Tuesday, November 26, 2019

Frankenstein and Blade Runner Essay (Contexts and Representation) Essays

Frankenstein and Blade Runner Essay (Contexts and Representation) Essays Frankenstein and Blade Runner Essay (Contexts and Representation) Essay Frankenstein and Blade Runner Essay (Contexts and Representation) Essay Essay Topic: Frankenstein Explore the way in which different contexts affects the representation of similar content in the texts Frankenstein and Blade Runner. Mary Shelley’s Frankenstein and Ridley Scott’s Blade Runner, whilst separated by 174 years, feature very similar content which can be seen by comparing the two side by side. Coming from different contexts, they both express their anxieties about technology, which is shown through a man made creature, and they both exhibit a strong valuing of nature. However due to their different contexts, these ideas are represented differently. The medium of production is clearly different, as is the representation of the creature and whether or not they are able to assimilate into society. In both texts the responder is meant to sympathize with the creature but through different ways. Frankenstein, published in 1818, presents a monster unable to assimilate into society due to his grotesque appearance. This is reflective of the gothic element of the time, whilst he also exhibits parts of the Romantic Movement as well as the Age of Enlightenment. In contrast, the 1992 film, Blade Runner, has replicants that are a product of the DNA technology and cloning coming to fruition at the time of the movie’s release. The clear contextual differences effect the final presentation of texts despite the fact they deal with the same universal themes. The contexts of Frankenstein and Blade Runner affect many ways in which they represent their ideas and on the most basic level, a key difference would be their medium of production. Both creators chose to use the most popular medium of their time; for Shelley that was a novel, for Scott, a film. : At some level, this choice also reflects some aspects of their stories. In Shelley’s case, the novel places a value on literature, which is shown in the monster’s discovery of the novels and his own valuation of language, which he considers â€Å"a godlike science†. In contrast, Scott clearly felt film was the best medium to display the future and the advancements in technology that would occur. In order to emphasise this, he focused highly on cinematography, vividly portraying the setting through his camera work. The effectiveness of this can be seen in the opening aerial shot of Los Angeles, in which a slow panning long short of great structures of lighting and advertising overlay the concrete skyscrapers, many of which look reminiscent of buildings from the 1980s. It is worth noting that whilst Blade Runner is based on Philip K. Dick’s 1969 novel Do Androids Dream of Electric Sheep? Blade Runner achieved a must higher level of recognition. This could quite possibly be due to the fact Dick chose to express his idea in a novel rather than a film. In this way, the texts different contexts show that whilst they have the same aims, they are presented differently for in order to reach the greatest amount of people. Despite the contextual influences that are very apparent in both these texts, they both use a man-made creature as a centrepiece for their work. Regardless of the fact 170 years separated the texts both Shelley and Scott were fascinated by the notion of humans creating life. In both cases, this seems to have stemmed from an anxiety about technology. In Shelley’s instance, the Romantic Movement had been progressing for twenty years as a reaction to the age of enlightenment and reason. With the industrial revolution coming to fruition in the late 1700’s, many people had growing apprehensions about technology and the fact it could replace humans. Shelley uses this idea with regards to Frankenstein’s monster and his creation stems from galvanism, a scientific theory being explored at the time, involving the use of electricity to bring about movement in a dead creature’s muscles. The result of this is a creature that cannot assimilate into society, as is seen in his first thought upon seeing the monster in chapter 5 â€Å"No mortal could support the horror of that countenance † This vivid explanation is a feature of Gothicism, not unlike the style of Edgar Allen Poe. His inability to assimilate into society is also a feature of Gothicism, which dealt with many supernatural elements and creatures that were easily discernible from humans such as werewolves and ghosts. The grotesque appearance of this character is used to show part of Shelley’s apprehension about technology and is expressed differently to Scott’s interpretation due to the contextual influences. Scott’s depiction of the Replicants in Blade Runner is very different from Shelly’s depiction of Frankenstien’s monster as a result of its different context, however, this representation is equally sceptical about the advances in technology. Whereas Shelley created a creature that was unable to assimilate into society due to his grotesque appearance, Scott uses creatures which are described as â€Å"more human than human†. This is reflective of the unprecedented growth in technology during this period, particularly in communicative and medical fields. DNA testing was first used by Sir Alec Jeffreys in 1984 and mice were the first mammals to be cloned in 1986. Scott was clearly influenced by these advances and believed that we may definitely reach a stage in which we had to delve into a psychological test, the Voight Kampff test, in order to distinguish between human and replicant. The fear society has of them is evident in their treatment, and the derogatory terms such as â€Å"skin-jobs†. The similarity in the way society views these creatures and Frankenstein’s creature is uncanny, despite the different contexts. The notion of morality and ethics also plays a strong part of both Frankenstein and Blade Runner and the questions posed by the text’s authors are conveyed in very similar ways. The question relates back to the advancements in technology, asking whether â€Å"just because we can do this, does that mean we should? † In Frankenstein, Shelley poses this question through the monster’s narration in the central chapters. The hatred he portrays for his life can be shown in his quote â€Å"Cursed, cursed creator. Why did I live? † which he uses to open Chapter 16. This notion is also explored due to the fact Shelley positions the reader to feel sympathy towards the monster rather than Victor. When the monster begins his tale in chapter 11, his story evokes sympathy from us with his emotive and poetic language. His story makes us feel empathetic towards him, rather than Victor. From the beginning of the monster’s narration â€Å"A strange multiplicity of sensations seized me Shelley writes the monster’s dialogue as sophisticated, poetic, contemplative and also logical, which combines traits of romanticism and the age of reason into one. The sophistication and thematic structure of his words is clearly part of the Age of Reason, as opposed to the exploration of his sense, which pertains to the influences of Romanticism and this combination of the two prominent philosophy groups of t he time helps to make him appealing to both social spheres. This helps to make create empathy for the creature and in turn, evoke moral and ethical questions about his creation and treatment. Similarly to Frankenstein, Blade Runner puts forward the moral and ethical questions associated with creating life and advancing technology in general. In the same way Shelley evokes sympathy for the creature in her novel, Scott also makes his replicants more deserving of our sympathy. In the scene used to depict Zhora’s death, in which a slow motion camera captures the terrifying scene of Deckard shooting her in the back as she smashes through glass walls in a desperate attempt to live. The eye-level shot used here gives the feeling that the viewer is really observing the â€Å"retirement† and the inhumane way in which she is killed. This desperate attempt to escape and live, shows how the replicant’s value their life so much more that the humans. A good contrast to this is Tyrell’s death in which the camera gives us a close up of Batty picking up Tyrell and killing him. Whilst Tyrell screams in agony at the pain Batty causes him, he makes little to no attempt to live. The icing on the cake is in the film’s climax, when Batty selflessly saves Deckard from death, even though moments earlier, Deckard had shot and killed Pris. This act of empathy defies the humans stereotype that the replicants are unable to show empathy for other living creatures. Scott also uses the Post-Modernistic technique of intertextuality â€Å"I think Sebastian, therefore I am† to make us question what the difference is between humans and replicants. These questions of morals and ethics are very similar to the ones posed in Frankenstein, however due to their contextual differences, they are expressed through different means. The importance of nature is also a mutual theme that is expressed differently due to the different contexts of the two texts. In Frankenstein, Shelley uses the romantic style of poetic imagery and Victors first person narration of the scenery to emphasize the beauty of his surroundings. He tells us that the Alps â€Å"gave wings to the soul and allowed it to soar from the obscure world to light and joy. † Contrasting to this is Scott’s emphasis on nature and the lack thereof. From the opening pan of a decaying and burning city, we see very little flora and fauna throughout the entire movie. The wealthy are able to afford real animals as pets and the rest buy counterfeits. It is also worth mentioning that the Voight Kampff test always centres around nature, showing that the humans clearly value it, and expect that the replicants do not. The use of this lack of nature stems from the emerging beliefs of the 1980’s that the environment was decaying due to global warming, and that it was also being destroyed for city areas as part of the new wave of globalisation. Both these ideas of nature’s beauty come from different contexts and are presented differently, but have the same overall message of how beautiful and precious nature is. The texts of Frankenstein and Blade Runner, whilst created in different era’s, convey mutual concepts a nd concerns about the future of humanity. Though presented through different mediums, they both deal with the concept of creating life and the ethical and moral issues raised by doing this. In both cases these questions are raised by evoking some sort of sympathy for the creature rather than the creator. Finally they both deal with the beauty and value of nature in very different ways, and this stems from their contexts. The similarities in context, juxtaposed by their representations due to context are made clear once we evaluate these texts side by side.

Friday, November 22, 2019

Forest Succession Stages and Maturity

Forest Succession Stages and Maturity Successional changes in plant communities were recognized and described well before the 20th century. Frederick E. Clements observations were developed into theory while he created the original vocabulary and published the first scientific explanation for the process of succession in his book, Plant Succession: An Analysis of the Development of Vegetation. It is very interesting to note that sixty years earlier, Henry David Thoreau described forest succession for the first time in his book, The Succession of Forest Trees. Plant Succession Trees play a major role in creating terrestrial plant cover when conditions develop to the point where some bare-ground and soil is present. Trees grow alongside grasses, herbs, ferns, and shrubs and compete with these species for future plant community replacement and their own survival as a species. The process of that race toward a stable, mature, climax plant community is called succession which follows a successional pathway and each major step reached along the way is called a new seral stage. Primary succession typically occurs very slowly when site conditions are unfriendly to most plants but where a few unique plant species can catch, hold, and thrive. Trees are not often present under these initial harsh conditions. Plants and animals resilient enough to first colonize such sites are the base community that kick starts the complex development of soil and refines the local climate. Site examples of this would be rocks and cliffs, dunes, glacial till, and volcanic ash. Both primary and secondary sites in initial succession are characterized by full exposure to the sun, violent fluctuations in temperatures, and rapid changes in moisture conditions. Only the hardiest of organisms can adapt at first. Secondary succession tends to happen most often on abandoned fields, dirt, and gravel fills, roadside cuts, and after poor logging practices where disturbance has occurred. It can also start very rapidly where the existing community is completely destroyed by fire, flood, wind, or destructive pests. Clements defines the succession mechanism as a process involving several phases when on completion is called a sere. These phases are: 1.) Development of a bare site called Nudism; 2.) Introduction of living regenerative plant material called Migration; 3.) Establishment of vegetative growth called Ecesis; 4.) Plant competition for space, light, and nutrients called Competition; 5.) Plant community changes that affect the habitat called Reaction; 6.) Final development of a climax community called Stabilization. Forest Succession in More Detail Forest succession is considered a secondary succession in most field biology and forest ecology texts but also has its own particular vocabulary. The forest process follows a timeline of tree species replacement and in this order: from pioneer seedlings and saplings to transition forest to young growth forest to mature forest to old growth forest. Foresters generally manage stands of trees that are developing as part of a secondary succession. The most important tree species in terms of economic value are a part of one of several serial stages below the climax. It is, therefore, important that a forester manage his forest by controlling the tendency of that community to move toward a climax species forest. As presented in the forestry text, Principles of Silviculture, Second Edition, foresters use silvicultural practices to maintain the stands in the seral stage that meets societys objectives most closely.

Thursday, November 21, 2019

What Makes a Good Leader (Organisational Behaviour) Essay

What Makes a Good Leader (Organisational Behaviour) - Essay Example In contemporary times, we tend to understand and relate to ‘leadership’ in relation to management of people for attaining specific goals. A comprehensive concept of leadership can be obtained by learning about Abraham Lincoln, the 16th President of the United States. This report evaluates Lincoln’s leadership qualities, as explained in literature on politics, history and management, in comparison with conventional and contemporary leadership theories. Methods: Numerous concepts and theories of leadership exist in the management literature. Northouse (2009) has clubbed various leadership theories into understandable concepts, which include the trait, management, skills, style, situation, transformational, authentic leadership, psychodynamic theory etc. In this report, Lincoln’s leadership based on these theories and perspectives is evaluated in a concise manner. Results: From skills perspective, Tarbell (2008) points out that Lincoln’s efforts in spee ch making started during his childhood and used to attend court sessions to learn law. He had the ability to attract crowds by initiating story telling acts, which were highly appreciated by the crowds. Lincoln was greatly drawn towards gaining knowledge and understanding of politics, history, as well as great leadership of people such as Washington (Charnwood, 2008). According to Curtis (1902), ‘Abraham Lincoln's originality, fearlessness, and self- confidence, his unerring perceptions of right and wrong, made him a leader and gave him an influence which other men did not have† (p.371). Northouse (2009) highlights five types of power that leaders exercise namely, referent, expert, legitimate, reward and coercive power, all of which were exercised by Lincoln. From leadership traits theory perspective, Lincoln’s leadership can be compared with Stodgill’s postulation of leadership traits (see appendix 1). In fact, Northouse (2009) explains that trait theories of leadership are based on the innate qualities and characteristics possessed by great leaders of the past, of which Lincoln is also one. The skills perspective emphasizes three main competencies, problem-solving skills, social judgment skills and knowledge. Abraham Lincoln’s skills of communicating, inspiring, immense knowledge and the way he handled the civil war are exemplary of his unmatchable leadership skills. His strategic way of handling the civil war after he was elected as the President paved successful ending of the war (Wilson, 2008), especially when he did not have any experience of handling war. Moreover, his knowledge, people connect, and ability to influence and inspire helped in this situation. Lincoln’s leadership style is believed to be flexible and also firm, and it depended upon the situation. Phillips (2007) explains that Lincoln was remarkably consistent during his Presidency, which was replicated to his cabinet members’ actions and decis ions. Here, he was also directive and encouraging. He encouraged involvement from others in critical decision making processes, especially those related to the civil war. Phillips (2007) explains, ‘Lincoln was a leader who would not and did not limit himself† (p.78); this indicates his flexibility and commitment towards his responsibilities and ambition. These two skills are considered as essential skills for leaders. On the leadership grid, proposed by Blake and Mouton, Lincoln can be placed in Team management grid because of

Tuesday, November 19, 2019

Deploying and Managing Fire Services Assignment

Deploying and Managing Fire Services - Assignment Example It is in such spirit that the fire suppression rating schedule and standards of coverage have been created and utilized as part of the collective human resource, fiscal, and capital management of fire stations. This outline seeks to draw a distinction between the two systems by focusing on their strengths and weaknesses, as well as the premise in which the usage of any of the two can be said to be relevant. I. Context: This evaluation system is used by the Insurance Service Office (ISO). It focuses on evaluating fire prevention and fire suppression capabilities that various communities and fire protection areas have as part of systems available to the community (ISO, 2014). II. The difference from Standards of Coverage: Unlike the standards of coverage, this manual focuses fire communities rather than fire agencies or organization. Again, this manual makes use of quantitative grading system but the standard of coverage is largely based on a qualitative evaluation system. I. Context: This evaluation system is used by the utilized by the International Association of Fire Chiefs (IAFC) and the commission on fire accreditation. It functions based on a data collection process which focuses on identifying expected levels of performance that should be produced by agencies, based on achievable emergency events outcomes (Spokane Fire Department, 2010). II. The similarity with the Fire Suppression Rating Schedule: All these two systems function as an assessment or evaluation manual. By this, their usefulness is based on the decision-making process that is conducted out of the outcomes they produce. This is different from other forms of guidelines that spell out processes and actions that must be taken in the actual event of a fire or emergency. I. A major strength of the fire suppression rating schedule is the fact that it is preventive in nature.  

Saturday, November 16, 2019

Media corruption - other side of the coin Essay Example for Free

Media corruption other side of the coin Essay ‘Whoever controls the media, controls the mind† In today’s world, the media has become a necessity just like food, clothing, and shelter. The media was ideally designed to be impartial and unbiased – to provide information, news, and knowledge that is objective and socially constructive. Unfortunately, in recent times, because of its money making approach the media has adopted a biased approach that is benefitting politicians and the corporate leaders. Sadly, the media is known to be resorting to â€Å"Paid News† – news that is published or broadcasted to benefit a certain class of people who have huge economic power and who wield that economic power to buy â€Å"The News† in their favor. The viewer’s/readers of such â€Å"Paid News† are at such a loss with this information that lacks integrity and they can be easily misled. Actually the readers/viewers are deceived in to believing â€Å"Paid News† which is indeed misrepresentation of the truth.. Article 19 of the Constitution of India â€Å"Reach to the public† states the right to freedom of speech and expression to media .When this freedom is misused by the media, it becomes a prime reason for media corruption, and more or less the willingness of Indian Govt. to eradicate this problem. The objective of this paper is to highlight the roots and remedies of media-corruption in India and to create awareness about the general public about the distortion of news/information by the media – to enable viewers to discern, and not be uninformed consumers of the news. Key words: necessary, money making approach, freedom.

Thursday, November 14, 2019

A Glimpse of Dorothy Parkers Life Essay -- Biography Biographies Writ

A Glimpse of Dorothy Parker's Life Dorothy Rothschild, later to become the famous writer Dorothy Parker, was born on August 22, 1893 to J. Henry Rothschild and Eliza A (Marston) Rothschild in West End, New Jersey. Parker’s father, Mr. Rothschild, was a Jewish business man while Mrs. Rothschild, in contrast, was of Scottish descent. Parker was the youngest of four; her only sister Helen was 12 and her two brothers, Harold and Bertram, were aged 9 and 6, respectively. Just before her fifth birthday, Dorothy’s mother became very ill and died on July 20, 1897. Three years later in 1900, Mr. Rothschild remarried to a 48 year-old spinster widow, Eleanor Frances Lewis, who Dorothy referred to as â€Å"the housekeeper.† The new Mrs. Rothschild entered Dorothy in the Blessed Sacrament Convent School, where the Catholic ways of thinking were instilled in her. Fortunately or unfortunately, in 1903 Dorothy’s stepmother dropped dead of an acute cerebral hemorrhage and consequently Dorothy di d not have to continue at the Blessed Sacrament Convent. A few years later, in the fall of 1907, Dorothy entered Miss Dana’s school, a junior college, where she studied several different disciplines and was exposed to current events and cultural activities. This environment nourished Dorothy’s intellectual appetite, but this too was short-lived; Miss Dana died in March 1908. Dorothy, now aged 14, was only at the school for one year, the fall of 1907 to the spring of 1908 (Miss Dana’s school had to file for bankruptcy). In 1913, Mr. Rothschild died leaving Dorothy, age 19, to find her own way and support herself. In search of a way to support herself, Dorothy turned to Mr. Crowninshield, an editor at Vanity Fair who published her ... ...ceiving the credit she deserves. Bibliography â€Å"Dorothy Parker†. Grolier Incorporated 1993. [2004] Available Online: http://www.levity.com/corduroy/parker.htm, accessed April 14, 2004. Keats, John. The Life and Times of Dorothy Parker: You Might As Well Live. New York: Simon and Schuster, 1970. Kinney, Arthur F. Dorothy Parker, Revised. New York, NW: Twayne Publishers, 1998. Melzer, Sondra. The Rhetoric of Rage: Women in Dorothy Parker. New York: Peter Lang Publishing, Inc., 1997. Pettit, Rhonda S. A Gendered Collision: Sentimentalism and Modernism in Dorothy Parker’s Poetry and Fiction. New Jersey: Associated University Presses, Inc., 2000. Related Links: http://www.americanpoems.com/poets/parker/ http://www.english.uiuc.edu/maps/poets/m_r/parker/parker.htm http://webpages.marshall.edu/~Armada2/Parker.html

Monday, November 11, 2019

Computer Security Measures Essay

The Problem and Its Scope The Internet and computer networking means that there is a need for new security measures to reduce the threats and challenges inherent from these new technologies and software applications and network devices. Information, network equipments, transmission media, computer systems, and servers are subject to threats. â€Å"Yet the use of information and communication technologies has increased the incidents of computer abuse.† Computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality. Effective computer security therefore involves taking physical security measures (to ensure hardware and media are not stolen or damaged), minimizing the risk and implications of error, failure or loss (for example by developing a resilient back-up strategy), appropriate user authentication (for example by employing strong pass wording), and possibly the encryption of sensitive files. We live in a world where â€Å"information wants to be free† and in which people are getting used to having access to whatever information they want anytime, anywhere and from a wider range of computing devices. Unfortunately, in terms of the security and control of the resources to which computers permit access, this can prove quite a problem. Indeed, many users unfortunately often view security and control measures as inhibitors to effective computer use. The student’s awareness about computer security measures can be a big help to them to acquire some knowledge about protection of their digital asset. In this sense, the students acquire knew knowledge on how to use computer security measures in order to protect all the data stored in their computer system. Because of the computers evolution, the researchers want to share the implications on how important the computer security measures, so that the respondents will be able to know on how to handle some cases in the future. Globally, the most used computer security measures are Anti-virus programs are the most frequently used tools to protect computer systems, and they must be upgraded regularly to protect against any new viruses. Firewall  is different from anti-virus software, which simply verifies that a file is virus free. You can also add an anti-spy ware program. Spy ware is a small program downloaded onto your computer via the internet, usually with your approval, to collect information. Anti-spy ware operates a lot like an anti-virus program, but its role is to prevent malicious spy ware (or malware) from sneaking onto your computer and transmitting your personal data. Firewall intercepts and controls traffic between networks with differing levels of trust. It is part of the network perimeter defense of an organization and should enforce a network security policy. By Cheswick’s and Bellovin’s definition, it provides an audit trail. A firewall is a good place to support strong user authentication as well as private or confidential communications between firewalls. As pointed out by Chapman and Zwicky [2] , firewalls are an excellent place to focus security decisions and to enforce a netw ork security policy. They are able to efficiently log internet work activity, and limit the exposure of an organization. The exposure to attack is called the â€Å"zone of risk.† If an organization is connected to the Internet without a firewall, every host on the private network can directly access any resource on the Internet. Or to put it as a security officer might, every host on the Internet can attack every host on the pri vate network. In the Philippines, some of the businesses are employing security products, such as intrusion detection system and firewalls, and other internal controls which are meant to safeguard, physically and logically, all servers and information systems, including the data stored in the systems. In Davao City, many colleges’ offers IT courses and one of these schools is the Holy Cross of Davao College. Some computer security measures used in some colleges are anti-virus, firewall, ad ware, spy ware and etc. This help to secure data from viruses, unauthorized a ccess, hardware failure and hardware theft. Rationale of the Study The term Information Technology is the area of managing technology and spans wide variety of areas that include computer software, information systems, computer hardware, programming languages but are not limited to things such as processes, and data constructs. In short, anything renders data,  information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the Information Technology (IT) domain. Computer security is to prevent or detect unauthorized actions by users of the system. The protection of data stored in your computer system. The protection of data (information security) is the most important. The protection of networks is important to prevent loss of server resources as well as to protect the network from being used for illegal purposes. The objective of this study is to know the level of awareness and utilization of all first year BSIT students in terms of computer viruses, unauthorized access, and hardware failure and hardware theft. Theories and Concept This study was anchored on the concept of Dynamic awareness theory (DAT) offers an alternative to explaining the creation of awareness in distributed work groups. DAT highlights the important role of users and social practices in awareness creation. The theory further points to the dynamic nature of awareness creation: Awareness emerges over time and depreciates when not being actively attended to by the users. A person’s awareness is not a static state which can be arbitrarily turned on and off. It is rather a slow build-up of information about his surroundings (Kai Riemer, Russel Haines, 2008).  This theory of awareness is use to conceptualize each individual of their daily awareness about what happen in their community, because awareness requires active maintenance because it diminishes over time. Independent variable Dependent variable Figure 1. Conceptual Framework Showing the Variables of the Study The response of the first year BSIT students in the level of awareness and utilization about computer security measures in terms of Virus, Unauthorized Access, Hardware Failure and Hardware Theft depends with the experiences  they encountered in their system in which it is the basis of the reasons for the awareness of the students. Statement of the Problems 1. What is the level of awareness of the respondents about computer security measures against the following threats: a.Virus b.Unauthorized access c.Hardware failure d.Hardware theft 2. What is the level of utilization of the respondents on computer security measures? 3. What is the most practiced computer security measure by the respondents? 4. What is the least practiced computer security measure by the respondents? 5. Is there a significant difference between the level of awareness and utilization of the computer security measures by the respondents? Method The researches conduct this type of research in order to obtain certain information about the computer security measures. The researchers used descriptive assessment method in order to meet the objective of the study. To gather data, the researchers use these procedures in order to analyze the data that has been collected. Research Design In order to determine the level of awareness and utilization about computer security measures, the descriptive assessment method of research is used. This is used by the researches because the objective of this study is to determine the level of awareness and utilization within the first year BSIT students without affecting them in any way. Descriptive research design exhibits specific subject and as precursor to more quantitative studies. The actual survey is conducted during the second semester of the year 2011-2012. The procedure used is carefully, analyzed in order to obtain accurate information. Research Environment The researchers conducted a research to a certain private school. The Holy Cross of Davao College is located at Sta. Avenue Davao City. The respondents of this research are all first year BSIT students. Respondents of the Study To achieve the desire information, all first year BSIT students of Holy Cross of Davao College were the participants of the study. They were chosen because they are not more knowledgeable compared to the higher years. The selected numbers of respondents were expected to give their honest answers. Research Instruments In this study, the researches use questionnaire as research instrument. It is most common instrument or tool of research for obtaining data beyond the physical reach of the observer.  Part I of the questionnaire is the level of awareness of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft. Part II of the questionnaire is the level of utilization of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft. Data Gathering Procedures In gathering data procedure, first the researchers conceptualized what study to conduct and arrived to a research title â€Å"Level of Awareness and Utilization of All First Year BSIT students about Computer Security Measures†. The research title was approved by the research adviser with the panel of examiners. After the approval of the title, a questionnaire was established to answer the research study was validated. Data Analysis The following statistical tools were employed to answer pertinent problems of the study, as follows: Frequency Count: This tool was used to count the number of items of the respondents who are aware and unaware about the computer security measures and its utilization. Weighted Mean: The weighted mean is similar to an arithmetic mean (the most common type of average), where instead of each of the data points contributing equally to the final average, some data points contribute more than others. The notion of weighted mean plays a role in descriptive statistics and also occurs in a more general form in several other areas of mathematics.