Saturday, December 28, 2019

Understanding Communicative Competence

The term communicative competence refers to both the tacit knowledge of a language and the ability to use it effectively. Its also called  communication competence, and its the key to social acceptance. The concept of communicative competence (a term coined by linguist Dell Hymes in 1972) grew out of resistance to the concept of linguistic competence introduced by Noam Chomsky. Most scholars now consider linguistic competence to be a part of communicative competence. Examples and Observations Why have so many scholars, from so many fields, studied communicative competence within so many relational, institutional, and cultural contexts? Our hunch is that scholars, as well as the contemporary Western societies in which most live and work, widely accept the following tacit beliefs: (a) within any situation, not all things that can be said and done are equally competent; (b) success in personal and professional relationships depends, in no small part, on communicative competence; and (c) most people display incompetence in at least a few situations, and a smaller number are judged incompetent across many situations.(Wilson and Sabee) By far the most important development in TESOL has been the emphasis on a communicative approach in language teaching (Coste, 1976; Roulet, 1972; Widdowson, 1978). The one thing that everyone is certain about is the necessity to use language for communicative purposes in the classroom. Consequently, the concern for teaching linguistic competence has widened to include communicative competence, the socially appropriate use of language, and the methods reflect this shift from form to function.(Paulston) Hymes on Competence We have then to account for the fact that a normal child acquires knowledge of sentences not only as grammatical, but also as appropriate. He or she acquires competence as to when to speak, when not, and as to what to talk about with whom, when, where, in what manner. In short, a child becomes able to accomplish a repertoire of  speech acts, to take part in speech events, and to evaluate their accomplishment by others. This competence, moreover, is integral with attitudes, values, and motivations concerning language, its features and uses, and integral with competence for, and attitudes toward, the interrelation of language with the other code of communicative conduct.(Hymes) Canale and Swains Model of Communicative Competence In Theoretical Bases of Communicative Approaches to Second Language Teaching and Testing (Applied Linguistics, 1980), Michael Canale and Merrill Swain identified these four components of communicative competence: (i) Grammatical competence includes knowledge of phonology, orthography, vocabulary, word formation and sentence formation.(ii) Sociolinguistic competence includes knowledge of sociocultural rules of use. It is concerned with the learners ability to handle for example settings, topics and communicative functions in different sociolinguistic contexts. In addition, it deals with the use of appropriate grammatical forms for different communicative functions in different sociolinguistic contexts.(iii) Discourse competence is related to the learners mastery of understanding and producing texts in the modes of listening, speaking, reading and writing. It deals with cohesion and coherence in different types of texts.(iv) Strategic competence refers to compensatory strategies in case of grammatical or sociolinguistic or discourse difficulties, such as the use of reference sources, grammatical and lexical paraphrase, requests for repetition, clarification, slower speech, or problems in addres sing strangers when unsure of their social status or in finding the right cohesion devices. It is also concerned with such performance factors as coping with the nuisance of background noise or using gap fillers.(Peterwagner) Resources and Further Reading Canale, Michael, and Merrill Swain. â€Å"Theoretical Bases Of Communicative Approaches To Second Language Teaching And Testing.† Applied Linguistics, I, no. 1, 1 Mar. 1980, pp. 1-47, doi:10.1093/applin/i.1.1.Chomsky, Noam. Aspects of the Theory of Syntax. MIT, 1965.Hymes, Dell H. â€Å"Models of the Interaction of Language and Social Life.† Directions in Sociolinguistics: The Ethnography of Communication, edited by John J. Gumperz and Dell Hymes, Wiley-Blackwell, 1991, pp. 35-71.Hymes, Dell H. â€Å"On Communicative Competence.† Sociolinguistics: Selected Readings, edited by John Bernard Pride and Janet Holmes, Penguin, 1985, pp. 269-293.Paulston, Christina Bratt. Linguistics and Communicative Competence: Topics in ESL. Multilingual Matters, 1992.Peterwagner, Reinhold. What Is the Matter with Communicative Competence?: An Analysis to Encourage Teachers of English to Assess the Very Basis of Their Teaching. LIT Verlang, 2005.Rickheit, Gert, and Hans Strohner, edi tors. Handbook of Communication Competence: Handbooks of Applied Linguistics. De Gruyter, 2010.Wilson, Steven R., and Christina M. Sabee. â€Å"Explicating Communicative Competence as a Theoretical Term.† Handbook of Communication and Social Interaction Skills, edited by John O. Greene and Brant Raney Burleson, Lawrence Erlbaum Associates, 2003, pp. 3-50.

Friday, December 20, 2019

The Capitalists Who Shaped Post-Civil War America - 956 Words

Accurately established by many historians, the capitalists who shaped post-Civil War industrial America were regarded as corrupt â€Å"robber barons†. In a society in which there was a severe imbalance in the dynamics of the economy, these selfish individuals viewed this as an opportunity to advance in their financial status. Thus, they acquired fortunes for themselves while purposely overseeing the struggles of the people around them. Presented in Document A, â€Å"as liveried carriage appear; so do barefooted children†, proved to be a true description of life during the 19th century. In hopes of rebuilding America, the capitalists’ hunger for wealth only widened the gap between the rich and poor. During the 1800’s, business leaders who built†¦show more content†¦As the capitalists continued their corruption, â€Å"the wealthy class became wealthier; but the poorer class became more dependant. The gulf between the employed and the employer was g rowing wider† (Document A). Similarly, many actions performed by these capitalists, contributed to the sorrowful lives of many farmers, who were struggling to survive. Pursuing this further, the rich soil of the West was becoming poor, and floods contributed to the problem, and, eventually caused erosion. Beginning in the summer of 1887, a series of droughts forced many people to abandon their farms and towns. As circumstances worsened, farmers were beginning to be controlled by corporations and processors. The farmers were at the mercy of many trusts, which, in turn, could control the productivity and raise prices to high levels. Furthermore, during the late 19th century, many farmers considered monopolies, trusts, railroads, and money shortages as evident threats to their lifestyle. The rise of these monopolies and trusts worried many farmers because they felt that the disappearance of competition would lead to erratic and unreasonable price rises that would harm consumers. Oftentimes, these â€Å"robber barons† would prevent competitors from reaching the markets by restricting their ability to transport their goods. In Document E, James B. Weaver wrote of the main weapons of the trust-organized commerce: threats, intimidation, bribery, fraud,Show MoreRelatedThe Role of Capitalists Essay1267 Words   |  6 PagesNick  Reynolds   12/4/14   U.S  History   G  Block   The  Role  of  Capitalists  DBQ   Many  capitalists  worked  to  shape  post  Civil  War  America  through  building  new   businesses  to  employ  many  people  and  create  new  jobs  as  well  as  change  America  through   creating  new  inventions  such  as  a  faster  and  cheaper  way  of  producing  steel  and  discovering   the  uses  and  increasing  demand  for  oil.  All  of  these  inventions  would  change  America,  with   the  faster  and  more  efficient  method  of  steel  production  massive  skyscrapers  rose  in  the  Read MoreThe Cold War Developed Between The Soviet Union And The United States847 Words   |  4 PagesThe Cold War developed between the Soviet Union and the United States in response to post-World War II tensions between the two nations. The U.S. and the U.S.S.R. emerged from World War II as the only two countries able to propagate their specific social and political systems on a global scale. With expansive capitalist (United States) or communist (USSR) ideologies and powerful military forces, each nation feared and distrusted the other. This cultural clash resulted in mutual suspicions, propagandaRead MoreThe Cause For The Vietnam War1442 Words   |  6 PagesAmong the causes for the Vietnam War are the Western fear of communism, the remnants of nineteenth-century colonialism, and tensions caused by World War Two and the Cold War, but these causes c ould easily have been circumvented and the Vietnam War prevented. As is often the case with wars, one of the most influential factors in the causation of the Vietnam War was fear, especially fear of communism and social upheaval. The anti-communist policies of Western culture had the greatest direct influenceRead MoreThe United States is a Nation of Immigrants Essays1658 Words   |  7 Pages Today the United States of America is regarded as a global economic leader. The standard of living in the U.S. is higher than that of most other nations. Our nation is considered an economic super-power. Economic needs have often caused Americans to seek immigrants as workers, and economic opportunities have attracted foreigners. The United States is a nation of immigrants. Our nation has been shaped by successive waves of immigrants who have played major roles in our changing economy. TheRead MoreOliver Cox s Views On Racism And Race Prejudice1804 Words   |  8 Pagesto the policies and attitudes of the leading capitalist people, who are the white people of Europe and North America (322). To support his claim that racist ideology did not develop until the rise of capitalism, Cox uses the Greeks and the Romans as evidence. The Hellenic Greeks had a cultural, not a racial, standard of belonging in their society (323). Their society was divided between Greeks and barbarians; th e barbarians consisted of all persons who did not possess and live in the Greek cultureRead MoreA New Age Of Post Modernity Essay1582 Words   |  7 Pagespostmodernity Post modernity or post modernism as coined during the counter culture era of the 1960s and 70s has been highly contestant, ever since it was first used describe the death of modern architecture and art during the same period. It is this debate of being in a state of modernity or post modernity that will lead me to describe the shifts in cultural, economic and political views and values that demonstrates a shift in values from modern to post modern views sociy. This shift to post modernityRead MoreThe World Problems Of North America1516 Words   |  7 PagesWords are powerful. When the average person in North America hears the term ‘first world’ or the phrase ‘first world problems’ it’s merely a way of classifying our world, and is not that deep. For many, ‘first world’ refers to countries that are advance and are leading the rest of the world such as Canada and the US. Conversely, many people would refer to many countries in Africa as â €˜third world.’ ‘First world problems’ is an expression people from the first world nations use to complain about nonsensicalRead MoreThe World Politics And The Ones Obscured By It1984 Words   |  8 Pagespolitics and the ones obscured by it. It looks into how elements like Free trade, Internationalism, Theory of Democratic Peace, Security Co-Binding have shaped global politics and how the idea of liberal and illiberal fights been obscured in the realm of global politics. The essay is concluded with a gist of how post-cold war liberalism has shaped the west and is responsible in engaging the world in a liberal order. Introduction When we look back and try to comprehend history in order to make anRead MoreCia:Central Intelligence Agency. The Cia Is Responsible1751 Words   |  8 Pages CIA: Central Intelligence Agency. The CIA is responsible in providing nation-wide security in the US. FRG: Federal Republic Germany. The FDR is known as West Germany. This is due to fact that after World War II, Germany was separated into four areas. GDR: Germany Democratic Republic. GDR is known as East Germany. This is the response by the Soviet Union, after tension with the western powers to administrate their inhabited zone. ICBM: Inter-Continental Ballistic Missile. The ICBM’s were firstRead MoreA Historical Perspective: The Wage Gap1586 Words   |  7 Pagesa supportive, home oriented role within society, outside of the workplace. However, as the mid-twentieth century approached a gender role paradigm occurred. The sequence of the departure of men for war, the need to fill employment for a growing economy, a handful of critical legal cases, the Black Civil Rights movement seen and heard around the nation, all greatly influenced and demanded social change for human and women’s rights. This momentous period began a social movement known as feminism and

Thursday, December 12, 2019

Survey of Privacy and Security Issues †Free Samples to Students

Question: Discuss about the Survey of Privacy and Security Issues. Answer: Introduction The security aspect of any website plays a vital role in every sphere. The data involved in the website as in the database should be kept secured and kept active all the time. Americas job link is a web based portal that is mainly used by people to connect with organization in order to get a job. The company revealed that their system was hacked which actually lead to fault in the code of application (Fennelly, 2016). This report puts lime light on the whole scenario and deals with the aspect that how and why the situation occurred and what could have been the possible solution. The website was formed in order to achieve jobs and help people to get job. The company reported that the hacker was able to hack the website would immediately lead to fault in the application code of the website. The criminal was able to get all the personal information of nearly 4.8 million job seekers which included mainly their full name, birth date and security number related to social. The activity took place in the year 2017. The person who had given all the related information before the attack was eventually lost and they had to again give the information in order get the proper intended result. The activity was uncovered in the ten states that mainly used the Americas job link system. Some of states that were in the list are Arkansas, Delaware, Idaho, Kansas, Oklahoma and Vermont (Fonseca Rosen, 2017). Possible solution to the problem It can be noted that almost all the times it has been seen that majority of the website security breaches are mainly not done in order to get the data and use them for the personal benefit of the hacker, but the main motive behind the attack is that they intent to use the server in order to send emails relay for spam or in order to set up a web server which would be temporary in order to serve files which are of illegal nature (Cutinha et al., 2017) There can be many ways in order to protect the website or in this case possible solution of the event. Keeping all the software up to data and installing all the security patches available in order to keep all the data secured. Validation should always be done both from the servers end as well as from the browsers end. The aspect of password plays a vital role in securing any account. The user should always keep a complex password which cannot be easily detected by any other person. The password should always be stored as encrypted values ; this can be done by implementing a one way hashing function for example SHA. Using this method means with the prospective of the user authenticating users, the user only ever comparing the encrypted values (Dadkhah, Borchardt Lagzian, 2017). Uploading a file in a website, in this case uploading the bio data should be believed to be the most important aspect which can be directly related to website security breach, even if it is merely done to change an individuals avatar. Opening a file or reading a pdf or using any sort of function which can be done in order to check the image size are not at all proof (Patel Pathrabe, 2017). There are many tools which are available that can be used in order to safe guard a website. The tools are as follows Netsparker: This is good for testing SQL injection and XSS. OpenVAS: It is claimed to be the most advanced source which is considered as open software. The main advantage that can be received by this is that it is good for testing known as vulnerability, currently which scans over 25000. On the other hand its set up is difficult as it requires a OpenVAS server which only run on linux system (Ramayah et al., 2016) SecurityHeader.io: A tool which can be used to report quickly which security headers such as CSP and HSTS a domain has correctly configured and enabled. Conclusion The security aspect of any website can be considered as one of the most important aspects. There is usually a huge amount of data which is stored in a database; in case a breach is performed by a hacker on the system it could lead to a big problem even the website could be on harm. The security aspect can be employed in the field which can be directly implemented and taken advantage of. The hacker intends to breach in order to gain benefit for their personal issue but with the implementation of the security features it can be avoided. References Cutinha, S., Rodrigues, S., Sanjay, P., Supreetha, R. (2017). Connectify-A Social Networking Website. Advances in Computing, 7(2), 35-39. Dadkhah, M., Borchardt, G., Lagzian, M. (2017). Do You Ignore Information Security in Your Journal Website?. Science and engineering ethics, 23(4), 1227-1231. Fennelly, L. (2016). Effective physical security. Butterworth-Heinemann. Fonseca, B., Rosen, J. D. (2017). Introduction. In The New US Security Agenda (pp. 1-15). Springer International Publishing. Patel, P. P. R. P. V., Pathrabe, T. (2017). Survey of Privacy and Security Issues in Spice World E-Commerce Website. Ramayah, T., Ling, N. S., Taghizadeh, S. K., Rahman, S. A. (2016). Factors influencing SMEs wQebsite continuance intention in Malaysia. Telematics and Informatics, 33(1), 150-164.

Wednesday, December 4, 2019

Hospitality Management for Restaurant Services - MyAssignmenthelp

Question: Discuss about theHospitality Management for Restaurant Services. Answer: Critical Evaluation: The survey result showed that the reception and the restaurant services were the best services that were provided by the hotel. 54% and 40% of the respondents said that the reception service was very good and good respectively. For the restaurant, it has been found that 67% people said it was very good and 33% said good; while none of them said that is was not good. This clearly shows that reception and the restaurant are the best part of the hotel. In terms of the room service and housekeeping, mixed reactions have been observed. 18% of the respondents said that the service is good while 31% said it was not good. Therefore, it can be said that room servicing is not up to the mark. The entertainment arrangement is also good and it has been found that 84% of the respondents said that it was very good (Refer to the appendix). None of the respondents said that it was not good. Some of the non respondents could have been asked to respond by providing them certain incentives that would ha ve been lucrative for him and they would have answered the query. With this evaluation, it can be said that the hotel has good facilities in terms of the reception, tours, seaside and entertainment which clearly states that if one visits this place for recreational purpose, it would be the best selection. However, in terms of room servicing and housekeeping, the management needs to make consideration on improving the service of this sector. Suitable Customer Service Strategy: As it has been evident that the two departments, the room servicing and housekeeping and the tours department need to be improved; for the same reason, the hotel needs to undertake certain management strategies. As stated by Torres and Kline (2013), room servicing add value to the hotel and it increases the loyalty of the customers and thus, a hotel should always focus on the room servicing. The strategies that the hotel would undertake are: Making service No. 1 priority: There should be enough staffs available for the service of the guests. It shall be the duty of the staffs to make the guests feel special. Training the staffs: It is very important to train the staffs and teach them the right way to treat customers. It has to be understood that it is only when the customers would find it comfortable enough; they would use the service of the hotel again (Kim and Qu 2014). Improving the tour: Assigning a manager for this department would be the best possible approach towards improving the tour department of the hotel. The manager shall be in the responsibility of taking care of the overall activities. The managers would be involved in the process. The manager shall be responsible for communicating the entire strategy with the staffs of the hotel. References: Kim, M. and Qu, H., 2014. Travelers' behavioral intention toward hotel self-service kiosks usage.International Journal of Contemporary Hospitality Management,26(2), pp.225-245. Torres, E. and Kline, S., 2013. From customer satisfaction to customer delight: Creating a new standard of service for the hotel industry.International Journal of Contemporary Hospitality Management,25(5), pp.642-659.