Thursday, February 27, 2020

Descriptive paper on metal of honor Essay Example | Topics and Well Written Essays - 750 words

Descriptive paper on metal of honor - Essay Example Smith renowned himself in 1864 after saving his regimental colors; this is after the killing of the color bearer during the Battle of Honey Hill in South Carolina. On the same day in the afternoon, the 55th regiment was pursuing the enemy and in the process they found themselves in a swampy region where the Confederate Army was waiting. The thick underbrush and the surrounding woods obstructed artillery support and infantry movement. The 34th and 55th regiments created columns to progress towards the enemy in a side movement. The other units were repelled by the Confederates but the 34th and 55th regiments persistently moved into the tanking positions. They were forced by the enemy into a narrow gorge and this is where the 55th’s Color-Sergeant was murdered by an exploding shell. The Regimental Colors held by the slain soldier were taken Corporal Smith and he carried them through intense canister and grape fire (Richardson 3). Despite the fact that almost half of the unit was wounded and killed by the enemy, Corporal Smith continued to expose himself to the enemy by carrying the Regimental Colors throughout the fight. Through Corporal Smith, the 55th Infantry Regiment Regimental Colors were not taken by the enemy (Richardson 4). Lieutenant Colonel Theodore Roosevelt His rank was lieutenant colonel in the United States Army and his organization, the First Cavalry Regiment. His citation for the award was â€Å"for conspicuous gallantry and intrepidity at the risk of his life above and beyond the call of duty† (Gomez-Granger CRS-3). Lieutenant Colonel Roosevelt renowned himself by his acts of gallantry in 1898 in the Republic of Cuba while directing a courageous charge up in San Juan Hill. Risking his personal safety and escorted only by five men, he lead a heroic and desperate charge up in San Juan Hill. He encouraged his troops to go on with the assault through contemptuous enemy fire over the open landscape. In the face of the opponent’s he avy fire, he showed astonishing bravery throughout the charge. He was the first among his troops to reach the rival’s trenches. In the trench he murdered one of the enemies using his pistol and this gave room to his men to go on with the assault. His courage and leadership brought unexpected results in the Battle for San Juan Hill (Gomez-Granger CRS-3). The Differences The two officers displayed extraordinary courage in the fight against the enemy. However, there are differences in the way these soldiers showed their gallantry. In Corporal Smith’s case, he took a position that was not assigned to him. Corporal Smith was not the carrier of the Regimental Colors but after the killing of the bearer of the Regimental Colors, he took it and carried it throughout the battle. Thus, the corporal saved the Regimental Colors from being taken by the enemy. He did this despite the fact that most of the men were either wounded or killed. On the other hand, Lieutenant Colonel Roosev elt showed extraordinary courage by leading only four or five men in a charge up in San Juan Hill. Though there was intense exchange of fire in the battlefield, he courageously encouraged his men to advance towards the enemy. He was able to open

Monday, February 10, 2020

Spyware and Viruses Term Paper Example | Topics and Well Written Essays - 4250 words

Spyware and Viruses - Term Paper Example Moreover, it can be used as a kind of adware, whereby the unsolicited pop-up ads are delivered by the software on top of tracking the behavior of the user. Characteristically, the software is installed when the owner is doing the installation of a kind of free software that they really needed (Parikka, 2007). When the software that is being installed by the user is completed, the spyware will attach itself to the installation and begin the collection of data from the activities of the user or the owner. The user of the computer can also be cheated or tricked into the installation of the software via a Trojan horse when it pretends to be piece of security software offered for free. The creators of spyware have been known for paying the developers of shareware to bundle their software with the authentic software and just repackaging the freeware as well as bundling it with their individual spyware (Parikka, 2007). Another way of spyware installation on an unaware computer user is drive-by downloading. Some of the earliest or first spyware did not do much than reporting to the creators every time the program was put to use. It was aimed at aiding marketing or even monitoring usage for the purposes of licensing. Although that is still happening, we find that a lot of nowadays is intended to steal private and valuable information such as the passwords and usernames for email accounts, bank sites, online games and social networking sites (Parikka, 2007). One might never be aware of the fact that they have malicious spyware on their computer, as it seems to operate in the background in a quiet manner and the explicit quality and functionality of the program might be very attractive. They are usually distributed as either ‘freeware’ or even ‘shareware’ with little or no license restrictions for the purposes of trapping as many individuals as possible. On