Thursday, October 31, 2019

Benefits of immigration in canada Essay Example | Topics and Well Written Essays - 500 words

Benefits of immigration in canada - Essay Example We can call it a safe country. One feels comfortable in any part of the country without the threat of terrorism or violence. People are guaranteed protection even in bigger cities like Ottawa and Toronto. They do not feel as if they are being neglected because they are not in their own homeland. There is Canadian social help system which does not make you feel unaccompanied when you are facing difficulties settling down. There are a lot of government sponsored programs and courses that support you in your hard times. For example, if you lose your job, you will be supported through a government funded program to back up your finances until you find a new job. Canada is one of the developed countries whose economical infrastructure is very strong. One can be sure to find a suitable paying job in this country. Most of the jobs are well rewarding making one feel comfortable with one’s life in Canada. Even if one’s family is not living in Canada, one can fully support them through the Canadian job income. Moreover, there are loving and caring communities in Canada which make your life even more pleasant. Canadian people welcome the immigrants with open arms and make them feel at home. They do not discriminate the immigrants on the basis of language, color, creed and caste. So, the new comers feel secure and protected. â€Å"Canada has long sought immigrants to populate the world’s second largest land mass†, write DeParle (2010). Immigration to Canada is relatively easier than immigration to any other country. You do not have to seek help from Canadian immigration lawyer and place application in case of simple immigration. â€Å"Being an immigrant is also no barrier to being a proper Canadian; in parliamentary elections earlier this month, 11% of the people elected were not native† (E.G., 2011). As for the country, the immigrants occupy different occupations thus enhancing the already stable economic system

Tuesday, October 29, 2019

History of education Essay Example for Free

History of education Essay Education is a topic that has been implemented on our generation more than ever before. However, it is not for the grades, degree or the income that education should be important to us. It is for the sake of learning and developing our character that education should be valued. When people go to school, they receive education and thus become educated, however, these people must keep in mind that a major portion of the world receives no form of formal education. Due to their good fortune, the educated people have responsibilities to the world. The first responsibility of an educated person is to help educate others. This may come in the form of teaching classes, tutoring, helping others or simply correcting errors. When we teach people we spread the value of education and share skills that are essential for survival. Other people are able to think rationally and evolve into a self dependent person through the knowledge they attain. Once people are educated, they are able to prevent others from taking advantage of them or cheating them. Through education, people are also able to use the resources they own efficiently and sparingly. Finally, education allows people from different nationalities and locations to communicate and work together in a beneficial harmony. The second responsibility of an educated person is to aim to advance to a better future. It is through evolution that we have become more intellectual and learned. For this process to be beneficial and continuous, we must use it and upgrade it through our use. In the past, communication was a problematic process, today; we have e-mail accounts, cell phones, chat sites, video chat sites and messengers for instant communication. Presently, global warming and oil depletion are major complications. If we are able to advance and address this problem, we would be using our education beneficially. There would be less violence over oil and the future would be a less worrisome place if global warming was tackled. However, this is just one amongst the billions of changes we could make, all to create a better future. The third responsibility of an educated person is to create or maintain stability and order in the world. Through stability and order, the world  becomes a much safer place where people share respect for each other and live in harmony. When there is order, people are insured of payments for their services. They are motivated to work-hard and use positive, instead of negative means to earn their income. Thus, through stability and order, ethics can also be implemented into people. Thus, the three main responsibilities of an educated person are to educate others, aim for a better future and create as well as maintain stability in the world. Through these goals, the world becomes a positive place and continues to flourish after each generation.

Sunday, October 27, 2019

Blowfish Algorithm Advantages and Disadvantages

Blowfish Algorithm Advantages and Disadvantages Blowfish is a keyed (piece of information that determines the functional output of a cryptographic algorithm or cipher), symmetric cryptographic block cipher. It was designed by Bruce Schneier in 1993. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is license-free and is available free for all uses. It is also a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish is also one of the fastest block ciphers in public use, making it ideal for a product that functions on a wide variety of processors found in mobile phones as well as in notebook and desktop computers. The first implementation of the Blowfish Algorithm in LabVIEW. With this set of subvis one can encrypt data in LabVIEW without the need of external software. This can be used to send data securely over Data socket as well as TCP and UDP communications along with protect remote control systems from unauthorized access, by encrypting the control communications. .( B. Schneier, Applied Cryptography, John Wiley Sons, New York, 1994.) 3.2 Strategies and Mechanisms Blowfish has a 64-bit block size and a key length of somewhere from 32 bits to 448 bits. The algorithm consists of two parts. One is a key-expansion part and one more is a data- encryption part. Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. It is a 16-round Feistel cipher and uses large key-dependent S-boxes (basic component of symmetric key algorithms which performs substitution). Each round consists of a keydependent permutation, and a keydependent substitution. It is also similar in structure to CAST-128, which uses fixed S-boxes. Blowfish is suitable for application where the key does not change frequently, like a communication link or an automatic file encryptor. It is significantly faster than most encryption algorithm when on 32-bit microprocessor with large data caches. (Fast Software Encryption, Cambridge Security Workshop Proceedings December 1993) 3.3 The Feistel structure of Blowfish A Fiestel network is a general method of transforming any function (generally called F- function) into a permutation. It was inented by Horst Fiestel and has been used in many block chiper designed. The diagram below shows the action of Blowfish. Each line represents 32 bits. The algorithm keeps two subkey arrays: the 18-entry P-array and four 256-entry S-boxes. The S-boxes accept 8-bit input and produce 32-bit output. One entry of the P-array is used every round, and after the final round, each half of the data block is XORed with one of the two remaining unused P-entries. The diagram to the right shows Blowfishs F-function. The function splits the 32-bit input into four eight-bit quarters, and uses the quarters as input to the S-boxes. The outputs are added modulo 232 and XORed to produce the final 32-bit output. Since Blowfish is a Feistel network, it can be inverted simply by XO7Ring P17 and P18 to the cipher text block, then using the P-entries in reverse order. Blowfishs algorithm initialize with the P-array and S-boxes. The secret key is then XORed with the P-entries in order and then use the same method to encrypt all the zero string. The consequential ciphertext replaces P1 and P2 then encrypt the new P1 and P2 with the modified subkeys. Now the output is P3 and P4. Altogether Blowfish algorithm will repeat 521 times in order to calculate new subkeys for the P-array and the four S-boxes. It is about 4KB data is processed. The blowfish uses a large number of subkeys. These keys must be precomputed before any data encryption or decryption. The P-array consists of 18 32-bit subkeys: P1, P2, P3, P18. There are four 32-bit S-boxes with 256 entries each: S1,0, S1,1,, S1,255; S2,0, S2,1,..,, S2,255; S3,0, S3,1,, S3,255; S4,0, S4,1,..,, S4,255. Figure 3: Feistel Network (John Wiley Sons, New York, 1994) As what mentioned above, blowfish has 16 rounds. The method of calculating it: The input is a 64-bit data element, x. Divide x into two 32-bit half: xL, xR. Then, for i = 1 to 16: xL = xL XOR Pi xR = F(xL) XOR xR Swap xL and xR After the sixteenth round, swap xL and xR again to undo the last swap. Then, xR = xR XOR P17 and xL = xL XOR P18. Finally, recombine xL and xR to get the ciphertext. 3.4 Key Expansion Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. The figure and the explanation of the Key Explanation of Blowfish are showed below Explanation for the Key Explanation of Blowfish figure : Step 1: Expand key to 576-bit XOR with P array Store results of 2 in P array Step 2: datal = 0x00000000; datar = 0x00000000; for (i = 0; i Blowfish_encipher(datal, datar); bf_P[i] = datal; bf_P[i + 1] = datar; } for (i = 0; i for (j = 0; j Blowfish_encipher(datal, datar); bf_S[i][j] = datal; bf_S[i][j + 1] = datar; } } 3.5 Application That Use Blowfish Method Below are the applications that using Blowfish Encryption: AEdit : A free Windows word processor incorporating text encryption. Coolfish: An encrypting text editor for Windows. Foopchat: Encrypted chat and advanced file sharing using a client/server architecture. JFile by Land-J Technologies: A database program for the PalmOS platform. Freedom by Zero-Knowledge: Privacy for web browsing, e-mail, chat, telnet, and newsgroups. JFile is one of the famous application that use blowfish method. JFile5 is the new version of the JFile. It is a flat-file database application for the PalmOS. There are 4 primary views in JFile 5.0. First is Main View, where it is the view that shows a list of all the JFile 5 databases that are currently installed on the Palm device. Second is New/Modify Database Structure View, this is the view when we are creating a new database, or modifying the structure of an existing database. Here is where we have to set the field names, the field types, the database name, and other elements of the database structure. The third view is Database View, this is the view that presented along when we tap on a database name from the Main View. The last view is Record View, this is the view that received when we tap a specific record from the Database View. In this JFile5 we can change the current method of security for each database by tapping the lock icon of the database on the main screen. There are three levels of security for databases in JFile5. The first level is the green/open lock where at this level the database contains no security, any user accessing the device can view and edit the database. The second level is the orange/grey closed lock, at this level the database is protected by the Security applications password (if it is set). To access this database, we will need to provide the password set in the Security application. This security level is appropriate for handing the Palm temporarily to a colleague so they wont have easy access to the database, but the information is not encrypted in any way. The third level is the red/dark closed lock at this level we will choose an encryption password for the database. The entire database will be encrypted, and we MUST remember the password to access the database. Due to the encryption, certain operations within the database will be slower. In addition, we will need to insure that any PC/Mac side utilities that we use w ith JFile support the encryption method. There are also some new features in this JFile5 where the maximum number of databases increased to 120 and it is improved use of color in the application compared to JFile4. There are 5 different sorts and filter settings can be saved for quick and easy usage, it is also easier to use because of the updated user interface. It is also has multiple locked columns for left/right scrolling in the main database view and the encryption of databases using 64-bit Blowfish algorithm. The VFS memory cards made easy movement of databases and have new calculated value field types. There are also default values for fields, read-only field options are also available with the Beam-Via-Coola (www.coola.com) support. They also enhanced resolution for Handera 330 devices, extensive keyboard input support and the Navigation of most common areas of JFile for JogDial equipped devices. The limitations for this JFile5 are 120 databases (1 in the demonstration version), 20 character maximum for field names, 50 fields maximum per databases, 4,000 characters per field of data, 10,000 characters per record of data and 16,000 records per database. 3.6 Hardware Architecture Pipelining is a famous technique for improving the throughput of computers, by using parallel elements so that several instructions can be worked on simultaneously. The basic idea of pipelining is to begin carrying out a new instruction before execution of an old one is completed. When pipelining is used, the number of steps in the basic algorithm is less important than fitting the steps into a framework so that they can be performed in parallel. The figure of the pippelining implementation are showed below These are processed separately (with delayed arithmetic carries shown in the figure as carry) and then combined at the end of processing. Even though more clock cycles are needed, the speed of the clock can be greatly improved, because smaller adders are required at each stage, with smaller internal propagation delays. (Malaysian Journal of Computer Science, Vol. 14 No. 1, June 2001, pp. 16-27) These are some examples of blowfish hardware architecture Figure 18: Chip Specifications What is this table? Explanation needed Mode Specification 0 Idle 1 Initial 2 Encrypt 3 DecryptTable 1: Mode Specification What is this figure? Explanation needed The controller is implemented as a Finite State Machine and described in a behavioral Verilog model. The figure and the explanation of the Finite State Machine are showed below Figure 20: FSM of Controller (Bruce Schneier, Applied Cryptography, John Wiley Sons, Inc. 1996) Explanation of Finite State Machine figure : e1: Finish loading data from ROM to SRAM e2: Finish initialization and mode != 1 e3: Finish encryption and mode != 2 e4: Finish decryption and mode != 3 Datapath includes ROM modules, SRAM modules, and the main arithmetic units of Blowfish. The figure showed below is the architecture of the datapath Figure 21 : The architecture of the datapath Explanation for the figure of the architecture : The  Ã‚ ° string is mapped to ROM_P and ROM_S-box. The P-array is mapped to SRAM_P, and the four S-boxes are mapped to SRAM_Sbox. Because the size of SRAM module is 2n words, P1 and P18 are implemented as registers, and the others are mapped to 1632 bits SRAM. We use a shift register under DataIn to expand 4-bit input to 64-bit input and a shift register over DataOut to reduce 64-bit output to 4-bit output. CORE implements the loop of the 16-round iteration. A pipeline stage is added to the output of the SRAM modules. The pipeline stages will double the performance of the Blowfish hardware but lead to the overhead of area. 3.7 Advantages and Drawbacks Blowfish is one of the fastest block ciphers in general use, except when changing keys. Each new key requires pre-processing equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers. This prevents its use in certain applications, but is not a problem in others, such as SplashID. In an application, its actually a benefit especially the password-hashing method used in OpenBSD uses an algorithm derived from Blowfish that makes use of the slow key schedule. Blowfish is not subject to any patents and is therefore freely available for anyone to use. This has contributed to its popularity in cryptographic software. The disadvantages of Blowfish are it must get key to the person out of band specifically not through the unsecured transmission channel. Each pair of users needs a unique, so as number of users increase, key management becomes complicated. For example N(N-1)/2 keys required. Blowfish cant provide authentication and non-repudiation as two people have same key. It also has weakness in decryption process over other algorithms in terms of time consumption and serially in throughput

Friday, October 25, 2019

Human Nature in Lord of the Flies Essay -- essays

Human Nature in Lord of the Flies Lord of the Flies, by William Golding, is a captivating narrative in which the reader lives through the trials and tribulations of a society set up and run by a group of marooned British teens. Golding believes that the basic nature of the individual is evil. The group ultimately proves this thesis by their actions. The evils of the individual are shown through the actions of the group’s hunter Jack, the murders of two members of the society, Simon and Piggy, the attempted murder of the group’s leader Ralph, and the ultimate destruction of the island. Jack has a natural longing to be number one, he was not satisfied with being the leader of the hunters, and this ultimately caused many of the conflicts in the novel. Jack as a senior member of the group felt that he had every right to be the leader and in this he caused the downfall of the society. He used the skills he learned as the leader of the hunters to turn the society against Ralph and the members that would not follow him in his quest to be number one. Simon is the...

Thursday, October 24, 2019

Disaster Management in Pakistan

On 26th October this year, thirty six trapped Chilean mine workers were rescued by drilling a deep hole into the mine. A month later, twenty nine mine workers in Newzeland died after remaining trapped for days in a mine. Poor disaster management cost precious lives. In Pakistan, too, Disaster management is not up to the mark. Be it the devastating earthquake, the catastrophic floods, the outbreak of fires or the aftermath of bomb blasts, the management was very poor.Certain measures like National Disaster Management Authority (NDMA), Provincial Disaster Management Authority (PDMA), and Rescue 1122 were taken but none has borne fruit yet. Lack of funds, scarcity of men and machinery, lack of awareness and preparedness of general public, hard demography, negative role of media, and delocalization of disaster management centers has added to the calamity of disasters. A realistic approach, proper training to workers and public, localization of disaster management centers, public awarenes s programs and positive role of media must be ensured for the proper disaster management in Pakistan.Until now almost every disaster has hit Pakistan but the required response is given to none. The October, 2008 earthquake in Northern areas of Pakistan is a grim reminder of the scale of disaster. Almost eighty thousand people died and many towns devastated. Though, no single government with limited resources can cope with such a calamity, yet our government’s response was much late in the hard hit areas. Timely and efficient response could have saved many lives.The recent floods of July-August have also seen the demonstration of poor disaster management in our country. Though, no country is prepared for such devastating floods, our government’s response could be much better. Instead of helping the people in the affected areas, our government set all their attention in appealing for aids to other countries and arranging conferences for the donor countries. The fire mana gement is also much poor. Few months ago when fire broke out in a female hostel in Rawalpindi, the management did not have the ecessary tools to bring the situation under control. Moreover, the aftermath of bomb blasts also shows that our country is not prepared to cope with the disaster-like situation. One of the main cause of this pathetic situation of our disaster management is that the workers are not properly trained to cope with any disasters. In other countries, proper training is provided to the workers in one field to cope with that particular disaster. Unfortunately in Pakistan, the same workers are hired for every disaster to cope with.Most of our disaster management organizations are not provided with sufficient staff and machinery. The workers are much less as compared to the scale of the disaster. Also, the workers do not have all the necessary equipments to deal a disaster. Moreover, the facilities like fast transport to the disaster point are also lacking. Our uneven demography also plays a big hurdle in efficient disaster management. Sometimes, the areas hit by a disaster are out of reach, thus, badly affecting the rescue activities. Hard demography also adds to the scale of a disaster.Even a minor disaster results into a bigger loss of life and property because of the demography of our country. This was observed in the recent floods whose originating point was the northern areas and brought devastations in other parts of the country. Delocalization of disaster management units is another cause of poor disaster management in Pakistan. All the units are controlled from the federal or provincial capitals which may become a hurdle in dealing with a disaster in time. Unawareness and unpreparedness of the general public is also one of the reason for poor disaster management.Our people do not know how to deal with a disaster when they are caught with. People, sometimes, use methods which may increase the scale of a disaster instead of controlling it . Also, most of the people are unprepared to deal with a sudden disaster which results into many losses. Lack of funds with the disaster management units is also a case of poor dealing with a disaster. The disaster management organizations do not have sufficient funds to buy the machinery necessary to deal with a disaster.In order to deal effectively with any disaster in Pakistan, the government must provide proper training to workers. This is how they can deal with a disaster professionally. Moreover, the government should confer proper funds to disaster management units. All the disaster management units must be delocalized. Disaster management unit in Chitral must not be monitored from Islamabad or Peshawar. A local management body can effectively deal with a local disaster. Public training programs must be initiated so that the general public is aware how to deal with a disaster.The youths must be trained in particular areas of disasters, like fire, flood, so that that can be ca lled whenever such disaster emerges. Moreover, special television programs should be aired to aware the people how to deal with a disaster effectively. Disaster management plays a big role in a country like Pakistan where disasters are most frequent. Though, in the past much attention was not given to disaster management in the country, the government must implement the above mentioned suggestions in latter and spirit to cope well with any disaster in future.

Wednesday, October 23, 2019

My trip to Rome (Roma)

It was the night of my dad's birthday that my godmother Jill explained how she had free air miles, and wondered if there was somewhere I'd most like to visit? Jill had already invited my mother to go with her. I replied, â€Å"I'd love to go anywhere†. â€Å"What about you where would you like to go the most,† I said. Her answer to this was â€Å"I would love to go to Rome† and I said, â€Å"That's where we should go†. By the time we got to the airport I was feeling rather hungry. I kissed and said good-bye to dad. Jill, mum and I waved goodbye to dad and headed in to the airport. Once we got in side it was really busy. It was hard to get through the people queuing up waiting to check in, so we squeezed through the people to the right checking desk. As we waited for our turn, even though it was busy we got our tickets and passports ready to show the lady behind the desk. When we finally made it to the desk we handed in everything and we where checked in in no time. After doing this Jill led us to the exclusive lounge. This is because she uses this airline a lot, which means she can sit in the lounge and have food and drink depending on what time of day it is. Here we waited and ate our breakfast before we were called for boarding. After an hour and half's wait we were called to board our flight. I grabbed my case and braced my self for the flight as we walked to the boarding area. We showed our tickets at the boarding desk and walked down the tunnel to the plane and took our seats. As I sat there looking out through the small window I started to feel nervous, but it was ok because mum and Jill reassured me. However, I was still a bit nervous and I found it hard to breathe as it was quite packed. When we started to takeoff I could feel my heart pounding in my chest and felt as if was going to pass out but luckily I didn't. I stared out the window as the land below became smaller and smaller. A little while in to the flight they hostesses came round with food and drinks for us, which was really enjoyable and tasty. For the rest of the flight I fell asleep and by the time I woke up we were in the motion of landing. Once we had landed and it was safe to leave our seats we left the plane and went to collect our cases. Then we boarded the airport train, which took us to the main train station where we went on a train to Rome. When we arrived at Rome's train station we had to walk down along platform, which was very busy, and we had to avoid being trampled by the herds of people that were heading towards us. Luckily once we were outside the train station we didn't have far to walk before we were at our hotel as it was only a couple of roads away. When we arrived at the hotel we went straight to the front desk to sign in and get the key to the room we were staying in. We took the lift to the third floor. Mum opened the door and I went in first and sat my case on the floor. Jill and mum followed after me. Jill and mum decided it would be a good idea if we unpacked and have a rest before we went out for our meal. We walked down the stairs to the ground floor and handed our key in before we left the hotel. As we walked we discussed where we were going to eat. Jill suggested that we eat at the restaurant just round the corner and that's where we went to eat that night. When we arrived there was an old man playing beautiful Italian music on his violin. We sat out side, as it was a warm night and there was good music. Jill tried to order dinner in Italian but to our surprise the waiter spoke better English than we did. For our appetiser we had thin dried ham and juicy orange melon. I wasn't sure about it but once I tasted it was really delicious. The second course I had pizza, which was delicious also because it had a buttery cheese topping on a really thin crisp base. By the time we had finish our meal it was late and we were all tired so we went back to the hotel to sleep. The morning after arriving in Rome my deep sleep was interrupted by the loud chiming of the church bells. I got up and went to see mum and Jill in the other room. I went into their room. They looked at me tiredly and I smiled at them. I said morning and went into the bathroom. When I came out they were dressed and ready to go down and have breakfast, so I changed into my clothes and followed them down to the restaurant. After we had eaten we went back to our room and got our things ready for the day ahead. Mum and Jill had planned what we were going to see the night before. The first thing we were going to see was the Trevi fountain and that's where we headed. When we arrived at the Trevi fountain it was swarming with people selling goods, advertising their restaurants, people who giving tours and people who had just come to see the fountain. Once we were closer I understood why there were so many people who had come to see the fountain. It was a wonderful and beautiful sight. The sculpture and the size were amazing. But there was one thing missing which would of given the full affect of the fountain ‘the water'. There was no water to be seen in it at all because it was being cleaned. We took a few pictures and headed to the next thing on our list, which was The Spanish Steps. When we arrived there the first thing that grabbed our attention were the monumental steps. As I looked up the steps I could see the church of SS. We walked up the steps to the church and had a look inside. After looking round the church we come out and walked back down the stairs and headed back to the hotel. As headed back we past the Trevi fountain that was now full of water and as it had gotten dark it was all lit up. This made it even more beautiful than be for and we stood and looked at it and toss a coin into the water of the fountain and made a wish. Over the next four days we were woken up at seven in the morning to the church bells chiming and going out at about half nine. We visited many of the main tourist attractions such as, Vatican City where we saw St. Peter's church and walked up the 320 steps to the top of the building, which was hard work, but the view was breath taking. We also walked around St Peter's square where people were having tours into The Vatican, which we joined. Inside The Vatican it was huge and the detail and sculptures were incredible. We also visited the Sistine Chapel after it had been restored to its original colours and the paintings were astonishing. When you looked up at the ceiling you could tell that each painting got bigger and bigger. This is where Michelangelo realised that the first scene was too small and made the next one bigger and so on. Then we went to The Colosseum where they were restoring it to its original state. But they've had to redo I what they had done because they had restored it wrong. We walked in and around The Colosseum where we took pictures and took in the remarkable building. We went from there to The Roman Forum where the remains of ancient Temples of all ages were still standing at incredible highs. The next thing we visited was the Monument to Victor Emmanuel ll. The size of this monument was the size of the houses of parliament. Then we went in to the Pantheon, which is also a monument. As we went inside this building the sculpture was startling. When I looked up, I noticed this hole in the roof that actually lets in the rain when it does. Following the Pantheon we visited Piazza Navona. This is a square with three big fountains going down the middle of it. We also visited the Villa Bognese garden, which was enormous. We walked through the garden as the sun shone through the leaves on the trees which sent a warm happy felling though my body. It such a beautiful day we found a mini restaurant in the garden, which we sat out side of with a cold glass of water each. We walked around the garden we notice that the pond had lots of terrapins rest on rocks in the sun. We took a few pictures of them and then sat by a little fountain and rested in the shaded to cool down. We on through the garden and found our selves out side of a zoo. We then decided to sit down and read a book but Jill when to sleep instead. Once we were relaxed and hungry we went into the town and had lunch. When we had finished our lunch we head back to the hotel. After visiting each of these places we would have meals at different Italian restaurants where we ate proper Italian foods and wines. The food was filling and really got you taste buds tingling. Jill and I had Italian ice cream whenever we had the chance. We tasted all sorts of flavours which where really yummy. At the end of our trip we still couldn't speak great Italian but we all enjoyed our selves. We will treasure the time we had there.