StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

I will attach 2 pages - Essay Example

Cite this document
Summary
Evil Turning Good when Threatened: The Misfit and the Grandmother In Flannery O’Connor’s A Good Man is Hard to Find, the mischievous Misfit has spoken something pertaining to the Grandmother’s potential goodness. He utters the famous line, “[the old lady could have been good] if it had been somebody there to shoot her every minute of her life.” In general, what the Misfit means by this is that old woman is self-righteous when, in fact, she is the true evil one…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
I will attach 2 pages
Read Text Preview

Extract of sample "I will attach 2 pages"

Download file to see previous pages

However, her son Bailey has already decided firmly to travel to Florida. On the other hand, the grandmother tries to persuade her son, in whatever sort of persuasion available, to change course. She made two arguments why they should go to Tennessee: first, the evil Misfit and his gang are headed toward Florida; and second, the children need to broaden their world by going to Tennessee since they haven’t gone there before. Evidently, the two arguments are contradictory; thus, the old woman deliberately lies to her family for the selfish reason of wanting to go to Tennessee.

She could have been a good woman -- i.e., honest and truthful -- if there is just someone who will “shoot her.” On the road towards Florida, the grandmother keeps on talking about the good-old-days. For instance, she speaks of an old term which refers to an African American boy: pickaninny -- such term means “little” or “small.” The way the grandmother utters the word “pickaninny,” however, sounds like she is mocking the “little Negro.” Indeed, that was the olden time when black slavery or the pickaninny was popular among the white American race.

Furthermore, the grandmother only tells stories of the past that greatly benefits her. When her grandchildren laugh at her, the grandmother reacts against their behavior by saying that “children were more respectful [in the past]” (O’Connor 231). A manipulative old woman, she could have been good to other people, especially the young ones, if somebody “shoot[s] her.” During the pit-stop, the old lady talks to the owner of The Tower, Red Sam; unsurprisingly, they considerably discuss about the “better times” (O-Conner 234).

The grandmother appears to agree to Red Sam’s observation, that good men are hard to find these days. The Tower owner tells the old woman about the better times when people could go out without even locking their house’s door; nowadays, he adds up, no one can be trusted anymore. Here, the grandmother’s view of the world in general and men in particular is subtly revealed. She considers the present-day people as inherently evil. As we shall see, however, the old lady’s perception towards men as evil dramatically changes; she could have been good -- i.e., possessing positive outlook in life and the world -- if someone “shoot[s] her.

” Before the accident, the old woman tells her grandchildren about a house in Georgia that has a secret panel. The main motive of the old lady why she mentions this secret panel is to convince her grandchildren to go to Georgia. In the succeeding incident, however, it becomes clear that the house “she had remembered so vividly” was in Tennessee after all. In the ditch after the accident, the grandmother keeps to herself about her deliberate deception to Bailey and others. And in order to avoid Bailey’s anger due to the grandmother’s cat that primarily cause the accident, the old lady has hoped that “she was injured” (O’Connor 236).

Again, one observes that the old woman keeps on looking for ways, whatever they are, in order to save her butt, so to speak. The grandmother’s manipulative character could have been altered if there is just somebody who will “shoot her.” When the Misfit and his gang arrived in the scene, the old lady speaks of lie again.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“I will attach 2 pages Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1406044-i-will-attach
(I Will Attach 2 Pages Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/environmental-studies/1406044-i-will-attach.
“I Will Attach 2 Pages Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/environmental-studies/1406044-i-will-attach.
  • Cited: 0 times

CHECK THESE SAMPLES OF I will attach 2 pages

Vulnerabilities of Networks and Internet

The paper ''Vulnerabilities of Networks and Internet'' presents a clear view of the issues involving computer networks and their security.... It tackles the basic networking structure and principle behind it.... The good practice of info- security in the preservation of data and its role in effective network management....
7 Pages (1750 words) Essay

Injection attacks

Injection attacks refer to the introduction of malicious codes or scripts into a program or web application from an external source (Patel, Mohammed & Soni, 2011).... An example includes an input field provided by web application to gather input from an end-user. Kolhe and… (2014) define SQL injection as a code injection attack involving the insertion of malicious SQL statements into an entry field for subsequent execution so as to attack the database and perform varied forms of database operations, interactions and functions without the This SQL injection would fool the database to be a regular user query and then easily access the system....
3 Pages (750 words) Research Paper

Human Rights

om/news/world-middle-east-23927399Deadline: 2014-12-04 2:47 AMTime left: 9h 49mStatus : in progressNumber of pages: 2Cost per page: $6.... 0Created: 2014-12-01 12:46 PM Level: Undergraduate Grade: Guaranteed 2:1 Standard (Normal Charge);pages: 2 Style: APA Country: [Qatar (GMT 0)]Sources: 4 Language Style: English (U.... ttention, Please note that you are not supposed to upload any files with additional pages (extra instructions) until Administration informs you on the payment receipt....
2 Pages (500 words) Research Paper

The Issue and Nature of Computer Crimes

Within a distinctive attack, the hacker removes some pages or some contents on the page; hacker afterwards uploads new altered pages over the internet with the old file name, so that the hacker monitors and controls the message transmitted over the site (Parker, 2002) and (Standler, 2002).... This type of attack happens as soon as an Internet server is swamped with an almost constant stream of fake requests for web pages, thus denying valid users a chance to download a web page over the internet and too perhaps deafening or crashing the webserver....
8 Pages (2000 words) Essay

Online Pizza Security

This chapter is mainly planned to initially identify the main security issues we can face regarding the online pizza website and then i will suggest the main parameters we can follow to handle these security-related aspects.... The paper “Online Pizza Security” seeks to evaluate online security, which has become the biggest challenge for businesses....
28 Pages (7000 words) Research Paper

Computer Crimes in the Modern World

This paper "Computer Crimes in the Modern World" focuses on the fact that with the passage of time, huge developments have been done in the field of computer science.... The computer is being used in every field of life.... A computer is being used in all walks of life.... hellip; The concept of the cyber world and the Internet has revolutionized the world to a great extent....
8 Pages (2000 words) Term Paper

Javascript in XML File

The author examines JavaScript which can be used to parse the XML file by referring to the tags.... The author gives a detailed information about Textboxes and Dropdown, Design, Flowchart, HTML and JavaScript Code and the XML … According to the criteria specified by a user, data for a device stored in the XML file can be retrieved....
6 Pages (1500 words) Essay

Methods of Identifying and Preventing SQL Attacks

This report "Methods of Identifying and Preventing SQL Attacks" discusses issues related to the detection and prevention of SQL injection attacks, whereby there are several methods are identified and discussed that are aimed at detecting or preventing the attacks.... hellip; Analysis, through a model referred to as AMNESIA, which is a technique integrating static analysis and monitoring runtime....
5 Pages (1250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us