Sunday, December 15, 2019

We Should Not Put Our Families in Nursing Homes Free Essays

We should not put our families in nursing home Purpose To persuade my audience why they should not put their family members in a nursing home. Introduction Do you have a disable or elderly family member that can not do for themselves? We as people need to think about where we place our family members as far as nursing homes and facilities. Many of you may not have any disable family members, but I know you may have elderly family members, and you do not need to put your family member in a nursing home. We will write a custom essay sample on We Should Not Put Our Families in Nursing Homes or any similar topic only for you Order Now I know this because I have been a nursing assistant for four years and I also have a sister who has been a nursing assistant for three years and has done home health care and nursing home services. I had two family members in a nursing home. One passed away and the other one did not start to recover until she came home. Central Idea I am here to convince you to that you should not put your family members in a nursing. Preview You should not put your family member in a nursing home because in a nursing home the ratio is 1 caregiver to 10-15 patients, your independence is limited, and the chances of your love ones improving are little to none. Body I. The first reason why you should not put your family member in a nursing home is because in a nursing home the ratio is one caregiver to ten to fifteen patients. A. The biggest problem in a nursing home is that they are short of registered nurses and nurse aides. 1. According to AHCA (American home care association) as of 2007 the vacancy rate for registered nurses at a nursing home was 16. 3% yet some nursing homes have only one registered nurse for 50 to 70 patients notes Charlene Harrington, a professor of sociology and nursing at the University of California. . For nursing assistants, they have the most work. 3. They have the task of feeding, clothing, bathing, hygiene care, transporting, and these are just a few are the task done on a daily basis. 4. A caregiver does these tasks for more then six patients and over night may have the minimum of ten. Subpoint: Now that you have learned about this first risk taking at a nursing home, lets move on to my second reason I. The s econd reason why you should not put your family member in a nursing home is because their independence is limited. . When being in a nursing care facility your time is limited. You have to get up, eat, and go to bed, etc. at a certain time. 2. When in a home care setting, you can get when you want or go wherever you want without having someone telling you. This gives your family member a chance to live a normal life everyone else. 3. According to the book Elder care: Choosing Financing Long-Term Care by Joseph Matthews, one advantage of homecare is that you and family can better control the care you receive and avoid the care you do not need or would not need. 4. In homecare services you can also avoid the risks of a family being abused, neglected, and thief. Subpoint: Now that you have learned about these two risks of sending your family members to a nursing home, lets move on to my third reason. II. The third reason why you should not put your family reason member in a nursing home is because their chances of improving are little to none. 1. If it is not in the care plan the staff will not do it. This statement says that a caregiver will not take care of the family member any further than then what is on a piece of paper. 2. Failure to provide comprehensive care plans was among was among the top most frequently cited deficiencies in nursing homes facilities in 2008, according to a November 2009 report co-authored by Harrington of UC San Francisco. 3. They may also not provide the care for your family member of their particular need, for example, physical therapy. If a patient is paralyzed on one side or waist down, they may be ridding. In a home care setting, you will have your own social worker, a registered nurse that comes to the home to check on you, and can have therapy at your home or sign yourself up for therapy services. Being able to get out and move around whether the family member is in a wheelchair or not can help create a less risk of things like depression, cancer, and bedsores. Conclusion In conclusion, you should not put your disable or elderly family members in a nursing home because in a nursing home the ratio is one caregiver to ten to fifteen patients, your family member independence are limited, and the chances of someone improving in a nursing home are little to none. I am here to convince you that you should not put your family members in a nursing home, if you care about the needs for your love ones and want to avoid the risk of thief, neglect, and abuse. I urge you to better options for your loved ones and not a nursing home. Work Cited Page Matthews, Joseph. Beat the nursing home trap: A consumer’s guide to choosing financing long-term care. Berkeley, CA: Nolo press, 1990. Print. Matthews, Joseph. Elder Care: A consumer’s guide to choosing financing long-term care. Berkeley, CA: Nolo press, 1990 and 1993. Print. Bornstein, Robert F. and Languirand, Mary A. When someone you love needs nursing home care. New York, NY. NewMarketPress, 2001. Print. Strickland, Britney. Personal Interview. 2 Nov. 2012. Scherzer, Lisa Ph. D. and Stives, David Ph. D. 10 things nursing homes won’t tell you. N. P. 15 April 2010. Web. 29 Oct 2012 http://www. smartmoney. com/plan/health-care/10-things-nursing-homes-wont-tell-you/ How to cite We Should Not Put Our Families in Nursing Homes, Essay examples

Saturday, December 7, 2019

How Spectre and Meltdown could affect the Crypto World Essay Example For Students

How Spectre and Meltdown could affect the Crypto World Essay Everyone is talking about the new CPU-Flaws Spectre and Meltdown. ButI think the most people doesn’t really know what it is in detail and how itcould affect their daily lives. Crypto is booming these days and many non-tech savvy persons are in the market, too. Therefore, I wrote a shortsummary regarding to the technical details of Meltdown and Spectre andtheir effects on crypto currency exchanges and wallets. So, what are Spectre and Meltdown in detail? They are vulnerabilities which affect CPUs made by Intel, AMD and ARM. Meltdown was already discovered in 2017 but publicly disclosed at the 3rdJanuary 2018 by two companies, Cerberus Security and Google ProjectZero, as well as the Technical University of Graz. Spectre has been identified by Google Project Zero and the researcher Paul Kosher. Both vulnerabilities affecting Windows, Linux, MacOS and other operating systems and affects all devices like mobile phones, laptops, Desktops andServers. There are two different variants of Spectre and one variant of Meltdown. Meltdown is affecting nearly every modern Intel Chip and the two Spectre variants are affecting the least Intel, AMD and ARM Chips. Meltdown and the two types of the Spectre attacks are taking advantage of a process within the CPUs which is speed up processing of any given code without a performance loss whilst guessing which the next process will be. Every time this process will be executed a small change to the processor is made. Unfortunately, this change can also be measured by other programs which means that the information can be leaked to malicious programs, too. Spectre is using JavaScript to steal the leaked information while Meltdown is leaking the information within the kernel memory. Modern operating systems using page tables to map kernel memory or processes and physical memory of the system and split it into two parts, one for processes and one for the kernel. Since the kernel memory is shared for all processes, Meltdown takes advantage of this shared memory, finding leaks in the data and forward them to a third party. Spectre could be exploited in a CPU to make it mispredict and execute malicious c ode instead of the predictive code. With the second version of Spectre an attacker could trick the CPU into making the wrong speculative accesses outside its boundaries, driving the CPU away from a normal prediction to the one that the attacker wants. Both Spectre vulnerabilities could allow an attacker to gain access to data on the chips, that is meaning in detail that encryption keys, passwords and other sensitive information could be exfiltrated. Every time when the CPU guesses what information is needed to continue its process, the attacker could see the data. Spectre allows an attacker to start the guessing process, by measuring how long it takes to perform this task, then the process can be detected by a third-party process. This could lead to buffer overflows attacks for example. Bad news for all admins, Spectre affects also virtualized machines. For the exploitation of Meltdown, a lower skill set is needed as for Spectre. It enables a third-party process to read the data directly from the kernel and allows the attacker to view the data. These Attacks are so called â€Å"Side-Channel-Attacks† and accessing data while it is used for legitimate process. The vulnerability leads not to a specific vendor like often told in the news but lays in the design of the Chips itself. Amazing, we can call most of our processors vulnerable by design! Updates are on their ways for the most device or are deployed already. So, what d oes that have to do with the crypto world? .u32089b8a14d76a77cc7c7a9d9ec10114 , .u32089b8a14d76a77cc7c7a9d9ec10114 .postImageUrl , .u32089b8a14d76a77cc7c7a9d9ec10114 .centered-text-area { min-height: 80px; position: relative; } .u32089b8a14d76a77cc7c7a9d9ec10114 , .u32089b8a14d76a77cc7c7a9d9ec10114:hover , .u32089b8a14d76a77cc7c7a9d9ec10114:visited , .u32089b8a14d76a77cc7c7a9d9ec10114:active { border:0!important; } .u32089b8a14d76a77cc7c7a9d9ec10114 .clearfix:after { content: ""; display: table; clear: both; } .u32089b8a14d76a77cc7c7a9d9ec10114 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u32089b8a14d76a77cc7c7a9d9ec10114:active , .u32089b8a14d76a77cc7c7a9d9ec10114:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u32089b8a14d76a77cc7c7a9d9ec10114 .centered-text-area { width: 100%; position: relative ; } .u32089b8a14d76a77cc7c7a9d9ec10114 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u32089b8a14d76a77cc7c7a9d9ec10114 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u32089b8a14d76a77cc7c7a9d9ec10114 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u32089b8a14d76a77cc7c7a9d9ec10114:hover .ctaButton { background-color: #34495E!important; } .u32089b8a14d76a77cc7c7a9d9ec10114 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u32089b8a14d76a77cc7c7a9d9ec10114 .u32089b8a14d76a77cc7c7a9d9ec10114-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u32089b8a14d76a77cc7c7a9d9ec10114:after { content: ""; display: block; clear: both; } READ: Tell Tale Heart EssayAs we’ve learned so far, Spectre and Meltdown can both lead to sensitive information leaks, which also means that your private keys for your cryptowallets could be stolen! This could happen through a malicious website, abrowser plugin or of course, through a file delivered via an E-Mail phishingattempt. You are not affected by the flaws if you stored your private keys on a safeplace, far away from the internet or using a hardware wallet. So, what is about exchanges like binance.com or third-party wallets likeCoinPouch? Customers never get access to their private keys on exchanges as well ason many third-party wallets. We don’t know if our private keys are maybe stored on the same server like our public keys. We need to rely to the operators that they are keeping everything secure. If we have a look atrecent happenings like the CoinPouch- or Blackwallet-Hack. Between 2011 and 2017 there were 1040422,756 Bitcoins ($ 11.122.373.837,85) stolen just from exchanges. If I would include alt-coins and hacks against wallets in this calculation we would reach a much higher amount. The history showed hackers often finding methods to get into different crypto exchanges or wallets. At the moment there are more than 120Crypto-Exchanges and many third-party online wallets out there, some of these are just operated by a few people and it is very obscure who is really behind them. Regarding Spectre and Meltdown we need to rely on all of these 120 exchanges updating their systems properly and in time to besecure. If they won’t, it could look like this soon: So, what is about those new decentralized exchanges? Yes, good choice, it would protect you against the Spectre and Meltdownattacks. But keep in mind that there are many other dangers around. Formore information please check about the recent Etherdelta hack. So, what if we putting all together? Meltdown and Spectre are definitely big deals for centralized-online-exchanges and third-party wallets as well as your private wallets. Most of the security of your private wallet lays in your own hands: keep the keys off your computer or just use a hardware wallet like Ledger Nano. At exchanges and third-party wallets, the security relies on the operators and how skilled they are. Be Careful do not leave too much coins on the exchanges, as you can never be sure what is running behind the frontends. And of course, just don’t use third-party wallets. If possible use a Hardware or paper wallet, but please not a paper wallet from eBay with pre-generated private keys because this could lead to lose of your coins, too. For decentralized exchanges Meltdown and Spectre got a low impact, but keep in mind that there are many other possibilities to get your coinsstolen. My personal advice is to keep all your systems up to date, store higher amounts o f coins in a hardware wallet and of course, don’t trust anyone.

Saturday, November 30, 2019

Of Human Agony free essay sample

I have chosen to write about a particular piece of literature, Of Human Agony, written by Irene and Carl Horowitz, which has had a profound impact on my life. Irene and Carl Horowitz are my great aunt and uncle on my mothers side. They are Holocaust survivors who came to the United States after World War II and are presently living in Brooklyn, New York. As the years passed, Irene and Carl felt compelled to record their war experiences for future generations. They decided to write a book. Irene and Carl were Polish Jews when Hitler took control in 1939, and for the next several years they suffered the fate of so many of Hitlers victims. Overnight, they lost their homes, parents, friends, and almost their own lives. Until the war finally ended in 1945, their daily struggle was a desperate one of perseverance and endurance. My great aunt was fortunate to spend the war years hiding in a well. We will write a custom essay sample on Of Human Agony or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Through winter and summer she remained concealed under leaves, only able to emerge after dark for food and water. The well soon became crowded with other Jews seeking an escape from Hitlers relentless onslaught. Finally on August 8, 1944 news arrived that the Russians had driven out the Germans. Irene was so flea and lice infested that she was half dead from anemia, but she was free at last. In another part of Poland, Carl was searching for any opportunity to avoid his own doom. He was on a death march to Auschwitz, when an old woman selling apples appeared by the side of the road. He made a desperate leap for safety, trusting God in the guise of this woman who hid him and helped him find a route to freedom. My grandparents are also characters in this horrific drama and their adventures no less harrowing. I have read many books in my life. Many describe acts of heroism or perhaps superhuman dedication to some cause, but none will hold the strength and courage for me that this book does. To meet my great aunt and uncle, or my grandmother and grandfather, one would never suspect the enormous obstacles they have overcome. Their survival and recovery will always and forever inspire me. My great aunt says they were just victims, but to me they are heroes.

Monday, November 25, 2019

The eNotes Blog Rolling in the Big Bucks! (Just Kidding) A Snapshot of AcademicSalaries

Rolling in the Big Bucks! (Just Kidding) A Snapshot of AcademicSalaries Over the past several months, there has been much talk about how teachers make a heck of a lot of money. I read and listened to several of these reports as I waited for the water to boil for my ramen noodles. This week, the Chronicle of Higher Education released data showing the average salaries of professors from hundreds of academic institutions across the nation- from tenured profs at private institutions that grant doctoral degrees, to adjuncts who teach at community colleges. Not surprisingly, private universities like Harvard, Columbia, and Princeton offered the highest paying positions, averaging a nice $190k or so per year. Professors at the top levels of public universities earn about a third less than their private counterparts. Of course, these positions are few and far between. Most professors work in lower tiered schools. The average for these colleges ranges from about $87k for a tenured professor to around $40k for a professor of no rank (adjuncts). While the highest paying schools certainly provide a nice living for their professors, even they fall far below what those individuals might be earning in the non-academic world. In fact, that is probably true of an academic on any rung of the teaching ladder. Where does your school fall in the salary range? Read the full report here. If you are considering teaching, does this information change your mind at all? While its true that no one goes into teaching for the money, the reality is quite eye-opening, to say the least.

Friday, November 22, 2019

Background of the Study

This doctoral dissertation will be conducted to determine the intensity of need for abused victims’ therapist hotline, one stop shop and law enforcers in diverse States of America. It will make use of the experimental method of research as it is aimed at ascertaining intensity of needs for therapist hotline, parametric reception areas, and secured holding quarters for abused victims as against law enforcers mere investigations often including mandatory reporting or convincing the victim to do her job of confronting the suspect through standard judicial proceedings. Chapter 1 Introduction   Background of the Study There is a demand for abused victims’ hotline and a one stop shop in diverse states of America.   Consequently, the building interest was by no means, then, limited to Law enforcers.   However, it is now spreading all over America at a rate that surprises secular and non-secular entities that supplies similar services. Americans have developed great interest in this endeavor because of its humanitarian and public values.    They apparently have realized that it makes victims feel safe in non-judgmental, anonymous places to test the waters as they begin their quest to find appropriate help they need.   Many may have realized that abused victims’ hotline and one stop shop, lifts up their spirit, brighten victims’ world, and add zest to life.   Moreover, abused victim’s hotline and one stop shop is an avenue that promises socially rewarding prospects. Statement of the Problem This study is mainly concerned with finding out the intensity of need for abused victims’ therapist hotline, one stop shop and law enforcers in diverse States of America.   It will address itself to the following problems: 1.   Which of the needs classified as?   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   a. therapist hotline;   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   b. parametric reception areas;   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   c. secured holding quarters;   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   d. law enforcers mere investigations;   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   e. mandatory reporting; and   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   f. convincing victim to confront suspect with legal options will best meet the requirement of an abused victim? 2.   At what category will the fragile case of an abuse victim be best handled and accommodated? 3.   Which among these classified needs meets the immediate requirements of the abused victim under the following circumstances?   Ã‚  Ã‚  Ã‚  Ã‚   a. rape victim   Ã‚     Ã‚  Ã‚  b. substance abuser   Ã‚  Ã‚     Ã‚  c. domestically abused Significance of the Study In a country like the United States of America the need for an avenue that promises socially rewarding prospects is vital; hence, it becomes imperative to extend present day knowledge on developing speedy communication system, appropriate reception and apt accommodations for abused victims. The researcher believed that the baseline data that will be gathered for the results of this study shall serve as guide of other researchers in their quest for additional knowledge specially those interested in the field of psychology and sociology Theoretical Framework of the Study An abused victim normally walks off with traumas of their pains. Some of them prevail over the stress and surfaced with triumph. But, most are too weak to be devastated with grief.   The difference between civil and criminal cases in domestic violence (Rainer, 2006) is a problem which an abused victim must face up to. Plus is the idea of confronting the suspect in court considering the raw sores of recently inflicted pains abused victims immediate needs must be addressed first prior to other legal measures. Commonly, Social psychologist views that the impact of social processes on human behavior may specialize into attitude formation and attitude change, group dynamics, prejudice, or violent behavior. Karl Emil Maximilian Weber (1864-1920) a famous social theorist of the 20th century took Kant view of moral psychology suggesting principled deed is primarily concomitant with self-discipline (Mohr, J. C. B., 1984). So is the interest of psychotherapist as specialist in the area of handling abused victims. For Weber, the significance and worth of what one does would rely upon one’s perspective of things (Mohr, J. C. B., 1984) which is exactly the same perspective as those the advocates of an abused victims’ hotline, parametric reception area, holding areas. These steps can be proven, understood and explained making it rational (Mohr, J. C. B., 1984). Assuming the abused victims’ desire for treatment and rehabilitation which may be a specific personality and is dependent upon the victims’ personal commitment, the strength of community values where the victims’ are, is a very important foundation (Mohr, J. C. B., 1984). Hypotheses:   Ã‚  Ã‚  Ã‚   1.   Ho: There is no significant difference among therapist hotline, parametric reception areas, secured holding quarters, law enforcers mere investigations, mandatory reporting, and convincing victim to confront suspect with legal options to meet the requirement of an abused victim?   Ã‚  Ã‚  Ã‚   2.   Ã‚  Ho: There is no category that will best handle and accommodate the fragile case of an abuse victim.   Ã‚  Ã‚  Ã‚   3.   Ã‚  Ã‚  Ho: There is none among the different classification of needs meets the immediate requirements of the rape victim, substance abuser and domestically abused victim. Scope and Delimitation of the Study The study will be delimited to the use of therapist hotline, parametric reception areas, secured holding quarters, law enforcers mere investigations, mandatory reporting, and convincing abused victims such as rape, substance abuser and domestically abused to confront suspect with legal options.

Wednesday, November 20, 2019

The role of affirmative action in society Research Paper

The role of affirmative action in society - Research Paper Example The main reason this topic has been chosen is that we live in very diverse societies and are faced with a very wide range of people every single day. With the increasing change of roles of households and the increasing recessions in place, there is a clear need to understand in depth the steps that are taken to positively represent the women and minorities. Body: Impact of Affirmative Action on Society Considering the beneficiaries of the Affirmative Action it is evident that the cause is very noble. Yes, it is true that the law was introduced and passed for the safety and need of many people in need. However considering the people involved and the amount of damage that it has on the society, there have been a number of doubts that have surfaced. The law has also stirred up a number of questions and has built up a number of doubts about the accuracy of the law. Kate Johns has in a very effective manner explained the same. She explains the case of Martin Luther King who had focused on what the person is worth in terms of skills, behavior and performance rather than on the color of the skin. As quoted by Johns, â€Å"Don't judge a man by the color of his skin, but by the content of his character† (Johns). ... ople are actually being judged by their skin color and being place in jobs and higher places of learning due to their skin color, and their ethnic background† (Johns). This is the concept there several white victims of affirmative action and those from majority groups now refer to as reverse discrimination. Most affirmative action policies have always operated on the assumption of that the group that is on the receiving end of the policies is at an advantage. There are members of this group who are not necessarily under such circumstances. It is hard to believe but there are researchers who have argued that these policies, including those that are founded on racial principles, targets and goals at times have a serious impact on the majority race too. Lately, there have been several instances of white men complaining of reduced opportunities as a result of affirmative action policies that favor women and because of those that favor the minority races. This phenomenon goes by sev eral names and has been employed by a number of groups that criticize the philosophies on which affirmative action policies have been founded. While at the initial stages, the affirmative action policies or frameworks work in a positive way. This is because at this stage, they introduce the terms and define the boundaries for which to sell the concept and idea of gender and racial preferences, goals and targets. However, they ultimately turn their heads and start biting the class of people who had been believed to be strongly protected or favored by the system. It is essential to note that impact of the affirmative action is not completely negative in society and the actual intension of the law is clearly a good one. As explained by Mitchell W. Pearlman and Gregory Daniels, Affirmative action

Tuesday, November 19, 2019

Close Reading of a Short Fiction Essay Example | Topics and Well Written Essays - 1000 words

Close Reading of a Short Fiction - Essay Example She went to the extent of even changing her name just to show her real ethnical identity. The name ZitkalaSa means ‘red bird’ in the Indian language. In writing her autobiographies: School Days of an Indian Child and Impressions of Indian Childhood, we learn more of the kind about her life and experiences. Discussion The publication, The School Days of an Indian Girl, has a purpose of explaining the experience the author had while attending boarding schools meant for teaching and civilizing Indians. In a much broader outlook, the publication aims at showing the whole world the suppression that the inherent American culture faced after the colonization of the United States. Zitkala uses the power of the pen to express the pains she underwent while trying to keep true to her beliefs and roots. The publication achieved its purpose for which it was written. The plot of the story is well defined, it begins with Zitkala as young girl of eight years, whose curiosity and innocen ce has given an intense desire for the apple orchards to be educated by missionaries. The plot develops as we are told of the experiences and suffering she undergoes together with her friends while at the mission school. However, the climax comes when she returns home to meet her mother. There is a sudden twist of events as she does not feel happy being at home; she wants to go back to school. The conflict comes in when her mother does not allow her to go back to the mission school. She goes back to school against the wishes of her mother and this creates a rift between them. The rift makes Zitkala unhappy and it is so unfortunate that the story ends before the rift between them is resolved. Zitkala is the main character in the publication. She is portrayed as a brave individual who is not threatened by anything despite her young age and small size. Her bold nature is seen in the way she was very adamant to cut her hair. The mission staff had to look for her and grab her by force. S he is also emotional, and this is seen in the way she always hid in her room and cried because they were not in good times with the mother. The lady at the mission school is also another character that helps in plot development of the story. She is a symbol of pain and suffering. She is very cruel and often punished Zitkala and her friends even in situations where they did not misunderstood each other. Zitkala tells in a melancholic way how sometimes they were punished unjustly for the misunderstandings. This made her seek for revenge in some little ways. She narrates how she blames the well-meaning, hardworking and ignorant woman who was inculcating superstitious ideas in their young and pure hearts. In addition to the sadness that those days bring to her, they cast darkening shadows of how her past years had been. Loss of freedom clearly portrays itself as a main theme in Zitkala’s publication, The School Days of an Indian Girl. Being an Indian, she had got used to self-det ermination and independence. This is clearly shown when she finds it weird and difficult to cope up with the life at school. The fact that whistles and bells signaled every action that was to be done did not please her at all (Zitkala, pp.35). She was irritated with this kind of life and thus she calls it ‘iron routine’. According to her, all that was testing the chains which had bound her individuality tightly like mummies ready for burial. She had grown up in Dakota knowing that people did