Free Essay

Discussion #2

In: People

Submitted By ysun33
Words 647
Pages 3
In this paper, I will try to compare two films, which are “Our Trip to Africa” directed by Peter Kubelka and “Puce Moment” directed by Kenneth Anger. After giving the story of the films, I will try to compare their soundtracks of which produce significant portions of their meanings.
Peter Kubelka’s 1966 film “Our Trip to Africa” is a remarkably unique bit of filmmaking. It is a very simplistic in its premise: a group of white Europeans go on a hunting trip in Africa: having fun, shooting wildlife, and interacting with the natives. However, one might already tell that this is not so simple, as the thought of these middle-class whites coming into contact with the indigenous blacks immediately stirs up an entire spectrum of emotion and phrases. In the article “Sound and Silence in Narrative and Non-Narrative Film” written by Fred Camper, Camper mentions that Kubelka’s technique is to marry “an image with a sound that derives from elsewhere”. In the film, Kubelka has employed a classic sound tactic: the laugh track. Not in a conventional sense, though. Kubelka’s laugh track is a much more realistically captured one, using one particularly raucous instance of guffawing, one the part of his European subjects, multiple times throughout the film. However, we do not see specifically where this laughter comes from, or if it is just one track of sound or even several loops of laughter played over each other; all we know is that at some point or points on this trip our Europeans were having a chuckle and Kubelka recorded it for use in this film. The track is played several times throughout the film, the most notable being in a depiction of the native people’s everyday lifeKubelka, in his use of quick, timeless cuts and a carefully used “laugh track”, very neatly does away with our preconceived notions of either the native Africans or the European bourgeoisie interlopers and then promptly uses that momentary objectivity to see the hunters and their posse as he saw them. It is, in this aspect, a very effective piece of persuasive filmmaking that utilizes both sight and sound in unconventional yet effective ways.
By contrast, Kenneth Anger in Puce Moment concentrates on another aspect of sound. Puce Moment is a short 6-minute film. This film opens with a camera watching 1920’s style flapper gowns being taken off a dress rack. The dresses are removed and danced off the rack to music. A long-lashed woman dresses in the purple puce gown and walks to her vanity to apply perfume. She lies on a chaise lounge, which leads her begin to move around the room and eventually out to a patio. In the article “Working in Light: Kenneth Anger” written by William Wees, he thinks the woman wears the dress is to “enjoy a ‘transporting’ experience” because as the pop songs on the soundtrack clearly announce: “my mind will listen to the stars… my mind is in the air. Yes, I am a hermit. My mind is not the same. Yes, I am a hermit, and ecstasy in my game.” Which proved that why the woman laughs ecstatically when she put her dress on at the beginning of the film. The soundtrack, which was added in the film, improved the main theme nicely.
In conclusion, both of the films are aimed to emphasize the meaning of their films throughout soundtracks. Nevertheless, in “Our Trip to Africa”, Kubelka tried to unite rhythmically as closely as lips and sound do in lip-sync. His technique allows the audience believes the sound in his film is in fact synchronous because his sound and image are perfectly matched. However, in “Puce Moment”, Anger did not focus on the synchronous sound. He tried to focus on the lyrics in the soundtrack to further suggest that the dresses are “’talismans’ of ’preternatural light’”.…...

Similar Documents

Premium Essay

Week 2 Discussion Questoins

...Supporting Activities Adam Kacho BSA 310 Business Systems October 23, 2012 Carlos Perales, MSCIS Discussion Question 1 • Discuss the role that preparing employees to recognize and respond to social engineering techniques should play in the organization’s overall information security program. Preparing employees to recognize and respond to social engineering techniques requires training, awareness, and accountability. By reviewing and following the employees organizational security policies through training, they can determine the appropriate response to whether or not they should provide sensitive information requested from them through social engineering. Guidelines are typically in place for employees to follow and generally include: • “Be cautious when someone requests sensitive information from you; verify the requester's identity and ensure that the requester is entitled to the information before giving it out. • Consider asking him why he wants the information, and then ask an authorized colleague whether or not the requester is actually entitled to the information. • Request proof of identity, whether on the phone or in person. If identification is provided or otherwise visible, verify its validity before providing the requested information. Don't be afraid to place the caller on hold, or get a number and call him or her back, so that you can verify the requester's identity and the validity of the......

Words: 829 - Pages: 4

Free Essay

Discussion Case 2

...Cánh gà nướng kiểu mới vừa dễ lại vừa ngon 14-04-201106:00:00 |In bài viết Andy - Theo PLXH * Bữa tối thơm ngon với thịt ba chỉ nướng vừng * Đùi gà nướng giòn ngon hơn KFC đây! * Tôm nướng tỏi siêu tốc thêm thời gian nghỉ ngơi cho mẹ Với những nguyên liệu cực dễ tìm và chút biến tấu sáng tạo, bạn có ngay một cách mới để món cánh gà nướng luôn luôn hấp dẫn và thơm ngon! Nguyên liệu: - 1kg cánh gà - 240ml Coca cola hoặc Pepsi - 220g đường nâu - 1 quả ớt, bỏ hạt bằm nhỏ - Một nhúm muối - Nước chanh từ 2 quả chanh - Hạt tiêu xay Cách làm: Trong một nồi nhỏ, bạn hoà tan Coca, đường nâu, nước chanh và ớt, đun trên lửa vừa - to: Khuấy đều tay cho tới khi có được syrup đặc, sánh: Cắt hoặc chặt cánh gà ra làm 3 khúc, rửa sạch, để ráo rồi cho cánh gà vào một tô lớn, rắc muối tiêu và trộn đều rồi cho ra khay nướng.  Rưới 1/2 chỗ syrup lên cánh gà: Bật lò ở 180ºC, nướng mỗi mặt gà khoảng 10 - 15 phút. Mỗi 10 phút bạn lại lấy khay nướng ra và phết đều chỗ syrup còn lại lên cánh gà để nướng xong cánh có màu vàng đẹp nhé! Cánh gà nướng có vị ngọt ngọt cay cay rất dễ ăn. Nếu nhà có trẻ con bạn hãy giảm bớt lượng ớt hoặc thay thế ớt quả với tương ớt....

Words: 258 - Pages: 2

Free Essay

Discussion Board Unit 2

...Unit 2 DB Subjective Probability “ A probability derived from an individual's personal judgment about whether a specific outcome is likely to occur. Subjective probabilities contain no formal calculations and only reflect the subject's opinions and past experience.” (investopedia.com, 2013) There are three elements of a probability which combine to equal a result. There is the experiment ,the sample space and the event (Editorial board, 2012). In this case the class is the experiment because the process of attempting it will result in a grade which could vary from an A to F. The different grades that can be achieved in the class are the sample space. The event or outcome is the grade that will be received at the end of the experiment. I would like to achieve an “A” in this class but due to my lack of experience in statistical analysis, my hesitation towards advanced mathematics, and the length of time it takes for me to complete my course work a C in this class may be my best result. I have a 1/9 chance or probability to receive an “A” in the data range presented to me which is (A,A-,B,B-,C,C-,D,D- AND F). By the grades that have been posted I would say that the other students have a much better chance of receiving a better grade than mine. I have personally use subjective probability in my security guard business in bidding on contracts based on the clients involved , the rates that I charge versus the rates other companies charge and the amount of work......

Words: 344 - Pages: 2

Premium Essay

Week 2 Discussion

...Pro 595 Week 2 Discussions Key Risk: 1. Key risks that exist for any project are risks that impact the scope of the project, the schedule of the project and the cost of the project. The timeline involved with these risk would follow the course of the project itself and would need to be determined early on to avoid major problems, delays and increases in budget to that particular project. If the project scope is impacted due to risk, the schedule of the project can and will change which therefore could increase the cost of the project and make it no longer feasible to pursue. Delays or changes in schedule for planned risk or even unplanned risk do not necessarly impact the scope, however it does impact the cost of the project. Risk associated with cost impact both schedule and scope of the project because if the project cost more due to risk the project may need to be scaled back and have items removed and the opposite can happen as well, additional items may need to be added and impact the timeline or schedule that was already planned for the project. 2. Risk should be categorized based on which risk is more likely to occur or probability, then its severity. For example, at a construction site, the likely hood that bad weather will occur should have a high probability but it can have a severity that ranges from low to high depending on the season and the type of weather that can occur at that time. Bad weather itself can cause delays to schedule and the overall......

Words: 789 - Pages: 4

Premium Essay

Discussion 2

...Assignment #2 A. Punctuate the following sentences in a correct way 1.Are scientist sure there is water on Mars? 2.I don't know if I can help him,but I'll definitely try. 3.They say that the best things in life are free! 4 After we eat lunch, we're going to work on the chemistry project. 5.The test includes;reading,vocabulary,and grammar sections. 6.Bruce went running down the street, the huge rat was too much for him! B. correct the punctuation mistakes and add punctuation when necessary. 1.To get to Burlington ,you have to drive to the train station,take the train,and get a taxi. 2. Do you know where Maggie put the envelopes? 3.We need to print 200 newsletters this week—even more than last week! 4.Wow! 5.Randy looked at the ground, and sighed,it was all he could do. 6.The Train leaves in an hour;but you need to buy the tickets first! Write a letter to a friend about a movie you have seen or a book you have recently read. Dear Lindsay, I just read The hunger Games and Catching Fire, I cant believe I did it !They are so amazing,and good .I honestly recommend them to you; you like things like that action , horror, sci-fi and futuristic books .So I wonder why haven't recommended them to you before? Katniss is my new hero, Because even tho she got into trouble—didn’t expect to become such a role model in all of the district to cause that massive rebellion. This is some of the reasons why you should read them : They are a action packed......

Words: 320 - Pages: 2

Premium Essay

Week 2 Discussion

...a. Students whose names begin with the letters Q – S: Research and explain the Operation Ceasefire in Boston. Will programs like Operation Ceasefire be able to reduce crime? If so, how? Your initial post should be at least 250 words in length. Support your claims with examples from the required material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your classmates’ posts by Day 7. Each classmate must be from a different group, other than your own. Responses to your peers should be at least 100 words in length. Remember that this is a discussion. If a classmate or your instructor asks you a question, it is your responsibility to respond. “Operation Ceasefire” was originally developed by the Boston Police Department’s Youth Violence Strike Force.  Operation Ceasefire is a problem-solving police strategy that seeks to reduce gang violence, illegal gun possession, and gun violence in communities. The goals of the program are to carry out a comprehensive strategy to apprehend and prosecute offenders who carry firearms, to put others on notice that offenders face certain and serious punishment for carrying illegal firearms.  The program targets high-risk youths as well as serious and violent juvenile offenders (Crime Solutions.gov, unk). The program is just one element of a collaborative, comprehensive strategy (which also includes the Boston Gun Project and Operation Night Light) implemented in Boston, Mass., to address......

Words: 366 - Pages: 2

Premium Essay

Discussion Board Unit 2

...Discussion Board Unit 2 Comp101/1401B Introduction to Computers A. Questions for weekly discussions and conversations. 1. Why are clip art libraries useful, not only in Word , but also in PowerPoint? Clip art libraries are useful to show pictures to your words. They are great for making your documents or slide shows more exciting. Clip art actually can draw attention to get the readers to focus on the project or document itself. 2. What are the copyright laws that must be followed when using clip art? The right of legal use of clip art depends on the intent of the copyright owner. Copyrighted clip art is off limits for commercial use unless you have a written agreement with the copyright holder. For instance, if you sold Nike products in your store, you would have the right to use their logo for advertising. If you didn’t sell Nike products then it would be illegal for you to use their logo without permission. 3. When might it not be appropriate to use clip art? Clip art probably wouldn’t be appropriate in legal and professional documents. It wouldn’t be professional if clip art was used. B. If you have not used clip art before, find 2 sites on the internet, and provide at least 1 example of when each site could be used in a practical way. Include the type of clip art found at the sites, including categories or special interest areas for the site. The first site that caught my eye was ClipartHeaven.com. The clip art ranges......

Words: 343 - Pages: 2

Free Essay

Unit 2 Discussion

...Unit 2 Discussion 1: Identifying Layers of Access Control in Linux Learning Objectives and Outcomes * You will be able to identify various layers of access control in a Linux server environment. * You will make security recommendations using different layers of access control. Assignment Requirements Really Cheap Used Computers, Inc. is an online seller of old school computers. The organization’s e-commerce Web site runs on a Linux server. The server is located at the organization’s local office in Boston, Massachusetts. The company has experienced tremendous growth and has hired you as the new security analyst. You access the server and find that there are virtually no layers of security other than the passwords set for user accounts. Discuss at least three layers of access control that can be put in place on this server to create a more secure environment. Rationalize whether the given scenario represents discretionary access control (DAC) or mandatory access control (MAC). Participate in this discussion by engaging in a meaningful debate regarding your choices of the three layers of access control in Linux. You must defend your choices with a valid rationale. Summarize your thoughts in a Word document and submit it to your instructor. Required Resources None Submission Requirements * Format: Microsoft Word * Font: Arial, Size 12, Double-Space * Citation Style: Chicago Manual of Style * Length: 1–2 pages * Due By:Unit 2 Assessment......

Words: 568 - Pages: 3

Free Essay

Cmis Discussion 2

...cost of Gas Input costGas //Input cost of Gas Write(“Enter the cost of Food”) //Prompt user for cost of Food Input costFood //Input cost of Food Write(“Enter the cost of Lodging”) //Prompt user for cost of Lodging Input costLodging //Input cost of Lodging costTotal=costGas+costFood+costLodging //Calculate the total cost of the road trip Input costTotal //Input total cost End //Ends Prompts Submodule DisplayOutput //This submodule will display costTotal Write(“The total of the prospective Road Trip is $” costTotal) End //End DisplayOutput Test Plan Test Case | Input:GasFoodLodging | Expected output:Total Cost | 1 | 505050 | The total cost of the road trip = $ 150 | 2 | 120200300 | The total cost of the road trip = $ 620 | 3 | 152562 | The total cost of the road trip = $ 102 |...

Words: 478 - Pages: 2

Premium Essay

Amba 620 Discussion 2

...counterproductive behavior of an employee. Counterproductive behavior can be defined as employee behaviors that intentionally hinder organizational goals accomplishments. Threats associated with these behaviors include a number of things such as sabotage, theft, property deviance, production deviance, wasting resources, substance abuse, gossiping, political deviance, harassment, and personal aggression (Colquitt et al., 2015). Risks that factors in an organizational resource consist of an employee to be withdrawn. Colquitt et al., (2015) expresses there are physical and psychological withdrawal behavior within an organization. Physical withdrawal can be expressed in four ways, employees may respond to negative work events that are: (1) exit, (2) voice, (3) loyalty, and (4) neglect. Whereas, psychological withdrawal that includes daydreaming, socializing or conversing, looking busy or preoccupied, moonlighting, and cyberloafing (Colquitt et al., 2015, p. 83). Organizational commitment is desired upon the manager to remain loyal to the organization. (Colquitt et al., 2015, p. 83). As stated by Colquitt, Lepine & Wesson (2015), commitment and withdrawal are negatively related to each other – the more committed employees are, the less likely they are to engage in withdrawal. Organizational commitment is an essential concept because what employees are thinking or feeling matters. Ultimately, employees is what keeps an organization running effectively, if there is no structure......

Words: 758 - Pages: 4

Premium Essay

Discussion Board Question 2

...According to your textbook, what are the dates for Jesus’ birth and death? Jesus’ birth is one of the most remarkable and glorious activities to ever take place on earth. There has always been speculation surrounding the exact birth date of our Lord and Savior. December 25th has been assigned and universally recognized as the birth of Christ. According to the text, although no definitive concensus was met to explicitly state when Jesus was born, it is a toss-up between Matthew’s account of Jesus birth and Luke’s account. Based on Matthew 2:1, “Now after Jesus was born in Bethleham of Judea in the days of Herod the King, behold, wise men from the east came to Jerusalem…” in juxtaposition Luke 1:5 has nothing to do with Jesus’ birth, but rather John the Baptist’s. [1] What are the critical datum we use to attain these dates? Moreover, the text settles on the notion that Jesus birth was possibly around 4 BC. More specifically the text states, “Both the Western Church (December 25) and the Eastern Church (January 6) celebrate the birth of Jesus in the winter. None of the NT data is inconsistent with a mid-winter date. If the traditional dates approximate the actual date of Jesus’ birth, Jesus was probably born in the winter of either 7-6 BC, 6-5 BC, or 5-4 BC, with a 5 BC date for Jesus’ birth being perhaps the most likely” (Kostenberger, The Cradle, The Cross, and the Crown, 139). Similar to the contestation over Jesus’ birth; his death is no option. According to the......

Words: 637 - Pages: 3

Premium Essay

Nt2640 Unit 2 Discussion

... c. 192.168.12.1 d. 192.168.12.257 e. None of the above 2. Given the IP host address of 10.28.2.45 with the default class mask, which other host is on my directly connected network? f. 10.29.2.48 g. 10.28.244.254 h. 10.1.34.44.89 i. 10.238.1.54 j. All of the above 3. Given the IP host address of 172.16.200.93 with the default class mask, which other host is on my directly connected network? k. 172.16.4.94 l. 172.15.3.66 m. 172.18.5.111 n. 172.45.100.230 o. All of the above 4. Given the IP host address of 129.01.20.43 with the default class mask, which other host is on my directly connected network? p. 129.02.88.122 q. 129.08.20.44 r. 129.199.50.92 s. 129.01.202.55 t. None of the above 5. Given the IP host address of 191.253.10.77 with the default class mask, which other host is on my directly connected network? u. 191.253.01.77 v. 191.254.10.78 w. 191.252.10.01 x. 191.253.189.43 y. Multiple Answers Section 2 – Routing Table and Next-hop Selection 6. Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of 19.47.254.3? Address/Mask Next hop 19.46.0.0/16 Interface 0 19.47.0.0/16 Interface 1 19.52.43.0/24 Router 1 default Router 2 7. Given the following routing table on a router, which next hop will......

Words: 632 - Pages: 3

Free Essay

Unit 2 Discussion 1

...Unit 2 Discussion 1: Familiar Domains As an IT Admin you mainly deal with all seven domains, but the ones I deal with currently are work station, user domain and remote access. In any environment that you work with any of these 7 domains countermeasures are needed. It’s very important to make sure your network is secure and there are quite a few actions to take to ensure that it is safe as possible. Although no domains are 100% secured it’s always good to make sure all updates and patches are up to the most recent. I will also name a few other ways to protect certain domains in a typical IT infrastructure. Some countermeasures to take for user domain are making sure to have all users aware of security. Also have restricted access for a company’s terminal server and observe abnormal employee activity. Anti-virus is also needed to make sure the computers servers aren’t infected with malicious programs that cause loss in important documents. With a work station you can add a firewall to prevent unwanted traffic from infiltrating the network. Ensuring that your workstation has the latest service packs and patches update will also help protect any holes that could lead to hacking. Also with remote access it’s good to make sure only that person has access to certain files and must keep their password secure and not make a weak password so it does not get compromised. All these......

Words: 267 - Pages: 2

Premium Essay

Re: Week 2 Discussion

...March, and J. Olsen. "A Garbage Can Model of Organizational Choice." Administrative Science Quarterly . March 1972. Daft, Richard. Organization Theory and Design . West Publishing, 1992. Dawson, Roger. The Confident Decision Maker. Morrow, 1993. Graham, John R. "Avoiding Dumb and Dumber Business Decisions: Why Even the Experts Make Mistakes." American Salesman. April 1997. Gunn, Bob. "Decisions, Decisions." Strategic Finance. January 2000. Karlson, David. Avoiding Mistakes in Your Small Business. Crisp, 1994. Magasin, Michael, and Frieda L. Gehlen. "Unwise Decisions and Unanticipated Consequences." Sloan Management Review. Fall 1999. Roe, Amy. "One of the Most Ticklish Jobs is Decision Making." The Business Journal. June 2, 1997. Read more: http://www.referenceforbusiness.com/small/Co-Di/Decision-Making.html#ixzz422pEvUX6...

Words: 2167 - Pages: 9

Premium Essay

Discussion Board 2

...Discussion Board Forum Liberty University BUSI 642 Employment Cycle Taking on the responsibility of hiring a new worker is one of the many functions within the human resources field. I would approach hiring a new worker for my unit by following the establishment phase of the employment cycle. Based upon text published by Wiley and Sons, the establishment phase of the employment cycle consists of “identifying staffing needs, job analysis, recruitment, selection, employment arrangements and remuneration”. Considering that I have been given the task for conducting the recruitment and selection process; I would begin by determining what the company’s staffing needs are. Forecasting Labor Supply and Demand. Gomez-Mejia et.al (2016) discusses the human resources labor supply and demand. Labor supply is defined as “the availability of workers with the required skills to meet the firm’s labor demand. In other words the labor supply consists of the employees that already work for the company who have the capability to perform the job as outlined in the job description. Labor demand is defined as the amount of workers the company will need in the future to meet the needs of the company (Gomez-Mejia, Balkin, & Cardy, 2016, p. 155) .According to Lunenburg ( 2012) the planning function of the human resource management process consist of “defining an organization’s goals, establishing a strategy for achieving those goals, and developing a comprehensive set of plans to......

Words: 1048 - Pages: 5

new women's 86 Tops Loose dress baseball T-shirt W53 €24,06 Verkäufer akzeptiert PayPal Gekauft von 100+ | As Cartas de Madre Teresa (The Letters) 2015 | Best Sellers