Tuesday, January 28, 2020
Viruses And Antivirus Computer Science Essay
Viruses And Antivirus Computer Science Essay In this report, you will find the important things that needed about viruses and antivirus. It covers the different type of viruses. For instance, file viruses and Macro virus. These can affect any organization data. Furthermore, it covered the history of viruses, how do viruses spread? and latest viruses prevalent in the world . The computers network has become very wide interconnecting to any part in the global. Therefore, any networks connected to the Internet and without any security infrastructure becomes vulnerable to any attack from people who attempt to damage them by sending viruses. Computer Virus is small software programs that can infect or attack a computer and networks by making copies of itself or by executing , replicate itself without knowledge .It is called Computer Virus because it shares some of the features of biological viruses .The dangers of this virus that it can be modification or deletion data and attach itself by using software, documents and files to access in your computer. It creates a lot of problems: The Creeper virus was first detected on ARPANET, the forerunner of the Internet in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971. Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper. A program called Rother J was the first computer virus to appear in the wild à ¿Ã ½ that is, outside the single computer or lab where it was created.[citation needed] Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk.[6] This virus was created as a practical joke when Richard Skrenta was still in high school. It was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displa ying a short poem beginning Elk Cloner: The program with a personality. http://en.wikipedia.org/wiki/Computer_virus#History The first computer virus called Brain which created by two brothers who were running a computer store in Pakistan in 1986. They weaned a program that could spread form PC to another. Brain was harm less because it doesnt delete the files in the computer and move on . In addition it is too easy to be discovered by the infected users by noticing the changed volume label .After Brain, there were many other viruses developed such as Cascade, Alameda , Jerusalem and Lehigh . These viruses were more dangerous than Brain because they were able to infect .COM and .EXE files while Brain can infect the boot sector .In 1992, the first virus came to infect documents and spreadsheets throughout Microsoft Office which is called Macro virus . The Macro is a group of user commands that can be stored and run to gather . It can infect Microsoft Word or Excel on a PC and also spread to another operation system such as Macintosh. It can be also repetitive tasks within one application, and it is very spe eded to share documents between users . When the internet became more people used this is a technology and also became more advanced but unfortunately , it is also helping these viruses to spread more and infect more users are used the internet through the emails such as Melisse virus . The Melisse virus is one of the document viruses that forward itself by emails. It is used the Outlook program to send an e-mail attachment such as Microsoft Word document to anyone . After that lots of viruses are spreading through emails in the world such as Love Bug , Love Letter, I Love You à ¿Ã ½etc. 3.0. Type of viruses: Recently, most of the viruses are increased through the internet. People who create them, they may attached viruses to email and distribute them everywhere. There are more than one virus that can replicate itself and destroy data or computer. They are different in shape and functionality. Below are the type of virus: Boot Virus: This type of virus can infect floppy disk. Also, it infect boot records or master boot records in computer hard disks. Examples of boot viruses include: Disk Killer and Stone virus. Program viruses: These kind of viruses infect executable program files running in the computer such extensions like (.BIN , .COM , .EXE and .SYS) files. Example of program viruses: Sunday and Cascade. FAT Virus: This virus attack section of the hard disc where essential files are stored and it can be deleting files system. Parasitic Viruses or File viruses: When you first run a program infected with a Parasitic virus, the virus is started first. The computer operating system sees the virus as part of the program you running and gives the virus the same right as the program. This right let the virus to copy itself. Macro virus: This virus attack Microsoft Word documents. It is easily increase for any PC just by email. Example of macro viruses: Relax, Melissa.A and Bablas. Worm: it is a program similar to a virus. It is able to replicate itself and deployed across the computer network. Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson. 4.0 How Do Viruses Spread? Computer viruses are programs that must be triggered or somehow executed before they can infect your computer system and spread to others. Examples include opening a document infected with a macro virus, booting with a diskette infected with a boot sector virus, or double-clicking on an infected program file. Viruses can then be spread by sharing infected files on a diskette, network drive, or other media, by exchanging infected files over the Internet via e-mail attachments, or by downloading questionable files from the Internet. http://www.hawaii.edu/itsdocs/gen/virus/#Spread 5.0 Latest viruses : 6.0 Anti-virus software Anti-virus Software is a program installed onto your computer. It helps protect your computer from viruses and also can scan, detect and remove the viruses. It is supported by firewall software (which protects against hackers and some viruses) and can do several functions to protect your computer from viruses such as à ¿Ã ½ It protects against Viruses ,Spyware , Trojan horses and Warms. à ¿Ã ½ It protects against web based attacks and latest threats. à ¿Ã ½ It helps secure and monitory your network. à ¿Ã ½ It prevents others from taking control of your computer and using it to attack other computers . à ¿Ã ½ And there are other functions à ¿Ã ½etc . 7.0 Best antivirus prevalent in the world McAfee Antivirus . ESET NOD32 Antivirus . Norton 360 . Avira Antivirus . Kaspersky Internet Security . AVG Antivirus . Trend micro Antivirus . Note : You can see the classification of the ten best anti-virus programs in 2009 by http://anti-virus-software-review.toptenreviews.com/ 8.0 Prevention of virus infection 1- Check all the disks( CDs,HDD,Floppyà ¿Ã ½etc) that were used in other PCs before using them. 2- Non-implementation of any program is taken from public networks such as the Internet before the examination. 3- The use of original software, or licensed. 4- Use a password to prevent hackers to access in your PC or copy important data . 5- To keep multiple backup copies of all your files before installing any new programs. 6- Processing computer with an anti-virus and always updated to ensure that detect new viruses. 7- Always updated operating system and support it by the windows defender . 8- Do not open any Email does not know the sender . 9.0 Literature Review There are a lot of researchers have written about computer virus and antivirus : 1- Ferbrache, David. Pathology of Computer Viruses. Germany: Springer-Verlag, 1992.Fites, Philip, Peter Johnston, and Martin Kratz. The Computer Virus Crisis. New York: Van Nostrand Reinhold 1992. http://www.answers.com/topic/computer-virus 2- See F. B. Cohen, A Short Course on Computer Viruses (2d ed. 1994); G. Smith, The Virus Creation Labs: A Journey into the Underground (1994); W. T. Polk et al., Anti-Virus Tools and Techniques for Computer Systems (1995); M. A. Ludwig. The Giant Black Book of Computer Viruses (2d ed. 1998); P. E. Fites, P. Johnston, and M. P. J. Kratz, The Computer Virus Crisis (1999). http://www.answers.com/topic/computer-virus 3- Naming and Classifying Computer Viruses in 1996 by David B. Hull, Ph.D. http://home.earthlink.net/~colobus/vclassif.htm 4- Open Problems in Computer Virus Research Steve R. White IBM Thomas J. Watson Research Center Yorktown Heights, NY USA Presented at Virus Bulletin Conference, Munich, Germany, October 1998 http://www.research.ibm.com/antivirus/SciPapers/White/Problems/Problems.html 5- A history of computer viruses à ¿Ã ½ Introduction Harold Joseph Highland FICS, FACM, Editor-in-Chief Emeritus Available online 10 June 1998. http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6V8G-3SX269W-2P_user=10_rdoc=1_fmt=_orig=search_sort=d_docanchor=view=c_searchStrId=1130622556_rerunOrigin=google_acct=C000050221_version=1_urlVersion=0_userid=10md5=21efd2423b0eb4ebd32af5040db0252e 10.0 Methodology 10.1 The questionnaire: The questionnaire for this survey was making to find out about virus and antivirus . Usually it is distributed among the large number of people to know to find out the result and their attitude on the virus and antivirus . There were 13 questions were printed and distributed for people to know what they think about virus and antivirus . 10.2 Finding: This questionnaire contains a series of questions about the virus and antivirus .I asked public of people and taking their views on this subject. So, I found the following results: 1- Do you have any idea about Computer Virus? All the public of people knew very well what is the computer virus? Around 100% have the idea about computer virus. 2- Is your PC infected by virus ? Most of the people their computers infected by the virus . 3- Do you make backup copies of your files ? The majority of the people are doing backup copies between monthly and other days .Furthermore, there is less of people doing backup copies through daily or never doing . 4- Which is antivirus do you use ? Around 33.37% of the people are using McAfee antivirus and the same percentage using another antivirus .In addition,26.65 % their using Kaspersk Internet Security and 6.61% using ESET NOD32 . 5- Do you buy the original anti-virus? Around 80% of the people are buying the original copy of antivirus and unfortunately , percentage of the remaining people are buying non-licensed versions. 6- How often do you update your anti-virus ? There are high percentages in terms of update antivirus between daily and weekly. On other hands , around 20% of people are updated antivirus . 7- Do you perform virus scan for the CD or Flash disc before you use it? Most people perform virus scan for the CD or Flash disc before use it in computers and About 13% of people ignore virus scan for the CD or Flash disc . 8- Do you use the Internet service daily ? There is a large percentage of people use the Internet service on a daily and depend on it. 9- Are you protecting your files by using a password ? 54% protecting files by using a password and less percentage not protecting files . 10- Do you get any virus while you read any Email? 53% of people infected through the virus while read Email . 11- Would you like to create viruses? Most people do not tend to create viruses and less than 27% of people tend to create viruses . 12- Do you think that antivirus companies create computer viruses? It was found that 73% of the people think antivirus companies are created computer viruses because get to a lot of money through buy antivirus and using it to protect their files from a virus . 13- Would you like to use more than one anti-virus in your PC? It was found that 93% of the people do not want to use more than one antivirus in the same PC because make delay for performance PC and reduce of speed . 11.0 Conclusions This report discussed about Virus an Antivirus . I gathered information through Internet ,some books and my colleagues. According to the survey, I Found that the viruses grow and spread very quickly, but peoples awareness and knowledge of the risk of viruses make them eager to stop the spread of viruses through using antivirus software and making backup copies of the files .Furthermore, Using security programs such as firewall or windows defiance are helping to protect your computer from viruses . In addition, this report covered the types of viruses and dangerous on the PC. Every day more and more viruses, but in the end is getting rid of them. 12.0 Recommendations I recommend all to use antivirus software and make updating on the daily through an internet. Moreover, do not open any Email does not know the sender and perform virus scan for CD or Flash memory before use it in your computer. And also to be safe, use the original copy of your software. 13.0 Bibliography
Monday, January 20, 2020
Audience engagement in King Oedipus Essay -- essays research papers
Sophocles, writing King Oedipus faced an unusual problem. He needed to find ways to engage an audience that has pre-knowledge of the plot and characters. He successfully does this to a high degree by using several techniques such as, irony, climax and anti-climaxes, plot and character twists, lack of resolution and foreshadowing. The most effective feature utilized by Sophocles is irony because it builds tension, keeps the audience alert and has the effect of black comedy. The most common kind of irony is spoken irony which occurs in most dialogues. Oedipus bans himself in the beginning ?His fate will be nothing worse Than banishment? (Sophocles 31) which is ironic. This example has both a tension building effect and an amusing effect on the audience, which further engages them. When Oedipus is talking to his real mother, Jocasta he says ?still to fear?my mother (Sophocles 52) it has an amusing effect on the audience. The overuse of irony is very effective because Sophocles is constantly recycling it, which gives a more humorous and irritating aspect to the play. Dramatic irony is used commonly throughout the play: sometimes obviously, sometimes it is more subtle. By using it so often it makes the audience think about the subtleties moments and how they could be ironic, which is a very clever way to keep their attention. When Jocasta figures out that she is in fact Oedipus?s mother, she tries to stop him from finding out, and ironically, Oedipus gets offended and more motivated to figure out the truth, as he believes that she thinks he is the offspring of slaves. This example builds tension because it gives a guarantee that he won?t give up until he figures out the truth. ?Oedipus whose name is afar? says this in the beginnin... ...the interesting part is ?your death?, suggests that he will actually die but he himself already made it impossible for anyone to kill him legally. This could foreshadow a relatively close death soon after the play ends. The foreshadowing also has the affect of making the audience to think and make them more alert. By using all these techniques together Sophocles successfully engages the audience throughout the play. The features attracts the modern audience by black comedy, making them use their imagination, relate to the characters by irritating them, the play keeps the audience alert to notice techniques, and makes them tense and relax over and over again. The fact that most important events occur off-stage forces them to imagine which gives a greater impression then of the actors trying to act it. It also gives a more individual interpretation of the play.
Sunday, January 12, 2020
The Natives of New World
Before the New World was discovered by Christopher Columbus, it was a land inhabited by tribes who have sun-kissed red skin. Even before America was recognized as the home of free white men, it was the American Indians who cultivated and tilled its land. The Native Americans ââ¬â as most people refer them ââ¬â have been essential in tracing the origins of the United States of America. Europe had been conquering colonies to increase empiric power and accumulate rich resources. The only discovered areas at that time were called the ââ¬Å"Old Worldâ⬠which included Europe, Africa, and Asia (Robertson, Stewart 51).A notable Italian sea-farer had been working on a new route to travel to Asia in a shorter time. Christopher Columbus thought of sailing west to be able to reach the east, an idea no one ever dared to consider. After many difficulties that he encountered in pursuing the voyage, Columbus landed on a fertile soil greeted by inhabitants which he recognized neither as Asians nor Africans. The natives were illustrated to have a complexion resembling the color of copper. Their physical attributes were further described as such:Their black hair, long and uncurled, floated upon their shoulders, or was bound in tresses around their heads. They had no beards, and every part of their bodies was perfectly smoothâ⬠¦Their features singular, rather than disagreeableâ⬠¦though not tall, they were well-shaped and active. Their faces, and several parts of their body, were fantastically painted with glaring colors. (71) They were gathered in tribes and were not clothed at that time. The natives were practically astonished by the arrival of the white-skinned settlers.The American Indians were believed to have migrated to the western hemisphere using the Bering land bridge. The land bridge connected a path from Siberia all the way to Alaska. Apparently, this bridge was used by the natives to follow the trend of the journey of animals during the ice age (U tter 7). By the time they reached the land, tribes settled and established their homes. Native American tribes were grouped according to blood-relations living in the same territory and spoke a common dialect (57). Each tribe has its own system of governing members for the purpose of survival and warfare.Tribes have existed even before the Europeans set foot on their land. By the time Christopher Columbus reached the Americas, Native American tribes greeted him and his people, with anxiety and curiosity. After the discovery of the New World, colonizers started flocking to the new land. Migrants from Europe traveled to America to start a new life and to conquer the rich untouched soil. Due to this massive influx of migrants, it started inflicting effects that endangered the natives. Epidemic diseases brought by the foreigners caused deaths among the American Indians.These diseases such as chickenpox and pneumonia did not prepare the natives to be immune from it (Thornton 28). This gr eatly reduced the number of Native American population during the time of colonization because of massive number of deaths. The era of conquest took the nativesââ¬â¢ land and grabbed what wealth they have. Aside from this, they never escaped the commerce of slavery, sexual exploits and discrimination. In later years, the natives were forced to study and learned how to live like the white people.They were taught not to speak of their native language and to learn English and institutions were built for acculturation of the Caucasian culture (Nagel 115). These kinds of exploits and abuse prompted the natives to fight off the colonizers. They maybe outnumbered by the whites and their weapons were not a match against the pistols but they made sure they have defended themselves. These uprisings were known as the ââ¬ËIndian Warsââ¬â¢. It became the label for the fight against the natives, to completely eradicate their culture and identity from the New World (Utter 169).Before the acculturation happened, the lifestyle of the American Indians was as unique as their physical characteristics. Their spiritual life was governed by what they call ââ¬ËThe Great Spirit. ââ¬â¢ The American Indians saw this spirit as the bearer of their good fortune. They give thanks to this supreme deity when they win battles, good harvest, and good health. On the contrary, they also have a spirit which was a counterpart of the Great one where bad luck was mostly associated (McIntosh 104). The natives hunted animals to be able to live and hunting not just became a necessity but also part of recreation.Hunting became a sport among the natives. By the time the settlers came, horses were re-introduced to them. They domesticated this animal and became part of their everyday lives. From carrying belongings, to hunting games as well as waging wars, horses became a huge part of the Native American society (Fuss & Mellis 9). American Indians were described as lively people who enjoyed c elebrations such as feasts. They prepared feasts for almost every major activity in their tribes. Feasts were accompanied with lively music, dancing, and prayers.These are celebrated after a hunting trip, in marriage, after curing the sick, after birth, and in funerals (McIntosh 164). The natives always incorporated their spirituality in these celebrations and this made the mark of their identity and culture. They have long been discriminated in their land and colonizers have tried to erase their culture in the New World. However, as time went by, American Indians still fought for the right to have their very own place in the land they once called their own. They fought to have freedom when it comes to religion and practicing their culture.The natives also strived to gain tribal sovereignty (Josephy, Nagel, Johnson 7). This fight for freedom took centuries for it to become part of a recognized set of laws. In 1975, the Self-Determination Act became one of the first laws that focused on giving the American Indians sovereignty within their own tribes (7). It can be said that this fight that the natives did, opened the doors for anti-discrimination movements. This inspired other minorities like the African Americans and other colored race to be treated equally as citizens.Theses minorities wanted to be citizens that have the same rights and privileges with the Whites. The struggle of the American Indians can be seen as a starting point for America to be known as the land of the free. Through the course of history, they have suffered and were persecuted in their own land. Their struggle for freedom became the bearer for other minorities to gain confidence in fighting for their right as well. If not for this struggle, America wonââ¬â¢t recognize the essence of freedom with the absence of discrimination. America wonââ¬â¢t be able to take pride in the land that they claimed to be free.
Friday, January 3, 2020
Israel Palestine Conflict, an International Relations...
NATIONAL LAW UNIVERSITY, JODHPUR Subject: International Relations Israel- Palestine Conflict: History and Solution Submitted by: Mitali Agarwal and Pragati K. B Roll no. 924 Roll no. 929 IV semester IV semester BPSc LLB BPSc LLB Submitted to: Prof. Om Prakash National Law University, Jodhpur Abstract After more than 50 years of war, terrorism, peace negotiation and human suffering, Israel and Palestine remain as far from a peaceful settlement as ever. The entire Middle Eastern region remains a cauldron waiting to reach the boiling point, a potent mixture of religious extremism, (Jewish, Christian and Islamic), mixed with oil and munitions. Ãâ This paper is an attempt to trace the history ofâ⬠¦show more contentâ⬠¦The decision on the Mandate did not take into account the wishes of the people of Palestine, despite the Covenants requirements that the wishes of these communities must be a principal consideration in the selection of the Mandatory. This assumed special significance because, almost five years before receiving the mandate from the League of Nations, the British Government had given commitments to the Zionist Organization regarding the establishment of a Jewish national home in Palestine, for which Zionist leaders had pressed a claim of historical connection since their ancestors had lived in Palestine two thousand years earlier before dispersing in the Diaspora. During the period of the Mandate, the Zionist Organization worked to secure the establishment of a Jewish national home in Palestine. The indigenous people of Palestine, whose forefathers had inhabited the land for virtually the two preceding millennia, felt this design to be a violation of their natural and inalienable rights. They also viewed it as an infringement of assurances of independence given by the Allied Powers to Arab leaders in return for their support during the war. The result was mountingShow MoreRelatedIsrael Palestine Conflict, an International Relations Research Paper8749 Words à |à 35 PagesNATIONAL LAW UNIVERSITY, JODHPUR Subject: International Relations Israel- Palestine Conflict: History and Solution Submitted by: Mitali Agarwal and Pragati K. B Roll no. 924 Roll no. 929 IV semester IV semester BPSc LLB BPSc LLB Submitted to: Prof. Om Prakash National Law University, Jodhpur Abstract After more than 50 years of war, terrorism, peace negotiation and human suffering, Israel and Palestine remain as far from a peaceful settlement as everRead MoreCauses of the Six Day War4151 Words à |à 17 PagesWhat were the causes of Israel-Palestine war? TABLE OF CONTENTS ABSTRACT AANALYSIS THE CAUSES OF ISRAEL/PALESTINE CONFLICT: THE FIRST INTIFADA 1987-93 DIVIDING THE MAP THE 1948 WAR ZIONISM 1967/OCCUPATION THE ARABS, TERRORISM amp; SECURITY: ââ¬Å"NO SOLUTIONâ⬠THE WALL/FENCE/BARRIER DELEGITIMIZING THE STATEHOOD DECLARATION BY PALESTINE THE IMPACT OF SCARCE WATER RESOURCES ON THE ARAB-ISRAEL CONFLICT CAMP DAVID FAILURE THE ISRAEL-PALESTINE CONFLICT IS CENTRAL TO THE MILITANTSââ¬â¢ CAUSE Abstract Read MoreThe Causes for the Conflict between Palestinians and Israelis3432 Words à |à 14 Pagesï » ¿Conflict Between Palestinians and Israelis;The Cause Against a backdrop of an ever increasing number of internal conflicts and the crash of conventional means of conflict resolution to attain a resilient peace in divided societies, this paper presents a two-track approach to peacekeeping and conflict resolution. One track is represented byà peacemaking,à defined as endeavors at finding a resolution to the issues in conflict at the political leadership level. The other track,à peacebuilding,à refersRead MoreThe Debate over the 1948 Arab-Israeli War2889 Words à |à 12 PagesThe debate over the 1948 Arab-Israeli war The 1948 war, which started among the newly established state of Israel and the troops of Jordan, Syria, Egypt, Lebanon and Iraq, is the result of decades of history that generated tensions between Arabs and Jews over the land of Palestine. There are lots of debates concerning the causes that gave birth to this endless conflict; some believe that religion has been the main reason of the dispute due to the importance of the holy city of Jerusalem for bothRead MoreInternational Relations : State Profile And Bilateral Relations3380 Words à |à 14 Pages230 ââ¬â International Relations December 11, 2014 For the extra credit assignment that will be applied to the final, the topic I chose to write about was opinion number four which is: State Profile and Bilateral Relations. Expanding from the second project presentation, the ââ¬Å"stateâ⬠I chose to give my presentation on was Palestine. Palestine is located in the Middle East in the country of Asia and their territory is considered to be only the West Bank and Gaza Strip. The capital of Palestine is JerusalemRead MoreTerrorism, Employment, and Education1357 Words à |à 6 PagesThis paper attempts to explain whether economic depravity in a region leads to support for terrorism using the case of the Israel/Palestine conflict in the Gaza strip. I will present and analyse quantitative data from a public opinion poll conducted in the West Bank and the Gaza Strip, which queried participants about their support for militant and terrorist attacks against Israel. The presented data will be supplemented by statistics from the data th at Alan B. Krueger of Princeton University thatRead MoreInfluence Of Western Media On Our Perception Of Islamic Culture2200 Words à |à 9 Pages 1948 Israel-Palestine Conflict The Influence of Western Media on Our Perception of Islamic Culture Jessica Raya December 15, 2016 History 380 Sacramento City College I. Introduction The Israel-Palestine conflict has a rich history stemming from a religious context. This conflict, also knows that the Arab-Palestinian conflict can date back to biblical times. After the passing Solomon, the King of Israel, the kingdom was divided into two nationsRead MoreUnderstanding Hamas: Violent Terrorism as Political Strategy3882 Words à |à 16 PagesStates National Counterterrorism Center (2013), aims at erecting a Palestinian state based on the 1967 borders with Jerusalem as its capital. Because Israel also desires to claim Jerusalem as its capital and has shown itself eager to expand its own boundaries, violent conflict has ensued between the people of Palestine and the people of Israel. This paper will discuss the role which political violence plays in Hamas political strategy. By applying the Kydd and Walter strategies of terrorism frameworkRead MorePolitical Prediction In Israel1513 Words à |à 7 PagesKANG Prediction Paper-Israel Word Count: 1528 The following analysis is conducted on a three-year time horizon, since the scheduled date for the next Israeli legislative election is November 5, 2019. However, the government could hold early elections if it chooses to do so. Among all four sectors, geopolitical future looks the most worrisome. Political Prediction The continuity of political stability is predictable for a three-year time horizon. The democratic system in Israel is highly developedRead MoreHow Significant Was The Involvement Of The League Of Nations Essay2189 Words à |à 9 PagesLeague of Nations/United Nations and Britain in the development of the Arab-Israeli conflict?â⬠The time period before and after the Arab-Israeli conflict will be the focus of this investigation. This question was intriguing due to the possibility of the League of Nations causing tension rather than promoting peace. In order to explore the effect the League of Nations/United Nations had on the Arab-Israeli conflict, both primary and secondary sources will be necessary. Primary sources will include
Subscribe to:
Posts (Atom)