Tuesday, December 24, 2019

Social Patterns Of Subculture And Crime Essay - 980 Words

#2 Discuss three different social patterns regarding subculture and crime, i.e., who are more likely to be perpetrators? Victims? Who is most likely to be incarcerated? What crimes are females more likely to commit than males? What is the â€Å"gender contract†? Every year, one out of five people is a victim of a crime in the United States. (8) Have you been a victim of a crime or committed a crime in the last year? In the U.S. approximately 12 million crimes are committed yearly. What factors attribute to crime? The 6 main factors of crime are gender, age, social class, urban/rural residence, race and ethnicity. (1) Poverty fosters large crime rates. Where you find poverty, you often find crime. Urban areas are commonly known to be densely populated. High population along with the close proximity of businesses provide criminals with larger amounts of potential targets. For many impoverished people, the potential benefits of crime outweigh the risks of being caught. The pressing need for material goods, such as food, can steer people to commit crimes. Often threats and violence produce larger quantities of goods, which provokes people to commit even more violent acts. These acts are carried out primarily by people from poorer segments of the population and who are more likely to live in urban areas. Racial and ethnic discrimination leads to anger and frustration that in turn can promote criminal behavior (2). On average African Americans and Latinos are much poorer thanShow MoreRelatedThe Theory Of Crime Theory1329 Words   |  6 PagesProbably the single most influential and certainly the best-known crime theory among all the sociological theories of crime is that of strain theory. Strain theories argue that there are certain socially generated pressures or forces that drive people to commit crimes. More specifically, the classic strain theories argue that people, particularly those of lower class status are pressured into crime when they are prevented from achieving cultural goals like monetary success or middle-class statusRead MoreYouth Deviance Essay1376 Words   |  6 Pagesof different things. Critically examine the theory of deviance with reference to young people and their membership in deviant subcultures or gangs. Deviance is associated with young people today and is rapidly on the increase within the street and school environment. Young deviants are engaging in gang membership and subcultures with a means of social belonging, social interest and ethnic identity. There are several sociological and subcultural theories which deem to explain deviance. Some ofRead MoreOutline and Evaluate Functionalist Explanation of Crime.1442 Words   |  6 Pagessees the source of crime and deviance located in the structure of society. Although crime and deviance might be stigmatised in society, some sociologist think it is important to have it occur and there are some benefits to it. Durkheim (1982) argued that crime is an inevitable feature of social life, because individuals are composed to different influences and circumstances, and so not everyone can be equally committed to the shared values and moral beliefs of society. Despite crime and deviance’s threatRead MoreRacial Differences Between Criminal Involvement And The Subculture Of Poverty1269 Words   |  6 PagesSocial class differences are used to explain racial differences in criminal involvement in the United States. Social Class is defined as a division of a society based on social and economic status. Usually when a person thinks about crime in the United States, he also thinks about the race of the person and the crime. Thinking about crime anywhere in the world is to think about why certain groups of population have more criminal activity and involvement than other groups. People usually focus onRead More Crime as Functional, Inevitable and Normal Essays707 Words   |  3 PagesCrime as F unctional, Inevitable and Normal Crime can be functional in bringing about social change - when social norms are unsuited with the conditions of life. A high crime rate is an indication of a social system that has failed to adapt to change. Deviance, acts as a warning device, indicating that an aspect of society is malfunctioning. Deviance may also act as a safety valve - a relatively harmless expression of discontent. For example the invasion of the HouseRead MoreThe Cultural Theory Of Crime And Violence1515 Words   |  7 PagesDefined, a subculture is a culture that exists within the main dominant culture of a society. Therefore, members of a subculture will have different norms and values to those in the rest of society, which in turn could lead to them being seen as deviant because of this. Youth subcultures provide members with an identity that sits outside of that assigned by social foundations such as family, school, home and work. Participants of a subculture often make people aware of their membership by makingRead MoreAccess to Opportunity Structures in Causing Crime and Deviance640 Words   |  3 PagesThere are many different factors that have to be considered when examining the role of access to opportunity structures in causing crime and deviance. Merton’s ‘Strain theory and anomie’ argues that deviance arises from the structure of society and that unequal access to legitimate opportunity structures is the cause of deviant behaviour. The main point that Merton’s theory outlines is the fact that people engage in deviant behaviour because they are unable to achieve socially approved goals by legitimateRead MoreCritically Discuss Three Sociological Approaches to Explaining Crime1188 Words   |  5 PagesCritically discuss three sociological approaches to explaining crime? One of the most predominant areas of study in sociology is in the explanation of crime and deviance in society. Criminal acts are those which violate established formal laws, whereas deviance refers to the breaking of social norms. Crime and deviance are a social construct as they are decided by the people in a society and can vary greatly depending on the society in question, as well as the time period being studied. In theRead MoreCriminal Activity And Its Control1851 Words   |  8 Pagesexplanations of crime and its control. Contemporary criminology uses scientific methodology, creating research data that looks at the larger issue of crime, being the social construct of ever altering societies and cultures. Contemporary criminology contains a wide range of theoretical approaches from which all take stands against the older theories like Lombroso’s classic theory ‘Born criminals’. As a result criminologists recognises that what is perceived as criminal activity and crime is constantlyRead MoreESSAY - Examine sociological explanations for the lower rates of recorded crime in rural compared to urban areas1414 Words   |  6 PagesQUESTION: ‘Examine Sociological explanations for the lower rates of recorded crime in rural compared to urban areas’†¦ A group of sociologists based in Chicago became known as Chicago School, and they argued that the growth of cities produced distinctive neighbourhoods, each with its own characteristic lifestyle. Shaw and McKay applied this perspective to their study of delinquency. Statistics from their study shows that 9.8% of crimes committed are usually found in the Central Business District (CBD). However

Monday, December 16, 2019

Criminal Record Management Free Essays

CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT TEAM NAME: THE constructorS THE GREAT MIND CHALLENGE 2012 CRIMINAL RECORD MANAGEMENT SOFTWARE REQUIREMENT SPECIFICATION Atal Bihari Vajpayee Indian Institute of Information Technology and Management, Gwalior, MADHYA PRADESH Team Guide: Dr. Anurag Shrivastava Members: NITIKA IPG-2011-070 HIMANI SHARMA IPG-2011-042 PRIYANKA AGRAWAL IPG-2011-082 Department: Information Technology 1 1 THE constructorS THE constructorS State: Madhya Pradesh CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT TABLE OF CONTENTS 1 Introduction: 1. 1 Purpose 1. We will write a custom essay sample on Criminal Record Management or any similar topic only for you Order Now Scope 1. 3 Definition, Acronyms, and Abbreviations 1. 4 References 1. 5 Tools to be used 1. 6 Technologies to be used 1. 7 Overview 2. 0 Overall Description 2. 1 Product Perspective 2. 2 Software Interface 2. 3 Hardware Interface 2. 4 Product Function 2. 5 User Characteristics 2. 6 Constraints 2. 7 Architecture Design 2. 8 use Case Model Description 2. 9. 1 Class Diagram 2. 9. 2 Sequence Diagrams 2. 10. 1 ER Diagram 2. 10. 2 Schema 2. 11 Assumptions and Dependencies 3. 0 Specific Requirements 3. 1 Use caTHE constructorS THE constructorS se Reports 2 2 3. 2 Supplementary RequirementsCRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 1 INTRODUCTION Police provides safety to citizens. It always remains steady for arresting any criminal who is a threat for the safety of society. After registering the FIR from any citizen, police starts its work and on that basis it arrests the criminals if proofs are found against them. Once the criminals are arrested, police starts investigation from them. After getting all the proofs against the criminal, it is the duty of the police to present all the proofs honestly to the court so that the right man can get right punishment. The true and right information provided by the people to police helps a lot in arresting the criminals who try to spoil the peaceful environment of society. Along with low salary scale, facilities of modern technology such as computerized system of keeping records are not provided to police department which causes low efficiency. As it is the age of computers and all the organizations today use computers to maintain their records, so this facility should also be given to police department in order to increase their efficiency and to save their time. 1. 1 Purpose- Purpose of this Project is to implement a CRM (Criminal Record Management). This is a database system in which police will keep the record of Criminals who have been arrested, to be arrested or escaped. This will help the Police department to manage their records easily. In police system when an incident occurs, a Petitioner reports an FIR (First Information Report). Police starts investigation according to law on this FIR. An investigation Officer supervises the investigation process. The main concerning people in the whole process are Petitioner (The person who files an FIR), Victim, Accused/Criminal, investigation officer. . 2 Scope: The Scope of the criminal record management includes:- The scope of the CRIMINAL RECORD MANGEMENT involves all the prohibitions record- data under CRM project and since it is a vastly implicated record by the crime related department therefore the scope though limited to be implicated yet. * Meant for 5 different users 1) Jail Superintendent 2) Polic e Officers 3) CBI officers 4) Administrator 5) Judge * All have their own profiles in CRIMINAL RECORD MANAGEMENT(CRM) Administrators maintains database, backup and restore data time to time. Police officer can look for criminal’s history, can transfer criminal to another jail. * CBI officer can look for details of any criminal. * Judge can look for criminal’s record, decide criminal’s punishment. * Police superintendent records all necessary data about a criminal and update databaseTHE constructorS THE constructorS 1. 3 Definitions, Acronyms ; Abbreviations: 1. 3 3 THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT CRM: criminal Record management. 2. HTML (Hyper Text Mark-up Language): It is used to create static web pages. . JSP (Java Server Pages): It is used to create dynamic web content. 4. J2EE (Java 2 Enterprise Edition): It is a programming platform, belonging to the Java platform, which is used for developing and runn ing distributed java applications. 5. WSAD (Web-Sphere Studio Application Developer): It is a designer toolkit which is designed to develop more complex projects by providing a complete dynamic web service. 6. WASCE (Web-Sphere Application Server Community Edition): It is an application server that runs and supports the J2EE and the web service applications. . DB2 (IBM Database 2): It is a database management system that provides a flexible and efficient database platform to raise a strong â€Å"on demand† business applications. 8. HTTP (Hyper Text Transfer Protocol): It is a transaction oriented client/ server protocol between a web browser and a web server. 9. XML (Extensible Mark-up Language): It is a markup language that was designed to transport and store data. 10. Ajax (Asynchronous Java Script and XML): It is a technique used in java script to create dynamic web pages. 11. Web 2. : It is commonly associated with web applications which facilitate interactive information sharing, interoperability, user-centred design and collaboration on the World Wide Web. 12. UML: Unified Modelling Language is a standard language for writing software blueprints. The UML may be used to visualize, specify, construct and document. 13. RAD: Rational Application Developer is a development tool that helps to design web pages and also helps to design the diagrams like ER, Database schema diagrams and to generate DDL. 1. 4 References: * IBM TGMC Sample Synopsis * IBM- www. ibm. in/develeporworks * THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Java- www. sun. com * Wikipedia- www. wikipedia. com * Complete Reference-J2EE * 4 4 Object Oriented Modelling and Design with UML-Michael Blaha, James Ram Baugh. * Software Engineering, Seventh Edition, Ian Somerville. * IBM Red Books. * Database Management Systems – Nava the. 1. 5 Tools to be used * ROSE/RSA / Web-Sphere Modeler * Eclipse/ RAD / Lotus Forms Designer / Portlet Factory * Web-Sphere Portal/ WAS/ WAS CE / WPS * DB2 Express – ‘C’ or DB2 UDB * Tivoli CDP/TSM / Tivoli Directory Server * Linux as the preferred OS. 1. Technologies To Be Used: * J2EE: (Servlet, JSP, JAXP, Java Beans) Application architecture. * JAVA: Application architecture. * WASCE: (Web-Sphere Application Server Community Edition) Web Server * DB2: IBM Database. * RAD 7. 0: Development tool 1. 7 Overview:- * A professional looking user interface with login IDs for criminals, police officers, superintendents, administrator and judge. * Once recruited all the users access their right to respected functions or actions as enlisted later. * Another component of this is the reports generated in response to:- a) Registration confirmations. ) Statement of security and privacy. c) Print outs for criminal’s history. * Functions/actions of – 1) Jail Superintendent * Register the new Criminal. * Record the Crime type and details of the crime. * Take the information like photo from 3 different view, blood group, finger print, retina scan and DNA information. * THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Search Criminal with any of the above input. * CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Update the new crime of existing criminal. * 5 5 Maintain the current location of the criminal (i. . Cell No. , Jail Name etc. ) * Maintain the records of meeting with outsiders. * Record the data of health condition if any. * Assign works. 2) Police Officers * Search the criminal by name/blood group/type of crime/Jail No. /DNA/Image/Sketch. * Transfer the criminal to another jail. * Access full information of criminals. 3) CBI Officers * Search the criminal by name/blood group/type of crime/Jail No. /DNA/Image/Sketch. * Access full information of criminals. 4) Administrator * Maintain the database. * Grant/Revoke role to/from other Users. * Backup and restore of data. * Monitor the Jail Administration. ) Judge * Access information of criminals. * THE constructorS THE constructorS Also access information about other Users. * CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Reduce/Increase the level of punishment. * 6 6 Transfer the criminal to other location. * Constraints – a) The content and graphical user interface is in English. b) Login and password is for identification. c) The allowed person is allowed to access the database only upto a limited extend. d) This system is limited to HTTP/HTTPS. e) This sy stem is working for single server only. 2. 0 Overall Description:- 2. 1 Product Perspective: THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 2 Software Interface: * Client on Internet Web Browser, Operating System (LINUX preferred) * Web Server WASCE, Operating System (LINUX preferred) * Data Base Server CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT DB2, Operating System (LINUX preferred) * Development End RAD (J2EE, Java, Java Bean, Servlets, HTML, XML, AJAX), DB2, OS (LINUX preferred), Web-Sphere(Web Server) 7 7 2. 3 Hardware Interface: 2. 3. 1 Client Side: * Browser- Internet Explorer, Mozilla Firefox,NN, * Processor- All Intel or AMD- 1 GHZ Ram- 256 MB * Disk space- 100 MB 2. 3. 2 Server Side: * For RAD * Processor- All Intel or AMD- 1 GHZ * Ram- 2 GB * Disk space- 5 GB * For DB 10. 12 * Processor- All Intel or AMD- 1 GHZ * Ram- 512 MB * Disk space- 500 MB 2. 4 Product Function-The SIC client should be running on the client system so as to track the account details of the user. The server will only respond to those syste ms where the client is running THE constructorS THE constructorS 2. 5 User characteristics 1. General Users: They will be in a position to permit access to the users in the Internet and acknowledge their account status. 2. Administrators: They are the core users and are able to add new users to the system and permit them to access the Internet resources. They can also view in real time what a user is performing right now. They can also get the overall report of the user sessions. 3. Client Users: They login at the client level and this is to get access to the Internet at the client level. They can also view their account status in the client system. 2. 6 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Constraints – * 8 8 The content and graphical user interface is in English. * Login and password is for identification. The allowed person is allowed to access the database only upto a limited extend. * This system is limited to HTTP/HTTPS. * This system is working for single server only. 2. 7 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Architecture DESIGN- THE constructorS THE constructorS 9 9 2. 8 Use Case Model Description- CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Us er – User can log in after registration then look for site , give information like name, Location, other Information about the criminals. Administrator- Administrator monitors the details of criminals, aggregates feedback, Backup restore of data. Manager- Works same as administrator and also monitors , and works on input from feedback Public reviews – They query or give reviews on open web based funds listed for utilization, maintaining proper confidentiality 2. 9. 1 Class Diagram- User| Managers| Admin | User-name | User-id() | User-id() | Password| Password() | Password() | Sign-up() | Login() | Login() | Search-criminal() | Feedback() | Criminal()| Contact-details() | Criminal()| View-status()| Feedback() | | Add-new Criminal() | THE constructorS THE constructorS Login() | | 10 10 | CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 9. Sequence Diagram- THE constructorS THE constructorS THE constructorS THE constructorS 11 11 CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 10. 1 ER DIAGRAM- THE constructorS THE constructorS 12 12 THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT 2. 10. 2 SCHEMA- CRIMINALS| Name| Criminal id| Occupation| Date of Arrest| Date of bir th| Crime| Punishment Details| Address| Sex| Finger Print| Blood Group| Photograph| Punishment starts on| Punishment ends on| Bail (if given)| Health report| Unwanted activity during punishment| Jail Details| Site Admin| Name| Email id| Date of birth| Sex| Occupation| Qualification| Contact Number| Password | Country| Expert User| Name| Email id| Date of birth| Sex| Occupation| Qualification| Achievement| Contact_num| Password| City| Country| Registered Profile| Name| Email- Id| Sex| Password| Address| Date of birth| Contact Number| Police station| Station Id| Station Name| Station Location| Station In-charge| Lock up room| Lock up Number| Lock up Location| Room size| Maximum Capacity(allowed)| Present status| Criminal In Jail| Jail Id| Criminal id| MEDIA| Media Id| Media Name| Media Type| 13 13 2. 11 Assumptions and Dependencies Initially only two locations are connected to the SIC * Each location is always connected, whether an operator is logged on at the remote location or not * Each User must have a User-ID and password * There is only one Administrator. * Server must always run under Linux system * Internet connection is a must. * Proper browsers should be installed * Text readers should be ins talled to view the help files. THE constructorS THE constructorS CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT THE constructorS THE constructorS 3. GRAPHICAL USER INTERFACE- 3. 0 Specific Requirements – 1) The details within it should be defined as individual specific requirements, following the guidelines for sound requirements (verifiable, unambiguous, etc. ) (2) Specific requirements should be organized in a logical and readable fashion. (3) Each requirement should be stated such that its achievement can be objectively verified by a prescribed method. (4) Sources of a requirement should be identified where that is useful in understanding the requirement. (5) One way to classify the specific requirements is as follows 14 14 3. 1 Use Case Reports- CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT Use case| Description| Login| The user has to register for first time then log in| Update Profile| Information like current address, ration card etc. | Give feedback| Giving feedback to the manager| 15 15 THE constructorS 7 THE constructorS 7 Use case| Description| Login| The Administrator has to register for first time then log in| History of criminal| Keeps record and check of criminal| Aggregate feedback| Collect feedback from User| Give feedback| Give personal and collected feedback to manager| Ask query| Ask query to the manager| Use case | Description| Login | The Manager has to register for first time then log in| History of criminal| The Administrator has to register for first time then log in| Aggregate feedback| Collect feedback from user| Efficiency check| Checking the efficiency of database and administrator| Input from feedback| Reviewing feedback and involving concerned action| 16 16 THE constructorS 7 THE constructorS 7 3. 2 External Interface (Supplementary) Requirements-This should specify: (1) The characteristics that the software must support for each human interface to the software product. For example, if the user of the system operates through a display terminal, the following should be specified: * Required screen formats * Page layout and content of any reports or menus * Relative timing of inputs and outputs * Availability of some form of programmable function keys. CRIMINAL RECORD MANAGEMENT CRIMINAL RECORD MANAGEMENT the use of other required software products (for example, a data management system, an operating system, or a mathematical package), and interfaces with other application systems is specified below:- For each required software product, the following should be provided: * Name Mnemonic * Specification Number * Version number * Source For each interface: * The purpose of the interfacing software should be related to the software product. * It is not necessary to detail any well-documented interface, but a reference to the document defining the interface is required. (1) Safety Requirements-Highly recommend Kaspersky 2013 internet security to been Insta lled in users Pc to prevent the harm that may occurs by unwanted malicious software’s, phishing URLs and all the types of virus attacks during using this application. 2) Security Requirements-All users should be properly authenticated before allowed entry into the system authentication will be based on an E-mail address, and a password. All activities on the system must be logged. (3) Non-Functional Requirements- Secure access of confidential data (user’s details). SSL can be used. 24 X 7 availability. Better component design to get better performance at peak time. Flexible service based architecture will be highly desirable for future extension. 17 17 THE constructorS 7 THE constructorS 7 How to cite Criminal Record Management, Papers

Sunday, December 8, 2019

Bach Essay Research Paper Johann Sebastian free essay sample

Bach Essay, Research Paper Johann Sebastian Bach was born on March 21, 1685. He was born in the town of Eisenach ( Thuringia ) . Johann # 8217 ; s male parents name was Johann Ambrosius Bach.His female parents name was Elisabeth. Johann was their 8th kid. His two godfathers, who gave their name to the kid, were Sebastian Nagel, town piper, and Johann George Koch, a ducal forrester in Eisenach. He was bapitized in the Saint Georg # 8217 ; s church. The baptismal entry is dated March 23, 1685. Johann # 8217 ; s mother died in 1694 and his male parent died in 1695, so, as a kid of merely nine he had to populate with his eldest brother Johann Christoph. Christoph was the organist in Ohrdruf. Johann got his first cardinal board lesson from Christoph. He went to the Lyceum in Ohrdruf. While he attended this school he learned Latin and American ginseng in the choir. When his brother could no longer back up him, he left for Luneburg on March 15, 1700. We will write a custom essay sample on Bach Essay Research Paper Johann Sebastian or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page His best friend from school, Georg Erdmann, went on the journey with Johann. While he and Erdmann were in Luneburg they sang in the Mettenchor ( matin choir ) . They were paid money for making this and this is how he was able to go to the Saint Michel # 8217 ; s church. The school had an impressive musical tradition and had a celebrated musical library. The foundation was laid here for Bach # 8217 ; s musical involvement and his acquaintance with the seventeenth century German choir tradition. Johann traveled to Arnstadt in 1703 and it is here were he got his first serious occupation. He was appointed organist of the Neue Kirche and recieved a comparatively high wage. He became haunted with the organ and neglected his pattern with the male childs church choir. In 1705 he took a four hebdomad leave of absence to travel to Lubeck to acquire acquainted with the music of Dietrich Buxtehude.He was greatly influenced by the born music of Buxtehude. Alternatively of remaining merely four hebdomads, he returned to Arnstadt in 1706. The church was non amused.He found a new postion in Mullhausen and applied for his surrender in Arnstdat. His great plants during this clip were, Capriccio sopra La lontanaza del suo fratello dilettissimo, Wie schon leuchtet der Morgenstern, and the Prelude and Fugue in G Minor. In 1707 Bach married his cousin, Maria Barbara. He became organist of the Blasiuskirche in Muhlhausen. Bach remained at Muhlhause N for merely a twelvemonth before taking up station as organist and concertmaster at the tribunal of the Duke of Weimar. In 1717, Bach moved to another station as Kapellmeister at the tribunal of Prince Lepold in Cothen. He was in service to the tribunals, and he composed a great trade of instrumental music: 100s of pieces for solo keyboards, orhestral dance suites, three sonatas for assorted instruments, and concertos for assorted instruments and orchestra. His most celebrated concertos are the six Concerti Grossi composed for the Duke of Brandenburg in 1721. Bradenburg concerto no. 3 is the manner of cocerto grosso in which a little group of instruments is set in concert with an orchestra of strings and cotinuo. Of Bach # 8217 ; s music for solo instruments, the six Suites for Violoncello and Sonatas and Partitas for solo fiddle are among the greatest for these instruments. Maria died all of a sudden in 1720, holding borne Bach seven kids. within a twelvemonth Bach remarried to Anne Magdalena. Bach borne 13 hildren with her. Soon after his matrimony, Bach began looking for another place, and finally took one in Leipzig, where he became organist and choirmaster at Saint Thomas church. He remained in Leipzig for the remainder of his life. A devout Lutheran, Bach composed a great many sacred plants as his responsibilities required when employed by the church. He composed good over two 100 oratorios, several motets, five multitudes, three cantatas, and four scenes of the passion narrative. The Saint Matthew Passion, is one of the western music # 8217 ; s chef-doeuvres. Bach besides wrote a great trade of music for his favourite instrument, the organ, which is still regarded as the pinnacle of his repertory. One such work is the enormous, Passacaqlia and Fugue in C child. In 1749 Bach # 8217 ; s neglecting seeing was operated on by a going English sawbones, the ruinous consequences were complete sightlessness. Bach still continued to compose, ordering his work to a student. He eventually succombed to a shot on July 28, 1750. He was buried in a unmarked grave at Saint Thomas church. Bach achieved singular highs in the art of music. Choral polyphonic music and organ music, every bit good as instrumental music and dance signifiers were brought to olympian degrees. He achieved a great trade in his life-time. He was genuinely a ace of organ technique. 310