Premium Essay

The Outsiders Chapter 2 Summary

Submitted By
Words 215
Pages 1
Imagine a young, vulnerable boy getting jumped in the middle of an open football field with no means of defending himself. That one small Greaser boy is named Johnny, and poor Johnnycake is beaten senseless by four anonymous Socs who pop out of a blue Mustang. There is blood everywhere, and when Johnny’s friends find him on the brink of death, they are understandably furious. This is the main focus of an important section of chapter two of The Outsiders by S.E. Hinton known as the flashback. It all begins with Pony and Cherry getting popcorn at the drive-in movie theater. They just met minutes ago, and they are starting to build what seems like a friendly relationship. Because Two-Bit humorously scared Johnny by sneaking up behind him, Cherry

Similar Documents

Premium Essay

Outsider Summery

...Summary: Chapter 1 - Outsiders The author defines a deviant as one who deviates from the rules of some social group (and who therefore is an outsider to that group). An outsider is also defined from the point of view of the deviant as those from the social group who act as judges and arbiters of the rules. The author explores deviant behaviour as a phenomenon of definition, as opposed to one of characteristics. That is to say that deviant behaviour is more a question of judgement by a group than a characteristic of the deviant person. Therefore accepting the label 'deviant' means implicitly accepting the values of the social group making the judgement. Chapter 2 - Kinds of Deviance - A Sequential Model In order to discuss models of deviance, the author introduces four types of deviant behaviour: 1. conforming; 2. pure deviant; 3. falsely accused (i.e. perceived as deviant but exhibiting obedient behaviour) and 4. secret deviant (i.e. exhibiting rule-breaking behaviour but not perceived as deviant). The author examines two types of models that could be used to investigate what causes the deviant behaviours to develop:- 1. simultaneous - which assumes that the behaviour develops simultaneously through many causes 2. sequential - where patterns of behaviour develop according to an orderly sequence of stages Simultaneous models are often used in investigations of pathology, to determine the combination of variables that may predict the behaviour...

Words: 1717 - Pages: 7

Free Essay

7 Practices for Effective Ministry

... Andy, et al. 7 Pratices of Effective Ministry. Colorado Springs: Multnomah Books, 2004. Summary 7 Practices of Effective Ministry is a book written by Andy Stanley, which outlines steps to be taken or practiced by ministry leaders in order to have an effective ministry. It outlines areas in the ministry and accentuates solutions to issues that most church ministries fail to grasp; as they (Church ministries) endeavor to carry out day to day operations of their ministries. Stanley utilized the concept of a baseball team in an attempt to convey his message through his work with the North Point Community Church. Moreover, he emphasizes the importance of practicing effective avenues to invigorate the ministry. Furthermore, he outlines seven steps which he calls, clarify the win, think steps not program, narrow the focus, teach less for more, listen to outsiders, replace yourself, and work on it. It (steps) is a template when implemented accordingly will energize all facets of a ministry. This book contains two parts. In the first part which is labeled Getting in the Game: Ray’s Story, contains nine (9) chapters. Chapter one thru chapter three alludes to clarifying what the goal and accomplishment is. Stanley calls it clarifying the win. In clarifying the win it should become paramount to the leader where he/she wants to accomplish within the framework of the entire team. Chapter four (4) which is labeled “getting on base” refers to devising a way to get to where you would...

Words: 1316 - Pages: 6

Premium Essay

Principles of Information Security: Chapter 1 End-of-Chapter Questions

...Chapter 1 Assignmnet Ryan M. Kethcart INFOST-491 SEC-OL Exercises 1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined? a. A paper titled the “Rand Report R-609” was sponsored by the Department of Defense and initiated the movement toward security that went beyond protecting physical locations. It attempted to define multiple controls and mechanisms necessary for the protection of a multilevel computer system; identifying the role of management and policy issues in computer security. This report/paper significantly expanded the scope of computer security to include the following: securing the data, limiting random and unauthorized access to said data, and involving personnel from multiple levels of the organization in matters pertaining to information security. 3. Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit. a. Threat: i. Theft of Media b. Threat Agent: ii. Hacker (Ex: Ima Hacker) c. Vulnerability: iii. Unprotected system port d. Exposure: iv. Using a website monitored by malicious hackers, reveals a vulnerability – i.e. Unprotected system port e. Risk: v. Low level risk – The probability that...

Words: 790 - Pages: 4

Premium Essay

Critical Evaluation of the Representation of Speech and Thought in Justin Bieber’s Never Say Never and Kanye West’s Can’t Tell Me Nothing.

...compensate the shortcomings of their essay with the improvements – in my view – made in Rimmon-Kenan’s essay. Also, since Rimmon-Kenan’s essay ‘Narration: speech representation’ does not include an account of thought representation, I will convert his distinctions of speech representation. Thus “diegetic summary” (DS) will be “diegetic thought summary” (DTS); “Summary, less ‘purely’ diegetic” will be “Thought Summary, purely diegetic” (TS); “Indirect content paraphrase”(ICP) will be “Indirect thought content paraphrase” (ITC); “Indirect discourse, mimetic to some degree”(ID) will be “ Indirect thought, mimetic to some degree” (IT): “Free indirect discourse” (FID) will be “Free indirect thought” (FIT); “Direct discourse” (DD) will Be “Direct thought” (DT) and “Free direct discourse”(FDD) will be “Free Direct thought” (FDT). ITC, FIT, DT and FDT correspond with Leech and Short’s distinctions (in definition and symbol, except for ITC which correspond with their IT). I will give examples of DTS, TS and ITS: DTS: The bare report of a thought, without any specification of how the thinker felt or the language the thinker used to think. E.g., ‘He wondered about her love for him’ TS: Summary which represents thought in that it names in greater detail the thought act: E.g., ‘He wondered if she had another lover or if she was capable of love’ IT: Indirect thought which gives the illusion of perceiving aspects of the style of the thought act. E.g., ’He thought she had another bloody lover...

Words: 2580 - Pages: 11

Premium Essay

Thesis

...CHAPTER 1 Introduction: This chapter contains the rationale, Objective of the Study, Scope of Limitation, Significance of the Study, and some definition of Terms. Rationale: Electronic Voting for Global Vote for Rights by Children International – Tabaco is joining at the World Children’s Prize. It is an education program for all children. Their goal is to become more humane world, where children’s rights are respected by all. And there will be a new way of voting and to make voting process faster and easier. More than 2000 youth ages 12 – 18 yrs. Old are going to vote, first they will have their registration of the participant, next followed by voting process by Electronic Voting, in this way we are going to minimize and lessen the step by step process of voting. Objective of the Study: In this proposal I would like to make the voting process easier, also all the youth can vote in a specific date, minimize the time and lessen the step by step process. First the youths need to register to know how many youth participate in the activity. Next they are going to have their line for the voting. There are 11 computers available to use in voting. The facilitators are going to assist and help to become the voting process is organize, after they vote facilitator put an indelible ink to their fingertip so recognize whose already voted. And lastly the voter can go home. Specific Objective: * To have a new process of voting by means of electronic voting. * To help the...

Words: 1220 - Pages: 5

Free Essay

Culture and Organizational

...Organizational Culture and Leadership Defined California University of Management and Sciences Part III Case Study Professor Victor Hernandez MBA Chih-Min Liao 2014/8/29 Table of content CH.12 HOW CULTURE EMERGES IN NEW GROUPS------------------------------------------3 Introduction---------------------------------------------------------------------------------------3 Group Formation through Originating and Marker Events--------------------------------3 Stages of Group Evolution----------------------------------------------------------------------5 Conclusions---------------------------------------------------------------------------------------6 Ch.13 How Founders/Leaders Create Organizational Cultures------------------------------------7 Introduction --------------------------------------------------------------------------------------7 Culture Beginnings through Founder/Leader------------------------------------------------7 Example of Culture Evolution------------------------------------------------------------------9 Conclusions--------------------------------------------------------------------------------------13 CH14. How Leaders Embed and Transmit Culture--------------------------------------------------14 Primary Embedding Mechanisms--------------------------------------------------------------15 What Leaders Pay Attention to, Measure, and Control-------------------------------------15 Leader Reactions to Critical Incidents and...

Words: 9701 - Pages: 39

Premium Essay

Bplanoutline

...Woody@Wool’nWood.biz Company website: www.Wool’nWood.biz W(W Wooly Woody Jane Doe, President Bill Smith, CEO 219 Cloverleaf Place 2345 Apple Way Lincoln, NE 68583 Lincoln, NE 68583 May 2008 Table of Contents (You’ll develop this section after writing the business plan and executive summary.) The table of contents should show major section headings and the page number that starts the section. It’s even better if you can show the detailed subheadings under the major sections with corresponding page numbers. Section I. Executive Summary (You’ll develop this section after completing your business plan.) Write a one to two page summary representing the various sections of your Business Plan. Your goal is to make the reader want to read more! Section II. Mission, Goals & Objectives General Description of the Business Describe your business so an outsider will clearly understand what business you are in, what products or services you offer, who your market is, how you operate (generally), the stage of development of your business, and what your growth ideas include. This is the first...

Words: 1866 - Pages: 8

Premium Essay

Vulnerability-Assessment

...285_NSS_01.qxd 8/10/04 10:40 AM Page 1 Chapter 1 Vulnerability Assessment Solutions in this Chapter: I What Is a Vulnerability Assessment? I Automated Assessments I Two Approaches I Realistic Expectations Summary Solutions Fast Track Frequently Asked Questions 1 285_NSS_01.qxd 2 8/10/04 10:40 AM Page 2 Chapter 1 • Vulnerability Assessment Introduction In the war zone that is the modern Internet, manually reviewing each networked system for security flaws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack. Each technical advance brings wave after wave of security holes. A new protocol might result in dozens of actual implementations, each of which could contain exploitable programming errors. Logic errors, vendor-installed backdoors, and default configurations plague everything from modern operating systems to the simplest print server.Yesterday’s viruses seem positively tame compared to the highly optimized Internet worms that continuously assault every system attached to the global Internet. To combat these attacks, a network administrator needs the appropriate tools and knowledge to identify vulnerable systems and resolve their security problems before they can be exploited. One of the most powerful tools available today...

Words: 9203 - Pages: 37

Premium Essay

The Pyramid Principle by Barbara Minto

...these, digest them, relate them and hold them together. He will invariably find the job easier if your ideas come to him as a pyramid. When you group together a number of sentences into a paragraph, you do so, because the sentences have a logical relationship. All of your sentences are needed to express a single idea of the paragraph, which is effectively a summary of the paragraph. Stating this summary sentence raises you to the next level of abstraction. On this level of abstraction you again combine a number of paragraphs to form a section. These paragraphs and no others are needed to express the single idea of the section, which again will be the summary of the ideas in the paragraphs below. Exactly the same thinking holds true in bringing together sections to form a document and the single idea of the document will be expressed in the executive summary. If you have made the pyramid structure correctly your major point will be explained and defended by the in ever greater detail. Fortunately we can check if the pyramid grouping is correct by the following rules: • Ideas at any level in the pyramid must always be summaries of the ideas grouped below them • Ideas in each grouping...

Words: 2067 - Pages: 9

Premium Essay

Business Management

...* Chapter 13: Managing Information and Information Technology * * Businesses need information, but they nedd it to be accurate, and they need it to be accessible in a timely fashion. * * Information has always been an integral part of every manager's job. * * The Role of Information in the Manager's Job * * Information is a vital part of communication, it follows that management and information are closely related. A key part of information-processing activity id differentiating between data and information. * * Data: are raw figures and facts reflecting a single aspect of reality. * * Information: is data presented in a way or form that has meaning. It provides meaning to a manager and provides a basis for action. * Information Technology (IT): Refers to the resources used by an organization to manage information that it needs to carry out its mission. IT may consists of computers, integrated computer networks, telephones, fax machines and other pieces of hardware. It involves software that facilitates the system's ability to manage information in a way that is useful to managers. * Example: The grocery industry uses data, information, and information technology to automate inventory and checkout facilities. * * Characteristics of Usesful Information In general, information is useful if it is accurate, timely, complete and relevant. * * Accurate * For information to be of real value to a manager, it must be...

Words: 1212 - Pages: 5

Premium Essay

Executive Summary

...EXECUTIVE SUMMARY A few concepts that I chose from chapter 10 to focus on are executive succession: insiders versus outsiders, problems in retrenchment, managing diverse cultures following an acquisition, and total quality management (TQM). Strategy implementation is an important step that requires staffing and directing and puts strategy into action. According to McCarthy 'strategy implementation may be said to consist of securing resources, organizing these resources, and directing the use of these resources within and outside the organization.' The concept executive succession, is an integral part to a company. Whether to hire an outside or inside manager is better for replacement within a company depends on the circumstances of the company. If a company is doing well, then hiring someone from the inside would improve performance. If a company is on thin ice, hiring an outsider can save the company. Studies have shown that hiring someone from the inside results in better performance than hiring someone from the outside. I've learned that steps for top-management succession is exceptionally critical to a company and can stabilize its performance from sinking below average. A great CEO needs the experience, skills and expertise. Before my research and analysis, I believed that right CEO is one who's been working for the company for long time because of the amount of knowledge captivated during his/her years. However, that's not always the right choice because of circumstance...

Words: 2654 - Pages: 11

Free Essay

Truman Capote Research Paper

...Imagine a person with unparalleled success: he throws the most lavish parties, is adored by the public and belongs to the most elite social circles. Now imagine their success crashing in a downward spiral of drugs, alcohol, and a festering obsession with money and fame. A perfect example of this would undoubtedly be Truman Capote. Capote was a literary mastermind who achieved the American Dream at a relatively young age , only to have it ripped away from him because of his own recklessness and self destructive decisions. Truman Capote was born Truman Streckfus Persons in 1924 in New Orleans, Louisiana (Boon 2). Truman had a childhood that was far from ideal in all aspects. His mother was Lille Mae Faulkner, a former Miss Alabama who would later commit suicide and his father Arch Persons was a businessman whom Truman was never close to (Boon 4). Capote’s parents divorced when he was young and his mother who saw herself not fit to be a mother, sent a young Truman to be raised by her relatives in Alabama. Truman developed a close friendship with his next door neighbor, Harper Lee. As children, Lee and Capote both knew that hey wanted to be authors and would later serve as inspiration for the other’s writing. Truman’s mother who had relocated to New York City remarried a wealthy Cuban businessman, Joseph Capote (Patterson 10). After she suffered from multiple miscarriages and come to the realization that she could no longer have children, Truman’s mother called for him to be...

Words: 950 - Pages: 4

Premium Essay

Funacco Reviewer

...F U N A C C O CHAPTER 1 DEFINITION AND NATURE OF ACCOUNTING Accounting – its function is to provide quantitative information, primarily financial in nature, about economic entities that is intended to be useful in making economic decisions. Stakeholders – all parties who have interest in an entity, whether indirect or direct. Stakeholders are grouped into two, namely: * External Users – groups or individuals who are not directly concerned with the day-to-day operations of the entity. * They make decisions that affect their relationship to the entity. * Internal Users – management personnel in all levels within an entity who are responsible for the planning and control of the operations and therefore, they have access to the day-to-day operations of the entity. Some of the users of financial information: * Investors – concerned with the risk inherit in, and return provided by, their investments. - need information to help them determine whether they should make additional, hold or sell their investments. * Lenders – interested in information that enable them to determine whether their loans, and the interest attaching to them, will be paid when due. * Suppliers and other Trade Creditors – interested in information that enable them to determine whether amount owing to them will be paid when due. * Employees – interested in the information about the stability and profitability of their employers...

Words: 2858 - Pages: 12

Premium Essay

Critički Prikazo

...Helpsheet CRITICAL REVIEWS Use this sheet to help you: • conduct a critical review of an article • structure and write a critical review 5 minute self test Circle either ‘should’ or ‘shouldn’t’ in the points below: In a critical review, you: 1. 2. 3. 4. 5. should / shouldn’t assume the reader is familiar with the text should / shouldn’t provide a summary of the text should / shouldn’t provide many quotes should / shouldn’t be ‘hyper-critical’ should / shouldn’t write an introduction, a body and a conclusion Check your answers on Page 10 This publication can be cited as: Davies, W. M. and Beaumont, T. J. (2007), Critical Reviews, Teaching and Learning Unit, Faculty of Business and Economics, the University of Melbourne. http://tlu.fbe.unimelb.edu.au/ Further credits: Pesina, J. (design and layout). FACULTY OF BUSINESS & ECONOMICS Helpsheet CRITICAL REVIEWS Introduction The process of critically reviewing an article can seem intimidating. How, you may worry, can you think of things to say about an article written by an expert? What if you can’t find anything to “criticise”? How will you avoid just producing a summary of the article? And, how should you structure the review? There are no simple techniques that can make writing a critical review easy. A critical review is something that takes time, care and thought. Perhaps, for hours and hours, you may feel you are getting, nowhere, but then suddenly, maybe while in the bath, you have an idea…...

Words: 4210 - Pages: 17

Premium Essay

Global Marketing

...Global Marketing, 8e (Keegan/Green) Chapter 1 Introduction to Global Marketing 1) The market development strategy involves seeking new customers by introducing existing products or services to a new market segment. Answer: TRUE Difficulty: Easy Chapter LO: 1 AACSB: Reflective thinking Course LO: Discuss the fundamental concepts of marketing 2) Starbucks is building on its loyalty card and rewards program in the United States with a smartphone app that enables customers to pay for purchases electronically. This is an example of Market Penetration. Answer: TRUE Difficulty: Moderate Chapter LO: 1 AACSB: Reflective thinking Course LO: Discuss the fundamental concepts of marketing 3) The perceived value equation can be represented as Value = Price/Benefits. Answer: FALSE Difficulty: Easy Chapter LO: 2 AACSB: Analytical thinking Course LO: Discuss the fundamental concepts of marketing 4) Companies can increase prices if costs are low because of process efficiencies in manufacturing. Answer: FALSE Difficulty: Easy Chapter LO: 2 AACSB: Reflective thinking Course LO: Identify and describe the processes and tools of strategic marketing 5) If Nestlé decides not to market biscuits (cookies) in the United States due to competitive reasons, it is considered as a lack of strategic focus and missed opportunity. Answer: FALSE Difficulty: Moderate Chapter LO: 2 AACSB: Reflective thinking Course LO: Identify and describe the processes...

Words: 6857 - Pages: 28