Monday, September 30, 2019

Dealing with Suffering and Loss

Suffering and loss is a regular situation in the human life cycle, it is vital to learn how to deal with it so that it doesn’t affect the rest of our lives negatively. In Scott Russell Sanders’s Ten Reasons Why We’ll Always Need a Good Story he explains that one of the reasons is to help us deal and become aware of suffering, loss, and death. During our youth we often don’t consider the end of the life cycle.However, in life we will always encounter grieving from a loved one’s death. The first time we experience some sort of grieving it may be very hard to handle and may cause depression. Stories help us prepare for moments of suffering, loss, and death with fictional experiences which show us how to deal with these unfortunate events. In the three short stories we read at least one character in each story is forced to deal with suffering, loss, or death.In the short story Bluffing by Gail Helgason, Liam has an unfortunate accident and experiences p hysical pain as well as the emotional pain of his deteriorating relationship with Gabriella. In Two Words by Isabel Allende, Belisa Crepusculario is devastated by the death of her entire family due to their impoverished lifestyle and the love between her and the Colonel causes them to miss each other. In The Indisputable Weight of the Ocean by Darryl Berger, Edmund deals with not being able to see his father and deals with the suffering of moving to a suburban area.First of all, breaking up with your partner can cause heavy depression to some people and it makes us feel like we’ve lost someone important in our lives, also enduring a large amount of physical pain causes us to more careful to avoid feeling anything like that again. In Bluffing we do not get to witness how Gabriella and Liam’s relationship continues, however, the author leaves us to infer that the relationship is coming to an end. We are also left to infer how they both feel after they breakup.Gabriella f eels that Liam is not committed to the relationship after he broke the news to her that he would be leaving to go on a hiking trip for three months. When Gabriella stormed off into the woods it becomes clear that she is ending the relationship, however, the accident that happened to Liam just after she stormed off made it hard for her to leave him because of his condition, it would make her seem superficial because Liam would think she is breaking up with him because he looks worse: â€Å"She knows in her bones that she can manage this way, for the rest of the rest of the afternoon, at least† (Helgason 7).Another example of suffering and loss in Bluffing is when Liam is unfortunately attacked by a grizzly and receives many injuries to his body and also to his face. Liam has to suffer with this immense amount of physical pain. Liam’s confidence may also be lower due to his â€Å"puffed up [skin], mottled, with ridges of shiny, rubbery scar tissue†(Helgason 7) whi ch may cause depression because he doesn’t want anyone to see him the way his is now, looking worse than before. We cannot allow breaking up with our partner or physical pain to affect us negatively for too long because these are both natural incidents of human life.Second of all, dealing with the death of a loved one is often the most amount of emotional pain someone can experience in a lifetime, also not knowing if you will ever see a loved one can also cause depression. In the short story Two Words Belisa Crepusculario lives an impoverished lifestyle where her â€Å"family is so poor they did not even have names to give their children†¦and [she] grew up in an inhospitable land† (Allende 1) making it hard for the Crepusculario family to survive.Tragically, Belisa had to bury four younger brothers and sisters. This is most likely the most horrifying incident Belisa will experience in her life time and what made it worse is that they were all very young. Surely, B elisa did a lot of grieving but she overcame her emotional pain and set out on a journey for a positive life. She became widely popular and respected across the country even catching the attention of the Colonel for her incredible skill with words. She enjoys her profession and the new life she has begun.This story of Belisa’s misfortune is a great lesson of human life because we cannot allow the grieving of a loved one’s death to control the rest of our lives, the same way Belisa beats the odds and begins a positive life: â€Å"There were few occupations she was qualified for. It seemed that selling words would be an honourable alternative† (Allende 3). The next example of suffering and loss in Two Words is when Belisa tells the colonel the secret words and they control his mind at an important point in his career: â€Å"Those two words that were buried like two daggers in his gut† (Allende 7).This shows loss because the Colonel is unable to think straig ht because of his love for Belisa after she tells him the two words. He doesn’t know if he will ever see her again and he is constantly worried about that. This shows us how not being able to see someone you love can affect you negatively. In two words Belisa’s grieving of her siblings and the love between Belisa and the Colonel are two examples that show us how to deal with suffering and loss.Not being able to see a family member or friend is similar to losing someone, however, we still have hope that we will one day meet them again, and being forced to change your lifestyle can cause suffering. In The Indisputable Weight of the Ocean a â€Å"little gentleman† by the name of Edmund Kelley has a father who is a mystery to him. The author explains, â€Å"For as long as he could remember, it had just been the two of them† (Berger 1). Since Edmund is an incredibly intelligent ten year old he has surely wondered if his father is actually just away for work fo r so many years.His father being away for so long makes Edmund feel as though he has lost him, however, he still has hope that one day his father will return, therefore he does not grieve like he would if he found out that his father is dead. The next example of suffering in the short story is not between two or more humans, it is between Edmund and his changing life. To Edmunds disappointment he and his mom have to leave their isolated lives on the acreage and move to a more populated suburban area.Since Edmund is anti-social towards children his own age it is hard for him to be around them all the time: â€Å"Edmund did not have much use for other children. The only time he saw any was when they went into town for groceries, and what he saw he did not like† (Berger 1). Edmund notices that his mother is only searching for a better life for the both of them: â€Å"Edmund was not without consideration for his mom. And because he did not want to be an extra burden on her, he t ried to cope with his new situation† (Berger 2). He tried his hardest to never complain about the suffering he is going through.In these two examples from this short story we learn how to deal with not being able to see a loved one and not knowing when or if you will see them again, and we learn how to cope with new situations that often occur in one’s life. Overall, some of the characters in the three short stories all have to face suffering and/or loss in a variety of ways. All the different situations teach us how to deal with these real life experiences so that suffering and loss doesn’t affect the rest of our lives negatively. We learn how to deal with a deteriorating relationship and physical pain from accidents.We also learn how to deal with the emotional pain of a deceased loved one and not knowing if you will ever see someone you fell in love with. The last two situations we learn how to deal with are, not being able to see a family member for a long tim e and the suffering of changing your lifestyle or where you live. Instead of learning from our own mistakes like we are always told to do when we’re growing up, stories allow us to never make those mistakes ourselves, but learn from the mistakes that the characters have made.

Sunday, September 29, 2019

Lyle Alzado View of Steroid Use

Also I was undersized compared to the other players. After graduation no colleges gave me scholarships for playing football. Being undersized and playing averagely I wasn't the best athlete. I tried out for the Kilgore Junior College's football team in nineteen sixty four, but they told me that I wasn't good enough to play for them. I was finally accepted to Yankton College in South Dakota; I started taking steroids to play football better after being accepted, in order to play better and to insure my place on their football team.In nineteen seventy one I was the Denver Broncos fourth draft pick. I was a defensive lineman the same as in high school. I became a formidable player by the end of my rookie year. I outran, outwit, authenticated everybody. All along I was taking steroids and I saw that they made me play better and better. In nineteen seventy seven, I was named the Oaf's defensive player of the year and the defensive lineman of the year. I went from being and average player in high school, to being a feared professional football player in Just a few years.I was so wild about winning, it's all I cared about, I never talked about anything else, and steroids helped me keep on winning. In nineteen eighty four, I retired from football due to an injury to my Achilles tendon, which I believe was cause by my steroid use. I tried to make a comeback in nineteen ninety with the Raiders but I immediately had a knee injury that prevented me from playing. By the end of my football career I was name all-pro twice and had a total of ninety seven sacks In one hundred ninety six games. I had done well for someone who had no hope In high school of playing professional oddball.All during my college and professional football career I was taking steroids. I spent around thirty thousand dollars a year on steroids. All the time on the field I was fierce, mean, and determined to win, but off the field I had a hard time turning these emotions off. One of my teammates described me as have a split personality, â€Å"on the field he projected a tough image,† He said. But off the field I was like a gentle giant. When the game was over, I would be plagued with mood swings from the steroids; I could keep a good relationship with people.I was married four times over the course of my football career. Once a man sideswiped my car in Denver and I followed him home and beat him up In his front yard. I couldn't control my anger. I abused my second wife so much that she called the police five times on me during the course of our marriage. In March of nineteen ninety one, during my wedding to my fourth wife Kathy, I had a hard time keeping my balance while walking. A month later I was diagnosed with a chemotherapy treatment, in an attempt to cure the brain tumor.I died over a year after being diagnosed in my home in Portland, Oregon. I told Sports Illustrated before my death that I had started taking steroids in nineteen sixty nine and never stooped. I wanted to tell others to stop taking steroids. It wasn't worth it to me, steroids caused me to become detached from my friends and family, I couldn't keep a good relationship due to the mood swings caused by my steroid use. Ultimately my death was caused by steroids, they had made my appear strong on the outside while they wrecked my mind and body.

Saturday, September 28, 2019

Itm 440 Paper on Bonjour

ITM 440- ­? 540 Introduc0on to Data Networking and the Internet 03/03/12 1 Router Architectures †¢? There are 3 steps a router must follow to process and forward a packet to the next hop. –? Check an incoming packet for errors and other parameters –? Look up the des0na0on address in a forwarding table to determine the proper output port for the packet –? Send the packet out the port 03/03/12 2 Router like a Train Roundhouse 03/03/12 3 Router Architecture †¢? Rou0ng can be implemented using soKware based forwarding –? e. g small dsl router, linux box, etc †¢? Hardware Based –? These are larger routers ith forwarding fabric architectures. †¢? ISP routers , Internet backbone, etc 03/03/12 4 Basic Hardware Routers †¢? Routers are very much like computers. –? CPU’s †¢? Several types used not necessarily as powerful as pc –? NVRAM (Flash Memory) †¢? Stores router con? gura0ons –? DRAM †¢? Shared working storage –? ROM †¢? Bootstrap for router OS 03/03/12 5 03/03/12 6 Larger Internet Routers †¢? Fundamental principle is that the func0ons of a router can be split into two dis0nct parts –? Rou0ng and control †¢? Handles protocols, management of router, etc –? Forwarding packets †¢? Handles actual forwarding f packets †¢? Many packets go straight through this func0on 03/03/12 7 03/03/12 8 Router Access †¢? Console Port –? Port for a serial terminal that is the loca0on as the router and is a]ached by a short cable from the serial port on the terminal to the console port on the router (replaced by RJ45) 03/03/12 9 Console Port 03/03/12 10 Router Access †¢? Auxiliary Port –? Port for a serial communica0on that is a remote loca0on 03/03/12 11 Router Access 03/03/12 12 Router Access †¢? Network –? Can always be managed over the same network onwhich it is rou0ng packets 03/03/12 13 03/03/12 14 ForwardingTable Lookups †¢? Longest Match Rule –? Allows a router to determine the best route based on granularity of the masked address. –? Used when a network ID is found to match more than one subnet mask –? The longest match rule is implemented because the longer the mask found, the be]er granularity the router has in exactly de? ning the correct route. –? It is oKen called the best match or the more speci? c route for a given des0na0on 03/03/12 15 †¢? Example: †¢? – Received datagram of 200. 40. 1. 1 †¢? – Route table lookup found two entries: –? 200. 40. 1. 0/24 –? 200. 40. 0. 0/16 †¢? – Route would use he 200. 40. 1. 0/24 03/03/12 16 03/03/12 17 Dual Protocol Stacks †¢? Hosts can have dual protocol stacks –? If the Ethernet type ?eld is 0x800 the packet is hando? to the IPv4 process –? If the Ethernet type ?eld is 0x86DD the packet is handed o? to the IPv6 process 03/03 /12 18 03/03/12 19 Tunneling †¢? Tunneling occurs whenever the normal sequence of encapsula0on headers is violated †¢? Four types of tunnels –? Host to router –? Put a frame into a frame and violate the normal OSI- ­? RM sequence of headers –? Router to router †¢? Hosts with duel stack capabili0es can tunnel IPv6 packets to a dual tack router that is only reachable over a series IPv4 only device †¢? Routers with duel stack capability can tunnel IPv6 packets over an IPv4 infrastructure to other routers 20 03/03/12 Tunneling †¢? Router to host –? Routers with duel stack capabili0es can tunnel IPv6 packets over an IPv4 infrastructure to a duel stack des0na0on host †¢? Host to Host –? Hosts with duel stack capabili0es can tunnel IPv6 packets over an IPv4 infrastructure to other duel stack IP hosts without an intervening router 03/03/12 21 03/03/12 22 Tunneling †¢? The ?rst two methods is when an IPv6 packet is sent to a router nd the endpoint of the tunnel is not the same des0na0on †¢? The last two methods send the encapsulated IPv6 packet directly to the des0na0on host so the IPv4 and IPv6 addresses used correspond to the same host –? The source host or router must have the tunnel’s address con? gured –? This is called con? gured tunneling 03/03/12 23 Automa0c Tunneling †¢? Does not require special con? gura0on †¢? Uses a special form of the IPv6 address †¢? All duel stack IP hosts recognize the format and encapsulate the IPv6 packet inside an IPv4 packet using the embedded IPv4 address, crea0ng an end to end tunnel ? Hosts that only run IPv6 can also duel stack routers to communicate using a special form of the IPv6 03/03/12 24 03/03/12 25 Tunneling Mechanisms †¢? Manually con? gure tunnels –? De? ned in RFC 2893 and both endpoints of the tunnel must have both IPv4 and IPv6 addresses †¢? Generic Rou0ng Encapsula0on (GRE) tunnels †“? Designed to transport non- ­? IP protcols over IP network †¢? IPv4 compa0ble (6over4) tunnels –? Also de? ned in RFC 2893 these are automa0c tunnels based on IPv4 compa0ble IPv6 addresses using the :: (Pv4 address) form of IPv6 address 03/03/12 26 Tunneling Mechanisms †¢? 6to4 unnels –? Another form of automa0c tunnel de? ned in RFC 3065. They use and IPv4 embedded in the IPv6 address to iden0fy the tunnel endpoint †¢? Intra- ­? site Automa0c Tunnel Addressing Protcol (ISATAP) –? Mechanism much like 6to4 tunneling but for local site networks. Uses a special pre? x and the IPv4 address to iden0fy the endpoint 03/03/12 27 6to4 and ISATAP tunnel addressing showing how the 128 bits of the IPv6 address Are structured in each case. (a) 6to4 (b) ISATAP 03/03/12 28 Transi0on Considera0ons †¢? Terminology used for IPv4 to IPv6 transi0on plans for nodes –? IPv4 only node: host or outer that implements only IPv4 –? IPv6/IPv4 (duel ) node: A host or router that implements both IPv4 and IPv6 –? IPv6 only node: A host or router that implements only IPv6 –? IPv6 node: A host or router that implements IPv6 –? IPv4 node: A host or router that implements IPv4 †¢? Includes IPv6 only and duel node 03/03/12 29 †¢? Includes IPv4 only and duel node Transi0on Considera0ons †¢? The plan also de? nes three types of addresses –? IPv4 compa0ble IPv6 address †¢? An address assigned to an IPv6 node that can be used in both IPv6 and IPv4 packets –? IPv4 mapped IPv6 address †¢? An address mapped o an IPv4 only node represented as an IPv6 address –? IPv6 only address †¢? An address globally assigned to any IPv4/IPv6 only node 03/03/12 30 Ques0ons 03/03/12 31 03/03/12 32 Q1 †¢? 1. Which router, based on the architecture in the ?gure, is probably a small site router? Which is probably a large Internet backbone router? †¢? Although architectures vary, t he router with only memory is likely to be a smaller site router. The router with separate hardware forwarding and control plane is likely the backbone router. 03/03/12 33 Q2 †¢? 2. Which output interface, based on the rou0ng table shown in he ?gure, will packets arriving from the directly a]ached host for IPv4 address 10. 10. 11. 1 use for forwarding? Assume longest match is used. †¢? 64 is 0100 0000, 128 is 1000 0000, and 11 is 0000 1011. All three routes match the ?rst 16 bits. The /18 masks (01 and 10) do not match the address bit pa]ern (00) in posi0ons 17 and 18. So 10. 10. 0. 0/16 is the longest match and the packet will use output interface #1. 03/03/12 34 Q3 †¢? 3. Which output interface will packets for 10. 10. 192. 10 use? Assume longest match is used. †¢? 192 is 1100 0000. Again, all three routes match the ?rst 16 bits.The /18 masks (01 and 10) do not match the address bit pa]ern (11) in posi0ons 17 and 18. So 10. 10. 0. 0/16 is again the longest matc h and the packet will use output interface #1. 03/03/12 35 Q4 †¢? 4. Is 6to4 tunneling automa0c? How many bits will be used for the subnet iden0? er? †¢? Yes, 6to4 automa0c tunnels are de? ned in RFC 3065. Sixteen bits are used for subnet ID. See Figure 9- ­? 9. 03/03/12 36 Q5 †¢? 5. Do the routers require IPv6 support to deliver packets between the two hosts? †¢? No. If IPv6 is not supported on the routers, 6to4 tunneling can be used to deliver packets. 03/03/12 37

Friday, September 27, 2019

SMART Methodology Personal Statement Example | Topics and Well Written Essays - 1500 words

SMART Methodology - Personal Statement Example As I have outlined in my first assignment, my interaction in a group environment has been characterized by immense learning. However, I have identified areas that require my attention. Since I hail from a culture where people are generally shy and not too open, I tend to take time and effort to open up. In addition to this, since English is my second language, I am shy when it comes to interaction. Hence, I have outlined three important aspects I would like to work on. I would like to be more open and receptive to ideas, I definitely want to emerge out of the comfort zone and interact more freely; and I also want to learn to build my trust in people. In addition to this, I would also like to become a more involved team-player and develop leadership skills in order to help steer my team towards a goal. In this paper, I would be developing an Action Plan, based on the SMART Methodology, to overcome these problems and achieve the envisaged goals. ACTION PLAN My action plan would be chalked out in terms of the various stages involved in the process of attaining the envisaged goal. The following is the step-wise procedure towards achieving the goals: Areas of Concern:It is very important to outline the areas that require improvement, in order to chalk out the action plan. My biggest short-comings are, my inability to open up and talk without feeling shy or intimidated. Once I achieve this goal, I would want to look at becoming a team-player, communicating effectively and acquiring leadership skills. Hence, these are the problems I would like to address and work on improvising, in my Action Plan. Addressing the Areas of Concern: An action plan, based on the SMART methodology is based on the following aspects: It is Specific in nature, Measurable in terms of time-frame and effectiveness, Achievable, Relevant to the areas of concern and finally, Trackable. The following action plan is based on these pointers: In order to open up and become less shy, I would firstly start identifying my feelings and what I would really like to communicate, Unless I am clear about this, I cannot communicate the same with the others. Upon understanding this, I must write it down. This will help train my flow of thought and help me express myself better. The writing can be formal or informal, based on the kind of emotions and the kind of interaction I would like to have. In a formal atmosphere, I would definitely like to express myself in a formal tone, without delving into informal aspects. This process is specific, because it is directly aimed at procuring a particular result that I have set. The time-frame set for this is at least a continuous cycle of fifteen days. Rigourous pursuit in this direction, would ensure that I am able to express myself clearly and in entirety. In the process of developing my ability to express myself, I would start interacting with people slowly. Every person has a comfort group. I would firstly open up with people that I am comfortable with. Their encouragement would give me the requisite confidence in taking my pursuit further. In addition to this,I would also work on improving my communication skills

Thursday, September 26, 2019

The Development of Islamic Law and its Role in Contemporary Pakistan Research Paper

The Development of Islamic Law and its Role in Contemporary Pakistan - Research Paper Example Despite a long Islamic history, the role that Islamic law plays in the country is still being determined. This can be seen in the way that the Islamic Pakistan has formed and matured, the turbulent leadership that the country has experienced and the attempt to realign Pakistani values and law with Islamic. Thus, Pakistan is not an area of unshakeable values and truths, but of ever-changing and developing ideals and laws. The Development of Islamic Pakistan To understand the role that Islamic law plays in contemporary Pakistan, the first aspect is to consider the way in which Pakistan has developed, and what has influenced Pakistani laws. Pakistan is a rapidly growing country that once was predominately agricultural, however, now other aspects of industry are beginning to take precedence. In particular, exports are predominately textile, clothing and agricultural in nature. Pakistan is considered to be a middle-income country, but despite its considerable economic growth social progre ss has been much slower (Talbot, 1998, p. 23). The most well-known example of this is the rights of women, who are treated as second-class citizens in Pakistan and have restricted rights. Other indications of the slow progress that the country has been making include the life expectancy, which is currently 66.35 years and the fact that less than three percent of the country’s gross domestic product is spent on healthcare (Central Intelligence Agency, 2012). It is thought that part of the driving force behind this slow civil growth is the strong focus on religion and tendency to get involved in religious politics. This can be seen by a strong focus on spending in defense, despite the clear inadequacies in health and education spending (Talbot, 1998, p. 23). Pakistan achieved independence from Britain in the early years after the Second World War. From this point onwards, the nation called itself The Islamic Republic of Pakistan (Korson, 1974, p. 1). Pakistan presents an intere sting case in the eastern world, as the nation was initially developed in the name of religion, despite the concept that such nationalism was un-Islamic and represented a betrayal to the ideas and ideas of Islam (Talbot, 1998, p. 12). Thus, Islamic religion has always played an important role in the development of the country, although the exact role has varied as different governments have come into power. In fact, the development of Islam as the ideology for the state was not initially undertaken because of a desire to follow Islamic teaching. Instead, Pakistan’s leaders used this as a method of developing and growing the identity of the country following its independence (Haqqani, 2004). Because of this, Islam was not a strong focus of the laws of the country in its early development. Nevertheless, Islamic perceptions have become strongly embedded in the history of Pakistan and in its current identity, particularly in recent times. The values of Pakistan, which have influe nced the development of the country as a whole as well as its laws, are strongly based in the Islamic religion (Talbot, 1998, p. 24). Islam is more than a religion that the country abides by, its language and rhetoric has been strongly incorporated into the law. This incorporation has been so strong

Proposal - short online course to training the faculty member how they Research

- short online course to training the faculty member how they can manage their online class - Research Proposal Example Indeed, in the current environment of advancing technology, online training hugely facilitates development of critical skills and knowledge. It provides a more innovative approach to education and acquisition of knowledge that can be adjusted to suit the needs and requirements of individuals. The role of faculty in online classes becomes important element of the success of the same. The proposal is for short training program for the faculty members of online courses so as to equip them with necessary skills to manage their online classes with high degree of efficiency 2. Problem statement The online training courses are major elements of constant learning environment that incorporates the demands of changing business compulsions. The online courses are distinct in their teaching methodologies that rely on digital communication vis-a-vis online conferencing techniques, email etc. The electronic interaction is much different to classroom communication. It requires multifunctional capab ilities that incorporate pedagogical skills like: effective learning processes that can be easily grasped by learners; creating comfortable learning environment; skills to resolve technical issues; and administrative knowledge that can explain the course logistics (Sargeant et al., 2006). Very often, the faculty members of online courses are not trained appropriately in the modalities of online classes. The working population and adult learners are therefore not able to exploit the vast potential of the same. Most importantly, the spatial features of learning environment and medium are crucial factors that influence the learning process. In online courses, the multimedia becomes the key component that is exploited judiciously by the teacher to make course curricula interesting, powerful and highly motivating (Sims, 2003). The efficacy of online teaching is considerably increased when teaching skills are integrated judiciously with managerial skills and use of technology. As such, it becomes essential to impart training to the faculty members to make them more effective online teachers. 3. Objectives 1. One week training course on management skills as required for online courses to equip them with the methodologies of electronic communication techniques. 2. To make online classes more effective and motivating. 3. Managing workload of teaching online. 4. Program description/ design framework The design framework of course is important for increasing the core competencies of the participants and equipping them with skills that add value to their knowledge and teaching skills. The various approaches to instructional designs offer effective teaching under different environment and medium of instructions. The training program would use ADDIE framework or Analysis, Design, Development, Implementation and Evaluation structure. Its stepwise approach helps the teachers to develop easy and iterative instructions which can be applied to real life situations, thus making t hem hugely relevant to the learners (Peterson, 2003). The ADDIE design process promotes active participation of the learners that exploits tacit knowledge of the learners and helps them apply critical thinking to resolve problems or look at problems from wider perspectives of creative advantages (Tee & Karney, 2010). The five stages are described as below: 4.1a. Analysis This part of the program is intended to identify and evaluate the needs of the learners so

Wednesday, September 25, 2019

Evolution of Western corn rootworm population Essay

Evolution of Western corn rootworm population - Essay Example The characteristic that has allowed some Western corn root worm populations to become resistant to corn - soybean- corn rotation is that they produce higher levels of special class proteinases (cathepsin-L) that respond to soybeans defenses (Yates, 2012). Darwin’s theory of natural selection states that evolutionary change occurs when individuals produce variations in each generation and differential ways of survival by combining these variable characters. Individuals with variable characteristics, which increase their chances of survival, will have more opportunities to reproduce and their offspring will benefit from these advantageous characteristics. Similar to this theory, the western corn rootworm has evolved to produce enzymes in their gut that has enabled them to become resistant to corn-soybean-corn rotation. The enzymes inhibitors enables them to survive for two to three days in the soybeans fields which is enough for some of rootworms to lay eggs, when corns are planted in the same fields the rootworm larvae feeds on the corn roots. The modern view of evolution as a change in allele frequencies defines evolution as not only the development of new species from older ones but also the small changes within species from generation to generation-over long periods. Similarly, the western corn rootworm has been able to produce special class proteinases over long period of time, these small changes have enabled them to survive on soybean

Tuesday, September 24, 2019

See the attachment for the title, because is to big Essay

See the attachment for the title, because is to big - Essay Example the use of another; a confidence respecting property reposed in one person, who is termed the trustee, for the benefit of another, who is called the cestui que trust. Law of equity and trust confers the provision regarding the trust. It laid down several duties and responsibilities for the trustees. Moreover there are provisions like co-ownership, proprietary estoppels, fiduciary relationship etc. Apart from this, one of the prominent feature of trust is, it can be raised from either trust deed/covenant as said before or by the Will, i.e. a testamentary trust is a trust created by a Will or a codicil to a Will. A testament is a Will. of or includes land and the trustees of such a trust are trustees of land. Any description of trust includes an implied resulting or constructive trust and a bare trust. (1) An implied trust is based on the presumed intention of the parties at the time the property is acquired by the resulting trustee. That is the point at which the contributors beneficial interests crystallise. The beneficial shares are unaffected by subsequent conduct. This scope of implied trust has been rightly explained in Cowcher v Cowcher (2). Moreover a trust can be defined as a "land" which includes land of any tenure and property divided either vertically or horizontal (as in the case of a block of flats) and easements, but does not include an undivided share in land. (3)Now we shall scrutinize how far the scope of trust of land and its various ingredients will help to analyze the issues brought up in the given problem. Co-ownership (4) is where a person is entitled to hold land together with others who have simultaneous interests at the same time they are said to hold concurrently. Where ever there is co ownership there will be a trust of land. There are 2 types of co-ownership --------------------------------------------------------------------------------------------------------- So in this case Ayesha can claim her share in the property as she is

Monday, September 23, 2019

WHY DO FOOLS (HUMANS) FALL IN LOVE Essay Example | Topics and Well Written Essays - 750 words

WHY DO FOOLS (HUMANS) FALL IN LOVE - Essay Example They have studied human’s brain and chemical reaction, emotional reactions and social interaction, values and morals which can influence the process of falling in love. They single out that people fall in love because of sexual attractiveness, idealization of an object of love, instinct, desire to give birth, appearance. (thesis) Based on personal experience and experience of other people (friends, movie heroes, literary characters), it is possible to say that falling in love is influenced by a set of reasons outside humans’ wish or control which lead to a strong positive affecting impact on emotions of a person. (thesis) The main causes of falling in love include sexual attractiveness, image of an ideal person, and desire to give birth (instinct). Sexual attractiveness is the major cause why people fall in love. It is not all about thrusting and ejaculating. In humans it gives rise to a complex package of feelings and thoughts that fools label love. Our brains have evolved to feel pleasure in sexual bonding and discomfort at separation. It is brought about by an even more elaborate than usual interplay of hormones. Scientists have a good idea of the substances associated with the various stages of falling in love, but it is not yet known precisely which brain areas each of them activates. The feelings of sexual euphoria associated with early stages of love. The drive to make love comes from testosterone. The image of an ideal person (appearance, personal qualities, values, etc) causes fools to fall ion love. The meaning of an ideal is different for every person, because it depends on their past experience. Since the sensory activity is washed away and only the construction is saved, the only knowledge that each of us has is what we construct within our own brains. Fools cannot know the world by inserting objects into their brains. In this case, love comes from

Sunday, September 22, 2019

Literacy as foundation for lifelong learning Essay Example for Free

Literacy as foundation for lifelong learning Essay Literacy is a fundamental human right and the foundation for lifelong learning. The innovation of writing is one of mankind’s useful creations, it is more than the ability to read and write it’s also the ability to understand what you’re reading and what makes sense in what you’re writing. A person who cannot read and understand sentences, which cannot interpret and cannot write, is called an illiterate person. Illiteracy is the inability to read and write. Literacy makes a person more confident, ambitious and successful in life. Persons with a good education tend to be more confident and ambitious than those who are illiterate. Literacy is thought to have first emerged with the development of numeracy and computational devices. It increases job opportunities and access to higher education; it helps in the economic growth and development of a country. Increases Vocabulary Reading increases your vocabulary, it help persons to learn new words and improves their spelling, the more you read, the more words you gain exposure to and they will inevitably make their way into your everyday vocabulary. Reading also helps in your talking skills. It helps you understand different ways of life and expands your imagination. Stress Reduction A well-written novel, play or newspaper will distract you and keep you in the present moment, letting tensions drain away and allowing you to relax. Reading is a wonderful source of pleasure for many people, and can provide a healthy escape from routine. Mental Stimulation Reading helps to keep the brain active, us like every other muscles in the body, and the brain requires exercise to keep it strong and healthy. Reading prevents the brain from Alzheimer’s and Dementia. Better writing skills This goes hand-in-hand with the expansion of your vocabulary: exposure to published, well-written work has a noted effect on one’s own writing, as observing the cadence, fluidity, and writing styles of other authors will invariably influence your own work. Tranquility In addition to the relaxation that accompanies reading a good book, it’s possible that the subject you read about can bring about immense inner peace and tranquility. Reading spiritual texts can lower blood pressure and bring about an immense sense of calm, while reading self-help books has been shown to help people suffering from certain mood disorders and mild mental illnesses.

Saturday, September 21, 2019

Different kinds of motivation

Different kinds of motivation The importance of different kinds of motivation in SL learning The presence of different types of motivation can be really helpful for the language learner to achieve the best possible results in the learning process. Indeed, it is difficult to think of any kind of learning without motivation. Although too high levels of enthusiasm may backfire (and cause anxiety), it is inevitable to possess a healthy level of motivation in order to achieve results. Although students motivation is obviously not entirely under the teachers control, the instructor should do whatever is possible to increase this factor. It is commonly acknowledged that motivation can positively influence language learning. People are heavily dominated by their emotions, even in such seemingly dispassionate issues as language learning is. No wonder that student feelings have as much power to affect their learning success as their styles and strategies (Ehrman, 1996, p.135.). According to the definition of Ehrman (1996), motivation is the perceived payoff for the students investment of time, energy, and effort.(p.137.). Apparently, if this payoff is low, the student will either stop learning the language for good or, if they do not have an option, they will be caught in a web of bad feelings and even worse grades. Then, the failures will only generate further disappointment. On the other hand, a student who finds at least one legitimate reason for continuing their language study is already on the right track. Anyone who has attempted language study is able to think of a number of such reasons. Yet, the scientific study of motivation is extremely challenging, since all the factors influencing motivation are interrelated and continually changing. They cannot very well be categorized according to the degree of their power. Therefore, motivation for learning a foreign language has usually been classified according to its possible sources. A common way of categorization is to distinguish extrinsic and intrinsic motivation. According to definition (and closely connected with its name) intrinsic motivation is thought of as being within the task itself: a sense of achievement, self-esteem, pride in solving the problem, enjoyment of the class, being able to use the language as desired. (Johnson Johnson, 1998, p.220.) Extrinsic motivation, on the other hand, is connected with other consequences of success on the task (Johnson Johnson, p.220.), such as promotion at ones workplace, good grades, and so on. Another model of classification is that of Robert Gardners (as cited in Ehrman, 1996). He divided motivation into instrumental and integrative types. The first may be equated to extrinsic motivation, while the other is more interesting; it has to do with the desire to become part of a target language community. (Ehrman, 1996) As the research of motivation in language learning progressed, many other theories have been drawn up, using similar and new motivating elements as well. An especially intricate model of motivation has been created by Zoltà ¡n Dà ¶rnyei. It is called the L2 Motivational Self System and it consists of three main components: ideal L2 self, ought-to L2 self and the L2 learning experience. (as cited in Csizà ©r Kormos, 2009, p.99.). The ideal L2 self is an image of how students would like to see themselves, in this case, as fluent speakers of a given language. This component includes Gardners integrative motivation as well. The ought-to L2 self includes the characteristics of an ideal person who is able to evade failure in language study. The notion of L2 learning experience is quite easy to grasp, it basically means the motivating force of the learning settings. An experiment that Csizà ©r and Kormos (2009) conducted with the participation of secondary school and university students in Budapest gave the results that the main factors influencing language learning were the ideal L2 self and the learning experiences, while the role of the ought-to L2 self seemed marginal (Csizà ©r Kormos, p.109.). Although this study is bound to be somewhat narrow to draw too general conclusions from, it clearly demonstrates an important idea: the learning environment has a great influence on student motivation. As is shown by the experiment of Csizà ©r and Kormos (2009), some motivation types have an implication for language instruction, because they may be influenced by teaching strategy. However, there are several problems with enhancing motivation. In the first place, as it has been mentioned before, it is not an easy task to study motivation: motivation types are notoriously difficult to isolate and motivation is problematical to measure. Moreover, the relationship of theory and research to classroom situation (Johnson Johnson, 1998, p.223.) is also questionable, that is, the theories are often difficult to prove and apply in real life situations. What is more, although motivation is generally considered to be necessary, teachers might not be able to devote enough attention to it, because of the large size of the learning group or other unfavourable circumstances. Finally, there are cases when motivation simply cannot be influenced from the outside, as in the case of integrative motiv ation of a person who pointedly dislikes a culture associated with a language or feels aversions to the language itself. In spite of all these complications, there has been a consistent move towards motivation-enhancing learning activities (Johnson Johnson, 1998, p.224.). The ways Ehrman (1996) suggests to deal with lack of motivation are the following: most importantly she advises listening to the anger, tension, and mixed motivations (p.142) of the unenthusiastic students and helping them cope with their destructive emotions using, for example, relaxation exercises(p.143). Another idea of Ehrman (1996) is to motivate students with activities that are in accordance with their interests and pastimes. These strategies sound very practical and sensible, however, they have considerable limitations taking into account the varied composition of the class and the fact that the teacher is not a psychologist. There are other, more theoretical means that are thought to boost motivation as well. According to Stevick (as cited in Johnson Johnson, 1998) relevance of material to the students language requirements , completeness of the syllabus, authenticity of the information provided, satisfaction of students beyond learning and immediacy of the knowledge gained are five types of reward that could be built into materials and would encourage students to persevere and succeed. (Johnson Johnson, 1996, p.224.). Some of Stevicks ideas, namely that of relevance, authenticity and immediacy have already been adopted (the first two by the Language for Specific Purposes movement and the last one in Notional Functional Syllabuses), while completeness and satisfaction are more debated (Johnson Johnson, p.224.) In summary, motivation is a slippery notion that can be neither measured properly, nor examined very precisely, as it changes from community to community, from person to person, and may even change in the learning history of a single student. Still, there are ways to study motivation and as it is admittedly an important factor of language learning, research and practice, hand in hand, should try to find ways to make it as high as possible. References Csizà ©r, K., Kormos, J. (2009). Learning Experiences, Selves and Motivated Learning Behaviour: A Comparative Analysis of Structural Models for Hungarian Secondary and University Learners of English. In Z. Dà ¶rnyei E. Ushioda (Eds.), Motivation, Language Identity and the L2 Self (pp. 98-119). Bristol, England: Multilingual Matters. Ehrman, M. E. (1996). Understanding Second Language Learning Difficulties. London: SAGE. Johnson, K., Johnson H. (Eds.). (1998). Motivation. In Encyclopedic Dictionary of Applied Linguistics. (pp. 219-225). Oxford, England: Blackwell.

Friday, September 20, 2019

Negative Impact Of The Bauxite Mining Industry Environmental Sciences Essay

Negative Impact Of The Bauxite Mining Industry Environmental Sciences Essay This study is an investigation into the negative impact of the bauxite mining industry on the community of Myersville, St. Elizabeth. The research will entail: What are the negative impacts that the mining industry has on the community of Myersville? What are the effects of the negative impacts that the community is faced with? How can the negative impacts be alleviated? LITERATURE REVIEW According to Effects of Pollution by Scott Foresman, pollution is defined as the addition of any substance or form of energy to the environment at a rate faster than the environment can accommodate it by dispersion, decomposition, recycling, or storage in some harmless form. The processing of alumina at ALPART generates dust thus emitting caustic soda and other waste products such as red mud trailing and gases. Mr. Williams, personnel from the Rural Agricultural Development Authority (RADA) office in St. Elizabeth explained that certain tests have been conducted on crops in which they have ruled out diseases and insects and have pointed to the dust emanating from the bauxite mining plant located in Nain, St. Elizabeth, as the main cause of the problems affecting residents crops. Mc Farlene O.A (2000), a draft author on the internet, said the major environment problem caused by the industry is the disposal of the tailing, which forms an alkaline mud. These red mud lakes resulted in the percololation of caustic residues (sodium) into the underground aquifers in local areas. The environmental impact of Jamaicas bauxite mining symbolizes the majority of mining or heavy industrial operation. Bauxite mining, which is considered as surface mining, is land extensive, noisy and dusty. Mining pits are often interspersed within small rural communities, therefore requiring companies to relocate the people and or to monetarily compensate them. An increasing concern is the loss of habitat for Jamaicas unique plant and animal species; also bauxite mining severely affects the water retention capability of the soil. The Jamaica mining act of 1947 requires mines to remove top soil before mining, and restore it as part of the reclamation process. Two other environmental impact s of great concern is dust and caustic soda contamination. During a visit to ALPART port facility, economic officials observed a considerable amount of alumina spilled on the pier and a cloud of dust being carried downwind from loading equipment. It has been argued that the dust is chemically inert; however, it adversely affects the respiratory system, pollutes the residential cistern, and defaces property. The degradation of Jamaicas delicate coral reefs along its south coast is as a result of alumina spilling during ship loading. An article titled Tailing wash-out result in death in Jamaica (2005, September 7) stated that a remediate mine tailing area in Myersville, Jamaica became a water grave for five people on July 16,2005, when heavy rain from hurricane Emily washed their car off a road and over a precipice. According to Lance Neita, ALPARTs public relation manager, the bauxite mine which was dugged thirty years ago belongs to ALPART and had been restored, rehabilitated and certified. Jamaica National Work Agency (NWA) spokesman Stephen Shaw, said that erosion had taken place at the site and guard rails should have been installed. The author of the report concludes that the ALPART tradition has been to mute local protest rather than to eliminate the source of the environmental problem. There has been ongoing protest in Jamaica about the health and environment costs of the bauxite and alumina operation. The writer Rampersad Ramsawak ( 2005) states that industries pollute water in a variety of ways and that in the first instance chemical plants such as oil refining, ammonia and urea plants release waste such as sulphur oxide, sulphur dioxide and nitrogen oxide into the atmosphere. When it rains, the water becomes polluted with these chemicals thus forming acid rain. Acid rain contributes to fishes being killed in rivers and lakes; also the soil becomes acid and this stultifies the growth of plants and accelerates the corrosion of metalwork on buildings. Rampersad also said that noise pollution can be alleviated by the implementation of legislations which prohibits noise levels over 80 decibels in residential areas and also that persons should be educated on the effects of noise pollution. DATA COLLECTION Myersville is a developed community that has approximately two hundred (200) house holders. In order to collect accurate data for the survey, the researcher decided to use primary and secondary sources of data collection in the form of questionnaires, interviews, textbooks and newspaper articles. The issuing of questionnaires was one of the most suitable form of data collection because they require little time to be completed; responses are gathered in a standardized way; information can be collected from a large portion of a group; also respondents feel confident in disseminating information because confidentiality is guaranteed and last but not least questionnaires can be completed at the convenience of the respondents in a relatively quick way. In order to receive accurate information, it was calculated that approximately twenty (20) citizens inputs would be ideal. And these twenty (20) persons would account for 10% of the population of the two hundred (200) household members (10% of 200=20). These citizens were selected randomly by placing thirty (30) names in a box after which the box was energetically shaken and the twenty (20) names ascertained. Twenty three (23) questionnaires were prepared and handed out to residents, with three (3) being additional in case all were not completed. Upon the distribution of the questionnaires, residents were given a time frame of one (1) week in which to complete the questionnaires. However, at the end of the time frame given to residents, the researcher only needed twenty (20) out of the twenty three (23) that were issued. Alongside the questionnaires, interviews were conducted with some of the citizens who did not receive a questionnaire. The carrying out of interviews with the residents proved useful as the researcher was able to adapt the questions as necessary, clarify doubt, and ensure that the responses are properly understood by rephrasing and repeating the questions. The researcher could also pick up non verbal cues in detecting any form of discomfort, stress and problems that the respondent is experiencing. PRESENTATION OF DATA Figure 1: Column Bar chart showing that seventy five percent (75%) of the respondents live within 1 5 miles from the mining industry, ten percent (10%) live within 6 10, five percent (5%) live within 11- 15 and five percent (5%) live within16 miles and over. TYPES OF POLLUTION AFFECTING THE RESIDENTS Type of pollution Percentage of respondents Air pollution 15% Water Pollution 15% Land Pollution 10% Total 100% Noise Pollution 60% Table 1: Table showing that sixty percent (60%) of the respondents are affected by noise pollution, fifteen percent (15%) respectively is affected by air and water pollution and the remaining ten percent (10%) is affected by land pollution. Figure 2: Pyramid showing that sixty percent (60%) of the respondents are affected by pollution everyday, thirty-five percent (35%) is affected periodically and five percent (5%) is not affected any at all. Figure 3: The above pie chart depicts damages caused by pollution. Thirty five (35%) said it causes poor crop yield and infertile soil, thirty (30%) respectively said the water gets contaminated and animals are affected and five percent (5%) said it causes acid rain. Figure 4: Donut showing compensations received toward physical. Thirty five percent (35%) of the respondents say that the company refills the tank with clean water, twenty five (25%) said that the company replaces their roofing material twenty percent (20%) said that the company leases lands for farming, fifteen (15%) said that there is payment for property damage and five percent (5%) that there is no compensation. Table showing compensations received towards health Compensations Percentage of respondents Provide health cards 45% Ask citizens to bring medical bill to company 30% Relocate citizens 25% Deny responsibilities 0% Table 2 shows that the compensations received towards health are that the citizens are provided with health cards and a total of forty five percent (45%) said this, 30% said that the citizens are asked to bring the medical bill to the company; twenty five percent (25%) said that they relocate citizens and 0% said that they deny responsibilities. Figure 5: Pie chart showing that 100% of the respondents said that an anti-pollution method has been implemented. INTERPRETATION OF DATA This survey is to find out what are the negative impacts that the mining industry(ALPART) has on the citizens of Myersville, the effects of these negative impacts and how these negative impacts can be alleviated. Figure 1 illustrates that 15 out of 20 respondents live between 1 to 5 miles from the industry, two (2) live within 6-10 miles and 11 15 miles and one (1) live within 16 miles and over. Persons living within one to five (1 -5) miles may be as a result of the availability of resources such as fertile soil for farming. These persons who choose to live there because of the fertile soil for farming may be one that grows and sells food items for a living. Also, a persons job may have caused them to live within such a close proximity to the industry as it is easier for them to get to work from there as it more economical for them. Those who live within six to ten (6 10) miles may be because of inheritance and often times when lands are inherited persons do not bother to relocate, instead they live there and try to make themselves and their family members happy. The person living within eleven to fifteen (11 15) miles and sixteen (16) miles and over may be because they had no choice; tha t person not having any choice could be because they were in search of a plot of land on which to settle and build their house and this plot of land that they came upon was of a reasonable price so the person just went ahead and bought it. Not having any choice could also be that that person was brought up in that community and when they came of age in which they could move out, they did not have the necessary resources such as money to move out and get on with their life. The types of pollution were depicted by figure 2. Noise pollution, having the most percentage, a total of sixty percent (60%) results from the heavy duty machines when they are extracting bauxite from the earth. Very loud noises accompany these machines when they are in use and noise can be very disturbing whether you are near or far away from it. Noise most times poses as a hindrance in one getting enough rest; hence, this results in frustration. Fifteen percent (15%) of the respondents are affected by air pollution, this may be so because of the dust that is uprooted during the processing of the bauxite; dust would be one of the main causes of air pollution. Water pollution is affected by fifteen percent (15%) of the respondents. This can be as a result of the chemical and dust that is in the air. In addition, it also results from oil spillage from ships that are docking in the harbor. Only ten percent (10%) stated that they are affected by land pollution. Land pollution is caused by debris that is washed on to the land and by negligent people who dispose of their garbage inappropriately. Also, in open cast mining, huge holes are dug in the ground and these form dangerously deep mining pools. A lot of mining waste is left behind and these waste often contain several poisonous substances that seep into underground water. Sixty percent (60%) of the respondents said that they are affected every day. This is so because of the close proximity that they live to the mining industry. This would be within the distance range of one to five (1 5) miles. Thirty-five percent (35%) stated that they are affected periodically; this means that they are affected occasionally. In addition, these residents who are affected may be live within the range of six to fifteen (6- 15) miles. And this distance is much further away from the industry so the residents would not be affected as often as those who live at a closer proximity to the industry. Five (5%) percent is not affected any at all. These residents who are not affected would be those who are living sixteen (16) miles and over. Thirty five percent (35%) from figure 4 suggested that poor crop yield was one of the major damages caused by pollution; this would be due to the fact that there is a removal of the topsoil during the extraction of bauxite. The topsoil contains all the essential nutrients needed for plant growth. Also, acid rain washes away nutrients from the topsoil, thus making it infertile. Residents say that animals are affected and there is a contamination of water. These responses account for thirty percent (30%) of the respondents respectively. Water becomes contaminated by the excessive dust and other impurities that are in the atmosphere and when consumed can cause great harm to the body. The contamination of water, removal of trees and pastures contributes to the loss of biodiversity. Acid rain being five percent (5%) affects residents infrastructure by corroding metals, burning up plants, affecting animals and contaminating drinking water. There was some compensation that the Myersville community members receive towards physical damages. Among these compensations, the refilling of water tanks with clean water was the highest, having a total of thirty five percent (35%). This is so because the water is contaminated by acid rain and other impurities that are in the air and knowing that water is one of the basic necessities for survival, the industry therefore ensures that the residents have clean water for consumption. Twenty-five percent (25%) of the residents says that the industry replaces roofing materials. Here it can be seen that the industry takes responsibility for damages done to residents roofing materials. These damages done to roof is said to have been caused by acid rain. Another compensation that the industry offers is paying for property damage, as was said by fifteen (15%) of the respondents. Property damages could also have been caused by acid rain, as it causes the paint on buildings to strip. Five perc ent (5%) said that no compensation was given; this could be as a result of them not having any evidence to prove to the industry that the industry affects them in some way. These persons could also have been those who live at a far distance away from the industry. Not only is compensation given towards physical damages but also it is given towards residents health. A number of health problems that residents face are asthma attacks, lung cancer, allergies, difficulty breathing. Furthermore, a resident that was interviewed gave the response that the administration of the industry causes sinus irritation and bronchitis. As a result of these ailments, forty five percent (45%) of the respondents said that they are given health cards as a means of reducing the cost of medications. Thirty percent (30%) of the respondents said that they are asked to bring their medical prescription to the company. This serves as a means of proving that the industry does have a negative impact on residents health. Another compensation offered towards residents health is that the company relocates them. This would be for residents who are vulnerable to the negative impacts that the administration of the industry poses on their health (mainly the elderly). Residents neve r gave a response to the industry denying their responsibilities. This goes to show that the company is aware of different health issues that persons experience overtime due to the production process that is undertaken by the industry. One hundred percent (100%) of the respondents including those from the interview said that there has been an implementation of an anti-pollution method. One of the interviewee said that this may take the form of the industry reducing working hours, oiling and wetting the roads to reduce excess dust; also the company relocates residents that are at risk of being affected by the running of the company. FINDINGS After receiving the responses from the questionnaire and interview, it can be seen that pollution is a major problem although the industry is trying to alleviate it. Myersville is affected by pollution resulting from the Alpart mining industry. The researcher found out that there are three (3) major types of pollution affecting the residents, namely: noise, air, and water with noise being the most unbearable one as stated by sixty percent (60%) of the residents in table 1. It was also found out that residents that live relatively close to the industry are affected every day. Discovery was made that damages caused by the pollution are as follows: infertile soil, contaminated water and animals are affected with infertile soil being the highest, a total of 35%. This is evident in figure 3. Compensations are given towards physical damages in the form of replacing of roofing materials, refilling of water tanks with clean water, and leasing lands for farming. However, refilling tanks with clean water accounts for the highest percentage (35%) and this can be seen in figure 4. Not only there are compensations given towards physical damages but also towards health. These compensations include provision of health cards and asking the residents to bring medical bills to the company. But out of the two, the provision of the health cards is the highest with a percentage of (45%) as can be seen in table 2. Upon the completion of the project, the researcher found out that there has been an implementation of an anti-pollution method. The smoke and dust that is emitted from the industry during the production process causing air and water pollution. The noise and the poor disposal of solid waste have also caused land and noise pollution, these pollution have caused infrastructural, agricultural, environmental and health problems to citizens on a regular basis. Before the company takes responsibility for the effects that the company has on residents, they investigate to get proof that the damage was really caused by the industry. RECOMMENDATONS During the investigation, the researcher found out that the industry is trying to alleviate the problem; however, the researcher would recommend the following measures; Before the commencing of work on a daily basis the road should be wet or oiled so as to reduce excess dust; this should also be done on days when there is no work in progress. The company should practice afforestation and reafforestation; this will help to reduce noise pollution and soil erosion. The company could provide residents with reservoirs that is free from pollutants and is properly covered; the aim behind this is to ensure that resident always have a clean supply for consumption. Residents could be provided with ear protectors and dust masks so as to dampen the level of noise and lessen the harmful effect it poses on ones hearing ability and to lessen their intake of dust. Also, the industry could contribute to the development of the community in education by establishing an early childhood institution and also community centers; also they can assist school children with financial assistance. The National Environment and Planning Agency (NEPA) is responsible for the implementation of programmes to ensure that air pollution is controlled. Therefore, what they could do is to monitor Alparts operation in order to ensure that excess dust is not being emitted from the industry that poses as a threat to ones health.

Thursday, September 19, 2019

Conflicting Directions Of Ambitions in Kate Chopins The Awakening :: essays research papers

Often in novels, a character faces conflicting directions of ambitions, desires, and influences. In such a novel, like “The Awakening,'; the main character, Edna Pontellier, faces these types of conflicting ideas. In a controversial era for women, Edna faces the conflict of living in oppression but desiring freedom. The patriarchal time period has influenced women to live only under the husband’s thumb but at the same time, break away from such repression. These opposing conflicts illuminated the meaning of “social awakening'; in the novel.   Ã‚  Ã‚  Ã‚  Ã‚  In the first direction, the reader witnesses the era when women only existed to make the male happy. The main character Edna finds that she has nothing to do other than stay in the house bored, since even her children are raised and cared for by servants. Day after day, all Edna is permitted to do is care for her husband and be there whenever he needs help or entertainment. Woman at that time could not vote, could not go out without a male escort, were not allowed to smoke in public, and were not allowed in the work place. These ideals set by the male driven society caused Edna to face her second trend of free will, conflicting with her other direction of oppression.   Ã‚  Ã‚  Ã‚  Ã‚  When Edna felt dissatisfied with the life she is given, she pursues other ways in which to live more fully. She attempts painting and enters into an affair with another man. As her desire for freedom grows, she moves out of her husband’s house and tries to live life as she sees fit. She lives a life reflecting her new philosophies towards life, philosophies that are in conflict with that of society. The oppression by man caused Edna to have a social awakening, illuminating the meaning of the novel.   Ã‚  Ã‚  Ã‚  Ã‚  In “The Awakening,'; the conflicting directions of oppression versus free will illuminate the meanings of social awakening and overcoming tyranny. Awakening from the slumber of patriarchal social convention, Edna must rouse herself from the life of dullness she has always lived.

Wednesday, September 18, 2019

View Advertising Tracking Devices with Caution Essay -- Business Priva

In today’s society, one can see that tracking a person has become much easier with the technology advances that have been developed. When most people think of tracking devices they primarily think of negative issues, but that has all changed now. A tracking device the size of a tic tack that can be surgically implanted to provide a tamper proof means of identification, enhanced e-business security, locating lost or missing individuals, monitoring heart rate, vital signs, tracking of the elderly, the location of valuable property, and monitoring the medical conditions of at risk patients. With advertisement companies, tracking device software is used to allow the customers information on the status of package, delivery address, and the person that signed for the package. However, advertisers could use that private information to their advantage and try to sell that person more frivolous objects or pass that information to another advertisement company. Tracking devices can be m arketed toward other companies that advertise luxury cars or other industrial goods, but when those companies buy that product, they will be put in a purchasing list and the company that sold that product will keep track of that particular company and try to sell more goods. Cookies are used by internet shopping sites to keep track of what is being purchased by that person who is on that site, but used as a device for tracking browsing and buying habits of individual web users. Through the analytical view of cause and effect of internet cookies and tracking devices, one can understand the good qualities, but dangerous misuses of having a tracking chip in the advertising world. Despite the flaws of a tracking device, there are many reasons why advertisers are ... ...the controversies are. Basically, the issue involving tracking devices may lead to a person using one for security or interrogative purposes or use one for their own perverted or invasive pleasure. In conclusion, one should not take tracking devices lightly. Works Cited Lewen, Todd. â€Å"Chips: High Tech Aids or Tracking Tools?† www.usatoday.com. September 3, 2008 Newlyn, Korbin. â€Å"GPS Tracking Devices- Teens vs. Parents, Law Enforcement vs. Invasion of Privacy.† www.buzzle.com. September 15, 2008 â€Å"New Campaigns.† B to B 86. Expanded Academic ASAP. Gale. Orange Coast College Library. October 1, 2008 Bowes, Elena. â€Å"Rita: A Highly Competent Secretary, Helps Deliver Fiscal Health to UPS.† Advertising Age International (December 1999). Expanded Academic ASAP. Gale. Orange Coast College Library. October 1, 2008. â€Å"Internet Cookies.† www.ciac.org. October 1, 2008

Tuesday, September 17, 2019

Methods of Interrogation Pows

METHODS OF INTERROGATION OF A PRISONER OF WAR Introduction 1. A ‘Prisoner of War’ is a person, whether combatant or non-combatant, who is held in custody by an enemy power during or immediately after an armed conflict. The treatment of prisoners has always been matter of debate in the world and many declarations and resolutions have been made in this regard including Geneva Convention of 1949. War is a time of confusion and while many suffer from it, there are many who benefit in the fog of it. The military personnel, whenever caught, have to be treated as PsOW and they have certain rights and privileges.The enemy always utilizes this opportunity to the fullest and employs certain obvious and hidden methods to extract information from the PsOW. Rights of a POW 2. The POW can only be interrogated by following the rules and regulations laid down in the Article (v) of Geneva Convention of 1949. A prisoner of war needs only to give his name, number and rank and must remain s ilent on all other matters and resist all enemy efforts to extract information from him. In case his rights are violated, the violators are subject to the provisions of international law and they may be tried by the international criminal court.Methods of Interrogation 3. A number of interrogation techniques have been used of approved for use. They include standard Army methods in compliance with the Third Geneva Convention, as well as other approaches which are either questionable or clearly exceed the strictures protecting POWs. Several of the latter may also violate other limitations outside the scope of human imagination. 4. Numerous devices may be effectively employed by the interrogator to establish mental contact or rapport with POW. At the outset it should be emphasized that the objective of an interrogation is seldom, if ever, to obtain an admission or a confession.The subject is interrogated for accurate and reliable information. Several common methods interrogation which are being used for the purpose by interrogators are briefly discussed below. (a)Show of Knowledge or â€Å"We know all†. In this method, the interrogator familiarizes himself with all available data on the POW and his unit or whatever subject is being explored. He asks questions to which he already has the answers and scornfully answers them himself when the POW hesitates. He is striving to convince the POW that he already knows all the POW does so that resistance is wasted effort.When the prisoner starts giving correct information and answers freely, a few â€Å"mystery† questions can be slipped in. Dummy questions should still be used from time to time to test the POW, to conceal from him the fact that he is giving new information, and to prevent him from realizing that he is â€Å"spilling the beans†. (b)Stool Pigeons. Enemies infiltrate their own men in the POW camps under the garb of PsOW from other units or services. They make PsOW discuss various aspects of service amongst themselves and extract information. (c)Consolation.Innocent looking folks like servants, guards, sweepers try to console the PsOW offer small favour and then make efforts to get the required information. (d)Bugging. The camps and residences etc of PsOW are bugged and their conversation taped. (e)Favours. Money and other Favours are offered and assurances given that no damage will be done to the individual, if he cooperates. (f)Recruitment. A few PsOW are recruited and then utilized for collection of information from other PsOW. (g)Direct approach. In this method the interrogator seemingly â€Å"lays the cards on the table†, apparently makes no attempt to hide the purpose of the questioning.This approach should be used only in cases where the interrogator assumes or knows that the person interrogated will not refuse to give information. (h)Rapid fire questioning. This method consists of a rapidly delivered series of questions which keeps the POW constantly o n the defensive and off balance thereby weakening resistance an/ or his determination to give evasive answers. When this approach is employed the POW often loses patience, becomes angry, offended, or confused, and begins to talk in self defense. (j)Emotional approach. This method consists of playing upon the emotions of a person in order to bring out the required information.When using this method, the interrogator creates an atmosphere of emotional confusion designed to reduce security consciousness. The emotional approach utilizes hate, revenge, fear, jealousy, sadness, pity, and similar emotions. It also exploits religious and patriotic feelings, sense of social duty, and other concepts based on emotional reactions. (k)Trickery. This method has an almost limitless number of variations. Its purpose is to cause the POW to divulge information without being aware of it, or without a conscious or willful choice in the matter. (l)Censoring.The mail of PsOW is censored. (m)Third Degree Methods. Third degree methods are used to break the PsOW. It is apparent from above that once captured as prisoner of war, the responsibility of a service person increases many folds and he must keep his mouth tightly shut to ensure that no information is leaked out. However, he must look normal and should not give impression of being in possession of full information. (n)Propaganda. The PsOW are given propaganda material to read, to hear from radio or from the TV to see to break them down and lower their spirits.This is done to bring their morale down to a certain level where they themselves will start giving information thinking their country might or already has lost the war. (p)Stupid interrogator. In this method the interrogator pretends to be a stupid individual with very little understanding of military or other matters. This device may have the desired effect of disarming the person interrogated. The POW is required to â€Å"explain† everything (Even inconsequential i tems) because the interrogator is so â€Å"stupid. † 5. Variations. Any of the usual methods may be varied in many ways.Here are some variations which might fit into any of the categories of the methods listed in Para 4above. (a)Sympathy. (b)Sternness. (c)Pride and ego. (d)National pride. (e)Face saving. (f)Bluff. (g)Fear. (h)Drawing attention away from the real object. (j)Threat and rescue. Conclusion 6. There are many others; in fact, the variety of methods is limited only by the initiative, imagination, and ingenuity of the interrogator. The interrogation method should be tailored to suit each individual case, and may be combined with other methods to suit special requirements.

Monday, September 16, 2019

Mcsa Networking Basics Essay

Introduction What is a network? A network can be defined as two or more computers which are linked together to share resources. These resources can include internet access, printers, software and files. The ‘heart’ of a network is called the server, and its function is to contain all the software and services which the network and its users depend on. Figure 1: Example of a basic network The server is operated by personnel called Network or System Administrators, and it’s their responsibility to ensure the smooth running of the network so it is working as efficiently as possible. This is achieved through the use of a dedicated operating system called Windows Server 2003 – this gives the network administrator complete control over the network functions. Advantages for a network Cost Because networked computers can share the same resources, costs can be dramatically reduced. For example, if there are ten computers in a room each needing access to a printer – it is far cheaper to route all ten computers to a single, shared printer than it is to purchase ten printers; one for each computer. In this example, the saving would also include the cost of ink cartridges (you would only need to purchase one set of cartridges instead of ten). Software can be purchased and installed in a similar cost effective way. Most popular software is able to be bought and installed on a server, and anyone who requires to use it will only need to purchase a license (the legal rights to use it, usually in the form of a certificate). These licenses are far cheaper than buying the software for each user. This method also means that it isn’t necessary for an I.T Technician to install the software on every computer; only one install on the server is needed. Another benefit to this approach is when the software requires an update. If it is server based, only the software on the server would need to be updated. All the users would benefit from the update as soon as it has been installed. If each user had a copy on their computer, I.T Technicians would need to update each one. This could become time consuming, expensive and complicated. The software that this could apply to, includes most Microsoft software and Anti-virus software. Security Security is a vital element in any business. In a network, security is enhanced both internally (security within the network) and externally. Users are given a username and password to access their files and all the programs, hardware etc that they have been given access to. When a user saves a file, it is saved to the server and not the computer that he/she is working on. If that user wants to retrieve that file, it can be done on any computer on the network, and not just on the computer that was originally used. This data can be accessed, monitored and backed up by the Network Administrator at any time. Each department can have their own ‘identity’ on the server, which allows them to have access to files, applications and resources which would be relevant to their requirements. For example, the Accounts department may need to have access to invoicing software (e.g. Sage and Excel), whereas Sales may only require software to monitor and forecast sales over a period of time (e.g. Excel). Accounts may not want other departments accessing their software due to security or confidentiality reasons. Internet security is tighter for both users accessing the internet, and external threats when a network is set up. All the computers can share a single access point to the internet, which makes it easier to monitor internet usage, help reduce hacking and other external threats trying to access data on the network. Another feature which can be applied by the system administrator is Encryption. Data within a folder/subfolder can be encrypted to prevent unauthorized access to data if other security measures have been breached. Typically, only system administrators will be given the ‘recovery key’ to be able to decrypt data incase of system failure or other unforeseen situations. Disadvantages for a network Expensive to install The initial cost of setting up a network can be expensive, with hardware like the server, router, cabling, backup equipment, network printers and server software. Also, dedicated personnel must be hired to keep the server running efficiently and to resolve any server/network issues. Centralised Data Having all of the data in one place means that data could be lost in the event of a system failure. Regular backups of the server are highly recommended (daily, weekly and monthly) to help to keep data safe. But if the server goes down in between backups then all the recent data will be lost. Reduced Performance The server’s performance can become reduced as the network expands or as its workload increases through the working day. A server must have as much memory and processing power as possible to help minimise the reduction in performance. Task 2a Network Topology is the description of how a network is laid out, the devices (server, routers, printers etc) attached to it and the direction which data flows. A network can be described as either Logical Topology (the way data flows in a network) or as a Physical Topology (how a network is physically laid out) There are six main topologies, Bus, Ring, Star, Extended Star, Hierarchical, and Mesh. Bus Topology This can be both a Physical and Logical, in a local area network (LAN), each device is connected by a single cable. This single cable is also referred to as the ‘backbone’ of the network. A terminator must be on either side of the cable to prevent the data signal from bouncing back down it. The Bus Topology was widely used in early networks using standard Co-ax cables. It was an economical solution for networking as only one main cable was needed. The disadvantage to this was if this cable failed, the whole network would go down. Ring Topology In a Ring Topology (also known as IBM Ring Token), each computer (node) is connected to each other in a closed loop. Each computer has its own unique identity on the network. When data is transmitted from one node to the other, the data will include the destination’s identity and will pass through each node until it reaches the destination. This type of topology has two main disadvantages; only one computer can transmit data on the network at a time and if a computer fails the whole network will go down. There is a slight variation to this; the Duel Ring Topology The second ring within the network provides a backup connection, so if there is a failure within the network, the secondary connection will keep the network connected. This is expensive as more cabling is required. Star Topology The most common type is called a Star Topology. Each device is connected to a dedicated central hub. All the data on the network flows through the network via the central hub. These types of networks tend to be small, as data could be degraded or lost on a large network. The main advantages to this is that it is easy to setup and easy to add new devices to the network. But if the central hub fails, the whole network goes down. Extended Star Similar to the Star Topology, but instead computers are grouped together and connected to a local hub, which in turn is connected to a central hub. This is widely used in large networks where the network may be in a large building, and each group of computers may represent each department. There are more points of failure on this network, but if a local hub fails, then the rest of the network will not be affected. Hierarchical or Tree Topology This is very similar to a Ring Topology, but computers are attached to the central hub in layers. While the structure looks different, this still has the main disadvantage of network failure if the top device goes down. Mesh Topology All the above topologies suffer from the same problem. If one device fails on the network, the whole network goes down. The only solution is to connect each device with each other and remove the need for a server. This is the Mesh Topology and has two main advantages; If a device fails, the network will still work and the network doesn’t need to rely on the processing power, bandwidth etc from a server as it is supplied from each computer. The disadvantage to this is the high cost of connecting each device to each other, so this would not be suitable on a large network. This type of topology is also referred to as Peer-to-Peer whereas the other topologies are considered to be Client/Server based. A comprise between cost and connectivity would be the Partial Connected Topology. Devices are connected to more than one node on the network, so if one fails the network can still work. This is more cost effective than Mesh Topology as less cabling is required. Task 2b Recommendations As it stands, the structure of the current network is a Hierarchical or Tree Topology. The network uses two different switches to connect the Domain Controller to the 24 computers. These are from two manufacturers; CISCO and 3Com and this offers 100Mb and 10Mb speeds respectively. This is a disadvantage because one ‘group’ of computers has a quicker data transfer rate than the other. The network does not have a disaster recovery plan should the Domain Controller fail. This has the potential for putting the whole network at risk from permanent data loss. The network also shares a single printer which is attached to the Domain Controller, 10 of the computers are connected to it through the slower 3Com 10Mb switch. This means all 24 computers print via the Domain Controller (which is currently overloaded) and 10 computers send data at a slower rate than the rest of the network. My first recommendation would be to replace both switches with a single CISCO 100Mb 48 port switch ( £631.99 from MISCO website). This would provide a standard, quicker data transfer speed throughout the network and allow for the network to expand. There are a total of 24 computers, and this switch would enable a further 24 devices to be added to the network e.g. additional computers, printers etc. This would allow the network to expand whilst maintaining a fast data transfer speed. With the new switch in place, my next recommendation would be to replace the HP Laserjet III (USB connection only) with a newer, network-ready printer like the HP Laserjet 2055DN or P2030 which costs  £319 and  £160 from HP website. By replacing it with a newer model, printing could be completed quicker, quieter and more cost effectively e.g. more reliable printing, more energy efficient, lower consumable costs etc. Also, sharing the workload throughout a faster network is more efficient than channelling all the printing requirements of the network to an older single printer on a slow 10Mb switch via the Domain Controller. This will also help reduce the workload to the Domain Controller. While the Domain Controller’s workload can be reduced by the addition of a network-ready printer, other options could be to increase the specifications (e.g greater hard drive space, more memory etc). Ensuring the controller has the latest software updates will ensure both the running efficiency and increase the network security. This will help prevent unauthorised access (hacking) to the network. My final recommendation is add disaster recovery and remote working within the network, By regularly backing up data on a daily/weekly/monthly basis, this will ensure the network can be restored in case of total data loss. To assist learning or to prevent students from accidentally causing errors/problems within the network, remote working should be enabled. User accounts can be easy created in Active Directory though the use of a standard template. Templates could be set up for both students and tutors, so all of the common properties of the accounts are already established. When a new user account is required, the administrator will only need to complete the fields that require unique values (eg, name, address, telephone number, course details etc). Once the users have been created within the Active Directory, they can be placed into Organisational Units (OU’s). This will group together users, so in this situation students could be placed in OU’s which represent their course. When the OU’s are established, the users’ configuration settings can be applied through the Group Policy Management Console (GPMC). It holds hundreds of user configuration settings, security options and user event logs, all which can be applied as required by the college administrators. Figure 2: Example of the Group Policy Management Console (GPMC) By using Group Policies effectively, the administrator can control and manage exactly what users can and cannot do whilst logged onto the domain. Administrators are able to control how the desktop appears, the icons that are available and the ability to configure the task bar etc by applying the Desktop setting found within the ‘User Configuration’ in the GPMC. This could be useful if the college policy states that all users must have the Llandrillo College logo as their wallpaper, and various required icons are in place and users to have access to various programs via the ‘start’ menu. To improve password security, administrators are able to increase the effectiveness of the passwords that users apply to protect their identity on the network. The password options can be found within the ‘Password Policy’ within the ‘Computer Configuration section of the GPMC. These options include the ability to reuse old passwords, to apply complexed passwords (eg. more than 6 characters, using upper, lower case letters and digits 0-9). In the example, a programmer has created a random word generator to create passwords. Group policy could be configured so when they log on for the first time, users input the randomly generated password and then they must input their own password using a complexed password. If the user ever forgets the password at any time, administrators are able to reset it through the ‘Active Directory Users & Computers’ tool. Figure 3: Example of Password Policy within GPMC To prevent users from using too much disk space on the network, administrators are able to allocate limited disk space to users and by applying prompts when this space is nearly used up. By putting this in place, administrators can calculate how many users will be on the system multiplied by how much hard disk space each user will be allocated. This total will be the minimum amount of disk space required for all users in each new academic year. Administrators will be able to ensure the server can physically hold all the users data without completely running out or running low of disk space. To achieve this, administrators will need to locate the allocated hard drive and apply a quota, limiting users on how much space they can use. Individual users can have separate entries in the quota, allowing them to have a lesser or a greater share of disk space. This would be useful for tutors who may need greater disk space to store course material etc. When the network is running, administrators may be required to monitor the networks resources to ensure it exceeds the users demands. The tool required is called the ‘Performance Console’ which is found under Administrative Tools. This tool appears in the form of a graph although it has three counters as a default (Memory:Pages/Second, PhysicalDisk: Average Disk Queue Length and Processor: % Processor Time), additional counters can be easily added or removed accordingly. A college administrator may add counters to monitor network bandwidth, server utilisation (memory, cpu performance, disk performance etc). To help administrators monitor the server, counter logs and alerts can be applied. This can enable administrators to proactively identify when system resources run too low or to identify possible hardware failures/malfunctions. Any one of these problems could result in a degraded performance or total server failure. Figure 5: Example of the Performance Console The college network may be required to support remote users, allowing them to access the college network whilst being in a different location eg working from home, from another campus etc. This can be achieved through the use of a Virtual Private Network (VPN). The user will be able to access the college’s network through the use of the internet whilst achieving the required security and data encryption. The network’s firewall must have exceptions to allow authenticated users to access the network whilst preventing unauthorised access. Once the network is running effectively, the next challenge administrators will face is maintaining the security and the efficiency of the network. This can be achieved by deploying server updates and hotfixes as provided by Microsoft. The server can be updated with the use of ‘Automatic Updates’, which can be found within the ‘All Programs’ menu under the start button. Updates can be downloaded either straight away or scheduled to download at a certain day/time. This could be configured to download when the network is at its quietest time (eg 10pm). This would ensure that the update would not effect the overall performance during busy periods. Also, updates for the users computers may be required. Instead of administrators physically installing them on every computer on the network, this could be downloaded on the server as an *msi file and automatically installed via a group policy. So the next time users within the network log onto the network, they will automatically be downloaded & installing the updates from the server with no intervention required.

Sunday, September 15, 2019

The Aztec Account of the Spanish Conquest of Mexico

The Aztec Account of the Spanish Conquest of Mexico Miguel Leon-Portilla's book â€Å"The Broken Spears† Introduction Other resources: †¢Aztec Life †¢Mexica Culture †¢Mexica Medicine †¢Religion of the Modern Aztlan Movement †¢Religion of the Mexica ; Bibliography †¢Major Deitites of the Mexica †¢Minor Deitites of the Mexica †¢Aztec Cannibalism: An Ecological Necessity? Path of the Conquest On November 8, 1519, the Spanish conquistadors first entered the great city of Mexico, the metropolis the Aztecs had built on a lake island.Don Hernando Cortes, who was accompanied by six hundred Spaniards and a great many native allies, at last could see for himself the temples and palaces about which he had heard so many marvels. The Spaniards arrived from the direction of Tlalpan, to the south of the city, passing across one of the wide causeways that connected the island with the mainland. When they reached a locality known as Xoloco, they were wel comed by the last of the Motecuhzomas, who had come out to meet them in the belief that the white men must be Quetzalcoatll and other gods, returning at last from across the waters now known as the Gulf of Mexico.Thus Cortes and his men entered the city, not only as guests, but also as gods coming home. It was the first direct encounter between one of the most extraordinary pre-Columbian cultures and the strangers who would eventually destroy it. Cortes landed on the coast at Veracruz on Good Friday, April 22, 1519; the Aztec capital surrendered to him on August 13, 1521. The events that took place between these two dates have been recounted in a number of chronicles and other writings, of which the best known are the letters Cortes wrote to King Charles V and the True History of the Conquest of Mexico by Bernal Diaz del Castillo.These two works, along with a few others also written by Spaniards, until now have been almost the only basis on which historians have judged the conquest of one of the greatest civilizations in pre-Columbian America. But these chronicles present only one side of the story, that of the conquerors. For some reason-scorn, perhaps-historians have failed to consider that the conquered might have set down their own version in their own language. This book is the fir

Saturday, September 14, 2019

Bridgeton Industries Essay

1. Describe the competitive environment for Bridgeton as well as the cost accounting system currently in use. When foreign competition and scarce, expensive gasoline began to play an important role in the market, Bridgeton began to lose domestic market share. The ACF Bridgeton plant faced new challenges in their production that led them to serious cutbacks like the closing of the ACF plant for manufacture of fuel-efficient diesel engines. By 1987, they classified their products in terms of â€Å"world class† competitive position and potential. With four criteria (quality, customer service, technical capability and competitive cost position) they classified their products in Class I (remain), II (observe) and III (outsource). The classification allowed Bridgeton to take decisions on how to better manage their products performance compared to their competitors. The cost accounting system was product costing, a mixed between job costing and process costing. 2. Explain why manifolds moved from Class II to Class III after oil pans and muffler-exhaust systems had been outsourced from the AC F. Despite improvements in the production process manifolds were downgraded from Class II to III. The results were not sufficient, even though they increased the uptime from an average of 30% to 65% they were behind their Japanese competitors that reached a â€Å"world class† goal of 80% uptime. In addition, as seen in Exhibit 2, the direct material costs for manifolds (based on stainless steel) is extremely high as a percentage of sales (around 40%) compared to the other products manufactured at ACF and at a better Class level. However, there was a doubt on this move due to the possibility of new market requirements for lighter weight (more efficient manifolds). This represented a good opportunity for ACF because as they manufactured manifolds with stainless steel, demand could increase and therefore selling price too.