Tuesday, December 24, 2019

Argument for Existence of God Essay - 4707 Words

Argument for Existence of God The real is the rational, and the rational is the real. In philosophical discussion, no statement is, perhaps, more important or more controversial. Yet, this is the very position that I advocate within this paper. The equation of the rational with the real is at the heart of the argument I here consider, that being the ontological argument for the existence of God. There are several versions of the ontological argument for the existence of God, which is to say that several versions exist. The reason I add the redundancy about the existence of the versions of the arguments is to call attention to the fact that it is a great debate in philosophy what one means by existence and what one can and cannot say of†¦show more content†¦Therefore, something than which a greater cannot be conceived so truly is that it is impossible even to conceive of it as not existing. [God exists, and it is impossible to conceive otherwise.] (Anselm 21) The reason I wish to consider this version of the argument is that it poses the existence of a being with the quality of necessary existence. Unlike Anselms more famous argument in which he says that that which exists is greater than that which is merely conceived, this argument is not susceptible to the charge that Anselm means existence to be a perfection. Rather, this argument depends only upon God defined as a necessarily existing being. The reason for preferring the one over the other, then, is not that it may not be possible that existence is a perfection, but that it does not depend upon defending that premise in addition to the premise regarding necessary existence. This second version of Anselm reduces the question of Gods existence to the question of necessary existence. Main challenges to this argument have come from those who claim that there is nothing that can be conceived such that it cannot be conceived as not being. These arguments have come from such philosophers as Immanuel Kant and Bertrand Russell.Show MoreRelatedThe Argument On The Existence Of God1629 Words   |  7 PagesThe idea of God has been a part of man’s history for centuries. Since time began there has been various combination of believers, and non-believers. Individuals who believes in God, belong to many different religion. Whereas, skeptics find the existence of God somewhat baffling, and have continually sought answers to His existence through scientific methods. As the world progresses in scientific, and technological advancement, the human race still faces the question of God’s existence. Many philosophersRead MoreThe Arguments For The Existence Of God1056 Words   |  5 Pages16 November 2015 Rough Draft for The arguments for the Existence of God. The question Does God Exist? is a well-known asked question in the world. Most people believe they know the answer to it. The religious people would say, well of course he does, while the non-religious people or atheist would say no He does not exist. Because evil exist and chaos exists, God cannot be all-powerful. In the modern world, there are many different opinions as to whether a God exists or not. This has been an issueRead MoreThe Argument For The Existence Of God1674 Words   |  7 Pagesfind the three arguments I analyzed satisfactory for the existence of God. The existence of God simply cannot be proven. Regardless of how strong a person’s faith is, or how many miracles they claim to have witnessed, God can only ever be a possibility. First, I will discuss why Pascal’s wager is not a satisfying argument for the existence of God. I will then examine C.D. Broad’s â€Å"Argument for the Existence of God†, and why it is also not a satisfying argument for the existence of God. Finally, IRead MoreArguments For The Existence Of God974 Words   |  4 PagesArguments for the existence of God through critical thinking and rationalization are called ontological, cosmological, teleological, or pragmeatic arguments. The most widely known of such arguments is that of St. Anselm from Proslogium of St. Anselm, which states that God is considered a perfect being unlike humans or any other world subject. The fact that he is perfect in a world of imperfection proves his existence. God is also the highest conceivable idea of perfection, and thereforeRead MoreThe Existence Of God : An Argument881 Words   |  4 PagesThe Existence of God The philosophical arguments presented in this document are not of religious text, nor scientific observation or established fact. Rather the premise of this God proof is bring together and share the various theories on which other God proofs have established foundations. I have heard it quoted that â€Å"Philosophy goes where hard science can t, or won t. Philosophers have a license to.† Therefore, with this in mind, I attest that it is more than problematic to construct anRead MoreArguments on the Existence of God602 Words   |  2 PagesGod’s existence may actually depend upon our belief in his existence but it is more plausible to believe that God exists using the different types of arguments such as the cosmological argument and ontological argument, Leibniz and the Principle of Sufficient Reason and the Problem of Evil, and the definition of basic belief as evidence. The Cosmological argument can be simplified into three reasons that everything that begins to exist has a cause; the universe began to exist, therefore the universeRead MoreArguments For The Existence Of God1137 Words   |  5 PagesArguments for the existence of God come in many different forms; some draw on history, some on science, some on personal experience, and some on philosophy. Descartes offered two arguments towards the existence of God: an informal proof in the third meditation and the ontological proof in the fifth meditation. Descartes believed that with the employment of a rational method of inquiry which applied some of the methods of analytic geometry to the study of philosophy, our ability to attain certaintyRead MoreThe Argument Of The Existence Of God1480 Words   |  6 PagesThe arguments trying to â€Å"prove† the existence of God are by far some of the most controversial philosophical arguments out there. When some of the people who created these philo sophies it was illegal or even punishable by death to even question his existence, let alone try to come up with a logical explanation to â€Å"prove† he is real. The two main arguments used today are the ontological argument and the cosmological argument. Neither one of these arguments are correct nor incorrect; moreover, theRead MoreThe Arguments For The Existence Of God940 Words   |  4 Pagesp. 209, question# 1 Among the numerous arguments for the existence of God, the argument of design stands as the most persuasive in terms of providing a logical basis for the absolute presence of God. This argument is concerned with the intricate nature of creation and existence: one must believe that there is a Supreme Being that designed the characteristics and features of every existing thing in the entire universe, both living and non-living. The precise and complicated design of the universeRead MoreThe Argument For The Existence Of God1411 Words   |  6 PagesMy paper scrutinizes numerous logical disputes for and alongside the presence of God. I shall argue that there’s no adequate evidence or inclusive arguments for the existence of God. It is grounded on the views of certain great philosophers and scientists of all of mankind. Generally speaking for myself, I would correspond to have faith that there is â€Å"God†. Regrettably, it’s awfully well-defined that the being built up on insightful faith is no longer a suitable custom to shadow. During the course

Monday, December 16, 2019

The Misunderstanding of Internet Freedom Free Essays

The Misunderstanding of Internet Freedom The public governance has been a significant part of every system. People as citizens always discuss their opinions with each other. In accordance with the system which they are ruled, their discussions have an effect on the rules and regulations of the government. We will write a custom essay sample on The Misunderstanding of Internet Freedom or any similar topic only for you Order Now In modern societies which embrace democracy as management system, the influence of public determination is predominant. As it is mentioned above sharing and declaring public decision is the milestone of governance in such societies. Therefore, the more advanced ways people have to communicate, the more they can contribute to the improvement of democracy. If it is compared with the past, people have faster, cheaper and much more effective communication tools in order to exchange and spread their ideas. The Internet and new communication technologies enhance democracy by making any kind of information accessible and by providing people with rapid and cheap communication. The Internet enables the improvement of democracy because it gives people the opportunity to be aware of current issues. It offers a wide range of information to everyone regardless of their status. People who are interested in a topic can access plenty of data about what they are looking for. It is not anymore the case that people have to delve into books in libraries in order to find a useful resource which contains relevant information. People already have a well-organized library which searches and introduces them to the most appropriate information on their subjects – The Internet. In addition to individuals, many non-governmental organizations and any other social groups that share common ideas can publish their arguments and spread them across the world. For example, human rights organizations use the Internet to advocate their arguments. L. Pal reveals that the international human rights movement has grown hugely since the 1950s when approximately 38 non-go0vernmental organizations were identifiable, to around 14,500 by 1994 (qtd. Brophy and Halpin 353). The new ICTs (information and communication technologies) and the Internet provide people with advanced opportunity to declare their opinions and to contribute to democracy. To illustrate, (International Center for Human Rights and Democratic Development) ICHRDD started to use electronic publications and participated in the PeaceNet Human Rights gopher service that retrieve important data published by other organizations (354). The information becomes accessible to all concerned workers and volunteers so that they will be more sophisticated in their fights and they are able to defend their arguments. (Brophy and Halpin 356). The new information communication technologies (ICTs) and the Internet contribute to development of democracy because they facilitate communication with rapid and cheap tools such as e-mails. It is stated by Brophy and Halpin that â€Å"Electronic communications and networking cut through the barriers of time and distance, facilitating the finding of information in a way previously impossible. † (353). Likewise to the authors statement, instead of costly phone calls or even more incommodious face to face meetings, electronic communications enable people to communicate or exchange their ideas in a rapid way whether they are at the opposite sides of the world. ICTs help citizens to contribute to democracy because they make mobilization of people more effective and cheaply. They also provide circulation of information through networks, and they strengthen NGOs so that capacity of governmental agencies is limited (Brophy and Halpin 354). As it is mentioned above, ICTs enhance contributions of citizens to democracy because they transform people into aware, active and investigative elements of democracy. They enable people to discuss and question conviction, and come up with new perspectives and creative resolutions. Inherently, there are people who deny the contribution of the Internet freedom to democracy. It is also argued that the Internet makes things worse in terms of liberalization. Evgeny Morozov who is an expert on interaction of digital technologies and democracy believes that authoritarian governments hinder democracy from developing by censoring the Internet or attacking web-sites (1). Besides, there are some governments that censor web-sites which advocate child abuse, cyber-crimes, and terrorism (Ash 8). They also legally or illegally gain access to e-mail account, spy on searches and so on (Ash 7). These examples might seem to be assaults on privacy or obstacles to the improvement of democracy. But your privacy is not more important than the welfare of your country and children. You cannot jeopardize your country and children while some terrorists threaten benefits, security, and economy of your country or pedophiles abuse your children physically or psychologically. It should be preferred to protect your country and your children to your privacy. As a result, it is legitimate and reasonable to block websites like this. Besides, the reliability of governments is controversial. Everybody might not be satisfied about government’s implementations. However, the ones who elect the government are the majority of society. People are given the right to choose the people who will govern them. Of course, they can question the practices and submit their thoughts through NGOs and so on. But they should also be respectful to the will of the public. In conclusion, the role of public in governance is significant in all modern democracies. The more people declare their thoughts the more they can contribute to democracy. With the developing technologies and the Internet, people are more likely to communicate, exchange ideas and search for what they need. New ICTs such as e-mails and electronic documents enable people to enhance democracy. On the other hand, in order to prevent illegitimate censoring and regulations by governments, we should implement all laws in the online world as well. Finally, we should use our right to elect cleverly and declare our views through NGOs in an appropriate way. References Ash, Timothy Garton. â€Å"Internet Freedom†. freespeechdebate. com. N. D. Web. October 2012. Brophy, Peter, and Edward Halpin. â€Å"Through the Net to freedom: information, the Internet and human rights†. jis. sagepub. com. Journal of Information Science. 24 March 1999. Web. October 2012. Morozov, Evgeny, and Joanne J. Myers. â€Å"The Net Delusion : The dark side of Internet freedom†. Carnegiecouncil. org. Carnegie Council for Ethics in International Affairs. 25 January 2011. Web. October 2012. How to cite The Misunderstanding of Internet Freedom, Essay examples

Sunday, December 8, 2019

Conduct Functional Communication Training -Myassignmenthelp.Com

Question: Discuss About The Conduct Functional Communication Training? Answer: Introduction The project of Telehealth was eventually started for the better development of admittance to the health care in almost all the services in healthcare and hospitals that are not present in urban areas (Henderson et al., 2013). This causes a major problem for any patient, as they are unable to contact to the health experts or hospitals. The professionals or the experts of the healthcare are often separated by the long distances and this particular feature makes the situation absolutely tough for all the patients from reaching out to the particular hospitals or doctors and nurses. It is considered as one of the most common problems in the rustic areas that for the issues in communicating with any hospital or health expert, the patient has significant problems for the completion of their treatments (Wacker et al., 2013). This project of Telehealth was started for this significant reason so that their treatment could be completed without going to any health expert or hospital. The entire initiative was treating the patients by means of tools. This particular report will give a proper explanation on the entire Telehealth project. The report will be helping to understand the various requirements that are non-functional for the project. The major non-functional requirements of Telehealth project are the functionalities, usability, reliability, performance and finally security (Phillips et al., 2016). The project of Telehealth may consider a cloud based solution and the different types of clouds will be described here, which will eventually include all the merits and the demerits of the suggested cloud. The SDLC approach with specific details will also be described here. Non-Functional Requirements of the System Any particular situation can be easily judged with the help of the non-functional requirements of any system. There are various non-functional requirements in Telehealth project (Chen Zhao, 2012). The major non-functional requirements of the Telehealth project are known as FURPS. The full form of FURPS is Functionality, Usability, Reliability, Performance and lastly Security. Functionality The first non functional requirement of Telehealth is Functionality. This is extremely important for the Telehealth project as it describes the complete functionalities of the system (Chung et al., 2012). This particular system requires the basic functions of daily updates and proper data access. The user, who is accessing the data, will be able to understand the entire problem of the patients, only by viewing the data stored in the system. Therefore, this particular requirement is extremely vital. Usability The second non-functional requirement of Telehealth project is usability. This requirement eventually refers to the effortlessness of learnability and proper utilization of any tool or object (AlZain et al., 2012). The important benefit of the project is the simple utilization with excellent efficiency. The project of Telehealth never considers the problem in communication within any health expert or patient. Reliability Reliability is the third most important non-functional requirement of this specific project, namely, Telehealth. The entire system of Telehealth is absolutely reliable and can be easily trusted as all the experts of healthcare and hospitals are real. These professionals are eventually hired for completing the treatment of any patient (Chung et al., 2012). This treatment of the patients is done by audio-visual conferences. The system of patient treatment can be improvised with the help of this requirement. Performances The fourth non-functional requirement of FURPS is the performance. This performance requirement is the most significant criteria for any project (Galibus Vissia, 2015). Since the treatment will be completed with the help of talented healthcare experts it is evident that the entire performance of this Telehealth project would be much better than the system of traditional treatment. Security The last non-functional requirement of FURPS is the security (Jain Nandakumar, 2012). This is again one of the most important needs for any system as if a system is not secured; it is evident that the data or information stored within it is not secured. Telehealth project is extremely secured and there is no chance that the data would be lost. Biometric is the best option for Telehealth. Comparison and Contrast between Functional Requirements and Non-Functional Requirements of the System The functional requirements of any typical project mainly involve those requirements that are related to the functions of the projects (Kulkarni et al., 2012). The calculations, the functional activities, the details of technology, manipulation of data and many more are considered as the functional requirements of a project. Data processing is also considered as the functional requirement. Mostly, the functional requirements are expressed as use case diagrams. The non functional requirements of any project mainly deals with those requirements that are utilized for the judgment of any operation of a particular system. These requirements are often considered as the quality attributes of any system (Chung et al., 2012). The most significant examples of the non functional requirements of a project are accessibility, functionality, performance, operability, usability, portability and many more. The project of Telehealth cannot consider the functional requirements. However, the non functional requirements will be considered. Selection of Cloud Cloud computing is the best technology for transfer of data from one particular location to another. The project of Telehealth was started by a specific group of doctors and nurses for treating the patients, residing in rustic areas (Li et al., 2013). This significant amalgamation of ICT and medical technology will be absolutely useful for the patients. The solution for the project of Telehealth can be improvised with the help of cloud deployment models. Significantly, four specific kinds of cloud deployment models can be utilized. The four kinds of cloud deployment models are private, public, hybrid and community. Private cloud can be defined as the type of cloud that allows data access amongst a restricted group of users. Public cloud, on the other hand, allows data access within no restrictions (AlZain et al., 2012). Amalgamation of private and public clouds is known as a hybrid cloud. Community cloud can be utilized when a restricted group of users having same requirements, is ac cessing the data. The perfect cloud solution for this project of Telehealth is the deployment model of hybrid cloud. Since this particular cloud is the amalgamation of public and private clouds, it has each and every characteristic of these two mentioned cloud deployment models (Li et al., 2015). Telehealth project will be improvised with the help of hybrid cloud. Strengths of Selected Cloud Solution Cloud computing is the safest mode of data transfer via Internet. Each and every kind of deployment model has their own characteristics (Galibus Vissia, 2015). Hybrid cloud has various merits and demerits. The most significant merits of a hybrid cloud deployment model are as follows: i) Security: The important merit of hybrid cloud is security. Transfer of data or confidential information is absolutely safe in hybrid cloud. Most of the popular organizations, utilize hybrid cloud for their data migration (Kulkarni et al., 2012). Moreover, hybrid cloud deployment model is scalable and flexible in nature. ii) Cost Effectiveness: The second important benefit of hybrid cloud is the cost effectiveness. This particular merit or benefit makes this cloud very popular for all the small and medium enterprises or organizations (Chen Zhao, 2012). Moreover, the operational cost of hybrid cloud is extremely small and thus the operations or functions can be claimed as cost effective. Weaknesses of Selected Cloud Solution There are various demerits or disadvantages for hybrid cloud as well. They are as follows: i) Integration of Application: The main weakness of hybrid cloud is the lack of integration of the applications and data. This creates a significant problem when the application is in private cloud and the data is in the data centre, the entire integration of data and application becomes tough (Li et al., 2015). Often it causes data loss and the data cannot be recovered if recovery plan is not present. ii) Compatibility: The second most significant demerit of this hybrid cloud is lack of compatibility. This compatibility across the infrastructure of the hybrid cloud is very difficult in comparison to the private cloud and public cloud. System Development Life Cycle Approach The systems development life cycle approach or the SDLC approach divides the entire cycle of all software into several significant stages (Mahalakshmi Sundararajan, 2013). It is utilized in software engineering for the purpose of describing the planning, testing and implementation of a system. Predictive SDLC approach and adaptive SDLC approach are the two probable approaches for Telehealth project. Description of Predictive Approach The predictive approach of software development life cycle can be defined as the approach that is taken before completing any project. There are various pros and cons of predictive approach and they are as follows: i) Project plan is made perfectly. ii) Project time and scope are properly understood to every member (Balaji Murugaiyan, 2012). i) Alteration of the plan of project is absolutely impossible. ii) Client feedback is never considered. Description of Adaptive Approach The reciprocal of adaptive approach is known as SDLC predictive approach (Balaji Murugaiyan, 2012). This approach is mostly beneficial for the long term projects. There are various pros and cons of predictive approach and they are as follows: i) The plan of the project is modified in every step. ii) Feedback of clients are considered (Mahalakshmi Sundararajan, 2013). i) Predictive SDLC approach is extremely costly. ii) The project scope and the time is not specified. Hence, for the project of Telehealth, the best approach is the predictive approach (Weinstein et al., 2014). Conclusion Therefore, from the report, conclusion is drawn that, the project namely, Telehealth was started with the mission of providing better access to each and every healthcare unit that are present in rustic areas. All the healthcare experts or hospitals are separated by the long distance between patients and them. This has become a major problem for all persons to contact to the health experts and hospitals. It is considered as one of the most common problems in the rustic areas that for the issues in communicating with any hospital or health expert, the patient has significant problems for the completion of the treatments. This project of Telehealth was started for this particular cause so that the patients can be treated easily without any complexities and without even going to the health centres. The application of this project was extremely straightforward that the system will be able to treat every patient by means of technology. This report has provided major details about the non f unctional requirements like security, usability, performance, functionality and usability. Hybrid cloud will be the best solution for this project. Hybrid cloud has several strengths and weaknesses within itself. These strengths and weaknesses will be useful for the project to choose which type of cloud deployment model would be better. The selection of the best SDLC approach is also mentioned here. References AlZain, M. A., Pardede, E., Soh, B., Thom, J. A. (2012, January). Cloud computing security: from single to multi-clouds. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 5490-5499). IEEE. Balaji, S., Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study on SDLC. International Journal of Information Technology and Business Management, 2(1), 26-30. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Chung, L., Nixon, B. A., Yu, E., Mylopoulos, J. (2012). Non-functional requirements in software engineering (Vol. 5). Springer Science Business Media. Galibus, T., Vissia, H. E. R. M. (2015). Cloud storage security. Proc NSCE, 2014, 123-127. Henderson, C., Knapp, M., Fernndez, J. L., Beecham, J., Hirani, S. P., Cartwright, M., ... Doll, H. (2013). Cost effectiveness of telehealth for patients with long term conditions (Whole Systems Demonstrator telehealth questionnaire study): nested economic evaluation in a pragmatic, cluster randomised controlled trial.Bmj,346, f1035. Jain, A. K., Nandakumar, K. (2012). Biometric Authentication: System Security and User Privacy. IEEE Computer, 45(11), 87-92. Kulkarni, G., Gambhir, J., Patil, T., Dongare, A. (2012, June). A security aspects in cloud computing. In Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on (pp. 547-550). IEEE. Li, J., Li, Y. K., Chen, X., Lee, P. P., Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1206-1216. Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., Du, R. Y. (2013). Applications integration in a hybrid cloud computing environment: Modelling and platform. Enterprise Information Systems, 7(3), 237-271. Mahalakshmi, M., Sundararajan, M. (2013). Traditional SDLC Vs Scrum MethodologyA Comparative Study.International Journal of Emerging Technology and Advanced Engineering,3(6), 192-196. Phillips, V. L., Vesmarovich, S., Hauber, R., Wiggers, E., Egner, A. (2016). Telehealth: reaching out to newly injured spinal cord patients.Public health reports. Wacker, D. P., Lee, J. F., Dalmau, Y. C. P., Kopelman, T. G., Lindgren, S. D., Kuhle, J., ... Waldron, D. B. (2013). Conducting functional communication training via telehealth to reduce the problem behavior of young children with autism.Journal of developmental and physical disabilities,25(1), 35-48. Weinstein, R. S., Lopez, A. M., Joseph, B. A., Erps, K. A., Holcomb, M., Barker, G. P., Krupinski, E. A. (2014). Telemedicine, telehealth, and mobile health applications that work: opportunities and barriers.The American journal of medicine,127(3), 183-187.