Free Essay

Lilo

In:

Submitted By sunkissedadrian
Words 490
Pages 2
Adriana Lezama
English 9
March20, 2014
6th HR.

Many students in universities are arguing weather video games effect people. Some are

arguing that they do affect peoples everyday lives and their future; while others argue the opposite.

Students at universities are trying to look for more statistics to prove what they believe for video

games. Students against video games also say risk failing games, and withdrawal of financial support

from tuition- paying parents.

Students at different universities have proven that people who play video games get

aggressive and have different mood behaviors. Others that argue that they don’t affect, say it gives a

positive lesson, is a proper interaction, and doesn’t affect at all. There has been enough proven research

that video games do hurt people mentally, therefore I am against video games.

Video games aren’t taken into consideration as parts as addictions while many believe

it just isn’t. People believe that addictions have to be drugs, physical fitness, alcohol, or disorders when

really there’s more. There’s many things that people don’t consider an addiction like video games,

people consider this as an entertainment that doesn’t affect you whatsoever but if you think about it

and take a look at how people react to them you can start seeing that there is something wrong.

There is enough evidence that video games do cause problems that affect people mentally, not right

away, but through time. “ too much leads to no human interaction ”(page:29). The evidence ehere

shown allows us to see a video game players obsession and how it controls them, the players eventually

have no control. Video games don’t just hurt a video gamer mentally but also withdraws them to any

human interactions. The evidence shown allows us to see a video gamer’s obsession and how it controls

them and this is bad because the players eventually have no control. Video games are also a withdrawal

to any human interactions whatsoever. “And of roommates who no longer respond to human

interactions while playing, transfixed as they are by the interface bridging virtual experience and human

mind”. They then are no longer thinking of the real world, what’s actually going on around them. After

this, video gamers are no longer realistic and are less social. “Suppose further they claim role playing

games allow them to be courageous heroes they cannot be in real life or that communicate with online

friends teaches them something about relationships they would otherwise never know about” (pg.30).

They no longer think realistic when they try to be someone else or someone they wish they were by

Playing these games. Although some researchers say video games are harmless, one can also argue that

they can be mentally and emotionally harmful. “Living out their personal fantasies, usually by adopting

the traits they believe they lack in the real world” (pg.29). Therefore I believe video games are an

addiction weather people consider it or not.

Similar Documents

Free Essay

Public Administration

...Terrez Ellis 68745 February 2, 2011 A+ Computer Operating Systems Crt 1101 Physical Security Physical Security The first layer of security you need to take into account is the physical security of your computer systems. Who has direct physical access to your machine? Should they? Can you protect your machine from their tampering? Should you? How much physical security you need on your system is very dependent on your situation, and/or budget. If you are a home user, you probably don't need a lot (although you might need to protect your machine from tampering by children or annoying relatives). If you are in a lab, you need considerably more, but users will still need to be able to get work done on the machines. Many of the following sections will help out. If you are in an office, you may or may not need to secure your machine off-hours or while you are away. At some companies, leaving your console unsecured is a termination offense. Obvious physical security methods such as locks on doors, cables, locked cabinets, and video surveillance are all good ideas, but beyond the scope of this document. :) Computer locks Many modern PC cases include a "locking" feature. Usually this will be a socket on the front of the case that allows you to turn an included key to a locked or unlocked position. Case locks can help prevent someone from stealing your PC, or opening up the case and directly manipulating/stealing your hardware. They can also sometimes prevent someone from...

Words: 804 - Pages: 4

Premium Essay

This Is Not a Test

...Commands with some options: * tar - options to create and extract, preserve options, gzip compress (you should have used either of these when you created your kernel source code backup.) * chmod - options to recursively change user, group and other permissions on files/directories * chown - options to recursively change file and directory user ownership * chgrp - options to recursively change file and directory group ownership * kill - superkill vs sending other signals to a process * ps - options to list all running processes on a Linux/Gnu system * top – Interactive Linux Tasks Status Display * grep - know how to use to find specific lines of info in output/files (you should have learned about this command in Intro to Unix/Linux Systems.) Shell expansion characters - be able to respond to questions regarding usage of '*' - asterisk, all files or all matching strings '?' - question mark, single character  What are the components of a Linux distribution? * Kernel * Desktop Environment * System Libraries * System Tools * Developmental Tools * File Structure Popular Distributions:  * Redhat,  * CentOS * Fedora  * Suse * Debian * Ubuntus What sort of hardware architecture can Linux be installed on? * Intel-x86 systems * Embedded systems From what sources can Linux be installed? * CD- ROM * Hard Disk * Floopy Disk * USB * Network Installation...

Words: 4587 - Pages: 19

Free Essay

The Story of Mo

...How to Train Your Dragon is a 2010 American 3D computer-animated fantasy film by DreamWorks Animation loosely based on the English book series of the same name by Cressida Cowell. The film was directed by Chris Sanders and Dean DeBlois, the duo who directed Disney's Lilo & Stitch. It stars the voices of Jay Baruchel, Gerard Butler, Craig Ferguson, America Ferrera, Jonah Hill, T.J. Miller, Kristen Wiig, Christopher Mintz-Plasse, and David Tennant. The story takes place in a mythical Viking world where a young Viking teenager named Hiccup aspires to follow his tribe's tradition of becoming a dragon slayer. After finally capturing his first dragon, and with his chance at finally gaining the tribe's acceptance, he finds that he no longer has the desire to kill it and instead befriends it. The film was released March 26, 2010 and was a critical and commercial success, garnering a positive response from film critics and audiences and earning nearly $500 million worldwide. It was nominated for the Academy Award for Best Animated Feature and Best Original Score at the 83rd Academy Awards, but lost to Toy Story 3 and The Social Network, respectively. The movie also won ten Annie Awards, including Best Animated Feature. Two sequels are currently in development, both to be written and directed by Dean DeBlois; they are scheduled to be released on June 13, 2014, and June 17, 2016.[2][3] The film's success has also inspired other merchandise, including a video game and a TV...

Words: 252 - Pages: 2

Free Essay

Test

..."It seems to me that the appropriate charge, based on the fair market value of the goods, should have been petty theft and not grand theft," LiLo's lawyer, Shawn Holley, told the gossip website. A petty theft charge is punishable by six months in jail, a much lighter sentence than the 3-1/2 years Lohan could face if convicted of grand theft.                                                                   Holley added, however, than whatever the value of the jewelry she still intends to show “Ms. Lohan didn't steal anything." Though the one-time Disney starlet claimed she was loaned the necklace, jeweler Geoff Kaman and his wife reported it stolen after pictures surfaced of Lohan wearing it. Upon hearing she was under investigation, LiLo turned the necklace over to cops. "i would never steal, in case people are wondering. I was not raised to lie, cheat, or steal," she wrote on her new Facebook page Thursday. Lohan was released on $40,000 bail on Wednesday after appearing in court wearing a skin-tight, white Kimbley Ovitz mini dress that was compared to Sharon Stone's infamous "Basic Instinct" frock. "what i wear to court shouldnt be front page news. it's just absurd," Lohan wrote on Facebook the next day. But the clothing quickly sparked a mad-dash by women looking to slip into the stylish attire, which was soon sold out in online...

Words: 365 - Pages: 2

Free Essay

Paper

...GNU GRand Unified Bootloader) is a boot loader package from the GNU Project. * Kernel Space- Kernel space is where the kernel (i.e., the core of the operating system) executes (i.e., runs) and provides its services. * Linux Daemons- A daemon is a type of program on Unix-like operating systems that runs unobtrusively in the background, rather than under the direct control of a user, waiting to be activated by the occurance of a specific event or condition. * Lightweight Directory Access Protocol (LDAP)- is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. * Linux Immutable Files * Linux Loader (LILO)- a boot loader (a small program that manages a dual boot) for use with the Linux operating system. Most new computers are shipped with boot loaders for some version of Microsoft Windows or the Mac OS. If a computer is to be used with Linux, a special boot loader must be installed. * Linux User Accounts- root is the user name or account that by default has access to all commands and files on a Linux or other Unix-like operating system. It is also referred to as the root account, root user and the superuser. * MAC with SELinux- Security-Enhanced Linux (SELinux) is a Linux kernel security...

Words: 544 - Pages: 3

Premium Essay

Personal Narrative

...Something that I remember with real pleasure from my childhood is when during P.E. we would play with a rainbow parachute. Which was when everyone had one handle around it and held it firmly, then throw it up while you still had it in your hand and let it come down slowly, it was pleasurable because it caused like a small breeze that was so cool. A good time growing up was when Christmas came by and my siblings and I would just wake up super early and we would just be so excited and jumping around telling our parents to wake up because Santa Claus had come to our house. And how holidays my whole family gathered and I would play with all my cousins. Something really upsetting that happened in my childhood, was when my best friend moved somewhere...

Words: 456 - Pages: 2

Premium Essay

The Destruction Of Family In Homer's Odyssey By Perry Patetic

...along better when we called instead of visiting. My friend Mason his mom left him for a guy but kept his siblings. They still talk and visit each other, he has a better relationship with her than he did living with her. Sometimes people may have to leave because of a job offering in a different state.This kind of thing happens every day to many people. The information given shows that there are many reasons why people leave and the effects it has, if it good or if it is bad. In this essay it goes over how traveling away from families can be hard but for the best. Also, how people have to move because of their job or want to explore and see new places. People will never leave their family they or forget their family. Like from the movie Lilo and Stitch, Stitch say, “Ohana means family. Family means nobody get left behind or forgotten. Perry Patetic passage had never thought about the opposing side in his passage and that is why his passage was not good enough. ...

Words: 536 - Pages: 3

Premium Essay

Julia Flynn Siler's Lost Kingdom

...Julia Flynn Siler’s Lost Kingdom: Hawaii’s Last Queen, the Sugar Kings, and America’s First Imperial Adventure, published in 2012, explores past the life of Lili’uokalani and also focuses on the role that sugar production played in the rise of the white oligarchy that overthrew the monarchy. Siler begins her text discussing the role of Western influence with the Hawaiian Monarchy stating how Kamahameha I was able to unite the Hawaiian Islands under his rule with the aid of Western advisors and guns, foreshadowing the further involvement of American and European influence and power in Hawaii. Siler also discusses the individuals that make up the white oligarchy, rather than just as a general group of men. This is important because it was a...

Words: 575 - Pages: 3

Premium Essay

Database Traffic Load Report

...Student Rolando Salas Date 8/10/14 Name SEC450 Database Traffic Load Lab Report NOTE: Use carriage returns and page breaks as needed to prevent table contents from extending across page boundaries. Task 1—Set up Database Traffic Flows * For Socket information, the protocol will be TCP and the Source port will be set to sqlnet – Oracle. When you have completed the traffic configuration, capture the Traffic Generator window (<Alt><PrtSc>) as shown below and paste (<Ctrl>V) it into the table cell provided below. Paste completed Traffic Generator dialog window here. Task 2—Discrete Event Simulation (DES) * Note that the Utilization is 100% and the throughput is truncated at less than 50 packets per second. This indicates total saturation of the serial link. Capture this DES Graphs window (<Alt><PrtSc>) and paste it (<Ctrl>V) into your lab document. Paste the DES Graphs Window showing 100% utilization here. * Set up the graphs as shown using Stacked Statistics this time. Note that the Utilization is slightly less than 100% and the packets/sec value is 100 packets/sec. Capture this DES Graphs window (<Alt><PrtSc>) as shown below and paste (<Ctrl>V) it into your lab document. Paste the DES Graphs Windows showing slightly less than 100% Utilization here. Why is the packets/sec value approximately 100 packets/sec? Explain below. The reason why the packets/sec value is almost100...

Words: 493 - Pages: 2

Premium Essay

Canadian Families Today

...What do Canadian Families look like today? In today’s society families are constantly changing, especially from the previous generations when it was common for two people to get married have children and stay together until “death do they part”. Now a days that social norm has changed in the sense that the statistics are on the rise regarding; divorce, blended families (stepfamilies), common-law families, as well as same sex families. In my opinion I think that Canadian families today look very diverse. As opposed to back when my parents and grandparents were born, many things have changed over time. Although, married couple are still the predominant family structure, accounting for 9,389,700 families, our world is rapidly changing and families are becoming more and more different from what they used to be. Firstly, divorce was most definitely not as common as it is today. Statistics Canada states that 41% of marriages will end in divorce by the 30th year at the latest. This has changed drastically over the years seeing as decades ago, divorce wasn’t seen as something socially acceptable and once married people expected to be together for the rest of their lives no matter what.Now days that is something very common and we see or experience it in our own families quite often. Next, this leads into the rising statistics we are seeing in regards to stepfamilies. Again like I said before, decades ago it was not only unacceptable to divorce, but then to remarry into another family...

Words: 654 - Pages: 3

Premium Essay

Demographic of Abortion

...The Demographics of Abortion Why do Women Choose to have an abortion? Introduction Every since the legislation was passed on Roe v. Wade that allowed women to have abortions there has been a great debate on the topic of abortion from the problems of having an abortion to the likely benefits of abortion. Legal induced abortion was defined as a procedure, performed by a licensed physician or someone acting under the supervision of a licensed physician, which was intended to terminate a suspected or known intrauterine pregnancy and to produce a nonviable fetus at any gestational age. Over the past years there seems to have been substantial changes in the demographic composition of women who have abortions. Theorists have often tried to determine the number of factors that may have influenced the change demographics, including shifting perspectives on teen pregnancy, religious shifts and changes in the community views regarding abortions. This paper will outline current literature on the subject of abortion along with discuss how women view abortion in regards to their decision to seek abortive services or to bear children and demographic representation of women who seek abortive services. The Demographics of Abortion 2 Review of Literature Abortion is an issue where moral principles, emotion and law often come to a head. There are many view points on abortion, but the main two differences are "pro-choice" and "pro-life". A pro-choice person feels that...

Words: 2840 - Pages: 12

Premium Essay

Jonas

...For more than nine decades, the name Walt Disney has been preeminent in the field of family entertainment. From humble beginnings as a cartoon studio in the 1920s to today's global corporation, The Walt Disney Company continues to proudly provide quality entertainment for every member of the family, across America and around the world. The Birth of a US Icon October 16, 1923 Walt signed a contract with M. J. Winkler to produce a series of Alice Comedies — this date is considered the start of the Disney company first known as The Disney Brothers Studio. In 1923, Disney joined his brother Roy O. Disney in Hollywood. By the time he arrived on the West Coast, word came from New York that a company wanted to purchase the rights to a series of Disney's live-action cartoon reels, ultimately titled Alice Comedies. A distributor named M.J. Winkler offered $1,500 per reel, and Disney joined her as a production partner. November 18, 1928 Steamboat Willie is released at the Colony Theatre in New York -- this marks the release of the very first Mickey Mouse cartoon, and the first appearance by Minnie Mouse. Taking on Television: 1950s In 1954, the "Disneyland" television series premiered. The show included an introduction by Walt Disney and incorporated film clips from Disney productions with live action and coverage of Disneyland. Some four million people tuned in each week. Disney also made a national folk hero out of Davy Crockett when he devoted a three-part program to coverage...

Words: 963 - Pages: 4

Free Essay

Comparison of Some Os Booting

...International Journal of Research in Computer and Communication Technology, Vol 2, Issue 11, November- 2013 ISSN (Online) 2278- 5841 ISSN (Print) 2320- 5156 Windows, Linux and Mac Operating system Booting Process: a Comparative Study Prof. Amar Rajendra Mudiraj Assistant Professor MIT (E), Aurangabad,Maharashtra, India. Email:amarmudiraj@gmail.com Abstract This paper presents a comparative study of Booting Paradigm of Windows, Linux and Mac, the three popular operating systems. Booting process is the essential and first step perform by the OS after this process execution all other processes can get the chance to execute , so we may say that booting is the first process because of which all other OS processes can execute. This experimental study gives an overview on the similarity and difference in Booting Process. As every operating system have to initially do the booting and as every OS providing different feature of each others, the paper is highlighting those micro and essential similarities and differences having by the operating systems during the Booting Process. Keywords: Booting, Cold booting, Worm booting, Linux Booting, Windows Booting, Mac Booting. In Worm Booting the computer get restart without shutdown the system, in which the system application and memory just get cleared and then reloading the operating system in primary memory. With the above two booting types we also have some other flavor in the computer booting like Sleep, Hibernate. Power - ON Load Instruction...

Words: 2846 - Pages: 12

Free Essay

Essay

...Guide to Linux+ ISBN 0-619-21621-2 End of Chapter Solutions Chapter 3 Solutions Review Questions 1. What is the default shell in Linux called? a. SH b. BSH c. CSH d. BASH Answer: d 2. What equivalent to the man command generally provides an easier-to-read description of the queried command and also contains links to other related information? a. who b. man help c. man -descriptive d. info Answer: d 3. What command can you use to safely shut down the Linux system immediately? a. shutdown -c b. shutdown -r c. down d. halt Answer: d 4. What command is equivalent to the man –k keyword command? a. find keyword b. man keyword c. apropos keyword d. appaloosa keyword Answer: c 5. The Red Hat Fedora installation can be performed in which two of the following modes? a. text b. full c. subtext d. graphical e. administrator assisted Answer: a,d 6. Linux commands entered via the command line are not case sensitive. True or False? Answer: False 7. Which command blanks the terminal screen erasing previously displayed output? a. erase b. clean c. blank d. clear Answer: d 8. When sitting at a computer running Linux, what key combination is pressed to open the graphical terminal? a. Ctrl+Alt+F1 ...

Words: 1133 - Pages: 5

Free Essay

Linux

...LINUX PROGRAMMING FINAL NOTES UNIT 1ST THESE NOTES ARE AS PER SYLLABUS & WILL HELP YOU TO ACHIEVE SUCCESS IN FINAL EXAM OF MCA 5TH SEMESTER. LETS START: UNIT 1ST Linux – The Operating System: Linux is one of popular version of UNIX operating System. It is open source as its source code is freely available. It is free to use. Linux was designed considering UNIX compatibility. It's functionality list is quite similar to that of UNIX. Linux is a free distributed implementation of a Unix-like Kernel Developed by Linus Torvalds at the University of Helsinki with the help of programmers across the Internet. Linux history: * Linux features: Following are some of the important features of Linux Operating System. * Portable - Portability means softwares can works on different types of hardwares in same way.Linux kernel and application programs supports their installation on any kind of hardware platform. * Open Source - Linux source code is freely available and it is community based development project. Multiple teams works in collaboration to enhance the capability of Linux operating system and it is continuously evolving. * Multi-User - Linux is a multiuser system means multiple users can access system resources like memory/ ram/ application programs at same time. * Multiprogramming - Linux is a multiprogramming system means multiple applications can run...

Words: 6867 - Pages: 28