Wednesday, October 30, 2019

Kants Ethical Theory Essay Example | Topics and Well Written Essays - 1000 words

Kants Ethical Theory - Essay Example A number of great philosophers presented their views in the field of ethics. This paper intends to analyze only one of them, Kan Immanuel. (Hunt, 2009) As stated by Banham (2003), Immanuel Kant was a famous deontologist and holds a famous status during 18th and 19th centuries. Kant was a moderate rationalist, who based his ethical conclusions on reason rather than on empirical research or on introspection into the actual workings of the mind. He refused previous theories and attempted to find a middle way between the empiricists, who thought that all true judgments were either probable or analytic (true by definition), and the extreme rationalists, who thought that all true judgments were analytic. He argued in the Critique of Pure Reason (1781) for the existence of a class of judgments that were synthetic rather than analytic and also a priori rather than a posteriori. Synthetic a priori judgments played a large role in all his thinking. Kant held a theory of value according to which the only thing good in itself and without qualification is a good will. That will is good which acts out of a sense of duty. When we turn to his theory of obligation we find that an act is not judged right by virtue of its consequences, actual or intended; rather it is right if it is done out of respect for moral law. (Banham, 2003) Dickerson (2003) affirms that during 1785 in his Foundations of the Metaphysics of Morals, Kant claimed to be seeking "the supreme principle of morality." This he discovered in the "Categorical Imperative": "Act only on that maxim through which you can at the same time will that it should become a universal law." This principle is called an imperative because it tells us what kinds of actions we should perform, and it is called categorical rather than merely hypothetical because it commands actions of a certain kind without any regard for the practical effects they will have. For example, we should not make a deceitful promise to extricate ourselves from a difficulty not because we are likely to be found out or because lying causes harm to ourselves, but because it is logically impossible to will that everyone in such a situation should behave in the same way. It is logically impossible because universal adherence to the maxim to lie under such circumstances would destroy the institu tion of promise keeping. (Dickerson, 2003) Another formulation of the Categorical Imperative, which Kant called the "universal imperative of duty," is this: "Act as if the maxim of your action were to become through your will a universal law of nature." A third formulation, based on the assumption that rational nature exists as an end in itself, is the following: "Act in such a way that you always treat humanity, whether in your own person or in the person of any others, never simply as a means, but always at the same time as an end." Kant identified the Categorical Imperative as an a priori, synthetic, practical proposition that is, a proposition that is necessarily true, though not true by definition, and that pertains to conduct. (Dickerson, 2003) Kant presented two types of free will; 'Autonomy' and 'heteronomy'. Autonomy is the liberty to operate autonomously without any

Sunday, October 27, 2019

The Wireless Internet Technology Computer Science Essay

The Wireless Internet Technology Computer Science Essay Wireless Internet gives us a permission to access World Wide Web or Internet email via wireless network. Without using any telephone line or any cable network wireless internet can be used. Not only in a particular place we can use the Internet through wireless Internet even if we are out of the office or home. People have tended to use wireless Internet not only it dont use wire but also it has easy using for their activities. When we consider about the wireless technologies, Wi-Fi, Wi-max, Blootooth, 3G and Satellite are examples. When we use these technologies to access Internet these technologies will help us in different ways, and difference technologies embedded in different devices. Some technologies are available in devices in default. And some can be connected. With recent advances in wireless Internet technology , high speed wireless connection are now available on laptops, cell phones ,and other mobile computing devices. paragraph{} Wireless Internet is become most important in today. In education, business, exploration, and govern like all this field use the facility of wireless Internet. The world has been become global. Then the information not limited to a particular place, in this situation wireless internet is the tool to link this all things together. Therefore people should not limited for a place like home or office. They must be able to access the internet at any place where they want. Therefore wireless Internet is very important to todays world. Internet is the most important and valuable topic in today. People use Internet to do their lots of activities. section{History of Wireless Internet.} begin{itemize} item German physicist Heinrich Hertz in his lab designed the primary electromagnetic radio waves in the year 1888. item In the year 1894 using radio waves in Oxford, England was sent by British physicist Sir Oliver Lodge as the first message. item Italian inventor Guglielmo Marcon delivered radio waves diagonally the English Channel in the year 1899. end{itemize} section{New features of the Wireless ISPs} However, modern wireless ISPs are able to provide connection speeds ranging anywhere from 384 Kbps to 2.0 Mbps. That is up to 35 times faster than dialup! One new wireless technology in development as of early 2009 is poised to increase the download speeds of wireless even further. WiMax promises to deliver maximum speeds of up to 7 Mbps to your laptop, your car, your cell phone, and your home. WiMax is only just now becoming available in some U.S. cities, but expect to see it in more locations by the end of the year and throughout 2010. Internet is a wide range of subject. Through the internet what we can do is not limited to the send emails and message activities through your mobiles phones. There are number of operations we can do by using the internet. But the technologies we that we use to access the internet is limit the those activities. To download avideo, share a large file, download streaming media, upload some large amount of data, it is better to having a high speed wireless Internet service Provider. In the present most mobile computers such as laptops comes with the facility to access the internet. It means the devices already have a wireless adapter installed in it. Not only that there are number of computer related devices which can be used to inernet remotely. Those devices have been set up to access the internet in any where the wireless ISP facility have been established. By today there are so many places they provide the facility to access the internet. And most of ISPs give the chance to their customers providing the internet access facility such as 3G, wi-fi in public areas. section{Requirements for a Wireless Internet Connection:} When we need to connect a device to the internet wirelessly, there are need some different equipments and facilities than when connecting using wired connection. To access the internet wirelessly it is good to have following things: begin{itemize} item Some type of mobile computing device, such as an iPhone, PDA, mini-computer, cell phone, or similar item or a laptop computer . item An internal wireless adapter or a USB port for connecting an external adapter. the adapter that you use must be compatible with the specific wireless provider you sign up for and the protocols they use. For example, a Wi-Fi 802.11 adapter. item A high speed, wireless Internet access plan from a provider in your area. item Free sniffer software for locating access at various Hot Spot locations (this software is typically supplied by your wireless Internet service provider). end{itemize} It is important to note that wireless home networking and wireless Internet access outside the home or office are two rather different things. Setting up a wireless LAN in your home should not involve a separate service beyond your current DSL or cable provider. They will typically provide you with all the equipment that you need, such as a wireless router, to establish a wireless LAN in your home at no extra cost. section{WISP Wireless Internet Service Provider} Wireless Internet Service Providers provide the public wireless services. There are number of WISPs available in today. In airports, hotels , computer schools and other public business places are covered with the networks using the wireless internet service providers. WISPs are mostly used to create the Local area networks(LAN). When you use a WISP, you must have the permissions to access it. But some WISPs give the access free. When you use it you must have the clear idea about the security of that WISP. Because there can spread the viruses through that networks. Therefore it will be harmful to your computers. Some WISPs give their service having some contracts, and some time they charge for their service. chapter{wireless Networks} section{What is a Wreless Network?} A wireless network is a kind of network which has interconnections between nodes without using a wire. In this methodology the network is established with the help of electromagnetic waves such as radio waves, LAN connections etc. wireless network is normal same as other network but use the wireless technology to transmit data through the network. There are some advantages uses the wireless network, because the devices within the network can be access within that area at any time anywhere. section{Types of Wireless Networks} subsection{Wireless Local Area Networks (WLAN)} Wireless lan is a wireless local area network which uses radio waves for data transmission between computers of the same network. WLANS allow users in local area such as in a university library get the access to the internet. subsection{Wireless Personal Area Networks (WPAN)} Bluetooth and Infra Red technologies are used for wireless personal Network. These technologies will allow the connectivity of personal devices within an area of 30 feet. Infra Red requires a direct line and the range is less as compared to Bluetooth technology. subsection{Wireless Metropolitan Area Networks (WMAN)} Wireless man is a Metropolitan area network that connects the computerof various local area networks. It could be within a building in the company. section{Wireless Wide Area Networks (WWAN)} WWANs or Wireless Area Networks can be maintained over large areas such as in different cities or between different countries, via multiple satellite systems or antenna sites. The types of system are called 2G systems. chapter{3G Internet} Access the internet using the 3G mobile network is meant by 3G Internet. 3G mobile network can be accessed through a mobile device which can be a mobile phone or PDA. Third generation technology is used by 3G internet, which allows users to access larger amount of data with a higher speeds. When comparing the other technologies which are used to access the internet, 3G technology is in a higher position. There are number of devices which provide the facilities to use 3G technology. section{3G internet vs. regular internet} To access the 3G internet there are some specific devices that are smaller and more compact than regular desktop and laptop computers. Mostly 3G internet is accessed by the mobile phones. Therefore the accessing internet is depend on the mobile phones size and the model. Because the mobile phone has more facilities it is easy to access the web pages to see in their normal sizes. Otherwise the applications interfaces view in smaller size. Mobile networks handle those data, therefore the accessing the internet through the 3G internet is simpler than the regular internet. There are limited download in 3G internet and it depend on the mobile service provider which is selected by you. When we use the wired network to access the internet we can use it within a limited area, but when weuse the 3G internet there has facility to access the intrenet within a wide area which is coverd by the mobile service provider. To acess the 3G internet there only need a mobile phone and the facility to 3G by the service provider. begin{itemize} item Speed of 10Mbps at 10 kilometers with line-of-sight with high throughput. item Easy installation and much faster installation compare to wired networks. item Full support for WMAN services. item Single station can serve hundreds of users. item It is standardized, and same frequency equipments work together. item Lower consumer premises equipment cost. item WiMAX is enabling for number of applications in customer and business because of its quality of service. end{itemize} section{Is the 3G internet right for you?} The main thing with the accessing internet through the mobile is the size of the viewing the web pages. Accessing 3G internet is some time not practical with the size of viewing to fulfil our needs through the 3G internet. There are some advantages as well as disadvantages. Some time the web pages which are viewed in the mobile phones or PDA are simple pages and they contain only the valuable details. At that time users dont need the vaste their time and they can get the information about what they are searched directly and fast. But they can be only less detailed. To watch some video, upload pictures, design tasks they are difficult to do with the 3G internet. But the very important fact is use the 3G internet is available in anywhere the signals available on the selected service providers. Nowadays it is not difficult because the every place covered by the service providers. section{So who will use 3G internet?} paragraph{} There are limited facilities have provided in 3G mobile internet. But it is easy way to access the internet than access the internet through the DSl or cable network. In business, students can use the 3G internet mostly. It would be useful to anyone who has the facility to access the internet anywhere. chapter{WiMAX } section{WiMAX: Broadband Wireless Access} paragraph{} WiMAX stands for Worldwide Interoperability for Microwave Access. WiMAX is the IEEE 802.16 standards-based wireless technology that provides MAN (Metropolitan Area Network) broadband connectivity to access the internet. In a WiMAX is an Air Interface for Fixed Broadband Wireless Access Systems, also known as the IEEE WirelessMAN air interface. As far as 30 miles of area can be covered using the WiMAX-based system by transmitting data. So far, WiMAX can be used for homes and offices communication . section{Wireless Standards} There are some wireless standards have been established by the IEEE. begin{itemize} item IEEE 802.15, also known as Bluetooth, for the Personal Area Network (PAN); item IEEE 802.11, also known as WiFi, for the Local Area Network (LAN); item IEEE 802.16 for the Metropolitan Area Network (MAN), item IEEE 802.20 for the Wide Area Network (WAN). end{itemize} paragraph{} Normally miles are used to measure the WiMAX range and feet are used for the Wifi range. The main thing is that WiFi is focused on a local-area networking (LAN) technology and that WiMAX is a MAN technology. paragraph{} The 802.16d standard of extending 802.16 supports three physical layers . The mandatory PHY mode is 256-point FFT Orthogonal Frequency Division Multiplexing (OFDM). The other two PHY modes are Single Carrier (SC) and 2048 Orthogonal Frequency Division Multiple Access (OFDMA) modes. By the way, the corresponding European standard-the ETSI HiperMAN standard-defines a single PHY mode identical to the 256 OFDM modes in the 802.16d standard. paragraph{} A WiMAX system consists of two parts: begin{itemize} item A WiMAX tower, similar in concept to a cell-phone tower A single WiMAX tower can provide coverage to a very large area as big as 3,000 square miles (~8,000 square km). item A WiMAX receiver The receiver and antenna could be a small box or PCMCIA card, or they could be built into a laptop the way WiFi access is today. end{itemize} paragraph{} There are namy advantages included in WiMAX-based solutions, robust security features, good Quality of Service, and mesh and smart antenna technology that will alow better utilization of the resources. WiMAX-based voice service can work on either traditional Time Division Multiplexed (TDM) voice or IP-based Voice, also known as Voice over IP (VoIP). paragraph{} WiMAX is similer to WiFi but the WiMAX have higher speed than Wi-Fi and would cover a large area by spreading in a long distance than covering from WI-Fi. Therefore using WiMAX large number of users can access the internet. Use the WiMAX than Wi-Fi is better to get more works. chapter{Wi-Fi Wireless Internet} paragraph{} WiFi stands for wireless fidelity and is a popular technology being used by homes, workplaces, mobiles and computer systems world-wide. paragraph{} Using radio waves produce the high speed internet services and network connection can be described in the Wi-Fi internet. This technology mostly used in the business places, universities, and offices. Wi-Fi technology can be used in a limited area. Within that area any can access the internet through a device like laptop which has a wireless adapter. paragraph{} Wi-Fi works using radio frequency, without using any wired connection between sender and the receiver. When we use the Wi-Fi to a network, automatically create a wireless local area network (WLAN). Wi-Fi provide Fast data transfer rate. With transfer speeds up to 54mb. paragraph{} Within the Wi-Fi established area users can move with their computers from one access point to another. The cost for the wired network is can be saved using wireless networks. paragraph{} begin{itemize} item Normally open or un-encrypted as a default setting comes with the WiFi (wireless fidelity) networks. item In order to secure a WiFi, network, connection must distribute with password protected and the device must be configured using a Graphical User Interface or GUI. item Un-encrypted networks are freely accessible and any data can be accessed through these. Therefore the spreading of viruses can be happen. end{itemize} chapter{Other Technologies} section{Bluetooth} subsection{What is Bluetooth?} paragraph{} Bluetooth is one of wireless technology most used in today in the digital devices. That technology is used to access the internet too. Bluetooth technology is use o communicate between various electronics and that technology has been expanding every day. Mostly used in mobiles phones, personal computers, PDA, Laptops, digital camera, MP3 players and other Bluetooth enabled devices. paragraph{} The Bluetooth technology was invented by Ericson in 1994, and after in 1998 that the major mobile phone companies such as Nokia, Ericsson, Intel and Toshiba gathered to promote this technology. Using Bluetooth there can be connected eight devices at a time. Communication can be established hopping channels up to 1600 times per second. Bluetooth wireless technology works by allowing the transmission of signals over short distances between these devices and there by abridge communication and synchronization between these devices. subsection{How it Works} paragraph{} The Bluetooth chip can operate between the frequency band of 2400-2483.5Mhz. Bluetooth is designed to use in area where the wireless communication such as infrared are not working. Between the devices which are use to connect to using the Bluetooth there doesnt need to have a clear path between them for connecting the devices. paragraph{} Bluetooth wireless technology works by allowing the transmission of signals over short distances between these devices and there by abridge communication and synchronization between these devices. section{GPRS} GPRS stands for General Packet Radio Service, and is a protocol for passing data over a mobile phone network. And GPRS use to access the internet through the mobile phones. Even though there is no 3G facility, you can access the internet with having the GPRS facility in your phone. Heres what you need to know about GPRS: begin{itemize} item GPRS replaced dial-up mobile phone Internet access, offering faster browsing of Internet content and email. Its an always on service. item GPRS on a mobile phone doesnt use a phone number to connect; it uses something called an APN (Access Point Name). item For GPRS usage, have to pay for the amount of data you transferred, and not need to pay for your online time per minute. item GPRS has now been largely superseded by faster data network services known as 3G end{itemize} chapter{Conclusion} To access the internet it is easy to use the wireless technology because it can be used in everywhere the signal are available in internet service providers. When we select the technology to access the internet we must consider about the speed, cost, availability of signals, suitability of the needs. According to the tasks we wants to fulfil the technology can be different. When you use the 3G Internet through the mobile phones it is better to consider about the size of viewing. Bluetooth is mostly use to connect phones with the computers than connecting computer to a computer. There are various networks in wireless technology which are related to the different places. begin{thebibliography}{100} bibitem {}Unknown Author. (2002). textit{Wireless Internet Service}. Available: http://www.high-speed-internet-access-guide.com/wireless/. Last accessed 10 June 2010. bibitem {}Unknown . (2008). textit{3G Intrenet}. Available: http://www.broadband-expert.co.uk/3g-internet/. Last accessed 10 June 2010. bibitem {}unknown. (2002). textit{GPRS in the UK}. Available: http://www.filesaveas.com/gprs.html. \ Last accessed 11 June 2010. bibitem {}unknown. (2007). textit{Wireless Network Types}. \ {Available: http://www.networktutorials.info/wireless_networking.html}. Last accessed 27 May 2010. bibitem {}unknown. (2008). textit{How WiMAX Works}. {Available: http://computer.howstuffworks.com/wimax1.htm}. Last accessed 07 June 2010. bibitem {}unknown. (2010). textit{Wi-Fi}. {Available:http://www.webopedia.com/TERM/W/Wi Fi.html}. {Last accessed 03 June 2010}. bibitem {}unknown. (2006). textit{Wireless Network}. {Available:http://www.altiusdirectory.com/Computers/wireless-network.html}. Last accessed 04 June 2010. bibitem {}unknown. (2006). textit{Bluetooth Wireless Technology}. {Available:http://www.altiusdirectory.com/Computers/bluetooth-wireless-technology.html}. Last accessed 07 June 2010. bibitem {}unknown. (2006). textit{Bluetooth Wireless Technology}. {Available:http://www.altiusdirectory.com/Computers/bluetooth-wireless-technology.html}. Last accessed 12 June 2010. bibitem {}unknown. (2006). textit{WiFi How Does It Work?}. \ {Available:http://www.bwif.org/wifi how it works.html}. Last accessed 08 June 2010. bibitem {}unknown. (2005). textit{Different Types of Wireless Network}. \ {Available:http://www.greyfriars.net/gcg/greyweb.nsf/miam/article01}. Last accessed 11 June 2010. bibitem {}unknown. (2010). textit{Introduction to Network Types}. \ {Available:http://compnetworking.about.com/od/basicnetworkingconcepts/a/network types.htm}. \Last accessed 07 June 2010. bibitem {}unknown. (2010). textit{Wireless Networks}. {Available:http://www.topbits.com/wireless-networks}. Last accessed 07 June 2010. bibitem {}unknown. (2010). textit{WISP Wireless Internet Service Provider}. {Available:http://compnetworking.about.com/od/wirelessterms/g/bldef wisp.htm}. \ Last accessed 07 June 2010. bibitem {}Jeff Tyson. (2008). textit{How WAP Works}. \ {Available:http://compnetworking.about.com/gi/o.htm?zi=1/XJ/YazTi=1sdn=compnetworkingcdn=computetm=552f=internet.htmv}. \Last accessed 24 May 2010. end{thebibliography} end{document} end{document}

Friday, October 25, 2019

Life And Works Of George Orwell :: essays research papers fc

In his short life, George Orwell managed to author several works which would inspire debate across the political spectrum for years to come due to his extreme views on Totalitarianism as exemplified in his novel, Nineteen Eighty-Four. Orwell is now regarded as one of the finest essayists in Modern English literature because of his inspired common sense and a power of steady thought. Orwell was born Eric Arthur Blair in Bengal on January 23, 1903. He lived with his two sisters, mother and father who was a minor official in Indian Customs. Orwell’s childhood has been an influence on his later life and writing. British Writers by Ian Scott-Kilvert quotes Orwell as saying: Looking back on my own childhood, after the infant years were over, I do not believe that I ever felt love for any mature person, except my Mother, and even her I did not trust, in the sense that shyness made me conceal most of my real feelings from her†¦ I merely disliked my own father, whom I had barely seen before I was eight and who appeared to me simply as a gruff-voiced elderly man forever saying "Don’t." Early in his childhood, he was sent to a fashionable preparatory school on a scholarship. The other boys were much better off than Orwell was. Looking back on his school years, British Writers by Ian Scott-Kilvert again quotes Orwell as saying: I had no money, I was weak, I was ugly, I was unpopular, I had a chronic cough, I was cowardly, I smelt†¦ The conviction that it was not possible for me to be a success went deep enough to influence my actions until far into adult life. Until I was thirty I always planned my life on the assumption not only that any major undertaking was bound to fail, but that I could only expect to live a few years longer. At the age of 13, Orwell was rewarded with not one, but two separate scholarships. Orwell decided upon Eton, which was the more distinguished and prestigious of the two. Of his time at Eton, Modern British Essayists by Robert L. Calde quotes Orwell as saying, "I did no work there and learned very little and I don’t feel that Eton had much of a formative influence on my life." However, a majority of English students does no work at Universities but instead broaden their outlook on life and acquire a new sense of self-confidence along with an ability that is far more valuable than academic learning. After Orwell’s time at Eton, the natural thing for him to do would have been to go on to Cambridge and continue his career there where he could easily have gained a full

Thursday, October 24, 2019

Characters In Havisham, Hitcher, and The Laboratory Essay

What similarities or differences are there in the way disturbed or disturbing characters are presented in Havisham, Hitcher, and The Laboratory? Necrophilic fantasies in Duffy’s Havisham, the impulsive murderer in Armitage’s Hitcher, the smarter premeditated plot in the Lab, and finally the darkened anger of Inversnaid. All of these poems contain elements of disturbed characters or disturbed fantasies, some flaunt an erratic display of anger love and hate, and some are more contained and scheming. In all of these poems the disturbed and the disturbing is explored in new ways and helps us to better understand our own minds and evils. Inversnaid is immediately begun with dark and disturbing imagery â€Å"darksome burn† this conjures up gory and gothic thoughts before the poem has properly begun. In contrast Hitcher starts in a completely opposite way â€Å"I’d been tired, under the weather† the enjambment on the first line creates suspense, also the spelling of answer phone as â€Å"ansaphone† shows the narrators simplicity, also the erratic punctuation gets across his disturbed state of being. The fact that he has a hired car could also mean that he is a dangerous driver and has caused a road accident. A part in the poem that also suggests that the narrator is crazy is â€Å"round the next bend† this indicates that he is round the bend showing he is crazy. Inversnaid also gives this impression through the use of enjambment. This gives the poem a rambling feel as though he is just spouting random words. A disturbing feeling is also created by: † broth Of a pool sp pitch-black,† this phrase sounds almost apocalyptic, this combined with the rambling could almost be seen as though he is speaking in tongues; prophesising some terrible end to the world. In Duffy’s Havisham, the psychotic issues of the narrator can be seen from the start, as is the case in inversnaid. â€Å"Green pebbles for eyes† this shows the audience that she has lost all emotion and individuality she ever had. We know this â€Å"Havisham† is defiantly crazy when Duffy describes her â€Å"cawing Nooooo at the wall;† it shows her loss of self-respect and dignity. In contrast, the woman in the Laboratory chooses to hid her self â€Å"tying thy glass mask tightly† she does this in order to hide herself so as to save her self-respect and also to ensure she does not get caught in planning a murder. However, despite the narrators dignity there is a disturbing element about her for example: â€Å"keep them one half minuet fixed she would fall† the fact that she believes that she can stare her victim to death, but most of all because she does not care that the man will still not love her after she has killed â€Å"Pauline,† this proves that she is just doing it out of jealousy as she cannot have him. Carol Ann Duffy’s Havisham is defiantly the most disturbing poem of all as it addresses all the usually psychotic issues that the narrators in each of the poems talk about and goes beyond that by describing Havisham necrophilic fantasies. However it is evident that all of these poems are describing a hate that we have all felt at some point, we are not all necessarily necrophilia’s but we have all hated someone in this way. As for hitcher I believe that this is the same and that Armitage is merely presenting to us a part of ourselves but exemplified in an amplified and literal state.   

Wednesday, October 23, 2019

Desire and Disappointment in “A & P” and “A Woman on a Roof” Essay

It may be natural instinct for men to be attracted to a good-looking woman or one who displays more than the usual amount of skin in public. The level and type of attraction varies from one male to another. However, more often than not, the primary expectation or fantasy of the male admirer regarding the female being admired, is not met because these expectations and fantasies are based on his personal conceptions and stereotypes about what women should be and not what the particular woman he chances upon is in reality. The male protagonists in John Updike’s â€Å"A & P† and Doris Lessing’s â€Å"A Woman on a Roof† exhibit different expectations on the female characters they meet but in the end, all of them would be disappointed and disillusioned with both the female character and, in turn, their own selves.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Updike’s hero is 19 year-old Sammy who works in the checkout counter of a convenience store. One day, three young women walk into the store in their swimsuits. Sammy’s reaction, along with another young but married co-worker, is typical of men their age: they gawk at the woman with sexual desire. Written in the first person point of view of the main character, the reader notes that what Sammy notices about the women are the usual things that men desire in women like â€Å"long white prima-donna legs†¦(and) clean bare plane of the top of her chest down from the shoulder bones†¦(Updike).† Her admiration becomes more than a physical attraction, however, when the store manager reproaches the girls for their out-of-place outfits. In a burst of impulse, Sammy resigns from his job, his reason being that he could not take the embarrassment that the store manager inflicts upon the girls. He imagines his resignation to be a heroic act which he expects the girls to notic. To his disappointment, however, they do not even look back at him. Outside the store, Sammy thinks about â€Å"how hard the world was going to be (Updike)† afterwards. He realizes that the heroism is simply his own conception about what he does and nobody else, especially not the girls, get it. He loses his job in the process and he has too much pride to take it back.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The three male protagonists in Doris Lessing’s story, meanwhile, react upon the sight of a barely-clad woman sunbathing on a rooftop. Like Sammy, the men lust at the sight of the woman in â€Å"red scarf tied around her breasts and brief red bikini pants (Lessing).† The initial reaction evolves differently among the three men, however, as the sunbathing woman becomes a daily distraction to their work. Harry, past middle-age, reminds the other two to think of their own wives as they look at the woman. To him, the woman is a possession that should be reined and controlled and the particular woman on the roof must have had a husband that is not doing his job. The newly-married Stanley is confident that women are willing and submissive when they are coaxed. He gets along with Mrs. Pritchett because she responds to him. Tom, the youngest, has an ideal, fairy-tale image of himself. He imagines himself â€Å"at work on a crane, adjusting the arm to swing over and pick her up and swing her back across the sky to drop her near him (Lessing).† He is a hero protecting her from Stanley. All the time while the men watches, yells and whistles at her, the woman remains indifferent. Days later, Harry eventually gives up. Stanley becomes more enraged as the day becomes hotter. Tony remains hopeful but suffers the most as in the end when he decides to finally go and talk to the woman he is rejected and driven away.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Men have been used to classifying women according to types based on superficial images generated by media or during talks amongst themselves. When a man encounters someone that does not fit any of the molds, she disappoints him greatly, more than even she realizes. The characters in the two stories illustrate how hope could turn into disillusionment when a man entertains grand ideas about a woman even before understanding her. Works Cited Lessing, Doris. A Woman On A Roof. Updike, John. A & P.