Manuscripts of the early middle ages

Assignment Help Basic Computer Science
Reference no: EM132610540

Question 1: Manuscripts of the Early Middle Ages

Before the invention of the printing press, books were copied by hand one at a time by illuminators, and the vellum was often embellished with beautiful calligraphy and intricate patterns and designs.

Using your course textbook locate three examples of illuminated manuscripts from the early Middle Ages. Read about each one in your textbook, course lectures, and through reliable internet resources

First, completely identify each manuscript and/or manuscript page by title, date, and location where it was created.

In a minimum of 2 well-developed paragraphs address the following questions:

Who commissioned the creation of the manuscript? Why?

What was the purpose of the manuscript?

How do the visual characteristics of each manuscript contribute to or enhance its message or meaning?

How do the reasons these manuscripts were created compare with religious texts created today?

Be sure to explain your ideas clearly and support them by discussing specific details about each manuscript.

Question 2: Romanesque and Gothic Cathedrals

Both Romanesque and Gothic architecture displayed distinctive characteristics and features. For this assignment, select one example of Romanesque church architecture and one example of Gothic church architecture from your course textbook. Read about each one in your textbook, course lectures, and through reliable internet resources.

First, completely identify the two cathedrals you have selected by name, date, and location.

Then, in a minimum of 3 well-developed paragraphs, address the following questions:

What architectural details are evident in each cathedral that make it representative of either the Romanesque or Gothic style?

What sort of decoration (interior and exterior) was employed in each cathedral? What was the meaning of the sculptures, paintings, windows that adorned each cathedral?

What was the visitor or viewer experience in each cathedral?

Reference no: EM132610540

Questions Cloud

Narrative on security techniques and mechanisms : Provide a short narrative on security techniques and mechanisms in protecting against spam activity.
Give the unbalanced reactions and volume : Give the unbalanced reactions and volume/molarities above what is the Molarity of Ca3(PO4)2 in the final container.
Discuss how two core values are integral to the accounting : Discuss how two core values are integral to the accounting profession and in particular their importance in the creation of financial statements.
Determine the specific heat of the metal : Determine the specific heat of the metal. Show your work by listing various steps, and explain how the law of conservation of energy applies to this situation.
Manuscripts of the early middle ages : What was the purpose of the manuscript? How do the visual characteristics of each manuscript contribute to or enhance its message or meaning?
Discuss at least two types of social media : Discuss at least two types of social media and give examples of how social media can be applied to e-health. Discuss the three challenges noted above.
What is the total pressure in the flask : A mixture of 14.0 grams of H2, 84.0 grams of N2, and 64.0 grams of O2 are placed in a flask. The partial pressure of the O2 is 78.00 torr.
Why are the allocated fixed manufacturing overhead costs : Why are the Allocated fixed manufacturing overhead costs excluded when determining the pricing of a special order? Are committed costs always relevant
Discussion topic on FOOTPRINTING : After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compute the equilibrium level of national income

Compute the equilibrium level of national income. Suppose X rises from 50 to 100. How does this affects the level of national income? give explanation for each

  Prepare for cyberattacks using common cybersecurity resource

Tech companies prepare for cyberattacks using common cybersecurity resources.

  What is this behavior called

Assuming the FIFO buffering memory can be redistributed freely, suggest a reshuffling of the buffers that avoids the above problem, and explain why it does so.

  Identify recent example of well-publicized security breach

Describe the damages that the firm or its stakeholders experienced (or could have been experienced) because of the breach.

  What is a pivot table in google drive

What is a pivot table in google drive/excel and what do you do with one? Can you give an example?

  When called with no additional arguments

The split method, when called with no additional arguments, breaks a string into words, and returns the words in a list.

  Create advantages and efficiencies for an enterprise

Discuss how server virtualization, architecture, and Hyper-V can create advantages and efficiencies for an enterprise, including considerations for how to decide what an enterprise should factor in when calculating Return on Investment (ROI) befor..

  Threat and vulnerability of the microsoft operating systems

Discussion is to understand the threat and vulnerability of the Microsoft operating systems and to find ways to mitigate the security breach.

  Same frequency on the different days of the week

Use a 0.01 significance level to test the reasonable claim that births occur with equal frequency on the different days of the week.

  Business continuity planning and disaster recovery planning

Explain why you believe planning is important.Go online and search for information about companies that have been harmed or bankrupted by a disaster.

  Ethical computer use policy

Identify and discuss three principles that you believe should be included in an ethical computer use policy.

  Whose binary digits add up to an even number

EASY PYTHON CODE!An evil number is a positive integer whose binary digits add up to an even number (the opposite of an evil number is an odious number, whose binary digits add up to an odd number).For example, 14 is odious:14 (base 10) = 1110 (binary..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd