Premium Essay

Unit 8 Exercise 1

In: Philosophy and Psychology

Submitted By jayb21
Words 901
Pages 4
Unit 8 Exercise 1
Ja’Martay Bentley
GE375
Tami Gary
May 16, 2016

Freud’s psychoanalytic perspective emphasized unconscious and unresolved past conflicts (Carpenter & Huffman, 2011). Freud believed the psyche (mind) contained three levels of consciousness: conscious, preconscious, and the unconscious (Carpenter & Huffman, 2011). Conscious is the thoughts or motives that a person is currently aware of or is remembering (Carpenter & Huffman, 2011). Preconscious are thoughts or motives that are just beneath the surface of awareness and can be easily brought to the mind (Carpenter & Huffman, 2011). The unconsciousness are thoughts and motives that lie beyond a person’s normal awareness, which still exert great influence (Carpenter & Huffman, 2011). Freud believed that most psychological disorders originate from repressed memories and instincts (sexual and aggressive) that are hidden in the unconscious (Carpenter & Huffman, 2011). Freud also believed that personality was composed of three mental structures: id, ego, and superego (Carpenter & Huffman, 2011). The id is totally unconscious and serves as a reservoir of mental energy (Carpenter & Huffman, 2011). The id is made up of innate, biological instincts and urges. It is immature, impulsive, and irrational (Carpenter & Huffman, 2011). The id wants what it wants and when it wants it – pleasure principle (Carpenter & Huffman, 2011). As a child grows older, the ego develops (Carpenter & Huffman, 2011). The ego is the self – our conscious identity of ourselves as a person (Carpenter & Huffman, 2011). The ego is responsible for planning, problem solving, reasoning, and controlling the destructive energy of the id (Carpenter & Huffman, 2011). The id is responsible in controlling the Id’s energy in ways that are compatible with the external world (Carpenter &…...

Similar Documents

Free Essay

Unit 1 Chapter Exercise

...Chapter 1 1. Free software is a matter of the users' freedom to run, copy, distribute, study, change and improve the software.  a. The freedom to run the program, for any purpose. b. The freedom to study how the program works, and adapt it to your needs. Access to the source code is a precondition for this. c. The freedom to redistribute copies so you can help your neighbor. 2. The Free Software Foundation (FSF) is a nonprofit with a worldwide mission to promote computer user freedom and to defend the rights of all free software users. a. Linux is an operating system. It is the software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired functions. The operating system (OS) relays instructions from an application to, for instance, the computer's processor. The processor performs the instructed task, and then sends the results back to the application via the operating system. 3. The GNU Hurd is not suitable for production use. The capability-based design has problems that result directly from the flexibility of the design, and it is not clear whether solutions exist. Fortunately, another kernel was available. In 1991, Linus Torvalds developed a Unix-compatible kernel and called it Linux. In 1992, he made Linux free software; combining Linux with the not-quite-complete GNU system resulted in a complete free operating system. It is due to Linux that we can actually run a version...

Words: 879 - Pages: 4

Free Essay

Unit 10 Exercise 1

...1. Forward biased LED-a semiconductor device that emits a narrow spectrum of light. 2. Incoherent Light- light in which the electric and magnetic fields of photons are completely random in orientation 3. Laser- acronym for light amplification by stimulated emission of radiation 4. Output pattern-the pattern of light produced in fiber optic that translate in the data 5. Output power – the amount of light produced by a fiber optic device 6. Modulation speed- the speed of which data is transferred over light 7. Core diameter mismatch- occurs when there is a difference in the core diameter of two optic fibers. 8. Current- the flow of electrons in a conductor 9. PIN photodiode- alight sensitive diode that conducts current in one direction only   10. Avalanche photodiode-  is a highly sensitive semiconductor electronic device that exploits the photoelectric effect to convert light to electricity. 11. Responsivity-the ratio of a detector output to input usually measured in unit of amperes per watt 12. Optical subassembly- the portion of a fiber optic receiver that guides light from the optical fiber to the photodiode 13. Dynamic range- the difference between the maximum and minimum optical input power that an optical receiver can accept 14. Operating wavelength- the wavelength at which a fiber optic receiver is designed to operate 15. Fiber optic couple- a device that connect two piece of fiber for the purpose of......

Words: 469 - Pages: 2

Free Essay

Unit 1 Exercises

...Page 20-21 1. What is free software? List three characteristics of free software. Free software is a matter of the users’ freedom to run, copy, distribute, study, change and improve the software. Three characteristics are: Freedom to run the program for any purpose, freedom to redistribute copies, and freedom to improve the program and release your improvements to the public. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? GNU is a project for creating an operating system, both kernel and system programs. Linux is a free kernel that was written in 1991. Linus Torvalds contributed the kernel while the GNU project contributed the system programs. It was built and refined by like-minded programmers all over the world. Page 50 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? It involves copying the operating system files from the installation media to the hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Page 86 1. What is a live system? What advantages does it have over an installed system? A live system is when you run Linux from a CD/DVD instead of installing it on the computer. The advantage is you can test out Linux without disturbing your current operating system. 4. Where on the disk should you put your /boot partition or the root......

Words: 470 - Pages: 2

Premium Essay

Unit 3 Exercise 1 Nt1310

...| Unit 3. Exercise 1. | | Specifications - Definitions | | Unit 3. Exercise 1. | | Specifications - Definitions | NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi 1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer) 2. Unshielded twisted-pair: UTP cable is a popular cable used in computer networking that consists of two shielded wires twisted around each other. In the image to the right, is an example of the different network cables you're likely to encounter. (/jargon/u/utpcable.htm) 3. Shielded Twisted-pair: Twisted Pair (STP) has a fine wire mesh surrounding the wires to protect the transmission; Unshielded Twisted Pair (UTP) does not. Shielded cable is used in older telephone networks, network, and data communications to reduce outside interference. In the picture to the right, is an example of what these cables look like inside. (jargon/t/twispair.htm) 4. Fiber-Optic cable: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing.......

Words: 1317 - Pages: 6

Premium Essay

Nt1310 Unit 1 Exercise 1

...Unit 1 Exercise 1 Local Exchange When you send an email from New York to Japan, that email,is sent from your home to the local exchange point over the access network. Once it is in the local exchange it is then sent to aggregating points in different cities and counties over the regional network. Then it is aggregated and transported over the long-haul network so that it reaches the launching point at the country shoreline where it is then sent over the ocean network to Japan. Once there, the email is sent back over the long-haul or regional network to the local exchange and then on to the individual receiving the email. This occurs using mostly fiber optics so the speeds at which all this takes is at the speed of light which is approximately 127,000 miler per second. understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network, being the access network. The access network is the network that connects the individual user or business with the telecommunications system. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange. The central office at the local exchange contains the switching equipment to direct your telephone, data , video, etc. to where it needs to go. The access network is very important to the local exchange since it’s the part that reaches the end user, who is you, and connects them. The metro network,......

Words: 339 - Pages: 2

Premium Essay

Unit 1 Exercise 1

...NT1310 Unit 1 Exercise 1 6/17/14 The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off......

Words: 398 - Pages: 2

Premium Essay

Unit 4 Exercise 1 - Dfinitions

...Unit 4 Exercise 1 – Definitions 1) Horizontal cable is a type of inside cable designed for horizontal use in non-plenum areas and must be fire retardant. 2) Backbone cable is the inter-building and intra-building cable connections in structured cabling between entrance facilities, equipment rooms and telecommunications closets. 3) Patch cord is an electrical or optical cable used to connect one electronic or optical device to another for signal routing. 4) Connectors are a device for connecting together two wires, cables, or hoses, allowing electricity or fluid to flow. 5) Conduit is a protective tube, pipe, or trough for wires, fibers, and cables. 6) Racks are a frame or cabinet into which hardware components are mounted. 7) Punch-down blocks are a type of terminal strip used to connect telephone or data lines to each other. 8) Consolidation points is a piece of connecting hardware allowing interconnection between the permanently installed horizontal cables extending from the floor distributor and the movable horizontal cables extending to the telecommunications outlets. 9) Crimpers are defined as devices to make connections between two items using compressive force to constrict or deform a specially designed connector element. 10) Fish tape is a tool used by electricians to route new wiring through walls and electrical conduit. 11) Cable toner a device that ensures electricity is going where it needs, and isn't being lost in an unintended place. 12) ......

Words: 542 - Pages: 3

Premium Essay

Unit 4 Exercise 1

...1. The basic format for a proposal includes the following steps: Introduction Problem Analysis; major causes, Evidence and Effects of the probem. Plan for solving the problem: Major steps, Support and Deliverables. Benefits of the Plan: Costs-benefits analysis Conclusion 2. Proposals are used in college, in the workplace and anywhere you want to pitch a proposal or new project idea including grant writing. 3. The steps for inventing your proposal’s content are defining the problem, analyzing the problem, researching, inquiring, and finding similar projects. 4. The three primary sources of information for proposal writing are online, print, and empirical sources. 5. The steps to planning to solve the problem are map out the plan, explore each major step, figure out costs and benefits, and finding similar projects. 6. Costs and benefits should be listed to prove to the readers that the benefits of their investment are worth the risks. 7. In choosing an appropriate style, the steps are creating an Authoritative Tone, use metaphors and similes, pay attention to Sentence Length, and minimize the jargon. 8. Three tips for designing the proposal are creating a look, create white space and use meaningful headings. 9. The four steps in revising and editing a proposal are looking for inconsistencies in content, getting rid of extra stuff, tweaking the design and proof reading. 10. Five major problems listed are students are “paid to play”, have out......

Words: 302 - Pages: 2

Free Essay

Nt1420 Unit 1 Exercise 1

...Unit 1 Exercise 1 An analog signal is any continuous signal which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. A digital signal is a physical signal that is a representation of a sequence of discrete values (a quantified discrete-time signal), for example of an arbitrary bit stream, or of a digitized (sampled and analog-to-digital converted) analog signal. Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time. Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time. A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring Long-distance telephone company, such as MCI (before its absorption by Verizon), Sprint and the former AT&T Corporation (before its merger with SBC in 2005). In the United States, it is defined as any carrier that provides inter-LATA communication, where a LATA is a local access and transport area. Long Distance central office, central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop. Tandem, telephone switch is a U.S. telephone company central office telephone exchange used to interconnect local exchange......

Words: 263 - Pages: 2

Free Essay

Unit 1 Exercise 1

...Composition 1 Composition 1Composition 1didnt didn’t didn’t didn’t did nt didi did did did did did did did did did did did did did did did did did idid id idi did idid did did did dmdidi didid idid idid didid didid didi didididid didiid dididid iediddjiiiiiiiiiii did did didi did idid didi dd didi didii didid didid dddid didid didid diid idid idid idid ididididi did ididi idid ddi didi didi didi idid didid did dididi didid didid didi diid didid didi did idi did id id id I I did id id id id id I ii ii I I I I j j j j j j j d djdjd jdj du dudu dudu dud dud ud dudu dudud dudu dudud dud didi didi diid did idid didi didi did did idd didi diid d idid idi didi idi diid idi did did did id did did id di did did idid ddi didi didi didi did did did did did did did did didid didid didid didid didid did did did dd did id did did did di did di did did did did didi did didid did didid didi did d did did did dd didid did did did did di did did did did did did did did did did did did did did did didid did id did did did did dd did did d did did did did did did did did did did ddid did di didid id diidi di did idid dd ...

Words: 253 - Pages: 2

Premium Essay

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are 0.0.0.0 to 127.255.255.255. A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from 128.0.0.0 to 191.255.255.255. There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network......

Words: 756 - Pages: 4

Premium Essay

Nt1330 Unit 8 Exercise 1

...Administrative Control versus Trust Unit 8 Exercise 1 ITT Technical Institute Floyd Washington Jr. May 21, 2015 As an administrator you must set up guidelines over a network to prevent the malicious intent of bad users. This is why the administrator must implement Administrative Control. Administrative Controls are the policies, guidelines, procedures and standards that protect the overall integrity of the company’s computer network. This is when the company’s IT Professionals take every precaution possible to ensure that their computer network is secure and free of viruses that can cause the network to crash. Administrative control is one thing, but too much control can hurt a business in many ways. Too much control over a company’s network can restrict user from attaining much needed information. Therefore, an administrator must allow some users in the company full use of the company’s network without any restrictions. As a network administrator you must choose the people carefully that you allow full access to your company’s network. They must have solid instructions for the sites they are to visit. Administrative controls can have a great influence on the decision making of the entire company workforce. Without Administrative controls there can and probably will be serious liabilities formed against the company you work for. Most computer networks today will require that users use an authentication process, which means that the network is password and PIN......

Words: 336 - Pages: 2

Free Essay

It Unit 6 Exercise 1

...1. You triangulate your research by looking for looking for information from three different and three sources are considered reliable. 2. Primary sources are actual records or artifacts while secondary sources are writings from knowledgeable people who have studied the topic. 3. Three strategies that help to narrow an internet search are using exact words, using quotations, and using plus or minus signs. 4. A few of the questions researchers should ask is if the source can be trusted, what will the author get out of this publication and do the sources clearly define fact and fiction? 5. Researchers can use documentaries, television, and radio if they are reliable sources; you use quotes and cite the sources. 6. A wiki is a more fact based source while the blog and podcast tend to be more opinion based. 7. Three of the periodical indexes available in the ITT Virtual Library are academic journals, magazines, and newspapers. 8. The information that can be found in these publications is usually more exact and current. 9. Empirical sources include observations, experiments, surveys, and interviews. Researchers use them to confirm and to challenge online and print sources. 10. One of the best benefits of conducting an interview is to gather quotes that you can use for the text of your research. 11. The strategies for conducting a follow up interview is to write down what you remember, get your quotes right, check facts, and most......

Words: 339 - Pages: 2

Free Essay

Unit 8 Exercise 1 Active Directory

...Unit 8 Exercise 1 Active Directory Linda Aultman 11/14/15 TO: Rebop Pakulah, Acme Engineering Company RE: Pandemonium in the US Office Congratulations on setting up your new location. Using Active Directory and Establishing a Group Policy should solve all your problems with employees. Active Directory will keep track of all the user accounts. You can establish accounts for each employee and put them into groups based on how much permission they need. I recommend giving only what permission is needed. You can use the Access Control List to assign a degree of permission. Keep in mind that if a user is in more than one group they will only receive the lowest permission level. You can use these tools to control what a user can change on their computer and even when they can log on. Active Directory can also control what can be downloaded on a computer. I also recommend checking the firewall settings to make sure that certain programs cannot be used. Changing these settings could prevent users from downloading viruses on the computer. You can create a default setting that will show up on all workstations. The Group Policy Management tool will help with assigning these permissions. You can use Active Directory Sites and Services to replicate data on all sites. Network Load Balancing will help with the internet being slow by distributing the work load to several servers. The Windows System Resource Manager will also help by controlling how CPU and memory can be used to store......

Words: 283 - Pages: 2

Premium Essay

Unit 1 Chapter Exercises

...Page 20-21 1. What is free software? List three characteristics of free software. Free software is a matter of the users’ freedom to run, copy, distribute, study, change and improve the software. Three characteristics are: Freedom to run the program for any purpose, freedom to redistribute copies, and freedom to improve the program and release your improvements to the public. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? GNU is a project for creating an operating system, both kernel and system programs. Linux is a free kernel that was written in 1991. Linus Torvalds contributed the kernel while the GNU project contributed the system programs. It was built and refined by like-minded programmers all over the world. Page 50 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? It involves copying the operating system files from the installation media to the hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Page 86 1. What is a live system? What advantages does it have over an installed system? A live system is when you run Linux from a CD/DVD instead of installing it on the computer. The advantage is you can test out Linux without disturbing your current operating system. 4. Where on the disk should you put your /boot partition or the root (/)......

Words: 520 - Pages: 3