Thursday, December 26, 2019

A Systematic Theory Of Population Theory - 1611 Words

According to the Economic Thought textbook the summary of Malthus Population Theory deals with the misery and poverty among the lower classes of every nations. Thomas Robert Malthus was the first economist to propose a systematic theory of population. He states that a population when unchecked leads to population grow exponentially (i.e., doubling with each cycle) while food production grows at an arithmetic rate (i.e. by the repeated addition of a uniform increment in each uniform interval of time). Therefore, he mentions that there are two categories in which the increased population should abide by in order to support the operation on population growth. These includes: preventive that deals with moral constraints and â€Å"positive† checks. Moreover, the preventive checks to population growth are those that reduce the birth rate, which is seen as a deliberate decision by men to refrain from â€Å"pursing dictate of nature in an early attachment to one woman, i.e. to marry later in life than had been usual and only at a stage when fully capable of supporting a family. However, this implies that Malthus was interested in maintaining a large, hard-working, poorly paid population than he was in establishing really effective measures of limiting human reproduction. Another notion is positive checks is any causes that contributes to the shortening of human lifespans. It includes: poor living and working conditions which might give rise to low resistance to disease, as well as moreShow MoreRelatedIntelligent Design: A Bona Fide Theory Essay1278 Words   |  6 Pagesin an intelligent designer who created the universe and humanity. According to Discovery Institute (n.d.), â€Å"The theory of intelligent design holds that certain feature of the universe and of living things are best explained by an intelligent cause, not an undirected process such as natural selection† (para.1). Although intelligent design is quickly becoming regarded as a scientific t heory with more than 50 peer-reviewed journals published, as of now there is no tolerance for it to be taught in America’sRead MoreDifferent Methods Of Qualitative Research1313 Words   |  6 Pagesphenomenology, grounded theory, ethnography and case study. The narrative approach retells a person’s story across time; it explores what the story means and the lessons to be learnt from it. The goal of phenomenological research is to describe participants’ experiences in a specific context and understand a phenomenon. Grounded theory research looks at a process, an action or an interaction with the goal of developing a theory. The researcher attempts to derive a general, abstract theory of a process, actionRead MoreResearch On Physical Activity Promotion952 Words   |  4 PagesProblem Statement While research on physical activity promotion has historically been on the impact of individual behavioral interventions, there has been substantial progress in identifying the role of policymaking in creating population-wide improvements in physical activity levels (Brownson et al., 2007; Frank Kavage, 2009; Humpel, Owen, Leslie, 2002). As a result of the increasing evidence of modifying the built environment through policy interventions (Kahn et al., 2002), the Center ofRead MoreEvaluation Of A State Physical Activity Plan935 Words   |  4 Pagesdoesn’t) Problem Statement While research on physical activity promotion has historically been on the impact of individual-level behavioral interventions, there has been substantial progress in identifying the role of policymaking in creating population-wide improvements (Brownson et al., 2007; Frank Kavage, 2009; Humpel, Owen, Leslie, 2002). As a result of the increasing evidence of modifying the built environment through policy interventions (Kahn et al., 2002), the Center of Disease ControlRead MoreCorrelation Between Traits Found On The Autistic Spectrum And Mathematical Ability1531 Words   |  7 Pagesstudies over the years have given support to the theory that ASD and AS are hereditary disorders (Baron-Cohen et al., 2001). In the UK Autism has an estimated prevalence rate of 1.1% and is thought to be under diagnosed in females (The NHS Information Centre, 2012). The Autism Spectrum Quotient (AQ) is a self report questionnaire developed as an easier, less time consuming way to measure traits associated with ASD and AS in anyone within a population (Baron-Cohen et al., 2001b). The AQ considersRead MoreThe Theory Of Health Literacy788 Words   |  4 Pagesperspective, researchers assessed the concepts of â€Å"health communication, health disparities, health literacy, literacy, microrange theory, military health system, patient education, theoretical framework, universal access† (p. 308). To study the phenomenon of health literacy, they â€Å"present a conceptual framework adapted for use in studying health literacy in population groups with universal access to care† (p. 309). The â€Å"Health Literacy Framework (HLF)† †¦ â€Å"is an interactive model that places literacyRead MoreExternal Reality Of Facts Is Based On Previous Knowledge Essay1391 Words   |  6 Pagesacceptance of the reliability of knowledge gained by experience to provide empirical evidence (evidence which is verifiable by observation) to support or refute its theories. 3.3 Literature Review According to Montgomery Robinson et al (1991) and Clamp (1984), ‘Nursing research is providing a link between practice, education and theory, thereby making it essential for all nurses to become knowledgeable consumers or for the minority research doers. Research problem is a situation in need of a solutionRead MorePsychoanalytical Theory and Cognitive Behavior Theory1567 Words   |  7 PagesREVIEW Journal Review: An assessment of contemporary studies to Psychoanalytical theory and Cognitive Behavior theory. Abstract Psychoanalytical theory and cognitive behavior theory (CBT) are currently two of the most utilized psychotherapeutic modalities in Western psychology. In the current review of literature, the salience of both theories is analyzed through the evaluation of contemporary studies on the two theories. These studies focused on empirical rather than merely theoretical research. UponRead MoreDescriptive Research Method1058 Words   |  5 PagesIt is not surprising that case studies often seem to provide very compelling evidence for a theory. (I discovered this when I tried to provide alternative interpretations of classic cases described by Freud, Adler, and Jung.) Case studies can therefore assist psychology by illustrating how a theory could be applied to a person or events and by assisting with the development of hypotheses for more systematic testing, e.g., Piaget’s case studies of the cognitive development of his three children. Read MoreInvisible Man By Ralph Ellison1668 Words   |  7 Pages Invisible Man is the only large mole that is present in a predominately white subway car, or a predominately white world. And this spawns the beginning of a discussion as to why race theory would apply very strongly to this passage. Another potential add-on to one believing this passage has to do with race theory is the size of the woman Invisible Man is forced to ride the subway with. He describes her as being huge, enough for her to make Invisible Man’s ride on the subway very uncomfortable. For

Wednesday, December 18, 2019

Bullying Argumentative essay - 970 Words

Name Professor Writing Argumentative Essay 25 November 2013 Bullying Have you ever seen or experienced bullying and the dramatic effects it has on its victims? Unfortunately nine out of every ten students have experienced bullying in school or online. Many people believe that bullying is a part of growing up and kids do not know any better. Bullies are intentionally causing mental and or physical damage to their victims, which will affect them for the rest of their lives. Bullying has shown that it can cause self inflicted injuries and even suicide in America today, and there should be no doubt that we need to protect our youth today. We need to enforce a law that will have bullies face harsh legal punishment in order to do†¦show more content†¦They should be treated like an individual who knows right and wrong and continues to do wrong by physically assault another student. In most cases of self inflicted injuries are caused by cyber bullying, which is online or over the phone. It is horrible and it takes a lot to make someone feel like their life is not worth living or that bringing a blade to their wrists will relieve the pain they are going through mentally. Cyber bullies attack people psychologically and get very personal with the intent of hurting someone. They hide behind the computer and use it to ruin others lives. That is worse than physical bullying, because the psychological scars are things that will be with the victims forever. It will affect their self esteem, their value of life, their insecurities, and how they act socially. Bullying does not go away after you leave school, bullying in some cases stays with people for the rest of their lives. The events that the victims went through torments them for the rest of their lives through flash backs, fears created by the bully, and even seeing the bully themselves. Most victims have nightmares and flashbacks that bring them back to that horrible time of their life and haunt them long after school is over. The last thing I ask is to look at this from a personal perspective. People should think as if it were their child who came home crying, beaten, battered, cut marks onShow MoreRelatedArgumentative Essay : Bullying And Bullying756 Words   |  4 PagesRita Bullock July 3, 2015 Essay on Bullying In 2-3 pages, according to the Dignity for All Act, what is the legal responsibility of the teacher and the school when a student claims that he or she is being harassed, intimidated, or discriminated by another student(s)? What happens to a student who bullies, and what happens to the victim? School bullying can occur during every stage of development from Kindergarten through High school. Students suffer harmful effects when they are emotionallyRead MoreArgumentative Essay On Bullying1249 Words   |  5 Pagesdirected by Lee Hirsch. In this 2011 documentary it examined five different bullying scenarios and how the constant -everyday- bullying shaped their lives. Bullying has been an ongoing issue; an issue that cannot seem to be resolved. Although this has been an escalating subject it seems as though bullying is still oblivious to many people despite age, gender, ethnicity, and line of work. As revealed in the documentary, bullying effects the lives of many students. These students are mocked, physicallyRead MoreArgumentative Essay On Cyber Bullying880 Words   |  4 PagesCyberbullying   Ã‚  Ã‚   I first experienced this form of bullying in middle school. Just about every student in my class was creating a profile on the still famous Facebook. Our older siblings had Myspace,but for us this was our first major footing in the world of online social networking. Initially, it was great. It was a way to keep up with friends and family, share events, and explore things uncommon to us. However eventually the once so great network became a way to humiliate, harass, and threatenRead MoreArgumentative Essay On Cyber Bullying903 Words   |  4 Pages Bullying has always been a prevalent issue among society, especially within adolescence. However, cyberbullying in specific, is becoming more intense and harmful as the use technology increases. Unfortunately, bullies target those who are different among society, such as individuals who are different in race, religion, language, and sexual orientation. Bullying is no longer stemmed from school and left there, kids are bringing these unnecessary things home with them through the use of social mediaRead MoreArgumentative Essay On Cyber Bullying1705 Words   |  7 Pagesof cyber bullying. Cyberbullying may disrupt a teen’s positive learning and cause them to perform poorly in their academics, which can lead to them dropping out of school. The presence of cyberbullying in school has created many negative effect on teens, such as, low self-esteem, anxiety, depression and suicide. We need to find ways to protect our schools from cyberbullying because of the impact that it has on teens are detrimental. We can prevent cyberbullying by identifying cyber bullying problemsRead MoreArgumentative Essay On Cyber Bullying1326 Words   |  6 PagesMichelle Montes Professor Diep and Professor Borla ENGL boost August 4, 2017 ROUGH DRAFT: Although bullying happens nationwide people, sometimes fail to acknowledge the importance of the topic and how it affects individuals and society. There are several ways the reality of bullying is taking place, which disrupts not only kids but also adults; whether it is physical, mental, or cyber bullying it is all contributing to promoting a barrier that may be perceived as negativity. However, from a bully’sRead MoreArgumentative Essay On Cyber Bullying989 Words   |  4 Pagespricey. During that time, it was uncommon to find laptops and computers in many households. Fast forward to 2017, and the majority of the population has either a cellphone, laptop, tablet, and/or computer. Before becoming dependent on technology, bullying was a huge issue for many kids. The â€Å"schoolyard bully †¦ usually used physical domination to intimidate other children. It no longer requires physical intimidation to be a bully. When technology is used to send the message or intimida te, it becomesRead MoreArgumentative Essay On Cyber Bullying1170 Words   |  5 PagesCyberbullying Typically, the person that is doing the cyber bullying is generally a victim of bullying themselves. How is cyberbullying done? Normally, the use of electronic devices to send messages that tend to emotional hurt someones feelings. Social media can lead to many negative outcomes when communicating to others. For example, if a teenage boy responds on a girl’s photo stating she is â€Å"ugly† is considered online bullying. One popular social media site is Facebook that over millions of peopleRead MoreParents Responsibility1022 Words   |  5 PagesIntroduction This WebQuest is a follow-up lesson to consolidate what you have learnt about writing an argumentative essay. There are 2 components to this assignment: the Essay component and the Reflection component. Essay Component First, you are to research online on what an argumentative essay is all about, the grammatical features of an argumentative essay and how you should structure your argumentative essays. Secondly, you are to read the articles provided in this WebQuest and you are to figure outRead MoreDevry Engl 147 All Discussion Questions – Graded1196 Words   |  5 Pagesis [school bullying] a problem?â€Å" In your post, provide the question and then the answer to the question. For example, â€Å"School bullying is a problem for victims of bullying because. . . .† Complete the statement based on your experience and knowledge. Topic Selection (graded) To prepare for your topic selection and the research process, conduct an Internet search to find at least two articles that have been posted in the last year on one of the â€Å"themes† topics (i.e., bullying). The goal

Tuesday, December 10, 2019

Emerging Contextual Risk Management

Question: Describe about the Emerging Contextual Risk Management. Answer: The Landspace for an ENISA so that risk will provide the dangers diagram, together with the patterns that are current and emerging. It would be founded on the information that will be accessible openly and provides the perspective that will be free on the treats that are watched, danger patterns and risk offices. In this full contextual investigation the arrangements of various dangers which all are identified with patterns which are distinctive and most recent and they will likewise be founded on advances which are rising, it additionally let us know that the know reason on why there will be an event of the different sorts of the assaults and dangers. This scene risk will be extremely helpful and it will be valuable for basic leadership on various fields that all are rising for guaranteeing them choice that are educated and secure at it will be identified with the data security. ENISA will unequivocally support the enormous interest in the piece of danger administration and this wil l likewise test for the congruity arrangements for all the business. Predominantly bigger suppliers for the nation will go for guidelines that are universal however there will be no requirement expense of assets, monetary and above all time that are related for doing all this things. The Landscape for ENISA Threat (ETL) gives a review of dangers, together with present and developing patterns. It depends on freely accessible information and gives an autonomous perspective on watched dangers, risk operators and danger patterns. This is a gathering of dangers. It contains distinguished dangers, patterns watched and risk specialists included. ETL comprises of a rundown with top dangers organized by recurrence of appearance and NOT as per the effect brought about. (Loren, 2015) For the Landspace of an ENISA found that for little suppliers the expanding inclination that will tail this direction set out in the national enactment which will diminish paralleled according to the global guidelines. The utilization of web and e-trade is generally utilized as a part of an entire of the world and it assumes a key part in the worldwide intensity and its financial development. In the year 2007, ENISA's work system will require the yearly give an account of an e-correspondence measure of security that will be enumerating those executions, patterns of the security and their recommendation. With its yearly report obviously ENISA will seek after the commitment to the difficulties and their understanding which gives the best arrangement with the indexes which will be utilized. The entire target is for advancing the great practice and it will likewise assemble trust in the channels of e-correspondence. The e-trade and web utilization will normally utilized the part of the e ntire world and it also assumes the important section in the intensity of the worldwide and the development that is based on financial section. ENISA is adding to an abnormal state of system and data security (NIS) inside the European Union, by creating and advancing a society of NIS in the public arena to help with the best possible working of the inward market. The ENISA Threat Landscape comprises of a report outlining digital dangers that have been gotten to by gathering freely accessible data. This report shows up on a yearly premise. In addition, consistently topical danger scenes are produced. (Louis, 2012) Below we have given some of the Insider Threats that are used with most of the strategies: Misusing data through the remote access programming: With the help of various programming of remote access there are lots of misuses of the insider will get performed offsite, such as, GoToMyPC, Citrix and Terminal Services. Mainly, clients will be less inclined to get discovered taking the information that is delicate when it was found that they can do the work offsite. Conveying data by means of email and texting: Sensitive data can essentially be incorporated into or appended to an email or IM. Sharing delicate records on P2P systems: The problem is not with the programming that is lifeless it's that the means by which this whole thing gets utilized which will cause the inconvenience. All that will take is the basic mis-configuration for serving the system's neighborhood and it also drives the system to whole world. Inconsiderate utilization of remote systems: Perhaps most accidental insider threat will be that of unreliable use of the remote system. Whether this will be at bistro, airplane inn or terminal, unsecured transmission with wireless and without so much of stretch that put in peril the touchy data. Presenting data on talk sheets and web journals: Filtering content in email and HTTP got interchanges at system border that is most ideal method for checking and square delicate information from leaking to some of the locales. (Dawn, 2012) In the event that you are planning to implement these are specialized defends alone, all will work for very short-term. Be that as it may, for the business esteem for long haul, they guarantee that they're mated for the arrangements of business and out "this will be the manner by which we will do it here." They joined with mindfulness of the customers and measurements of security for figuring out. They will search whether the countermeasures that are working fittingly, can provide incredible assurance against an insider threats. The most common among all are PC worms and widely recognized sorts of the malware. It will misuse the working framework by spreading all over the PC systems through vulnerabilities. Worms commonly hurt the system that is host by expending the web servers that are over-burdening and transmission of data. At that point next is Trojan: A Trojan stallion, ordinarily called as the "Trojan," is the malware types which will camouflages itself as the record that is typical or program for trapping the customers into introducing and downloading malware. To the tainted PC Trojan will provide the remote access for malignant gathering. Finally is the BOT: These are programming programs that are made to naturally execute the significant operations. Whereas there are some of the bots which are made for the purposes of moderately innocuous. This whole thing will be progressively turning out to be normal for viewing the bots being used very vindictively. It will encourage the reality which expresses that vindictive assaults of the URLs are simple for the execution. It will likewise be watched that spaces which all are fleeting that will be encourage the production of the noxious URL. These assaults sorts will be the principal position in the nation of Europe and North America. In the applications of web vulnerabilities can be infected with the help of scripting based on cross-webpage, archives and also spread with the help of script records. Infections will get used for taking information, hurt the systems and PCs of the host, create botnets, render promotions, and take some of the cash and the limit of the sky. Once the assailant has entry to the PC that is tainted, it will be feasible for aggressor for taking information, introduce some of the malware, change records, action related to screen client, utilize in botnets the PC, and anonymize the web movement by assailant. Bots will get utilized as the botnets part for assaults of the DDoS, as spam-bots which will render promot ions on the sites, as the web insects that scratch the information of the server, and for disseminating malware camouflaged as famous hunt things for the download locales. Numerous web assets which are pernicious, for example, 88% they all will situate in the spots of North America and Europe. (Vangie, 2014) Exploit Kits is the most significant kind of the the Threat Agent that will get compromised for the malicious code programs. This will get utilized by just identifying and attacking the cyber vulnerabilities and spreading the malware that will go to represent the dark. Exploit Kits market for a long stretch, different packs got a comparable reputation in the criminal underground. The Nuclear adventure unit, ostensibly, is the second most pervasive endeavor pack found in nature. In October 2015, it was watched using payload conveyance instruments that are a great deal more productive and more complex in nature than any other time in recent memory seen some time recently. Signature-construct arrangements recognize malware situated in light of hashes; known documents, whether authentic or detestable in nature can be distinguished by their hash worth (or mark). This worth stays static for every document whose hash is registered using the same calculation that contains the same substance. Be that as it may, signature-based arrangements could be effortlessly skirted by altering the payload and including, expelling, or flipping a couple of bytes. These operations will totally change the hash of any document permitting to dodge signature-based arrangements. Specialists watched that every payload document seems to have the same size; the real paired make-up of the payload records is made on-the-fly. Every one of a kind potential casualty is not just conveyed a payload with a completely distinctive hash, additionally conveys a payload whose inner make-up (i.e. variable and capacity names utilized by the payload) is totally exceptional on a for each host premise (or rather, per-IP address premise). Intentions of Cyber terrorism will attacks that would range from the economic disruption with support of the interruptions of the networks of financial and will be utilized to help the physical attack of the system which will cause further delays which are possible and will cre ate additional confusion in the right response. (Patrick, 2013) The social hacking is the criminal demonstration of controlling individuals to surrender classified data. Much of the time, the culprits are searching for chances to exploit powerless or innocent individuals, by misdirecting them into giving over touchy data. This data can be utilized against them and give an entryway to programmers to access financial balances, PC passwords and other individual subtle elements. Programmers can crush casualty's lives and social hacking specifically is a favored decision. The center purpose behind this is on the grounds that it is a standout amongst the most direct hacking procedures. Case in point, attempting to persuade somebody to give you their watchword in a debilitating or underhand path is far less tedious than endeavoring to physically hack their record. The weakest connection in an individual security chain is the person who is excessively trusting. The unforgiving truth is that you can't trust everybody, particularly where innovation is included. Thus, organizations must guarantee that all individuals from staff inside their progressive system know about individual security dangers and see how they are relied upon to respond in various circumstances. You can have the most exceptional security frameworks and conventions set up, in any case if staff are not satisfactorily prepared to react when gone up against by these lawbreakers and accidentally discharge delicate individual data, none of it will matter. It is along these lines suggested that you put resources into the fitting security preparing to furnish staff with the fundamental information they require to dependably act in the most secure way that is available. (Steve, 2013) For each information which will be given in Table 2, the patterns in likelihood of risk from the year 2013 to the year 2014: Most of the critical risk in year 2014 is pernicious code. Attacks that are online are considered to the second most of the risk in the year 2014. Attacks that are related to web phishing and infused/application will get brought up in present year and spam dangers will be diminished. Recognize misrepresentation/robbery likewise expanded their likelihood in this year when contrasted with a year ago. According to table 2 it will be unmistakably found that the patterns which contain likelihood of risk from year 2013 to 2014: Identification likelihood of robbery/extortion which will get massively raised amid this year. It was obviously expressed that there will be an ascent in assaults which are finished with the assistance of phishing or web application/infusion. The most critical danger in this year will be found to assaults which are online. (Luis, 2014) How to improve the performance of the ETL will be discussed below: The Tackle Bottlenecks: Make sure that the log measurements, for instance, prepared the count of the records, time, and utilization of the equipment. Checks what is the count of the assets that will get precede every part and address the heaviest one among them. Increment the Load Data: Loading just progressions among the information that is new and that is provided in the past spares the time for the considerable measure when this was contrasted with the full load. It's very hard to keep up and implement, yet the troublesome will not outlandish it. Parcel Large Tables: If it was used the databases that are social and it require for enhancing the information that is preparing window, it can get the segment expansive tables. That is, chop huge tables down to physically littler ones, most likely by date. Extraneous Information Removed: It's essential for gathering however much of the data as this will be the expected, yet not the last bit of this will be commendable sufficiently for entering the information to the center of distribution. Store the Data: The data that was caching can extraordinarily speed the things up since it performs the access of the memory quicker than do these hard drives. Note that restriction is on reserving the greatest memory measure for the bolsters equipment. Process in Parallel: Instead of preparing serially, improve assets by handling in parallel. Unluckily, this will not normally conceivable. Capacities of total and sort (tally, aggregate, and so on.) piece preparing in light of the fact that it should end before the following would start. Using Hadoop: Apahe Hadoop will be intended for conveyed for handling the expansive data over the machines group. It also uses the HDFS, the framework for committed record which cuts data into various small pieces and then equally spread them to various groups. As for every table 10 which will be there for the situation study, it will be clear and straight that most difficult battle in coming year 2016 for ENISA will be assaults of the Denial administration which are very hypervisor, control of the focal plane, for instance, flooding through parcel. Second most vital rising danger in year 2016 will get vindictive code: Worms/Trojans that are included diseases and switches for controlling the focal plane. They will sort out the focal plane, which are exceptionally hypervisor, for example, flooding of parcel. The following noteworthy danger which will go to rise in year 2016 will be assaults which are online. (Karanja, 2015) This study will uncover for distinguishing the difficulties and the security dangers furthermore countermeasure that will be needed for advancements which are developing furthermore give the methodology which is engaged and particular, which will give a diagram to the digital security current state. The most threatening and biggest class in the risk will be distinguished by the Cyber offenders. This is on the grounds that different monetary elements will create the security vulnerabilities, though the decisions of outline will contend with comfort and cost. It will give outline of the digital security for this present state. Crooks which are Cyber based will be recognized and will under the most elevated classification and will give antagonistic here of the danger. . This is a direct result of the numerous variables that all are identified with a monetary which will manufacture the vulnerabilities of the security, while the decisions of the configuration would restrict against the ex pense furthermore according to the accommodation. (Anita, 2015) We will always summon up with giving the standards that are extremely powerful for danger administration for digital security. They will go for supporting formation of society and environment where administration of danger will require viable exercises, help partners which will be making frameworks with great experience of client. This successful basic leadership in innovation will require good business comprehension and necessities of client, the security and couple of other huge elements. With assistance of such direction standards sets it will support for successful basic leadership by giving good understanding of the security. In the provided work, we have done and be used for investigating underneath qualities: The process and administration will empower the business The decision that will be taken by skillful individuals will get educated through adherence of methodology The business language will have authority terms It will take the decision taken convenient over instability of end Risk administration will be constant assignment that will get evaluated one-off Viable digital security hazard administration is based on some of the sensible basic leadership. Ensuring that epitomizes of business that will have certain standards. The reason for such standards is with the goal that the working should be possible in more intelligent way and it can utilize: The validation must get done and affirming that whatever will be going on today will get sensible or not. Recognize the powerless focuses furthermore the zone for the change Then once the option methodology will be recognized then exhibit that way to deal with others with their benefits and faults. References: Leron Zinatullin, 2015, Identifying and Preventing Insider Threats, https://www.tripwire.com/state-of-security/incident-detection/identifying-and-preventing-insider-threats/ Dawn Cappelli, 2012, The CERT Top 10 List for Winning the Battle Against Insider Threats, https://resources.sei.cmu.edu/asset_files/Presentation/2012_017_001_52427.pdf Anita Podsiadlo, 2015, Are smart homes cyber-security smart?, https://www.m2mnow.biz/2015/02/11/29699-smart-homes-cyber-security-smart/ Vangie Beal, 2014, Malicious Code, https://www.webopedia.com/DidYouKnow/Internet/virus.asp Steve Lohr, 2013, A Summer of Data Hacking Social Problems, https://bits.blogs.nytimes.com/2013/07/25/a-summer-of-data-hacking-social-problems/?_r=0 Yaniv Mor, 2014, 7 tips to improve the ETL Performance, https://www.xplenty.com/blog/2014/01/7-tips-improve-etl-performance/ Luis Corrons, 2014, Malware still generated at a rate of 160,000 new samples a day in Q2 2014, https://www.pandasecurity.com/mediacenter/press-releases/malware-still-generated-rate-160000-new-samples-day-q2-2014/ Patrick Sweeney, 2013, Defending against exploit kits, https://www.networkworld.com/article/2166866/tech-primers/defending-against-exploit-kits.html Karanja, 2015, Risk Management Louis, 2012, ENISA Threat Landscape

Monday, December 2, 2019

Sikhism (Religion and Theology)

Introduction Sikhism is a practical religion which does have merely words or any certain set of beliefs. This religion does not involve visiting shrines and tombs or following Yogis. This religion believesthat a life should be lived in some patterns.it’s main asset is its simplicity. It does not have any kind of supernaturalism or mythology where it keeps its feet up. It does not have any concepts of devils, angels or heavenly spirits (Sikhism, n.d., Para 1).Advertising We will write a custom essay sample on Sikhism (Religion and Theology) specifically for you for only $16.05 $11/page Learn More Sikhism is a universal religion and it objects all ritualism and formalism. It does not nourish any blind faith. It discourages blind follow to any external authority. Sikhism believes in Karma and it identifies the modification of one’s karma with the grace of God (Sikhism, n.d., Para 2-5). Historians in Eastern religions normally believe that Sikh ism is a syncretistic religion that can be related to Bhakti movement within Hinduism. They associate Sikhism with Hindu religion. But many Sikhs disagree on this point; they believe that Sikhism is direct revelation from God and does not originate from any religion like Hinduism or Islam (Robinson, 2006, Para 2). Marriage and Family: Marriage is sacred and it’s a bond not only between the man and woman but also in the whole families. Normally Sikhs have arranges marriages where the partners are chosen by the parents for their children which is based on mutual interests and similarities in culture. Divorce is against the lessons of the guru (Sikh family life, 2007, Para 7). During the wedding ceremony, the couple sits before the Guru ranth sahib where the Granthi reads certain wedding hyms from the holy book. The couple takes round of the it slowly and friends and family shower their blessings by throwing flowers on them. The bride wears red wedding costume that represents he alth and wealth and after ceremony prashad, sweets are distributed (Sikh family life, 2007, Para 8 9). Childhood and the naming ceremony: Just after the birth of the baby, parents go to the gurudwara with the baby where Guru Granth Sahib is opened and a random reading is done. The first letter of reading becomes the first letter of the baby’s name (Sikh family life, 2007, Para 1-3). A Sikh child starts learning the language of Guru Granth Sahib when he is just seven years old. The Children are supported by the family. There is no discrimination between sexes.The girls are expected to achieve same as boys (Sikh family life, 2007, Para 1-3). Getting old and death: Older people of this community get lots of respect. When athere is a death in a Sikh family, they are cremated wearing the five Ks. They believe in incarnation and union with God (Sikh family life, 2007, Para 10).Advertising Looking for essay on religion theology? Let's see if we can help you! Get your first pa per with 15% OFF Learn More Foundation of Sikhism: Sikhism is the youngest religion which is just five hundred years old (Introduction to Sikhism, 2009, Para 1). Shri Guru Nanak Dev ji was the person who satrted this religion. He got the vision to preach the way to God (Robinson, 2006, Para 3). At this time India was being segrated on the basis of castes, religious factions and sectarianism. He respected all religions (Introduction to Sikhism, 2009, Para 1). He preached, â€Å"There is no Hindu and Muslim† which became one of the pillars of Sikhism (Robinson, 2006, Para 3). Guru Nank and his followers who were called Panth built a temple at Kartarpur (Robinson, 2006, Para 3). He showed a real path to God by saing that God is Truth, â€Å"Sat Nam† (Introduction to Sikhism, 2009, Para 1). A succession of nine Gurus who were considered as reincarnations of Guru Nanak guided the movement during the period from Guru Nanak’s dealth until 1708. During that co urse, the activities of the Guru were passed on to the Panth and to the holy text (Robinson, 2006, Para 4). Philosophy and Teachings: The word Sikh means a diciple. A true Sikh is not attached to wordly things but he must do his duty towards his family and community. They believe in Bhagti which is possible after fullfing following conditions (Sikhism, Main Principles, n.d., Para 1): Faith in God Following Truth Conrol over world and deed Unattachment and desirelessness Association with holy men which is Satsang Humanity and submission to Hukam Salvation: it is also called Mukti. According to Guru, â€Å"The man of God rejects salvation. He just wants love. The happiness lies only in merging in Divine Spirit. A man can have Mukti only when he medidates on God (Sikhism, Main Principles, n.d., Para 3). Khalsa: The Khalsa is about worshiping one God and meditating daily on his name. A Sikh has to keep the symbols (Panj Kakar) whole life. He should not believe in one caste instead he should believe in brotherhood. He should not be involved in any of the four offenses (Kurahat) as cutting of hair, eating Halal meat, adultery and the use of any intoxicant. He should not commit any of the social offences (Tankhah) like, giving dowry, using liqours, raising monuments over graves and associating with traitors (Sikhism, Duties of the Khalsa, n.d., Para 3). He must donate one-tenth (daswand) of his income for religious purposes. He must practice arms and should be ready o protect the weak (Sikhism, Duties of the Khalsa, n.d., Para 3).Advertising We will write a custom essay sample on Sikhism (Religion and Theology) specifically for you for only $16.05 $11/page Learn More Renunciation of the world: Sikhism does not favour that one leaves his family and live away from it. The Gurus conveyed that married life is the best mode of life. Escaping from the realities of life is a saintly act (Sikhism, Main Principles, n.d., Para 12). The 5Kâ€⠄¢s of Sikh: Sikh’s who have done Amrit Cermony or public commitment to the faith, are called Khalsa. They have accepted 5 symbols. These symbols are called 5 K’s. They not only prove the Sikh identity, but also have spiritual meanings (The 5 K’s, n.d., Para 1). They are powerful symbols of faith. Most Sikhs follow the traditions of Khalsa (The 5 K’s, n.d., Para 1). Guru Gobind Singh, the tenth Guru, gathered together the first members of Khalsa on Baisakhi in 1699 and gave them the five items of dress, which had uniformity (The 5 K’s, n.d., Para 2). These items of dress or appearance are (The 5 K’s, n.d., Para 2):- Kesh– uncut hair beard, as given by God, to sustain him/her in higher consciousness and a turban, the crown of spirituality. Kangha – a wooden comb to properly groom the hair as a symbol of cleanliness (The 5 K’s, n.d., Para 2). Kachera –specially made cotton underwear as a reminder of the commitment to purity (The 5 K’s, n.d., Para 2).Advertising Looking for essay on religion theology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Kara – a steel Band, worn on the wrist, signifying bondage to Truth freedom from every other entanglement (The 5 K’s, n.d., Para 2). Kirpan – the sword, with which the Khalsa is committed to righteously defend the fine line of the Truth (The 5 K’s, n.d., Para 2). Meaning of these 5 K’s: Kara It is a bangle, which is generally made of iron or steel and it is worn on the right wrist. The steel represents strength and the circular shape represents unity and eternity (The 5 K’s, n.d., Para 4). It shows Sikhs’ belief that God is eternal (The 5 K’s, n.d., Para 4). Kangha A Kangha is a wooden item to keep the hair clean and tidy. Guru Gobind Singh stressed on cleanliness while performing Khalsa (The 5 K’s, n.d., Para 5). After washing and then combing their hair, Sikhs tie a topknot and then they keep Kangha in the topknot which is covered with a turban (The 5 K’s, n.d., Para 5). Kangha represents discipline in all face ts of life (The 5 K’s, n.d., Para 5). Kachera Guru Gobind Singh told Sikhs to wear short trousers which was to depict Khalsa uniform (The 5 K’s, n.d., Para 6).There are many explanations to the use of this Kachera. One of them is that it made Sikhs move easier to move in battle. Many Sikhs believe that it represents modesty (The 5 K’s, n.d., Para 6). Kirpan It is a sword that is worn by the Khalsa (The 5 K’s, n.d., Para 7). The Kripan is worn as a memento of the bravery of the first five Sikhs, who were keen to sacrifice their lives for the sake of their religion. The Kripan is therefore a symbol of bravery and of faith in God. For many, the most important meaning is that the kripan stands for the commitment to fight ‘one’s own internal enemy’ that is weakness in one’s own character behaviour (The 5 K’s, n.d., Para 7). Kesh By tradition, Sikhs both men or women do not cut their hair and male Sikhs should not cut their be ards The 5 K’s, n.d., Para 8).This natural condition shows devotion in god. Guru Gobind Singh encouraged that Sikhs grow their hair, which is to follow ‘as God intended’ (The 5 K’s, n.d., Para 8). Scriptures: There are two main sources for the Sikhs: The Guru Grinth Sahib and the Dasam Granth (Sikhism, n.d., Para 9). The Adi Granth means ‘The First Volume’. It is referred to the version the sripture which was created by Arjan Dev in 1604. The Guru Granth Sahib is the final version of the scripture which was developed by Guru Gobind Singh (Sikhism, n.d., Para 9). Adi Granth: The compilation of Adi Granth was done by Bhai Gurus under the guidance of Arjan Dev in 1963 and 1964. Its script is Gurmukhi, which was standardised by Arjan Dev for using it in Sikh scriptures.It was created to protect the hymns and teachings of the Sikh gurus (Sikhism, n.d., Para 10-11). The original version of Adi Granth is expected to bemantained by the Sodhi family o f Kartarpur. Actually, the history says that original version of this scripture was burned by Ahmad Shah Durrani’s army in 1757 when they burned Kartarpur (Sikhism, n.d., Para 10-11). Guru Granth Sahib: It has the original version of Adi Granth with some addition of Teg Bahadur’s hymns. Guru Gobind Singh’s verdict was that Guru Granth Sahib will be the eternal guru for all the Sikhs (Sikhism, n.d., Para 12). It consists of the composition of the first five gurus, Teg Bahadur and just one ‘Salok’ from Guru Gobind Singh (Sikhism, n.d., Para 13). Dasam Granth: The Dasam Granth is also called The Book of the Tenth Master. It is an eithteenth-century collection of poems, which are written by Gobind Singh (Overview of Sikh Scriptures, n.d., Para 9). It was given a shape of book by Bhai Mani Singh (Overview of Sikh Scriptures, n.d., Para 9). Janamsakhis: They are the biographies of the first Sikh guru, Guru Nanak. It is the proof of amazing acts and mystic conversations. The composition of new Janamsakhis was the result of three great schisms of the Sikh religion: the Minas, the Handalis and the Udasis (Overview of Sikh Scriptures, n.d., Para 11, 12 14). The Ten Gurus and their teachings: The word â€Å"GURU† in Sanskrit means person having great knowledge, wisdom and authority, a teacher, a soul who can dispel darkness. In Sikhism, Guru, means the divine guidance provided through their ten Enlightened Masters (Ten Guru, n.d., Para 2). Starting with Guru Nanak in1469 ending with Guru Gobind Singh in 1708, their wisdom, preaching’s have been compiled in the Holy Scripture â€Å"The Guru Granth Sahib† (Ten Guru, n.d., Para 2). First Guru – Guru Nanak Sahib Guru Nanak was born to Tripta, a simple religious woman and wife of Mehta Kalyan Das, on April15, 1469 in Shekhpura (Pakistan), now Nanakana Sahib (Ten Guru, n.d., Para 1). From the earlier child hood Nanak was an extraordinary child. He learnt Hindi Sa nskrit at the age of seven and by thirteen learned Persian too. He got married to Mata Sulakhni, who gave him two sons: Sri Chand and Lakhmi Das. (Ten Guru, n.d., Para2) In August 1507, while bathing in ‘Vain Nadi’, at the age of 38, Guru Nanak dedicated himself to the service of humanity.† There is no Hindu, no Musalman† were his first divine words (Ten Guru, n.d., Para3). He started long travels and preached his unique and divine doctrine that is Sikhism (Ten Guru, n.d., Para3). The preaching’s during these tours are compiled as Char Udasis of Guru Nanak Sahib (Ten Guru, n.d., Para3). In the year 1522 Guru Nanak Sahib founded the city of Kartarpur (now in Pakistan) and spent the rest of his life there (Ten Guru, n.d., Para5). There he pioneered the Langar or free kitchen. In 1539 he established Bhai Lehna ji (Guru Angad Sahib) as the second Nanak. On Sept 22, 1539 he left for the heavenly aboad. He was a good poet and musician. He wrote approximatel y 947 hyms comprising Japji Sahib, Asa-di-Var, Bara-Mah, Sidh-Gosht and, Onkar. Guru Arjan Sahib compiled all these in Guru Granth Sahib (Ten Guru, n.d., Para5). Second Guru – Guru Angad Sahib Guru Angad Sahib (Bhai Lahna ji) was born on March 31, 1504 to Mata Ramo ji wife of a petty trader Pheru ji in a village named Sarai Naga (Matte di Sarai) in district Muktsar (Punjab). (Ten Guru, n.d., Para1) Bhai Lahna was a worshipper of Goddess Durga and use to go to pilgrimage to Jwalamuki Temple. During one such pilgrimage he heard the hymn of Guru Nanak Sahib and decided to meet him. He got fully changed after this meeting. He became a follower of Guru Nanak Sahib and became his Sikh (Ten Guru, n.d., Para 2 3). Guru Angad Sahib introduced Gurumukhi Script, a new alphabet modified from old Punjabi Script (Ten Guru, n.d., Para 5). He started Mall Akhara were physical as well as spiritual was given to the youth. He also wrote the first biography of Guru Nanak Sahib (Bhai Bale Wali J anamsakhi) (Ten Guru, n.d., Para 5). At the age of Forty eight on March 29, 1552 Guru Angad Sahib breathed his last but before that he nominated Amar Das Sahib as his successor. (Ten Guru, n.d., Para7) Third Guru – Guru Amardas Sahib Guru Amardas Sahib was born on May 5, 1479 in the village Basarke Gillan in Amritsar, to mother Bakht Kaur and father Tej Bhan Bhalla, who later became the Third Nanak (Ten Guru, n.d., Para1). Influenced by Guru Angad Sahib and preachings of Guru Nanak Sahib he converted to Sikhism and adopted Guru Angad Sahib as his spiritual Guru. In 1552 he was made the Third Nanak by Guru Angad Sahib (Ten Guru, n.d., Para 2). Establishing his headquarter in Goindwal, he propagated the faith in a planned manner (Ten Guru, n.d., Para 2).He added 869 self composed verses to Guru Granth Sahib (Ten Guru, n.d., Para6). He transferred the Guru ship to his son-in-law, Guru Ramdas Sahib, making him the Fourth Nanak. On September 1, 1574 at a ripe age of 95 Guru Amarda s Sahib passed away for heaven (Ten Guru, n.d., Para 7) Fourth Guru – Guru Ramdas Sahib Guru Ramdas Sahib was born on September 24, 1534 at Chuna Mandi, Lahore (Pakistan).His father Baba Hari Das ji Sodhi Khatri and mother Mata Daya Kaur were too poor and he use to sell boiled grams to earn his bread (Ten Guru, n.d., Para1). Guru Amardas Sahib married his daughter Bibi Bhani ji to Guru Ramdas Sahib. Due to his dedication, energy, saintliness and eloquence Guru Amardas Sahib found him apt for the Guruship and made him the Fourth Nanak on September 1, 1574. Foundation of Ramdas Pur or Chak Ramdas (now Amritsar) was laid by Guru Ramdas (Ten Guru, n.d., Para 3).On September 1, 1581 he passed away to heaven but before that he nominated his youngest son Guru Arjan Sahib as the fifth Guru (Ten Guru, n.d., Para 2). Fifth Guru – Guru Arjan Sahib Guru Ramdas Sahib and Mata Bhani ji’s youngest son Guru Arjan Sahib was born on April 15, 1563. He learnt Gurmukhi script and w as also taught Persian, Hindi and Sanskrit languages. He became Guru at the young age of 18 years. (Para1) Guru Arjan Sahib commissioned two sacred Tanks Amritsar and Santokhsar. He also laid the foundation of a town (Taran Sahib) near Goindwal Sahib and created a large tank and Gurdwara (Ten Guru, n.d., Para 2 3). He contributed 2000 verses for the same. He also institutionalized the tradition of Daswandh and Masand system that helped in attracting large number of followers to Sikhism from far distant places from Punjab (Ten Guru, n.d., Para 4 5). Guru Arjan Sahib was also called as â€Å"Sacha Patshah†. The fast paced spread of Sikhism during his period made the orthodox Hindus and princely Muslims very jealous. He was tortured for 3 days, he was made to sit on the hot iron plates and burning sand was poured on his naked body (Ten Guru, n.d., Para6).Later he was thrown into river Ravi. May 30, 1606 is celebrated as the day of Martyrdom of Guru Arjan Sahib (Ten Guru, n.d., Para6). Sixth Guru – Guru Hargobind Sahib With the sudden demise of Guru Arjan Sahib, his father and fifth Nanak, Guru Hargobind Sahib succeeded and became Sixth Nanak at the age of eleven years in 1606. He was the only child of Guru Arjan Sahib and Mata Ganga ji, born on June19, 1595 at village Guru Ke Wadali. He had one daughter Bibi Viro ji, he had five sons. His fifth son Tegh Bahadur became the Ninth Nanak in 1664 (Ten Guru, n.d., Para1). Guru Hargobind Sahib popularised the idea of â€Å"Saint – Soldier† which was the need of that hour. He used to keep with him two swords Piri – Miri. The first one was supposed to have the Spiritual Power and the second one was supposed to have Military Power. He also encouraged Sikhs for participating in Martial Arts and military Trainings (Ten Guru, n.d., Para 3). During his life time he fought many wars with the Mughal Emperor and always stood victorious (Ten Guru, n.d., Para 3). He breathed last on February 28, 1644. Before his demise, he nominated his grandson Har Rai Sahib as the Seventh Nanak (Ten Guru, n.d., Para 23). Seventh Guru – Guru Har Rai Sahib At the tender age of 14 Guru Har Rai Sahib was nominated as successor and Seventh Nanak by his Grand Father Guru Hargobind Sahib. He was son of Baba Gurdita Ji and Mata Nihal Kaur (Ten Guru, n.d., Para 1). Guru Har Rai Sahib was a believer of non –violence or â€Å"Ahimsa Parmo Dharma† but he never disbanded the Saint Soldiers. In Kiratpur Sahib, he founded an Aurvedic Herbal Hospital Research Centre. Ha also established 360 Manjis (missionary seats) (Ten Guru, n.d., Para 2 3). Guru Har Rai Sahib left for heavenly abode on October 6, 1661, but before that installed his younger son Har Krishan as the Eighth Nanak (Ten Guru, n.d., Para 10). Eighth Guru – Guru Har Krishan Sahib He was born on July 7, 1656 at Kiratpur Sahib, and was the second son of Guru Har Rai Sahib and Mata Krishan Kaur (Ten Guru, n.d., Para 1). Before the death of Guru Har Rai Sahib in 1661, at an earlier age of about five, Guru Har Krishan Sahib was made Eighth Nanak by his father (Ten Guru, n.d., Para1). In his short span of three years as Eight Nanak, Guru Har Krishan Sahib took over the masses with his simplicity and humanitarian deeds. He was nicknamed Bala Pir (Child Prophet) by the local Muslim population (Ten Guru, n.d., Para5). During his last days when he was seriously ill, he was asked to name his successor, t which he said Baba Bakala, which referred to Guru Teg Bahadur. Finally, Guru Har Krishan Sahib passed away on March 30, 1664 (Ten Guru, n.d., Para6). Ninth Guru – Guru Tegh Bahadur Sahib Guru Tegh Bahadur Sahib was born on April 1, 1621. He was the youngest son of Guru Hargobind Sahib (Seventh Nanak) He was a great swordsman, horseman and shooter (Ten Guru, n.d., Para1 3). With the untimely demise of Eight Nanak, Guru Har Krishan Sahib without declaring his successor there was a situation of un certainty for some time. Then in August 1664, some prominent Sikhs from Delhi, acknowledged Guru Teg Bahadur Sahib as the Ninth Nanak (Ten Guru, n.d., Para 5). During 1674-75 the Muslim state forcefully converted people to Islam. To fight this nefarious act with peaceful means Guru Tegh Bahadur Sahib sacrificed himself. On November 11, 1675 he was executed, his head was severed from his body at Gurudwara Sis Ganj in Chandi Chowk, Delhi. Before his execution in July 1675 he installed, his son Guru Gobind Sahib as the Tenth Nanak (Ten Guru, n.d., Para 27). Tenth Guru – Guru Gobind Singh Sahib Guru Gobind Singh Sahib, the tenth and the last Guru of Sikh faith, was born on December 22, 1666 (Ten Guru, n.d., Para1 2).His name was Gobind Rai Sodhi. After the execution of his father and ninth Nanak, Guru Tegh Bahadur Sahib, Guru Gobind Singh was formally made Guru on November 11, 1675 (Ten Guru, n.d., Para1 2). Guru Gobind Singh fought many wars during his period. On October 7, 17 08, he passed away in Nanded. With this Guru Gobind Singh ended the line of personal Gurus and passed on th succession to the Holy Book â€Å"The Guru Granth Sahib† (Ten Guru, n.d., Para 13). Sikhism in History: The time period of all the ten gurus lasted for more than 239 long years. The Sikh religion prospered very well during this period, which could be possible under the guidance of the Gurus (Sikh History, Gurus Period, n.d., Para 1). Banda Singh Bahadur whose real name was Madho Das possessed spriritul powers. He was the follwoer of Guru Gobind Singh. Under Guriji’s direction, he collected an army from Punjab and started fighting against tyrants. After winnig Surhind he established the first Sikh kingdom and a new fort near Nahan which was called Lohgarh. Later Bandha Singh was prisoned by the emperor of Delhi and he was killed in 1716 (Sikh History, Gurus Period, n.d., Para 1-4). After martyr of Banda Singh, the religious persecution of the Sikhs started soon af ter that (Sikh History, Religious Persecution Era, n.d., Para 1-3).They were attacked and robbed. They stayed alive on vegetables and fruits but they were not discouraged. Having faith in Guru Gobind Singh Ji’s prediction that the Sikh would rule the country one day, they continued their mission of religious persecution which went for 50 years. Then Sikhs regrouped got ready to fight tyrants and after gathering strength they were ready to defeat the tyrants and then they started ruling around 1760s (Sikh History, Religious Persecution Era, n.d., Para 1-3). Maharaja Ranjit Singh became their leader and conquered Lahore in 1799. He ruled Punjab for 40 years. His Kingdom was so big that he had to divide it in 4 different states. He died at the age of 59 in 1839 (Sikh History, Sikh Kingdom Era, n.d., Para 1 2). The British bought then the generals of the army and attacked the Sikh kingdom (Sikh History, Colonial Era, n.d., Para 1 2). In 1849 they finished the Sikh kingdom era a nd controlled Punjab with other parts of India. As the British knew that the Sikhs are brave warriors, they appointed them with jobs in their army (Sikh History, Colonial Era, n.d., Para 1 2). The Sikhs proved themselves very useful for the British in many wars wherever they fought for them (Sikh History, Colonial Era, n.d., Para 1 2).The British awarded the Sikhs with portions of lands after their retirement from the army. This action of British encouraged lots of sikhs to join the British army. The Sikhs had covered about 80 percent of the army population by the time the British left India after Indian independence (Sikh History, Colonial Era, n.d., Para 1 2). The Indians’ struggle for freedom began in 1920s and it lasted in 1947. The Sikhs played a major role during that struggle by participating in this mission enthusiastically (Sikh History, Colonial Era, n.d., Para 5). The Gurudwara movement of the sikhs was the starting of the national struggle for freedom (Duggal, 2008, Para 4). The Battle of Saragarhi was fought between the fourth Battalion of the Sikh Regiment of British India and approximately 10,000 Afghan and Orakzais tribesman on 12 September 1897 (Battle of Saragarhi, Sikh Regiment, 2009, Para 1).This battle has been noted as the exampe of exceptional bravery. UNESCO has portrayed the battle of Saragarhi as one of the legends of joint bravery (Battle of Saragarhi, Sikh Regiment, 2009, Para 1). The British rulers of india had built many forts in the North West Frontier Province to strengthen their position and to control the hostile activities of the local tribal groups who were living in the north western frontiers of undivided India (Battle of Saragarhi, Sikh Regiment, 2009, Para 2 3). Fort Gulistan and Fort Lockhart are the examples of such forts (Battle of Saragarhi, Sikh Regiment, 2009, Para 2 3). They were built on the ranges of Hindukush and Sulaiman ranges (Battle of Saragarhi, Sikh Regiment, 2009, Para 2 3). As the two fort s were situated a little bit far from each other, a signal post called Saragarhi was created to have interations between the two forts. In 1897 Afridi tribes attacked Fort Gulistan and later the troops of Orakazai and Afridi made fresh attacks and seiged Fort Lockhart and Saragarhi (Battle of Saragarhi, Sikh Regiment, 2009, Para 2 3). The strength of Afghani force was about 12000 to 14000 who were fully armed tribesman. They tried to make the Sikhs surrender but the Sikhs were determined to fight against them and they continued fighting. For this reason it became the famous battle of Saragarhi. Sepoy Gurumkh Singh was the person who continued giving every detail of the battle through heliographic signal until the enemy set the place near Saragarhi on fire. When the enemay were close Sepoy Gurumukh Singh took out his rifle after closing heliograph and he killed 20 people of them before dying (Battle of Saragarhi, Sikh Regiment, 2009, Para 2 3). Every soldier who defended Saragarh i died in this outstanding action of bravery. When this courgeous deed was narrated in the Parliament of the United Kingdom, the memebers gave standing applause to it. Even Queen Victoria also came to know about this incident. It was annouced in the Parliament that the army having the brave Sikhs cannot loose any war (Battle of Saragarhi, Sikh Regiment, 2009, Para 2 3). All the Sikh officers and soldiers who died in this battle were honoured as the Indian Order of Merit, which was the highest bravery award of that time (Battle of Saragarhi, Sikh Regiment, 2009, Para 4 5). The current Sikh Regiment now celebrates the day of the Battle of Saragarhi on every 12th September as the Regimental Battle Honours Day (Battle of Saragarhi, Sikh Regiment, 2009, Para 4 5). The British also built tow Saragarhi Gurudwaras one in Amritsar and another in Ferozepur to respect those soldiers (Battle of Saragarhi, Sikh Regiment, 2009, Para 4 5). Observances: Sikh Culture: Sikh culture is the mixture of many asects, including many festivals and ceremonies. There are songs which are many religious as they are sung in praise of God. For that reason they are different from other songs (Sikh Culture, n.d., Para 1). Sikh festivals are time for these people to rededicate themselves to the faith (Sikh Festivals, n.d. Para 1). Even they take death anniversaries of their Gurus as festival since it reminds them the value of sacrifice for a good cause(Sikh Festivals, n.d. Para 1). Some of the main Sikh festivals are (Sikh Festivals, n.d. Para 1): Baisakhi: it is a New Year festival in the Sikh calendar. The Sikh new years starts with Chet 1 (Sikh Calendar, 1998, Para 2). On this day in 1699 Khalsa was created by Guru Gobind Singh Ji. It generally falls on 13 April. Nishan Sahib, the Sikh flag is replaced with a new one (Sikh Festivals, n.d. Para 3 4). The flag post is cleaned. The flag cloth which is Chola is rehoisted. This ceremony is completed by Ardas. A Bhog, which is completion of ceremony, takes place on the morning of Baisakhi and the singing of divine hyms takes place. Also all the Sikh men, women and children participate in Sewa that is Langar which remains open for the worshipers for three days (Sikh Festivals, n.d. Para 3 4). Diwali: Sikhs celebrate Diwali since Guru Hargobind reached Amritsar on this particular day after he got released from Gwalior jail (Sikh Festivals, n.d. Para 5). It is the festival of lights. On this day the Golden Temple complex is decorated with lights and magnificient displays of fireworks occur. The historic weapons of the Gurus are displayed (Sikh Festivals, n.d. Para 5). In 1577 the Golden Temple’s foundation was kept on Diwali itself (Sikh Festivals, n.d. Para 6).Sikhs have continuedthis yearly celebration with lighting up lamps and distributing sweets. The largest gathering takes place at the Golden Temple on this day (Sikh Festivals, n.d. Para 6). Hola Mohalla: This is an annual festival which takes place at Anand pur Sahib (Sikh Festivals, n.d. Para 7). Guru Gobind Singh started this festival to exercise millitary practices. Mock battles are also fought on this day which is just after Holi festival. Music and poetry competitions follow mock battles (Sikh Festivals, n.d. Para 7). On this day kirtan and religious lectures are performed in number of durbars where Sri Guru Granth Sahib is present (Sikh Festivals, n.d. Para 7).This festival generally falls on March 17 (Sikh Festivals, n.d. Para 7). Ceremonies: There are many events like birth, marriage and death in any family but in a Sikh family there are special ceremonies for such events, which are done to receive blessings from God (Sikh Ceremonies, n.d., Para 1). All Sikh ceremonies are done in the presence of the Guru Granth Sahib Ji that involves singing of hymns, Ardas, Hukamnana and distribution of Karah Prashad. Langar is provided for all the guests (Sikh Ceremonies, n.d., Para 1). Following are some of the main Sikh ceremonies: Nam Kar an: After the birth of child the mother and the child go to the Gurudwara with relatives and friends for the naming ceremony (Sikh Ceremonies, n.d., Para 2 3). The Granthi stirs water and sugar crystals in a bowl that is kept in front of Guru Granth Sahib and read the ‘Mool Mantra’ and first few lines of the ‘Japji Sahib’ (Sikh Ceremonies, n.d., Para 2 3). First few drops are put into child’s mouth and the rest is given to the mother to drink (Sikh Ceremonies, n.d., Para 2 3).Hymns are spoken publicly to bless the child. The child name is chosen from the first letter of the ‘Hukam’ (Sikh Ceremonies, n.d., Para 2 3).The title of Singh (Lion) is given to male and Kaur (Princess) to the girl (Sikh Ceremonies, n.d., Para 2 3). Prashad is distributded afer that (Sikh Ceremonies, n.d., Para 2 3). Dasar Bandi: This is a very important and exciting moment in the life of a Sikh hen he starts tying the turban. Sometimes family celebrates th is occasion which is called Dastar Bandi (Sikh Ceremonies, n.d., Para 4). Marriage Ceremony: The wedding takes place in the morning in a Gurudwara.After the both family of the boy and family of the girl greet each other then they enter the Gurudwara congregation hall where bride sits alonside with the bridegroom facing the Guru Granth Sahib Ji. The ragees sing the hymn of ‘palla’ that is bridegroom’s scarf. Then the couple walk gracefully around the Guru Granth Sahib where the bride folow the bridegroom. Later prashad is distributed and lunch is provided by the bride’s family (Sikh Ceremony, n.d., Para 5). Amrit Sanchar: This ceremony is done for the initiation into the Khalsa brotherhood (Sikh Ceremony, n.d., Para 6). The initiate can be done by a man or a woman of any caste or religion (Sikh Ceremony, n.d., Para 6). Before seeking baptism, they start behaving, acting or looking like a Sikh (Sikh Ceremony, n.d., Para 6). It is done at a quiter place where Guru Granth Sahib is installed. The initiate will wash his hair, cover his head, wear clean clothes and the 5K’s (Sikh Ceremony, n.d., Para 6). Hymns are recited. If a person does not have a Sikh name, they keep a new name at this time (Sikh Ceremony, n.d., Para 6). Funeral Ceremony: At the ime of death loud wailing is discouraged (Sikh Ceremony, n.d., Para 6). Cremation is preferred for the dead body but if it is not possible then burial or submergence at sea are also acceptable (Sikh Ceremony, n.d., Para 6). The body is usually washed and clothed by the family members and then hymns are recited. A continuous reading of Sri Guru Granth Sahib is done till ten days. It concludes the end of mourning period (Sikh Ceremony, n.d., Para 6). Gurupurbs: Following are the major Gurupurbs celebrations (Sikh Ceremony, n.d., Para 8): Birth of Guru Nanak Dev Ji First installation of Sri Guru Grath Sahib Ji Martyrdom of Guru Arjan Dev Ji Birth of Guru Gobind Singh Ji Martyrdom of Guru Te g Bahadur Ji Martyrdom of the Sahibzadas Sikh Art and Culture: Maharaja Ranjit was an ardent lover of art. For that reason he bacem the first patron of Sikh paintings. He made the painters decorate the walls and the panels of the Golden Temple (Sikh Paintings, n.d., Para 1, 2 9). Sikh paintings show the historical events and characters. They give us complete understand ing of the political struggle of Sikhs and the roles of some unforgettble heros of that struggle. There are three different schools of Sikh paintings: Guler School, Kangra School and Lahore School (Sikh Paintings, n.d., Para 1, 2 9). Some famous paiters are Gian Singh, S.G. Thakur Singh, Sobha Singh and S. Kripal Singh (Sikh Paintings, n.d., Para 1, 2 9). Sikh Music and Musical Instruments: Sikhs developed their own instruments like Rabab, Dilruba, Taus, Jori and the Sarinda (Sikh Music and Musical Instruments. n.d., Para 1). The Sarangi was also promoted by Guru Har Gobind (Sikh Music and Musical Instruments. n.d., Para 1).Rabab was first used by Bhai Mardana and Jori and Sarinda were designed by Guru arjan Dev (Sikh Music and Musical Instruments. n.d., Para 1). The Taus was made by Guru Har Gobind. The Dilruba was made by Guru Gobind Singh (Sikh Music and Musical Instruments. n.d., Para 1). Sikhs in the Western World: Sikhs arrived in the United States and Canada in the late 1800s (Sikh Community, 2006, Para 1). Sikhs who have migrated to this region are generally tensed of maintaining their identity when adapting to the Western culture. Those educated in the United Kingdom or Other British Commonwealth countries, this change to life in North America is easy (Being Sikh in a Western world, 2006, Para 1). In recent years, the conflict between the values of Sikh beliefs and Western culture has created difference at the work place. The employers are demanding that they cut tehir hair and remove their turbans. Sikhs performing in sports have shown their capabilities of doing well with their turb ans on the fields (Being Sikh in a Western world, 2006, Para 2). Regardless of these stresses, Sikhs have maintained their religious beliefs. They have demonstrated excellence in the football, basketball and boxing etc (Being Sikh in a Western world, 2006, Para 3). Notable Sikhs in the modern era: Sikhs are very well represented in Indian Politics like recent Prime Minister Manmohan Singh, the Chairman of the Indian Planning Commission Montek Singh Ahluwalia and the former President, Giani Zail Singh (Sikh, 2009, Para 5 6). Indian millitary services include Sikhs like General Joginder Jaswant Singh, who is the General of the Indian Arrmy. The highest ranking general in the history of the Indian Air Force has been Marshal of the Air Force Arjan Singh (Sikh, 2009, Para 5 6). Sikhs can be seen in various kinds of professions like scientists, engineers and doctors. Some of these are Professor Piara Singh Gill, a famous Nuclear Scientist who has ben associated with American Manhattan Project; Dr. Narinder Singh Kapany who is a famous Scientist and gets the credit of the father of fiber optics; Simon Singh, physicist and Science writer and Professor Baldev Singh Dhillon, a famous Agricultural Scientist (Sikh, 2009, Para 6). Sikhs can be found in industrial ventures as UK based New Look, which is women’s clothing fashions and Thai based JASPAL. Both are started by Sikhs only. India’s biggest pharmaceutical company Ranbaxy Laboratories is leaded by the Sikhs only (Sikh, 2009, Para 7). Writer Khushwant Singh, Singer Daler Mahendi, Jaspal Bhatti, Milkha Singh former world record holder, Bishen singh Bedi, cricketer and Parminder Nagra, English actress all are distingushed sikhs (Sikh, 2009, Para 8). Conclusion: Sikhism is a beautiful religion. It offers meaning, peace and divine bliss. It shows the path to realisation of Akaal, a timeless god (Why I choose Sikhism, n.d., Para 1). Due to unawareness many youth are being unused to this rich and amazing he ritage (Why I choose Sikhism, n.d., Para 1). Why join Sikhism: As it is a beauiful religion, which shows the path to truth and believes in one God, I have become passionate about this religion. It has selfless love in it. It has bravery and treats everyone similarly. It has its unique scriptural canon, ceremonies and traditions (Sikhs: A distinct religion, panth and nation that welcome all, n.d., Para 1). For that reason I join Sikhism. Reference List â€Å"Battle of Saragarhi. Sikh Regiment†. 2009. http://www.indianetzone.com/6/battle_saragarhi.htm . â€Å"Being Sikh in a Western World†. 2006. http://www.wingluke.org/pages/sikhcommunitywebsite/beingasikhinawesternworld.html . Duggal, K S. 2008. â€Å"Sikhs in the Freedom struggle†. Vol XLVI No 35. http://www.mainstreamweekly.net/article891.html . â€Å"Overview of Sikh Scripture†. http://www.important.ca/sikhism_scriptures.html . Robinson, B A. â€Å"Introduction to Sikhism†. 2009. http://fateh.si khnet.com/s/SikhIntro http://www.religioustolerance.org/sikhism.htm . â€Å"Sikh†. http://tripatlas.com/Sikh . â€Å"Sikhism†. http://www.religionresourcesonline.org/study_different_religions/sikhism/sikhism.php . â€Å"Sikhs a Distinct Religion, Panth and Nation that Welcome All†. http://www.sikhlionz.com/sikhreligion.htm . â€Å"Sikh Calendar†. 1998. http://www.sikhs.org/dates.htm . â€Å"Sikh Family Life†. http://atschool.eduweb.co.uk/carolrb/sikhism/family.html . â€Å"Sikh History†. http://www.infoaboutsikhs.com/background.htm . â€Å"Sikh Paintings†. http://www.ethnicpaintings.com/indian_painting_styles/sikh-paintings.html . â€Å"Ten Gurus†. http://sgpc.net/gurus/gurugobind.asp . â€Å"The 5 Ks†. http://www.amritsar.com/The%20Five%20K.shtml . â€Å"Why I choose Sikhism†. http://www.whyichosesikhism.com/ . This essay on Sikhism (Religion and Theology) was written and submitted by user Raphael T. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.