Friday, January 31, 2020

Islam, Quran, Sunnah Essay Example for Free

Islam, Quran, Sunnah Essay The paper talks about the importance of the Quran and the Sunnah as the primary sources of Islamic beliefs, practices, and law, and their influence in Muslims daily life Islam. Islam is a religion that was originated when Prophet Mohammad (PBUH) began to spread the teachings of Allah (God of the followers of Islam) in the 7th century. God choose Prophet Mohammad as his last messenger and ordered the Prophet to spread his teachings and to ask everyone to believe in the oneness of Allah and the people who follow Islam are called the Muslims. Quran is the book of God that was revealed to Prophet Mohammad through Angel Jibrael and the Muslims consider the book to be a very Holy Book of God that covers each and every aspect of life and the word Quran stands for recitation. It talks about everything a human being needs to seek guidance for and it tells the right way of how to live your life. When the Quran was revealed, the language it was written in was Arabic, however, now the book is available in all translations so that people can read and understand the true context of the book well and can follow its teachings. The teachings in the Quran differentiate the right from wrong and also tell the benefits of selecting the right path and the consequences of selecting the wrong path. The Muslims who select the right path would always benefit in the world and also in the hereafter i. e. life after death. Quran does not force anyone to adopt the right or the wrong path but it does portray the negative and the positive aspects of the path the Muslims select. As mentioned above, Quran is a complete book of guidance for the Muslims and it covers every aspect of life. To further explain this, I would give some examples of what Quran speaks of. Some of the very basics that Islam as well as other religions also ask the human community to do is to always select the right path that means they should not cheat anyone, they should not lie, they should not betray anyone or should not take the sue share of another person. As said by the Quran and the Prophet Mohammad, the Muslims who will follow the teachings of Islam and implement the etchings of the Quran will always be successful in every way and the most important thing is that Allah (God) will also love such people and this would then result in the worldly reward or the reward of going to Heaven after death. When the Quran was revealed, the companions of Prophet Mohammad used to write down each and every verse of Allah and the Book was later complied and the text is still the same as it was when it was revealed. The Muslims also believe that each and every word is the Book is the word of Allah. Quran is thus very important in shaping up the life of a Muslim and is one of the primary sources of Islamic beliefs. Other than the Quran, the Sunnah is also considered to be one of the primary sources of the Islamic believes. The word Sunnah basically refers to the path that Prophet Mohammad choose to live his life and it includes the traditions he followed, his actions and words, what he practiced. Overall, it basically the way he had chosen to live his life. The Muslims follow the example of the Prophet Mohammad mainly through the Hadiths. Prophet Mohammad did each and everything God asked him to do and led his whole life always by choosing the right path. For instance, Prophet Mohammad taught the Muslims to offer prayers both individually as well as in congregation especially for the men and that is what the Muslims follow today especially on every Friday when all Muslim men go to the mosque to offer the Friday prayers. Since the time of Prophet Mohammad, people have learned how to live in a practical manner and this has been transmitted to their future generations. The Muslims also adopt the living style of the Prophet that includes his habits and style and the way he dealt with the other people. He was always considerate and caring, he always used to forgive others and he always used to be polite with others and this is what the Muslims must inculcate in themselves as well. The Quran also talks about Prophet Mohammad and has commanded the Muslims to follow what the Prophet has taught and to obey the teachings of the Prophet at all times. The significance of Sunnah is moreover also to please God by doing what His most loved Prophet did and to embrace his way of living. Both the Quran and the Sunnah therefore, play a very vital role in shaping up the life of a Muslim and so these have a great influence on the lives of the Muslim community. Work Cited Neusner, Jacob. World Relgions in America: An Introduction. 3rd Edn. Westminster John Knox Press, 2003. Swarup, Ram. Understanding the Hadith: The Sacred Traditions of Islam. 1st Edn. Prometheus Books, 2002. Voorst, Robert. E. V. Anthology of World Scriptures. 6th Edn. Wadsworth Publishing, 2007. Waqner, Walter H. Opening the Quran: Introducing Islams Holy Book. 1st Edn. University of Notre Dame Press, 2008.

Thursday, January 23, 2020

Battle of Gettysburg :: essays research papers

What was supposed to last 90 days, now dragged on for more than two years. It was apparent, now more than ever, that little was being accomplished but the taking of hundreds of thousands of lives. The war between the Union and Confederacy had been in a sort of deadlock where each side could claim victories as easy as defeats. By this time the south had the upper hand â€Å"militarily wise,† just coming off a magnificent tactical victory at Chancellorsville in May. General Lee headed the Confederacy’s, Army of Northern Virginia, General Meade headed the Union’s Army of the Potomac. Both sides saw the need to win that one, crucial victory to turn the tide completely in their favor. They would get their chances at a small town in Pennsylvania. The battle was dubbed the Battle of Gettysburg for the town of Gettysburg, PA.   Ã‚  Ã‚  Ã‚  Ã‚  By June of 1863 General Lee asked President Davis to march his army north out of VA. Davis granted Lee permission. Lee, with 75,000 troops, made his way north, just west of the Blue Ridge Mountains into Maryland. Lee made haste in doing so. He wanted the advantage to set up a defensive position forcing the Union to attack him there. His troops went from town to town for food and supplies. On June 28th they crossed into Pennsylvania and toward Gettysburg. Upon arrival about a mile northwest of town, Colonel Buford’s cavalry unit met Lee’s III Corps headed by General Hood. Much to his disappointment his troops had began to fight without his acknowledgement. Meanwhile, the Army of the Potomac was hot on Lee’s heels but marched east of the Blue Ridge so as not to be detected. Meade with 100,000 men would arrive piece by piece in the next two days from the south of town.   Ã‚  Ã‚  Ã‚  Ã‚  The battle was inevitable and it began here in a little known farm town. Both sides knew that Antietam was just a prelude, a year earlier, to the carnage which was to come. General and soldier alike could see what was unraveling. These armies saw a similar scenario the first time Lee brought his army north.   Ã‚  Ã‚  Ã‚  Ã‚  Many reasons can be attributed to why General Robert E. Lee wanted to lead his troops into hostile northern territory. He knew he would be vastly outnumbered and without support.   Ã‚  Ã‚  Ã‚  Ã‚  One reason was that for 2 years now Virginia was being destroyed do to battle and armies.

Tuesday, January 14, 2020

Quiz 3 Questions and Answers Essay

1. You are installing a network card in a computer that has several devices configured. There is a printer on LPT 1, a mouse on COM 1, a modem on COM 2, and a SCSI host adapter occupying IRQ 10. The computer also has a sound card using IRQ 5. If your network card supports IRQs 3 through 5 and 9 through 11, which of the following IRQs could you set it for in this computer? IRQ7 IRQ3 IRQ10 None of these IRQ4 IRQ5 2. A 100BaseVG network is build on a ______ topology with all computers attached to a hub ring mesh all of these star bus 3. Your network is experiencing heavy traffic and signal attenuation due to long cable distances between computers. Required Result: Correct the signal attenuation problem. Optional Desired Results: Reduce the broadcast traffic that is present on your network. Filter the network traffic to reduce the number of frames transferred across the network. Proposed Solution: Install repeaters between distant segments. Install routers and configure them to filter broadcast traffic. Which results does the proposed solution produce? The proposed solution produces the required result but does not produce any of the optional desired results.. The proposed solution produces the  required result and produces only one of the optional desired results.. The proposed solution does not produce the required result. The proposed solution produces the required result and produces both of the optional desired results. None of these 4. In a Token Ring frame the ______ field indicates whether the frame is a token frame or a data frame. none of these Access Control error checking priority media type 5. Cables attach the individual clients and serves to the MSAU that works like other ____________ hubs switch active passive bridge none of these 6. A token is a special type of ____________ that circulates around a cable ring data transmission frame or packet electrical signals none of these serial signals 7. Managing data on a network depends on traffic control. The set of rules that governs how network traffic is controlled is called: Channels Layers Interface Drivers. Access Methods. 8. You are considering starting a training company that provides on-site classroom instruction to various businesses. Your service will include a temporary networked classroom environment. Assuming that the facilities do not have pre-installed wiring and that the classroom will use 10 or less computers, which topology would require the least equipment and be the easiest to set up and tear down. [Choose the best answer] Star. All of these Ring. Mesh Bus. 9. With the demand-priority access method, the ____________ manage network access by doing round-robin searches for requests to send from all nodes. none of these users routers gateways hubs 10. CSMA/CD is known as a ____________ access method because computers on the network compete for an opportunity to send data poling parallel contention sequential priority 11. Ethernet can use several communication ____________ including TCP/IP protocols data paths channels applications media 12. Typically, the hub of a 10BaseT network serves as a multiport ________. 13. The 100BaseTX topology runs on UTP Category ________ data-grade cable 5 1 2 4 3 14. Because single-segment 10Base2 Ethernet limits would be too confining for a large business, ____________ can be used to join Ethernet segments and extend the network to a total length of 925 meters (about 3035 feet). none of these 4 repeaters 5 repeaters 2 repeaters 3 repeaters 5-4-3 rule The thinnet 5-4-3 rule: 5 segments, 4 repeaters, and 3 populated segments 15. Wi-Fi Wireless networks use _________ access method. Demand priority Token Bus CSMA/CA CSMA/CD Token Ring 16. Access methods prevent ____________ access to the media. preemptive None of these slow random simultaneous 17. A standard ethernet network can combine as many as ____________ cable segments connected by four repeaters, but only three segments can have stations attached. 6 none of these 3 4 5 18. A 10Base5 topology is also referred to as ____________. standard ethernet 802.3 Thicknet all of these 19. Token passing is deterministic, meaning that a computer cannot force its way onto the network as it can in a ______ environment CSMA/CD Polling Demand priority CSMA/CA Switching 20. Which type of network media-access method do IBM LANs with Multistation Access Units employ? CSMA/CA. CSMA/CD Beaconing Token passing. None of these 21. The trailer of a packet contains the destination address False True 22. In the IBM implementation of Token Ring, a star-wired ring, the actual physical ring of cable is in the ________. MSAU all of these none of these hub Repeater 23. When using the CSMA/CA access method, a computer waits until the network is quiet and then transmits its data. If two computers transmit at the same time, the data will collide and have to be re-sent. If two data packets collide, both will be destroyed. False. True 24. Ethernet relies on the ____________ access method to regulate traffic on the main cable segment CSMA/CA CSMA/CD all of these Token Ring Demand Priority 25. MSAUs were designed to sense when a ________ fails and to disconnect from it. Hub Cable NIC Network Computer CPU 26. Which access method is used, when each computer communicates only with a hub. The hub then controls the flow of data a. CSMA/CD b. CSMA/CA. c. Token Bus. d. Token Ring e. Demand priority c only a only both c and d e only b only d only 27. With data masses divided into _______, individual transmissions occur more frequently so that every computer on the network has more opportunities to transmit and receive data. bits messages frames or packets files bytes 28. In a packet, the header usually contains an error-checking component called a CRC True False 29. Which access methods is used, when each computer must wait to receive a token before it can transmit data. Only one computer at a time can use the token. a. CSMA/CD b. CSMA/CA. c. Token Bus. d. Token Ring e. Demand priority both c and d c only e only d only both a and b 30. A Token Ring network is an implementation of IEEE standard ____________. 802.4 802.2 802.11 802.5 802.3 31. Which of the following network access methods sends a signal indicating its intent to transmit data on the wire? [Choose the best answer] CSMA/CD Token passing. Beaconing CSMA/CA. None of these 32. If you must configure a network for three mission-critical servers and want to provide a highly fault-tolerant cabling scheme, which topology would you implement? [Choose the best answer] Star. Bus. Mesh None of these Ring. 33. With the token-passing access method, only one computer at a time can use the token; therefore, there are no _______. broadcastings contentions collisions all of these collisions and contentions 34. A packet (frame) components are grouped into sections: _________. CRC data header all of these trailer 35. When an IBM Token Ring network is full, adding another ____________ can enlarge the network MSAU all of these repeater Hub 36. With CSMA/CD, if there is data on the cable, no other computer may ____________ until the data has reached its destination and the cable is clear again transmit and receive none of these receive transmit 37. With more traffic on a CSMA/CD network, ____________ tend to increase, slowing the network down broadcasting all of these transmissions collisions unicasting 38. Fast Ethernet is another name for the ____________ topology 100BaseX all of these 100BaseFX 100BaseT4 100BaseT 39. The 10BaseT topology is an Ethernet network that uses _________ cable to connect stations Coaxial UTP and STP STP UTP Fiber 40. Packets (Frames) may contain session-control codes, such as error correction, that indicate the need for a ______. unicast recall stop transmission retransmission broadcast 41. Your network is experiencing heavy traffic and signal attenuation due to long cable distances between computers. Required Result: Correct the signal attenuation problem. Optional Desired Results: Reduce the broadcast traffic that is present on your network. Filter the network traffic to reduce the number of frames transferred across the network. P roposed Solution: Install repeaters between distant segments. Which results does the proposed solution produce? The proposed solution produces the required result and produces both of the optional desired results. None of these The proposed solution does not produce the required result. The proposed solution produces the required result but does not produce any of the optional desired results.. The proposed solution produces the required result and produces only one of the optional desired results. Check with Prof 42. Which of the following is most likely the problem if the operating system is unable to detect the network card? (Choose the best answer) Wrong frame type is set on the network card Wrong IRQ is set on the network card Wrong IRQ is set on the IDE controller card Wrong protocol is bound to the network adapter 43. Wireless networks use _______ topology mesh all of these star bus ring 44. In the demand-priority access method, transmissions are not ____________ to all other computers on the network multicast routed unicast all of these broadcast 45. When a frame returns to its sending computer, that computer ____________ the frame and puts a new token back on the ring. copies writes reads removes none of these 46. Every network interface card sees all packets sent on its segment, but it interrupts the computer only if the packet address matches its individual address True False 47. Typically, Ethernet is a baseband architecture that uses a _________topology all of these star mesh bus ring 48. The maximum length of a 10BaseT segment is ____________ meters 138 1000 500 250 100

Monday, January 6, 2020

Blind Spots, By Max H. Bazerman And Ann E. Tenbrunsel

When humans hear the term â€Å"blind spots,† they often have a flashback to an event in life where they were driving and attempted to merge into another lane. Typically there are two outcomes from this event: the neighboring driver honks to alert that there is an impending car accident or that accident actually occurs. The same can be said for ethical decisions where humans often do not know they are making a decision with ethical implications. Unfortunately, there is usually not another person to honk at us alerting of the impending danger. The book Blind Spots, by Max H. Bazerman and Ann E. Tenbrunsel, explores these blind spots which pervade ethical decision making for individuals, organizations and society. Throughout the book, the authors offer various areas of day-to-day life where unethical gaps thrive and they offer mechanisms to understand and manage these gaps. Often, unethical human behavior is not intentional, but is coincidentally based on boundaries such as individual knowledge, organizational unanimity, and societal acceptance of policy. On an individual level, although unbeknownst to the individual, humans make decisions based on the best outcomes for themselves, which may result in unintentional and unethical degradation of a fellow human. Further, an organizational setting will compound individual ethical dilemmas as internal groups working together seek acceptance through groupthink, which is the tendency of a work group to come to an agreementShow MoreRelatedThe Ethics Of Blind Spots You Are Given A Lot Different Scenarios Where Both Max H. Bazerman And1057 Words   |  5 PagesWithin Blind Spots you are given a lot different scenarios where both Max H. Bazerman and Anne T. Tenbrunsel test your own ethical values and how you handle them under high pressure situations. What Bazerman and Tenbrunsel are trying to explain and make clear is how we all have blind spots in our ethical point of views. They begin by alerting us of our ethical blind spots so that we are aware of them. They depict the gap between who we want to be and the people we actually are. Anne T. TenbrunselRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesPoint/Counterpoint Employer–Employee Loyalty Is an Outdated Concept 87 Questions for Review 88 Experiential Exercise What Factors Are Most Important to Your Job Satisfaction? 89 Ethical Dilemma Bounty Hunters 89 Case Incident 1 Long Hours, Hundreds of E-Mails, and No Sleep: Does This Sound Like a Satisfying Job? 90 Case Incident 2 Crafting a Better Job 91 4 Emotions and Moods 97 What Are Emotions and Moods? 98 The Basic Emotions 100 †¢ The Basic Moods: Positive and Negative Affect 100 †¢ The