Free Essay

No File

In:

Submitted By amychurbuck
Words 1953
Pages 8
Canterbury Tales Webquest

Today you are going to research background information about Geoffrey Chaucer and The Canterbury Tales. Anything not completed in class should be finished for HW.

- Use the links to answer the questions listed below.

- Please PARAPHRASE your answers rather than copying and pasting information.

You may type your answers directly into the document and print when finished.

1. Geoffrey Chaucer

1. What kind of writer was he? He is a realistic writer.

2. What were the years of his birth and death? Born 1340/44, died 1400.

3. Where was he from? London, England

4. What was his “masterpiece”? The Canterbury Tales

http://www.bartleby.com/65/ch/Chaucer.html

2. What is a pilgrimage? (You should already know this from our vocab. quiz.) A pilgrimage is a journey or search of moral or spiritual significance. Typically, it is a journey to a shrine or other location of importance to a person's beliefs and faith, although sometimes it can be a metaphorical journey in to someone's own beliefs.

3. Define prologue. The preface or introduction to a literary work.

http://www.webster.com (or other dictionary site)

4. Where is Canterbury? Canterbury is located in Kent county, south-east of London. It is home to the Caterbury cathedral, the burial site of King Henry IV.

What famous event happened there? Thomas Becket was murdered in Canterbury Cathedral in 1170.

What are the goals of the many people who travel there on pilgrimages? The idea behind a pilgrimage was to exert considerable effort in a journey to a place that was known to be more conducive to effective praying. Most of these sites were notable because they contained the tombs of Saints. It was around these tombs that many great churches and cathedrals were born. Often, it was not even the tomb of a Saint that lent sanctity to a place, but merely a fragment of a saint's remains or some other holy relic. There were also items of more questionable provenance, such as the cloth the Christ's body was wrapped in --the "Shroud of Turin "-- or pieces of the cross he was crucified on. No matter, it wasn't called the Age of Faith for nothing. If a place, and its Holy Relics got a reputation for getting prayers answered, it became more popular as a pilgrimage destination.

http://www.nationmaster.com/encyclopedia/Canterbury,-England http://www.canterbury-cathedral.org/history/history.aspx

5. When were The Canterbury Tales written? In what language were they written? Between 1387 and 1400. Written in the vernacular (language of the people) Middle English.

• What are they about? It is both one long narrative (of the pilgrims and their pilgrimage) and an encyclopedia of shorter narratives; it is both one large drama, and a compilation of most literary forms known to medieval literature: romance, fabliau, Breton lay, moral fable, verse romance, beast fable, prayer to the Virgin… and so the list goes on. No single literary genre dominates the Tales. The tales include romantic adventures, fabliaux, saint's biographies, animal fables, religious allegories and even a sermon, and range in tone from pious, moralistic tales to lewd and vulgar sexual farces. More often than not, moreover, the specific tone of the tale is extremely difficult to firmly pin down. (The Canterbury Tales tell the story of a group of pilgrims on their way to Canterbury who engage in a tale-telling contest to pass the time. Besides watching the interactions between the characters, we get to read 24 of the tales the pilgrims tell.)

• What is a frame tale? A narrative structure containing or connecting a series of otherwise unrelated tales.

• What happens in the Prologue? The General Prologue is the key to The Canterbury tales that narrates about the gathering of a group of people in an inn that intend to go on a pilgrimage to Canterbury (England) next morning. In the General Prologue, the narrator of The Canterbury Tales, who is one of the intended pilgrims, provides more or less accurate depictions of the members of the group and describes why and how The Canterbury Tales is told. If we trust the General Prologue, Chaucer determined that each pilgrim should tell two tales on the way to Canterbury and two tales on the way back. The host of the inn offers to be and is appointed as judge of the tales as they are told and is supposed to determine the best hence winning tale. As mentioned before, The Canterbury Tales was never finished

http://www.courses.fas.harvard.edu/~chaucer/canttales/gp/ http://www.librarius.com/cantales.htm 6. What were the “Three Estates” during the Middle Ages?

Estate = When a text is geared toward a particular class of people, it is said to be written ad status, Latin for "to the estate," that is, to everyone in a particular social category (or "estate").

1st = the Church (clergy = those who prayed) 2nd = the Nobility (those who fought = knights) 3rd= the Peasantry (everyone else, at least under feudalism: those who produced the food which supported those who prayed and those who fought, the members of the First and Second Estates).

How were women categorized? Women were classified differently. Like men, medieval women were born into the second or third estate, and might eventually become members of the first (by entering the Church, willingly or not). But women were also categorized according to three specifically "feminine estates": virgin, wife and widow. It is interesting to note that a woman's estate was determined not by her profession but by her sexual activity: she is defined in relationship to the men with whom she sleeps, used to sleep, or never has slept.

The “feminine_estates” • virgin

• wife

• widow

http://cla.calpoly.edu/~dschwart/engl430/estates.html

6. What was the Black Death? During the next few years, the European economy slowly improved, and agricultural and manufacturing production eventually reached pre-famine levels. In 1347, that development was suddenly halted by a worse disaster than the Great Famine.

Since the failure of Justinian's attempt to reconquer the lands of the Western Empire in 540-565, Europe had been relatively isolated, its population sparse, and its villages independent of each other. It was as if the continent were divided up into a number of quarantine districts. Although many diseases were endemic (that is, they were always present), contagious diseases did not spread rapidly or easily. So the last pandemic (an epidemic that strikes literally everywhere within a short time) to strike Europe had been that brought by Justinian's armies in 547. The revival of commerce and trade and the growth of population had altered that situation, however. There was much more movement of people from place to place within Europe, and European merchants travelled far afield into many more regions from which they could bring home profitable wares or a contagious disease. Moreover, the European's diet, housing, and clothing was relatively poor, and a shortage of wood for fuel made hot water a luxury and personal hygiene substandard.

Contrary to popular belief, medieval people actually liked to wash. They particularly enjoyed soaking in hot tubs and, as late as the mid- thirteenth century, most towns and even villages had public bath houses not unlike the Japanese of today. The conversion of forest into arable land had reduced the supply of wood, however, and the bath houses began to shut down because of the expense of heating the water. They tried using coal, but decided that burning coal gave off unhealthy fumes (They were right, by the way) and abandoned the use of the stuff. By the mid-fourteenth century, only the rich could afford to bathe during the cold winter months, and most of the population was dirty most of the time.

The Black Death arose somewhere in Asia and was brought to Europe from the Genoese trading station of Kaffa in the Crimea (in the Black Sea). The story goes that the Mongols were besieging Kaffa when the plague broke out among their forces and compelled them to abandon the siege. As a parting shot, the Mongol commander loaded a few of the plague victims onto his catapults and hurled them into the town. Some of the merchants left for Constantinople as soon as the Mongols had left, and carried the plague with them. It spread from Constantinople along the trade routes, causing tremendous mortality.

The disease was spread primarily by fleas and rats. The stomachs of the fleas were infected with bacteria known Y. Pestis. The bacteria would block the "throat" of the infected flea so that no blood could reach the stomach, and the fleas grew ravenous since they were starving to death. They would attempt to suck up blood from their victims, but then would have to disgorge it back into their preys' bloodstreams, only now the blood was mixed with Y. Pestis. They infected rats in this fashion, and the rats spread the disease to other rats and fleas before dying. Without rodent hosts, the fleas then migrated to the bodies of humans and infected them in the same fashion as they had the rats.

The disease appeared in three forms:

• bubonic [infection of the lymph system -- 60% fatal] • pneumonic [respiratory infection -- about 100% fatal], and • septicemic [infection of the blood and probably 100% fatal] The plague lasted in each area only about a year, but a third of a district's population would die during that period. People tried to protect themselves by carrying little bags filled with crushed herbs and flowers over their noses, but to little effect. Those individuals infected with bubonic would suffer from great swelling ("bubos" in the Latin of the times) and take to their beds. Those with septicemic would die quickly, before any obvious symptoms had appeared. Those with respiratory also died quickly, but not before developing evident symptoms: a sudden fever that turned the face a dark rose color, a sudden attack of sneezing, followed by coughing, coughing up blood, and death. This sequence is recalled in a children's game-song that most people know and have both played and sung: Ring around the rosie,
A pocketful of posie,
Ashes, ashes
All fall down!

The ring is a circular dance, and the plague was often portrayed as the danse macabre, in which a half-decomposed corpse was shown pulling an apparently healthy young man or woman into a ring of dancers that included man and women from all stations and dignities of life as well as corpses and skeletons. The rosie is the victim with his or her face suffused with blood, and the posie is the supposedly prophylactic bag of herbs and flowers. Ashes, ashes is the sound of sneezing, and all fall down! is the signal to reenact the death which came so often in those times.

http://www.bartleby.com/65/ch/Chaucer.html http://the-orb.net/textbooks/nelson/black_death.html [pic]

Death and the lady. From Der Doten Dantz (Dance of the Dead), printed by Heinrich Knoblochzer, Heidelberg, 1490.

7. Choose a picture from the site below to copy and paste it into this document: http://www.godecookery.com/macabre/macabre.html

What do you notice about the illustration?

Dansa de la Mort (Catalan) is an artistic genre of late-medieval allegory on the universality of death: no matter one's station in life, the Dance of Death unites all. The Danse Macabre consists of the dead or personified Death summoning representatives from all walks of life to dance along to the grave, typically with a pope, emperor, king, child, and labourer. They were produced to remind people of the fragility of their lives and how vain were the glories of earthly life.

Similar Documents

Free Essay

File

...The first thing that most new users shifting from Windows find confusing is navigating the Linux file system. The Linux file system functions differently than the Windows file system. I will compare and contrast the differences of both and takes you through the layout input/output systems of both. In Linux, there is only a single hierarchal directory structure. Everything begins from the root directory which is represented by the symbol /, which then expands into sub-directories. Windows includes various partitions and then directories under those partitions; Linux places all the partitions underneath the root directory by mounting them in specific directories. In contrast, Windows uses the letter C as its root directory. In Windows, various partitions are detected during the boot process and are assigned a drive letter. Under Linux, the system must mount partitions and devices during the boot process; otherwise it will be unaware of its existence. This might not seem very convenient to provide access to your partitions or devices, but it offers greater flexibility. This is known as the unified file system in Linux which offers several advantages over the Windows file system. For example, let's examine the /usr directory. This directory resides off the root directory and contains most of the system executables. With the Linux file system, you can choose to mount it off another partition or even off another machine over a network connection. The underlying system will...

Words: 309 - Pages: 2

Premium Essay

File Management

...File Management The File System Manager (also called the File Manager or File Management System) is the software responsible for creating, deleting, modifying, and controlling access to files – as well as for managing the resources used by the files. The File Manager provides support for the libraries of programs and data to online users, for spooling operations, and for interactive computing. These functions are performed in collaboration with the I/O Manager or Device Manager. ➢ Responsibilities of the File System Manager: The File System Manager has a complete job. It’s in charge of the system’s physical components, its information resources, and the policies used to store and distribute the files. To carry out its responsibilities, it must perform these four tasks: 1. Keep track of where each file is stored. 2. Use a policy that will determine where and how the files will be stored, making sure to efficiently use the available storage space and provide efficient access to the files. 3. Allocate each file when a user has been cleared for access to it, then record its use. 4. Deallocate the file when the file is to be returned to storage, and communicate its availability to others who may be waiting for it. The File System Manager’s policy determines where each file is stored and how the system, and its users, will be able to access them simply – via commands that are independent from device details. In addition, the policy must...

Words: 2584 - Pages: 11

Free Essay

Batch Files

...Batch Files: What is it and its harm Devry University The early business computers systems developed in the 1950’s showed how efficient they were by processing large group of records. They did all of this in batches. In the 1960s, computer engineers introduced interactive terminals. This would allow users to input for the very first time. Now today, even with use of laptops, home computers, and mobile devices. Most of the business and organizations still use some type of batch file processing for most of their applications. A batch file is a collection of commands that are processed in a certain order sometimes requiring the user to input information. With a computer using an operating system like Windows. A batch file is stored in a .bat file extension format. Most other operating systems may determine a batch file in a command file, using two or more commands that are processed one right after another. Just to perform the task at hand. Batch files are normally used to load programs, run different task at one time, and to perform repetitive tasks. An example of a batch file could be to back up files from different computers to a storage device or run the diagnostics on a system or process some type of log files. Batch files can start working at any time and can be left completely alone until the process is finished. The one of the main advantages to using batch files is the accessibility. A person can make the file entry themselves and...

Words: 710 - Pages: 3

Premium Essay

File Access

...File Access Computers have become an important tool for the companies. They are used as time clocks, keep track of inventory, to communicate with customers and to do research. In some cases, the computer is used to assign tasks and inform employees of upcoming events. Though computers are good tool and resource, there is the potential an employee may misuse or access files they have no clearance to access. For this reason there is a need to restrict access. If a company has 5000 employees who have access to the computer system and there is a need to restrict 10 users from accessing a specific file, there is a need to establish protocols to prevent access. How this is done differs in each operating system. In Unix there are ways to set parameters for the 4990 users to access a single file. These are set within the types of files. They are called regular, directory, special, named pipes, links and symbolic links. Unix operating systems operate these files and routes them into a uniformed system that operates in the background supporting files and giving disk space as needed for files. This is done by using inode (Index node) which controls information the system needed for a specific file. Multiple files can be connected to one inode, but if active the inode will only be associated with one file and a file will be controlled by one inode. A file’s attributes, permissions, and control information are stored within the inode. In the FreeBSD inode for example has...

Words: 654 - Pages: 3

Premium Essay

File Management

...File Management Nina N. Rountree POS 355 Terrence Carlson June 10, 2013 Operating systems that have numerous users with various security level clearances will require file protection. A UNIX operating system with 5,000 users could implement conventional UNIX file access controls if 4,990 of those users share the same level of security clearance. By means of a file access control structure on the UNIX operating system, each individual user is given a user ID (special user identification number). Users on a UNIX operating system will be allocated to a main class and possibly a variety of classes that will be associated with a unique class ID. Whenever a user creates a file, it is indicated by the individual’s unique user ID along with the user’s main class ID. Each individual user's accessibility is managed by the administrator with a file access control security type structure. The administrator can manage the permissions of all three main classes; read, write, and execute. Access is permitted to three types of users: the creator or owner of the file, the class the file belongs to, and various users with access to the system despite their class. The access control policy affects the level of access that is permitted by whom and under what conditions. Discretionary Access Control (DAC) manages permissions based on the requester’s identity and the regulations linked to access and permissions. Mandatory Access Control (MAC) manages permissions based on assessing protection...

Words: 526 - Pages: 3

Free Essay

File Management

...might think security will all be the same but there are difference between each one. As you read more you will understand the security and the difference between a MAC, UNIX/LINUX and Windows systems and how each one works.       Access control goal is to protect a resource from unauthorized access while facilitating seamless and legitimate use of such resources. Presently, each day users hold the need to access to those resources through a broad line of devices, such as PCs, laptops, PDA, smartphones and kiosks. Most organizations need to provide protection for their files and allow the correct people to access. The fundamental goal of an Access management system is to maintain confidentiality of user information and access, integrity of information control, availability of information and resources and accountability for knowing who holds the access to such information. File Management File management and file systems are a core part of the user experience for most users. They provide many...

Words: 2672 - Pages: 11

Premium Essay

File Managment

...File Management (Option 1) POS 355 July 29, 2015 Peng File Management (Option 1) Access Rights is an accommodating tool that can be used to allow users on a network to file share (Stallings, 2015, p. 541). In most systems, users and groups of users have a certain granted access to files. There are many different access rights that can be assigned and are assigned based on the level of the user. Specifying which users can access one file in a system being supported by 5,000 users can be done by creating an access control list with the names of the 4,990 users who need access. Another way to allow the 4,990 users to access the files would be to put them all in one group and set the group access level accordingly. An access control list specifies which users are granted or denied access to certain files, and can be granted to individual users, or groups (Stallings, 2015, p. 525). In most multiuser systems, access control is enforced, and only certain users are allowed access and to perform certain actions on certain files. Access control information may include the owner, access information, and permitted actions. The owner is the individual who has control over the file, and who can grant or deny access to other users. Access information includes each of the user’s name and password. Some permitted actions that can be granted to users include reading, writing, executing, and transmission over a network (Stallings, 2015, p. 537). The owner of the file can grant all of these...

Words: 403 - Pages: 2

Free Essay

File Management

...Stephen Sylvester File Management POS:335 John Demory May 26th 2014 In this paper on file access I will be covering two different ways that a system that can support 5,000 users, specifically a protection scheme in UNIX. Please note that out of these 5,000 users, only 4,990 of those users will have access to a specific file. I will first begin with the explanation of one of the ways that a system can support 5,000 users and then move on to the second way that a system can support 5,000 users. The first way that a system can support 5,000 users is for the administrator or facilitator to set up an access control list of all 4,990 users that he or she wants to have access to the specific file. A great real world example of controlled access would be at my current place of employment at the Department of Veteran’s Affairs. Every employee within the company is assigned user roles. These user roles reflect their job position within the company. Every employee has access to our shared drive folder on our network based on the employee’s credentials and need to know privileges (based on their specific duties and user role). Based on their credentials it will grant that employee access to specific folders. I personally deal with medical records and often, at times the doctors use our network shared drive to upload patient information to be indexed into our system. The doctors must be on the access control list in order to access our shared network drive. Being that I...

Words: 654 - Pages: 3

Premium Essay

File Management

...File Management Paper When dealing with the file management concept of computers and operating systems there are always multiple options and preferences that are available. One method of file storing is when an operating system detects the type of file; the type of program used to access it and saves it as such with pathways and locations filled out. A second method is to allow the pathways and file types to be set by the user, allowing for any program or file extension that is available to be used. A third method is for the operating system to not allow the saving of file type or file extensions, but to assign a specific code related to that operating system that allows it to determine the file type. These three methods all have their benefits and drawbacks referring to ease of access, ease of storage, and the structure of the file system. As each of these methods provides a specific purpose the use of one method over another will depend on how a computer filing system is designed and also how it is utilized by frequent and authorized users. In an operating system that detects the file type when it is being stored the system is recognizing what application is being used to access that file and saving it in storage under a file directory that will open the file with that type or certain program. For example if a user is accessing a text document and saves it, the operating system will detect the word processing application and save the file in a directory or pathway that will...

Words: 885 - Pages: 4

Premium Essay

File Management

...File Management POS/355 Brandon Elizaldi Steven Kernan File Management File management and file systems are a core part of the user experience for most users. They provide many essential and necessary functions for the user as well as almost anyone else working with a computer system. They provide anything from long term existence to the ability to create and delete stored data. Some of the benefits to the user are long term existence, the ability to be shared between processes and structure. Long term existence is an important aspect because it can be stored and recalled in the future. Imagine being stuck in the days the original Nintendo for example. You could play a game and get deep into game play but if you didn’t have time to finish the game you had to start all over again. This was due to the fact that there was no file system built in due to the fact a storage device was not available for the system. This is one of the great things about current game systems that have file systems and storage capacity. Another benefit is the ability to share files between processes. This has streamlined new software creation because the program doesn’t have to be built as a standalone. This keeps programmers from having to reinvent the wheel every time they write a program making them cheaper and easier to write. This also saves disk space on the users system. The next benefit is structure which provides a hierarchy within a file system allowing for more complex structures...

Words: 705 - Pages: 3

Premium Essay

File Management

...File Management By: Amy Gonzales POS/355 File Management The data we work with on a computer is kept in a hierarchical file system, the way an operating system has there file management set up effects the user’s ability in accessing and using those folders. According to "Webopedia" (2015), "File management system is the system that an operating system or program uses to organize and keep track of files. For example, a hierarchical file system is one that uses directories to organize files into a tree structure.” If you have ever downloaded a software on your computer you may have noticed how you can find it in the C drive under Program files. The root of this file is the C:\ portion which then stems off into one folder after another to form a tree like structure. For businesses this can be a huge impact on them; without even realizing it they are impacted by the operating system file management they use from storage to security to network. The following paragraphs will say how UNIX file management is set up, along with how it would work in a large company, and also an alternative to the UNIX file management for a large company. First we will start off with how UNIX uses their file management system with another operating system such as Windows. Unlike Windows UNIX has a unique directory structure. In Windows the user will be seeing common file names such as Program File or Users, but in UNIX stuff like a particular application would be scattered into multiple folders....

Words: 836 - Pages: 4

Free Essay

File Management

...File Management UNIX systems are based on the access control of files scheme which was introduced in the very early versions of UNIX. The way this works is that each UNIX user has an assigned unique user identification number which also puts this user ID into a primary group as well as other groups if the user ID needs it. These groups are identified, like the user’s ID, with a group ID. When a user creates a file, it is designated as owned solely by that user and marked with that user’s ID. This file can also be associated with a group with a unique group ID. This file is protected by a set of 12 protection bits. These bits along with the group and owner ID are part of the file’s index node or inode. This inode is a data structure that houses all the information about a file system object except the data content and name. Nine of these protection bits specify execute, write and read permissions for the owner of the file, the other members of the group and all other users. The remaining three outline special behavior for files and directories. A particular user ID is the superuser. This superuser ID is freed from the normal file access control constraints and also has system wide access. Whenever a file or program is set as owned by the superuser, the superuser potentially has unrestricted access to the system and to the users that are using the program. This scheme is acceptable when file access requirements are the same with users and a large number of groups of...

Words: 550 - Pages: 3

Free Essay

File Retention

...Employee Files and Retention In Human Resources the managers must make sure the files are maintained properly, stored properly, and the documents are filed in the appropriate files within the company. There are state laws that have to be followed. When determining where to place a document, the HR department has to consider what information the document contains. Personnel files cannot have documentation with medical, social security numbers or sensitive information (Personnel Records: What should, and should not, be included in the personnel file?, 2015). Most employers have three or four different employment record filing systems (Audit: Personnel Files: Employment (Personnel) Records Audit Checklist (Including Form to Audit Individual Employee Personnel Files), 2014). Personnel files contains employee performance information; confidential records contain non job-related or confidential information; payroll records are usually maintained by the payroll department; I-9 files are filed separately. Personnel records can be maintained by paper or electronically maintained by scanning into a secured system. Personnel Files * Employee applications/Resumes (online applications retention 2 years from the date of personnel action) * Job description. * Pay compensation information. * Letter of Recognition. * Records relating to job such as promotions, demotions, layoffs, training and education. * Warnings, counseling, or disciplinary notes. * Termination...

Words: 537 - Pages: 3

Free Essay

File Management

...File Management Paper There are issues that arise concerning file sharing in a multiuser system, and that is access rights and the management of simultaneous access. Access rights to a file is granted unique users whether singular or grouped. A flexible tool is provided to allow extensive file sharing among the users while providing a number of options so that certain access can be harnessed or controlled (Stallings , 2012). Although a wide range of access is being used, there is still a list of representatives with access rights that can be designated to a certain user for a unique file. One way is masking the existence of the file, leaving the user oblivious to its existence. If by chance the user gain knowledge of the files existence and owner identification, a petition to the owner can be put in place to gain additional access rights. There are ways where the user can load and execute a program with copy restrictions. Propriety programs are an example of this because they are made accessible to users with this restriction (Stallings, 2012). The only user with full access rights and the power to grant rights to others is the owner of the file created. There are also three classes of users provided said access by the owner. One- third of the class is a specific user, which are individual users who are assigned by a user id. User groups is the another class with a set of users that are not defined individually. The final class is granted to all users because the files are...

Words: 793 - Pages: 4

Premium Essay

File Management

...File Management File management systems have come a long way since the gigantic filing cabinets. Society has come a long way in an effort to save paper, space, and time. With modern technology and computers in most homes and workplaces file management systems are standard among operating systems. This capability gives businesses and individuals the ability to be organized and successfully archive important documents, images, and videos essential to a company a family or an individual. In the next couple of paragraphs one will read about file management systems the functions of file management systems and how it has made our society more efficient. When talking about file management it used to mean huge filing cabinets loaded with folders marked and organize so that one can easily find documents stuffed in said folders. In today’s world when talking about file management one is referring to electronic file management systems. File management systems are one of the most important aspects of a computer. File management systems have enabled the common person to organize documents images or videos however they see fit. File management systems use hardware components of a computer to save and store data. The hardware components that may be used are hard disk, CD-ROM, external hard drives and so forth. No matter what operating system used whether it’s Linux, Windows, or Mac file management system performs certain duties. One of the duties of a file management system is creating...

Words: 870 - Pages: 4