Premium Essay

Mac Daddy

In:

Submitted By macdaddy
Words 324
Pages 2
Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250
Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250
Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250
Homey I copy pasted this twice and im only at 232, so imma do it one more time.
Ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy ay yo im mac daddy yo yo yo yo yo yo yo yo yo yo big mac daddy in the house yeah buddy big mac daddy daddy boy get on my level becuz im mac daddy, this aint to real essay homie you know that. This gotta be 250 so imma copy and paste this til I get 250
Yeah homey now we at 323, itz mac

Similar Documents

Premium Essay

Battle Royal Ralph Ellison Analysis

...Six feet below; yet, their influence would not go. The narrator's in "Daddy" and "Battle Royal" are both haunted by the lasting affects their deceased family members had on them. Ellison writes, "It was as though he had not died at all, his words caused so much anxiety" (Ellison 215). Ellison's quote captures the internal disorder that both narrator's experience; the lingering memories governing their emotions, actions, and thoughts - constantly dictating their lives. Although the narrator's in each story differ in ethnicity, culture, and gender; they share commonalities, such as being profoundly influenced by the death of a loved one during their adolescence. The indelible final impressions could not escape their memory. In "Daddy," Sylvia...

Words: 628 - Pages: 3

Premium Essay

Allusions In Daddy By Sylvia Plath

...The poem Daddy by Sylvia Plath is about her life and how she lived in a male dominated world. There are many allusions within the poem and how she compares historical events to her own experiences. The first example of allusion is the entire poem and how Sylvia’s past has haunted her. She talks about how she was abused as a child and how her father treated her like a prisoner. She refers to her father as a “Nazi” and herself as a “Jew”, throughout the poem she talks about the significant events that happened in World War 2 such as the concentration camps in Auschwitz and how she feels that she is being kept imprisoned as a Jew in a concentration camp as well as her father acting like a Nazi would towards a Jew. The second example of allusion...

Words: 323 - Pages: 2

Free Essay

Hello

...In Sylvia Plath’s poem “Daddy”, the speaker in the work is a woman whom dearly loves yet at the same time despises her father. As a young child she adored her father as she would a God or some other figure just as high in rank. She also felt fear and resentment because her father completely took over her life and ways of living. It is shown that the speaker has feelings she hasn’t quite figured out when it comes to her father’s existence. This poem expresses how she is attempting to free herself from the ongoing chains left locked shut by her father. /The speaker’s father dies when she is at a young age. Growing up, most children usually break away from their parents’ rules, start living for themselves, and start making their own lives. It was stated by the speaker, “Daddy I have had to kill you/ You died before I had time” (6-7), which indicates that she is now trapped in his ways and that she is unable to outgrow her father’s ruling over her. It is noticed that the speaker firmly uses the term ‘daddy’ instead of father which shows that she is stuck in a childhood memory. The way the speaker describes her father goes back and forth between praise and criticism. She doesn’t really know how she feels or even what she wants to feel about the man. Having her father disappear from her life at such a young age has obviously made the speaker believe that she is forever trapped to live this certain way for the rest of her life. She is scared to change because even though it may...

Words: 699 - Pages: 3

Free Essay

Daddy

...The Holocaust has left a very painful and harsh trace in the lives of millions of people, and those who witnessed it at least circuitously would probably never forget the deadly scenes of brutal extermination of Jewish civilians. Sylvia Plath’s poem Daddy is a sorrowful piece of writing, which demonstrates her pain, her lament, and her cry for help through pictures of the Nazi regime and genocide. In reality, however, mantled under the disguise of Hitler and fascism are her father and her husband. Through multiple metaphors, Sylvia Plath depicts these two as her oppressors, who have been gradually ruining her life tenderly in turn. Thus, in her great poem Daddy, Silvia Plath shows her grief caused by oppression from her father, her husband, and the contemporary cultural environment. As the title of the poem goes – Daddy – this literary work is mainly about her father, who had obviously left her when Plath was still young. After he had left her, he had freed her from the symbolical “black shoe, in which [she had] lived like a foot for thirty years.” In addition, she associates her father with Hitler, saying that she had always been scared of him, and depicting his mustache and Aryan eyes. She had also referred to her father as a brute, which also proves that she had been oppressed by him. However, despite that oppression that she had been experiencing, she still missed him. The author writes, “I used to pray to recover you” and “at twenty I tried to die and get back […] to...

Words: 342 - Pages: 2

Free Essay

Sylvia Plath’s Daddy

...Sylvia Plath’s Daddy The Holocaust has left a very painful and harsh trace in the lives of millions of people, and those who witnessed it at least circuitously would probably never forget the deadly scenes of brutal extermination of Jewish civilians. Sylvia Plath’s poem Daddy is a sorrowful piece of writing, which demonstrates her pain, her lament, and her cry for help through pictures of the Nazi regime and genocide. In reality, however, mantled under the disguise of Hitler and fascism are her father and her husband. Through multiple metaphors, Sylvia Plath depicts these two as her oppressors, who have been gradually ruining her life tenderly in turn. Thus, in her great poem Daddy, Silvia Plath shows her grief caused by oppression from her father, her husband, and the contemporary cultural environment. As the title of the poem goes – Daddy – this literary work is mainly about her father, who had obviously left her when Plath was still young. After he had left her, he had freed her from the symbolical “black shoe, in which [she had] lived like a foot for thirty years.” In addition, she associates her father with Hitler, saying that she had always been scared of him, and depicting his mustache and Aryan eyes. She had also referred to her father as a brute, which also proves that she had been oppressed by him. However, despite that oppression that she had been experiencing, she still missed him. The author writes, “I used to pray to recover you” and “at twenty I tried to die...

Words: 622 - Pages: 3

Premium Essay

Sylvia Plath Daddy Essay

...In Sylvia Plath’s poem, “Daddy”, Plath explores resentment, fear, and abuse in a father and daughter relationship. Throughout the poem, it is discovered that the narrator is describing a corrupt relationship with her father; comparing him to disturbing things such as a nazi, devil, Hitler, and eventually her husband. It is evident that the speaker is struggling to get over his memory and the destruction he brought in her life. The strong emotion of anger and fear of her father is presented in an unsettling way. By the end of the poem, readers can start to see the victims desire for real freedom from her father's wicked ways. Sylvia Plath uses literary devices such as metaphors and imagery to highlight the significance of the disturbing behavior and relationship the father had with the speaker. The use of imagery within the poem gives a base that allows readers to imagine the appalling events in the speakers life. The speaker uses imagery to describe her father as a “ghastly statue with one gray toe” (Plath, 1962). Plath uses the word “ghastly” to emphasize the horror and fear he brought into her life. She describes the statue stretching from the atlantic to the pacific ocean. This gives readers a...

Words: 1221 - Pages: 5

Free Essay

Project Identification

...Microsoft While Microsoft has been very successful in providing the Windows operating system to PC makers as well as the Office Suite there is growing competition from Apple in terms of both the consumer market and the corporate market. The Apple Mac OS is now becoming a viable contender in both markets. However, in terms of the quickly growing and ever expanding mobile market Microsoft has done very little to win over handset makers and create an environment in which individuals are writing apps for their platform. In this case Apple has become the predominant leader and the standard methods of competing are not producing the results needed to remain competitive in the long term market. For this reason I would recommend that Microsoft make a significant departure and start writing apps for the Apple iOS platform. While it may seem counterintuitive to develop apps that will run on other hardware Microsoft is currently faced with the issue of taking a beating in terms of the app market. Creating apps that run on iOS will allow Apple users to see the Microsoft products that are available and hopefully create additional revenue such that they can fund and create new opportunities in their own potential app store for Windows based phones. This is basically the last significant chance Microsoft has in order to salvage the potential for the mobile OS and app market. The opportunity is a single as it hopefully prevents the downfall of their mobile market altogether. There is a risk...

Words: 861 - Pages: 4

Premium Essay

Itt It 220chapter 1 Odd 1 Thru 50

...LAN b. A network of users that share computer resources across a metropolitan area – MAN c. A network that connects local area networks across a large geographic area – WAN 3. Expand the acronym MAC – Media Access Control 5. Expand the acronym WAN – Wide Area Network 7. Define the term topology – Topology is the architecture of a network 9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a d. token-ring hub 11. What is the difference between a hub and a switch? A hub broadcasts the data it receives to all devices connected to its ports and a switch forwards a frame it receives directly out of the port associated with its destination address. 13. What information is not included in an Ethernet frame? a. Frame size 15. What is the minimum and maximum size of an Ethernet frame? The minimum length of the Ethernet frame is 64 bytes from the destination MAC address through the frame check sequence. The maximum Ethernet frame length is 1518 bytes, 6 bytes for the destination MAC address, 6 bytes for the source MAC address, 2 bytes for length/type, and 1500 bytes for the data. 17. What does the OUI represent? The OUI represents the first 3 bytes of the MAC address that identifies the manufacturer of the network hardware. 19. INTERNET SEARCH: Find the device manufacturer for the following Ethernet devices: a. 00-C0-4F-49-68-AB – Dell Computer Corporation ...

Words: 976 - Pages: 4

Premium Essay

Networking

...#1 a. LAN b. MAN c. WAN #3 MAC- media access control #5 WAN wide area network #7 Topology- the architecture of a network #9 D. token-ring hub #11 hub- broadcasts the data it receives t oall devices connected to its ports Switch- forwards a fram it receives directly out the port associated with its destination address #13 A. frame size #15 64 and 1518 bytes #17 organizationally unique identifier- the first 6 digits of an address which are used to indicate the vendor of the network interface. #19 a. 00-C0-4F-49-68-AB: dell computer b. 00-0A-27-B7-3E-F8: apple computer inc. c. 00-04-76-B6-9D-06: com corporation d. 00-00-36-69-42-27: ATARI corporation #21 TCP/IP transmission control protocol/ internet protocol #23 Easy to add stations as there are no cables required Signals can be sent through doors and walls so the stations can be mobile so can move around There is less need for technical support in setting up due to their simple nature There are no cables to trip over so there are less health and safety issues to consider Share resources like printers. Have shared access to a centralized storage. #25 Router is used to make the connection to the ISP. The switch is used to interconnect other working devices, the broadband modem is used to make the data connection to the ISP. #27It can tell you if the ISP is the issue, as opposed to your computer or your own network at home. #29 a limited geographic area that provides wireless access for the...

Words: 678 - Pages: 3

Premium Essay

Computernt Plus

...administrative distance? Static route Describe the point-to-point WAN connection protocol provided by Telco? Leased Lines This cisco IOS command copies the current running configuration to a tftp server? Copy running-config tftp The concept of EIGRP Feasible distance is the computed metric of a SUCCESSOR route Is the dotted decimal equivalent to slash notation /25 255.255.255.128 The routing protocol that doesn’t support support VLSM? RIP v1 Is the broadcast address for the ip subnet 8.5.8.232 mask 255.255.0.0 8.5.255.255 Is the slash notation dotted decimal mask of 255.255.255.252 /30 The following mask could create an IP subnet from a class B that contains 500 hosts? 255.255.255.0 Port of STMP? 25 Protocol responsible for resolving mac addresses from IP addresses? ARP Two protocols commonly used in WANS at layer 2 of the OSI model? HDLC and PPP 192.168.254.0 is private up networks, classified by? RFC1918 Bits comprise the network portion of a class C address? 24 126.254.1.45 address belongs to what range? Class A 5 bits of mask for the host portion of an ip address, how may usable hosts addresses are available? 14 Usable host addresses are contained in a class c network? 254 What is the tool that can be used to determine the number of hops to a destination? Traceroute What are the possible mechanisms of...

Words: 2228 - Pages: 9

Premium Essay

Choosing the Right Equiptment

...Deciding on the right piece of equipment? By: Maurice T. Wade Student: American Intercontinental University Class: ENG106 Abstract Trying to set out and find the perfect computer for the members of my organization there are several factor that are vitally important. These are factors are but not limited to memory, anti-virus protection, and processing speed. So the best choice of all three of these in one would be a MAC from Apple. This would be the recommendation that I would give. The search has been narrowed down between three units which are Apple IMac 27inch (Late 2012), Dell XPS 27 Touch All in One (2720), last but not least Dell Optiplex 9010 AIO. Trying to set out and find the perfect computer for the members of my organization there are several factor that are vitally important. These are factors are but not limited to memory, RAM size, and processing speed. So the best choice of all three of these in one would be a MAC from Apple. This would be the recommendation that I would give. The search has been narrowed down between three units which are Apple IMac 27inch (Late 2012), Dell XPS 27 Touch All in One (2720), last but not least Dell Optiplex 9010 AIO. So for memory the Dell XPS takes this category by a land slide it comes off the shelf with 2038GB worth of memory. That is an extremely large amount of memory that could definitely come in handy depending on the reason that the organization plans on using the computers. With Apple IMac you are only getting...

Words: 493 - Pages: 2

Free Essay

Medium Network Design

...Universidad Interamericana, Recinto de Guayama | Diseño de una Red Mediana | | Luis Lugo 16 de enero de 2013 | Introducción En este trabajo estaré diseñando una red mediana para un colegio técnico el cual contiene pocos estudiantes. Este diseño usa conmutadores en las capas 2 y 3 proveyendo servicios a usuarios y a la misma vez seguridad para toda la red. La organización tiene alrededor de 700 usuarios y existen diferentes dominios dentro de esta red. Diseño Este diseño debe tener varios requerimientos específicos para poder completar lo que es una red mediana segura. Uno de estos requerimientos y el mayor de estos es que la red debe de proveer conectividad para tres servidores y alrededor de 700 clientes. De la misma manera, la red va a permitir que si en alguna ocasión alguno de estos equipos necesita separarse el otro, esto sea posible. En esta red otro de los requerimientos importantes es el de evitar ataques, ya que como la red va a estar comunicándose entre dos edificios, esta es más susceptible a ataques que provengan de afuera. El centro o “core” de esta red es un solo conmutador de capa 3 con interfaz de “Ethernet” este conmutador “core” le provee los servicios de índole de ambas capas (2 y 3) hacia los equipos necesarios. La red tiene 4 sub redes diferentes, una de estas es para los servidores, otra para los clientes, otra para el sistema de red inalámbrico y la última para la administración. Se diseñó un NDIS para monitorear...

Words: 1290 - Pages: 6

Premium Essay

International Business

...Al and begin to wonder where they should eat. But the question is answered for them almost as soon as it has arisen, for at the bottom of the exit ramp is a familiar sign, a gold arch on a red background – ‘McDonald’s – Straight Ahead One Mile’. McDonald’s! Hamburgers! French fries! ‘Let’s eat at McDonald’s!’ Paul suggests. ‘We can’t see anywhere else to go, and at least we know what their food is like’. ‘Sure’ Emma agrees. ‘I could just eat a cheeseburger...or maybe even a Big Mac!’. About a mile further on is a large shopping centre, and at the far ends of its car park the golden arches of McDonald’s are plainly visible. Paul and Emma enter the restaurant, walk down the centre aisle between uniform rows of spotlessly clean tables, and examine the menu that is posted behind and above the service counter. Exactly the same menu as the one back home! They quickly decide what to have and approach the counter. ‘Can I take your order, please?’ inquires the crew member, smiling at them. ‘Two Big Mac meals with Diet Coke, to go please’. ‘Is that large?’ she replies. The order is placed using pre-programmed shortcuts on the till. ‘Is that everything, sir?’ she asks. Paul looks at his wife, who shakes her head. ‘Er, no. Thanks anyway’. The crew member totals up the sale and states the amount in a clear voice. Paul gives her a ten-pound note. ‘Ten pounds,’ she says, counting out the correct change and giving it to Paul before putting the note in her cash drawer. Change...

Words: 1354 - Pages: 6

Free Essay

Freddy Mac and Fannie Mae

...Fannie Mae and Freddie Mac Fannie Mae and Freddie Mac are private corporations that were established by Congress and are referred to as government sponsored enterprises or GSEs. They are the largest “packagers” of individual mortgages into mortgage backed securities (MBS) which they guarantee against loss. We will be addressing the following threats to your financial institutions stability. Counterparty risk. Internal and external vulnerability and threats. Stemming the tide of losses from overly aggressive practices in lending continues to retard the marketplace and has yet to reach equilibrium. The use of macro measures is of critical importance in returning the company to profitability. \ The use of Macroeconomic Measures, Using Aggregate Data. These measures approach threats to financial stability from the top down: Is aggregate credit growing too fast? Are credit underwriting standards falling? Are asset prices too high relative to fundamentals? “In an internal boom-bust cycle, an initial market upswing entices new investors and rising prices until additional capital or investors’ nerves are exhausted.”(Evanoff, Kaufman, and Malliaris, 2012). “This process can be amplified by capital rules that encourage banks to increase leverage when the economy is expanding and loan losses are low.” (Hanson, Kashyap, and Stein, 2011). “In the ensuing bust, a credit crunch can occur as participants switch from lending too much to lending too little.” (Brunnermeier, 2009). A selling...

Words: 960 - Pages: 4

Free Essay

9.2 It-255

...the silent workhorse of a network. Other than offering an administrative interface, switches do not maintain layer three IP addresses, so hosts cannot send traffic to them directly. The primary attack against a switch is the ARP poisoning attack described earlier in the “Switches” section of this chapter. However, the possibility of an ARP attack doesn’t mean switches cannot be used as security control devices. As mentioned earlier, MAC addresses are unique for every network interface card, and switches can be configured to allow only specific MAC addresses to send traffic through a specific port on the switch. This function is known as port security, and it is useful where physical access over the network port cannot be relied upon, such as in public kiosks. With port security, a malicious individual cannot unplug the kiosk, plug in a laptop, and use the switch port, because the laptop MAC will not match the kiosk’s MAC and the switch would deny the traffic. While it is possible to spoof a MAC address, locking a port to a specific MAC creates a hurdle for a would-be intruder. Switches can also be used to create virtual local area networks (VLANs). VLANs are layer two broadcast domains, and they are used to further segment LANs. As described earlier, ARP broadcasts are sent between all hosts within the same VLAN. To communicate with a host that is not in your VLAN, a switch must pass the hosts packets through a layer three device and routed to the appropriate VLAN...

Words: 399 - Pages: 2