Sunday, April 12, 2020

Short Essay 2 Lloyd Shaw Essays - Religion, Christian Theology

Short Essay 2 Lloyd Shaw Lloyd Shaw THEO201-D15-201320 Short Essay #2 The Biblical basis for Jesus humanity can be seen in multiple places in the scriptures. We see in John 1:14 The Word became flesh and made his dwelling among us, and we held his glory, the glory as of the begotten of the Father, full of grace and truth. This states that God came down in human form. Another example of humanity of Jesus comes through his human birth. He experienced hunger, anxiety, and disappointment (Mark 14:33). He also died and was buried. The Biblical basis for his deity is an essential doctrine and is a central non-negotiable belief within Christianity, which is also known as the divinity of Christ. This doctrine shows that Jesus Christ was and is Gods incarnate. The apostle Paul stated, For in Him dwells all the fullness of the Godhead bodily (Colossians 2:9). The Christian meaning of the term deity of Christ is very clear, Christians believe that there is a personal God, Creator, and Ruler of the universe, a God who is infinite, eternal and unchangeable. When a Christian says that Jesus is God, or that he believes in the deity of Christ, he means that God and Christ are one as stated in John 10:30, which says that I and My Father are One. The Biblical basis for Jesus deity is His pre-existence and eternality. Jesus has always existed, as specified in 8:58, when Jesus said to them, Most assuredly, I say to you, before Abraham was, I am. The hypostatic union states that human nature was united with the divine natu re in the one person of Jesus Christ. The two natures are distinct, complete and unchanged; they are not mixed or confused, as having many personalities, so that Jesus is one person both God and man. (Elwell,2001). Because Jesus is both God and man, he had to have an intimate knowledge of what it was like to be man or human, but He is man He can maintain his deity. Because he is man, he can identify with us more intimately. Because he is man, he can come over to our aid as our sympathetic high priest when we peach the limits of our human weakness. Paul states in Philippians 2:6-8, Who, being in the form of go, did not consider it robbery to be equal with God, but made himself of no reputation, taking the form of a bondservant, and coming in the likeness of a man. And being found in appearance as a man, He humbled himself and became obedient to the point of death, even the death of the cross. The only way this could be accomplished was that Jesus was both God and man. Incarnation of Jesus was required to pay for our sins. Incarnation means becoming flesh. Hebrew 9:22 states and according to the law almost all things are purified with blood, and without shedding of blood there is no remission. There is no greater symbol of life than blood, blood keeps us living. Jesus shed his blood and gave his life for our sins so that we wouldnt have to experience spiritual death. By over emphasizing the deity of Christ we fail to acknowledge that he is god and that he was like us. We fail to acknowledge that he was born sinless and that he died a physical death to atone for our sins. When we overemphasized his humanity, we fail to acknowledge that he is god, and without sin because of his divine nature. The majority of common objections of understanding Christology is denial of the full deity of Jesus and seen in heresies like Ebionitism, which views Christ as a born naturally, on whom the Holy Spirit came at his baptism, and also Docetism, witch asserts that the humanity and sufferings of Christ were apparent rather than real (Elwell p. 241-242). These different viewpoints all have something in common; they express mans opinion over the Word of God, which bring about fatality. Responding to this type of view would be laying out the scripture of Jon 1:14, Roman 8:3, Galatians 4:4, I Timothy 3:16, Hebrew 2:14, and John 4:2-3. Sometimes we can get bogged down discussing theology and doctrine and

Wednesday, March 11, 2020

The Distribution of Power at Gateshead in Jane Eyre essays

The Distribution of Power at Gateshead in Jane Eyre essays At Gateshead, the Reed family holds power over Jane Eyre. The Reeds power comes in several forms, including limiting Janes social contact as well as bullying her. The Reeds also psychologically abuse Jane by attacking her value. Mrs. Reed does not allow Jane to interact with her cousins saying that not until, by her own observation that I was endeavoring in good earnest to acquire a more sociable and child-like disposition, ...she really must exclude me from privileges intended only for contented, happy, little children. (p.7) This line not only shows the limit of Janes social contact, but also her exclusion from the family as well as a psychological attack against her. Janes cousin John is the member of the Reed family that physically holds power over her. He bullied and punished me: not two or three times in the week, nor once or twice in the day, but continually: every nerve I had feared him ... (p.10) Up until Janes fight with John, she was expected to remain silent until she cou ld speak pleasantly, she also took all of her abuse without reply. Throughout Johns bullying, Janes, care was how to endure the blow which would certainly follow the insult. (p.10) She realizes that reacting will do her no good and that is shown when she does react to John throwing the book at her, Mrs. Reed punished her by sending her to the red-room, while it appears that John receives no punishment. Jane is also reminded of how she is not apart of the Reed family. When John finds her reading he tells Jane that, You have no business to take our books: you are a dependant, mama says: you have no money; your father left you none; you ought to beg, and not to live here with gentlemens children like us. (p.11) Once Jane does gain hope of leaving the Reeds household, the Reeds begin to act curler towards her. Janes social interaction is further red...

Sunday, February 23, 2020

Writing and Reporting News, page 244-245, exercise 3 Assignment

Writing and Reporting News, page 244-245, exercise 3 - Assignment Example In order to enhance this protection, the website is already making profile designs for the members at the age of 14- 17 years. An FBI agent, Clerk Hershberger, said that this private protection mechanism cannot be safe with the children. Hershberger says that even though the website is making the efforts to increase security, the implementation is still difficult. The directors have continued defending their website security efforts by saying that they are developing technology that will help parents keep off their children from the website. This will be enhanced by the parents adding their children’s addresses, and then the website would block them. In July, according to the MySpace directors, 30,000 profiles of sexual predators had been deleted from the website. Drinkwater, the Alaska’s assistant attorney general says that MySpace needs to be commended in its efforts. She also commends the progress of MySpace in cracking down the registered sex offenders in the website. Drinkwater says that MySpace has agreed in verifying the identity online in order to analyze the programs and technological answers. She says that MySpace will make sure that those who register present their real

Friday, February 7, 2020

Field Report on Hopwood Motorway Service Area . Sustainability Coursework - 1

Field Report on Hopwood Motorway Service Area . Sustainability - Coursework Example I noted that the peak flow and the concentration of pollutants in both water and sediments collected from the management train at Hopwood have recorded a downward trend (Motorway Services Online, 2013: 1). The sediments were received into the watercourse (Booth, et al., 2012: 244). Booth et al. (2012: 244) say that the Hopwood motorway service contains SUDS trains that administer vehicle parking, amenity and petroleum supply areas, as well as access road network, ponds and filter strips. During the fieldwork, I noticed that the motorway service also has swales, porous paving and swamplands (Booth, et al., 2012: 244). Conclusively, having conducted the field survey, the Service area must always be monitored to control the chemicals emitted from the pond. In an event that the wetlands are not well monitored, the wildlife may have access to contaminated water from the service

Wednesday, January 29, 2020

Social Networking Gone Bad Essay Example for Free

Social Networking Gone Bad Essay Have you even thought about how different society would be without social networking web sites? Many of the social networking web sites today play a huge role with the way we interact with one another in our everyday lives, which include most relationships. Using a social networking web site has many negative effects on relationship. Building insecurity, advertising personal information, and building social media moods are some of the many ways relationship are negatively impacted. First and foremost, many people are building up insecurities in their relationships due to these social networking web sites. The thought of what another person is doing on these web sites or who they are interacting with are affecting the trust bond between relationships which are causing the insecurities. For example, if a couple have had pervious issues with one person going behind another’s and speaking to their ex or person of opposite sex, then the thought of being easily connected with people through these sites can really build up the insecurity in the other persons mind and make them think that their partner is being unfaithful. Since it is so easy for someone to go on their phones and open the internet and begin speaking to people half way around the world. Not only can this destroy a relationship but it can also be unhealthy, causing anxiety and depression. The web being a public place, may not be the best place to be advertising personal information such as phone number, email address, or even photos. Some spouses and significant other may become bothered by the information streamed onto these sites and could possibly anger the person and potentially ruin a relationship. Have a phone number or email address on the sites can cause a person from the opposite sex or even their ex to try and get in contact with them, and that right there can really cause some major issues in someone’s relationship. It could even lead to someone getting harmed physically out of anger, when people out their relationships and personal life on the internet, nothing is secure nor private. Therefore eople are allowing others to have access in their relationship, by making it easier for people to express their opinion or do malicious things to sabotage it Not only can this destruct a love relationship but inappropriate information can ruin a relationship with someones job or business. In addition, as part of any social network experience, becoming networked and involved with each other is what keeps these sites going. Unfortunately, â€Å"a downside of social media relationships is that we’re potentially subject to emotional contagion effects, as illustrated in research by John Cacioppo, a researcher at the University of Chicago†(Jain, Dr.  R, 2010). In other words people with bad thoughts, ideas, or moods can transmit them to other people without ever having any face to face contact with the person. So basically if you have been following someone on one of these social networks and every time you are logged on, that certain someone is just posting negative comments and ideas, chances are that the very person reading this over and over again will begin to adapt these negative thoughts and ideas and then reflect a negative mood towards other people in their own real life, and the people they love. Which ultimately begin to take a toll on a relationship, because if one person is constantly upset the other is going to look at themselves first and feel like they are not wanted anymore. Even though social networking web sites might seem like the most amazing gift of technology, its adverse impact can ruin your strongest relationship and at the end leave you with countless regrets. Online friends, self-centered attention-seeking, short attention spans, distraction, and loss of privacy are what these social networks web sites engage you in, and not having control of it can have a negative impact on you and on your relationships. So be for you consider signing up for one of these social networks web sites or signing back on to an existing account, ask yourself if you are ready to deal with the negative effects the these sites have to offer. Also keep in mind there may be a possibility of ruining any types of relationships you are currently in or at least have an effect on them.

Tuesday, January 21, 2020

Computer Crime In The 1990s :: essays research papers

Computer Crime In The 1990's We're being ushered into the digital frontier. It's a cyberland with incredible promise and untold dangers. Are we prepared ? It's a battle between modern day computer cops and digital hackers. Essentially just think what is controlled by computer systems, virtually everything. By programming a telephone voice mail to repeat the word yes over and over again a hacker has beaten the system. The hacker of the 1990's is increasingly becoming more organized very clear in what they're looking for and very, very sophisticated in their methods of attack.. As hackers have become more sophisticated and more destructive, governments, phone companies and businesses are struggling to defend themselves. Phone Fraud In North America the telecommunications industry estimates long distance fraud costs five hundred million perhaps up to a billion every year, the exact the exact figures are hard to be sure of but in North America alone phone fraud committed by computer hackers costs three, four maybe even up to five billion dollars every year. Making an unwitting company pay for long distance calls is the most popular form of phone fraud today. The first step is to gain access to a private automated branch exchange known as a "PABX" or "PBX". One of these can be found in any company with twenty or more employees. A "PABX" is a computer that manages the phone system including it's voice mail. Once inside a "PABX" a hacker looks for a phone whose voice mail has not yet been programmed, then the hacker cracks it's access code and programs it's voice mail account to accept charges for long distance calls, until the authorities catch on, not for a few days, hackers can use voice mail accounts to make free and untraceablecalls to all over the world. The hackers that commit this type of crime are becoming increasingly organized. Known as "call cell operators" they setup flyby night storefronts were people off the street can come in and make long distance calls at a large discount, for the call cell operators of course the calls cost nothing, by hacking into a PABX system they can put all the charges on the victimized companies tab. With a set of stolen voice mail access codes known as "good numbers" hackers can crack into any phone whenever a company disables the phone they're using. In some cases call cell operators have run up hundreds of thousands of dollars in long distance charges, driving businesses and companies straight into bankruptcy. Hacking into a PABX is not as complicated as some people seem to think.

Monday, January 13, 2020

Mexican American Essay

The document of WWII and Mexican-Americans of 1945 writen by LULAC which was found in 1929 stated that â€Å"some hald a million Mexican-Americans served in the armed forces during WWII†, but yet Latinos continued to face discrimination towards them. LULAC then demanded equal rights for minority groups after them experiencing the War and serving the Country. As many signs in many place clearly stated to the Mexicans-Americans that their â€Å"uniforms and service ribbons† meant nothing to them and they were simply not allowed in anywhere. It left said that the so-called â€Å"Mexicans† were worthless of having equality wether they served the Coutry or not. Mexicans were and are racials characterisctly stated as Caucasian since there was only 3 races which were, Caucasians, Negroid, and Mongoloid. For that LULAC said that â€Å"this condition is not a case of difference; it is a case of ignorance†. They said that ignorance was † a Disease that was contagious to those who wish to suffer from it†. Ignorance tied hate, jealousy, misunderstandings, confusion, etc. The hate was not just beacause of the race or because they weren’t smart enough nor because of the language. The hate was because the ignorance affected many for them to think the â€Å"Mexicans† did not deserve the equal rights. As â€Å"Mexicans† proved to be loyal Americans after every test that was thrown at them, they â€Å"delegated right guaranteed by their constitution as a reward for their faithful servive. † The whole purpose of this document was for Mexican-Americans to be given â€Å"social, political, and economic equality. † Mecians had proved that they deserved the right of equality as all the other Americans. I agree with the authors point of view which was stated that ignorance was the biggest cause of the hate and discrimination toward the â€Å"Mexicans†. Ven withoutservice ribbons the â€Å"Mexicans† and other minorities deseved equality for the simple fact the the world needs to have equal rights for everyone, wether they served the country in any way or not, because they were born in American teritory.