Thursday, December 26, 2019

The Impact Of Trigger Warnings On University Campuses And...

The Impact of Trigger Warnings on University Campuses and in Curriculum As students amass themselves into the hallowed halls of universities all over the country, two essays discuss how a modern phenomenon will impact their environment. Greg Lukianoff and Jonathan Haidt co-wrote the extensive The coddling of the American Mind, a cover story for the Atlantic September 2015 issue, while Aaron R. Hanlon wrote a response essay with the New Republic, The Trigger Warning Myth, shortly after. Lukianoff and Haiot define trigger warnings, as alerts that professors are expected to issue if something in a course might cause strong emotional response (Lukianoff/Haidt , 2) and view them as negative influences on both mental health and curriculum. While Hanlon on the other hand views trigger warnings as a method to prepare students to a subject they might not necessarily be comfortable with unless given proper forewarning and that this is not a new phenomenon. Theses perspectives, although different, discuss how political correctness; in form of censorship derived fro m trigger warnings, can lead to changes in curriculum and classroom activity that in turn effect the student s population s psyche. Hanlon discusses in his essay the relative impact of trigger warnings on campus by putting it side by side with academic and economic pressure, sleep deprivation, sexual assault and the numerous of other factors students are exposed to during their college career. He questions whetherShow MoreRelatedThe Use Of Trigger Warnings And Safe Spaces On College Campuses1655 Words   |  7 PagesThe purpose of my research is to explore and offer analysis of the controversy over the use of trigger warnings and safe spaces on college campuses, in order to understand when, where, and most importantly, regarding what subjects their use is appropriate. After my first semester in college, I was left with a new and exciting learning experience. I engaged in discussions on controversial topics and was exposed to various reading and media material which opened me up to new perspectives. In classroomsRead MorePersuasive Essay - Persuasive Rough Draft1555 Words   |  7 PagesDraft Essay In recent discussions of trigger warnings-â€Å"alerts that professors are expected to issue if something in a course might cause a strong emotional response†, is a controversial issue that has been whether trigger warnings at colleges/universities should be issued to students who wish to be alerted on unappealing subjects or to not have trigger warnings from being practiced in American Universities. On the other hand, some argue that trigger warnings are necessary to keep students from emotionalRead MoreCensorship Violates Our First Amendment Right1550 Words   |  7 Pageseducation, students strive to learn and develop their understanding of the world that surrounds them. Accordingly, it is the responsibility of the school administration to provide the means to that end. Yet, there is a polarized divide among schools and their interpretation of freedom of speech. This occurrence is experienced primarily at the university level but can be seen at all levels of education. At the epicenter of this dispute is the notion of censorship, specifically whether or not it isRead MoreSafe Spaces, Safer Spaces And Positive Spaces1710 Words   |  7 Pagesassault, students who are veterans and disabled students. Safe spaces are an expression of the conviction, increasingly prevalent amount college students, that their schools should keep them from being â€Å"bombarded† by discomforting or distressing viewports. Think of a safe spaces as the live-action version of the better-known trigger warning, a notice put on top of a syllabus or and assigned reading to alert students to the presence of potentially disturbing material. Sometimes when a professor makesRead MoreViolence in Public Schools4835 Words   |  20 PagesViolence in Public Schools Introduction The recent violence on school grounds (including elementary, middle school and high school violence) has created a climate of fear in American public schools, and the literature presented in this review relates to that fear and to the difficulty schools face in determining what students might be capable of mass killings on campus. Television coverage of school shootings leave the impression that there is more violence on school campuses than there reallyRead More The Nuclear Terrorism Threat and the Aum Shinrikyo Cult Essay6424 Words   |  26 PagesAustralian observers noted a seismic explosion that sent shockwaves through the area for hundreds of miles.10 Witnesses in the vicinity of the Aum property reported a bright blush flash at the time of the explosion. The event was explained as a meteor impact but no crater was found in the area. Yet the difficult part with uranium bombs is not securing a supply of uranium, but enriching it to a suitable proportion of U-235. Enrichment can be accomplished through a variety of complicated isotope separationRead MorePerceived Stress Levels and Stress Management Among Paramedical Students Lyceum of the Philippines University: Towards Stress Management Enhancement15005 Words   |  61 PagesPerceived Stress Levels and Stress Management Among Paramedical Students Lyceum of the Philippines University: Towards Stress Management Enhancement Maribel D. Mayuga-Barrion, DDM, MAT It is recognized that stress is a normally occurring part of life. Selye was the first to describe the term stress as a state produced within an organism subjected to a stimulus perceived as a threat (Selye, 1957). He spoke of stress as a condition that occurs commonly in response to any adaptive response withinRead MoreEssay on Case Studies on Academic Integrity15905 Words   |  64 Pagesacademic integrity p olicy. Without long-term, sustainable and practical support resources, a policy will not be enacted, no matter how well it is articulated. The cases in this resource cover a range of academic integrity issues in Australian universities with application for a wider audience. These case studies have been developed by the Academic Integrity Standards Project. â€Å"†¦I suspect that every senior manager needs to have some training in the issue of academic integrity principles.   I learntRead MoreAnalysis of Building Brand Equity of Non Traditional Ways Red Bull11410 Words   |  46 Pagesinclude tooth decay, dependency, and heart problems (Stein). The company has taken steps to become more environmentally friendly and therefore has become more appealing to ‘green’ consumers. Red Bull has been making efforts to reduce the environmental impact and reduce the process of distribution. In order to alleviate emissions, automobile distribution distances have been shortened while the transports by rail and sea are increasing. Even the packaging has become more environmentally cautious and ecoRead MoreJuvenile Crime Issues in Today’s Criminal Justice System18893 Words   |  76 PagesJustice Process Today The Post–Juvenile Court Era  ©  ©  ©  © Describe the history and evolution of the juvenile justice system in the Western world. Name the important U.S. Supreme Court decisions relating to juvenile justice, and describe their impact on the handling of juveniles by the system. Explain the similarities and differences between the juvenile and adult systems of justice. Identify possible future directions in juvenile justice.  ©  ©  © ISBN: 0-558-8661 1-5 540 Criminal Justice Today:

Wednesday, December 18, 2019

My First Step Of The Sociological Research Model - 972 Words

The first step of the sociological research model is to select a topic. In this case, my topic is extending the school day. My second step is to define the problem. I want to specifically learn if extending the school day would increase students’ overall process through a given school year. The third step is to review the literature. I will find books on the subject of an extended school day, read reports of school that have adopted this system, and search the Internet for accounts of individuals who have researched this topic. Next, I will formulate my hypothesis, which is: â€Å"Extending the school day will result in higher academic achievement and increased learning on the part of students.† Next, I will choose my research method. For my purposes, I think it would be best to choose an experiment, with one school serving as the experimental group and one as the control group. Next, I will collect the data. I must be sure to make sure the experiment measures what it i s supposed to measure. I need to determine the correct definition of academic achievement and determine how I will measure it. I will determine academic achievement based on letter grades that students receive on average. The seventh step is to analyze the results and test my hypothesis. The last step is to share the results. In this case, I might share my results by publishing them in an article or a journal. I will also compare my findings to other theories of colleagues to determine they support or disagree withShow MoreRelatedSociological Concepts Of Family, Gender, And Identity Essay1362 Words   |  6 PagesThis essay discusses the way in which I understand the sociological concepts of family, gender and race - nuclear family, doing gender, and identity, in particular. Arguably, these three concepts can relate to each individuals life, through different personal experiences. To demonstrate my argument, I highlight relevant situations in my own life that further explain my cho sen sociological concepts. The first concept I chose to focus on is family. In particular, the idea of the ‘nuclear family’.Read MoreTechnology and Social Change in Healthcare1606 Words   |  7 Pageshave provided change in our social environments. For example, we have access to laptop/computers, the Internet, cell phones, and android pads. This is beneficial because we can use the Internet to obtain information almost instantly to assist in research and education as well as staying in communication with friends and family. I believe that every household should have access to these technologies but due to socioeconomic conditions that is not possible. I feel that the technology today has evolvedRead MoreLearning Evaluation Assignment1671 Words   |  7 PagesI expect this piece of research to give me confidence. In future, I shall not be afraid to look at a new idea and try it out – under controlled conditions – to see whether it improves my practice. I recognise that a willingn ess to experiment in this way, bearing in mind the curriculum, and the demands of achievement criteria, will keep teaching and learning fresh and exciting. At best, the impact on the learners will be to maintain or enhance their enthusiasm, and to improve their ability to understandRead MoreEmergency Management Field Essays863 Words   |  4 PagesIssues In â€Å"Wither the Emergency Manager,† Niel R. Britton comments on Drabeks â€Å"Human Responses to disaster: An Inventory of Sociological Findings.† Britton describes six positive and negative issues in emergency management as it is today. In this paper, we will discuss the implications on emergency management as a field and on the individual manager. In the first positive development, Britton describes New Zealands efforts to move emergency management into a wider area (instead of simplyRead MoreRelationship Between Health Care And Justice950 Words   |  4 PagesPerhaps it was my parents’ socialist upbringing in Yugoslavia or my mother’s struggles with her autoimmune disorders that helped foster my interest in health inequities. Although I now find the relationship between health care and justice fascinating, my initial academic encounters with health care were not anchored in sociological, political, or legal frameworks. Drawn to human physiology and anatomy, I excelled in the biological sciences throughout secondary school. I enrolled in university intentRead MoreHomelessness Case Study1683 Words   |  7 Pages61) By using a ‘sociological imagination’ viewpoint, along with a combining ‘Critical Discourse’, homelessness can be influenced by social structure. (Farrugia, 2011a) The other issues concerning homelessness would be unemployment, poverty, failures of the mental health care system, drug abuse and failures in the government policies. I plan to explore the ‘sociological imagination’ idea written about by C. Wright Mills in 1959. Mills wrote that he believed that the ‘sociological imagination’ wasRead MoreFamily Systems Therapy: Four Models1272 Words   |  5 PagesFamily Systems Therapy: Four Models The process of individual therapeutic treatment will often result in heavy invocation of intimate personal relationships, formative experiences and conflict management. These characteristics would ultimately lead to the evolution of family systems therapy, a mode of treatment which recognizes the inherency that familial patterns and inter-relations possess where counseling and treatment are concerned. The school of though revolving around the family systems ideologyRead MoreSociology Society And Different Part Of Cultures1891 Words   |  8 Pagestechnical and technology. With the technology this includes the acclamation. My understanding that sociology clams to be scientific and its objective explain the description and perdition of making different suggestions for modifications. The modification is part of the social phenomena. This is the effect on the normal development with our global society. The purpose of sociological generalizations and to build models with formulating hyp otheses. The different theories try to explain the socialRead MoreThe Effects Of Nuclear Family On Children1551 Words   |  7 Pages As Bronfenbrenner’s Bioecological Model suggests, the nuclear family typically provides the first and most important environment in the child’s early development (Siegler, Eisenberg, DeLoache, Saffran, Graham, 2014). However, due to its strong influence on the child and to the intensity of early attachments, any disruptions to the family’s structure threatens to trigger a series of â€Å"risk factors† that most children are not equipped to handle (Kostelnik, Soderman, Whiren, Rupiper, Gregory, 2012)Read MoreAnalysis Of Octavia Butler s Series Of The Parables1508 Words   |  7 Pagesthe society we live in. I later changed my major to International Studies, an interdisciplinary course of study, which allowed me to foster my understanding of the global society, the complexities of intercultural interactions, and the ability to apply political theories to interpret one situation from multiple perspectives. When choosing the topic for my senior thesis, I wa s torn between delving into a political crisis or taking the opportunity to re-visit my love of literature in an academic framework

Tuesday, December 10, 2019

Graffiti Moon free essay sample

Graffiti Moon Essay â€Å"Graffiti Moon† by Cath Crowley is about a teenage girl’s adventure trying to find a mysterious graffiti artist over one night. Truthfulness is optimal to form a deep bond between two people. Romantic relationships, friendships and personal honesty are great for a person to have. But all need honesty to survive. Romantic relationships are great, you are with the one person who truly understands you and there is no greater feeling. Lucy and Ed are trying to make a romantic relationship work but they didn’t start it with honesty. â€Å"Lying isn’t my idea of romance†.Lucy and Ed began their relationship based on lies. Ed â€Å"thinks about her finding out† he is â€Å"Shadow†. Ed â€Å"thinks about her being disappointed because† he is â€Å"guy going nowhere, not a guy who is sensitive and smart and funny† like Lucy has created Shadow to be in her mind. We will write a custom essay sample on Graffiti Moon or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Ed is afraid that he will not meet Lucy’s expectations therefore he did not reveal his true identity to her from the beginning. â€Å"Truth is better, painful, but better†. Ed should have told Lucy the truth from the beginning and Lucy shouldn’t have been so blinded by the fantasy she has created in her mind. By Ed not telling anyone he is Shadow, when Lucy finds out, her and Jazz â€Å"feel like the stupidest girls in the world† because they have been played from the start. Leo and Jazz also started their relationship based on lies. Leo is â€Å"Poet† and he â€Å"owes money to Malcolm Dove†. Leo doesn’t tell Jazz that he is â€Å"Poet â€Å"because he â€Å"likes to live for the adrenalin† and he thought it would be fun. By lying about his identity and his debt to Malcolm, he endangers the girls when Malcolm comes to collect and Leo doesn’t have the money. Truthfulness is optimal to maintain a romantic relationship and friendship, lying just ruins everything.Friendships between a group of friends can lead to some of the funniest and most adventurous days you will ever have. Lucy, Jazz and Daisy have a very honest friendship with each other. â€Å"The cubicle of truth† is where the girls are in the same cubicle and no matter what is asked the response is nothing but the truth. The girls talk about their relationships, what they should do and how to do it. These girls show a great amount of trust and honesty. Ed, Leo and Dylan also have a â€Å"cubicle of truth† but theirs is the â€Å"ring of truth†. They also speak about their relationships, what to do and how to do it.The boys all have lied to the girls about something. Ed being â€Å"Shadow†, Leo being â€Å"Poet† and Dylan knowing that they are both the artists who the girls seek. The boys should be honest with the girls as they all like each other and you cannot have a friendship let alone a romantic relationship based on lies. But before you have any sort of relationship you must be honest with yourself. Personal honesty is the first thing that you need to have before starting any sort of relationship. Lucy needs to be honest with herself about â€Å"Shadow†. Lucy has this image in her head of what Shadow is like and how he acts etc.

Monday, December 2, 2019

Politics Of Western Europe Essays - Michael Ignatieff,

Politics of Western Europe BLOOD AND BELONGING This is a critique of the book, Blood and Belonging, by Michael Ignatieff. This paper will explain the subject of the book and its relevance, discuss Michael Ignatieff's methods and conclusions on the subject and finally include a personal critique of the book by the author of this paper. The author of the book travels on what he terms "the six journeys." On these "journeys" he encounters different cultures, as he travels to six different coinciding areas of the world. He examines the unique expression of nationalism that each populace displays by interviewing various members of that particular society. The six areas that he travels to are specifically chosen for the clarity which nationalism is expressed in society. Nationalism is a factor contributing toward both present possible future instability in these areas. These areas are former Yugoslavia (specifically Croatia and Serbia), Germany, Ukraine, Quebec, Kurdistan and Northern Ireland. According to Ignatieff, in Croatia and Serbia there is a desire for a separate identity between the two nations. The fear of losing one's national identity has caused ethnic hatred. A terror so strong and historically persistent, it has driven people to a desperate state to do anything. This is a large contributor to the reasons for the extreme violence present there today. The author states, "A Croat, thus, is someone who is not a Serb. A Serb is someone who is not a Croat." This quotation profoundly expresses the short-sighted mentality present in their conflict. In his travels in Germany, the author points out an important question. Does the nation make the state, or the state the nation? This question by far does not stop here, especially when Germany is the subject. The essence of the German people is seen by some as aggressive and offensive, thus the existence of the German problem. If the nation makes the state then Germany will always be a threat. If the state makes the nation, then the aggressive nature of the German nation, which lead the world into two global wars, can be harnessed and redirected. The question has its roots and answers in the recent reunification of Germany. The Ukraine is concerned with not being Russian. It is here Ignatieff receives a complete vision of what nationalism is. He states, "I understand what nationalism really is: the dream that a whole nation could be like a congregation; singing the same hymns, listening to the same gospel, sharing the same emotions, linked not only to each other but to the dead buried beneath their feet." Quebec is a model that presents a possible future of the state system. Ignatieff uses the example of Quebec to illustrate the relationship between nationalism and federalism. He implies that "if federalism fails in Canada it can fail anywhere." If the balance between "ethnic and civil principles" is not maintained in Canada, who is not an impoverished country and has a large, successful economy; then perhaps the modern world has not transcended the grasps of nationalism. The Kurds represent a nation without a state, who find themselves surrounded by other nations who are more aggressive nationalists. The term Kurdistan is a definition of the areas used by Ignatieff to explain the area of major Kurdish populace concentration. There is no real borders, no flag, no government and Kurds must acknowledge the state in which they reside (i.e., - Syria, Turkey, Iran and Iraq), of which, is not Kurdistan. Finally, the sixth journey ends in Northern Ireland. He makes the observation that this is the ideal place to conclude his project. Northern Ireland contains a recurrence of the themes that seemed so prevalent in the other journeys. In Ireland ethnicity, religion and politics are all bound into one expression or identity. These are also evident in the five previous studies. Is Michael Ignatieff's work relevant? The answer to this question is, yes it is. The issue is important. Nationalism presents itself as a phenomenon. The questions of why people need to retain a cultural identity and the way they go about preserving it is still unanswerable. Evermore unfathomable is the violence permeated through nationalistic expressions, which are "necessary" by the parties involved. The very existence

Wednesday, November 27, 2019

The Writing Process Part 1 Finding a job in today’s tough job market Essays

The Writing Process Part 1 Finding a job in today’s tough job market Essays The Writing Process Part 1 Finding a job in today’s tough job market Paper The Writing Process Part 1 Finding a job in today’s tough job market Paper The Writing Process Part 1 Finding a job in today’s tough job market It is well known that we are in the midst of an unfathomable economic depression or otherwise the worst economic situation since the period of the great depression. Almost every organizations or companies are announcing daily about reducing employment and the unemployment level is increasing rapidly to the worst level. There is high competition in the job market so it is essential that you use the available tools so that you can achieve the position that you aspire. Now let us take some of the essential key rules of thriving into a job search in the tough job market. However, before I start giving out essential principles of successful job search, I want to present to you how I managed to get my job. When I graduated from the college nearly eight years ago, I bought a newspaper, read through the advertisement job pages and I was ever connected on the network. I kept on like this until one time I received a call from one of the biggest automotive industry. Therefore, you have to know that going through a job search is mentally exhausting. However, you should be patience because it can be sometimes frustrating and leads to rejection especially when you fail to get a job for a long time. It is essential to prepare for a job search just like the way athletes prepare for a competition. You should know that everybody is going though the same process and it is normal but eventually success comes after when you adhere to the following tips, First, use the technology for your own benefit. In the modern world, technology has become a vital tool in that one cannot do without it. Therefore, you should utilize technology as much as possible. It is good to create e-mails and subscribe for job alerts that match with your course criteria. Create blogs on the subject of your expertise area and stay connected to social networks. I am sure that you are aware of the network and even familiar with it because mostly you do research work or course work using the computer or form a group discussion. So do not go outside and forget that computer have completed their college work. It is now that you should understand that you are going to need computers more than ever. Take use of social networking. Make sure that to attend various organizational events where you can be able to meet all kinds of people and try to seek advice on job search from them. Do not get tired and feel discouraged even though they will not attend you positively. You should be patience and understand why you are out their and what you are searching for because it is through hardworking and tolerance that you can be able to achieve your goals. You should bear in mind that the purpose of attending events on different organizations is to be acquainted with the skills and grow in your networking. This will enable you to develop potential skills that will one time help you when being called for an interview (Roebuck and McKenney, 2006). You should prepare fully for an interview. I know everybody will search to get an interview but the interviews are not meant for open positions. In this point, you should now realize that social networking is crucial because you might be interviewed on what you know about the company where you have gone for an interview. Incase you had already attended the company’s events you are then likely to pass your interview. Another thing you should not forget is dressing code when going for an interview. Some people tend to forget that dressing is part of an interview therefore, incase you are interviewed for a manufacturing industry, be in a conservative attires. Part 2 The process I used to draft my message was that first, I had to organize the message by choosing on the essential ideas that can enable me to deliver my message. I started with prewriting my speech whereby I outlined many points. Secondly, I started writing down the crucial ideas on another draft. In addition, I had to revise on my points that can enable me to draw the attention of my audience. Lastly, I revised my points in order to ensure whether my speech met the required value. My audiences are the students who will be graduating because they are the one mostly affected especially when it comes to competition for jobs in today’s job market. However, other audience may include parents and guardians who will accompany them to graduation because they are affected indirectly especially when it comes to helping their children find a job. Others may include honorable guests and lecturers who will be present in graduation day. In addition, business managers and others executive members from different companies or organizations who will be present will be my audience because they have knowledge about the existing job issues in the economy. My audience was displeased because of the high unemployment rates in the economy and the way I expressed my points to them. I used inductive approach by giving examples about the situation that I went through before I got a job. My audience were displeased especially students who realized that getting a job is not easy after they listened to my speech. I outlined the main ideas from the first draft and included the major points in the second draft. This is because I did not want to make long speech that could have ended boring my audience. I used inductive information sequencing approach because this is a constructivist form of passing across the information and it is more student-centered. This is because my speech aims mostly students who are ready to face the challenges of job market. This method is widely used because it is more experimental and it gives practical example that indicates a direction of something. I wrote the second draft because the first draft had many ideas but after proofreading, I had to choose the essential ideas that can benefit my audience. I had to revise on my points to make sure the points are correct and if they are in line with the speech that I was to present. Reference Roebuck, D. B., McKenney, M. A. (2006). Improving business communication skills. Upper Saddle River, N.J: Pearson Prentice Hall.

Saturday, November 23, 2019

Victor Vasarely, Leader of the Op Art Movement

Victor Vasarely, Leader of the Op Art Movement Born on April 9, 1906, in Pecs, Hungary, artist Victor Vasarely initially studied medicine but soon abandoned the field to take up painting at the Podolini-Volkmann Academy in Budapest. There, he studied with Sandor Bortniky, through which Vasarely learned about the functional artistic style taught to students at the Bauhaus art school in Germany. It was one of a variety of styles that would influence Vasarely before he became the patriarch of Op Art, an abstract form of art featuring geometric patterns, bright colors and spatial trickery. An Emerging Talent Still an emerging artist in 1930, Vasarely traveled to Paris to study optics and color, earning a living in graphic design. In addition to the artists of the Bauhaus, Vasarely admired early Abstract Expressionism. In Paris, he found a patron, Denise Rene, who helped him open up an art gallery in 1945. He exhibited his works of graphic design and painting at the gallery. Vasarely unstintingly joined together his influences- the Bauhaus style and Abstract Expressionism- to reach new levels of geometric precision and foster the Op Art movement in the 1960s. His brilliant works went mainstream in the forms of posters and fabrics. The ArtRepublic website describes Op Art as Vasarely’s â€Å"own geometric form of abstraction, which he varied to create different optical patterns with a kinetic effect. The artist makes a grid in which he arranges geometric forms in brilliant colors in such a way that the eye perceives a fluctuating movement.† The Function of Art In Vasarely’s obituary, the New York Times reported that Vasarely viewed his work as the link between the Bauhaus and a form of modern design that would spare the public â€Å"visual pollution.† The Times noted, â€Å"He thought that art would have to combine with architecture to survive, and in later years made many studies and proposals for urban design. He also devised a computer program for the designing of his art as well as a do-it-yourself kit for making Op Art paintings and left much of the actual fabrication of his work to assistants.† According to the paper, Vasarely said, It is the original idea that is unique, not the object itself. The Decline of Op Art After 1970 the popularity of Op Art, and thus Vasarely, waned. But the artist used the proceeds from his Op Art works to design and build his own museum in France, the Vasarely Museum. It closed in 1996, but there are several other museums in France and Hungary named after the artist. Vasarely died on March 19, 1997, in Annet-on-Marne, France. He was 90. Decades before his death, Hungarian native Vasarely became a naturalized French citizen. Hence, he’s referred to as a Hungarian-born French artist. His wife, the artist Claire Spinner, preceded him in death. Two sons, Andre and Jean-Pierre, and three grandchildren, survived him. Important Works Zebra, 1938Vega, 1957Alom, 1966Sinfel, 1977 Links to nytimes.com/1997/03/18/arts/victor-vasarely-op-art-patriarch-dies-at-90.html

Thursday, November 21, 2019

Paper subject leadership and the topic about king abdullah the king of Research

Subject leadership and the topic about king abdullah the king of saudi arabia - Research Paper Example Saudi Arabia is one of the lucky countries in the Middle East since it has escaped many tribulations that are normally associated with other countries such as Afghanistan, Palestine and Iraq. However, the country is not where it is today through simple luck. Much of the credit for getting where the country is today goes to the leader himself, King Abdullah. It is impossible to talk about the all that King Abdullah has achieved as a national and international leader without touching on his leadership qualities (Sobhani 12). When King Abdullah came to the throne, he inherited a country that was sharply divided into two between the radical fundamentalists and liberal modernizers and reformists. Adaptability/flexibilityis one of King Abdullah’s strengths that have seen him lead the Saudis to their present prosperity, even when they are surrounded by politically and economically unstable economies. King Abdullah was able to adapt to the sweeping change around him a fact that enable d him to keep his country together (24). He was also able to adopt western technology in order to enhance the quality of life of Saudis. The King flexible nature has seen him enhance the rights of women and children in a society where women re not worth much (Reed and Lange 109). It is common to find in many cases that women in the Arab world are normally forced to take a backseat in every aspect of life. However, due to the King’s flexibility and open-mindedness, the women in Saudi Arabia are able to enjoy the same previledges as men. This has seen many females get access to education and political opportunities, something that was almost unheard of before (Reed and Lange 102). Any good leader must chow assertiveness in everything he does. By being assertive a leader is able to offer strong leadership even in the face of hardships and upheavals. In a country that has many desponded voices, a certain level of assertive leadership is necessary to ensure that things do not boil over to a level where it might become difficult to contain. King Abdullah’s assertiveness has enabled him to keep extremists such as Al-Qaeda and the Taliban outside his country’s borders. The king’s assertive nature has also seen him approach the issue of development with a strong hand which has endeared him to his countrymen and to the international community at large (Sobhani 33). Although he has opened up his country to develop using western aid and technology, King Abdullah ahs had the foresight to be assertive enough to retain the sovereignty of Saudi Arabia. Many Arab world countries have fallen to the pressures of the west due to weak leadership that is normally devoid of assertiveness. King Abdullah is also selfless and compassionate. He is one individual who has the capacity to put aside his interests so that he can serve other people. Whenever there is a problem in any of the neighboring countries, King Abdullah is normally the first out there offeri ng whatever kind of help is available at the time. Many times, the king has used his position as the Saudi King to engage in constructive talks among difference nations in order to bring about peace and understanding (Oxford Business Group 93). King Abdullah is not a despot King like many would like to believe. Since he came to the throne, Saudi Arabia has developed into one of the most vibrant democracies in the Arab world

Wednesday, November 20, 2019

AS Unit F911- Communication in care settings Coursework - 1

AS Unit F911- Communication in care settings - Coursework Example This will include a detailed discussion of the reasons for using each skill. There will also be a discussion as to how care values are applied and integrated with the appropriate use of communication skills to show how service users are valued in the setting. In the previous report, it was commented that Meath (2006) cites Dozier from 1995 as saying the most effective means of communication is a two-way model that includes give and take. But what happens when the individuals who are participating in the care center activities are potentially frail, experiencing health problems, and may be unable to hear, see or truly communicate in response to a message given to them? Further research shows four communication skills recommended for use by service users and care workers. These skills go well beyond the simple two-way communications method cited by Meath (2006). The four communication skills are communication competence and confidence, communication skills for dealing with individuals age 65 and over, skills dealing with those cognitively impaired, skills for dealing with those with Alzheimer’s or dementia, and general communication guidelines for clients in a facility as referenced by Schockley-Zabalak (2002); Tam, IP, & Chan (2000). First, both Schockley-Zalabak (2002) and Tam, IP, & Chan (2000) point out that each party in the communication process needs to be equipped with communication competency. ... If the care giver is more of a shy person and the client is more out-going, there may not be an issue. Conversely, if the client is shy and the care giver is out-going, there will be no issue. But if a quiet or shy client is teamed with a quiet or shy care giver or either party is lacking confidence in their own communication skills this can lead to frustration or anger. The client may not return to the care center. With awareness comes personal growth. Reviewing the provided information can assist the care giver with communications tips and pointers on the common methods to use with those that may be in attendance at the day center. Second, Meath (2006) and PHAC (2009) provide communications guidelines to ensure specific steps are taken when communicating with seniors in care facilities of any type. This guide serves as an overall template for communicating with all clients. When in doubt as to the communications methods to use, or if there is no special health requirement or concer n, this would be the method to follow: Treat the client with respect and dignity. Involve the client in decisions as much as possible regarding activities. Do not talk about a client or family member if that person is present even if they seem unable to understand. Dialogue one-on-one with clients on a regular basis. If a client does not seem to understand what is happening or why, discuss the days’ activities in full as though they do. Provide opportunities for clients to give feedback and to ask questions. Listen to clients and repeat back to them your understanding of what you think you heard them say to ensure message given and message received. The third

Sunday, November 17, 2019

Details of routing algorithms Essay Example for Free

Details of routing algorithms Essay In a link state algorithm, every router in the network is notified of a topology change at the same time. This avoids some of the problems associated with the nearest neighbour update propagation that occurs in the distance vector algorithms. The ‘Open Shortest Path First’ (OSPF) protocol uses a graph topology algorithm like Dijkstra’s Algorithm to determine the best path for data transmission between a given data source and a data destination. The metric used for route optimisation is specific to the manual configuration of the router. However, the default metric is the speed of the interface. The OSPF uses a two level, hierarchical network classification. The lower level of hierarchy is groups of routers called areas. All the routers in an area have full knowledge of all the other routers in the area, but reduced knowledge of routers in a different area. The different areas organized within the OSPF algorithm are connected by border routers, which have full knowledge of multiple areas. The upper level of the hierarchy is the backbone network, to which all areas must be connected. That is, all data traffic going from one area to another must pass through the backbone routers. Distance Vector Algorithms In order for data to be transmitted from a source to a destination on the Internet, the destination must be identified using some mechanism. That is, each possible destination for data transmission must be described with an address. The scheme currently used to address the internet space is the Internet Protocol (IP) version 4. The IP version 4 uses an address length limited by 32 bits. An example of an Internet address is 227. 130. 107. 5 with the corresponding bit vector 11100011 10000010 01101011 00000101. An initial difficulty in managing the available address space was the implementation of a class structure, where large blocks of internet address space was reserved for organisations such as universities, leaving commercial applications with limited address space. Routing of data transmission in this address environment was referred to as class-full routing. To alleviate this problem of limited address space, the internet community has slowly evolved to a classless structure, with classless routing. In distance vector protocols, each router sends adjacent routers information about known paths to specific addresses. The neighbouring routers are sent information giving a distance metric of each one from a destination address. The distance metric could be the number of routers which must be used to reach the destination address, known as the ‘hop count’, or it could be the actual transmission distance in the network. Although this information is advertised only to the adjacent routers, these routers will then communicate the information with their neighbouring routers, and so on, until the entire network has the same information. This information is then used to build the routing table which associates the distance metric with a destination address. The distance vector protocol is implemented when a router receives a packet, notes the destination, determines the path with the shortest distance to the destination and then forwards the packet to the next router along the shortest distance path. One of the first distance vector protocols implemented on the Internet was the Routing Information Protocol (RIP). RIP uses the distance metric of hop count to determine the shortest distance to the destination address. It also implements several protocols to avoid having data packets pass through the same router more than once (router loops). The path vector protocol is a distance vector protocol that includes information on the routes over which the routing updates have been transmitted. It is this information on path structure which is used to avoid routing loops. Path Vector Protocols are also somewhat more sophisticated than RIP because an attempt is made to ‘weight’ each path based on a locally defined criteria that may not simply reflect the highest quality of service, but rather the highest profit for an ISP. The implementation of these types of router algorithms may be different in different parts of the Internet. When the algorithms are implemented inside an autonomous system, they are called Interior Gateway Protocols (IGP). Because the different autonomous systems that make up the Internet are independent from one another, the type of routing algorithm used within the autonomous systems can also be independent of one another. That is, the managers of each autonomous system are free to choose the type of algorithm which best suits their particular network, whether it is static or dynamic link-state or dynamic distance-vector. When the algorithms are implemented to control data transmission between autonomous systems, they are referred to as Exterior Gateway Protocols (EGP). The EGP connect all autonomous systems together to form the Internet and thus all EGP should use the same algorithm. The specific algorithm currently used as the EGP on the Internet is the Border Gateway Protocol (BGP), which is a type of distance vector algorithm called a path vector algorithm [9]. A path vector algorithm uses information about the final destination of the data transmission in addition to the attributes of the neighbouring links. It should be noted that the BGP algorithm can also be used as a router protocol within an autonomous system and is called an interior BGP (IBGP) in that instance. This necessitates calling the BGP an EBGP when it is implemented as an EGP.

Friday, November 15, 2019

Of Mice And Men :: essays research papers

Of Mice And Men In the masterful story Of Mice And Men by John Steinbeck there is a looming theme of loneliness. This theme is told to you through the words and actions of the characters in the story . This story is told through two characters Lennie and George. The setting is 1930’s America. The story involves traveling ranch workers that live only for the one purpose to get paid and waste their money on a few drinks and some pleasure. These men are consumed with loneliness. The care for nothing but themselves. They are very unlike George and Lennie who have each other and a dream. Lennie is a big man with the brain of a child. Lennie never meant to hurt anybody but managed to get himself and his only true friend George into trouble. George is a small smart man who has known Lennie all his life and knows to well that Lennie could not survive on his own lets him travel with him as a favor too Lennie’s aunt Loneliness is defined as Without companions; lone. I will use this definition to describe different aspects of Steinbeck’s treatment of loneliness in this novel. Steinbeck’s use of loneliness is in this novel is very noticeable in some of the dialogue like when Lennie accidentally stumbles into Crook’s home in the stable and they talk. "You got George. You know he’s goin’ to come back. S’pose you didn’t have nobody. S’pose you couldn’t go to the bunk-house and play rummy ‘cause you was black. How’d you like that? S’pose you had to sit out here an’ read books. Sure you could play horse shoes til it got dark, but then you got to read books. Books ain’t no good. A guy needs somebody-to be near him. ‘He whined : ‘A guy goes nuts if he ain’t got nobody. Don’t make no difference who the guy is, long he& amp;#8217;s with you. I tell ya,’ he cried , I tell you a guy gets lonely an’ he gets sick." This shows Crook’s view of the world and how he feels about what his life is about. He feels as though nobody cares for him which is probably true from the quote above. George and Lennie feel they are not alone they have a dream. This dream is what pushes them on. They are often talking of the land they dream of.

Tuesday, November 12, 2019

Chapter 2 Exercises & Case Exercises Essay

Exercises 1. Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack fall into? a. Overall, I believe this attack falls into four major threat categories: deliberate acts of trespass, compromises to intellectual property, technical failures, and managerial failure. Furthermore, I believe this attack would be categorized as a deliberate act of theft/trespass which compromises intellectual property due to technical and managerial failures. b. It seems as this hacker was deliberately causing harm (i.e. copying files, vandalizing the web page, and theft of credit card numbers); due to their method of entry – hacking into a network – it leaves me to believe there were some technical failures, such as software vulnerabilities or a trap door. However, that is just one possibility as to what could have occurred. This could have also been a managerial failure; say the unknown hacker used social engineering to obtain the information to gain access to the network – proper planning and procedure execution could have potentially thwarted this hacker†™s attack. 2. Using the Web, research Mafiaboy’s exploits. When and how did he compromise sites? How was he caught? c. Michael Demon Calce, also known as Mafiaboy, was a high school student from West Island, Quebec, who launched a series of highly publicized DDoS (denial-of-service) attacks in February 2000 against large commercial websites including: Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*Trade, eBay, and CNN. Calce also attempted to launch a series of simultaneous attacks against nine of the thirteen root name servers. d. On February 7th, 2000, Calce targeted Yahoo! With a project he named â€Å"Rivolta† – meaning riot in Italian. This project utilized a denial of service cyber-attack in which servers become overloaded with different types of communications, to the  point in which they completely shut down. Calce managed to shut down the multibillion dollar company and the web’s top search engine for almost an hour. His goal was to establish dominance for himself and TNT – his cybergroup. Over the next week, Calce also brought down eBay, CNN, Amazon and Dell via the same DDoS attack. e. Calce’s actions were under suspicion when the FBI and the Royal Canadian Mounted Police noticed posts in an IRC chatroom which bragged/claimed responsibility for the attacks. He became the chief suspect when he claimed to have brought down Dell’s website, an attack not yet publicized at the time. Information on the source of the attacks was initially discovered and reported to the press by Michael Lyle, chief technology officer of Recourse Technologies. Calce initially denied responsibility but later pled guilty to most of the charges brought against him – the Montreal Youth Court sentenced him on September 12, 2001 to eight months of â€Å"open custody,† one yea r of probation, restricted use of the Internet, and a small fine. It is estimated that these attacks caused $1.2 billion dollars in global economic damages. 3. Search the Web for the â€Å"The Official Phreaker’s Manual.† What information contained in this manual might help a security administrator to protect a communications system? f. A security administrator is a specialist in computer and network security, including the administration of security devices such as firewalls, as well as consulting on general security measures. g. Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. Since telephone networks have become computerized, phreaking has become closely linked with computer hacking. i. Example of Phreaking: Using various audio frequencies to manipulate a phone system. h. Overall, a security administrator could use this manual to gain knowledge of terms associated with phreaking and the in’s & outs of the process (i.e. how it is executed). However, the security administrator should focus on Chapter 10 – â€Å"War on Phreaking† – this section (pg 71-73) deals with concepts such as access, â€Å"doom,† tracing, and security. An administrator could reverse engineer this information to protect his/her systems from such attacks. 4. The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at least two other sources of information on threat and vulnerabilities. Begin with www.securityfocus.com and use a keyword search on â€Å"threats.† i. http://www.darkreading.com/vulnerability-threats ii. Dark Reading’s Vulnerabilities and Threats Tech Center is your resource for breaking news and information on the latest potential threats and technical vulnerabilities affecting today’s IT environment. Written for security and IT professionals, the Vulnerabilities and Threats Tech Center is designed to provide in-depth information on newly-discovered network and application vulnerabilities, potential cybersecurity exploits, and security research results j. http://www.symantec.com/security_response/ iii. Our security research centers around the world provide unparalleled analysis of and protection from IT security threats that include malware, security risks, vulnerabilities, and spam. 5. Using the categories of threats mentioned in this chapter, as well as the various attacks described, review several current media sources and identify examples of each. k. Acts of human error or failure: iv. Students and staff were told in February that some 350,000 of them could have had their social security numbers and financial information exposed on the internet. v. â€Å"It happened during an upgrade of some of our IT systems. We were upgrading a server and through human error there was a misconfiguration in the setting up of that server,† said UNCC spokesman, Stephen Ward. l. Compromises to intellectual property: vi. Today we bring news of action against a site that supplied links to films, music and games hosted on file-hosters all around the world. Authorities say they have charged three individuals said to be the administrators of a very large file-sharing site. vii. To get an idea of the gravity local police are putting on the case, we can compare some recent stats. According to US authorities Megaupload, one of the world’s largest websites at the time, cost rightsholders $500m. GreekDDL (according to Alexa Greece’s 63rd largest site) allegedly cost rightsholders $85.4m. m. Deliberate acts of espionage or trespass: viii. The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defense contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell. ix. Snowden will go down in history as one of America’s most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world’s most secretive organization – the NSA. x. Additional, interesting, read: http://www.cbsnews.com/8301-201_162-57600000/edward-snowdens-digital-maneuvers-still-stumping-u.s-government/ 1. The government’s forensic investigation is wrestling with Snowden’s apparent ability to defeat safeguards established to monitor and deter people looking at information without proper permission. n. Deliberate acts of information extortion: xi. Hackers claimed to have breached the systems of the Belgian credit provider Elantis and threatened to publish confidential customer information if the bank does not pay $197,000 before Friday, they said in a statement posted to Pastebin. Elantis confirmed the data breach Thursday, but the bank said it will not give in to extortion threats. xii. The hackers claim to have captured login credentials and tables with online loan applications which hold data such as full names, job descriptions, contact information, ID card numbers and income figures. xiii. According to the hackers the data was stored unprotected and unencrypted on the servers. To prove the hack, parts of what they claimed to be captured customer data were published. o. Deliberate acts of sabotage or vandalism: xiv. Fired Contractor Kisses Off Fannie Mae With Logic Bomb xv. Rajendrasinh Babubha Makwana, a former IT contractor at Fannie Mae who was fired for making a coding mistake, was charged this week with placing a â€Å"logic bomb† within the company’s Urbana, Md., data center in late October of last year. The malware was set to go into effect at 9 a.m. EST Saturday and would have disabled internal monitoring systems as it did its damage. Anyone logging on to Fannie Mae’s Unix server network after that would have seen the words â€Å"Server Graveyard† appear on their workstation screens. p. Deliberate acts of theft: xvi. Four Russian nationals and a Ukrainian have been charged with running a sophisticated hacking organization that penetrated computer networks of more than a dozen major American and international corporations over seven years, stealing and selling at least 160 million credit and debit card numbers, resulting in losses of hundreds of millions of dollars. q. Deliberate software attacks: xvii. China Mafia-Style Hack Attack Drives California Firm to Brink xviii. A group of hackers from China waged a relentless campaign of cyber harassment against Solid Oak Software Inc., Milburn’s family-owned, eight-person firm in Santa Barbara, California. The attack began less than two weeks after Milburn publicly accused China of appropriating his company’s parental filtering software, CYBERsitter, for a national Internet censoring project. And it ended shortly after he settled a $2.2 billion lawsuit against the Chinese government and a string of computer companies last April. xix. In between, the hackers assailed Solid Oak’s computer systems, shutting down web and e-mail servers, spying on an employee with her webcam, and gaining access to sensitive files in a battle that caused company revenues to tumble and brought it within a hair’s breadth of collapse. r. Forces of nature: xx. Websites Scramble As Hurricane Sandy Floods Data Centers xxi. The freak storm flooded data centers in New York City, taking down several major websites and services — including The Huffington Post, Buzzfeed and Gawker — that depended on them to run their businesses. xxii. Several websites stored their data at a lower Manhattan data center run by Datagram, whose basement was inundated with water during the storm, flooding generators that were intended to keep the power on. s. Deviations in quality of service from service providers: xxiii. China’s Internet hit by biggest cyberattack in its history xxiv. Internet users in China were met with sluggish response times early Sunday as the country’s domain extension came under a â€Å"denial of service† attack. xxv. The attack was the largest of its kind ever in China, according to the China Internet Network Information Center, a state agency that manages the .cn country domain. xxvi. The double-barreled attacks took place at around 2 a.m. Sunday, and then again at 4 a.m. The second attack was â€Å"long-lasting and large-scale,† according to state media, which said that service was slowly being restored. t. Technical hardware failures or errors: xxvii. A hardware failure in a Scottish RBS Group technology center caused a NatWest bank outage. xxviii. It prevented customers from using online banking services or doing debit card transactions. u. Technical software failure or errors: xxix. RBS boss blames software upgrade for account problems xxx. The boss of RBS has confirmed that a software change was responsible for the widespread computer problems affecting millions of customers’ bank accounts. v. Technological obsolescence: xxxi. SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones xxxii. After three years of research, German cryptographer Karsten Nohl claims to have finally found encryption and software flaws that could affect millions of SIM cards, and open up another route on mobile phones for surveillance and fraud. Case Exercises Soon after the board of directors meeting, Charlie was promoted to Chief Information Security Officer, a new position that reports to the CIO, Gladys Williams, and that was created to provide leadership for SLS’s efforts to improve its security profile. Questions: 1. How do Fred, Gladys, and Charlie perceive the scope and scale of the new information security effort? a. Charlie’s proposed information security plan aims at securing business software, data, the networks, and computers which store information. The scope of the information security effort is quite vast, aiming at securing each vulnerability – in addition to the aforementioned, the new information security plan also focuses on the company’s staff. Since extra effort will be required to implement the new managerial plan and install new security software and tools, the scale of this operation is quite large. 2. How will Fred measure success when he evaluates Gladys’ performance for this project? How will he evaluate Charlie’s performance? b. Gladys is appointed as CIO of the team, which is gathered to improve the security of the company due to virus attack that caused a loss in the company; I believe Fred will measure Gladys success by her ability t o lead, keep the plan on track (i.e. time management) and successfully sticking to the proposed budget. Charlie was promoted to chief information security officer, a new position that reports to the CIO; I believe Fred will measure Charlie’s success by his ability to implement the new plan, report his/their progress and the overall success of the new system. 3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process? c. Portable Media Management (Ex. USB, DVD-R/W) should receive Charlie’s attention early in his planning process

Sunday, November 10, 2019

Over-crowded Classes

The background to the studyThere was a shocking difficult of overcrowded classes in public primary schools of Mangaung, due to an high residents as it is in central part of the province Free State. One class can be having over forty learners, and this makes the learning process to be ineffective and difficult. This difficult causes a major poor performance in the school academics as to one in such a huge number. In such large classes, the teacher cannot concentrate on all learners in class for attention The statement of the Research problem There was a shocking problem of over-crowded classes in public primary schools of Mangaung, due to an elevated population as it is in central part of the province Free State. One class can be having over forty learners, and this makes the learning process to be ineffective and difficult. A class can have about fifty learners and effective learning become hard. This devastating problem make the performance of learners to drop, the teacher cannot concentrate on all learners in class for attention. Research questions 1. Does overpopulation in school affect learner's academic performance? 2. What are the problems both teachers and learners face in overcrowded classroom in teaching and learning process in primary schools of Mangaung district? 3. Does overpopulation affect the efficiency of teachers in the process of teaching? 4. Howdoes the size of class influence in learners behavior? 5. What are the solutions to the problems both teachers and learners face in over-crowded classrooms in a primary? 6. Is classroom management possible in overcrowded classrooms?The purpose of the studyThe general purpose of this study is to inspect the effect of overcrowded classrooms on the academic performance of learners in public primary schools. The purpose of the study is also to disclose the impact of classroom overpopulation on performance of learner's academically To inspect factors affecting teachers to fail classroom managementThe significance of the studyThis study is very important to supply the school management with information to recognize the challenges faced by teachers and learners in overpopulated classes. This study will make known the extent to which overpopulated has affected learners academic performance. It also tells the other issues affecting learner's performance. In addition, this study will help the school leaders and teachers to propose procedures to reduce the effect of overcrowding in public primary schools. The result of the study will help teachers of primary schools to understand the product of over-crowding in classes, and to find out ways of how to teach the class of more number than the required. The study will provide support for additional research in education and it will be in the best sign of the learners, teachers, and government.Definition of key termsAcademicWord used to describe things that related to the work done in schools, colleges and universities.Over-crowdedFull accommodation or a space beyond what is usual or comfortableClassroomA building constructed for organizing students for learningClassroom managementThe essential part of the teaching and learning process, the methods, strategies and skills teachers use to maintain classroom environment.Delimitation of the studyThis study is performing in Mangaung district at Botshabelo where two primary schools will select a case study. The primary schools participating areNthabiseng Primary School and Pelong primary school who have more over-crowded classrooms.REVIEW OF RELATED LITERATUREIntroduction Most of South African school's leading difficult is overcrowded classrooms. This affects the learner's performance and teachers' motivation as well. There is a need to look onto how hard it is for both learners and teachers to cooperate and make it through in this tough situation.it is impossible to learn and teach when there are many learners and one teacher in class. The teachers experience every day (Davis, 2013).Teaching challenges in overcrowded classroomsOverpopulation in classrooms affect learners as much as it affects teachers, in long run this will affect the department of education as majority of learners' academic achievements will drop. Teaching in overcrowded classrooms face big challenges of having to create a productive learning environment for learners. De Corby, 2005 states that physical teaching teachers are challenged in engaging in important physical activities and because of overcrowded classrooms this is difficult for them. Most of the subject such as life orientation and sciences in terms of practical suffer a lot due to the class size, even the laboratory is not available. This is mostly experienced in South African schools. For example, the study of Guardian Africa Network found that some schools in the Eastern Cape have more than 120 packed in one classroom into one classroom and teachers are obliged to present lessons with their backs pressed up against the blackboard (Guardian Africa Network, 2013). During the practical experience I acquired from the Central University of Technology, I noticed that in Free State this problem is huge. Having to teach more than 50 learners for 30 minutes per period is not enough. Some of the problems are small space and no resources and equipment needed in some subjects. Teachers cannot practice a variety of methods, such as higher-order questioning methods and active learning methods due to lack of space. The science teachers cannot perform the practical, learners do not concentrate, and discipline is not there due to the number. In fact, teachers are effectively limited to the ‘chalk and talk' instructional method (Opoku-Asare et al., 2014:128). This also give teachers challenge in terms of how to finish the curriculum, resulting in teachers being guided by the books and work schedule or weekly plan but not teaching for the learners to understand. The teachers give over less time to instruction and give learners lot of notes on the board resulting in learners not even writing those notes because of their number the teacher cannot even tell who participate and who does not. Tasks such as checking presence of learners, and managing their performance take lot of time of content and lessons. Time teachers give to individual students is affected by class size as well as the social self-motivation among students. The teachers are challenged a lot because as much as they want to help all learners, it is impossible and very sad. Class sizes are a problem in the Free State and even present problems to student teachers in conducting learners centered lesson methods. Large class size gives practicing teachers only one option of teaching style that is convenient that requires learners to be passive recipients of knowledge during lessons. This does not allow for learner teachers to interaction (Mtika, 2010). The quality of learning and teaching for them is lost and this can emotionally drain them, leaving them with doubts of continuing the teaching career. There is a lot of noise in large classes this being an outcome of an increasing number of learners in the classroom. Noisy classrooms translate to the distraction, making it more difficult for learners to learn and for teachers to teach. No concentration in class and more time wasted trying to make learners keep quit instead of teaching. There is creation of stress for teachers making it difficult for them to handle the learning needs of learners (Oliver, 2006). This creates a hurt on the bond between the teacher and the learner. Most of the time spent is at school than at home, teachers supposed to know the learners and their ability more than their biological parents do and the lack of bond leads to problems and disruptions in the classroom. This can create a negative learning environment for the teacher and learner. Behavioral problems, absenteeism and high failure rates are experiences in overcrowded classrooms (Gibbs ; Jenkins, 1992). Gibbs and Jenkins (1992) indicate that dealing with overcrowded classrooms leads to high teacher absenteeism, teacher laziness and teacher stress. The research that is presenting an international perspective has shown that teachers internationally are finding difficulty in managing overcrowded classrooms.Disciplinary problems in large classesOvercrowding increases classroom issues of discipline. More learners provide more opportunities provided for personal conflicts, tension and general disruptive behavior. Even the best teacher or the principal cannot control the overcrowded classroom effectively , teachers find themselves spending more time to manage the class that they spend the time to teach. It is easy for learners to misbehave in large classes because teachers cannot keep their ey es on one person the whole time. Most of troublesome learners comes from overcrowded classerooms, troubles such as bullying, disrespecting and violence. Teachers are involved in failure to maintain classroom management by coming to class with no lesson plan. This learners most of them have problems from outside classroom that make them to misbehave. According to Mustafa (2014) more number of learners in classroom the more misbehavior increase and classroom management become difficult. Corporal punishment is not legal in South Africa. It is not easy for teachers and principals to discipline the learners and give the penalties. Every doing is according to the laws no matter how long it will take. The permissions available to the disciplining learners are very few. Beyond talking to learners as their teacher, and short of transferring or expelling them, disciplinarians hold students out of class, contact their parents, or enforce one to five day suspensions. Official responses to misbehavior are, thus, limited in training to either a simple reproof, holding the learner in the office until the next class period, or a suspension, this is still not enough for every minute a learner spend outside is loss of education. The most easily front runners' problems for suspension are class troubles, failure to attend classes, disrespect, leaving the school during school time. The other common types of disciplinary problems found mostly in schools as mentioned by Donnelly (2000) are fights, and disbelief of the organization. McManus (1995) lists several types of misbehaviorsthat make the work of educators difficult. These include; Repeatedly asking to go to the toilet; Missing lessons, absconding; Smoking in the toilets; Pushing past the educator; learners playing with matches in class and making rude remarks to the teacher when the teacher stops them. The noisewhen the learner is supposed to be writing; this happen a lot when learners are writing formal tasks and it distract other learners who are concentrating. Other misbehavior includes : talking while the teacher is talking, failing to raise hand before talking, Being abusive to the educator; fighting in class; Chasing one another around the classroom; Packing up early, as if to leave while the teacher is busy with the lesson. This thing of taking the educator's property without the permission is bad because it is associated with stealing. The mentality of wearing private clothes and not the school uniform especially during winter seasons is one of the misbehavior that teachers and principal deal with all the time. Leaving class early; and Commenting of wanting to go home while the teacher is busy is what most of the learners always do and it really irritate the teacher and make other learners to lose focus. The absence of parents on their children's school life play a huge part in the discipline of learners, this starts as early as in primary school level. Learners are coming to school with bad attitudes towards life and school. Lot parents are not involved in the education of their children, they do not even check the books, they do not attend parents' meetings, and these cause poor results, and learners dodging school. Louw and Barnes (2003) clarify that there is no problem child, there are only problem parents, those learners who behave badly at school are not taught respect at home. Rossouw (2003) regards the failure in discipline in most schools as originating from the communities rather than from schools. What causes the parents of learners to be absent in their school life is that, they are single parents at home and having lack of parental dominance over the house. Children who are walking and playing in croups influence each other in the discipline and misbehavior. These learners increase the problems of discipline negatively These groups effects on what are the child principles, what he or she knows, and learns. The amount of this influence depends on other situations such as, age and personality of children in the group and the nature of the group its self (Harris, 1998; Hartup, 1983). There are no doubts that the peer pressure and groups affect the aupport the growth problem of youth behavior. According to Seita, Mitchell and Tobin (1996) â€Å"When the family and loved ones of the children are absent in their lives, someone will play their part for them and advice the child†.MethodologyResearch methodology The study is descriptive in nature. It is an attempt to investigate the problems faced by the teachers in overcrowded classes and suggested some measures to settle these problems.Research designThe research captures the structure of case study. Case study is helping in making the results more vigorous, worth natural setting and context. Teachers are able to elaborate further in where the ‘how' and ‘why' questions are discovering. For this study, the case study is to search a specific group of teachers, in two public overcrowded schools in order to explore their experience in overcrowded classrooms.The research instrumentsThe study is developing appropriate tools for the collection and analysis of necessary data. Close ended questionnaires that are unstructured for teachers.The population and samplingPopulationThe population of the study included two government schools. Ten teachers of different gender and age are part of the research.The sampleThere are ten participants i n the study and two classrooms are going to be part of observation. Five teachers are from Nthabiseng Primary school and five teachers are from Pelong primary school. One classroom each school for observations. Both schools are public schools in Mangaung disctrict, Botshabelo, Free State province Sampling technique / procedurePurposive samplingOnly the teachers of two overcrowded schools are participating. Between those two schools, only teachers who have overcrowded classrooms participate so that the research can gain accurateinformation for the experiences in the overcrowded classrooms. Convenience sampling is used, the teachers who are readily available to contact will participate. The technique participants from Nthabiseng Primary are easily accessible to generate data from the schoolData collection proceduresThe research is using the unstructured questionnaire and observation as the methods of data procedure and data generation.Unstructured QuestionnaireIn this study, a questionnaire is a primary data tool for collecting data from the teachers. Open-ended questions for respondents because they impose no restriction and they allow foe any response to questions provided to the respondent. This type of questioner is preferred because the respondent will express themselves freely with no restrictions. The questioner generates personal opinions, beliefs, emotions and experiencesObservationsThe observation method helps in taking the live data from the natural occurring social location. The teachers' observation will take place while they teach one classroom it is impor tant to observe these classrooms so that they could be included in in sample so that the researcher could also have first-hand experience into what happens in overcrowded classrooms of different schools, observing learner-teacher interaction and the attitudes of both learners and teachers. This is a preferred method as it allows the researcher to gain insight information into teachers' experiences with overcrowded classrooms. The secondary data collections are from review of literature, a study of documents and books.Data Analysis TechniquesFor the purpose of this research, there is carefully and thoroughly reading, transcribing, and analysing of data. Thematic analysis will ensure the rich description of the data set.Ethical ConsiderationThe principal will receive the written letter asking the permission to use their school for the research. Explaining the purpose of the study and asking the permission to make class observations while teachers work Approval from the Department of B asic Education informing them of the plans to use Nthabiseng primary school and Pelong primary school in this research All the participants as well as the school involved in the study privacy and secrecy will be with respect.Limitations of the StudyMost of the sources are old therefore; the present study literature is limited. The sample size that is the number of teachers is also limited, reason being they must be in classes teaching not answering questioners. During data collections under observation method, the teachers do things different from when the researchers are not there.

Friday, November 8, 2019

How Teflon Sticks to Nonstick Pans

How Teflon Sticks to Nonstick Pans Teflon is DuPonts brand name for polytetrafluoroethylene or PTFE, a fluoropolymer in which the fluorine atoms are so tightly bonded to the carbon atom that everything else slips right off. Its a miracle of modern chemistry that you encounter whenever you use non-stick cookware. But... if Teflon is non-stick, then how do they get it to stick to pans in the first place? How Teflon Sticks to Pans You might guess Teflon somehow sticks to metal better than it does to eggs, but in reality, the polymer slides right off of metallic surfaces, too. In order to get Teflon to stick to a pan, the metal is sandblasted. A primer coat of Teflon seeps into the tiny holes and cracks. The Teflon is baked into the pan. It doesnt stick to the metal, but the plastic has a hard time working its way out of the nooks and crannies. A finishing layer of Teflon is applied and baked onto the primed surface. Teflon has no trouble polymerizing with itself, so this layer bonds to the prepared pan without any problem. Keeping the Teflon in Place You can ruin your Teflon-coated pan two ways. You can damage the Teflon coating or scratch beneath it if you use metal utensils or too much force stirring or scraping food. The other way to ruin the pan is by applying too much heat, which can happen if you burn your food or heat the pan without any food in it. When too much heat is applied, the carbon bonds break, releasing fluorocarbons into the air. This isnt great for either the pan or your health, so non-stick cookware shouldnt be subjected to extremely high heat. What Is Plastic? | Make Plastic from Dairy

Tuesday, November 5, 2019

Line Item Veto Definition - History and Examples

Line Item Veto Definition s The line item veto is a now-defunct law that granted the president absolute authority to reject specific provisions, or lines, of a bill sent to his desk by the U.S. House of Representatives and the Senate while allowing other parts of it to become law with his signature. The power of the line item veto would allow a president to kill parts of a bill without having to veto the entire piece of legislation. Many governors have this power, and the president of the United States did, too, before the U.S. Supreme Court ruled the line-item veto unconstitutional. Critics of the line item veto say it granted the president too much power and allowed the powers of the executive branch to bleed into the duties and obligations of the legislative branch of government.  This act gives the president the unilateral power to change the text of duly enacted statutes, U.S. Supreme Court Justice John Paul Stevens wrote in 1998. Specifically, the court found that the  Line Item Veto Act of 1996 violated the Presentment Clause of the Constitution, which allows a president to either sign or veto a bill in its entirety. The Presentment Clause states, in part, that a bill  be presented to the president of the United States; if he approve he shall sign it, but if not he shall return it.   History of the Line Item Veto U.S. Presidents have frequently asked Congress for line-time veto power. The line item veto was first brought before Congress in 1876, during President Ulysses S. Grant’s term of office. After repeated requests, Congress passed the Line Item Veto Act of 1996. This is how the law worked before it was struck down by the high court: Congress passed a piece legislation that included taxes or spending appropriations.The president lined  out specific items he opposed and then signed the modified bill.The president sent  the lined-out items to Congress, which had 30 days to disapprove of the line item veto. This required a simple majority vote in both chambers.If both the Senate and House disapproved, Congress sent  a bill of disapproval back to the president. Otherwise, the line item vetoes were implemented as law. Prior to the act, Congress had to approve any presidential move to cancel funds; absent congressional action, the legislation remained intact as passed by Congress.However, the President could then veto the disapproval bill. To override this veto, Congress would have needed a two-thirds majority. Presidential Spending Authority Congress has periodically given the President statutory authority not to spend appropriated funds. Title X of The Impoundment Control Act of 1974 gave the president the power to both delay the expenditure of funds and to cancel funds, or what was called rescission authority. However, to rescind funds, the president needed congressional concurrence within 45 days. However, Congress is not required to vote on these proposals and has ignored most presidential requests to cancel funds. The Line Item Veto Act of 1996 changed that rescission authority. The Line Item Veto Act put the burden on Congress to disapprove a line-out by the presidents pen. A failure to act meant the presidents veto take effect. Under the 1996 act, Congress had 30 days to override a presidential line item veto. Any such congressional resolution of disapproval, however, was subject to a presidential veto. Thus Congress needed a two-thirds majority in each chamber to override the presidential rescission. The act was controversial: it delegated new powers to the president, affected the balance between the legislative and executive branches, and changed the budget process. History of the Line Item Veto Act of 1996 Republican U.S. Sen. Bob Dole of Kansas introduced the initial legislation  with 29 cosponsors. There were several related House measures. There were restrictions on presidential power, however. According to the Congressional Research Service conference report, the bill: Amends the Congressional Budget and Impoundment Control Act of 1974 to authorize the President to cancel in whole any dollar amount of discretionary budget authority, any item of new direct spending, or any limited tax benefit signed into law, if the President: (1) determines that such cancellation will reduce the Federal budget deficit and will not impair essential Government functions or harm the national interest; and (2) notifies the Congress of any such cancellation within five calendar days after enactment of the law providing such amount, item, or benefit. Requires the President, in identifying cancellations, to consider legislative histories and information referenced in law. On  March 17,1996, the Senate voted 69-31 to pass the final version of the bill. The House did so on March 28, 1996, on a voice vote. On April 9, 1996, President Bill Clinton signed the bill into law. Clinton later descried the Supreme Courts strikedown of the law, saying it was a defeat for all Americans. It deprives the president of a valuable tool for eliminating waste in the federal budget and for enlivening the public debate over how to make the best use of public funds. Legal Challenges to the Line Item Veto Act of 1996 The day after the Line Item Veto Act of 1996 passed, a group of U.S. senators challenged the bill in the U.S. District Court for the District of Columbia. U.S. District Judge Harry Jackson, who was appointed to the bench by Republican President Ronald Reagan, declared the law unconstitutional on April 10, 1997. The U.S. Supreme Court, however,  ruled the senators did not have standing to sue, tossing their challenge and restoring the line item veto power to the president. Clinton exercised the line item veto authority 82 times. Then the law was challenged in two separate lawsuits filed in the U.S. District Court for the District of Columbia. A group of lawmakers from the House and Senate maintained their opposition to the law. U.S. District Judge Thomas Hogan, also a Reagan appointee, declared the law unconstitutional in 1998. His ruling was affirmed by the Supreme Court. The Court ruled that the law violated the Presentment Clause (Article I, Section 7, Clauses 2 and 3) of the U.S. Constitution because it gave the president the power to unilaterally amend or repeal parts of statutes that had been passed by Congress. The court ruled that the Line Item Veto Act of 1996 violated the process that the U.S. Constitution establishes for how bills originating in Congress become federal law. Similar Measures The Expedited Legislative Line-Item Veto and Rescissions Act of 2011 allows the president to recommend specific line items be cut from legislation. But its up to Congress to agree under this law. If Congress does not enact the proposed rescission within 45 days, the president must make the funds available, according to the Congressional Research Service.

Sunday, November 3, 2019

Real estate study Coursework Example | Topics and Well Written Essays - 2000 words

Real estate study - Coursework Example The tenant has defaulted on this quarters rent (due on 25 March 2015) as well as defaulting on its service charge and insurance contributions which were also reserved as rent. Tenant default is defined as the breach of agreement of the tenancy contract (The Law Commission, 2006). Spotted Dice Limited has breached the agreement with Lansbury Towers when the former defaulted with the rent payment, service charge, and insurance contributions. It is very important that the Landlord will carefully consider the action needed. In order for this to happen, the landlord should assess whether the default made by the tenant is just temporary or the tenant wants to terminate the lease (Green 2012). Without commencing any court proceedings, there are different remedies available to the management of Lansbury Towers where the tenant Spotted Dice Limited is in default such as forfeiture, levying distress, recovery as a debt, recovery from third parties, negotiations, surrender and reduction of rent (Cass 2013). Most of the lease contract contains a clause that will entitle the landlord to forfeit the lease in case of default. This remedy is considered one of the fastest, simplest and cheapest which will only require locks and notice to the premise (Cass 2013). â€Å"The right of landlord to forfeit arises: However, under Section 146 of the Law of Property Act of 1925, the landlord’s right to forfeit in respect to tenant’s default and breach of contract will not be enforceable unless a notice containing the following is served on the tenant: The Commercial Rent Arrears Recovery (CRAR) provides the new process for landlords of commercial premises such as Lansbury Towers to recover tenant’s default by taking control of tenant’s goods. There should be no residential element and CRAR requires lease of commercial premises and recovery for principal rent for it to apply. This remedy is very handy as it only requires transparency of process through a notice given

Friday, November 1, 2019

Case Study of Apple Essay Example | Topics and Well Written Essays - 500 words

Case Study of Apple - Essay Example ies on the assumption that a company’s approach to competitive advantage emanates from the unique resources that the organization owns and its potentials. An organization then identifies an environment in which its resources and potentials can grant in advantage over other firms and implements the resources and potentials. An understanding of available resources is therefore the first stage in pursuing the model and would include analysis of Apple’s human resources and fixed and current assets. Characteristics of employees such as strengths in creativity and innovation, ability to align self-interest with the organization’s goals, and ability to integrate ideas into a collective innovation would be important. Explorations of capabilities within the organization would then follow and research and development is a significant factor. Evaluation of availability of financial resources for conducting research and implementing research results would be one of the foci of capabilities analysis. Competence of human resource for identification of research needs, planning for proposed research, and implementation of the research is another center of focus for competence analysis. In analyzing its resources and potentials under the Resource-Based Strategy, Apple would consider value, scarcity, cost of duplication, and substitutability of the resources and potentials. The company should ensure that the resources and potentials that it plans to depend upon can empower it outshine its competitors or at least to neutralize the competitors’ effectiveness. The resources and potentials should also be within limited reach of competitors in terms of accessibility and involved cost. Considering these features and ensuring their existence in the market environment creates competitive advantage that facilitates success regardless of stiff level of competition. The strategy offers the organization a basis for organizing a formidable advantage in product quality, product

Wednesday, October 30, 2019

Accounting Assignment Example | Topics and Well Written Essays - 1250 words

Accounting - Assignment Example It is his intention to obtain funds from bank to procure the fixed assets required for production of the product. The start-up costs for Personal Fitness Equipment Inc. are estimated at $1,50,000. All start-up assumptions are based on an actual infusion of $50,000 in the form of capital to be introduced by Dr.John. The balance amount of $ 1,00,000 is proposed to be brought in through Bank Finance at the interest rate of 3%. Certain portion of the funds will be utilized to procure raw materials to fund production of initial inventory. A company office would be located at the Atlanta market area. Available office space has been located in Atlanta. This office space is small and may be secured at nominal cost. As needs dictate office and/or distribution facilities will be expanded. Initially, the small office will serve to manage marketing functions and sales/order processing. Personal Fitness Equipment Inc, is in the business of manufacturing Fitness equipments for personal use. The promoter has come up with a unique design of Personal Fitness Equipment (PFE). This equipment is easy to use and is being priced at a cheaper rate. The main feature of this equipment is the safety standards and the wide range of exercises that can be performed with this equipment. The equipment is proposed to be made with metal of ideal weight. This product designed by Dr. John can be produced at low cost, is lightweight, independent tests have been performed at university and Local Gyms. The users have given positive feedback that the regularity of their physical exercise has increased after purchasing this product. The Appendix section has all the relevant Financial Projections. The sales forecast for the first year of operation is estimated at USD 500000. The company is expected to earn Gross profit at the rate of 54% of the turnover. The net profit of the company is estimated at USD 113770, which workout to about 23% of the turnover.

Saturday, October 26, 2019

“Naked Villainy”: Richard as a Satanic Hero Essays -- Literary Analy

In many religions and cultures, a demonic entity embodies the spirit of evil, ruler of hell, enemy of God, and tempter of humankind. This arch rebel figure often emerges in literature, and one of the most well-known is Satan, a defiant epitome of evil from John Milton’s epic poem Paradise Lost. There must be good in the presence of evil, thus there must be a hero with whom the villain clashes with, a bold character whom the audience roots for. In Shakespeare’s tragic play Richard III, Richard plays the role of both the hero and the villain by using his heroic traits to underscore his satanic persona. He is a satanic hero because he uses his political eloquence to rebel, his isolation causes him to oppose all moral constraints, and he wears a mask of charisma to hide his selfish lust for power. In other words, Richard, like Satan, is elevated by heroic traits like alluring eloquence but is so deeply self-absorbed and bent on revenge that he precipitates his own dest ined downfall. Richard is skilfully eloquent; however he chooses to convey this heroic trait satanically by using it to emphasize his rebellious nature against love, politics, and religion. Love is built upon reciprocated affection between two individuals, but Richard rebels by using it as a political tool, to the extent that he suggests incest at various points throughout the play. During the wooing scene, he wins the heart of Lady Anne by saying, â€Å"Your beauty was the cause of that effect: / Your beauty, that did haunt me in my sleep †¦Ã¢â‚¬  (1 .2, 126-127), accusing Anne’s beauty as inducement for murder. This quote implies that he plays upon the emotions of others, winning women over and bringing out their vulnerability by â€Å"his insinuating discourse† (Wilhelm, 20)... ...conscience finally surfaces. Richard’s seclusion is a result of his ambition and isolation, and he is so absorbed in his schemes of personal gain that he does not realize how he is lending himself to catastrophe. Richard, like Satan, is heroically amiable and well-spoken, but his greediness and insubordinate lust for power lend him to his predestined downfall. When Richard says, â€Å"I am determined to prove a villain†, he implies a tragic conception that he controls his predestined fate, and the providentialism eventually endorses this meaning. He uses his political eloquence to rebel, he is isolated and therefore his mental and physical energy is unhampered by his moral deformity, and he masks his satanic traits with charisma. Though the ending is tragic for Richard, it is a new beginning for England, and in a way, Richard purges England of its collective guilt.

Thursday, October 24, 2019

Water Pollution in Our Day Today Life

Water pollution in our day to day life What is water pollution? Water pollution is any chemical, physical or biological change in the quality of water that has a harmful effect on any living thing that drinks or uses or lives (in) it. When humans drink polluted water it often has serious effects on their health. Water pollution can also make water unsuited for the desired use. What are the major water pollutants? There are several classes of water pollutants. The first are disease-causing agents. These are bacteria, viruses, protozoa and parasitic worms that enter sewage systems and untreated waste.A second category of water pollutants is oxygen-demanding wastes; wastes that can be decomposed by oxygen-requiring bacteria. When large populations of decomposing bacteria are converting these wastes it can deplete oxygen levels in the water. This causes other organisms in the water, such as fish, to die. A third class of water pollutants is water-soluble inorganic pollutants, such as aci ds, salts and toxic metals. Large quantities of these compounds will make water unfit to drink and will cause the death of aquatic life.Another class of water pollutants are nutrients; they are water-soluble nitrates and phosphates that cause excessive growth of algae and other water plants, which deplete the water's oxygen supply. This kills fish and, when found in drinking water, can kill young children. Water can also be polluted by a number of organic compounds such as oil, plastics and pesticides, which are harmful to humans and all plants and animals in the water. A very dangerous category is suspended sediment, because it causes depletion in the water's light absorption and the particles spread dangerous compounds such as pesticides through the water.Finally, water-soluble radioactive compounds can cause cancer, birth defects and genetic damage and are thus very dangerous water pollutants. More information on health effects of microrganisms Where does water pollution come fro m? Water pollution is usually caused by human activities. Different human sources add to the pollution of water. There are two sorts of sources, point and nonpoint sources. Point sources discharge pollutants at specific locations through pipelines or sewers into the surface water. Nonpoint sources are sources that cannot be traced to a single site of discharge.Examples of point sources are: factories, sewage treatment plants, underground mines, oil wells, oil tankers and agriculture. Examples of nonpoint sources are: acid deposition from the air, traffic, pollutants that are spread through rivers and pollutants that enter the water through groundwater. Nonpoint pollution is hard to control because the perpetrators cannot be traced. How do we detect water pollution? Water pollution is detected in laboratories, where small samples of water are analysed for different contaminants.Living organisms such as fish can also be used for the detection of water pollution. Changes in their behav iour or growth show us, that the water they live in is polluted. Specific properties of these organisms can give information on the sort of pollution in their environment. Laboratories also use computer models to determine what dangers there can be in certain waters. They import the data they own on the water into the computer, and the computer then determines if the water has any impurities. What is heat pollution, what causes it and what are the dangers?In most manufacturing processes a lot of heat originates that must be released into the environment, because it is waste heat. The cheapest way to do this is to withdraw nearby surface water, pass it through the plant, and return the heated water to the body of surface water. The heat that is released in the water has negative effects on all life in the receiving surface water. This is the kind of pollution that is commonly known as heat pollution or thermal pollution. The warmer water decreases the solubility of oxygen in the wate r and it also causes water organisms to breathe faster.Many water organisms will then die from oxygen shortages, or they become more susceptible to diseases. For more information about this, you can take a look at thermal pollution. What is eutrophication, what causes it and what are the dangers? Eutrophication means natural nutrient enrichment of streams and lakes. The enrichment is often increased by human activities, such as agriculture (manure addition). Over time, lakes then become eutrophic due to an increase in nutrients. Eutrophication is mainly caused by an increase in nitrate and phosphate levels and has a negative influence on water life.This is because, due to the enrichment, water plants such as algae will grow extensively. As a result the water will absorb less light and certain aerobic bacteria will become more active. These bacteria deplete oxygen levels even further, so that only anaerobic bacteria can be active. This makes life in the water impossible for fish and other organisms. What is acid rain and how does it develop? Typical rainwater has a pH of about 5 to 6. This means that it is naturally a neutral, slightly acidic liquid.During precipitation rainwater dissolves gasses such as carbon dioxide and oxygen. The industry now emits great amounts of acidifying gasses, such as sulphuric oxides and carbon monoxide. These gasses also dissolve in rainwater. This causes a change in pH of the precipitation – the pH of rain will fall to a value of or below 4. When a substance has a pH of below 6. 5, it is acid. The lower the pH, the more acid the substance is. That is why rain with a lower pH, due to dissolved industrial emissions, is called acid rain. Why does water sometimes smell like rotten eggs?When water is enriched with nutrients, eventually anaerobic bacteria, which do not need oxygen to practice their functions, will become highly active. These bacteria produce certain gasses during their activities. One of these gases is hydrogen sulphide. This compounds smells like rotten eggs. When water smells like rotten eggs we can conclude that there is hydrogen present, due to a shortage of oxygen in the specific water. What causes white deposit on showers and bathroom walls? Water contains many compounds. A few of these compounds are calcium and carbonate.Carbonate works as a buffer in water and is thus a very important component. When calcium reacts with carbonate a solid substance is formed, that is called lime. This lime is what causes the white deposit on showers and bathroom walls and is commonly known as lime deposit. It can be removed by using a specially suited cleaning agent. More specific information on water pollutants or freshwater pollution is now available or take a look at types of pollution for freshwater For water terminology check out our Water Glossary or go back to water FAQ overview Feel free to contact us if you have any other questionsAbout Lenntech Turnkey plants Pilot plants Containerized pla nts Services Career at Lenntech International Internships Periodic table Calculators Visitors information Our partners Contact us Lenntech BV Rotterdamseweg 402 M 2629 HH Delft The Netherlands tel: +31 15 261 09 00 fax: +31 15 261 62 89 e-mail: [email  protected] com Request a quote ? Home Applications Processes Systems Products Library Languages Copyright  © 1998-2011 Lenntech B. V | Email: [email  protected] com | Tel. +31 15 261 09 00 | Fax. +31-15-2616289 Read more: http://www. lenntech. com/water-pollution-faq. htm#ixzz2Ccrcb1wl