Thursday, October 31, 2019

School Playgrounds Essay Example | Topics and Well Written Essays - 750 words

School Playgrounds - Essay Example The more dynamic modern play has more emphasis on adaptations and innovations. While encouraging inter-ethnic friendship and a vibrant oral culture, break time gives children the chance to explore the boundaries of their gendered experience within a safe conservative environment. Children ought to have the right to play and to choose what they play, which gives them a chance to put their dreams into action. The loss of play for fun has resulted to disillusionment and depression. The absence of challenge in the 'remodeled' playgrounds limits creativity, explorations, practice and fosters the development of attitudes that imply shying off from the face of challenges and taking risks. "It is through play that children explore their environment encountering numerous challenges to personal competence that involve decisions for risk-taking behavior" as argued by Jambor (1986). This freedom denial has not only resulted to the absence of fun but also risks the social health of the children. Break time is important for academic achievement, a more healthy development and maturity of peer relations and for general school adjustment. The reasons for limiting play and the increased adult supervision are inclined on affording more time for academic excellence, fears of developing negative peer relations and aggression by providing the children chances to exhibit antisocial behavior. (Pellegrini and Blatchford: 2002) The exposure to physical dangers while children play under trees, in tackling games, playing within school buildings, jumping off playground equipment or playing in wet areas must be controlled and guided. Conflicts and petty squabbles can arise, teasing and name calling, taunting and bullying and even violent incidents such as the murder of a British Asian boy in a Manchester Secondary School playground showing that violence, possibly racially motivated could erupt in playgrounds. Concerns also arise with students' behavior that could arise over the break and spill over into the school. (Blatchford: 1989) Break time has a positive 'educational value' in the sense that the longer children work on standardized tasks with no break the less attentive to the task they become and so breaks facilitate improved attention and focus on learning in the academic program (Pellegrini: 2005) This can be explained by the massed vs. distributed practice theory which explains that breaks inserted between periods of intense work help distribute effort and increase cognitive performances. (Bjorklund and Pellegrini: 2000). The playground at break time is the place where pupils interact on their own with minimal adult interference and they consider this time significant and enjoyable. Here, they play and meet friends in cooperative interaction involving governed games with their peers. Games are particularly important at the commencement of the school year when peers are not familiar with each other, but the knowledge of the rules of some common game forms the basis for interaction after which they become familiar which results to an interaction in the other domains. (Pellegrini and Blatchford: 2002) During recess periods, students learn to resolve conflicts, solve problems, negotiate, and work with others without adult intervention and also serves as a developmentally appropriate strategy for reducing

Tuesday, October 29, 2019

Dynamic Host Configuration Protocol (DHCP) Research Paper

Dynamic Host Configuration Protocol (DHCP) - Research Paper Example â€Å"However, defining an addressing system and setting up the correct address on each workstation and server is far from trivial. Dynamic Host Configuration Protocol can be a great help.† (Richards, 1997, p. 11). The address assignment of machines on a network is a core issue of network administration and management and is considered a major cost contributor in managing client server environments. There are two options available to network administrators, either they may address each machine on the network themselves, or they may go for a DHCP server to assign IP addresses to all requesting hosts on the network. A DHCP server has a pool of assignable IP addresses and depending on the implementation may also have a pool of IP addresses to be assigned to the restricted users on the network. The address assignment process of DHCP Server, normally called the Lease Process, is an important part of understanding how actually DHCP work and how it can be troubleshoot in case of an a ddress assignment problem. The first step of Lease Process is a DHCP Discover request from a client, which is broadcasted on the network to locate a DHCP server.

Sunday, October 27, 2019

Development of Computer Technology

Development of Computer Technology Nowadays we can hardly see people live without either a desktop computer, a laptop or even a tablet. As we are moving towards a technology free-world era, our lives are literally revolve around technology and technical devices. Technology advancement has no doubt successfully ease people’s life. They have made things function in a more simpler and systematic ways. Imagine an accountant who has pile and pile of paperwork and storing them using the traditional ways? In order to able access old files, these accountants have to search for many files in their archives for ages. However, with the help of computers, these accountants only required to key in their file code, and they can easily retrieve the old files which they required. Hence, the creation of computers in the mid-70s has contributed a lot to the society whereby able to simplify the everyday task of everyone. The term computers is being defined as how a person able to perform numerical calculations with the aid of a computing mechanical devices (Oak, 2011). In the mid-70s, the pivotal objective in creating a computer is to tackle the future paperless office culture, and thus to make the interaction between people and the digital documents easier (Holmquist, 2005). According to Holmquist (2015), the first computer was created in Xerox PARC research lab. However, the computers that we are using todays have been evolved through many generations. Most of us not even realized that the first computer – Abacus, was created in 2400 BC by John Napier (Oak, 2011). The computers which created in the first generation are normally created using vacuum tubes, hence computers in this generation are normally expensive and bulky (Oak, 2011). In the second generation, vacuum tubes computers are replaced by transistor (Oak, 2011). Computers which are created by transistors are smaller and cheaper, and thus they are more energy efficient (Oak, 2011). However, computers build with transistors tend to release a lot of heat from the computers (Oak, 2011). Computers in the third generation are built with integrated circuits, which then evolved to computers that are built with silicon chip in the fourth generation (Oak, 2011). In the fifth generation, more and more evolution have been took place and now it is still continuously developing (Oak, 2011). Hence, in the light of completing the task of this assignment, the product that I would like to choose to enhance is laptop computers. The laptop computer that I have chosen to make modification is Acer Aspire V5 laptop series. The model which I have chosen is Aspire V5-431. The reason I chose this series of laptop computer is because this design of this laptop is nice, and laptop also comes with a reasonable price where everyone is able to afford to purchase. This motto of the design of this series of laptop is â€Å"thin, light and charismatic† (Acer, 2014). The size of this laptop is 23mm in height, 342mm in width, and 245mm in depth (Acer, 2014). The weight of this laptop is approximately 2.10kg (Acer, 2014). According to Acer (2014), the operating system of this laptop is â€Å"Linpus Linux†, processor’s manufacturer is â€Å"Intel†, the processor type is â€Å"Celeron† with the processor model of 1007U and the processor speed is 1.50GHz. This series of laptop possess â€Å"Dual-core† processor core. Besides that, this series of laptop possess 2GB memory which can maximize to 8GB (Acer, 2014). The memory technology which is being used in this laptop is DDR3 SDRAM (Acer, 2014). This laptop only have 2 memory slots, and it also possess memory card reader (Acer, 2014). The type of memory card which can be read by this laptop are MultiMediaCard (MMC) and Secure Digital (SD) (Acer, 2014). Moreover, the hard drive capacity of this laptop is 500GB with a hard drive interface of â€Å"Serial ATA†, and it also has a DVD writer (Acer, 2014). The screen size of this laptop is 14†, the display screen type is â€Å"Active Matrix TFT Color LCD† with HD screen mode and LED backlight technology (Acer, 2014). The screen resolution is 1366 x 768, Intel is the graphic controller manufacturer, and the graphic controller model is HD graphics (Acer, 2014). The graphic memory technology which is being used is DDR3 SDRAM (Acer, 2014). The network and communication of this laptop is using IEEE 802.11a/b/g/n for wireless LAN standard, Gigabit Ethernet for Ethernet technology, and the Bluetooth standard is 4.0+ HS (Acer, 2014). The built-in devices for this laptop are webcam and microphone (Acer, 2014). This laptop also equipped with HDMI interfaces, 3 USB ports (two USB 2.0 ports and one USB 3.0 port), and an Acer converter port (Acer, 2014). The input devices for this laptop are touchpad and keyboard (Acer, 2014). The type of battery use for this laptop is 4-cell Li-ion battery with a battery capacity of 2500 mAh, and the maximum battery run time is 4 hour (Acer, 2014). There are certain features I would like to add to this model, they are stylus pen, built-in printer and scanner, as well as using finger print to log in to laptop. With these features being installed in this laptop, this laptop will be suitable to be used by all kind of people. For example, it can bring benefits to businessmen, as they often required to print and scan important documents. Besides businessmen, even students or all class of people also able to benefit from using this laptop. Apart from that, with these features even all age range of people also can benefit from these features. 1. Stylus Pen Due to nowadays laptop possess touch screen, hence, it is wise to have a stylus pen being installed in this model of laptop. For instance, stylus pen made signing for documents, painting, drawing, and sketching easier (eBay, 2013). Moreover, for people who used to draw draft will be easier when using stylus pen. This is because stylus pen allow us to precisely do drafting. Moreover, for businessmen who always travel for business may find it useful because they can draw at any place and any time (Market Press Release, 2012). In fact, Matulic (2012) suggests that this innovation able to gain huge public acceptance. 2. Built-in printer and scanner Apart from the stylus pen, another new features that I propose to be added are built-in printer and scanner. This because for travel type of businessmen, it will be extreme troublesome for them to search for a print shop in a city which they are not familiar with. Though they are familiar with the city they are travelling, it is also difficult for them to find a printer shop in the middle of the night. Moreover, it also easier for them to print urgent documents at any place (Idea Storm, 2014). With the built-in scanner, it is easier for them to scan company documents which they have verified or signed to the recipient. These features able to save a lot of their time. 3. Use fingerprint to log in to laptop With lot of scam and fraud cases happened everyday, it is wise to use fingerprint to log in to laptop. With all the booming security issues, it is hopefully that with the install of fingerprint reader, this security issues could be tackle. The sole reason I propose this new feature is because everyone’s fingerprint is unique. No one has the same fingerprint. Hence, except the owner of the laptop, no one can have access to the laptop. Most of the time we will only lock our laptop using self-created password, however, password can be hacked (Berg, 2012). It means that by locking our laptop using password is very vulnerable. Besides that, using biometric password also bring benefit to people who often have trouble in remembering their self-created password (Burleson Consulting, 2014). Moreover, Heckle, Patrick Ozok (2007) study suggest that there are 88 percent of respondents say that using fingerprint to tackle personal security issue is very useful. The old features of this laptop actually should all be maintained. This is because people nowadays always like to bring their portable laptop computers everywhere they go, so that they will be able to do their work on the go. Besides that, there are analysts suggested that the demand for laptop computers in the emerging markets are still booming (King, 2011). According to King (2011), the market share for the demand of laptop computers have jumped approximately as much as 5.1 percent. The originally built-in features of this laptop – i.e. webcam and microphone, as well as the touchpad will still be maintained. For webcam, there are still people who used it to have video conferencing or teleconferencing. Besides that, microphone also comes in handy for people who are conducting video communication or telecommunication (Herman, 2009). For example, people who are using Skype in order to be able to communicate with their opponents will still require both of the webcam and microphone (Sherman, 2014). Lack of one of the tools above – i.e. webcam and microphone, will disable their medium of communication. Besides that, as for the touchpad, the creation of touchpad is to replace the use of a mouse. Since laptop is a portable computer, the creation of touchpad has saved the users a lot of energy in carrying an extra mouse (Crowder, 2014). Moreover, touchpad able to solve ergonomic issues, whereby users will feel more comfortable compared to the use of a mouse in a long term period (Hartman, 2014). Hence, the originally built-in features – i.e. webcam and microphone, as well as the touchpad should be remained. Moreover, the DVD-writer should not be removed, though it is kind of old school. However, there are still times we required to install computer’s software programs or games through DVD. Indeed Apple did release an iMac with no optical drive, as indicated by Apple’s senior vice president of worldwide marketing – Phil Schiller, in their product release conference in June 2010, by dropping the optical drive able to save more power consumed by the iMac (Zibreg, 2012). However, there are still users who find that without the installation of an optical drive on their laptop will be troublesome, as they cannot install software programs or games or play movie from CD or DVD, instead they need to download them all from the internet (The Answer Bank, 2014). So, what if the users have trouble in receiving the internet conception due to the place they are staying? Hence, I find that there are no more other features that should be removed from this laptop computer. The featur es or functions that are with this laptop are all serve their purpose in making this laptop computer to be aligned with the theme as â€Å"portable†. The principles that will be adopted in designing this new generation of laptop computers are technology acceptance model (TAM) and the six philosophy of Steve Jobs. 1. Technology Acceptance Model (TAM) First of all, what is technology acceptance model or TAM? TAM actually is the being extended from the theory of reasoned action (TRA) (Davis, 1986). The TRA suggests that the intention of an individual will have the impact in affecting one behavior (Park del Pobil, 2013). TAM is being used to explain the factors which able to affect one to use IT technology (Davis, 1989, 1993; Davis, Bagozzi Warshaw, 1989). In TAM there are five elements being tested, they are perceived ease of use (PEOU), perceived usefulness (PU), attitude (AT), intention to use (IU), and external variables (EV) (Park del Pobil, 2013). PEOU is how one perceive that the use of technology is effortless; PU is how one perceive that the use of technology able help them to solve their problem; both PEOU and PU as well as the external variables such as age or gender have the ability to influence one’s attitude towards technology (Park del Pobil, 2013). In the study conducted by Park del Pobil (2013), their study conform that these five elements possess the ability in influencing their acceptance on technology. 2. Six philosophy of Steve Jobs As Kuang (2011) identified, the key principles for Steve Jobs to design a product are â€Å"craft†, â€Å"empathy†, â€Å"focus†, â€Å"impute†, â€Å"user-friendliness†, and â€Å"simple†. According to Steve Jobs, though no one will ever find out what is inside the laptop, but it is important for the designer to craft the best elements to their consumers (Kuang, 2011). Hence, it is important for the designer to be empathy with the end users’ needs, then the designer should focus on to make the end users’ needs meet (Kuang, 2011). Impute is the first impression that the end users gain from the first glance of the product. Therefore, it is important for the designer to deliver the product in a professional manner in order to gain the positive impute from their potential consumers. Besides that, the product should be designed in a way that it is user friendliness (Kuang, 2011). This is because, if the first impression that the end users gain from the first glance of the product is uncomfortable and complicated. This â€Å"perceived† feeling will draw them for not purchasing the product, because it is not user friendliness. In spite of having the product being designed in a user friendly way, the product should also be designed in a way whereby the end users will feel that it is â€Å"simple† (Kuang, 2011). Simplicity is also one of the important elements for the end users to decide whether they should purchase the product or not. In short, the key principles that should be adopted in designing the new generation computers should possess both the elements from TAM as well as the key principles from Steve Jobs. Though there are plenty of principles that can be adopted, but I find that both the elements from TAM as well as the key principles from Steve Jobs are very useful in guiding one to design a product which able to gain wider public acceptance. In summary, as we are moving towards a technology free-world era, our lives are literally revolve around technology and technical devices. Technology advancement has no doubt successfully ease people’s life. They have made things function in a more simpler and systematic ways. In order to accomplish this assignment, the laptop computer that I have chosen to make modification is Acer Aspire V5 laptop series. The model which I have chosen is Aspire V5-431. The reason I chose this series of laptop computer is because this design of this laptop is nice, and laptop also comes with a reasonable price where everyone is able to afford to purchase. The features that I would like to propose to be added to this laptop computer are stylus pen, built-in printer and scanner, as well as using finger print to log in to laptop. With these features being installed in this laptop, this laptop will be suitable to be used by all kind of people. However, I find that the old features that are with this laptop computers should all be remained. As these old features do serve their purpose in making the laptop computer as a whole. There two principles which I have adopted in designing this new generation laptop computer. They are the five elements from TAM – i.e. perceived ease of use (PEOU), perceived usefulness (PU), attitude (AT), intention to use (IU), and external variables (EV), and the six principles from Steve Jobs in designing computer products.

Friday, October 25, 2019

Bedstones Gentrification Essay -- Papers

Bedstone's Gentrification Firstly I feel it would be a very sensible idea to write down my definition of gentrification, as at the end of the day that is what this coursework is about. "Conversion and renovation of redundant farm buildings into dwellings or different crafts by changing the structure (faà §ade) of them to get it up to date, essentially modernisation. This is often done by wealthier people moving in from the outside community and results in a raise of the settlements' socio-economic status, i.e. the community goes from a working class one into a middle class one due to people moving in. Also there is a change of a villages' function\ purpose to its community." However, has Bedstone undergone gentrification at all? Yes, I feel it has and by quite a considerable degree. Using my definition above I will investigate the many factors involved to come to an intelligent decision. Bedstone originated as an agricultural functioned village and the local area was covered with working farms. The population was also quite large, much more than it is today (at its highest in 1821 it was 165). This is backed by the variety of industry that was stationed here in the late 19th and early to mid 20th century. The village population was able to support a diary (1876- approx 1940's), a school until the 1940's, an inn until the 1930's, a blacksmith and a carpenter. The village used to be a bustling agricultural village, which through time has slowly diminished. Numbers have fallen steadily to the present day and is only now are they starting to grow. Now the village is solely a residential functioned village with no shops, inn, .. ... relatively new resident of the village has told me of further developments around the village indicating further gentrification and growth of the village. Unfortunately this further development will bring many problems with it, too numerous to mention and it is unclear what the future holds. However what is clear is that gentrification has happened in Bedstone and to a considerable degree, which hopefully has been shown. Bedstone has been through the whole process of gentrification of conversion and renovation of buildings, a rise in its socio-economic class, as well as a massive influx of people from the outside community. The trend is still going strong and I see no reason why the factors just mentioned won't continue far into the future. We should ask ourselves however, what does the future hold for Bedstone?

Thursday, October 24, 2019

Life of Pi †Significance of Color Essay

A woman once said, â€Å"There is no life without color. † This is just the case with the main character of â€Å"The Life of Pi†, Pi Patel. Pi is a cast away on a lifeboat in the middle of the Pacific Ocean with a tiger, an orangutan, a hyena and a zebra. There is one color that was mentioned multiple times throughout the story, the color orange. In the novel â€Å"Life of Pi† by Yann Martel, this color is used as a symbol for hope and survival. To hope means to wish for something with expectations of its fulfillment. Pi’s case is a pristine example of hoping for something. He has many instances when he gains hope throughout the novel, including building a raft, landing on the island, or even finding the food in the locker of the lifeboat. The most important, is the hope Pi is given through his companion on the lifeboat, Richard Parker, a four hundred and fifty pound Royal Bengal tiger. Being the color orange, the tiger becomes an example of hope throughout the book. Pi realizes, to keep himself, Richard Parker, and the will to survive alive, he must tame the tiger. â€Å"I had to tame him. It was at that moment that I realized this necessity. It was not a question of him or me, but of him and me. We were, literally and figuratively, in the same boat. We would live–or we would die–together. † (Martel, 164) Keeping Richard Parker alive would allow Pi to constantly remember that he is not the only one suffering and he has someone there for him, whether he can answer or not. Although Pi has many reasons to be hopeful, the author gives the reader reasons as well. Prior to the scene of the sinking of the Tsimtsum, an interviewer and reporter that is talking to Pi about the sinking of the ship describes visiting Pi later in life at his home in Canada. He meets Pi’s family and mentions that Pi’s daughter, Usha, holds an orange cat. â€Å"Leaning against the sofa in the living room, looking up at me bashfully, is a little brown girl, pretty in pink, very much at home. She’s holding an orange cat in her arms. † (92) This scene guarantees the reader that the end result of the story and Pi’s life will be not total tragedy. Pi has a life where he has been successful and has children of his own. While in the middle of the Pacific Ocean, Pi’s only goal was to survive. Items on the boat and religion truly gave him this will to survive, and Pi was more capable of surviving with them in his presence. While on the lifeboat, Pi has an orange life jacket with an orange whistle, an orange buoy, a bright orange tarpaulin, and a four hundred and fifty pound Bengal Tiger. Pi is thrown on the lifeboat by Chinese men with a life jacket already on him. â€Å"One of the men interrupted me by thrusting a life jacket into my arms and shouting something in Chinese. I noticed an orange whistle dangling from the life jacket. (105) The life jacket is used by Pi in constructing a raft to have a safe place away from Richard Parker, and the whistle is used by taming the large tiger. He utilizes his bright orange survival equipment to stay alive and keep away from Richard Parker. For most of the voyage they take on the lifeboat, Richard Parker remains under the tarpaulin, even from the beginning. After Pi is pushed overboard into the lifeboat, he says â€Å"I couldnâ⠂¬â„¢t see Richard Parker. He wasn’t on the tarpaulin or on a bench. He was at the bottom of the boat. † (106) Richard Parker having orange fur, is a symbol of survival. He keeps Pi alert and continuously reminds him of his situation. Religion played a big part of Pi’s life, and he prayed three times a day every day while he was on the boat. His family’s religion is Hinduism, and orange is the color of the second Hindu chakra, which are believed to be centers of the body from which a person can collect energy in the religion. Throughout his entire journey, he was always in contact with something that was the color orange, and that is why it becomes a symbol of survival. Every item and detail of his trip aids him in survival, and is part of the outcome of him being rescued. The color orange will always be remembered by Pi and readers as the color of hope and survival. The color gives readers hope for Pi and gives Pi the will to survive because of the possessions that are that color. The items Pi has on the boat all aid in his miraculous survival, just as Richard Parker and the religions he practices provides a measure of emotional support. These help the young boy maintain hope in this horrific tragedy. But above all, the orange color of survival and hope will always be known as the color that kept him alive.

Wednesday, October 23, 2019

Psychology: the Affects of Violent Video Games

Gavin Hoy PY102 Prof. Martin The Affects of Violent Video Games Video games haven’t been around for long, but they are heavily impacting the youth of America. As the years go by, video games become more realistic, and more violent. The first video game was bouncing a ball in between two paddles, which hardly seems amusing, couldn’t possibly have a violent effect on a child. Today, games have blood, decapitations, and guns and weapons all that look real and make the child feel like a real police officer, or a real criminal, or whichever character they are in that particular game.Research suggests that violent video games make children more aggressive, and violent in everyday situations. Also, children are likely to use one of their characters in a video game as a role model for them, and try to be like he or she while reenacting what their character does in the game. This article interests me because as a kid, I was allowed any video game I desired, and turns out I am no more aggressive then a bus driver.This paper will present two different articles that say I should be aggressive and try to reenact video games. The first article I read about violent video games was: â€Å"I wish I were a warrior: The role of wishful identification in the effects of violent video games on aggression in adolescent boys† by Brad Bushman. Bushman states that boys, when trying to figure out their own identity, tend to take shape of those identities in their video games (e. g. superhero police officer or a hero of some sort) Bushman also explains that the children with lower education are the ones who will express more aggression and violence in everyday life after playing a violent video game. (Bushman â€Å"I wish.. †). Bushman confirmed his hypothesis: â€Å"violent video games are especially likely to increase aggression when players identify with violent game characters† meaning, if a child plays a violent video game, they are likely to take o n the traits of that main character, including the violence.Bushman let 112 boys around 15 years of age play four different types of video games. Violent-realistic, violent fantasy, nonviolent-realistic, and nonviolent fantasy. The boys, after playing one of the games, were then set up with a partner of the same sex and started a â€Å"competitive reaction time task† (Bushman â€Å"I wish†¦Ã¢â‚¬ ), the task was to push a button, when told to do so, as fast as they could, the boy who lost would receive a blast of noise through their headphones.Each boy chose their partners punishment level for not winning the task, they set the level of noise their partner would receive if he lost. Of 25 trials with the reaction time task, 12 boys who played violent video games gave their partner a level 10 noise blast, even though the boys knew a level 10 will damage their hearing, one boy was quoted saying â€Å"I blasted him with Level 10 noise because he deserved it. I know he can get hearing damage, but I don't care! (Bushman â€Å"I wish†¦Ã¢â‚¬ ). So, the boys who played violent video games expressed a great deal more aggression towards their partner in the reaction time task, which confirms Bushman’s hypothesis. Out of the boys who played to nonviolent video games, they did not give their partner a high noise blast, which demonstrates low levels of aggression. I personally did not like this article, the results were hard to interpret and statistics were irrelevant to my purpose for reading the article.I think the article could be a quarter of the size it is and still be effective. The article uses too many abbreviations it expects the reader to 1) understand, and 2) remember once they were told about them. I think the article provided little information where it counted (e. g. statistics that matter, not the decibel level of the noise blasts (irrelevant)). This article should be revised, restructured, and scaled down for future psychology stu dents.

Tuesday, October 22, 2019

The Effects of Facebook on Filipino Teenagers Essay Example

The Effects of Facebook on Filipino Teenagers Essay Example The Effects of Facebook on Filipino Teenagers Essay The Effects of Facebook on Filipino Teenagers Essay CHAPTER I INTRODUCTION Background of the Study Communication is one of the most important things for us to live in this world wherein people express different views, opinions and viewpoints about the current issues in our lives (Thompson, 1967). It is important because of the fact that there are billions of people living in this world and it is very impossible for us to communicate with others simultaneously. And for that reason, different modes of communication are invented and innovated. One of the most, if not the only, used form of communication today is through the use of our internet. From your internet, you can access incredible amounts of information including texts, graphics, audio and video. You can search databases at the Library of Congress, view masterpieces by Michelangelo, take an aerial tour of the Philippines, or dissect a virtual frog. You can send email, receive electronic newsletters and â€Å"chat† with others online. This is a new medium in education requiring strategies and new learning is happening increasingly using an interconnection of networks that links together millions of computers worldwide. The internet, according to Visual Basic 6: Proficiency in Application Development, is a huge system of voluntary linked networks with millions of documents, records, databases and variety of information. It can be referred to as the â€Å"information superhighway†. That is why it is one of the most accessible forms of information gathering and dissemination. But internet in our generation is not just simply for researching, emailing or chatting purposes. This is also a form of interactive socialization with our family, friends and even to the people we are not familiar to. This is the wonderful world of social networking sites; and the most famous of them all, FACEBOOK. Facebook is a social network service and website launched in February 2004 that is operated and privately owned by Facebook, Inc. The users may create a personal profile, add other users as friends and exchange messages, including automatic notifications when they update their profile. Furthermore, users may join common interest user groups, organized by workplace, school, or college, or other characteristics. The name of the ervice stems from the colloquial name for the book given to students at the start of the academic year by university administrations in the US with the intention of helping students to get to know each other better. Facebook allows anyone who declares them to be at least 13 years old to become a registered user of the website (www. wikipedia. org). Here in our country alone, according to Lim of Sun Star Cebu, the Philippines ranks eighth among the countries in the world with the most number of Facebook users. In fact, in September last year, there were only 4,832,040 Facebook users in the country, putting the Philippines in 13th place in the world in terms of number of users, said Vera Files trustee Luz Rimban during a seminar-workshop last week at Waterfront Cebu City Hotel and Casino. But the number of Filipinos on Facebook continues to rise and helps the Philippines keep its position as the fifth largest in the world’s leading social networking site. Facebook analytics company SocialBakers reports that, as of Feb. 2011, there are now 22,515,820 Filipinos on Facebook. This means 1. -million Filipinos signed up on Facebook in a month and represents an increase of seven percent from 20,802,540 in Jan. 2011, as reported by Philippine tech company Yehey! , also citing SocialBakers. (Cruz, 2011) As what was said in the definition of Facebook, it originated for the sole purpose for teenagers, college students in particular, to be familiar to their new environment and as well as their n ew classmates. During the first day of classes, college students have this â€Å"culture shock† because they see that everything is new: new school, new classrooms, new teachers and new classmates. If one is not that independent, they might be nauseous and not enter their classrooms anymore. They feel that way because they seem to realize that they do not know anybody from the room and it’s like everyone’s watching your every move once you enter the class. This might be the initial reaction that we feel, but as soon as we start introducing ourselves to our seatmate and eventually our classmates, we tend to build friendship during the first day and probably the very last thing that we want to know is his/her number or Facebook account. This is the first step to friendship. Next, we chat with them and ask about the given requirements of the professors, though we knew about it, just to have conversation. The nature of these social exchanges is characterized by either one-on-one or one-on-many communication scenario. Bryant and Oliver (2009), found out that people who are shy but wish to be social were able to develop a closer and more satisfactory relationship with others online, compared to those who are characterized by high shyness/low sociability, low shyness/high sociability. Other scholars’ finding suggests that only when online relationships were built on shared interests or sincere disclosure of one’s true self, then a healthy and perhaps lasting relationship could potentially flourished. Other scholars’ finding suggests that only when online relationships were built on shared interests or sincere disclosure of one’s true self, then a healthy and perhaps lasting relationship could potentially flourished. Indeed, teenagers learn that friendships must be kept through effort and behavior that indicates a commitment towards preserving the relationship and satisfying the relational needs of both partners. For example, Oswald and Clark (2003) found that when transitioning to college, high school best friends experience decreased satisfaction, commitment, rewards, and investments with increased costs and alternatives. However, students who maintained their best friends from high school during their first year in college reported engaging in more maintenance behaviors positivity, supportiveness, self-disclosure, and interaction – than students in best friendships that did not survive the transition to college. Although maintaining high school best friendships required increased effort, partners reported benefits such as reduced social loneliness. Accordingly, a need exists to explore how relationship maintenance strategies are utilized in various venues to enable the survival of various teenage relationships during the college years. The Internet’s ability to aid in the maintenance of relationships has been noted (McKenna Bargh, 2000). The Internet might be an especially useful tool for college students who report using email and instant messenger to communicate with friends and preserve feelings of intimacy and closeness (Cummings, Lee, Kraut, 2006). ). Online social networking sites have also become increasingly popular venues for young adults to interact and build profiles that â€Å"((re)present their public persona (and their networks of connections) to others† (Acquisti Gross, 2006, p. 2). Facebook, allows members to create personal profiles that portray their identity through information such as their interests, favorite activities, religious affiliation, political orientation, jobs, relationship status, and even users can post pictures, videos and communicate with their friends by leaving message on each photo. Through the existence of social networking sites especially the Facebook, people, most especially the students, are able to establish and maintain friendship not just through personal contact, but also through the cable wires of new technology, the technology of FACEBOOKING. CHAPTER II REVIEW OF RELATED LITERATURE This chapter includes the purpose of the literature review, a review of the literature on the effects of subliminal advertising on moralities of the Filipinos, subliminal messages, perceptions and other literature sources. The chapter highlights human effects of the advertising research review. Purpose The purpose of the study has been demonstrated or to show the effectiveness of subliminal messaging and advertisement to prime individual responses and stimulate mild emotional activity. It often based them on the persuasiveness of the message. We suggest that subliminal messages have an effect when the messages are goal-relevant. This chapter presents the review related research of how the said study affects to the children and high school students who spend most of their time watching television. The literature about the personal message, effects of the advertisement and relationship learned after watching the videos, to the primary and secondary students. Also concluded that â€Å"the cultural implications of subliminal indoctrination which is a major threat to human rights throughout the world†. Meaning of Subliminal Advertising In previous conducted research of prominent figures in the mass society, it had been keyed in that Subliminal Advertising has massive effects on the society especially to those who had been greatly exposed to it. The advertising industry, a prominent and powerful industry, engages in deceptive subliminal advertising, which most us are unaware of. By bypassing our unconscious mind using subliminal techniques, advertisers tap into the vulnerabilities surrounding our unconscious mind, manipulating and controlling us in many ways. Since the 1940s, subliminal advertising blossomed until now, when you can find subliminal in every major advertisement and magazine cover. Legislation against the advertisers has had no effect in curbing the use of subliminal. In this Information Age, it seems people are no longer in control of the people. The ones in control are the ones with knowledge (as usual). In this case, the advertisers have it; you dont. Subliminal Messages A subliminal message is a signal or message embedded in another medium, designed to pass below the normal limits of the human minds perception. These messages are unrecognizable by the conscious mind, but in certain situations can affect the subconscious mind and importantly, the unconscious mind, and can negatively or positively influence subsequent later thoughts, behaviors, actions, attitudes, belief systems and value systems. The concept subliminal is archaic, although it is in daily use. The main problem is its necessary bound to the idea of a well-defined perceptual threshold, a concept now in disuse by the first appearance of the signal detection theory into cognitive sciences. However, well remain to use this term, (so as the word trance in the field of hypnosis), due to the fact that it is deep-rooted in the minds of both public and the scientists. The isolated term means below a threshold, however there is no clearly defined threshold to sensory perception. Indeed, there are many different perceptual features processed and detected before they are brought to our awareness, with the assistance of our attention. This makes the concept highly flexible in what and how we can integrate perceptual impressions into our awareness. In scientific usage, we can call a stimulus subliminal only if it is faint enough, brief enough, or somehow cannot stimulate the senses enough to induce us to notice its presence, yet subsequent tests can register its presence. But, a more scientifically accurate word for this concept would be slightly perceptible. The mainstream meaning of the word subliminal is any effect that influences our perception from outside of our awareness. Subliminal Stimuli It could be any sensory stimuli below an individuals absolute threshold for conscious perception. Visual stimuli may be quickly flashed before an individual may process them, or flashed and then masked, thereby interrupting the processing. Audio stimuli may be played below audible volumes, similarly masked by other stimuli, or recorded backwards in a process called back-masking. Subliminal perception This occurs whenever stimuli presented below the threshold or limens for awareness are found to influence thoughts, feelings, or actions. The term subliminal perception was originally used to describe situations in which weak stimuli were perceived without awareness. In recent years, the term has been applied more generally to describe any situation in which unnoticed stimuli are perceived. The concept of subliminal perception is of considerable interest because it suggests that peoples thoughts, feelings and actions are influenced by stimuli that are perceived without any awareness of perceiving. One way is simply to ask observers whether or not they are â€Å"aware† of a stimulus. If the observer denies any awareness, then the stimulus is, by definition, below an awareness threshold. Using this approach, unconscious perception consists of demonstrating that observers can be affected by stimuli whose presence they do not report. Another way to define awareness† involves require observers to distinguish between two or more stimuli that are presented successively. With fast exposure durations, observers may be unable to distinguish between stimuli, or between a stimulus’s presence and absence. Effect of Subliminal Advertising on the moralities of Filipinos According to the research psychologists, subliminal messages do not produce a powerful, enduring effect on behavior but to the research laboratories, it reveals little effect beyond a subtle, fleeting effect on thinking. Subliminal is a term commonly used to actually mean several distinct types of hidden messages. Artistically or Blatant concealed messages suggestive of instinctual drives Images of contrived social exchanges and explicit body language briefly or faint flashed images or words Metaphor or other hypnotic patterns acoustically backward messages or masked in music songs Of all these various types of subliminal effects, psychologists refer only to the flashed words or pictures, and the acoustic masking of a message, when they discuss about subliminal or marginal perception. Putting it in other words, the scientific experimenters involved in research into subliminal priming agree that it do exists, however they are of the opinion that it consists of relatively fleeting and weak effects of mainly theoretical interest. This is probably true of unconscious lexical priming. However, according to the research on the effects of subliminal perception, the most effective are words and pictures that are flashed in between video scenes and subliminal messages embedded in songs. These were found to be really powerful stimuli that have certain psychological effects, which mean this technology does have the ability to affect the psychological state of a person. Experts also found that the psychological effects of subliminal advertising are quite temporary, though very real. This is why for subliminal suggestions to be successfully persuasive; they have to be applied repeatedly and regularly until the desired action is achieved. Another finding is that unlike other advertising techniques marketers use, subliminal happen to be the only ones that have the power to influence behavior, albeit indirectly. Whether all of these elements has an unconscious influence is rather a matter of empirical evidence, however whether there are effective influences is a matter or more investigation. Lumping all these elements together into a main category with faint and brief messages used in psychology experiments indeed makes it impossible to select things like social influence, emotional appeal, suggestion, preconscious processing, and associative conditioning. Subliminal lexical priming It is the influence of flashed words on subsequent words in a multiple choice test. It lasts about 90 milliseconds and it does not influence the next trial or the next experiments. All subliminal lexical priming is the result of a flashed picture on basic preferences in a choice test, and it is more robust. This is known as the simple exposure effect†. Some variations of the simple exposure effect have been proven to achieve emotional areas of the brain, specially the amygdale, without conscious awareness. This is probably some kind of classical conditioning of feelings and memories without conscious awareness. It begins to enter into the area of something that can be produced into propaganda messages, especially if it is used as reinforcement. Subliminal psychological activations are one of the main methods, or at least the most intriguing. All subliminal stimuli enter into our dreams and waking pictures in a disturbed way, it influences later recalls and perceptions, and remarkably it even can influence our social acting. But, it is indeed the most difficult to prove, presumably because its main feature is that it is the most vulnerable to individual differences and the mental states of the recipients, besides the vagaries’ of individual interpretations of results. The most efficient methods in practice imply both unconscious and conscious elements; both coordinated to appeal to emotions and exploit natural information processing way and common biases, as well as carry our unconscious thinking processes in a determined way. Becoming somehow aware of subliminal effects generally reduces the influence of these, in both the exposure and psychological experiments. The whole combination of unconscious and conscious elements is carefully coordinated, however not duplicated (conscious elements are not transformed into unconscious). The main reason why these methods are effective, compared to others relying or emphasizing on hidden pictorial messages, is due to the fact that hidden messages influence the feelings and thinking of test subjects, but they do not cause behavior, at least they dont do it by any known effect. The subliminal influences behavior indirectly, principally by influencing perception, feeling and thinking. Conscious thinking triggers and organizes behavior, even though some aspects of behavior are not conscious, such as the main details of some movements or the expression of nonverbal communication. Also hypnosis research has proven that compulsions and illusions can be created through simple suggestion under special conditions with particular people, without awareness of the source. These hypnotic suggestions are highly limited by the main expectations of the test subject, the relationship established with the hypnotist, or the characteristics of the situation. The higher are the expectation, the more the subject can be controlled, or the greater their sense of practice the more involuntary they conduct their response. It is the degree to which messages can produce a similar type of dissociated control that is at the main point of the most potential threat of subliminal persuasion. Without the expectancy factors that make suggestion effective, it is quite difficult to see how the comparison can be made. Unless they are tailored to the individual, there is no evidence of any elaborate effect from preconscious processing of hidden messages, or that they are worth following as an aid to ads. Achieving this type of effect through a combination of subliminal messaging and hypnotic means is a theoretical possibility under some conditions. At issue is the problem of creating the cooperative relationship needed for it, creating the expectancy that we can be controlled, and the differences in the way individuals respond to suggestion. The threat of subliminal influence seems quite limited at this time due to the weak reinforcement of messages, however the combination of effects can be hard to determine. A message employing subliminal methods, like any one, can often have effects on the listener depending on their psychological needs and mind. CHAPTER III METHODOLOGY This chapter focuses on the method of research used, the methods in collecting our data, the sampling design performed, its statistical treatment and likewise the procedure. Method of Research For this kind of research, the best method to use is the descriptive method. It is because the study focuses on the effects of subliminal advertising to the morality of High School students. In a descriptive research, the question â€Å"what is? † is to be answered. Now, we have to know the perception of High School students when it comes to subliminal advertising. Once the respondents give their answers, the researchers will be able to analyze whether subliminal advertising has an effect on the morality of High School students. Methods of Collecting Data There are a lot of means of collecting data for the research and this time the researchers made use of two methods: questionnaire and interview. First, questionnaire is so far the most convenient and most reliable source of collecting data. High School students both from public and private schools are the target respondents for this research. Questionnaires will be istributed if the target respondent is in a hurry. The second method used in this research is the interview. Besides the questionnaire, interviews were conducted while the researchers show a video of a sample advertisement with subliminal message and then ask them some questions about the video and how it affected them. As much as possible, all students from all year levels in High School (both private and public) must be part of th e research to be fair. Sampling Design For the sampling design, this research made use of purposive sampling. It is because the focus of the study is High School students only. The respondents are randomly selected according to their year level and only 10 per year level are to be selected. The purposive sampling aims to focus on a particular group of people related to the study. In this case the High School students are gathered to be prospective respondents. Procedure To be able to accomplish this research, the researchers gathered High School students from the public and private schools. From each year level, the researchers will gather 10 students so there will be 40 respondents all. Because we are to interview both public and private High School students, for the sake of impartiality, for each level, there will be 5 students from public and likewise 5 students from the private schools. On the questionnaire part, the researchers will show a video commercial with subliminal message and give them the questions. It will also be in a form of interview because after the questionnaire, if they still have time, they will be asked few questions about the topic. It will then be recorded by the interviewer. If the needed respondents are already satisfied, then they will proceed to the organization of results, the analysis, interpretation and the conclusion and recommendation. References: selfgrowth. com/experts/eldon_taylor. html Eldon Taylor, Official Guide to Subliminal Messages Subliminal Learning selfgrowth. com/subliminal. html http://sites. google. com/site/feorillodemeterio/thefilipinostructureofmorality Personal development articles From A. E. Kazdin (Ed. ), Encyclopedia of Psychology (Vol. 7, pp. 497-499). New York: Oxford University Press, 2000. Eagle, M. 1987. â€Å"The Psychoanalytic and the Cognitive Unconscious. † In Theories of the Unconscious and Theories of the Self, edited by R. Stern. Hilledale, N. J. : Analytic Press. Greenwald, A. G. , E. R. Spangenberg, and J. Eskenazi. 1991. Double-blind tests of subliminal self-help audiotapes. Psychological Science, 2:119-122. - -. 1988. Subliminal auditory tapes: An evaluation. Psychology Marketing, 46: 355-372. Merikle, P. , and H. E. Skanes. In press. â€Å"Subliminal Self-help Audiotapes: A Search for Placebo Effects. Journal of Applied Psychology. Moore, T. E. 1982. Subliminal advertising: What you see is what you get. Journal of Marketing, 46: 38-47. - . 1988. The case against subliminal manipulation. Psychology Marketing, 46:297-316 Cruz, Tonyo. (2011, February 16). Philippines 5th biggest Facebook nation: Users up 1. 7m in a month. http://asiancorrespondent. com/48544/ph-is-5th-biggest-facebook-nation-users-up-by-1-5m- in-a-month/ Lim, Cherry Ann T. (2010, February 13). RP has 8. 38M Facebook users. Sun. Star Cebu sunstar. com. ph/network/rp-has-838m-facebook-users