Thursday, December 26, 2019

The Juxtaposition of Hamlet Characters - 1658 Words

To completely understand how someone is, the reasoning behind their person, you have to take into account the people around them. In William Shakespeare’s play â€Å"The Tragedy of Hamlet†, Ophelia and Laertes represent different aspects of prince Hamlets traits that further the understanding of his behaviour, thoughts, and over-all character. Laertes and Ophelia, like Hamlet, are children of murdered fathers. This connection helps create a link between the three that sends them passionately to their end. Ophelia has an important relationship and entangling affair with the prince. Hamlets and Ophelia’s actions in time lead the young women into a deep grief, and eventually an even deeper lunacy. Her burning emotions and truly mad mind†¦show more content†¦Hamlets treatment of Ophelia reflects his feelings for women. â€Å"Hamlet views Ophelia as he considers his mother- a passionate voluptuary whose fragrant sexuality is a poisonous and destroying force. The image of poison which †¦ Laertes sees in Hamlet, [Hamlet] sees in †¦ Ophelia.† (Alexander 136). Because Hamlet feels betrayed by the woman he called mother, who married so quickly after his father’s death, he paints all women as pictures of distractive feebleness, stupidity and bawdiness. â€Å"Hamlet therefore sees Ophelia as a threat to his memory, his dedication, to the task of revenge, and to his whole existence† (Alexander 129). Hamlets resentment toward women is also directed at himself. In his only soliloquy before learning of his father’s murder, Hamlet shows what he thinks of his grief and his mother’s actions: â€Å"Frailty, thy name is woman† (I.ii.148). Seeing all women as one entity of frailty would prove Hamlet to be someone who was very narrow minded, but he says: â€Å"†¦I am very proud, revengeful, ambitious; with more offences at my beck than I have thoughts to put them in, imagination to give them shape, or time to act them in. What should such fellows as I do crawling between earth and heaven? We are arrant knaves, all; believe none of us†¦ † [III.i.133-140] Comparing himself to the weakness that he sees in women shows that Hamlet is making â€Å"†¦anShow MoreRelatedComparing The Novel Atonement By Ian Mcewan And The Play Hamlet By William Shakespeare1428 Words   |  6 Pagessimilar and contrasting features of their characters in order to addresses varying issues within the texts. These issues within the text In the novel Atonement by Ian McEwan and the play Hamlet by William Shakespeare, the writers’ use of juxtaposition is used to accomplish a more profound understanding of the internal relationships of the characters and external relationships with the other characters in the texts. Essentially, through the use of juxtaposition, both writers are able to enhance the messageRead MoreStruggle and Disillusionment in Hamlet Essays919 Words   |  4 Pagesthrough his character Hamlet, contributes to the continued engagement of modern audiences. The employment of the soliloquy demonstrates Shakespeare’s approach to the dramatic treatment of these emotions. The soliloquy brings a compensating intimacy, and becomes the means by which Shakespeare brings the audience not only to a knowledge of secret thoughts of characters, but into the closest emotional touch with them too. Through this, the audiences therefore gain a closer relationship with Hamlet, and areRead MoreThe Mere Nature Of The Soliloquy By William Shakespeare961 Words   |  4 Pagesnature of the soliloquy is to enter the thoughts of a specific character It is a simple idea. It would make sense that Shakespeare employs this literary method to reveal something about Hamlet’s own internal struggle in any given soliloquy. Hamlet is an conflicted and self-disparaging individual who often finds himself toiling with his own ideas and movies frequently. But the first soliloquy is used to reveal to the audience that Hamlet is furious at his mother and Claudius, even before he learnsRead MoreHamlet, By William Shakespeare1492 Words    |  6 Pagessee the flaws in their idols. The play Hamlet centers on protagonist Hamlet as he questions whether to take revenge against his uncle for killing his father or leave him alive. Written by William Shakespeare in the early 17th century, Hamlet addresses motifs of indecisiveness, insanity, as well as death and suicide. Furthermore, the majority of these motifs are left up to interpretation. Throughout the play, the family, friends, and acquaintances of Hamlet insist that he has lost his mind drowningRead MoreSuicide Soliloquy in Hamlet Essay1210 Words   |  5 Pages William Shakespeare is a famous English playwright. His play Hamlet centers around Hamlets decision on how to seek revenge for his father’s death. However, Hamlet is unsure of what course of action he wants to take to exact his revenge. He discusses the idea of suicide as a possible option in his â€Å"To be or not to be† soliloquy. In this soliloquy, Shakespeare uses metaphors, rhetorical questi ons, and repetition to express Hamlet’s indecision regarding what he should do. Shakespeare uses metaphorsRead More The Significance of the Players in Hamlet Essay899 Words   |  4 PagesThe Significance of the Players in Hamlet      Ã‚   Most characters in Hamlet present themselves as something other than themselves or how as we, the audience, or another character thinks they should appear.   Two of the main characters in this play, Hamlet and King Claudius, are constantly acting as something other than their true nature.  Ã‚  Ã‚   Ironically, the characters that invoke changes in Hamlet and King Claudius to reveal their real personalities are the players, merely actors themselves, notRead MoreThe Foils in Hamlet Essay871 Words   |  4 PagesFoils in Hamletnbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp; nbsp; A foil is a minor character that helps the audience better understand a major character. A foil may exist as a comparison character, with similarities between the two, as well as differences that bring to light an important contrast between the foil and the main character. A foil may also just be someone for the main character to talk to, so we can know and understand their thoughts and feelings. Foils help us understandRead MoreA Treatise Of Human Nature1562 Words   |  7 Pagesthat morality is a character trait approved independently of social conventions. He goes on to conclude that morals cannot be derived from reason when reason is inert, and can neither prevent nor produce action or affection. Hamlet (1602), Frankenstein (1823) and The Picture of Dorian Gray (1891) are all consumed by the innate passion that Hume defines as ‘morality’, yet pivot around the social conventions of their respective eras, broadly identified as ‘reason’. While Hamlet is em bodied by his tendencyRead MoreThe Ear and Eye Motif in Hamlet by William Shakespeare796 Words   |  4 Pagesis the problem characters in Hamlet run into when trying reason out the issues they have. The ear and eye motif in Hamlet by William Shakespeare make up a prominent part in the play. Hamlet suggests that the information received by the ear or eye alone can lead to unwanted outcomes (Anderson). The simultaneous use of the ear and the eye must exist for the success of reason because alone they dont provide sufficient information for Hamlet, Gertrude and the people of Denmark. Hamlet encounters severalRead MoreBeowulf : The Comparison Of Hamlet And Grendels Mother1221 Words   |  5 PagesHamlet and Beowulf : The Comparison of Hamlet and Grendel’s Mother After the immoral loss of a beloved family member, friend, or leader, one’s ideas on how to overcome the situation may be questionable. Dealing with the death of a loved one can leave an enormous toll on the well-being and psychological state of a person. In some cases, it may direct them towards taking the path of extreme measures in order to restore their mental balance. In the literary works Hamlet by William Shakespeare and Beowulf

Tuesday, December 17, 2019

Music, Dancing, And Family Honor - 1472 Words

Some social and cultural issues that are presented throughout the film include music, dancing, and family honor. Music was included as a transition between scenes in order to add dimension to Devdas. In Indian culture, music and dancing are not only meant to be a form of entertainment, but are also a way to worship gods. This form of art is commonly accepted by both Hinduism and Buddhism communities because it is viewed by many to be a gift from the gods. Traditional Indian music is often accompanied by intricate dancing to show how much Indians value the use of communication through the use of a medium. Indians are able to have a sense of unity without the barriers of a caste system or education when they communicate with body movements. This developed form of communication was seen when Chandramukhi, a courtesan, was able to dance on equal footing with Paro, someone of higher class. Through this, Bhansali conveys that when humans are deprived of wealth and status, they have no dis tinguishing features besides that of which Brahma intended for them to have. It is only when individuals give up their materialistic possessions will they be able to see what is truly important to them. Similarly, Hinduism stresses that happiness comes from peace, not materialistic possessions. As seen with Chandramukhi, fulfillments of life should derive from giving up all of one’s materialistic possessions. Although expectations of honor differ between males and females, the Indian cultureShow MoreRelatedDance Paper1652 Words   |  7 PagesDance Paper ARTS/100 February 28, 2011 Dance Paper Dance is used as a form of expressing how you feel through the movement of your body through music. Through the different styles of dancing, it can be slow paced, fast paced, mellow, seductive, fun and enjoyable at the same time. The different styles discussed in this paper will show that jazz, ballet, folk, ritual and modern dance are different but similar. Whatever style of dance you choose they all have repetition, form and rhythmRead MoreNarrative of Quinceanera910 Words   |  4 Pagesdama’s to be a part of my â€Å"court of honor†. All 14 girls wore beautiful hot pink dresses and had polished hairstyles. The girls looked like beautiful dolls. When my mother was a little girl she had two Quinceanera’s. One celebration took place in Mexico and the other here in California. Looking back at my moms photo’s, I could see that both celebrations were huge and costly. I was the first of all my cousins to have a Quinceanera. My mother and other family mem bers worked for over a year to planRead MoreA Study On Evolution Of Dance1399 Words   |  6 PagesJordan Laughlin December 5, 2015 Honors- Final Paper Dr. O’Leary Evolution Of Dance â€Å"People dance because dance can change things. One move can bring people together. One move can make you believe like there’s something more. One move can set a whole generation free.†- Adam Sevani Over the generations, the style and interpretation of dance has changed tremendously. Dance is greatly influenced by societal or cultural issues or advancement. Choreographers express their feelings through dance justRead MoreMusic in the Middle Ages733 Words   |  3 PagesMusic during the middle ages was part of everyday life. It was played at weddings, parties, birthdays, holidays, festivals, christmas, and mayday.There were many types of music for example chivaree this was played on Valentine’s day where there would be romantic music. There were many types of instruments played. Most of the instruments were peacefully played like the harp, flute, the lute, and the lyre. In the middle ages there were many types of music. There was plainchant, polyphony, and secularRead MoreDancing Is The Cradle Of Civilization : How It Has Made A Great Impact On Human History1458 Words   |  6 PagesThere is a young woman dancing to the beat of the drums. She is toned, tanned, and talented. She moves her hips like one would believe impossible, she holds a silk veil which covers her face showing nothing but her eyes making her look mysterious. Her hand movements are those resembling a snake, her outfit is glamorous and shows off her body. Every movement is precise, enticing, and sensual. Her body acts so fluidly that it all appears to be one move itself. She is so confident and sexy, she looksRead MoreThe Ritual Of Marriage Essay1419 Words   |  6 Pagesanother, while to others marriage is a secular contract. This particular ritual has fluctuated between the two throughout generations and cultures. Historically, these matrimonial contracts solidified alliances an d were frequently arranged by entire families or even nations. While these matrimonial alliances are still widely practiced throughout the world today, a majority of marriages in western countries espouse for other reasons. Whether Americans marry for procreation, wealth, or love, the ritualsRead MoreLion Dancing1393 Words   |  6 PagesLion Dancing Every time when you see youth swiftly glistening over the rampaging ungodly Earth accompanied with the blistering heated wonder of the orb-like sun, it can take you back to your exhilarating days with no headaches, worries, or obligations also known as, childhood. Worries, headaches, obligations, these are enemies within ourselves that we must overcome. These flea-like worries are infesting everyone. We are being overwhelmed by these creatures. The only ways to fight off suchRead MoreThe Life of Bruce Springsteen1001 Words   |  5 Pagesa all around food middle-class family, no on in that house hold even Bruce, didn’t realize that within fifty years he would reach living legend status. Also have a title of one of the best musicians to every live. After working hard at what he loves, Bruce has become known as a musical hero and inspiration to his fans and fellow musicians. With his deep lyrics, amazing stage presence, incredible guitar skills, and his passion, he is an untouchable force in the music industry. Using his lyrics toRead MoreChronicle of a Death Foretold Reflective1503 Words   |  7 Pagestrial, in any courthouse, under any judge would it be allowed for a murder to be justified so that one could restore a relative’s honor. However, this is not true in the location of Chronicle of a Death Foretold, as the Vicario twins were found innocent due to â€Å"legitimate case of honor, which was by the court upheld in good faith† (Marquez 48). The reason that this honor is upheld is because the Vicario twins live in a different culture. The story Chronicle of a Death Foretold allows a reader to lookRead MoreThe Treatment Of Cystic Fibrosis1292 Words   |  6 Pages This is a two week, sometimes longer, hospital stay where she is monitored, given antibiotics, and does at least four breathing treatments a day. I have visited Amanda many times during her â€Å"tune ups†, and her family plays a huge role in making the best of the situation. Amanda’s family brings games to play, movies to watch, and they bring decorations to brighten up the hospital room. Because most of the antibiotics are given through an IV, Amanda has what is called a port; a means of delivering

Monday, December 9, 2019

Marketing Evaluation Blog

Question: How Marketing Evaluation Helped Samsung to Reach the Galaxy? Answer: Introduction Business evaluation helps to measure the monetary value of a company. The idea may seem straight forward but there are various methods that are involved in determining the net worth of a Company. Samsung had started its business when there were already technological giants like Apple, Motorola, Blackberry were present in the market. Evaluating the market fell under utmost priority for the brand. Samsung has been dealing with a number of electrical appliances but their smart phones are their Star products. https://songmoi.vn/sites/default/files/cac-ong-lon-cong-nghe-doi-mat-voi-nhieu-kho-khan_anh_chinh.jpg?1455232672 Tools to evaluate Samsungs Marketing Plan In order to evaluate marketing performance, a company needs to measure the marketing outcomes from the view point of the consumers. The performance of a company largely depends on the marketing activities that are carried on over a continuous time period (Kumar, 2015, p.9). These tools can be explained below. Market Return on Investment: As stated by Gupta (2015, p.140), return on the capital invested measures how well a Company generates the cash flow in respect to the capital that has been invested. Unless a company gets proper return on the investments made, there does not remain any chance of the growth of the Company in the market. In fact, the Company runs on loss. Therefore, it is very crucial to calculate the return on investment on a regular basis. The Return on Investment of Samsung for 2016 quarter was 14.26%. This measure clearly showed that Samsung has generated higher return on the investment (Kardous Shaw, 2014, p.198). As estimated, with the increase in the value, there remain positive returns on the new investments. https://wp-uploads-trefis.s3.amazonaws.com/articles/wp-content/uploads/2016/03/Samsung-070316.jpg Video: https://www.youtube.com/watch?v=jlkGEO79Iug Sales numbers: Sales numbers are the fastest and the most basic way to determine the present condition of the product in the market in comparison to its competitors. In the view point of Garca et al. (2014, p.155), increase in the overall number of sales shows the overall improvement in the business. This shall also help the Company to expand their market share. In the last quarter Samsung has been known for the leading market and global business operator. Samsung has shipped more than 94 million smart phones worldwide. The products of Samsung are well accepted among the global consumers. The Company has outrivaled the sales of products of other companies like Nokia, LG and others. https://www.slate.com/content/dam/slate/blogs/future_tense/2013/04/26/samsung_smartphone_sales_rise_to_double_apple_s_market_share/smartphone_market_share.png.CROP.article568-large.png Video: https://www.youtube.com/watch?v=NS9AuKm2IXg Customer feedbacks: Another important part of the market evaluation is getting feedbacks from the customers who are the main source of the revenue for a Company. Various Companies come up with different strategies to understand the perspectives of the consumers and improve their service likewise to understand the dynamic nature of the consumers. In this respect, Brunswick (2016, p.90) commented that in the market of intense competition, it is important to understand the needs and demands of the people so that the products can be differentiated and shall be made more acceptable among the people. Samsung has always taken the advantage of the digital market and focused on gaining feedbacks from the customers. Samsung has come up with a number of promotional campaigns like Selfie or uploading videos from the Galaxy Note 7 have drawn huge attention of the Samsung users. At the same time, the Company gained customer feedback as well. https://electrumbranding.com/wp-content/uploads/2014/09/customer-feedback2small.jpg Video: https://www.youtube.com/watch?v=_iVS1WxhaPE Samsung differentiates its products from its competitors In order to fight with the existing competitors in the market, Samsung uses a number of differentiation strategies. One of the most crucial strategies is product development. The Company has included a number of innovative approaches while designing its products. Its display size and the supporting apps along with powerful battery backup are some of the important features that separate the product from other competitors in the market (Jimnez-Zarco et al. 2017, p.94). Apart from that the set design and the metallic body colors are some of the attractive features of Samsung that has helped the Korean Company to mark its domination in the market even surpassing the giants like Apple Inc, Motorola, Sony and others. https://ei.marketwatch.com//Multimedia/2012/09/04/Photos/MG/MW-AU193_Galaxy_20120904054308_MG.jpg?uuid=0603f9d0-f675-11e1-a4ab-002128049ad6 Samsung benefitting from market evaluation With the findings and the presentation of the facts and data, there is no doubt that market evaluation has helped Samsung to touch the market skies and reach the galaxy. It is on the basis of the market evaluation Samsung has been able to gain a competitive advantage in the market because the evaluation of the market has provided proper information about the product that has helped Samsung to pave its future steps. References: Brunswick, G.J., 2016. The evolution of service-dominant logic and it" s impact on marketing theory.Academy of Marketing Studies Journal,Vol. 20 no. (2).p.89-111. Garca, J.G., Luaces, M., Veiga, C. Rey-Mndez, M., 2014. Farming Costs and Benefits, Marketing Details, Investment Risks: The Case of Octopus vulgaris in Spain. InCephalopod Culture(pp. 149-161). Springer Netherlands. Gupta, R. 2015. A critical evaluation examines the impact of social media on consumer purchasing behavior with reference to Samsung Smartphone.International Journal of Marketing and Technology,Vol. 5 no. (9), 137-152. Jimnez-Zarco, A.I., Rospigliosi, A., Martnez-Ruiz, M.P. Izquierdo-Yusta, A., 2017. Marketing 4.0: Enhancing Consumer-Brand Engagement.Socio-Economic Perspectives on Consumer Engagement and Buying Behavior, p.94. Kardous, C. A., Shaw, P. B. 2014. Evaluation of smartphone sound measurement applications a. The Journal of the Acoustical Society of America, Vol. 135 no. (4), EL186-EL192. Kumar, V., 2015. Evolution of marketing as a discipline: What has happened and what to look out for.Journal of Marketing,Vol. 79 no. (1), pp.1-9.

Monday, December 2, 2019

Tasm Essay Example

Tasm Essay TASM Transputer Assembler User Guide TASM Version 91. 1 5/15/91 Copyright 1986-1991 by Logical Systems Contents 1 Introduction Overview System Requirements 2 Usage Examples Option Information Option Descriptions 3 TASM Assembly Language Syntax Semantics TASM Assembly Language Introduction TASM Pseudo-Opcodes Sample TASM Program Assembly Language Listing Format Assembly Language Macros Operational Statistics Using the Preprocessor with TASM Notes on Using the Preprocessor 4 Appendix A: Error Messages Types of Error Messages Error Message Descriptions 5 Appendix B: Transputer Instruction Set Direct Functions Indirect Functions 6 Appendix C: TASM Internals Source Code Organization and Compiling Transputer Toolset TASM Transputer Assembler Introduction Overview TASM is a relocating assembler for INMOS Transputers. It supports standard INMOS mnemonics and allows splitting a program into separate pieces which are combined at linkage time. TASM is designed to be used in two ways: 1. As a post-pass to the TCX C compiler. The compiler generates an assembly language output file and TASM is used to turn it into relocatable format. The advantage of this scheme is the fact that the compiler can allow in-line assembly language without having to also have a redundant assembler built in. 2. As a stand-alone tool for doing assembly language programming on the Transputer. In this role it is often combined with the preprocessor from the C compiler (PP), which allows multi-line recursive macros, conditional assembly, include files, etc. We will write a custom essay sample on Tasm specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Tasm specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Tasm specifically for you FOR ONLY $16.38 $13.9/page Hire Writer TASM has been designed to be used with PP and can parse information PP provides to generate an assembly listing of source code which may have originated in many different files and been subsequently combined by PP. The architecture of the Transputer requires that some of the code generation be delayed until the linker/locater stage to insure minimum length prefix strings are generated for all instructions. TASM supports this by determining which instructions can be finished and which cannot at assembly time. TASM finishes those which can be and provides information to the linker (TLNK), about the others. TASM uses a multiple pass algorithm to determine which instructions can be finished and what the corresponding minimum length instruction prefix strings should be. The algorithm used doesnt guarantee minimum length prefixes in all cases (generating a minimum length program is a theoretically hard problem), but does a pretty fair job in a moderate amount of time. System Requirements TASM requires approximately 256K of program memory space to run. It should run in any environment which supports other major system development tools (compilers, etc). TASM does use a fair bit of disk space with temporary, output, and listing files. As an estimate, you should have disk space available that is twice the size of the input file for the temporary files, and space equal to the size of the input file for the output file (both types of files will be used at the same time when TASM is generating the output file). If you wish to generate a listing file you should have additional space available equal to twice the input file size. Note that a fair amount of I/O is done to the temporary files and they should be located on the fastest mass storage device available (see Usage section below for more information on how to specify this). 2 TASM Transputer Assembler Transputer Toolset Usage The general form of the TASM command line is: tasm ;input_filename; [;temp_directory;] [-[options]*]* The basic idea is to specify the required input filename (complete with filename extension if not . al), followed by an optional temporary file directory pathname, followed by any options needed. Note that in this case, since no explicit output filename has been specified, the output filename will default to that of the input filename, but with an extension of . trl in place of any extension the input filename had. The temporary file pathname is used to tell TASM to use somewhere other than the current directory (or if the TMP environment variable exists, the directory it specifies), to hold the temporary files TASM generates. If possible, the temporary file pathname (whether explicit or via TMP), should be set to the fastest mass storage available (ideally a ram-disk). The process of assembling code for the Transputer may involve making the equivalent of many passes over the source text (most of which are done using temporary files). Examples Assume you wish to assemble a program stored on file foo. tal; The syntax needed is simply: tasm foo In this case TASM would use the TMP directory (or the current directory if TMP isnt defined), to hold its temporary files (foo. 1 and foo. 2). If you had fast storage available on pathname /fast you could use: tasm foo /fast If you wanted to write the relocatable output to some file other than foo. trl, say foobar. huh, you would use the -o option flag followed by the desired output filename: tasm foo /fast -o foobar. huh 3 Transputer Toolset TASM Transputer Assembler Option Information As seen above with the -o flag, an option flag may need a following parameter, although many option flags are simple switches which may be grouped together following a common - option flag lead-in. For instance, if you wish to toggle the verbose output mode and you wish to generate an assembly listing, the following command line will do it: tasm foo -lv Where the l indicates you want the listing and the v sets the output mode to verbose if TASM defaults to quiet and vice versa (actual default depends on the configuration of TASM). The above result could also be obtained by separating the option flags: tasm foo -l -v Please note, although in the above examples the option flags were in lowercase, uppercase is also allowed (some systems support nothing else)! Option Descriptions The following descriptions detail all the option flags available with TASM, what each does, and what additional parameters are required (if any): Option flag: -c This option is provided to compress the TASM output file. Doing this removes all the debug information. The big motivation is that this often cuts the output file size in half! It is particularly useful when building libraries or other chunks of code which arent routinely debugged. Option flag: -l As mentioned previously, this option causes TASM to generate an assembly listing. The filename for the listing is the same as the output filename with an extension of . lst. For example: tasm foo -l TASM would read the input file from foo. tal, use foo. trl as the output file AND write the listing to foo. lst. The -l option is not allowed if the original source text was not assembly language (see the -t option below). See later sections of this chapter for a description of the assembly language listing format. TASM Transputer Assembler Transputer Toolset Option flag: -o output_filename This option flag allows you to explicitly specify the output filename (including extension), for TASM to use for the relocatable output file. If you dont provide an explicit extension TASM will use . trl. Option flag: -q{0|1|2} These option flags allow you to control the level of prefix byte optimization that TASM will perform. The choices are -q0 (no optimization, all references will be 8 bytes long), -q1 (optimize to minimize the number of symbols and references which are passed on to the linkage phase), and the default, -q2 (maximum optimization by deferring ALL boundary cases to link time). The -q1 option is mainly provided for backward compatibility with pre-87. 8 versions of TASM (where it was the default). The -q0 option speeds up the execution of TASM in addition to potentially speeding up the execution of TLNK. During the early stages of program development use of the -q0 flag on all files which make up a program (including those from libraries), will eliminate the otherwise required prefix optimization performed by TLNK and thus hasten the development cycle. On the down side the -q0 option nearly doubles the program code size and execution time! Option flag: -t This option flag is used if the input file TASM is assembling was the result of a language translator. What this actually does is to inhibit TASM from counting input lines in an attempt to keep track of source input line numbers. TASM still accepts and updates its line number information in response to #line directives which are presumed to reflect the line numbers in the original source text. Using this option allows the line number information which is contained in the relocatable output file to represent the original source code line numbers instead of the (in this case), intermediate assembly language file line numbers. Using this option disables the generation of an assembly language source listing. Option flag: -v This option flag toggles TASM between the verbose and quiet output modes. Depending on the configuration of TASM this option will either cause additional information to be written to the user or disable same (the opposite of whatever the default setting is). 5 Transputer Toolset TASM Transputer Assembler TASM Assembly Language Syntax and Semantics The next several sections describe the syntax and semantics of the assembly language TASM accepts. TASM has some syntax and semantic features in common with C. Rather than repeat information which is familiar to many, we will refer you to a C reference manual for explanations about some features. The manual we recommend is: C A Reference Manual Samuel P. Harbison/Guy L. Steele Jr. Prentice-Hall, Inc. Englewood Cliffs, NJ 07632 Most other C texts also provide the level of description needed to understand the features TASM shares with C. TASM Assembly Language Introduction TASM uses the standard INMOS abbreviations for instruction names (see appendix B for a listing of these). TASM is line oriented with one instruction allowed per line. Each line has the following format: [;label_field;] [;opcode_field;] [;operand_field;] Some sample assembly language statements: test j @test ;Doesnt go anywhere very fast mint ;Minimum integer instruction .db hello ;Define C-style string constant label3 ;Single label with no opcode label4: ;Colons in labels are ignored As you can see, comments are allowed after a trailing ;, and last until the end of the line. Comments may appear anywhere in a line (including the first column), but anything afterwards is ignored. Labels are optional and must begin in the first column. The opcode field holds the instruction or pseudo-op name, it must not begin in the first column. The operand field contains any required parameters for the instruction or pseudo-op listed prior to it on the line. Fields should be separated with either spaces or tabs. Labels and other TASM symbols are from 1 to 255 characters long. They are case sensitive. Labels begin with a letter, a _ or a ? . They may contain those symbols plus digits. Labels may optionally be terminated with (or contain), one or more colon characters. Colon characters are allowed for compatibility with other assemblers and do not count as part of the label (you should not use a colon in any symbols you use in any operand fields). 6 TASM Transputer Assembler Transputer Toolset The operand field follows the label field and contains either an instruction opcode or a pseudo-opcode. The pseudo-ops are begun with a . , but are otherwise similar in form to opcodes (see the next section for information about them). The operand field contains different types of things depending on what the preceeding opcode or pseudo-op is. The types are: aâ‚ ¬? C style constant expressions. These include character constants and the other standard C features. You may also include symbols in constant expressions as long as they are defined in a . set pseudo-op prior to the constant expression in the file (no forward references allowed). Please see a C reference manual for a description of the constant expression syntax. Some examples: a -12 +1 (234+0x12)/022 + 33+ 23 ? 17 : 55 (help + me) / 0x3 ;help and me must be ; already . set $12 ;$ causes wordlength scaling In the above examples note that TASM allows a unary +, which is not legal in C (pre-ANSI anyway). The value of a constant expression is just its numerical equivalent. Thus, a constant expression in a data definition pseudo-op just defines a byte or word location with the specified value. A constant expression as an operand to an instruction just uses the numerical value to compute a prefix string for the instruction. Note that the $ symbol may be used before the start of a constant expression to force the value of the expression to be scaled (divided), by the processor wordlength in bytes. Since the $ may only appear as the first character in an operand field, it can only be used when the operand is a pure constant and not as part of the constant component of a non-constant expression. The expression to which the $ operator is applied must be a multiple of the scaling wordlength or an error will be flagged. aâ‚ ¬? C style string constants. These include the normal character escapes allowed by C and are only legal for use with the define byte pseudo-ops (. db or . dbnz). A string used with the . db pseudo-op will have the normal C style zero termination character while a string used with . dbnz will omit the terminator (the two pseudo-ops are otherwise identical). For example: .db Testing 1 2 3 7 Transputer Toolset TASM Transputer Assembler aâ‚ ¬? Address expressions. These consist of an symbol name followed by an optional constant expression. Some examples: hello+27 frank start -27+(0x66/2) The value of the symbols used in the above examples is the address of the corresponding symbol definitions, NOT the relative offset from the current program counter to the symbol. These types of expressions are not fully bound at assembly time since the actual load address for the program is unknown. The term bound is used here to mean that the value of the prefix string for an instruction (or the value to store into a data word), cant be determined until the actual location for the symbol definition is assigned by the linker (TLNK). These expressions are allowed as operands of instructions or define word (. dw), pseudo-ops (essentially word size pointers). aâ‚ ¬? Relative expressions. These consist of a @ followed by an optional symbol name, followed by an optional constant expression. These are allowed as operands of instructions or define word (. dw), pseudo-ops. They allow the PC relative offset from the instruction (or data item), to the specified constant or symbolic address to be the value of the expression. Some examples: @1 @hello +27 @ 100 0x10000 @ Gorge (a + z) 1 Note that there is a difference in value when a relative expression is used with an instruction versus its use in a . dw pseudo-op. When used with an instruction, the expression is evaluated so as to produce a prefix string which will correctly access the desired value (remember that the Transputer computes all relative offsets with reference to the memory location FOLLOWING the opcode byte of the instruction). In the case of the . dw pseudo-op, the value of the expression is the relative offset referenced to the START of the . dw memory location. Note that if a relative expression contains a symbol it must immediately follow the @. If the expression doesnt contain a symbol the constant expression is evaluated and the result is used as an address from which a relative offset is computed, starting at the appropriate current PC location, to determine the value to prefix the instruction with. For instance, if you wanted to create a jump to location 45 (decimal), you would use: j @45 Note that expressions which contain non-symbolic relative expressions cant be bound at assembly time since the load address for the instruction or data reference is unknown until link/locate time. 8 TASM Transputer Assembler Transputer Toolset Some examples of relative expression instructions with symbol names: cj @hello + 10 call @Byte_output .dw @Beginning_of_data + 10 Symbolic relative expressions can be bound at assembly time (assuming the symbol is defined locally, and there are no unbound instructions which are between the symbol definition and the instruction or . dw which references it). aâ‚ ¬? Difference expressions. These consist of an optional wordlength scaling operator ($), a symbol name minus another symbol name, followed by an optional constant expression. Some examples: @[emailprotected] + 1 hello-goodby zip-zap + 21 $zip-zap + 4 To most assemblers this type of expression is just a normal absolute reference. TASM treats this as a special case since the variable length effects of the unbound prefix strings may cause this expression to be only partly bound at assembly time. This form of expression may be used with both instructions and . dw pseudo-ops (the $ operator can only be used with instructions), but will probably be used most as an operand to ldc instructions which compute the branch length for lend instructions. For example: begin ;Beginning of loop body body of loop load pointer to lend parameter block ldc @[emailprotected] ;Compute branch length for lend lend ;Go back to beginning of loop end ;End of loop body Note that the optional $ wordlength scaling operator causes the value of the remainder of the expression to be scaled by the wordlength (in bytes), of the processor family for which TASM is assembling code. aâ‚ ¬? Floating point constants. These are used with the . real32 and . real64 pseudo-ops to initialize memory locations with the equivalent number represented in ei ther IEEE 32 bit or 64 bit binary format. The floating point constant syntax follows that of C. TASM doesnt support floating point assembly time math, just the conversion operation (similar to initializing memory locations with the results of the C atof function). Some examples: .real32 0. 0 ;Initialize a word to 0. 0 .real32 3. 1415926,12 ;Initialize two words .real64 1. 0,2. 0,3e-39 ;Initialize three double ;words 9 Transputer Toolset TASM Transputer Assembler TASM Pseudo-Opcodes The previous section covered the operand fields of instructions and pseudo-ops in abstract, this section covers them in detail. All TASM source files must begin with a pseudo-op which tells TASM what Transputer the code is being assembled for, since different versions support different instructions (and possibly different ways of generating code). The currently supported Transputers are the T2 series (T212/T222/T225), the T4 series (T400/T414/T425), and the T8 series (T800/T801/T805). To select a Transputer CPU type use one of the following pseudo-ops: .all ;Instructions for all 32 bit CPU types .t212 ;T212/T222/T225 are described as t212 .t414 ;T400/T414/T425 are described as t414 .t800 ;T800/T801/T805 are described as t800 Note that . all is the default if no processor type is explicitly selected. The . all selection is primarily used when building code which is intended to run on any 32 bit Transputer (such as demonstration programs). Also note that both opcodes and pseudo- ops may be in either upper or lower case and that all pseudo-op names begin with a period. All TASM source files should end with: .end ;No operand is required This causes anything beyond it in the source code to be ignored. The use of this pseudo-op is not strictly required since TASM treats the end of the file as a defacto . nd, but it is important when TASM is being used with the preprocessor (PP). PP will otherwise remove any trailing comments and conditional assembly code from the input file to TASM, and thus remove the trailing stuff from any assembly listing which TASM makes. 10 TASM Transputer Assembler Transputer Toolset Between these two pseudo-ops lies the body of the code. The remaining pseudo- ops are: 1. #line ;line_n umber; [;filename;] This violates the normal rules about pseudo-ops in that it begins with a #, and it also starts in the first column. This is emitted by the preprocessor to update TASM about where the next input line to TASM really came from in the source file. The optional filename field indicates that the next line is also coming from a different original source file (the result of PP doing a #include). The information from these pseudo-ops is used to enable TASM to put the code from the original source file on the assembly listing, instead of the merged mess which PP generates. Use your C reference to find out further about this preprocessor directive. . .align This pseudo-op tells TASM to word-align the next instruction or data statement. 3. .db value_for_byte [, value_for_byte]* This pseudo-op is used to initialize memory bytes to specific values. The value_for_byte field may be either a constant expression, or it may be a C style string (complete with automatic zero termination). 4. .dbnz value_for_byte [, value_for_byte]* This pseudo-op is identical to . db except the automatic zero byte termination of strings is eliminated. This pseudo-op was implemented to simplify the use of TASM with languages other that C (although the C string character escape sequences are still used). 5. .ds number_of_bytes This pseudo-op reserves storage for the specified number_of_bytes. Any constant expression may be used in the operand field. The space reserved in this way will be initialized to zero when the program is downloaded to the Transputer. 11 Transputer Toolset TASM Transputer Assembler 6. .dw value_for_word [, value_for_word]* This pseudo-op is used to initialize memory words (2 or 4 consecutive bytes depending on wordlength), to specific values. Note that this pseudo-op does NOT automatically perform word alignment; Use a . align prior to the . dw if alignment is necessary. The value_for_word field may contain the same types of operands as allowed for instructions (see the section on instruction operand fields). As mentioned in that secion, relative expressions applied to . w are relative to the beginning of the word, NOT the location following, as is the case with relative references in instructions. You may not use C style string constants with the . dw pseudo-op. 7. .emulate This pseudo-op enables instruction emulation. This is used when you wish to simulate the effects of instructions which the currently selected Transputer processor type doesnt directly support. For example, you tell TASM you are using a T414 pro cessor (via a . t414), then use a DUP instruction (after having given the . mulate directive). TASM will treat this as if you had given it an instruction of the form: call @? DUP Note that the instruction name called is always in upper case regardless of its original case in the input file. Also TASM will generate a . ext reference for symbols created this way if they havent been previously encountered in the source file. It is up to the programmer to supply the simulation routine being called! 8. .ext symbol_name [, symbol_name]* The specified symbol_names are declared to be defined external to this source file. Its presumed that the definitions will appear in other files which will be combined with the relocatable output of this one at link time. You may not both define a symbol within the current source file AND declare it . ext. If a symbol which is declared . ext is not also referenced in the source file, the external reference is not included in the relocatable output file (no error is generated). 12 TASM Transputer Assembler Transputer Toolset 9. ldc ;operand_field; This pseudo-op has the same syntax and semantics as the normal ldc instruction, but TASM and TLNK are free to use instructions other than ldc to load the desired value onto the top of the stack. This is useful when the immediate data to load is a large negative number and an equivalent code sequence of mint/adc can be used to load the same value in fewer bytes and instruction cycles. Another form of instruction sequence which may be generat ed is a ldc/ldpi sequence for cases when the current program counter is close to the desired address. This pseudo-op is extensively used by the TCX C compiler to minimize the length of static references. Note that this pseudo- op is affected by the . rel and . norel pseudo-ops when generating address expressions (code which computes the address of a symbol), for example: .ldc zip + 21 ;Load address of zip + 21 bytes Normally, this is allowed to use any of the optimization techniques to minimize the length of the generated code. However, if the . rel pseudo-op has been given, this form of reference is constrained to use the ldc/ldpi instruction sequence to maintain the runtime relocation capability. Note that all other forms of the . ldc instruction are unaffected by the current . rel/ . norel setting. 10. .mod module_number TASM supports up to 256 different modules, numbered 0 to 255. These modules are used to allow code and data which should be physically located in separate memory areas to be combined into the same source text stream. This facility corresponds to the code and data regions available with many assemblers, except 256 different modules are allowed. By default, if no . od is given, the code and data which is present in the source file is placed into module 0. The linker (TLNK), allows you to select where each module from each source file will end up (or you may let it do the locating job for you). 11. .noemulate This allows you to turn-off the instruction simulation facility which a previous . emulate enabled. 12. .norel A complement to the . rel pseudo-op, this allows the address form of the . dc instruction to generate the shortest/fastest possible code, ign oring the possibility of program runtime relocation. This pseudo-op is in effect by default and is used to turn- off the effects of a previous . rel pseudo-op. 13 Transputer Toolset TASM Transputer Assembler 13. .pub symbol_name [, symbol_name]* The specified symbol_names are declared to be defined within this source file and are made public, so that other files may refer to the symbol. You may not declare a symbol both . pub and . ext. If a symbol which is declared . ub is not also defined in the source file, the public reference is not included in the relocatable output file (no error is generated). 14. .real32 fp_value_for_word [, fp_value_for_word]* This pseudo-op is used to initialize memory words (4 consecutive bytes), to values which correspond to the IEEE 32 bit floating point representation of the specified value. Note that this pseudo-op does NOT automatically perform word alignment; Use a . align prior to the . real32 if alignment is necessary. The fp_value_for_word field may contain the same types of floating point constants that C allows. 15. real64 fp_value_for_double_word [, fp_value_for_double_word]* This pseudo-op is used to initialize memory double words (8 consecutive bytes), to values which correspond to the IEEE 64 bit floating point representation of the specified value. Note that this pseudo-op does NOT automatically perform word alignment; Use a . align prior to the . real64 if alignment is necessary. The fp_value_for_double_word field may contain the same types of floating point constants that C allows. 16. .rel Forces all . ldc pseudo-ops which follow to generate runtime relocatable code by using the ldc/ldpi instruction sequence for symbolic address expressions. This pseudo-op allows the generation of position independent code (assuming address expressions are not also used in initialized data areas, etc). Note that this pseudo-op will generally result in a somewhat larger/slower program since the other possibilities for . dc instruction optimization are thereby disabled. This pseudo-op is NOT in effect initially in TASM and may be turned off once invoked by the later use of the . norel pseudo-op. 14 TASM Transputer Assembler Transputer Toolset 17. .retf ;workspace_adjust_constant; This pseudo-op is used by our C compiler as a function exit code short form. It translates into a ajw instruction with the specified workspace_adjust_constant used as the operand field, followed by a ret. A couple of notes about the results of this pseudo- op: First if the constant value is zero, no ajw is generated. Second, any code after a . retf and before a label or pseudo-op is encountered is removed. Additionally, if the pseudo-op encountered is another . retf, the SECOND . retf is also removed! 18. .set symbol_name , constant_expression The specified symbol_name is defined to have the value of the corresponding constant expression. This pseudo-op provides a equate capability for forward and backward references. The symbol name may be subsequently used in the constant expression part of the operand field for an instruction or pseudo-op which follows the . set in the source file. The symbol is otherwise treated identically to symbols defined as labels (it may be declared public for instance). 19. .sym symbol_name [, address_expression] [, constant_expression]* This pseudo-op is used to hold debugging information for use by other tools in the Transputer Toolset. The arbitrary string, symbol_name, is assigned a series of values including an optional, symbolic, address_expression (whose exact value is unknown until linkage time), and zero or more, 4 byte, constant_expression fields. The actual use of this statement involves a convention between the tool generating them (TCX), and a later debugging tool which interprets them. See the information about the T_DEBUG_DATA, and T_DEBUGSYM_DATA, relocatable records, in the TASM/TLNK/TLIB RELOCATABLE RECORD AND FILE FORMAT manual, for more information. 0. .val symbol_name , constant_expression This pseudo-op is similar to . set but is used for assigning purely local constant values to the symbol_name. The references to a symbol defined this way must be strictly backwards and may not be external to the file. The primary advantage of . val over . set is that the symbol name used by . val may be redefined by a subsequent . val without having to create a new symbol. This is not possible with . set since both forwards and backwards references are allowed. 15 Transputer Toolset TASM Transputer Assembler Assembly Language Listing Format As mentioned elsewhere, TASM will generate an assembly language listing if the -l command line option flag is given. This file will be written on a filename which is the same as the input filename, but with an extension of . lst in place of any extension the input file had. TASM is designed to be used with the PP preprocessor, this carries over to the design of the listing facility for TASM. In particular, TASM can use information PP inserts in the input file to determine where the source text it is reading originally came from (say via #include PP directives). Using this information, TASM will find and use the original source code from wherever it came from when it creates the assembly listing. TASM cant create an assembly listing if the original source code was written in some language other than assembly (see the -t option flag). As a side note: If TASM detected assembly time errors it doesnt generate a relocatable output file. It also doesnt do the final binding passes it needs to resolve all the relative operand fields for instructions. This shows up on the assembly listing as instructions which are listed as un-bound (see below), when they really could have been bound. The format of the assembly listing is: statuslinelocationassembled_codesource_code The status field is used to show any error flags which were generated by that source code line, or a . if something on the line was not completely bound at assembly time. The possible error flags are: D Duplicate symbol definition error. E Expression field error. F Floating point constant error. N Not implemented error (opcode/pseudo-op). O Opcode/pseudo-op unknown error. U Undefined symbol error. See the corresponding error messages in appendix A for more information about what causes these errors. If the instruction was bound, and didnt contain any errors, this field is blank. 16 TASM Transputer Assembler Transputer Toolset The line field indicates which source code line this is. Note that the source code filename is shown on a banner at the top of the page initially, and a new page eject and banner is generated whenever the source code filename changes. The location field. This indicates the current location counter relative to the currently active module. This value will not be correct if the program contains any un-bound references, or errors, since the actual sizing and locating is delayed until linkage time. This field is shown for instructions or pseudo-ops which do anything interesting, and unconditionally for the first line in a new source file. The assembled_code field. This field contains up to the first 8 bytes of code the instruction or data pseudo-op generated. If the source line is un-bound, and this information isnt known yet, this field is used to show the value of whatever the source code operand field contained in the form of a constant expression. The source_code field. This contains the original source code as read from whatever file originally held it (assuming PP was used), or simply the TASM input file if PP isnt being used. Assembly Language ; Macros When PP is being used with TASM, multi-line macros may cause many assembly language statements to be generated for a single source statement. This is handled on the assembly listing by simply showing the single original source code line. The problem is that the meanings of the various fields to the left of the source code line change somewhat. The basic rules are: aâ‚ ¬? The status field shows the first error encountered in the assembly statements which were generated by that source code line. If no errors need to be reported this field will contain a . if any of the statements generated were unbound. If none of these conditions prevailed this field will be blank to indicate no trouble. aâ‚ ¬? The line field acts normally and shows the source text line number. aâ‚ ¬? The location field shows the location counter of the first instruction or pseudo- op in the macro expansion which generated any code. In other words, it reflects the start of the macro if anything useful happens. aâ‚ ¬? The assembled_code field shows the contents of the first operation in the macro expansion which placed anything in this field. It doesnt append the code generated by later instructions in the macro if the field isnt full yet. aâ‚ ¬? The source_code field acts normally and shows the original source text of the macro call. 17 Transputer Toolset TASM Transputer Assembler Operational Statistics Assuming no errors were encountered, TASM adds some operational information to the listing following the source code (this information is also written to standard output if you havent disabled verbose output mode). The information written consists of the number of external symbols which were defined or referenced, the number of local symbols which were defined, and the number of local symbols which were exported in the relocatable output file for eventual binding by TLNK. The percentage of TASMs symbol table capacity which was used is also indicated. Note, within TASM, both local and external symbols use the same symbol table. The last item on the listing (or standard output), is a count of the total errors encountered. This is a useful addition to the line-by-line error indications since multi- line macro expansion sometimes generates more than the one error which can be flagged on a given source line. Using the Preprocessor with TASM Using the preprocessor (PP), with TASM greatly improves the ease of programming, and the resulting readablity, of assembly language programs. If TASM is being used as a post-pass to the TCX C compiler, PP is not required (the C compiler handles those sorts of details with the help of PP itself). Assuming you are programming directly in assembly language, PP used with TASM offers the following improvements over using TASM by itself: aâ‚ ¬? Macro processing. PP allows both simple text replacement and powerful multi- line parameterized macros. Workspace offsets, symbolically defined configuration values, etc. , are all good uses for this facility. The fancy parameterized macros are nice for creating in-line code, and PP has facilities for generating unique symbols which can be used to allow local labels and symbols within macro body expansions. aâ‚ ¬? Include files. PP allows nested include files to be used. This is useful when a set of configuration parameters is being shared by all the files in a program, but you only want to have one set of definitions. aâ‚ ¬? Conditional Assembly. Using PP allows you to do C style conditional assembly. This is useful when you wish to have two or more versions of a program share the same source text (and thus get updated together). aâ‚ ¬? C style comments. You may use C style comments in source code for TASM when you use PP (since it filters them out). To find more out about these facilities consult your C reference manual. You may also want to consult PP C PREPROCESSOR USER GUIDE for implementation- dependent information about PP. 18 TASM Transputer Assembler Transputer Toolset Notes on Using the Preprocessor The following example will preprocess and assemble a file named test. pal: tcc test. pal +a-l -c Note that the +a-l directive tells TCC to pass a -l directive to TASM telling it to generate a test. lst assembly language listing file. The -c flag tells TCC that linking will not be necessary. The relocatable output file will be written on test. rl. A few notes should be mentioned about using PP with TASM: 1. If you are having trouble, or are unsure where a problem lies, check the output file written by PP to see what TASM is really getting as input. This is necessary since TASM shows the original source text on the assembly listing, not what it actually read as processed by PP. This is particularly useful in debugging macros, since the assembly listing only shows the macro call, not the subsequent expansion. 2. Within macros you should be careful about using ; assembly language comments. Remember that these comments are NOT comments to PP and it will pass them on through to TASM. A place where this crops up is when you define a symbol to have some value in a #define macro and follow it with a ; comment in the source text. The result is that anything you place in the operand field AFTER the spot where the macro replacement is done, gets commented out! As a general rule you should use C style comments for anything involving macros. 19 Transputer Toolset TASM Transputer Assembler Appendix A: Error Messages Types of Error Messages There are three classes of error messages which TASM can generate: aâ‚ ¬? Warnings. These are used to report problems which arent severe enough to cause TASM to abort (exit with a non-zero return value). These messages usually indicate trouble which isnt immediate, but may be soon! The format for warnings is: WARNING: message_text aâ‚ ¬? Non-fatal errors. These are used for reporting actual error conditions which will affect the return value given when TASM exits. If one or more non-fatal errors are encountered TASM will return a non-zero return code, otherwise it will give a return code of zero. Another result of encountering non-fatal errors is that the generation of a relocatable output file is inhibited (although if a assembly listing was requested it will be generated). The format for non-fatal errors is: filename @ line_number: message_text Where the filename field indicates the current source code file being read, the line_number field gives the line where the problem was detected, and the message_text field indicates the actual problem encountered. Note that non-fatal errors are also displayed on the listing (see the Assembly Language Listing Format section for a description of the format). â‚ ¬? Fatal errors. If the problem detected by TASM is so severe that it cant continue operating, it will give a fatal error message: FATAL: message_text After printing one of these messages, TASM will immediately exit with its error return code set (non-zero). 20 TASM Transputer Assembler Transputer Toolset Error Message Descriptions The following descriptions list the various error messages which TASM can generate (in alphabetic order): lt;filename @ line_number: Duplicate symbol definition: symbol_name The named symbol was either defined more than once, or defined once and mentioned in a . ext pseudo-op. filename @ line_number: Expression field error This error is generated whenever an illegal expression is present in the operand field of a opcode or pseudo-op. A few of the possible causes: aâ‚ ¬? Having an expression field which is not representable in 16 bits when assembling for a 16 bit processor. aâ‚ ¬? Using anything other than a string or a constant expression with a . db pseudo-op. If you want to reference an address you need to use a . dw instead. aâ‚ ¬? Using a relative reference within a . dw pseudo-op. Only constant expressions or address references are allowed there. aâ‚ ¬? Using a module number which is outside the range of 0 to 255 which is allowed for . mod declarations. FATAL: Corrupted temp file: filename This error usually occurs when the contents of a temporary file get corrupted by the file system somehow. If you have been changing TASM or recompiling it for another system, this error message indicates that the type field in one of the internal temporary file records was not one of the allowed types. This generally happens when you make a change to one of the places which adds or removes temporary file records without changing all the other occurences (you will generally need to make changes to files tasm2. c, tasm4. c, and tasm5. c together). 21 Transputer Toolset TASM Transputer Assembler FATAL: Error reading input file: filename TASM got an error return during one of its read operations on input file filename. This usually indicates trouble with whatever mass storage device is being used, and/or a corrupted input file. If the preprocessor (PP), was used to prepare the input source file AND a listing is being requested, this error could indicate problems have cropped up in one of the source files between the time PP originally read it, and when TASM re-reads it to generate the assembly listing. FATAL: Error reading temp file: filename TASM got an error return during one of its read operations on temporary file filename. This usually indicates trouble with whatever mass storage device is being used. FATAL: Error setting stream buffer for file: filename This error results when TASM is compiled with a non-zero IOBUFSIZE in file taldef. h but is unable to explicitly set the temporary file I/O buffer using setvbuf during execution. The return code from the setvbuf call is what actually triggers this error. As a workaround you can set IOBUFSIZE to 0 and recompile TASM, or you can figure out what is wrong with your C library. The file listed is the temporary file to which TASM was attempting to attach the buffer. FATAL: Error writing listing file: filename At some point TASM was unable to write to the named listing file. This generally occurs because of insufficient file space. FATAL: Error writing output file: filename TASM detected an error while it was writing the relocatable output file. This error generally occurs when insufficient disk space is available for the output file, as well as the temporary files which also exist during this period. FATAL: Error writing temp file: filename At some point TASM was unable to write to the named temporary file. This generally occurs because of insufficient space on whatever device the temporary files are being written on (either the TMP directory, the current directory, or a special fast one selected via the command line). 2 TASM Transputer Assembler Transputer Toolset FATAL: Insufficient stream buffer memory for file: filename If the value of IOBUFSIZE in taldef. h is non-zero, TASM will explicitly allocate temporary file I/O buffers (via malloc calls). If the memory cant be obtained for one of these buffers, this error message results. The filename listed is the one for which the buffer was intended. To get around this problem you should try to increas e the amount of available C heap memory. If you are using TASM on a PC, get rid of any unnecessary memory resident programs. As a last ditch effort you can reduce the value of IOBUFSIZE and recompile TASM, but TASM execution speed will suffer noticeably. FATAL: Insufficient symbol table string memory TASM was unable to obtain (via malloc calls), enough memory to hold all of the symbols and labels used in the input file. The obvious solution is to reduce the number and length of the symbols in the input file. If you are using TASM on a PC you should try eliminating unnecessary memory resident programs as a first step in getting more memory. FATAL: Line too long in input file: filename TASM read an input line which was longer than 300 bytes (as the release version is configured). This error is generally the result of self-recursive macro expansion by the preprocessor (PP), or the use of a filter program on the input source file which removed the end-of-line markers. FATAL: Output file name same as input You have the same filename specified for both input and output. Remember that the default output filename extension is . trl. FATAL: Symbol table full As configured in the release version, the symbol table can hold 4096 entries. This value may be increased if TASM is being run on a machine with a larger than 64K byte direct addressing range. Note that the symbol table size must be a power of two to make the hashing function work. If you cant increase the symbol table size you will have to break the input file up into separate pieces. 23 Transputer Toolset TASM Transputer Assembler FATAL: TASM internal error #XXX These errors should never occur! If one does it generally indicates a violation of one or more prefix optimization constraints. If this error message does occur, please send a machine-readable copy of the offending TASM input file together with a description of what command line switches were used to either Logical Systems or the dealer where you purchased the product. Be sure to indicate what operating system TASM was running under and the complete text of the resulting error message (plus any other information you feel is pertinent). As a workaround, you can try adding, deleting or moving around bits of code in your program to see if you can avoid the exact sequence of optimization steps which provoked the problem. FATAL: The size of SLONG is not correctly configured This error message can only appear when you are recompiling TASM. It indicates that the typedef for SLONG which appears in taldef. is set for a storage class which is less than 4 bytes long. The SLONG storage class MUST be signed for TASM to operate correctly. FATAL: Unable to close input file: filename You can only get this error message when you ask TASM to generate a listing file. It indicates that TASM was unable to close the named file during the process of re- reading whatever source files actually made up the input source file TASM read (assuming the preprocessor was involv ed), and generating the resulting listing. - FATAL: Unable to generate non-assembly language listing This error is reported whenever both the -l and -t switches are given. You can only use one of these switches at a time. FATAL: Unable to open input file: filename The open attempt for the input filename failed. Verify that the input file exists and that the filename extension is correct (remember that . tal is the default if none is specified). If the preprocessor (PP), is being used with TASM, AND an assembly listing has been requested, this error message can also be generated. This occurs if one of the source files which PP used to create the input file for TASM was no longer there when TASM tried to re-read it to generate the listing. You can tell which of these two cases is the problem by noticing which input filename is mentioned in the error message. 24 TASM Transputer Assembler Transputer Toolset FATAL: Unable to open listing file: filename TASM was unable to open the listing filename. The filename is created by taking the filename from the input file (and input file pathname), and appending the extension . lst in place of any extension the input file had. FATAL: Unable to open output file: filename TASM was unable to open the output filename. This filename is either the default one generated using the input filename with a new extension (. trl), or it was explicitly specified by you using a -o option flag. FATAL: Unable to open temporary file: filename The open attempt for the temporary filename failed. This filename includes whatever directory pathname was specified for temporary files. FATAL: Unexpected EOF in input file: filename This error is encountered when a listing is being generated and TASM is reading the various source files which the preprocessor (PP), used to create the input file. This error indicates that TASM found one of the input files was shorter than PP lead it to believe with information passed via #line statements. This error may also be generated without the help of PP, if the input source file has somehow gotten corrupted between the time TASM read the input code from it and when it was re-read to generate the listing file. filename @ line_number: Floating point constant error This error message is generated for floating point constants used with either . real32 or . real64 which are out of range of the particular IEEE format selected. This usually means an error in a mantissa or exponent field. - filename @ line_number: Not implemented (pseudo-op) This error message is generated for opcodes or pseudo-ops which are not yet implemented, but whose names have been reserved. 25 Transputer Toolset TASM Transputer Assembler ;filename; @ line_number: Opcode/pseudo-op unknown: opcode_name The named opcode appeared in the opcode field of an instruction but was not recognized by TASM. This is generally caused by not declaring what type of processor TASM is assembling for (. T414, etc. ), or using an instruction which is not valid with the selected processor type. WARNING: Unable to close output file: filename During the cleanup process TASM removes the output file it creates if any errors were detected during operation. This error message indicates that TASM was unable to close the output file. Causes include the normal spectrum of file system related maladies. WARNING: Unable to close temp file: filename During the cleanup process, prior to TASM terminating, the temporary files are closed and deleted. This message indicates that TASM was unable to close the named temporary file (something is probably happening to the file system). WARNING: Unable to remove output file: filename During the cleanup process TASM removes the output file it creates if any errors were detected during operation. This error message indicates that TASM was unable to delete the output file. Causes include the normal spectrum of file system related maladies. WARNING: Unable to remove temp file: filename During the cleanup process, prior to TASM terminating, the temporary files are closed and deleted. This message indicates that TASM was unable to remove the named temporary file (something is probably happening to the file system). filename @ line_number: Undefined symbol: symbol_name This error message is generated when the named symbol is referenced but not defined within the input file (either by a label or . ext pseudo-op). 26 TASM Transputer Assembler Transputer Toolset Appendix B: Transputer Instruction Set The following descriptions of the Transputer instruction set are only intended for purposes of illustrating which instructions TASM can assemble. Please consult the appropriate INMOS documentation for information about instruction set formats and the internal architecture of the various CPUs. Direct Functions There are 16 direct functions, executed by all the INMOS Transputers, which can have operands. They are (in alphabetic order): Instruction Hex Value CPU Description ADC 8 All Add constant AJW B All Adjust workspace CALL 9 All Call subroutine CJ A All Conditional jump EQC C All Equals constant J 0 All Jump LDC 4 All Load constant LDL 7 All Load local LDLP 1 All Load local pointer LDNL 3 All Load non-local LDNLP 5 All Load non-local pointer NFIX 6 All Negative prefix OPR F All Operate (meta instruction) PFIX 2 All Prefix STL D All Store local STNL E All Store non-local Indirect Functions The use of the OPR instruction, in conjunction with the operand register, allows a large number of indirect instructions which are built using prefix strings to OPR. The following instruction list shows the indirect instructions, sorted in alphabetic order. Since INMOS makes more than one type of Transputer, the list has a CPU column which indicates whether the particular instruction is supported by at least some members of both the 16 and 32 bit Transputer families (listed as 16/32), some non-16 bit (ie. 32 bit), processors (All), only by the 16 bit machines (T212/T222/T225, listed as T212), only by the non floating point 32 bitters (T400/T414/T425, listed as T414), or only by the floating point processors (T800/T801/T805, listed as T800). In addition, the floating point processors support a FPENTRY instruction which allows the current value in the A register to be used as an extended floating point operation code. TASM implements these extended operation codes as macro instructions which consist of a LDC with the appropriate extended code, followed by a 27 Transputer Toolset TASM Transputer Assembler FPENTRY. These instructions are listed as SEQ (INMOS terminology), in the CPU column and are only available on the T8 processors. 28 TASM Transputer Assembler Transputer Toolset Instruction Hex Value CPU Description ADD 05 16/32 Add ALT 43 16/32 Alt start ALTEND 45 16/32 Alt end ALTWT 44 16/32 Alt wait AND 46 16/32 Boolean AND BCNT 34 16/32 Byte count BITCNT 76 16/32 Count bits set in word BITREVNBITS 78 16/32 Reverse bottom N bits in word BITREVWORD 77 16/32 Reverse bits in word BREAK B1 16/32 Breakpoint BSUB 02 16/32 Byte subscript CCNT1 4D 16/32 Check count from 1 CFLERR 73 T414 Check real32 fp infinity or NAN CLRHALTERR 57 16/32 Clear halt-on-error CLRJ0BREAK B2 16/32 Clear breakpoint flag CRCBYTE 75 16/32 Calculate CRC on byte CRCWORD 74 16/32 Calculate CRC on word CSNGL 4C 16/32 Check single CSUB0 13 16/32 Check subscript from 0 CWORD 56 16/32 Check word DIFF 04 16/32 Difference DISC 2F 16/32 Disable channel DISS 30 16/32 Disable skip DIST 2E 16/32 Disable timer DIV 2C 16/32 Divide DUP 5A 16/32 Duplicate top of stack ENBC 48 16/32 Enable channel ENBS 49 16/32 Enable skip ENBT 47 16/32 Enable timer ENDP 03 16/32 End process FMUL 72 All Fractional multiply FPADD 87 T800 Floating point add FPB32TOR64 9A T800 Convert bit32 to real64 FPCHKERR 83 T800 Check floating error FPDIV 8C T800 Floating point divide FPDUP A3 T800 Floating point duplicate FPENTRY AB T800 Floating point unit entry FPEQ 95 T800 Floating point equality FPGT 94 T800 Floating point greater-than FPI32TOR32 96 T800 Convert int32 to real32 FPI32TOR64 98 T800 Convert int32 to real64 FPINT A1 T800 Round fp to floating integer FPLDNLADDDB A6 T800 Floating ld non-local and ad

Tuesday, November 26, 2019

Critical Essay on Shakespeares sonnets

Critical Essay on Shakespeares sonnets Critical Essay on Shakespeares sonnets Many people read Shakespeares sonnets because they find them to be very relevant in their lives. They know Shakespeare’s sonnets for the manner in which they articulate ideas about love and relationships. Though many people try to identify the message and apply it in their lives, they find it very difficult to do so. The reason is that they find poetry hard to understand since they are not used to the poetic devices of written literature. In order to write a good critical essay on Shakespeare’s sonnets: Message of several poems: The writer can identify the situation that best fits the message identified from a number of poems. In this case, the writer can use several poems that have a similar message for analysis, and the writer needs to understand that different groups of people can use a single sonnet for different purposes. People interpret messages depending on the situations that they are facing at any one particular time. Identify the suitable sonnets: Choose the Shakespeare’s sonnets that suit the situation at hand. This is important in preparing a good critical essay on the same. Read widely: Consult on those things that you least understand. Ensure that you research sound sources at these times. Pay attention to how you express the understanding you have gained, and present it in an interesting way. Use suitable stylistic devices: This is necessary to set the tone of the essay. For instance, the use of imagery is very important in writing a critical essay. The reader should be able to visualize the situation that the writer is analyzing in the essay, and be able to make the right judgment. The writer should also help the reader to understand what the correct reaction should be to the situation explained in the essay. The writer should help in creating the correct image that will elicit the readers’ reactions. Integrate the use irony: In a critical essay on Shakespeare’s sonnets irony goes well with sarcasm, and the writer should include sarcastic statements that will help in understanding the sonnets even better. Show the reality of the poem: Since the Shakespeare’s sonnets represent the reality in our societies, people should be able to see this reality through the critical essay. Unlike in the case of the poems, the essay should explain everything in detail, and assist readers to think about similar situations that either happened in their lives, or that could possibly happen in their lives. Shakespeare’s sonnets are not as hard to understand as people may think. However, they are important in shaping the thoughts and actions of people in society. The writers can therefore need to carefully select the sonnets,explore them critically using in depth investigation, and present them in well-structured critical essay writing.

Saturday, November 23, 2019

Hanks of Hair and Gobbets of Flesh

Hanks of Hair and Gobbets of Flesh Hanks of Hair and Gobbets of Flesh Hanks of Hair and Gobbets of Flesh By Maeve Maddox I read this in a mystery novel: A trapped cat would fight its cage until it tore off hanks of its own skin. I can imagine that a cat might tear off strips or chunks or even hunks of skin, but not â€Å"hanks of skin.† The word hank refers to something long and flexible like hair or yarn: After selecting and measuring a new hank of hair I tie the end off tightly with very strong thread.  (Directions for rehairing a violin bow.) Many luxury yarns are  sold  in hanks, which must be wound into balls before you can knit with them. Heres a quick and easy way to handle a  hank of yarn. Gobbet conveys the idea of a lump or clod of something: She was spattered with blood, bits of cloth, and  gobbets of  smoking flesh.   Gobbets of  blubber spill to wind and weather. The bubbles throw off small  gobbets of  hot mud. Here are some words to convey a lump of something: blob chunk clod clot clump dollop glob gob hunk knob nub nugget wad Here are some words to convey the idea of something long and flexible, like a hank: coil skein length loop twist lock ringlet curl Bonus: One of my favorite lines of creepy verse is this one in a poem by Kipling: A fool there was and he made his prayer (Even as you or I!) To a rag and a bone and a hank of hair, (We called her the woman who did not care), But the fool he called her his lady fair- (Even as you or I!) The poem was inspired by a painting by Burne-Jones. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:20 Computer Terms You Should KnowHow to Punctuate with â€Å"However†One "L" or Two?

Thursday, November 21, 2019

Critical Thinking paper in Health Care Essay Example | Topics and Well Written Essays - 500 words

Critical Thinking paper in Health Care - Essay Example When he was experienced the creativity decreases, which makes him apply his known and time tested strategies and techniques he found successful. This is in general but not be certainly Work setting depends upon nature of work and work place. If the nature of work is individual one has enough free hand to set it according to his convenience. For instance, a teacher in a school can work according to his own plan and setting regarding his duties in class room and correction of Answer sheets. But in the case of a marketing executive it depends on his superiors, subordinates and the clients he has to meet and melt. When it comes to the work in a back office it depends on the work culture of that office and the nature and pace of doing work of his colleagues. The situation is different in case of front office. There, the work setting depends upon the people they meet and talk. All the aforesaid cases are the instances of subordinate services. If one has to lead a team (smaller or bigger) he has to plan every thing in advance and must be able to guide his team mates. Here the work setting needs a good home work, alertness and planning. When one member abstains from work or will take leave, the work setting depends on the team leader.

Tuesday, November 19, 2019

Critical Perspectives on Management and Organizations Essay

Critical Perspectives on Management and Organizations - Essay Example exualization in the workplace as will be covered by this paper is important because although the impulse to desexualize their operations is found to be quite pervasive across most organizations, it has nevertheless been by most people as being an ideal that will essentially never be realized in full. In her article Sullivan (2014) notes that one of the most popular arguments surrounding desexualization was presented by Burrell (1984) who argued that sexual relations generally tend to exist as a dialectic of resistance and control in a situation whereby the active presence of sexual acts and desires generally exist alongside the impulses to control sexuality. This argument as presented by Burrell (1984) is interpreted as meaning that despite the concentrated efforts on the part of our social impulses to try and create what will be a desexualized society, this feat is nevertheless quite impossible and can never be accomplished in its pure form. In his article, Burell (1984) further goes on to call out both the suppression and general expulsion of sexuality as essentially having beein developed as a form of managerial control, in addition to this, Burrell (1984) also suggests that undertaking to implement a re-eroticization experience of labor might potentially have the effect of signifying resistance. This paper is important as it will show the arguments presented by Sullivan (2014) to show that attempts geared at trying to expel sexuality not only from the various individual employees working on organizations, but also from labor, client relations, organizations and occupations has the effect of creating as opposed to helping mitigate some of the ongoing gendered problems. One of the main gendered problems that will be comprehensively analyzed as presented by Sullivan (2004) is that impulses to desexualize organizations and workers tend to as a necessity exist alongside the sexualization of places and bodies. The paper is crucial to this topic as it examines

Sunday, November 17, 2019

Carl Gustav Jung Essay Example for Free

Carl Gustav Jung Essay In this essay I will aim to demonstrate an understanding of Jung’s Personality Types by describing and evaluating his theory and show how they might be useful in helping me to determine therapeutic goals. I will also look at some of the criticism levelled at Jung’s theory,I think this allows the therapist,ie myself to better understand the positive from the negative. I am also of the opinion that detailing Jung’s early years and background play am important role in the overall evaluation. I have particular interest in when Jung met Freud and how this meeting of minds shaped or maybe changed their individual conclusions. I will cover this later in my essay. Carl Gustav Jung was born July 26, 1875, in the small Swiss village of Kessewil. His father was Paul Jung, a country parson, and his mother was Emilie Preiswerk Jung. He was surrounded by a fairly well educated extended family, including quite a few clergymen and some eccentrics as well. By the age of just six years old Jung started to learn Latin which started an interest in language and literature, especially ancient literature. Jung read several ancient languages including ‘Sanskrit’ the original Holy Hindu language book. Jung was a distant youth whilst growing up who did not enjoy his schooling years and was not competitive. Jung’s later education was in Basel, Switzerland where he attended boarding school where he found himself the centre of jealous pestering. Carl Jung began to use sickness as an excuse, developing an embarrassing tendency to faint under pressure. Carl Jung’s first career choice was archaeology; Jung went on to study medicine at the University of Basel. Whilst working under the well-known neurologist Krafft-Ebing, he established himself on psychiatry as his career. After graduating, he took a place at the Burghoeltzli Mental Hospital in Zurich under Eugene Bleuler, an expert on schizophrenia. In 1903, Jung married Emma Rauschenbach. He also taught classes at the University of Zurich, had a private practice, and invented word association at this time. (internet  search) In 1907 Jung met Freud. Freud would be seduced by the esteem and personality of Jung and would soon see in him the spiritual son that could guarantee the survival of psychoanalysis. The unwillingness of Jung towards the Freudian Theory referred to the role of sexuality in the psychic development. In fact Jung on no occasion completely embraced the sexual theory of Freud. From 1912 onwards Jung found himself more and more distant from Freud’s writings. By abandoning the winding and indirect of Psycho-sexuality, Jung would launch himself in the fields of spirituality and science which was understood by only an initiated few. Jung’s inner world became something for him to study and develop his theories on and during this time Jung evolved the goal of his psychology of individuation, which is the achievement of the self and other guide marks, such as the archetypes, the collective unconscious. Jung’s theory stresses the importance of understanding our personal unconsciousness (events, feeling, behaviour patterns that we have buried in our subconscious from our own direct past) and the collective unconscious (patterns, trends, traits, behaviours that all humans have no matter what background or culture have running through our lives). Whereas Freud believed the unconscious was suppressed by the human mind. Jung in the other hand believed the unconscious mind was where the conscious mind had its origins and where our psyche begins or is created from. Balance was the key for Jung, which he believed the balancing of the two sides is what drives us humans ‘towards’ or ‘away’ from goals. The foundation of the mind that consisted of the EGO (who we think we are); the SHADOW (the part of us that we deny or do not acknowledge) was developed by Jung. He continued to believe our mind was constantly developing or moving towards our true self (individuation) and this journey was fuelled by natural laws, the principles of opposites, that every aspect of our mind has an opposite force. The principle of equivalence that equal amounts of energy are given to both sides, and the principle of entropy, that everything natural winds down as energy is evenly distributed, eventually with the opposing side blending together creating a harmony. Jung believed that our  mind’s voyage followed a repeating in the ‘rites of passage’ for birth, marriage and death, mirrored throughout all cultures and peoples. Jung believed that this drive to move towards a state if harmony or individuation, was fundamentally important to us all. Jung spent a good deal of time and energy on the importance of dreams and getting to understand what their meanings meant to each individual. Jung believed that by understanding the imageries within our dreams we would benefit a better knowledge of ourselves. He indicated that dreams should not be interpreted too accurately, but considered for finding personal meanings in the imaginary or symbolism. Jung also recognised and identified two opposites of personality; 1. INTROVERSION 2. EXTROVERSION Introversion – when psychic energy is turned inwards towards our inner world. These people tend to be thoughtful people with reserved natures, preferring their own company and evading large groups, they may be cautious and uncertain, disliking change or new things, they may seem defensive and they like privacy and personal space and spend a lot of time in contemplation. Extreme forms of introversion have similar qualities to autism and some forms of schizophrenia. Extroversion – is when the movement of energy is turned outwards towards the outside world. An extroverted person would show interest in the outside world, they will be objective and frank with helpful and easy-going personalities, they like action and people around them, extreme versions of extroverts would be hopeless alone and not able to bear silence or solitude, needing continuous excitement and external inspiration to prevent boredom or unhappiness. Jung also identified four different functions (attitudes) of the mind; THINKING – when a person connects to the world via reason and intelligence. These types will have thinking searching minds, always questioning. They  will be good at judging things able to see the origin and results, and will reach logical decisions. They may be open and appear cool and detached emotionally, and will be good at adjusting to new situations. FEELING – when a person makes worth decisions about the world based on how they feel about something, putting ideas, points, and issues in order based on how they assess them and not on emotional feelings. Feeling people have a sturdy sense of traditional values and human connection is significant to them as they tend to be warm and creative. SENSATION – when a person relies sensory impressions – perceptions. These people rely on sensory impressions, how certain things appear, feel and sound. They tend to be mentally and emotionally stable people, taking things at face value, they can be seen as dull and boring which often be easy going and fun, with a calm nature. INTUITION – when the world is understood or interpreted in a particular way mainly through the unconscious – when people speak of having a hunch, gut feeling or instinct about something, this type of person is conscious of changes. Possibilities can appear distracted or ungrounded; they will get bored of uninterested or boring details which are often not practical. They can be creative and inspirational. Jung believed that a person is essentially an introvert or an extrovert and this remains equally fixed, however, an individual will rely mainly on functioning using one of these four modalities but that opposing function also had an impression on their relationships and behaviour and these functions may adjust throughout life. He combined two attributes and the four functions to eight different psychological types. Jung understood that most people are a blend of two or more types, and that understanding how your own personality type and that of people around you related to the world would offer a deeper understanding of yourself. For example; bringing you closer to individuation. Jung trusts that we understand and recognised the strengths and weaknesses of our mind; that we would improve and achieve balance. The functions and attitudes are also not fixed with one side of the  pair leading, the other becomes unconscious. Jung believed that the unconscious part then finds a way of ex pressing its hidden self. A person’s conscious orientation will be towards one of the four functions; the leading or principle function – this will decide how you respond to experiences. 1.The dominant or principle function – this will determine how you react to experiences. 2. Auxiliary functions – mainly conscious. 3. The opposite auxiliary – suppressed and partially unconscious. 4. Remaining generally unconscious Jung believed when the conscious function was solid there was a trend for the opposing function to break through into the conscious occasionally in the form of hysteria, phobias and obsessions. He believed in order to achieve balance one must work with the repressed function in therapy which in this case has echoed Freud’s theory on repressed feelings and emotions surfacing unconsciously. These combinations of psychological types, Jung formulated into eight types, combining the two attitudes with the four functions; Extroverted and Introverted 1.Thinking Type, 2.Feeling Type, 3.Sensation Type, 4.Intuitive Type The above generalisation was Jung’s way of providing a structure in order to begin and to understand individual’s behaviours and feelings. Although these types are still current they form the basis of personality or psychometric testing (Myers-Briggs) which is still in use today. I believe the significance of this information is that it is an opening point from which to discover and explore our own or clients mind using a structure. Jung maintains that psychological types are mostly inborn and not acquired through life’s experiences. I concur with this belief, However, Jung  recognised that personality types were influenced as a child advances through life by factors such as parents and the amount of influence each parent has over a child, and social factors such as school, peer groups surroundings. Jung also believed problems (mental ill health) arose when external influences forced children into a pattern that goes against the natural energy flow of a person’s mind or psychological type. As with Freud, most of the theories of early pioneers are quite impossible to prove or test due to no scientific way of measuring them. Also the amount of patients used was in very small numbers and little practical work was done. Jung’s work has given foundations to many modern psychologies including theories to develop and explore further and deeper, including words that have been accepted by the modern language. For example; * Psyche * Extrovert * Introvert * Archetype These are parallels with other great psychologies – Freud, as I already mentioned and discussed, and the work of Hans Eysenck a more modern theorist. Eysenck was the first psychologist to make this trait or temperament business into something more mathematical: he gave long lists of adjectives to hundreds of thousands of people and used a special statistics called factor analysis to figure out what factors trait dimensions carry the most weight. He took results of this work and created a test called the Eysenck Personality Questionnaire (EPQ) instead of making these traits either-or, like Jung did, he saw them as dimensions. His first trait dimension was, like Jung, ‘extraversion-introversion’. But rather than say you were one or the other (an I or an E), he provided you a score on extraversion-introversion. Eysenck based his theories on Galen, an ancient Greek theory which was created around two thousand BC. It is one of the oldest personality theories around. Eysenck added on the two basic dimensions of temperament (like Jung) and these were based on four types (unscientifically based on the types of fluids he believed were washing  around the individuals body) a sanguine type, cheerful, optimistic and easy to be with, choleric, quick, hot tempered and aggressive. A phlegmatic type temperament, slow people who had a tendency to be sad, depressed and have a negative view of the world. Much simpler and much less sophisticated than Jung’s theory; Eysenck expands this into three dimensions of personality; 1. Introversion extroversion 2. Neuroticism emotional 3. Stability and psychoticism With five further subdivisions; 1. extroversion 2. agreeableness 3. conscientiousness 4. neuroticism 5. openness The theme of four (opposing) forces repeats throughout cultures and across time, North, South, East and West, Earth, Fire, Wind and Air. In religion(used my own as my example!) we see recurrences of types, for example; The Father The Son The Holy Ghost or the Virgin Mother The Crone Archetypal images we can recognise and begin to understand. These theories have a degree of objectivity, whilst they may give different labels to the personality types there does seem to be agreement that you begin to understand individuals if you can assess basic similar categories or repeating personality traits. Like Jung’s theory, and the teachings in the Bible (parables) perhaps these theories have value as a way of forming a framework for us to ask question, and discovering more of ourselves. CONCLUSION Jung believed each personality type or psyche was influenced by another, it is logical to assume that in all human relationships, mainly within an analyst/patient relationship, the analyst may encourage the patient so a subjective conclusion or true individuation may not be achievable. I feel it is important to recognise as Jung did that these types are not fixed and that a person’s personality or psyche changes throughout life and that energy flows and fluctuates between the opposing sides of our psyche so we understand that a person does not fit neatly into one of the boxes. Jung created this structure or framework to help work towards understanding of our own psyches and how better to relate to the world and people around us. Understanding how a person or patient feels, reacts and relates is obviously the first step to the beginning to help them. Being able to plan a patient’s healing journey will be more effectively tailored to them if we have a good understanding of why they think or feel the way they do and help them to understand this too. Jung believed that in order to heal, people need to learn to listen to messages from the unconscious mind, to follow their own path and think independently, and that in order to become a competent analyst you must ‘first understand yourself’ in order to efficiently help a client and to determine therapeutic goals,This is an ongoing journey of self discovery which this course is bringing out in me. BIBLIOGRAPHY Chrysalis – Diploma in psychotherapeutic counselling – year two – Module Three Carl Jung Resources, 2014 http://www.carl-jung.net/ What Freud really said – David Stafford-Clark WWW.Philosophy.lander.edu (Internet research) Wikipedia (Internet) Carl Jung – Dr. C. George Boeree http://worldtracker.org/media/library/Psychology/Boere Hans Eysenck – Dr. C. George Boeree http://worldtracker.org/media/library/Psychology/Boere Introducing Jung a graphic guide – Maggie Hyde Michael McGuinness Personality Types: Jung’s Model of Typology – Darl Sharp