Saturday, December 28, 2019

Lust and the Degeneration of Man Exposed in Shakespeare’s...

Lust and the Degeneration of Man Exposed in Shakespeare’s 129th Sonnet Love in its purest form is the most unsurpassable of all emotions, requiring intense commitment, while simultaneously providing incomparable bliss. However, often the intense desire for these feelings produces a new emotion, lust, with a craving that gives priority to obtaining an objectified person, as opposed to a very real human. Lust can be further practically defined as the inability to place selfless love on a higher pedestal than selfish desire. Shakespeare explores these conflicting definitions of lust in his 129th sonnet, condemning his animalistic variations of lust that coexist with his desire for a genuine state of love. As opposed to following the†¦show more content†¦When juxtaposed with the opening line, an inappropriate form of lust is a waste of the vitality that a person can give to the world in the form of intellect. In accordance with this natural tendency, the tone of the first half of the sonnet is most definitely savage (Martin 5), supported by the wor ds bloody†¦murderous, which brings about the connotation of a fierce creature of nature with only the desire to quench the physical thirst. These first lines support the wild tendencies by comparing Shakespeare’s initial action of lust to the first defense (Vendler 551) of an animal, partial to primitively impulsive behavior. The speaker is trying to erase his guilt when his rationality as a man should advise a reformation of his reasons for love. Throughout the sonnet, there is a continuous reference, more technically, a conceit of the hunt that further enhances the image of animals in their natural setting, uninhibited by society’s rules. Some critics have gone so far as to contest that Shakespeare mocks primitive lust. However, its sole presence is quite pitiful, for the speaker is unable to grasp a greater level of satisfaction that is everlasting, not ephemeral. The distinction between selflessness and selfishness is one that separates the human from the sava ge animal, although these opposing

Friday, December 20, 2019

Is it Possible to Prove the Existence of God - 532 Words

Is it Possible to Prove the Existence of God? There are many arguments that have been brought forward to support or refute the existence of God. Even in early times, these arguments were there and a number of philosophers argued on the possibility of God’s existence. St. Thomas Aquinas is one of the philosophers who supported the existence of God. In one of his writings that is referred to as Summa Theologica, he provides five ways in which God’s existence can be proved (Aidan, 2001). I belong to this school of thought which believes that God does exist. Therefore, this paper seeks to present arguments that prove the existence of God. First and foremost, the possibility of God itself implies the existence of God. Maydole (1980) gives an in-depth analysis of St. Anselm who was of the idea that God could not be a being that is greater than which the human mind can conceive. Therefore, if there is even a slightest consideration that God exists, then he does exist. He goes on to assert that there can only be one supreme being in existence and that the same supreme being cannot be greater that itself. Therefore, this argument suggests that co-supremity among distinct things is impossible. For that reason, God exists. The second convincing argument about the existence of God concerns the way in which the world is governed. Things such as natural bodies do not have a mind of their own and yet they act for an end. Such ends, seemingly pursues the best results. It cannot beShow MoreRelatedThe Existence Of God : Ontological Argument Essay1696 Words   |  7 PagesThe question of the existence of God has troubled mankind for thousands of years. Many philosophers and theologians have always searched for prove whether God exists. Many of them constructed valid arguments which support theist believes. The existence of God was once never denied, as His presence, His existence was evident in miracles and the people s faith. But time and the advancement of modern science have called God and His very nature into question. The Perfect Being has become the sourceRead MoreValidity And Effectiveness Of Anselm s Ontological Argument On The Existence Of God1095 Words   |  5 Pages1 Assignment Phil 141 Fall 2016 Frank In this philosophical paper I will be examining the validity and effectiveness of Anselm s Ontological Argument on the existence of God. I will begin by presenting Anselm’s Ontological Argument from the ground up. This includes the argument, basic idea, initial assumptions, Anselm’s definition of god, and Anselm s distinctions which are needed to completely understand the nature of my argument. Furthermore, I will present concepts of logic and define whatRead MoreThe Possibility of Proving the Existence of God Using Inductive and Deductive Arguments1222 Words   |  5 PagesProving the Existence of God Using Inductive and Deductive Arguments Many philosophers have attempted to prove the existence of God, although there is no argument as yet which proves without any doubt that God exists. A proof is the demonstration that something is true or, in this case, that God exists. There are 3 types of proof; direct, deductive, and inductive. A direct proof is when something is immediately obvious, so therefore, it cannot be used to prove Gods existenceRead MoreOntological Argument For The Existence Of God1083 Words   |  5 Pagesthe existence of god. His basis of his argument being an analytical breakdown for the reason fot gods exsistence. While also establishing that Anselms inferences found with his use of deduction and logical means to prove the existence of a higher being are indeed true. In addition I will defend Anselms argument by depicting other people’s objections against his argument. Specifically the argument made by Gaunilo, who disagreed with Anselms argument and tried to use logical reasoning to prove himRead MoreAdvantages Of The Ontological Argument1261 Words   |  6 Pagesthat God exists so that His existence cannot be questioned otherwise. It is a deductive argument that argues de dicto – the premises involving the definition of God and existence. It is based on a priori knowledge that comes to an analytic statement that is necessarily valid. If the premises of the argument are true , then the conclusion is self-evident and and the argument provides absolute proof for the existence of God. This is in direct contrast with other arguments for the existence of God suchRead MoreAnselms Existence of God Refuted Essay1110 Words   |  5 PagesAnselms Existence of God Refuted Anselms Existence of God Refuted If the only proofs for the existence of God were Aquinas’s five ways and Anselm’s ontological argument, in my opinion, Anselm provides the best reasoning. I am not saying that Anselm’s argument is good, or even valid, but just that given the set of proofs by Aquinas and Anselm, Anselm’s is better. Anselm argues, in effect, that the existence of God is built into the very concept of God. He proceeds by a form of argumentRead MoreThe Medieval Sourcebook For Anselm s 1033-1009 Proslogium1175 Words   |  5 Pagesontological argument. Aselm attempts to prove the existence of God through one single argument which is that God does truly exist. However, there will always be dilemmas, conflicts or predicaments when it comes to such sensitive and personal topics such as the existence of God. Atheists are types of people who do not believe in the existence of God and have been continuously denying his existence. I personally am Christian and I therefore have a strong belief in God. That being said, my belief and theoriesRead MoreSt. Thomas Aquinas Essay823 Words   |  4 Pagesused ancient philosophy to prove religious propositions. One of the ancient philosophers that St. Thomas Aquinas used to prove religious facts was Aristotle. One of the greatest works that Aristotle did was to p rove that god really exists. St. Thomas Aquinas used the forms that Aristotle and Plato used to prove the same philosophical question, does god really exist? St. Thomas Aquinas, first started by stating, is the existence of God self-evident. Here he states that God because he is self-evidentRead MorePerfect Island Objection by Anselm of Canterbury1504 Words   |  7 Pagesthe basis that there exists a fundamental dissimilarity between the concept of existence in our minds, and that of existence in reality. This essay will present two objections to Anselm’s Ontological argument, namely, the ‘Perfect Island Objection’ and the ‘Existence is not a Predicate’ objection, whilst also discussing possible responses to these objections. The Ontological Argument sets out to prove the existence of God, as defined by Anselm as ‘something than which nothing greater can be conceived’Read MoreThe Meditations On First Philosophy By Rene Descartes916 Words   |  4 PagesPhilosophy by Rene Descartes is a thorough analysis about doubt. Descartes describes his method of doubt to determine whether he can truly know something. One of his major arguments is the proof of the existence of God. In this paper, I will attempt to unravel the flaws in Descartes proof that God exists. In the meditations, Descartes evaluates whether or not everything we know is a reality or a dream. Descartes claims that we can only be sure that our beliefs are true when we clearly and distinctively

Wednesday, December 11, 2019

Implementation Risks in Investment Projects †MyAssignmenthelp.com

Question: Discuss about the Implementation Risks in Investment Projects. Answer: Introduction: A project is a temporary endeavor with a definite beginning and end, organized into various activities with the aim of delivering a specified product or achieving a change never experienced before. Project development entails initiation, planning, executing, closing and costing of the intended project. This project involves upgrading the technology used in the parcel post company, such as the use of RFID tags and readers to replace barcodes. This is to enhance the visibility of packages during transit and ensure that they reach their destination without loss or damage (Batkovsky et al., 2016). The project scope is the part of project planning that entails defining and documenting the projects specific goals and objectives, tasks, expenses, deliverables, and the deadline. The main objective of this project is to increase the discernibility of the parcels while in transit for both the client and the parcel post company. This will decrease the chances of losing customer packages, as well as increase the efficiency and effectiveness of the services provided. This will be achieved by the use of Radio-frequency Identification (RFID), which will identify and track tags attached to the containers. In my opinion, active tags should be used since they can operate hundreds of meters away from the RFID reader and use a local power supply such as a battery. Also, there is a need for the development of sensors to be fitted onto the trucks to recognize which containers are loaded. Outsourcing of services is a requirement for the development of software, which will detect which parcel is in which container and in which truck the latter is loaded. These new developments will bring the need for customer training on how to use the software to track their own packages. Before outsourcing the software development services, it is important to find out about the credibility of the outsourcer and ensure that the contract is in written form and signed. The company should involve its lawyer in all these activities to make the agreement binding and the action lawful. The integrity of the Chinese supplier should also be thoroughly assessed before any further actions can be taken. Moreover, the truck drivers should be informed about the RFID tags and strictly warned against tampering with them. It is crucial for me as the asset manager to work very closely with the business analysts, the project manager, and the outsourcer in order to do an excellent job in the instigation, planning, implementation, and closing of the project. The project manager brings together a team and oversees the overall planning and execution by developing schedules, estimating cost and time, analyzing and managing risks, as well as making other essential decisions concerning the project. My responsibilities include managing, maintaining, upgrading, receiving, and dispatching assets from the post, while the business analysts ensure that the final product or solution meets the business needs. He or she is involved in the projects initiation to determine the companys requirements, breaks down those requirements by analyzing the budget and costs involved and presenting these to the stakeholders for approval, document the proposed changes, ensure that all errors made during implementation are documented for future references, and monitor the new system for any hitches. For the project team to work together, it is incredibly important for all the parties to have good communication skills to ensure that everyone clearly understands the business requirements and agrees upon how the projects goals will be met (Gurd, Helliar, 2017). Electrical failures would lead to huge losses; Therefore, the company should curb this by ensuring the availability of a well-functioning generator throughout the system The occurrence of chaos is a possibility if some clients are impatient to receive their products, and thus, may cause a disturbance to the truck drivers during transportation. The first option to be undertaken for this project should be the fitting of RFID tags. This is because through their roles of identification and tracking of the containers, it is possible to distinguish in which truck they are located. Since the trucks have already been fitted with GPS tracking devices, the current location of both the container and the van can, therefore, be located. Also, simply purchasing the FRID tags and fixing them to the containers, in my belief, is cheaper than the development of the intended software. The company should then proceed to outsource the development of software to determine the parcels in each container. As my assumption, these two advancements would make work easier, avoid wastage of time while sorting out the packages, and reduce confusion and mix-up. The final step for the organization to take should be fitting sensors to the trucks to classify which containers each of them contains and the number of containers. The developer should also ensure that the system operates proficiently and without any glitches. It is the project deliverable that classifies the teams work into different manageable segments. This can be done by using the Project Management Body of Knowledge (PMBOK), which is one of the most popular methodologies in project management. In this project, the major deliverables to be achieved are the attachment of RFID tags to the containers, developing sensors and fitting them to the trucks, and the development of software to identify which parcels are contained in each container and which containers are loaded to which truck. An analysis of the Chinese suppliers work should be done to find out if their products are original and effective. The fact that the project is not time-critical offers a sufficient period to carry out a short-time research on this vendor. If the seller is trustworthy, then the next step would be to negotiate the quoted price to keep it within the companys budget. Suppose this is also successful, then the purchase would be made and the RFID tags attached to the containers by professionals who would make sure that the RFID system is operating competently. This would be carried out by an outsourcer, and the sensors would be responsible for detecting the presence or absence of the containers in the courier vans at the depot. The sensors monitors would immediately send a message to my work station whenever there is a change in load or when it has been damaged. Professionals should be hired by the companys management to fix the sensors into the courier vans to ensure the operative transfer of information from the sensors in the future. Being the first time for the company to outsource any services to an external supplier, regulatory measures should be taken into consideration. The organization should also seek information on the reliability of the outsourcer and the fitness of their skills. After identifying the appropriate company or independent contractor to outsource these services to, the project manager should explain to them the exact requirements of the company regarding the software. The outsourcer would be the right individual to integrate the newly developed software into the organizations operations as he or she would have the details about their specific creation that other professionals may find hard to recognize. The business analysts should then carry out a thorough analysis of the software to find out if it meets and will continue to meet the specific business requirements in the future. Their decision would then lead to the implementation of the software into the day-to-day activities of the company. The total cost of the whole process would be equated to the estimated costs (budget) laid out previously by the project manager. The most critical aspect of this project is to ensure that the implemented system is working excellently. This could lead to incurring costs above the set budget; however, the company would consequently cover these costs due to increased client base from increased efficiency and waning of the number of parcels lost in transit. It is also a benefit to the organization that the owners of the 40 trucks will take care of the purchase and the maintenance of devices fitted to them. Risk Breakdown Structure Technical risk External Organizational Project Inappropriate presentation Real-time performance RFID disruption RFID reader collision RFID failure Accidents economic conditions legislation power blackouts political change Theft deceit data loss financial risk Reputational risk Cost management Complications Lack of executive support change in scope resigning Risk Evalution and Analysis Inappropriate presentation: being the very first time the company is outsourcing IT services, it is very likely to hire a vendor with no concrete expertise leading to failure of the project Real-time performance: the software may not function as is expected and may produce untimely results Disruption of active RFID tags is easy via continuous interrogation wearing the battery down RFID reader collision: the fact that the tags will be fitted into all 10 thousand containers means that the probability of readers ramming is very high RFID failure: both the RFID reader and the database that stores information are prone to system letdowns. These risks are unlikely to occur unless the company outsources the IT services to an untrustworthy vendor. Their consequences would, however, cause a lot of losses and lead to the failure of the project. Technical risks are therefore intolerable in this situation as they have negative effects both qualitatively and quantitatively. Accidents: the courier vans may be involved in accidents during transit causing damage or loss of the packages Power blackouts: in that few minutes or seconds before the generator or other power supply is turned on, some data could have been lost or parcels stolen Economic conditions: if the countrys economic situation changes during any stage of the project development, it would lead to an unintended variation in the companys plans Political change: this would negatively or positively affect the operations of the organization, yet it does not have control over this factor Government legislation: if the government changed its terms of regulating parcel post companies, then this project establishment would definitely be affected These are risks that are beyond the control of the corporation and are rare due to the fact that factors such as the economic and political conditions of a country do not change very often. The organization can only accept such changes and adapt them into their operation. Theft: outsourcing of IT services to an untrustworthy outsourcer could lead to loss of some parcels in the future by externally altering the data in the system Data loss: a dishonest vendor can destroy or delete the data contained in the companys system causing losses Deceit: it is possible for the FRID supplier from China to supply fake FRID tags Reputational risk: the organization could lose its good reputation if the outsourced software failed, leading to loss of customers packages Financial risk: outsourcing services to an unknown vendor and accepting supplies from a foreign seller exposes the companys finances to possible loss due to the uncertainty of the outcomes of those actions The occurrence of organizational risks is unlikely in this case because the company had planned for this development earlier on. There occurrence would, however, affect the company qualitatively, for example lack of enough resources would lead to development of a less competent software. They are tolerable as long as the organization puts measures in place to come up with more resources for use. Cost management: this is a challenge as the project manager and the business analysts strive to meet the objectives of the project within the limited budget. This could lead to a huge loss in cash Executive support: lack of sufficient support by the companys senior management would put a lot of pressure on me and the project manager, and this could possibly lead to the projects failure Change in scope: in IT projects, this is a common occurrence no matter how detailed the projects scope. The stakeholders may come up with new suggestions in mid-project which need consideration (Osei-Kyei et al., 2017). Unforeseen complications may arise and cause the team to go behind the schedule Resigning of a key project team member: this causes a rearrangement of the entire team and unavailability of a suitable person could lead to project failure Project risks are also rare in this venture because the management of the company is determined to support it and the key players are excited about it therefore are unlikely to withdraw. The magnitude of this risk would be large and possibly lead to miscarriage of the project but they are tolerable and can be avoided by motivating the project team. Transfer: one reason for outsourcing services to the third party is due to the dissemination of the risk. Failure in the functioning of the developed software would not only be handled by the organization, but by the outsourcer as well. Failure of the system is a huge risk since it can lead to loss of all data or leakage to the public. All possible measures should be undertaken to avoid RFID failure, such as ensuring the tags are attached superbly and the readers are kept in a safe place. However, it may not be possible to avoid system failure, which can occur as a result of unforeseen situations in which case it can be accepted (retention) and the loss dealt with appropriately. External risks refer to the possibility of loss from situations in which an organization has no control over. There is no way for the organization to avoid these risks as their effects are wide ranged, that is, they affect all companies in the region. Retention: the only way to cope with external risks is, therefore, acceptance by the company as quickly as possible so as to solve the problems appropriately and immediately when the situation changes. Avoidance: these risks can be mostly avoided by being absolutely sure that the required services are outsourced from a known and trustworthy vendor (Olson, Wu, 2017). Reduction: the effects of these risks, for instance, financial risks can be decreased by making smart money decisions and budgeting for the upgrading appropriately Conclusion It is obvious that improved technology in the parcel post company would increase the rate at which work is done, and thus, the customer base as well. Development of software to discern the parcels in each container and the vessels in each truck is not an easy task, as observed. The company engages in outsourcing of these IT services, which could be very risky as company lacks any previous experience in outsourcing. Ensuring the credibility of the outsourcer and the RFID supplier is critical for success of this project development. In my opinion as the asset manager, this project is worth implementing as long as there is good risk management schemes put in place to mitigate or avoid risks that arise during the process. References Cole, S., Gin, X., Vickery, J. (2017). How does risk management influence production decisions? Evidence from a field experiment.The Review of Financial Studies,30(6), 1935-1970. Gurd, B., Helliar, C. (2017). Looking for leaders: Balancing innovation, risk and management control systems.The British Accounting Review,49 (1), 91-102. Osei-Kyei, R., Osei-Kyei, R., Chan, A. P., Chan, A. P. (2017). Perceptions of stakeholders on the critical success factors for operational management of public-private partnership projects.Facilities,35 (1/2), 21-38. Olson, D. L., Wu, D. D. (2017). Enterprise Risk Management in Projects. InEnterprise Risk Management Models(pp. 161-173). Springer Berlin Heidelberg. Batkovsky, A. M., Batkovsky, M. A., Klochkov, V. V. (2016). Implementation Risks in Investment Projects on Boosting High-Tech Business Production Capacity: Analysis and Management.Journal of Applied Economic Sciences. Romania: European Research Centre of Managerial Studies in Business Administration,11 (6), 44.

Wednesday, December 4, 2019

Julius Caesar Powers Corruption Essay Example For Students

Julius Caesar: Powers Corruption Essay Brutus, Cassius, Caesar, and the other Senators held the power to do things others could not. With this authority came their ability to use poor judgement. In William Shakespeares tragic play Julius Caesar the theme Power Corrupts is arrayed thoroughly. Murder, treason, and ethical/moral corruption were three prevalent themes that proved the overall topic of Power Corrupts. In Julius Caesar corruption led to dangerous outcomes, such as death. Et tu, Brute? Then fall Caesar! (Shakespeare 3.1.77). The last words of noble Caesar could be heard, as Brutus, the last of the conspirators, took a plunge at Caesar with his knife. Caesar laying there on the senate floor, illustrated the murderous intentions of the senators. Liberty! Freedom! Tyranny is dead!/Run hence, proclaim, cry it about the streets (Shakespeare 3.1. 78-79). The sounds of the pompous conspirators could be heard about the streets. Caesar was dead and they were proud of it. Would this have taken place if the conspirators were not of high rank, such as senators? Probably not. Simple townspeople did not have the power, and could not even bare to think of murdering someone as noble as Caesar. Cassius and the other Senators had the power to, and did commit murder. Brutus though, did not think of it as murder. People and senators, be affrighted./ Fly not; standstill ambitions debt has been paid (Sha kespeare 3.1.82-83). Brutus announces this so he could convince the people as well as himself that what he had done was not murder, but justice for Rome. Brutus had pure intentions and whether the other senators did or not does not make a difference. Power was abused, murder was committed, and corruption had taken place. There were many forms of corruption caused by power in this play, one of which was treason. If even a single whisper of assassinating someone with a high rank was heard, you were thrown in jail. An example of this would be when Cassius and the other conspirators discussed their plan to kill Caesar and Mark Antony:Decius, well urged. I think it is not meet,Mark Antony, so well beloved of Caesar,Should outlive Caesar: we shall find of himA shrewd contriver; and you know, his means,If he improve them, may well stretch so farAs to annoy us all; which to prevent,Let Antony and Caesar fall together. (Shakespeare 2.1.155-161)In this situation Cassius had a conversation about killing Mark Antony as well as Caesar. This was a form of Treason. Cassius would never have said such things if he did not have the power to. Being a senator he felt he had the right to decide what was good for Rome. He not only said this for Rome, but for himself as well. If Caesar had become King, he would have been a ble to get ride of Cassius. This thought did not please Cassius. Casca, you are the first to that rears your hand (Shakespeare 3.1.30). This was another point in the story where treason was committed. It took place in the Senate House, as Caesar approached. Cassius and the other senators discussed how Casca would attack Caesar first. Ethical/moral corruption was a trait mainly held by Brutus. In the play Julius Caesar, an example of this would be:Thats all I seek;And am moreover suit or that I mayProduce his body to the market-place,And in the pulpit, as becomes a friend,Speak in the order of his funeral. (Shakespeare 3.1. 22 -229)In this quote Brutus allowed Mark Antony to speak to the people at Caesars funeral. Cassius objected to this proposal. Brutus ignored his warnings and demanded that Antony was allowed to speak. Brutus does this because he had the power to make decisions. The other senators did not disagree with him. He was the most respected and honourable senator. They needed Brutus support, so they didnt want to agitate him. Another instance of Brutus having poor judgement was, You say you are a better solider:/Let it appear so; make your vaunting true,/And it shall please me well. For mine own part,/I shall be glad to learn of noble men (Shakespeare 4.3.51-54). In this quote Brutus argued with Cassiu s about sending their troops to Philippi. Brutus felt they should send the troops because they had the larger army. Cassius felt this was a bad idea. Even though Cassius had the better judgement, and more experience as a soldier, Brutus seemed to ignore him. Cassius felt that Brutus had made a bad decision, but said no more about it and agreed with him. In the end Brutus did lead the troops to Phillippi. He held the power to make final decisions, because the senators needed his honourable reputation. Brutus poor judgement led the army to their death. Poor judgement may have seemed as a harmless form of corruption, but the consequences were not so. .uc4269aafce70b60a631b9c1be20949ff , .uc4269aafce70b60a631b9c1be20949ff .postImageUrl , .uc4269aafce70b60a631b9c1be20949ff .centered-text-area { min-height: 80px; position: relative; } .uc4269aafce70b60a631b9c1be20949ff , .uc4269aafce70b60a631b9c1be20949ff:hover , .uc4269aafce70b60a631b9c1be20949ff:visited , .uc4269aafce70b60a631b9c1be20949ff:active { border:0!important; } .uc4269aafce70b60a631b9c1be20949ff .clearfix:after { content: ""; display: table; clear: both; } .uc4269aafce70b60a631b9c1be20949ff { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uc4269aafce70b60a631b9c1be20949ff:active , .uc4269aafce70b60a631b9c1be20949ff:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uc4269aafce70b60a631b9c1be20949ff .centered-text-area { width: 100%; position: relative ; } .uc4269aafce70b60a631b9c1be20949ff .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uc4269aafce70b60a631b9c1be20949ff .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uc4269aafce70b60a631b9c1be20949ff .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uc4269aafce70b60a631b9c1be20949ff:hover .ctaButton { background-color: #34495E!important; } .uc4269aafce70b60a631b9c1be20949ff .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uc4269aafce70b60a631b9c1be20949ff .uc4269aafce70b60a631b9c1be20949ff-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uc4269aafce70b60a631b9c1be20949ff:after { content: ""; display: block; clear: both; } READ: Pearl Harbor - Brief Look EssayPower and corruption seemed to go hand in hand in the play Julius Caesar. When authority was held, poor judgement wasnt far to follow. The murder of Caesar was very tragic, and held its outcome to treason. Poor decisions by people was corruption as well, when it abused power. Ethical/moral corruption had disastrous outcomes also. The result of any type of corruption was anything but pretty. Whether it be murder, treason, or ethical/moral corruption, power truly does corrupt. Works CitedShakepare, William. Julius Ceasar. Great Britian: Stanely Thornes (Publishers) Ltd. 1990