e. Text entered to access privileged EXEC mode. f. Command that changes the prompt from “Router” to another name. g. Looks for and loads the IOS into RAM. h. Found inside the configuration file and tells the router the order in which to look for an IOS to boot. i. Allows a limited number of commands and no ability to enter configuration mode. j. Among other things, tells the router where to locate the IOS. k. Keeps you from having to type the same command repeatedly. l. Text-based interface that gives the user the ability to type commands on a keyboard. m. Provides a series of questions that allow the user to build a basic running configuration. n. Signified by a router prompt ending in “(config-router)#”. o. Software that runs a Cisco router. p. Text entered to access user EXEC mode. q. File that contains the entire operating system for a router. r. Allows full access to the IOS command set as well as the ability to configure the router. s. Commands entered here affect the entire router. t. Basic IOS that can be loaded if no IOS exists in flash. u. The last hex digit of the config register. Terms o IOS l command-line interface (CLI) i user EXEC mode r privileged...
Words: 704 - Pages: 3
...Introduction Course: IS3120 Week: 1 Lab: Understanding Cisco hardware The Understanding Cisco hardware lab provides you with the instructions and Cisco hardware to develop your hands on skills in understanding the output of various show commands to discover the hardware and software capabilities of a Cisco device. This lab includes the following exercises: 1) Understanding Cisco switch hardware 2) Understanding Cisco router hardware Notes As you perform the various steps of the lab, update your lab report. You will send the lab report to your online instructor for evaluation after you quit the lab. Submit the following screenshots to your online instructor for evaluation: 1) A screenshot of the output from the show version command on NYACCESS1 2) A screenshot of the show version output on NYWAN1 showing how many serial interfaces this router has These screenshots map to the evaluation criteria. Therefore, submit all screenshots to get the points assigned to all evaluation criteria. Lab Diagram During your session you will have access to the following lab configuration. Depending on the exercises you may or may not use all of the devices, but they are shown here in the layout to get an overall understanding of the topology of the lab. Internet ISP1 172.14.0.3/24 ISP2 172.14.0.4/24 172.14.0.0/24 Fas0/1 Fas0/1 Fas0/0 Fas0/0 Frame-Relay WAN NYEDGE1 Cisco 2811 Router LDNWAN1 Fas0/1 172.16.16.0/24 Fas1/0/2 Fas1/0/12 ...
Words: 3375 - Pages: 14
...How far was pre conquest England a prosperous and well governed kingdom I believe that pre-conquest England was a rather well governed and somewhat prosperous kingdom. The countries system of writs; the division of land and the hierarchy as well as the coinage, trade, towns and frequent invasions all suggest that pre-conquest England was prosperous and well-governed. However, the possible threat to the king of the Earls and the countries comparatively undeveloped economy all suggest as less prosperous, more unstable England. My opinion is that they were given a good image due to how well they dealt with the invasion of the Scandinavians and their introduction of Danegeld it showed how wealthy and organised the kingdom was and how they could deal with all that tax. The land was divided into several parts. Primarily, the realm was divided into four earldoms (Mercia, Wessex, East Anglia and Northumbria) each of which was controlled by an Earl. These Earls were incredibly powerful. Each earldom was further divided into shires (like modern-day counties) hundreds and hides. Each level of this hierarchy had its own leader / representative, such as the sheriffs managing each shire under the Earls. This system demonstrates that there was a very clear hierarchy in pre-conquest England; which would have made the country far easier to manage and well governed because each division of land would have a local lord to manage it. I believe that it shows that Britain had a well devised...
Words: 1033 - Pages: 5