Mysteries of the Trojans

In: Social Issues

Submitted By Livewithangels
Words 1390
Pages 6
Week 4 Assignment 1: Mysteries of the Trojans

Alicia Robinson
HUM 110 – World Cultures I
Strayer University

Dr. Bull

October 31, 2013

Mysteries of the Trojans In the following paper, I will attempt to explain the mysteries surrounding the lost city of Troy, the Trojan soldiers, the Trojan War and the famous story about the Trojan horse. This paper will show why I believe that sometimes myths may not be merely myths at all, but may actually have more validity to them than one may think. These so called myths should not be so easily dismissed and I will try to explain why I truly believe this.

The mysteries concerning these stories are the basis of the Homeric tales, the Odysseus, and the Iliad, written by a man whom history calls Homer, but no one is even sure if this was his name or maybe even his profession. There are many theories surrounding this alone. Many claim that he was a blind man and may be a descendent of singer, story tellers. Before Homer, epic stories were memorized and then sung. These were in fact true accounts of history, not like songs that are sung today. The Homeric stories are some of the oldest written stories of all time, (dating back to around 800 B.C.E.). The Trojan War is believed, (by scholars), to have taken place between 1800 and 1300 B.C.E., but the first written accounts were not written until, some five centuries later, after the Greeks adopted the Phoenician writing system. Stories, until then, had been handed down by word of mouth. The Homeric tales are tales of love, of soldiers, of vengeance, of war, of interplay of the Divine and the mundane, of human behavior, of interplay between the Divine and the mundane, of heroes, and of the ultimate deceit. Although, scholars of today have many reservations concerning these stories, one thing is clear and that is that the ancient world regarded these stories as…...

Similar Documents

Mystery of the Pyramids

...Mystery of the Pyramids Week 4, Assignment 1 Hum111 Professor Nancy Barlar 3 November 2013 Mystery of the Pyramids There have been many theories regarding how the pyramids at Giza and how they were constructed. Most experts agree that they were constructed as burial monuments for pharaohs, but “how” these ancient people constructed monuments of such great size without modern machinery is a mystery which is still being debated. In the next few paragraphs I will be taking you into a look into the mystery that surrounds this highly debated subject. The Aztecs, Mayans, and ancient Egyptians were three very different civilizations with a span of almost the other side of the world away from each other, but with very large similarities to the way that they built the pyramids. However, out of these three ancient cultures, the Egyptians stand out as the people recognized for the classic pyramid design. Massive monuments with a square base and four smooth-sided triangular sides, raising to a point. The Aztecs and Mayans built their pyramids with tiered steps and a flat top. The Egyptians probably chose the distinctive form of the design for their pharaohs’ tombs because of their solar religion, for the ever associated sun god Ra, which is considered the father of all pharaohs and was said to have created himself from a pyramid=shaped mound of earth before creating all other gods. The pyramid’s shape and standing (location) is thought to have symbolized the sun’s......

Words: 1021 - Pages: 5

The Mystery Pavilion

...The mystery pavilion The mystery pavilion, which is now located at Tandi Park in Shulin District,was registered as a historic building in April 2002. Earlier,the city government had just fininshed the restoration project in 2010. Residents are also encouraged to visit this precious cultural heritage. The set up of the civil mystery pavilions was originally used to revere the Chinese inventer-Cangjie.People later developed the meaning into a form--- something religious like paper made to resemble money and burned as an offering to the dead. In ancient times,people set the pavilions near the city walls,schools,and streets,they collected the paper in the furnace and burnt it into dust,and then called it “the mystery”. After a while,they then spread the dust,which was called “send the mystery”. All the series of motions were used to pray for better academic performance or fame like a social stand. If you want to take a stroll in the evening,there is lighting equipment around the pavilion; also, it provides five languages of audio tour service which allow the public more easily to get to know the historic value and the backgrounds of the heritage. Besides, there’s a “painted mandarin jacket ” in the pavilion ,people can write down their wishes in the cards and hang them on the jacket. All in all, the pavilion is a combination of cultural heritage as well as the art of architecture. Next time when you come to Shulin, don’t forget there’s a 138 years heritage waiting for you to...

Words: 264 - Pages: 2

Mystery Shopper

...fourth ring & answered in a usual tone by a woman. The tone was neither inviting nor indifferent. She asked specific details about reservation like date, time & no. of people. The overall reservation experience was average. The restaurant is easy to locate because of the logo board on the main street. It has a clean exterior & the parking lot is average in size & is shared with the marketplace. It does not have a valet service. Overall this category was good & had no scope of improvement because of exterior space constraint. Overall experience in terms of customer service was very good. The waitress was polite, courteous & explained the specials very well. We were well attended all the time with some delay in delivery. [ ] Mystery Shopping Report:...

Words: 792 - Pages: 4

The Trojan War

...Trojan War In Greek mythology, the Trojan War was waged against the city of Troy by the Achaeans (Greeks) after Paris of Troy took Helen from her husband Menelaus king of Sparta. The war is one of the most important events in Greek mythology and has been narrated through many works of Greek literature, most notably through Homer's Iliad. The Iliad relates a part of the last year of the siege of Troy; its sequel, the Odyssey describes Odysseus's journey home. Other parts of the war are described in a cycle of epic poems, which have survived through fragments. Episodes from the war provided material for Greek tragedy and other works of Greek literature, and for Roman poets including Virgil and Ovid. The war originated from a quarrel between the goddesses Athena, Hera, and Aphrodite, after Eris, the goddess of strife and discord, gave them a golden apple, sometimes known as the Apple of Discord, marked "for the fairest". Zeus sent the goddesses to Paris, who judged that Aphrodite, as the "fairest", should receive the apple. In exchange, Aphrodite made Helen, the most beautiful of all women and wife of Menelaus, fall in love with Paris, who took her to Troy. Agamemnon, king of Mycenae and the brother of Helen's husband Menelaus, led an expedition of Achaean troops to Troy and besieged the city for ten years because of Paris' insult. After the deaths of many heroes, including the Achaeans Achilles and Ajax, and the Trojans Hector and Paris, the city fell to the ruse of the......

Words: 529 - Pages: 3

Mystery Shopping

...I arrived home to find a message from Judy of the mystery shopper service I had applied to a couple months ago. "We have a mystery shopping assignment in your area and we would like you to participate". My first thought was hey this is cool -- I'll get some free merchandise and get paid for just shopping The first thing I discovered is that these people are always in a hurry. They wanted to get the paperwork to me, have me sign and return a confidentiality agreement do the shopping, fill out the paper work and have it back to them in less than a week. Next I found that I wouldn't be getting any free merchandise with this assignment. I was to go shopping for tires and get estimates then return my findings to the research firm. They told me I would be paid $20 for each location and they had three locations in my area. That didn't sound too bad. I'd be paid $60 for visiting three tire stores. I then found out that what was described as "my area" was a little farther than I would have defined. The first one was a 20 minute drive the second one a 45 minute drive and the third one was an hour and a half away. I told the representative that the third one was too far for me. She pleaded a while and then finally offered to pay me an extra $20 to do it. I'm a nice guy so I reluctantly agreed. All went smoothly and I earned my cool $80 for the assignment. Let's see how much I made per hour. I had about five hours of driving time, one hour dealing with the sales people (20......

Words: 407 - Pages: 2

Worms and Trojan Horses

...attachment LOVE-LETTER-FOR-YOU.TXT.VBS automatically set the Microsoft Internet Explorer start page to a URL at a web server in the Philippines, which would download WIN-BUGSFIX.EXE to the victim's machine. The worm then set the victim's machine to run WIN-BUGSFIX.EXE the next time the victim's machine was booted. WIN-BUGSFIX.EXE was a Trojan Horse program that collected usernames and passwords from the victim's hard drive and e-mailed them to an address in the Philippines, mailme@super.net.ph. (That was a really stupid feature, since law enforcement agents, within 12 hours of the initial release of the worm, identified the person who owned that e-mail address.) Furthermore, there was a copyright notice in the Trojan Horse's code! An Internet Service Provider in Europe alerted the web server in the Philippines at 08:30 GMT on Thursday, 4 May 2000, and WIN-BUGSFIX.EXE was removed from the website, which prevented most of the harm in Europe and the USA from this password-collecting program. Later, the web server in the Philippines was overwhelmed (i.e., a kind of a denial of service attack) with requests from the worm for WIN-BUGSFIX.EXE. This Trojan Horse program had been previously submitted as a thesis proposal at a computer college in the Philippines. The proposal was rejected with handwritten comments "This is illegal." and "We don't produce burglars." The student then dropped out of the college without earning a degree. A copy of the student's rejected thesis......

Words: 1046 - Pages: 5

Trojan War

...Trojan War Trojan War, in Greek legend, famous war waged by the Greeks against the city of Troy. The tradition is believed to reflect a real war between the Greeks of the late Mycenaean period and the inhabitants of the Troad, or Troas, in Anatolia, part of present-day Turkey. Modern archaeological excavations have shown that Troy was destroyed by fire sometime between 1230 bc and 1180 bc, and that the war may have resulted from the desire either to plunder the wealthy city or to put an end to Troy's commercial control of the Dardanelles. Legendary accounts of the war traced its origin to a golden apple, inscribed “for the fairest” and thrown by Eris, goddess of discord, among the heavenly guests at the wedding of Peleus, the ruler of Myrmidons, and Thetis, one of the Nereids. The award of the apple to Aphrodite, goddess of love, by Paris, son of King Priam of Troy, secured for Paris the favor of the goddess and the love of the beautiful Helen of Troy, wife of Menelaus, the king of Sparta. Helen went with Paris to Troy, and an expedition to avenge the injury to Menelaus was placed under the command of Agamemnon, king of Mycenae. Agamemnon's force included many famous Greek heroes, the most noted of whom were Achilles, Patroclus, the two Ajaxes, Teucer, Nestor, Odysseus, and Diomedes. After the Trojans refused to restore Helen to Menelaus, the Greek warriors assembled at the Bay of Aulis and proceeded to Troy in 1000 ships. The siege lasted ten years, the first nine......

Words: 627 - Pages: 3

Mystery

...Introduction Mystery is defined as something that is a secret, something where there is no clear explanation, something difficult to understand or explain or something unexplainable or unsolvable. Some of the example of mysteries are the location of your Christmas presents,  whether there is proof that God exists., how exactly people came to be., a situation where it is unclear who committed a crime. And so on. In the content will explain the importance of mystery, how to write good mystery story and Crisp Information about the content: The following paragraph contains information about how to write a good mystery stories: Write out the plot of the story. If you have more than one plot at first, don't worry about it. Choose one like the best and go with it and put the others aside for later. Include a red herring. This is when you make it appear that one of your suspects is the criminal when it was actually somebody else. You must also make your readers believe it was the red herring who did it, until it has been made clear who the real criminal was. (Note: Many people think a red herring is a misleading clue. This might not be right.). Secret codes and languages can provide an interesting addition to your tale, especially if you develop a special language for some of the characters. Think of some good main characters. You don't need a lot of characters--sometimes just two or three works well. Try to develop distinct personalities. Write the first draft and it is just to......

Words: 651 - Pages: 3

Trojan Virus

...Trojan horse viruses got their name from the siege of Troy, when the Greeks placed a large wooden horse outside the gates of Troy. The Trojans assumed it was a peace offering from the Greeks, and moved the horse inside the gates. The wooden horse was of course filled with hidden warriors, and once inside the gates, they broke out of the horse, and demolished the Trojans. Trojan horse programs work the same way. Trojan horses can destroy files and data, but commonly contain spyware, and even backdoor programs. Trojans are usually contained in software downloads from unknown or untrusted sources. Some people don't consider a trojan horse to be a virus, because it does not reproduce itself as a virus does, however it's ability to destroy files and install programs without the user knowing do indeed make it a virus. When a trojan horse is being used as spyware, it monitors your computer activities, and may even record keystrokes. This information is then sent to a third party, without you being aware of it. It may also cause pop up ads to display on your computer. The real danger is that information such as passwords and credit card and banking information can be delivered to that unknown third party, opening you up for identity theft. When the trojan horse installs a backdoor program, it sends information to the third party, making it possible for hackers to get into your system, via the backdoor, and to use the system just as if it were their own. They will often do...

Words: 573 - Pages: 3

Trojan Stockpiles Case

...Catherine Butler Trojan Stockpiles Case June 1, 2015 Trojan Industries Inc. Trojan Industries Inc. (Trojan), a publicly traded company in the United States and producer of metal products, has just changed the way that they account for share repurchases. The issue at hand is whether this accounting change represents a correction of an error or a change in accounting principle. In addition, if Trojan were required to issue financial statements in conformity with IFRSs, would Trojan’s accounting for its share retirements be impacted? By definition, ASC 250-10-20 defines an error as “mistakes in the application of generally accepted accounting principles” and “a change from an accounting principle that is not generally accepted to one that is generally accepted.” Per ASC 505-30-30-8, when a corporation’s stock is retired, or repurchased for constructive retirement, the corporation has two options of allocating the excess of repurchase price over par or stated value. This excess may be allocated between additional paid-in capital and retained earnings or charged entirely to retained earnings. Trojan began accounting for its share retirements by recognizing the excess of the purchase price over the par value of the retired shares as a reduction of additional paid-in capital. In March 20X2, they concluded that instead of accounting for it by reducing APIC, they would allocate it across both APIC and retained earnings. Since the first method Trojan used was not accepted per......

Words: 413 - Pages: 2

The Mysteries of Miscarriage

...THE MYSTERIES OF MISCARRIAGE The first thing women ask themselves after they’ve had a miscarriage is “what did I do wrong?” Clinical studies show that there are many causes and effects that result in miscarriage. Miscarriage is very common and there is not usually much you can do to prevent it. In my opinion, if women had more knowledge on the controllable causes of miscarriage, the uncontrollable causes of miscarriage, and the likelihood of it happening again, it would help them cope with grief and depression after experiencing miscarriage. Knowledge of controllable causes is important when preparing for a healthy pregnancy. There are many things within a woman’s control and can easily be avoided. Common controllable risk factors include obesity, previous fertility treatments, the woman’s age over 35, an active infection in pregnancy, smoking during pregnancy, consuming alcohol on a daily basis, cocaine or amphetamine use during pregnancy, and malnutrition or severe anorexia (Young and Zavatto, 2008). Stressful life events and working night shift have been shown to be environmental factors that may induce miscarriage. Sleeping less than 8 hours a day and standing for more than 3 hours a day are also shown to be controllable risk factors in miscarriage (Samaraweera and Abeysena, 2010). Exposure to various teratogenic agents such as high dose radiation, chemical, second hand smoke, and moderate to heave caffeine consumption can cause vascular compromise and embryonic......

Words: 1509 - Pages: 7

Trojan Horse

...The Trojan Horse Race Bruce Schneier Communications of the ACM September 1999 1999 is a pivotal year for malicious software ( malware) such as viruses, worms, and Trojan horses. Although the problem is not new, Internet growth and weak system security have evidently increased the risks. Viruses and worms survive by moving from computer to computer. Prior to the Internet, computers (and viruses!) communicated relatively slowly, mostly through floppy disks and bulletin boards. Antivirus programs were initially fairly effective at blocking known types of malware entering personal computers, especially when there were only a handful of viruses. But now there are over 10,000 virus types; with e-mail and Internet connectivity, the opportunities and speed of propagation have increased dramatically. Things have changed, as in the Melissa virus, the Worm.ExploreZip worm, and their inevitable variants, which arrive via e-mail and use e-mail software features to replicate themselves across the network. They mail themselves to people known to the infected host, enticing the recipients to open or run them. They propagate almost instantaneously. Antiviral software cannot possibly keep up. And e-mail is everywhere. It runs over Internet connections that block everything else. It tunnels through firewalls. Everyone uses it. Melissa uses features in Microsoft Word (with variants using Excel) to automatically e-mail itself to others, and Melissa and Worm.ExploreZip make use of the...

Words: 858 - Pages: 4

The Mystery of the Anasazi

...Mystery of the Anasazi Who were the Anasazi? Why did they live on the side of cliff faces? Where did they go? And what drove them to leave? These are the questions asked on “Mystery of the Anasazi” by the history channel. I will answer these questions as best as they can be answered with the information that is available to us today, as the Anasazi left absolutely no written documents other than some drawings on their cliff faces. Discovered in the late 19th century, the Anasazi lived in what we now know as the “Four corners” of Utah, Colorado, Arizona, New Mexico, and surrounding areas and believed to have been in this area from as early as 1 A.D. until around 1150 A.D... Approximately 40-50 thousand people lived in this area. They grew corn, squash, and beans. At the center of this large area lies the great city of Chaco. Over 1,000 people were believed to have lived inside the city walls in the greatest prehistoric apartment complex. Crops did not grow well in this area so to feed the people smaller villages would travel many miles to trade crops for Turquoise, or shell jewelry, pottery, and other small prizes. These items were believed to have Godly powers to help their crop grow or to make it rain. They were very highly regarded and desired throughout the Anasazi Territory. The Anasazi lived like this in peace for hundreds of years to just one day vanish from the cities and smaller surrounding Kivas. The cities are carved from the rock of the canyons on the......

Words: 752 - Pages: 4

Mystery Organism

...The mystery organism was inserted onto the petri dish on February 10, 2015 and took approximately 2 months to development and become visible without the use of a microscope. In the first observation, striations were visible on the brown, rounded seed/spore like organism under 10x magnification. In the second observation, green pigments were visible on the organism and clear, root/hair like structures were visible under 10x magnification. The spores have germinated and has begun to develop into a young gametophytes. After water was inserted onto the petri dish, tiny particles appeared to be “swimming”. These particles are sperm, indicating that water was needed to facilitate the fertilization of the eggs. This indicates that the organism could be part of either the Bryophyta or the Pterophyta division. The root like structures, rhizomes, which indicates that this organism has vascular tissue, were sticking out of the gametophytes. All these characteristics correspond to plants in the Pterophyta and Bryophyta division. In the thirds observation, heart shaped gametophytes are visible, verifying the conclusion that this organism is a fern, which is part of the Pterophyta division. The fern gametophyte has circular and the occasional heart shaped leaf. This is a clear indication that this gametophyte is a fern, since the moss gametophyte has long, skinny leaves. Under 10x magnification, scale like cells are visible on the gametophytes. Under the microscope, multiple leaves are......

Words: 371 - Pages: 2

The Death of a Trojan

...Aeneas: The Death of a Trojan Throughout The Aeneid, Aeneas embarks on a series of journeys, both within himself and with his men as an army. Aeneas, one of few remaining survivors of Troy, transitions from a Trojan character to a Roman character throughout the text. This transformation marks the end of a state wracked so severely by tragedy, the land was found in ruins and the population destroyed to near genocide. Aeneas' transition from Trojan to Roman was long and onerous both on a personal level, and on a higher level which led to a greater outcome - the founding of Rome and with that the example of the ideal Roman citizen. There in lies the problem: Aeneas was not a Roman citizen, he was a Trojan, and by adhering to fate and the will of the gods, he lost his identity. Though the city of Troy had been destroyed, the Trojan mindset still lived within Aeneas. As Troy burned and disintegrated before him, Aeneas was told not to stay and fight to the death as he had intended but was instead given a task. There was something much greater for him to do. The ghost of his dead wife shares with him, “A long exile is your fate... the vast plains of the sea are yours to plow until you reach Hesperian land, where Lydian Tiber flows with its smooth march through rich and loamy fields, a land of hardy people. There great joy and a kingdom are yours to claim.” (Virgil 2:966-972) Still not completely convinced, Aeneas reaches out for his wife three times, hesitating to leave his......

Words: 1408 - Pages: 6

Complete list of new home theater photos | cretsiz hosting servisi... | BDRipVF Whisper 2