Free Essay

The Host

In:

Submitted By mony26
Words 1055
Pages 5
Essay #4: The Host ‘The Host’ was a very interesting novel to read and discuss. Reading the novel made me think of how someone could portrait the scenes in a movie or a visual act. Therefore, watching the movie made things even more interesting. The novel had quite a few scenes that could have been shown in the movie and made the movie more like the book. Also, changes of character appearance really changed and got some focused off the movie. One of the main character difference that I found interesting was the Seeker. The Seeker from the movie was not what I expected after reading the novel. While reading a novel I always have interesting thoughts such as, what if there was a movie that portrayed this book? Would all the scenes be shown on the movie or would they take some out? Would the characters look the way they are described? As I was reading the novel ‘The Host” I imagined and made pictures in my head of how each character looked by the way the book described it. I would always have the picture in my head of how the characters looked to me. After finishing the novel and proceeding to watch the movie I expected the characters to look somewhat how I imagined. First of all Melanie looked somewhat how I imagined, young and innocent looking. I imagined Wanda like some sort of bright, flashy soul looking thing, and that’s how it kind of looked in the movie. Yet, I found one big difference in a character. The Seeker did not look nothing like I imagined or how it was described in the novel. In the novel ‘The Host” the Seeker is a small lady, dark-haired, and dressed mostly in black. I imagined her evil looking, with a serious face and a very dark person. Yet, in the movie it was a whole different appearance. In the movie “The Host” the Seeker is very blonde, stands regally on some serious wedge heels, dressed in a futuristic cream-colored pant suit and does not look old like I imagined her. After reading the book and having a visual image of the Seeker then watching the movie and having a whole different perspective of the look, really changes the way you see the movie. At first when the blonde actress in the movie, I did not think that was the Seeker. It was confusing at first because I was expecting to see a dark, evil looking lady. I was not sure if the blonde actress was really the Seeker till ‘Wanda’ called her Seeker. After seeing this changed in the movie from the book I got interested in seeing what other changes had been made from the book to the movie. Also, in the book, the Seeker seemed irritable and edgy for her species but in the movie all the souls did what she said and agreed with her decisions. The appearance was not the only change in the movie that I noticed from the Seeker. The way she talked and expressed herself was also one difference between the book and the novel. In the book, every time she would demand something or tell the souls something she seemed kind of rude to me and careless. Yet, in the movie she talked calm and demanding, but kind in a way. This made me think that the Seeker from the book was a whole different character than the Seeker from the movie. If I would have watched the movie first and then read the book, the book would have made no sense in the way they portray the Seeker. This made things confusing and hard to understand at first but throughout the movie things made sense and kept coming together. Yet, there are some major things that the movie showed from the book. This was the Seeker’s personality. The personality of the Seeker in the book and in the movie was the same. They both wanted to capture Melanie and to find out how the Seeker could fight the host so it would not stay inside the bodies after a soul was inserted. The same perspective followed the movie. They showed how the Seeker was eager to catch Melanie/Wanda and how obsessed she was. She did not stop and was willing to do anything to capture her and find out what she wanted to know. Even though the appearance was not the same the actions of the character in the movie reflected the actions of the character in the book. The Seeker follows Wanda everywhere, believing that she can help her find the humans. She does not give up. She finds Melanie/Wanda and the other humans and is willing to do whatever to capture Melanie/Wanda to proceed with her desire. Even though the personality is the same in the book and the movie from the Seeker, her appearance changes many points of views. The drastic changed of character appearance of the Seeker was a shock. I did not expect the movie to change the original visual imagine of the Seeker as it was portrayed in the book. Since I thought the actual appearance of the Seeker would be evil, dark looking lady that is trying to get to humans the appearance in the movie made me thing different from the Seeker at the beginning. Changing appearance, taking out scenes or changing them form a book to a movie can have a big impact in the story and the perspective of the story. Also, it can have many points of views of the reader and the viewer. People that read the books may love the book and are excited to watch the movie. Yet, once they see the movie they realize it is nothing like the book and nothing like they expected. On the other hand, some people may be the reverse experience. They may not have liked the book, yet loved the movie. It all depends on their point of view of the story and their understanding. Personally, I liked the book better than the movie. Just by the fact that it had way more detailed and the characters matched their personalities. The movie was okay, but it was not what I expected after reading the novel “The Host.”

Similar Documents

Free Essay

Social Host Liability

...Clu3m1 | Private Social Host Liability | Ron Vaknin | | Mr. Badger | 1/13/2016 | The fairness of private social host liability is often debated. The question of, “How liable am I for others actions in my home?” is a concern for every person planning a social event. Up until 2006, social host liability laws were very vague and lacked the concreteness to be consistent. The case of Childs v. Desormeaux is the current precedent that set the social liability of a host to a reasonable amount. Prior to this case, the laws were unclear and lacked the distinction between private and commercial social host liability. However, the precedent that was set forces people to be more responsible for their actions, creates a specific differentiation between private and commercial liability and gives a more definitive and specific ruling. Currently, Canada’s social liability laws are at a suitable medium of tort law and express a more definitive edict. The first argument to come up in any social host liability case is the prima facie duty of care. The literal definition of prima facie is, "at first sight". However, in this context it means, “Sufficient to establish a fact or raise a presumption” (Cornell Law). Duty of care is the legal responsibility to avoid causing harm to others and the public (Business Dictionary). In accordance to the Anns test their needs to be a relationship between the plaintive and the defendant, as well as foreseeability for there to be a duty of care...

Words: 1593 - Pages: 7

Premium Essay

Brief Description of Intercomunication Methods Between Ipv6 and Ipv4

...REDES DE AREA AMPLIA Tarea #4: IPv6 Abraham Rodrigo Díaz Mendoza. Mtro. Ing. David Rivera. Técnicas de transición de “IPvX a IPvY” (IPv6 a IPv4) Hay definido tres principales técnicas de transición. La primera (1) es la de doble pila de protocolos, un enfoque muy sencillo de implementar que requiere que los hosts y los routers soporten ambas versiones de IP y, por tanto, servicios y aplicaciones tanto IPv4 como IPv6. En estos momentos, este enfoque de doble pila es un mecanismo fundamental para introducir IPv6 en las arquitecturas IPv4 actuales y se prevé que siga siendo muy utilizado durante el próximo futuro. Para aquellos casos en que haya insuficientes direcciones IPv4 se ha definido una combinación del modelo de conversión y de doble pila de protocolos, conocido como DSTM (Dual Stack Transition Mechanism). La segunda (2) técnica se basa en tunneling, que permite, por ejemplo, interconectar las nubes IPv6 a través de un servicio IPv4 nativo por medio de un túnel. Los paquetes IPv6 son encapsulados por un router de extremo antes de ser transportado a través de la red IPv4, siendo des encapsulados en el extremo de la red IPv6 receptora. Los túneles pueden ser configurados estática o dinámicamente como “6to4” o “6over4”. Además, se ha propuesto TB (Tunnel Broker) para gestionar automáticamente y facilitar el proceso de configuración de las peticiones de túneles de los usuarios. ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) es un nuevo borrador Internet que...

Words: 591 - Pages: 3

Free Essay

Internet

...usuario para la web habilitado el acceso generalizado y dio impulso para su uso. 4.3 Usted puede obtener la lista de servidores raíz por medio de ' dig.NS ' , como los servidores raíz de zona están autorizados. 4.4 Los servidores raíz no admiten búsquedas recursivas, ya que deben desactivarlas con el fin de ayudar a evitar la carga excesiva. Además de eso, deshabilitación de las búsquedas recursivas (junto con la expedición y cualquier otra función que les permita dar respuestas en caché) reduce sus posibilidades de almacenamiento en caché y propagar información incorrecta. . 4.5 La mayoría de los resolutorias ordenan los registros de recursos devueltos por los servidores de nombres, para que las direcciones de la misma red; que el host de la emisión de la consulta aparece primero en la lista devuelven a la aplicación que llama a la función librería de resolución, en la premisa de que les van a prestar a una más eficiente la comunicación. 4.7 4.10 Entrando nslookup sin argumentos se abre una sesión interactiva y proporciona la dirección IP del servidor DNS. Capítulo 5 Soluciones * 5.2 a. French PM | | Chinese PM | Translator (F------E) | | Translator ( E------C) | Telephone | | Telephone | TELEPHONE LINE | Los PMs hablan como si estuvieran hablando directamente entre sí. Por ejemplo, cuando el primer ministro francés habla, se dirige a sus...

Words: 1198 - Pages: 5

Free Essay

Redes

...• La LAN1 N-EAST (Northeast) necesitará 4000 direcciones IP de host. • La LAN2 N-EAST (Northeast) necesitará 4000 direcciones IP de host. • La LAN1 SE-BR1 (Southeast Branch1) necesitará 1000 direcciones IP de host. • La LAN2 SE-BR1 (Southeast Branch1) necesitará 1000 direcciones IP de host. • La LAN1 SE-BR2 (Southeast Branch2) necesitará 500 direcciones IP de host. • La LAN2 SE-BR2 (Southeast Branch2) necesitará 500 direcciones IP de host. • La LAN1 SE-ST1 (Southeast satélite1) necesitará 250 direcciones IP de host. • La LAN2 SE-ST1 (Southeast satélite1) necesitará 250 direcciones IP de host. • La LAN1 SE-ST2 (Southeast satélite1) necesitará 125 direcciones IP de host. • La LAN2 SE-ST2 (Southeast satélite2) necesitará 125 direcciones IP de host. • Sección de red West • La LAN1 S-WEST (Southwest) necesitará 4000 direcciones IP de host. • La LAN2 S-WEST (Southwest) necesitará 4000 direcciones IP de host. • La LAN1 NW-BR1 (Northwest Branch1) necesitará 2000 direcciones IP de host. • La LAN2 NW-BR1 (Northwest Branch1) necesitará 2000 direcciones IP de host. • La LAN1 NW-BR2 (Northwest Branch2) necesitará 1000 direcciones IP de host. • La LAN2 NW-BR2 (Northwest Branch2) necesitará 1000 direcciones IP de host. • Sección de red central • La LAN1 Central requerirá 8000 direcciones IP de host. • La LAN2 Central requerirá 4000 direcciones IP de host. • Los enlaces WAN entre cada uno de los routers requerirán...

Words: 3116 - Pages: 13

Free Essay

Static Routing

...Universidad Tecnológica Nacional – F.R.C Redes de Información (RIN) ENRUTAMIENTO ESTÁTICO BAJO LINUX OBJETIVOS: • • • • • Repasar los comandos configuración básica de red. Interpretar las capacidades de enrutamiento estático embebidas en la Minidistribución de Linux desarrollada por el Laboratorio de Sistemas de la UTN FRC. Diagnosticar, detectar y corregir problemas de conectividad en un entorno de red con rutas. Afianzar la capacidad de entendimiento y parametrización de la tabla de encaminamiento. Aplicar los lineamientos teóricos de encaminamiento estático en un entorno concreto, manipulable y tangible. NOTA: • • • • Lea atentamente el enunciado de la práctica, realice los pasos sugeridos, intente razonar sobre el resultado y complete el cuestionario. Al finalizar la práctica, cada grupo deberá entregar el cuestionario resuelto al docente responsable de la práctica. En algunos casos, se requiere participación inter-grupal para solucionar los requerimientos Cada grupo deberá rotular de manera no invasiva el/los equipos que administre de manera tal que pueda ser rápidamente identificable por los restantes grupos INTRODUCCIÓN Deberán configurarse equipos a fin de obtener el entorno de red expuesto a continuación como escenario. Para ello tener en cuenta que cada grupo será responsable de la configuración de un router y una PC en cada una de las redes en las que dicho router participe. Asimismo, deberá coordinar con el resto de los...

Words: 1962 - Pages: 8

Free Essay

Servidor/Cliente Python

...Universidad Popular Autónoma del Estado de Puebla Reporte de Práctica Asignatura: Microprocesadores Nombre del Profesor: Casimiro Gómez González No. De Práctica: 5 Nombre De Práctica: Servidor/Cliente Multihilos Nombre del Alumno: Oliver Franco Vega, Ana Michelle López Hernández Objetivos: Diseñar un servidor/cliente multihilos en Python que se conectan mediante sockets, intercambias cadenas de texto y cierran la conexión. . Marco Teórico: Socket designa un concepto abstracto por el cual dos programas (posiblemente situados en computadoras distintas) pueden intercambiar cualquier flujo de datos, generalmente de manera fiable y ordenada. Un socket queda definido por una dirección IP, un protocolo de transporte y un número de puerto. Para que dos programas puedan comunicarse entre sí es necesario que se cumplan ciertos requisitos: * Que un programa sea capaz de localizar al otro. * Que ambos programas sean capaces de intercambiarse cualquier secuencia de octetos, es decir, datos relevantes a su finalidad. Para ello son necesarios los tres recursos que originan el concepto de socket: * Un protocolo de comunicaciones, que permite el intercambio de octetos. * Una dirección del Protocolo de Red (Dirección IP, si se utiliza el Protocolo TCP/IP), que identifica una computadora. * Un número de puerto, que identifica a un programa dentro de una computadora. Los sockets permiten implementar una arquitectura cliente-servidor. La comunicación...

Words: 909 - Pages: 4

Premium Essay

Host Europe

...Host Europe: Advancing CSR and Sustainability in a medium-size IT company – What issues is Host Europe facing? – Which measures have been introduced? 1) What would an even more complete CSR engagement look like?  With the advancement of technology, organizations are looking for more ways to reduce costs and increase revenues.   Pressure from employees, consumers, shareholders and the community to be more efficiently, publicly, and ecologically aware have contributed to more organizations going “green”.   This not only involves paper or pollution waste, but Information Communications Technology (ICT) as well.   No exceptions to the rule, ICT managers are faced with sustainable issues on how to collect, communicate, control, or salvage information electronically.   According to Wright (2010), The Information and Communications Technology Industry has the “potential to impact society and the environment in a more positive than negative way, because of its impact on other industries, e.g. through smart buildings, smart grid, intelligent transportation and reduced transport as a result of electronic communications” (p. 39). Legislation at both the national and European levels is pushing for alterations to reduce risk by promoting improvements in recruiting, loyalty, brand differentiation and innovation.   A more even complete CSR engagement would encompass a connection between social and environmental execution and financial execution.   Vogel (2005) noted in his book that corporate...

Words: 802 - Pages: 4

Free Essay

Chapter 11 Review Questions

..._Authentication____, ___Authorization_____, and _Accounting_. 11. A(n) _security audit__ is a thorough examination of each aspect of the network to determine how it might be compromised. 12. A(n) __security policies___ identifies an organization’s security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee. 13. In general, information is _confidential____ if it could be used by other parties to impair an organization’s functioning, decrease customers’ confidence, cause a financial loss, damage an organization’s status, or give a significant advantage to a competitor. 14. A(n) _proxy server__ is a software application on a network host that acts as an intermediary between the external and...

Words: 317 - Pages: 2

Free Essay

Dhcp

...dominio Roles y Características Una vez instalado Windows Server 2008 y configuradas algunas opciones básicas de Windows Server 2008 desde el Panel de Control o desde el Administrador del Servidor, las siguientes tareas a realizar es configurar la función o rol que debe desempeñar el servidor dentro de nuestra infraestructura de red. Un solo servidor puede realizar la labor de varios roles o funciones, pero dependiendo de la calidad de servicio, número de usuarios, cantidad de tráfico en la red, etc., puede ser necesario la instalación de servidores especializados, como pueden ser servidores de archivos, servidores de impresión, servidores web, etc. ¿Qué es un Rol? Un rol consiste en una función principal de un servidor, en un servidor se pueden instalar una o varios roles según decidan los administradores del sistema. Cada rol puede incluir uno o varios servicios o elementos de instalación opcionales. En Windows Server 2008 están disponibles los siguientes Roles: 1 2 Para acceder a la gestión de roles, debemos ejecutar el Administrador de Servidor, en el apartado roles, haciendo clic con el botón derecho de ratón nos permite agregar, eliminar roles etc. 3 ¿Qué es una característica? Las características son programas que aunque no forman parte directamente de los roles, complementan sus funcionalidades, independientemente de los roles que estén instalados. Por ejemplo, la característica de Cliente Telnet nos permite comunicarnos remotamente a un servidor...

Words: 1805 - Pages: 8

Premium Essay

Telemachus The Host Summary

...Telemachus is a very good host. He is limited in his capabilities by the presence of the rowdy suitors but he more than makes up for it with his kindness, and warmth. “Greetings, stranger! Here in our house you’ll find a royal welcome. Have supper first, then tell us what you need.” (bk 1), is in fact the first words he speaks in the book. Despite his mistreatment by guests (the suitors), when he sees a stranger at the door, not only does he go welcome the guest and invite them immediately, he is ashamed and embarrassed, at the possibility that the stranger had been waiting out in the cold. The suitors drain his wealth and bleed the halls white, but Telemachus still gives liberally to others, in the form of gifts and food. Even the swine herder, assures a poor beggar that Telemachus will give him clothes, food, and send him wherever his heart desires. Something that Telemachus also offers to a fugitive, later. Telemachus, is a courteous guest despite having never left home and been the guest of another before. He is consistent in his polite treatment of his hosts. Although, he does end up basically crashing a wedding, it is purely by chance....

Words: 599 - Pages: 3

Premium Essay

Host Parasite Coevolution

...different variables may lead toward collapsed staple food supplies. Climate change may be a variable in such a event as it causes extreme wether changes and so crops which are humanly breed or engineered spastically for one environment will no longer survive if some extreme wether storm occurs. (National Wildlife Federation . 2016.) Another variable may be the development of a highly resistant parasitic organisms, viruses and or bacteria as a result of Host-Parasite Coevolution. Host-Parasite Coevolution is defined as a combination of two processes: co-accommodation between host and parasite with no implication of host or parasite speciation and co-speciation, indicating concomitant host and parasite speciation (Testing the Context and Extent of Host-Parasite Coevolution . 2016.). This states that as much as humans make resilient food sources so will the parasite change to adapt and continue this along with a parasites host shifts (PLOS Pathogens. 2016.) would result in the sudden death of much of the new host especially if such a host has a small gene pool relied upon. Lastly unforeseen side effects in genetically altered foods (J R Soc Med. 2016) would be wanted to be revert, hence the need to store and bring back species which have no issues. Due to these arguments is is seen that a safeguard would be need to prevent some longterm problems and unrest, this can come in the form of scientists bring back older and more various species used for...

Words: 1025 - Pages: 5

Premium Essay

Host Defense Case

...Case Example: A 10 year old girl was bitten on the leg by a neighborhood dog and received several stitches 5 days ago. This morning she complained of increasing pain, and her mother noticed that the area around the stitches as red and warm to the touch. Her mother brought her to the pediatrician’s office where she is diagnosed with a wound infection and prescribed a 14-day course of an antibiotic she has taken in the past. 1. What is the first line of defense against infection and tissue injury, and why did it fail in this case? (One sentence) The first line of defense was skin of the 10 year old girl it failed due to it being punctured by the dog’s teeth which require several stitches to repair. 2. How does the second line of host defense...

Words: 727 - Pages: 3

Premium Essay

Foreigners in Host Countries

...EN 1002 7 April 2011 Foreigners in Host Countries Never has there been a subject that has aroused as much discussion as that of foreigners living abroad. In the twenty first century, people live in a globalization world. “Globalization is a process of interaction and integration among the people”. “This process has effects […] on culture, […] and on human physical well-being in societies around the world.” (globalization101.org). The globalization is not new. It has been on for centuries. However, it has never been as important as today. In the middle age, people were already traveling and doing business abroad. One of the consequences of globalization is immigration. Today, people travel freely all around the word and the population of most of countries have changed. It now mixed. Many countries are cosmopolitan and people that live in poor countries have the opportunity to change their life and to live the American dream. Most of the wealthiest people succeed because they daily do business and invest internationally. Moreover many foreigners also succeed abroad due to their skills and what they bring to a country. However this does not completely reflect the reality. Many foreigners have a lot of difficulties to live abroad, either because they are disappointed of what they experience or because governments use them. In the story of Flight Patterns, written by Sherman Alexie, one of the main characters, Fekadu, is from Ethiopia. He used to be a fighter pilot. One day,...

Words: 2819 - Pages: 12

Premium Essay

Greenfield Investment in Host Countries

...Greenfield investment in host countries 1 Introduction Foreign direct investment (FDI), a most important product of economic globalization, has swept the world in the past few years. As an investment mode of FDI, greenfield investment refers to a kind of strategy that the multinational enterprises(MNEs) start new firms by constructing facilities in the host countries from the ground up (Wang & Wong, 2009). It flows to the host countries and becomes their primary source of external financing (Calderón, Loayza & Servén, 2004). Various types of incentives such as prospective tax-breaks, preferential loans and subsidies were given by the host governments in order to encourage more greenfield investments from the foreign countries (Blomström, Kokko & Mucchielli, 2003). However, the attitude towards greenfield investment has changed during the past few decades when some studies, as discussed later, found a series of problems followed by this investment mode and some scholars begin to hold a negative opinion towards greenfield investment. Whether the host countries should encourage MNEs entering via greenfield investment is remain unsolved. This essay will argue that, although greenfield investment may damage the profit of host countries, it should be promoted owing to the considerable benefits produced by this investment activity. The first part of this essay will analyze some problems partly mentioned by several researchers that should be imputed to greenfield...

Words: 2818 - Pages: 12

Premium Essay

Airbnb's Business Model

...Concept Airbnb is an online marketplace connecting travelers with local hosts. On one side the platform enables people to list their available space and earn extra income in the form of rent. On the other, Airbnb enables travelers to book unique home stays from local hosts, saving them money and giving them a chance to interact with locals. Catering to the on-demand travel industry, Airbnb is present in over 190 countries across the world. Value proposition * Enables owners to list their space on the platform and earn rental money. * Airbnb provides insurance to listed properties. * Gives cheap options to travellers to stay with local hosts. * Facilitates the process of booking living space for travellers. * Rating and review system for hosts and guests. Revenue model Airbnb offers free listings to property owners and let’s travellers browse the listed spaces and select the one which best suits their needs on the platform. The business model of Airbnb is such that the booking and monetary transactions are done on Airbnb’s platform. This is from where the company earns its share of revenue from 2 different sources which have been explained below: * Commission from Property Owners (Hosts) Airbnb charges flat 10% commission from hosts upon every booking done through the platform. * Transaction fee from Travellers (Guests) Airbnb charges 3% of the booking amount as transaction charges from travellers upon every confirmed booking. Market opportunity ...

Words: 524 - Pages: 3