Friday, January 24, 2020

Internet Copyright Laws Essay example -- essays research papers fc

Internet Copyright Laws A student comes home to his dorm at the University of Scranton after a rough day of classes. With the quick internet connection provided on the school’s network, the student makes a few clicks and logs into Morpheus, a program that enables music fans to download free music. Within a few minutes he is on his way to owning an unlimited amount of songs at no cost. Everything this student is doing is legal, right? Wrong. The downloaded music from the internet is copyrighted material. Today’s internet is considered an â€Å"information superhighway,† a device where anything from music, books, programs and information can be shared worldwide. Since billions of people have the ability to access the internet, the content of the internet can be difficult to regulate. One controversy which has risen because people can transmit and share information broadly via the internet is that of copyright infringement. Arguments over the rights to property on the internet have been heated. For example, Napster (similar to Morpheus) was sued for providing software that enabled internet users to download music at no cost. Since the internet is a device that is used worldwide, copyright laws should exist to protect people who own copyrights so their civil liberties are not infringed upon. Because the internet is sometimes considered unregulated, users often assume that the law does not apply to its use. Widespread misuse of people’s intellectual property via the internet occurs because of this belief, though anyone can access the internet. Since the   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   number of people who have the ability to access the internet is so high, laws that are made to protect people’s publications in other media should also apply to protect them on the internet. Copyrights that protect products can sometimes be confusing to understand. The simplest way to identify copyright infringement is to question if the copyright is handed over with the product. For example, if a person owns a compact disc and lets a friend borrow it, the compact disc i... ...material is under copyright laws. However, while in court, it was thought the publications could be of public domain. The courts decided that the information was not an infringement and returned the confiscated property to Wollershiem and Penny. Copyright laws exist to protect the ownership of material. Where the material is located should not void the copyright. If copying property is for personal use, than a problem should not exist. If a person starts to make money or distribute the copied material, then a problem with copyright laws will arise. In this case, the provider of the material will be at fault. With the arrival of the electronic age, the internet will be another place where copyright laws are needed, and must be enforced; The internet cannot be free and unregulated. Whether it is a tape in a stereo, or a religious hoax on the internet, copyright laws must exist and be upheld to protect individuals from infringement of their property rights. Bibliography: Knowledge and Identity in the Electronic Age. Richard Fearer; McGraw-Hill, 1998. 124 131. Who owns digital works. Scientific American Publication. Ann Okerson; October 13, 2002. 37-41.

Thursday, January 16, 2020

Assembly Language

ASSEMBLY LANGUAGE An assembly language is a low-level programming language for a computer, microcontroller, or other programmable device, in which each statement corresponds to a single machine code instruction. Each assembly language is specific to a particular computer architecture, in contrast to most high-level programming languages, which are generally portable across multiple systems. Assembly language is converted into executable machine code by a utility program referred to as an assembler; the conversion process is referred to as assembly, or assembling the code.Assembly language uses a mnemonic to represent each low-level machine operation or opcode. Some opcodes require one or more operands as part of the instruction, and most assemblers can take labels and symbols as operands to represent addresses and constants, instead of hard coding them into the program. Macro assemblers include a macroinstruction facility so that assembly language text can be pre-assigned to a name, and that name can be used to insert the text into other code. Many assemblers offer additional mechanisms to facilitate program development, to control the assembly process, and to aid debugging.HISTORY OF ASSEMBLY LANGUAGE Assembly languages date to the introduction of the stored-program computer. The EDSAC computer (1949) had an assembler called initial orders featuring one-letter mnemonics. Nathaniel Rochester wrote an assembler for an IBM 701 (1954). SOAP (Symbolic Optimal Assembly Program) (1955) was an assembly language for the IBM 650 computer written by Stan Poley. Assembly languages eliminated much of the error-prone and time-consuming first-generation programming needed with the earliest computers, freeing programmers from tedium such as remembering numeric codes and calculating addresses.They were once widely used for all sorts of programming. However, by the 1980s (1990s on microcomputers), their use had largely been supplanted by high-level languages, in the search for improved programming productivity. Today assembly language is still used for direct hardware manipulation, access to specialized processor instructions, or to address critical performance issues. Typical uses are device drivers, low-level embedded systems, and real-time systems. Historically, a large number of programs have been written entirely in assembly language. Operating systems were ntirely written in assembly language until the introduction of the Burroughs MCP (1961), which was written in ESPOL, an Algol dialect. Many commercial applications were written in assembly language as well, including a large amount of the IBM mainframe software written by large corporations. COBOL, FORTRAN and some PL/I eventually displaced much of this work, although a number of large organizations retained assembly-language application infrastructures well into the '90s. Most early microcomputers relied on hand-coded assembly language, including most operating systems and large applications.This was because these systems had severe resource constraints, imposed idiosyncratic memory and display architectures, and provided limited, buggy system services. Perhaps more important was the lack of first-class high-level language compilers suitable for microcomputer use. A psychological factor may have also played a role: the first generation of microcomputer programmers retained a hobbyist, â€Å"wires and pliers† attitude. In a more commercial context, the biggest reasons for using assembly language were minimal bloat (size), minimal overhead, greater speed, and reliability.Typical examples of large assembly language programs from this time are IBM PC DOS operating systems and early applications such as the spreadsheet program Lotus 1-2-3. Even into the 1990s, most console video games were written in assembly, including most games for the Mega Drive/Genesis and the Super Nintendo Entertainment System. According to some industry insiders, the assembly language was the best computer language to use to get the best performance out of the Sega Saturn, a console that was notoriously challenging to develop and program games for.The popular arcade game NBA Jam (1993) is another example. Assembly language has long been the primary development language for many popular home computers of the 1980s and 1990s (such as the Sinclair ZX Spectrum, Commodore 64, Commodore Amiga, and Atari ST). This was in large part because BASIC dialects on these systems offered insufficient execution speed, as well as insufficient facilities to take full advantage of the available hardware on these systems.Some systems, most notably the Amiga, even have IDEs with highly advanced debugging and macro facilities, such as the freeware ASM-One assembler, comparable to that of Microsoft Visual Studio facilities (ASM-One predates Microsoft Visual Studio). The Assembler for the VIC-20 was written by Don French and published by French Silk. At 1,639 bytes in length, its author believes it is the smallest symbolic assembler ever written. The assembler supported the usual symbolic addressing and the definition of character strings or hex strings.It also allowed address expressions which could be combined with addition, subtraction, multiplication, division, logical AND, logical OR, and exponentiation operators. COMPILER A compiler is a computer program (or set of programs) that transforms source code written in a programming language (the source language) into another computer language (the target language, often having a binary form known as object code). The most common reason for wanting to transform source code is to create an executable program.The name â€Å"compiler† is primarily used for programs that translate source code from a high-level programming language to a lower level language (e. g. , assembly language or machine code). If the compiled program can run on a computer whose CPU or operating system is different from the one on which the compiler r uns, the compiler is known as a cross-compiler. A program that translates from a low level language to a higher level one is a decompiler. A program that translates between high-level languages is usually called a language translator, source to source translator, or language converter.A language rewriter is usually a program that translates the form of expressions without a change of language. A compiler is likely to perform many or all of the following operations: lexical analysis, preprocessing, parsing, semantic analysis (Syntax-directed translation), code generation, and code optimization. Program faults caused by incorrect compiler behavior can be very difficult to track down and work around; therefore, compiler implementors invest significant effort to ensure the correctness of their software.The term compiler-compiler is sometimes used to refer to a parser generator, a tool often used to help create the lexer and parser. INTERPRETER In computer science, an interpreter normall y means a computer program that executes, i. e. performs, instructions written in a programming language. An interpreter may be a program that either 1. executes the source code directly 2. translates source code into some efficient intermediate representation (code) and immediately executes this 3. xplicitly executes stored precompiled code made by a compiler which is part of the interpreter system While interpreting and compiling are the two main means by which programming languages are implemented, these are not fully mutually exclusive categories, one of the reasons being that most interpreting systems also perform some translation work, just like compilers. The terms â€Å"interpreted language† or â€Å"compiled language† merely mean that the canonical implementation of that language is an interpreter or a compiler; a high level language is basically an abstraction which is (ideally) independent of particular implementations.ASSEMBLER Assembler (meaning one that a ssembles) may refer to: It is a computer program that translate between lower-level representations of computer programs; it converts basic computer instructions into a pattern of bits which can be easily understood by a computer and the processor can use it to perform its basic operations Assembly Language Syntax Programs written in assembly language consist of a sequence of source statements. Each source statement consists of a sequence of ASCII characters ending with a carriage return.Each source statement may include up to four fields: a label, an operation (instruction mnemonic or assembler directive), an operand, and a comment. The following are examples of an assembly directive and a regular machine instruction. PORTA equ $0000; Assembly time constant INP ldaa PORTA; Read data from fixed address I/O data port An assembly language statement contains the following fields. Label Field can be used to define a symbol Operation Field defines the operation code or pseudo-op Operand Field specifies either the address or the data.Comment Field allows the programmer to document the software. Sometimes not all four fields are present in an assembly language statement. A line may contain just a comment. The first token in these lines must begin with a star (*) or a semicolon (;). For example, ; This line is a comment * this is a comment too * This line is a comment Instructions with inherent mode addressing do not have an operand field. For example, label clra comment deca comment cli comment inca comment DATA TYPES IN ASSEMBLY LANGUAGEThere is a large degree of diversity in the way the authors of assemblers categorize statements and in the nomenclature that they use. In particular, some describe anything other than a machine mnemonic or extended mnemonic as a pseudo-operation (pseudo-op). A typical assembly language consists of 3 types of instruction statements that are used to define program operations: †¢Opcode mnemonics †¢Data sections †¢Assembly directives Opcode mnemonics and extended mnemonics Instructions (statements) in assembly language are generally very simple, unlike those in high-level language.Generally, a mnemonic is a symbolic name for a single executable machine language instruction (an opcode), and there is at least one opcode mnemonic defined for each machine language instruction. Each instruction typically consists of an operation or opcode plus zero or more operands. Most instructions refer to a single value, or a pair of values. Operands can be immediate (value coded in the instruction itself), registers specified in the instruction or implied, or the addresses of data located elsewhere in storage.This is determined by the underlying processor architecture: the assembler merely reflects how this architecture works. Extended mnemonics are often used to specify a combination of an opcode with a specific operand, e. g. , the System/360 assemblers use B as an extended mnemonic for BC with a mask of 15 and NOP for BC with a mask of 0. Extended mnemonics are often used to support specialized uses of instructions, often for purposes not obvious from the instruction name. For example, many CPU's do not have an explicit NOP instruction, but do have instructions that can be used for the purpose.In 8086 CPUs the instruction xchg ax, ax is used for nop, with nop being a pseudo-opcode to encode the instruction xchg ax, ax. Some disassemblers recognize this and will decode the xchg ax, ax instruction as nop. Similarly, IBM assemblers for System/360 and System/370 use the extended mnemonics NOP and NOPR for BC and BCR with zero masks. For the SPARC architecture, these are known as synthetic instructions Some assemblers also support simple built-in macro-instructions that generate two or more machine instructions.For instance, with some Z80 assemblers the instruction ld hl, bc is recognized to generate ld l, c followed by ld h, b. These are sometimes known as pseudo-opcodes. Data sections There are instructions used to define data elements to hold data and variables. They define the type of data, the length and the alignment of data. These instructions can also define whether the data is available to outside programs (programs assembled separately) or only to the program in which the data section is defined. Some assemblers classify these as pseudo-ops. Assembly directivesAssembly directives, also called pseudo opcodes, pseudo-operations or pseudo-ops, are instructions that are executed by an assembler at assembly time, not by a CPU at run time. They can make the assembly of the program dependent on parameters input by a programmer, so that one program can be assembled different ways, perhaps for different applications. They also can be used to manipulate presentation of a program to make it easier to read and maintain. (For example, directives would be used to reserve storage areas and optionally their initial contents. The names of directives often start with a dot to disti nguish them from machine instructions. Symbolic assemblers let programmers associate arbitrary names (labels or symbols) with memory locations. Usually, every constant and variable is given a name so instructions can reference those locations by name, thus promoting self-documenting code. In executable code, the name of each subroutine is associated with its entry point, so any calls to a subroutine can use its name. Inside subroutines, GOTO destinations are given labels. Some assemblers support local symbols which are lexically distinct from normal symbols (e. . , the use of â€Å"10$† as a GOTO destination). Some assemblers provide flexible symbol management, letting programmers manage different namespaces, automatically calculate offsets within data structures, and assign labels that refer to literal values or the result of simple computations performed by the assembler. Labels can also be used to initialize constants and variables with relocatable addresses. Assembly lang uages, like most other computer languages, allow comments to be added to assembly source code that are ignored by the assembler.Good use of comments is even more important with assembly code than with higher-level languages, as the meaning and purpose of a sequence of instructions is harder to decipher from the code itself. Wise use of these facilities can greatly simplify the problems of coding and maintaining low-level code. Raw assembly source code as generated by compilers or disassemblers—code without any comments, meaningful symbols, or data definitions—is quite difficult to read when changes must be made. MacrosMany assemblers support predefined macros, and others support programmer-defined (and repeatedly re-definable) macros involving sequences of text lines in which variables and constants are embedded. This sequence of text lines may include opcodes or directives. Once a macro has been defined its name may be used in place of a mnemonic. When the assembler p rocesses such a statement, it replaces the statement with the text lines associated with that macro, then processes them as if they existed in the source code file (including, in some assemblers, expansion of any macros existing in the replacement text).Note that this definition of â€Å"macro† is slightly different from the use of the term in other contexts, like the C programming language. C macros created through the #define directive typically are just one line or a few lines at most. Assembler macro instructions can be lengthy â€Å"programs† by themselves, executed by interpretation by the assembler during assembly. Since macros can have ‘short' names but expand to several or indeed many lines of code, they can be used to make assembly language programs appear to be far shorter, requiring fewer lines of source code, as with higher level languages.They can also be used to add higher levels of structure to assembly programs, optionally introduce embedded debu gging code via parameters and other similar features. Macro assemblers often allow macros to take parameters. Some assemblers include quite sophisticated macro languages, incorporating such high-level language elements as optional parameters, symbolic variables, conditionals, string manipulation, and arithmetic operations, all usable during the execution of a given macro, and allowing macros to save context or exchange information.Thus a macro might generate a large number of assembly language instructions or data definitions, based on the macro arguments. This could be used to generate record-style data structures or â€Å"unrolled† loops, for example, or could generate entire algorithms based on complex parameters. An organization using assembly language that has been heavily extended using such a macro suite can be considered to be working in a higher-level language, since such programmers are not working with a computer's lowest-level conceptual elements.Macros were used to customize large scale software systems for specific customers in the mainframe era and were also used by customer personnel to satisfy their employers' needs by making specific versions of manufacturer operating systems. This was done, for example, by systems programmers working with IBM's Conversational Monitor System / Virtual Machine (VM/CMS) and with IBM's â€Å"real time transaction processing† add-ons, Customer Information Control System CICS, and ACP/TPF, the airline/financial system that began in the 1970s and still runs many large computer reservations systems (CRS) and credit card systems today.It was also possible to use solely the macro processing abilities of an assembler to generate code written in completely different languages, for example, to generate a version of a program in COBOL using a pure macro assembler program containing lines of COBOL code inside assembly time operators instructing the assembler to generate arbitrary code. This was because, as wa s realized in the 1960s, the concept of â€Å"macro processing† is independent of the concept of â€Å"assembly†, the former being in modern terms more word processing, text processing, than generating object code.The concept of macro processing appeared, and appears, in the C programming language, which supports â€Å"preprocessor instructions† to set variables, and make conditional tests on their values. Note that unlike certain previous macro processors inside assemblers, the C preprocessor was not Turing-complete because it lacked the ability to either loop or â€Å"go to†, the latter allowing programs to loop.Despite the power of macro processing, it fell into disuse in many high level languages (major exceptions being C/C++ and PL/I) while remaining a perennial for assemblers. Macro parameter substitution is strictly by name: at macro processing time, the value of a parameter is textually substituted for its name. The most famous class of bugs resul ting was the use of a parameter that itself was an expression and not a simple name when the macro writer expected a name.In the macro: foo: macro a load a*b the intention was that the caller would provide the name of a variable, and the â€Å"global† variable or constant b would be used to multiply â€Å"a†. If foo is called with the parameter a-c, the macro expansion of load a-c*b occurs. To avoid any possible ambiguity, users of macro processors can parenthesize formal parameters inside macro definitions, or callers can parenthesize the input parameters.

Wednesday, January 8, 2020

Literary Analysis Of Sir Gawain And The Green Knight

Throughout the history of fictional writing, cultural values of certain time periods have been expressed and implemented through the depiction of the heroes’ experiences on their journeys and the knowledge they gain by the quest’s end. For example, in Sir Gawain and the Green Knight, a chivalric romance written in the Late Middle Ages, Gawain epitomizes a knight with the characteristics that knights from the Late Middle Ages were expected to possess according to the requirements outlined in the rules of chivalry, such as honor and valor. Likewise, Beowulf, the hero of the folk epic Beowulf, embodies the qualities of an exemplary hero as well as king. Therefore, in both stories, the reader encounters a heroic character that is presented with traits that Anglo-Saxons and the Middle English valued in their culture through their stories’ monomyths, a concept of similar and structural sequences that can be applied to many stories, created by Joseph Campbell. Some of t hese values are carried from the Early to Late Middle Ages and can be seen through the works of both Sir Gawain and the Green Knight and Beowulf. The monomyth map, also called â€Å"The Hero’s Journey,† begins with a hero’s call to adventure. In both Beowulf and Sir Gawain and the Green Knight, both hero’s accept their call to adventure with pride and courage. Beowulf has heard of a demon who has caused much destruction in the Land of the Danes for years. Recalling his past with their king, he voluntarily travels toShow MoreRelatedBritish Literature Essay: Macbeth vs. Sir Gawain and the Green Knight653 Words   |  3 Pagestheir surrounding history. Macbeth is a tragedy written by William Shakespeare in 1604; Sir Gawain and the Green Knight was written in the 1300’s by an unknown author. The following essay is going to compare and contrast the two stories mentioned above based on historical setting, cultural context, literary styles, and the aes thetic principles of the period in which they were written. Sir Gawain and the Green Knight were written in the late 14th century (1300’s) in Northwestern England. During this timeRead MoreSir Gawain and the Green Knight Essay1395 Words   |  6 PagesSir Gawain and the Green Knight In Sir Gawain and the Green Knight the poet depicts an entertaining story of adventure and intrigue. However, the poem is more than a grand adventure. It is an attempt to explore the moral ideals of Sir Gawain. Gawains standards are represented by the pentangle on his shield. The depiction of the pentangle occurs when Sir Gawain is preparing to gear up for his quest for the Green Chapel. Gawains outfit is described in great detail, including its color,Read MoreEssay about Sir Gawain and the Green Knight1732 Words   |  7 PagesSir Gawain and the Green Knight Sir Gawain and the Green Knight is a poem written during the medieval period about the Arthurian legend. Although the author is anonymous, it is apparent that the dialect of Sir Gawain points to an origin in provincial England, and it represents the cultural centers which remote from the royal court at London where Geoffrey Chaucer spent his life (Norton, 200). This poem is considered one of the best works of Middle English literature. One reason is that theRead MoreSir Gawain And The Green Knight3517 Words   |  15 PagesCora Orme Kapelle Medieval Literature 16 April 2015 Sir Gawain’s Performative Identity and Antifeminist Diatribe in Sir Gawain and the Green Knight Medieval scholars continually inspect the particularities of Sir Gawain and the Green Knight (SGGK) within the context of the preexisting Gawain literary tradition, and the issue of Gawain’s sudden antifeminist diatribe repeatedly comes to the forefront of these textual investigations. Often, literary critics claim that Gawain’s antifeminist outburst isRead MoreSupernatural Elements In Sir Gawain And The Green Knight And Prose Merlin1599 Words   |  7 Pagesthis are â€Å"Sir Gawain and the Green Knight† and â€Å"Prose Merlin†. In â€Å"Sir Gawain and the Green Knight†, the Green Knight’s supernatural ability is used in order to provide Gawain the adventure he needs in order to prove himself to the other knights. In the eighth section in part one, the author describes the Green Knight as a â€Å"creature†, immediately implying to the readers that the Green Knight isn’t entirely human and of a different world. This is further confirmed when Gawain, the only knight to takeRead MoreRealism And Romance Coexistence By Charlotte Griffiths Essay1935 Words   |  8 Pagesthe use of chivalric act and quests for honour, the kindness and everlasting stoaty to one woman) By contrast, realism emphasizes on details, characters, objectivity, and separation of narrator and author (making characters more relatable, such as gawain having flaws) . Romanticism typically rebels against previous art and writing forms by emphasizing on beliefs, feelings, fantasies, and imaginations (Brown, 2009). The style utilizes personal freedom and impulsiveness hence breaking the barrier thatRead MoreDisposition in the Face of Adversity: an Analysis of Sir Gawain and the Green Knight2040 Words   |  9 PagesAdversity: An analysis of Sir Gawain and the Green Knight The Middle Ages, a period of turbulence, reform, and revolution yet the idea of Knighthood remained ever so stead-fast. Sir Gawain and the Green Knight is an acclaimed Middle English poem published by an unknown author that highlights the preponderance of the English tradition. Sir Gawain is a knight belonging to the Arthurian court whose deference to his Lord and fidelity to the chivalric code are tested through a mysterious journey. In Sir GawainRead MoreThe Truth Behind the Knight: the Presence of Archetypes in Sir Gawain the Green Knight2908 Words   |  12 PagesThe Truth Behind the Knight: The Presence of Archetypes in Sir Gawain the Green Knight In the medieval story of Sir Gawain and the Green Knight, we are introduced to a young man, who, like many of young men, is trying to discover himself and travel through his rite of passage. He is trying to figure out who he is in life, and while in his journey, passes through many phases that mold him into one of the great Knights of the Round Table that old King Arthur wanted to serve with him. These phasesRead MoreChivalry In Song Of Roland, Percival And Sir Gawain And The Green Knight1090 Words   |  5 PagesChivalry (An analysis of the treatment of chivalry in â€Å"Song of Roland†, â€Å"Percival†, â€Å"Arthur†, and â€Å"Sir Gawain and the Green Knight†) Chivalry is defined as â€Å"the medieval knightly system with its religious, moral, and social code† (Oxford). During medieval times, those who received an immense amount of recognition were the ones who abided by the code of chivalry. These were the people who earned respect from other by giving it themselves. For example, when jousting, or fighting another knight, men wereRead MoreThe Noble Chivalric Code And The Middle Class1489 Words   |  6 Pages Intertwined in all the literary works of this time period, there was growing tension between the noble Chivalric Code and the middle class. There were six very different pieces written by six very different authors, who represented very different ideas of class division based on the timeframe in which they lived. From chivalry as a knight to ideals of the middle class, this theme is presented thoughout. Chivalry was an ambition, an alluring ideal to which young knights might aspire. â€Å"While Chivalry