Tuesday, December 24, 2019

Nazca Lines A Water Cult or Early Astronomical Worship

Nazca lines: water cult or early astronomical worship? The geoglyphs on the Pampa de Nazca in Peru are as stunning as they are mysterious. Many, many theories surround the lines such as aliens, slaves, or tribute to the dead. The lines could have been created as an extension of the Inca Ceque lines in Cusco for part of the water cult and the worship of the water and mountain deities, or perhaps they were created to please a ‘sky god’ seen during the unusual amount of solar eclipses during the time of construction or even as a depiction of constellations and zodiac knowledge. Many ancient cultures, with the ancient Nazcas included, believed the sun and moon to be deities or eyes of an otherwise invisible sky god. This would be reinforced on the occasion of a solar eclipse where a ‘ring of fire’ is formed as the moon crosses the path of the sun, creating an eye-like shape as seen in figure 1 and 2. Three major eclipses occurred over the Pampa de Nazca beginning in 97 CE and coinciding with the beginning of the construction of the lines (Edgar, R. 2000). This has given rise to the theory that these spectacular artworks were signs or appreciation for the gods of the sky. When the Nazca lines were supposedly created between is debated and varies from 97 CE to 400 and 650 CE. The Nazca people constructed the lines by digging into the pampa to expose the lighter earth beneath and due to dry conditions and little erosion they have remained visible (Alford, A. F. 1998). Some linesShow MoreRelatedThe Birth of Civilization18947 Words   |  76 Pagesm yhistorylab.com CRAIMC01_xxxii-031hr2.qxp 2/17/11 3:22 PM Page xxxii EARLY HUMANS AND THEIR CULTURE page 1 WHY IS â€Å"culture† considered a defining trait of human beings? EARLY CIVILIZATIONS IN THE MIDDLE EAST TO ABOUT 1000 B.C.E. page 5 HOW DID control over water resources influence early Middle Eastern civilizations? ANCIENT NEAR EASTERN EMPIRES page 14 HOW DID conquest and trade shape early empires in the Near East? EARLY INDIAN CIVILIZATION page 16 WHAT INFLUENCES did the first Indus valley

Monday, December 16, 2019

Homelessness and Print Ad Free Essays

Cassandra Allen June 26, 2012 English 1101 Ms. Kristen Miller Homelessness Do you think you can make it? Sometimes, I wonder how others can. Others, could what you may ask? Live on the street be homeless. We will write a custom essay sample on Homelessness and Print Ad or any similar topic only for you Order Now Homelessness my affect the person sitting next to you, your best friend, or even your close family members. Just because they look like they are not homeless does not mean they aren’t. When you watch a commercial or even view a picture in the newspaper about homeless people, what do you ask yourself first? Which one do you think captures your attention more to make you feel like you need to help make a change? In this essay I will compare two mediums a video and print ad which deals with homelessness and show you how emotional appeal ties both mediums together. I also, will show you how I think more emotional appeal is shown in the video than in the print ad. Emotional appeal is showed in homelessness whether it is when you are saddened by looking at a homeless person on the street or even hearing them begging for something. When you take a look at the print ad, you have to think a picture is worth a thousand words and what does this mean. The print ad states the following: â€Å"When you give to the United Way, you’re helping homeless people overcome the obstacles in their lives by providing things like shelter, hot meals, and training programs. With United Way funded agencies helping so many in our community, make a difference is easier than you think. † The statement you have just read is posted on the print ad and it is trying to promote awareness about homelessness. The print ad does a great job of showing emotion. In the picture on the print ad, you can see a person’s hand is trying to shield a homeless man from lying on the street in the rain. This picture explains a story that helping hands can be used to help shelter people around us in need. If we join hand in hand that we can make a difference in a homeless person’s life. In the Aloha United Way 2008 homelessness commercial, it shows you how normal everyday people become homeless not just because they wanted to but because they were force to. The couple in this video was able to join a shelter. Living in this shelter helped the couple acquire jobs to help themselves. This shelter was funded by the United Way. By helping fund organizations like this, you can help like I did and take part in â€Å"rewriting the stories of over 2,400 homeless people. † So, by viewing this video it shows you that you may not be homeless but it can happen to you also as well as me. This commercial makes homelessness turn into reality and shows you how it can really be. Just like the print ad both are funded by the United Way organization. Some people may feel like the print ad and the video ad affect them in the same way. In my opinion I think the video should impact your emotions more. By watching this, you will see and hear someone’s testimony. So the video has more visualization and also has audio while the print ad just has the one picture. I feel like the print ad leaves you asking questions. Both the video and print ads are helpful in ways that they help get the message across about homelessness and promote awareness. In this essay I have talked with you about a print and video ad that both target homelessness. I have explained to you that the video ad is more appealing to me. In the sense that the print ad you have visualization but no audio as the video have both which the audio is a testimony. So, think about what I have explain to you today and ask yourself which one would you use to get more funding for the United Way organization. Bibliography AUW808. â€Å"Aloha United Way – 2008 Homelessness Commercial. † YouTube. YouTube, 16 June 2008. Web. 26 June 2012. http://www. youtube. com/watch? v=ij8yZkIZIno. Way, United. Without You. There Would Be No Way. Digital image. Coloribus. com. United Way, 17 Apr. 2008. Web. 26 June 2012. http://files. coloribus. com/files/adsarchive/part_579/5798305/file/united-way-homeless-small-76731. jpg. How to cite Homelessness and Print Ad, Essay examples

Sunday, December 8, 2019

Reflection Journalism Innovation Leads

Question: Discuss about the Reflection Journalism Innovation Leads. Answer: Introduction: The aim of this reflective journal is to reflect the progress achieved with the completion of the course. The paper is divided into three major parts. The first part talks about the role of journalism in the society of Singapore, the next part reveals the skills that I have developed throughout the time and the third part deals with a comparison of the Newswriting and Feature Writing learnt during the course. Discussion: Role of journalism in Singaporean society, its evolution, future, challenges, and importance Singapore acts as one of the key strategic media centre in the Asia Pacific region. Reading, it has been found that the Government has been found to make an aggressive push towards making Singapore as the media hub of the Pacific region (Tapsell, 2014). The media industry of Singapore follows strict regulations and guidelines. It is the Minister of the State who decides the stakeholders if the media houses (Karppinen, 2015). The Print media are largely controlled by Singapore Press Holdings. The industry faces certain challenges because of a number of government regulations that largely decides the publishing and the availability of the contents of the media to and from abroad (Dobbs, 2014). Most of the local media are directly or indirectly falls under the control of the government. Collectively about 38, 000 employees are engaged with the media industry and there is an annual growth rate of S$ 10 billion ((Dobbs, 2014). Therefore, it can be easily assumed that the future of the media industry is bright and shinning. If the development journalism is considered, it has to be said that the South east regions deal with the development journalism since its independence in the need of building an independent nation and to strengthen the political stability. Sometimes, things are glamorized using media as a tool but these approaches are made for the purpose of strengthen the national identity (Fernandez, 2015). Two skills developed over the years I have learned lots of things throughout the course and have enriched my skills by many folds. I have understood that the most important skill needed for journalism is to become a good observer and a good listener. One cannot just go with the flow and write a news report or a feature on a particular issue or a topic (Ketterer, McGuire Murray, 2014). A good journalist is the one who understands the situation and then does the investigation very thoroughly and then come down to a conclusion and informs public correctly on the particular issue (Gynnild, 2014). Of the many skills that I have learnt during my Journalism course, two of the most important skills are investigation the situation and listening to people. Ideally, I should confess that I do not consider me as a good listener. Many times I have faced issues because I have unheard many things and derived at the conclusion. Another useful skill that I have developed is about investigating a matter. I have understood that it is indeed important to understand the situation well and then deriving at a particular conclusion. Comparison of the lessons learnt between Journalism 1 (Newswriting) and Journalism 2 (Feature writing) along with the progress of the writing skill Journalism 1 was concerned with writing News. These types of news are mostly event or incident related. On the other hand, Journalism 2 taught about writing a feature, where focus is made on developing a story. If a comparison is made between the two methods, it has to be said that the writing styles varies invariably. I have understood that while Newswriting, we should always follow the inverted pyramid structure and thereby, putting the most important part of the news above and the relevancy decreases as the news gradually descends (Malaysia, 2016). While writing the News, the 5W 1H format is indeed important to make the readers aware of the gist of the news. As Newswrting deals with events and incidents, primary sources and investigative reporting holds great importance. Therefore, at the time of interviewing a person, close ended questions are more preferable because it is important to know how the incident happened rather than getting someones opinion or view point (Protess McC ombs, 2016). If the feature writing style is taken into consideration, it has to be said that there a number of unique things that has to be consider at the time of writing a feature. It has been known that features cover both hard and soft news. However, the feature stories are planned and a lot of research is conducted before writing a feature. The concept of the inverted pyramid is not so strong here but the feature has to be written in a way that it keeps the readers attracted towards the story (Xie, 2015). Moreover, narrative features with the use of personifications create more interests among the readers. If any supporting information is provided by the means of interview, it is recommended to ask open ended questions because in feature writings, there lays the importance of knowing view point of others. This way an argumentative or critical approach can also be made towards the feature story. Conclusion: The reflective journal has focused on the major areas that have been taught during the course and the skills and knowledge that I have developed by this time. I would like to say that by the completion of this course I shall be able to develop a good level of confidence within me that will definitely help me in achieving my career goals. References: Dobbs, S. (2014). Singapore. Freedom from the press: Journalism and state power in Singapore. By Cherian George. Singapore: NUS Press, 2012. Pp. xiii, 272. Notes, Bibliography, Index.Journal of Southeast Asian Studies,45(02), 299-301. Fernandez, W., (2015) Journalism that aims to make an impact on the world. Retrieved from: https://www.straitstimes.com/singapore/journalism-that-aims-to-make-an-impact-on-the-world [Accessed on 26-1-2017] Gynnild, A. (2014). Journalism innovation leads to innovation journalism: The impact of computational exploration on changing mindsets.Journalism,15(6), 713-730. Karppinen, K. (2015). Media Commercialization and Authoritarian Rule in China, by Daniela Stockmann Freedom from the Press: Journalism and State Power in Singapore, by Cherian George. Ketterer, S., McGuire, J., Murray, R. (2014). Contrasting desired sports journalism skills in a convergent media environment.Communication Sport,2(3), 282-298. Malaysia, U. S. I. (2016). ACJ3053-Newswriting and Feature Writing. Protess, D., McCombs, M. E. (Eds.). (2016).Agenda setting: Readings on media, public opinion, and policymaking. Routledge. Tapsell, R. (2014). Book Review: Freedom from the Press: Journalism and State Power in Singapore. Xie, L. (2015). Working the Story: A Guide to Reporting and News Writing for Journalists and Public Relations Professionals.Journalism Mass Communication Educator,70(1), 93.

Saturday, November 30, 2019

Winds Essays - Wind, Atmospheric Dynamics, Trade Winds,

Winds Michael Zakrzewski March 31, 1999 Mr. Oshogobor G001 Earth Science Report: Winds There are two general types of winds, local winds and global winds. Local winds blow from any direction and usually cover short distances. Global winds blow from a specific direction and almost always cover longer distances than local winds. Both local winds and global winds are caused by differences in air pressure due to unequal heating of the atmosphere. During the day, the air over a land area is often warmer than the air over a nearby lake or sea. The air is warmer because the land heats up faster than the water. As the warm air over the land rises, the cooler air over the sea moves inland to tale its place. This flow of air from the sea to the land is called a sea breeze. During the night, the land cools off faster than the water. The air over the sea is now warmer than the air over the land. This warm air over the sea rises. The cooler air over the land moves to replace the rising warm air over the sea. A flow of air from the land to the sea is called a land breeze. A land breeze is also called an off-shore breeze. The name of a wind tells you from which direction the wind is blowing. A land breeze blows from the land to the sea. A sea breeze blows from the sea to the land. Most local winds that we are familiar with are named according to the direction from which they are blowing. A major land and sea breeze is called a monsoon. A monsoon is a seasonal wind. During part of the year, a monsoon blows from the land to the ocean. During the rest of the year, it blows from ocean to the land. When a monsoon blows from the ocean to the land, it brings in warm, moist air. This results in a rainy season with warm temperatures and huge amounts of rain. The rainy season is important to many because it provides the water needed for farming. Monsoon winds are very common in Asia. Unequal heating of the Earth's surface also forms large global wind systems. In areas near the equator the sun is almost directly overhead for most of the year. The direct rays of the sun heat the Earth's surface. The polar regions receive slanting rays from the sun. The slanting rays do not heat the Earth's surface as rapidly as the direct rays do. So temperatures near the poles are lower than those near the equator. At the equator, the warm air rises and moves toward the poles. At the poles, the cooler air sinks and moves toward the equator. This movement produces a global pattern of air circulation. Global winds do not move directly from north to south or from south to north. Because the Earth rotates, or spins on its axis, from west to east, the paths of the winds shift in relation to the Earth's surface. All winds in the Northern Hemisphere curve to the right as thy move. In the Southern Hemisphere, winds curve to the left. This shift in wind direction is called Coriolis effect. The Coriolis effect is the apparent shift in the path of any fluid or object moving above the surface of the Earth due to the rotation of the Earth. At any particular time or place local conditions may influence and change the wind pattern. At the Equator surface winds are quite calm. These winds are called the doldrums. A belt of air around the equator receives much of the sun's radiant energy. The warm rising air produces a low pressure area that extends many kilometers north and south of the Equator. Cooler high pressure air would normaly flow into such an area creating winds. But the cooler air is warmed so rapidly near the Equator that the winds which form cannot move into the low pressure area. As a result any winds that do not form are weak. About 30 degrees north and south of the equator the warm air rising from the equator cools and begins to sink. Here, the sky is usually clear. There are few

Tuesday, November 26, 2019

8 Principles of Stoicism

8 Principles of Stoicism The Stoics were people who followed a realistic but morally idealistic way of living, a philosophy of life developed by Hellenistic Greeks and eagerly embraced by the Romans. The Stoic philosophy had a strong appeal to Christian theologians of the early 20th century, which echoes in our own modern culture. I believe that [Stoicism] represents a way of looking at the world and the practical problems of life which possesses still a permanent interest for the human race, and a permanent power of inspiration. I shall approach it, therefore, rather as a psychologist than as a philosopher or historian.... I shall merely try as best I can to make intelligible its great central principles and the almost irresistible appeal which they made to so many of the best minds of antiquity. Knapp 1926 Stoics: From Greek to Roman Philosophy The philosophers who followed Aristotle (384-322 BC) were known as the Peripatetics, named for their walking around the colonnades of the Athenian Lyceum. The Stoics, on the other hand, were named for the Athenian Stoa Poikile or painted porch, where one of the founders of the Stoic philosophy, Zeno of Citium (on Cyprus) (344-262 BC), taught. While the Greeks may have developed the philosophy of Stoicism from the earlier philosophies, we only have fragments of their teachings. Their philosophy is often divided into three parts, logic, physics, and ethics. Many Romans adopted the philosophy as a way of life or art of living (tà ©chnà ª peri tà ³n bion in the ancient Greek)as it was intended by the Greeksand it is from the complete documents of imperial period Romans, especially the writings of Seneca (4 BC-65 AD), Epictetus (c. 55-135) and Marcus Aurelius (121-180) that we gain most of our information about the ethical system of the original Stoics. Stoic Principles Today, Stoic principles have found their way into accepted popular wisdom, as goals to which we should aspireas in the Serenity Prayer of Twelve Step programs. Below are eight of the main ideas in the area of ethics that were held by the Stoic philosophers. Nature - Nature is rational. Law of Reason - The universe is governed by the law of reason. Man cant actually escape its inexorable force, but he can, uniquely, follow the law deliberately. Virtue - A life led according to rational nature is virtuous. Wisdom - Wisdom is the the root virtue. From it spring the cardinal virtues: insight, bravery, self-control, and justice. Apathea - Since passion is irrational, life should be waged as a battle against it. Intense feeling should be avoided. Pleasure - Pleasure is not good. (Nor is it bad. It is only acceptable if it doesnt interfere with our quest for virtue.) Evil - Poverty, illness, and death are not evil. Duty - Virtue should be sought, not for the sake of pleasure, but for duty. Briefly, their notion of morality is stern, involving a life in accordance with nature and controlled by virtue. It is an ascetic system, teaching perfect indifference (APATHEA) to everything external, for nothing external could be either good or evil. Hence to the Stoics both pain and pleasure, poverty and riches, sickness and health, were supposed to be equally unimportant. Source: Internet Encylcopedia of Stoicism Serenity Prayer and Stoic Philosophy The Serenity Prayer, attributed to the Christian theologist Reinhold Niebuhr [1892-1971], and published by Alcoholics Anonymous in several similar forms, could have come straight from the principles of Stoicism as this side-by-side comparison of the Serenity Prayer and the Stoic Agenda shows: Serenity Prayer Stoic Agenda God grant me the serenity To accept the things I cannot change, courage to change the things I can, and wisdom to know the difference. (Alcoholics Anonymous)God, give us grace to accept with serenity the things that cannot be changed, courage to change the things that should be changed, and the wisdom to distinguish the one from the other. (Reinhold Niebuhr) To avoid unhappiness, frustration, and disappointment, we, therefore, need to do two things: control those things that are within our power (namely our beliefs, judgments, desires, and attitudes) and be indifferent or apathetic to those things which are not in our power (namely, things external to us). (William R. Connolly) It has been suggested that the main difference between the two passages is that the Niebuhrs version includes a bit about knowing the difference between the two. While that may be, the Stoic version states those which are within our powerthe personal things like our own beliefs, our judgments, and our desires. Those are the things we should have the power to change. Read more about The Stoic Philosophers Sources Updated by K. Kris Hirst Annas, J. 2007. Ethics in Stoic Philosophy. Phronesis 52(1):58-87.Ierodiakonou, K. 1993. The Stoic Division of Philosophy. Phronesis 38(1):57-74.Internet Encyclopedia of StoicismKnapp, C. 1926. Professor Gilbert Murray on the Stoic Philosophy (Religion). The Classical Weekly 19(13): 99-100.McAfee Brown, R. (ed) 1986. The Essential Reinhold Niebuhr: Selected Essays and Addresses. New Haven: Yale University Press.Sellars, J. 2007. Stoic Practical Philosophy in the Imperial Period. Bulletin of the Institute of Classical Studies: Supplement 94: 115-140.Remple M. 2014. Stoic Philosophy and AA: The Enduring Wisdom of the Serenity Prayer. In: Miller JA, and Plants N, editors. Sobering Wisdom: Philosophical Explorations of Twelve Step Spirituality: University of Virginia Press. p 205-217.

Friday, November 22, 2019

The Dobzhansky-Muller Model

The Dobzhansky-Muller Model The Dobzhansky-Muller Model is a scientific explanation of why natural selection influences speciation in such a way that when hybridization occurs between species, the resulting offspring is genetically incompatible with other members of its species of origin. This occurs because there are several ways that speciation occurs in the natural world, one of which is that a common ancestor can break off into many lineages due to reproductive isolations of certain populations or parts of populations of that species. In this scenario, the genetic makeup of those lineages changes over time through mutations and natural selection choosing the most favorable adaptations for survival. Once the species have diverged, many times they are no longer compatible and can no longer sexually reproduce with each other. The natural world has both prezygotic and postzygotic isolation mechanisms that keep species from interbreeding and producing hybrids, and the Dobzhansky-Muller Model helps to explain how this occurs through the exchange of unique, new alleles and chromosomal  mutations. A New Explanation for Alleles Theodosius Dobzhansky and Hermann Joseph Muller created a model to explain how new alleles arise and are passed down in the newly formed species. Theoretically, an individual that would have a mutation at the chromosomal level would not be able to reproduce with any other individual. The Dobzhansky-Muller Model attempts to theorize how a brand new lineage can arise if there is only one individual with that mutation; in their model, a new allele arises and becomes fixed at one point. In the other now diverged lineage, a different allele arises at a different point on the gene. The two diverged species are now incompatible with each other because they have two alleles that have never been together in the same population. This changes the proteins that are produced during transcription and translation, which could make the hybrid offspring sexually incompatible; however, each lineage can still hypothetically reproduce with the ancestral population, but if these new mutations in the lineages are advantageous, eventually they will become permanent alleles in each population- when this occurs, the ancestral population has successfully split into two new species. Further Explanation of Hybridization The Dobzhansky-Muller Model is also able to explain how this may happen at a large level with whole chromosomes. It is possible that over time during evolution, two smaller chromosomes may undergo centric fusion and become one large chromosome. If this happens, the new lineage with the larger chromosomes is no longer compatible with the other lineage and hybrids cannot happen. What this essentially means is that if two identical yet isolated populations start with a genotype of AABB, but the first group evolves to aaBB and the second to AAbb, meaning that if they crossbreed to form a hybrid, the combination of a and b or A and B occurs for the first time in the populations history, making this hybridized offspring unviable with its ancestors. The Dobzhansky-Muller Model states that incompatibility, then, is most likely caused by whats known as alternative fixation of two or more populations instead of just one and that the hybridization process yields a co-occurrence of alleles in the same individual that is genetically unique and incompatible with others of the same species.

Thursday, November 21, 2019

Why is there a higher prevalence of lupus SLE found among females of Literature review

Why is there a higher prevalence of lupus SLE found among females of Afro Carribbean origins - Literature review Example These hormonal imbalances have the capability of changing the genetic makeup of an individual, resulting to the development of Lupus SLE. However, it is important to explain that genetics alone is not the factor responsible for the development of Lupus SLE amongst women. Another important factor is the environment. The environment plays a role in the development of Lupus SLE because of the ultra violet rays of the sun. Research indicates that women, who are heavily exposed to the ultra violet rays of the sun, are always vulnerable to developing Lupus SLE. In terms of ethnicity, Lupus is more common in people of African descent. One of the major reasons advanced, is because of the high rates of poverty amongst these people, making them to be unable to afford medical treatments in regard to the type of contraceptives to use. In as much as this is information that has been given, this fact is disputed, because hormonal changes are not the only factors responsible for the high rate of Lupus amongst women. This paper is a critical analysis of the ethnic and sex differences in the epidemiology and clinical course of lupus. This paper will analyze the ethnic and sex differences in the clinical and epidemiology course of Lupus. In meeting the objective of this paper, there will be a need of understanding the genetic predisposition of Lupus. This is important in helping us to understand why women and people of African origin are vulnerable to an attack by Lupus. Furthermore, for purposes of understanding this disease, and its epidemiological and clinical cause, there will be a need of identifying its causes. These are well explained in this paper. This paper would also identify and explain the neuropsychiatric consequences of lupus, and an example is the Lupus fog. It would further explain the epidemiology of this disease, and this is in relation to

Tuesday, November 19, 2019

MACROECONOMIC Essay Example | Topics and Well Written Essays - 1000 words - 1

MACROECONOMIC - Essay Example Therefore, fiscal policy addresses matters relating to the government’s debts and expenditures. It provides an understanding about measures that a government takes to collect taxes and incur expenditures. Answer 2: Fiscal policy aims to affect the economy through changing spending and collection of the government’s revenue. It includes all measures that are involved to stimulate the economical activity (Vitek, 2012). The main objective is to stimulate the national income through aggregate demand (Vitek, 2012). There are three instruments of fiscal policy 1. Government revenue or taxation 2. Government expenditure or Government spending 3. Government debt and management or government deficit The main instrument of fiscal policy is taxation (Perry, et al., 2008). By increasing or decreasing the tax burden on the public, it can influence government revenue (Vitek, 2012). Increasing tax burden will increase the general prices that will result in reduction in cash flow in an economy. Contrary, decreasing tax will reduce the general prices resulting in an increase of cash flow. Y   The above diagram shows the effect of taxation on an economy. It shows the effect of increase (Da1) and decrease (Da2) of tax on an economy. When the tax is increased from Da2 to Da1 it results in lower equilibrium and vice versa. Government expenditure is another instrument of fiscal policy in order to encourage the economy to grow (Perry, et al., 2008). Government expenditure involves spending activities of the government in the country which promotes expansion of businesses and creation of job opportunities (Vitek, 2012). It mainly involves expansion of the governmental sectors like schools, infrastructure projects, industries, and hospitals etc. The above diagram shows two different autonomous investments. When AD1 is the investment, the national income is raised and when the autonomous investment is decreased to AD2 the equilibrium declines. Government deficit refers to spending more than the government’s revenues. Mainly, under-developed countries are deficit financed because the growth of the economy is poor (Perry, et al., 2008). This tool aids underdeveloped countries to improve their economic conditions and boost growth. Resources for deficit budget are met by borrowing referred to as deficit financing (Hansen, 2003). Answer 3: According to Australian national statistic, the Australian government decreased taxes which caused the government’s revenue to fall by five million dollars. Taxation relief was a substantial step by the Australian government to encourage growth in its economy. Decline of about two million tax revenue was due to ineffective tax collection from companies. According to the information, tax burden was increased for people having higher incomes. Taxation was levied on industries and large scale companies whereas small businesses had significant reliefs (Perry, et al., 2008). Moreover, heavy tax was imposed on the duty free cigarette which resulted in a major saving in the transfer payment that was being done for import of tobacco and cigarette. The Australian government seems to be more inclined towards reducing the taxation rate (Perry, et al., 2008). This tool of fiscal policy encouraged people to invest and spend. The decrease in the

Saturday, November 16, 2019

Attitude Survey Essay Example for Free

Attitude Survey Essay In certain situations, it is important for psychologists to understand the attitudes of people on different issues. Attitude surveys are how psychologists gather information about attitudes of people. Then, they take this information and turn the results into empirical evidence to back up the theory or question that is impending. A person’s attitude can affect thought and behavior processes such as cognitive thinking, emotional reaction, and physical behaviors (Hogan, 2007). For my survey, I used the Likert method of attitude scale to develop my attitude assessment. I wanted to find what the attitude of smokers and non-smokers have about the smoking ban in restaurants. This paper will examine and discuss the development of my survey, administration process, scoring of the surveys, and the interpretation of the scores. Also, issues that I had while designing the survey will be discussed. Attitude Survey The development of my survey was taken from an issue that I personally was interested in because I am a smoker. When the ban first became a law, I heard many people, including myself; complain about the right to have a smoking section in restaurants for individuals who smoked. The ban has now been in effect for a few years, and I wanted to find out if smokers and non-smokers attitudes had changed on this issue. Survey Design In designing my survey, I used the Likert scale because I felt it would be the best way to gather the information I needed. This survey was designed to see how people view smoking in restaurants. These questions were answered by 6 different people, of which 3 were smokers and 3 were non-smokers. The surveyors were asked to answer each question by stating strongly agree, agree, undecided, disagree, or strongly disagree. The numerical scores for each question range from-2 to +2. Administration, Scoring, and Interpreting Results Administration consisted of me going to neighbor’s doors and asking them eleven questions about the smoking ban. I wanted to make sure that there were not so many questions that it would take too long. The length of time administering the test helped in getting people to take the time to answer these few short questions. The neighbors I chose were already acquainted with me as well, and that helped them to be comfortable and willing to answer my survey questions. For the scoring of the survey the lower the score the lower the satisfaction of the ban, and the higher the score implies the higher level of satisfaction. When I designed the survey I made sure that for each unfavorable answer of strongly disagree corresponded with a negative feeling towards the smoking ban. When interpreting the scores, usually it is better to have a good number of participants to answer the questions because it makes it more reliable to be able to look at the trends of how the questions are answered. Preliminary Design Issues Issues that I had were trying to get enough people to answer my survey questions. I also had an issue of how to figure the scores and put them into a scale. It took me a little time to understand how to correctly design and score. I also wanted to ask the right questions, as well as keep the survey questions short, so that people did not get tired of answering questions before the end however, still cover all the basic questions needed for this survey. I also did not want the questions to be as if I were repeating myself, so this took me a little while to figure out how to properly word my questions so to cover all the information I would need for scoring and interpretation. In conclusion, the survey I chose was to find out the attitudes of people on the smoking ban in restaurants. I used the Likert method of attitude scale for my design because I felt it was the best way to assess my selected issue. I tried to create questions that would cover cognitive factors, emotional responses, and physical behaviors in order to accurately score and interpret the attitudes about the smoking ban issue amongst smokers and non-smokers alike. References Hogan, T.P. (2007). Psychological testing: A practical introduction (2nd ed.). Hoboken, NJ: Wiley.

Thursday, November 14, 2019

Stuttering :: Biology Essays Research Papers

"IIIII Can Can Can't Heeeelp It: Stuttering to the Truth" "Stuttering is something the stutterer does, not something he has, because of something he is." --Wendell Johnson Can you imagine not being able to introduce yourself without struggling to pronounce your own name? What would your life be like if you had to battle every time you said "hello"? How would you feel if a mob of security guards surrounded you at Wal-Mart because an employee had mistaken you for being mentally ill ((1))? These are just a few scenarios that 42-year-old Kurt Salierno, a carpenter and minister from Atlanta, encounters everyday. Salierno has a stuttering disorder, which more than 3 million people in the United States and 55 million people around the world struggle with daily. Salierno describes his problem as similar to being trapped in a glass capsule; "I can see out, but there's no way to get out" ((1)). Salierno's feelings and views about what he experiences raises some interesting questions. What is reality like for a person with a stuttering disorder? Is the "I" that is trapped inside the capsule representative of the self that he cannot express due to his disorder? Internally, Salierno is conscious of the words, which he wishes to express. However, Salierno is seldom able to produce these words externally. Does a stutterer create his or her own reality within his or her mind? To the stutterer, does independent experience become reality? With reference to the philosophical thought e xperiment about the tree falling in a forest, does a stutterer make a sound if no one can hear him or her make that sound? Stuttering is a neurological disorder of communication, from which the normal flow of speech is disrupted by repetitions (neu-neu-neuro), prolongations (biiiii-ol-ooogy), or abnormal stoppages (no sound) of sounds and syllables. Rapid eye blinking, tremors of the lips and/or jaw, or other struggle behaviors of the face or upper body may accompany speech disruptions ((3)). Why does stuttering worsen in situations that involve speaking before a group of people or talking on the phone, whereas fluency of speech improves in situations such as whispering, acting, talking to pets, speaking alone, or singing ((1))? In ancient times, physicians believed that the stutterer's tongue was either too long or too short, too wet or too dry. Therefore, practitioners from the mid-1800s tried surgical remedies such as drilling holes into the skull or cutting pieces of the tongue out to eliminate stuttering ((1) ).

Monday, November 11, 2019

Mrt Jakarta

The Jakarta Mass Rapid Transit System is an ongoing transportation infrastructure project in Jakarta, the capital city of Indonesia. It consists of a partially elevated and partially underground railway system. Construction of the first phase of the project is expected to start in 2013 and is planned to be operational in 2016. [1] Contents [hide] 1 Background of the project 2 Lines 2. 1 North-South corridor 2. 1. 1 Phase I 2. 2 East-West corridor 3 Project Progress 4 PT Mass Rapid Transit Jakarta 5 References 6 External links [edit]Background of the projectJakarta is the capital city of Indonesia. It is an urban metropolis with over 8 million inhabitants. It is predicted that over four million residents of the surrounding Jabodetabek area commute in and out of the city each working day. Transport issues have increasingly begun to attract political attention and it has been estimated that in 2020 without a major transportation breakthrough traffic jams will overwhelm the city. Since 1 980 more than twenty-five general and special subject studies have been conducted related to possible Mass Rapid Transit (MRT) systems in Jakarta.One of the major reasons for the delays in tackling the problem was the economic crisis of 1997-98. Before the crisis a Build-Operate-Transfer (BOT) scheme was considered as part of a new MRT calling for private sector involvement. After the crisis, the plan to rely on a BOT to provide financing proved infeasible and the MRT project was again proposed as a government-funded scheme. Current public transportation in Jakarta mainly consists of various types of buses, starting from the very small bemo and pickup sized mikrolet, to slightly larger minbuses and full sized city buses.There are also both two and four wheeled taxis. Current transport systems include widely used MetroMini and Kopaja cheap minibuses, and the TransJakarta bus rapid transit system, and the Jabodetabek Commuter Railway. [edit]Lines The rail-based Jakarta MRT is expected to stretch across over 108 kilometres, including 21. 7 km for the North-South Corridor (From Lebak Bulus to Kampung Bandan) and 87 km for East-West Corridor(From Balaraja to Cikarang). [2] [edit]North-South corridor The North-South corridor will be built in two phases. Phase I, will be constructed in advance connects Lebak Bulus to Bundaran HI along 15. km including 13 stations (7 elevated stations and 6 underground stations). The Indonesian ministry of Transport approved this plan in September 2010 and invited tenders and will be built at April 2012. [3] Phase II, will extend the North-South line from Bundaran HI to Kampung Bandan (7 underground stations and 1 ground-level station), targeted to operate in 2018 (accelerated from 2020 as the original plan[4]). [5] After completion of MRT Phase I and II, together with TransJakarta will serve 60 percent total trips made by Jakartans. edit]Phase I The first phase is 15. 7 kilometres (9. 8 mi) long from Lebak Bulus to Bundaran HI. The c onstruction project will begin in June 2011 and is expected to be completed in 2016 to serve 212,000 passengers per day. This expected capacity may be maxed out to 960,000 per day. The 15. 7 kilometers span expected to be covered in under 30 minutes. [6] Elevated stations Lebak Bulus Fatmawati Cipete Haji Nawi Blok A Blok M Sisingamangaraja Underground stations Al-Azhar mosque Senayan Bendungan Hilir SetiabudiDukuh Atas (Interchange Station with Jakarta Commuter Line) Bundaran H. I [edit]East-West corridor This corridor is currently in pre-feasibility study phase. The line is targeted to operate in 2027. [edit]Project Progress Progress of the first phase was funded through a loan by the Japan Bank for International Cooperation (JBIC), now merged into the Japan International Cooperation Agency (JICA). The loan number IP is 536 (signed November 2006) for engineering services. The engineering services loan is a pre-construction loan to prepare the construction phase.It consists of: Bas ic Design package, managed by the DGR (Directorate General of Railways, Ministry of Transport) Management and Operation package, managed by the Bappeda (Jakarta Regional Planning Board) Construction assistance in tender, managed by the PT MRT Jakarta On March 31, 2009, Loan Agreement 2 (LA2) for the amount of 48,150 billion Yen to build the Jakarta MRT System was signed by the Indonesian Government (represented by the Indonesian Ambassador for Japan) and JICA in Tokyo, Japan. [7] This loan is to be forwarded from the National Government to the Jakarta City Administration as a grant (on-granting agreement). 8] After the signing of the granting agreement for LA2, city administration will propose another two loan agreements for LA3 and LA4 to the central government. These proposals will become a lending agreement for the local government. The total amount of LA3 and LA4 addressed as a loan by the local government is about 71867 billion yen. This amount is based on the progress, outcome and absorbance of LA2. The total loan package from JICA for the development of the Jakarta MRT system is worth a total of 120 billion yen.Work on the basic design for the first phase of the current version of the project began in late 2010. The tender process was underway in late 2012 when the new governor of Jakarta, Joko Widodo, unexpectedly said that he wanted a review of the project. After several months of uncertainty governor Joko Widodo announced that the project would go ahead. He listed it as one of the priority projects in the Jakarta city budget for 2013. [9] Physical construction is expected to begin in 2013[10] and the line is expected to be operational by 2017. [edit]PT Mass Rapid Transit JakartaPT Mass Rapid Transit Jakarta (PT MRTJ) is a limited liability (Perseroan Terbatas) company founded by the Jakarta Provincial Government. Its establishment was approved by the provincial parliament (DPRD) on 10 June 2008 and final establishment was by notary act on 17 June 200 8. Its purpose is to operate the Jakarta MRT System. The shares are made up from 99% Jakarta Provincial Government and 1% PT Pasar Jaya (another Jakarta Reginal-Government-Owned-Company). PT MRTJ is classed as a Regional-Government-Owned-Company (Badan Usaha Milik Daerah-BUMD).The BUMD form for PT MRTJ is designed not to create profits for the shareholders, but instead to create flexibility in accessing alternative financing, which would otherwise be impossible if the company was directly part of the government. With this, the cost of tickets sold to clients will be reduced with some of the operational cost being subsidised by other sources. The BUMD form also ensures transparency and accountability through the shareholders' General Meeting, Decision Making and Reporting System which will be publicly available. Mrt Jakarta The Jakarta Mass Rapid Transit System is an ongoing transportation infrastructure project in Jakarta, the capital city of Indonesia. It consists of a partially elevated and partially underground railway system. Construction of the first phase of the project is expected to start in 2013 and is planned to be operational in 2016. [1] Contents [hide] 1 Background of the project 2 Lines 2. 1 North-South corridor 2. 1. 1 Phase I 2. 2 East-West corridor 3 Project Progress 4 PT Mass Rapid Transit Jakarta 5 References 6 External links [edit]Background of the projectJakarta is the capital city of Indonesia. It is an urban metropolis with over 8 million inhabitants. It is predicted that over four million residents of the surrounding Jabodetabek area commute in and out of the city each working day. Transport issues have increasingly begun to attract political attention and it has been estimated that in 2020 without a major transportation breakthrough traffic jams will overwhelm the city. Since 1 980 more than twenty-five general and special subject studies have been conducted related to possible Mass Rapid Transit (MRT) systems in Jakarta.One of the major reasons for the delays in tackling the problem was the economic crisis of 1997-98. Before the crisis a Build-Operate-Transfer (BOT) scheme was considered as part of a new MRT calling for private sector involvement. After the crisis, the plan to rely on a BOT to provide financing proved infeasible and the MRT project was again proposed as a government-funded scheme. Current public transportation in Jakarta mainly consists of various types of buses, starting from the very small bemo and pickup sized mikrolet, to slightly larger minbuses and full sized city buses.There are also both two and four wheeled taxis. Current transport systems include widely used MetroMini and Kopaja cheap minibuses, and the TransJakarta bus rapid transit system, and the Jabodetabek Commuter Railway. [edit]Lines The rail-based Jakarta MRT is expected to stretch across over 108 kilometres, including 21. 7 km for the North-South Corridor (From Lebak Bulus to Kampung Bandan) and 87 km for East-West Corridor(From Balaraja to Cikarang). [2] [edit]North-South corridor The North-South corridor will be built in two phases. Phase I, will be constructed in advance connects Lebak Bulus to Bundaran HI along 15. km including 13 stations (7 elevated stations and 6 underground stations). The Indonesian ministry of Transport approved this plan in September 2010 and invited tenders and will be built at April 2012. [3] Phase II, will extend the North-South line from Bundaran HI to Kampung Bandan (7 underground stations and 1 ground-level station), targeted to operate in 2018 (accelerated from 2020 as the original plan[4]). [5] After completion of MRT Phase I and II, together with TransJakarta will serve 60 percent total trips made by Jakartans. edit]Phase I The first phase is 15. 7 kilometres (9. 8 mi) long from Lebak Bulus to Bundaran HI. The c onstruction project will begin in June 2011 and is expected to be completed in 2016 to serve 212,000 passengers per day. This expected capacity may be maxed out to 960,000 per day. The 15. 7 kilometers span expected to be covered in under 30 minutes. [6] Elevated stations Lebak Bulus Fatmawati Cipete Haji Nawi Blok A Blok M Sisingamangaraja Underground stations Al-Azhar mosque Senayan Bendungan Hilir SetiabudiDukuh Atas (Interchange Station with Jakarta Commuter Line) Bundaran H. I [edit]East-West corridor This corridor is currently in pre-feasibility study phase. The line is targeted to operate in 2027. [edit]Project Progress Progress of the first phase was funded through a loan by the Japan Bank for International Cooperation (JBIC), now merged into the Japan International Cooperation Agency (JICA). The loan number IP is 536 (signed November 2006) for engineering services. The engineering services loan is a pre-construction loan to prepare the construction phase.It consists of: Bas ic Design package, managed by the DGR (Directorate General of Railways, Ministry of Transport) Management and Operation package, managed by the Bappeda (Jakarta Regional Planning Board) Construction assistance in tender, managed by the PT MRT Jakarta On March 31, 2009, Loan Agreement 2 (LA2) for the amount of 48,150 billion Yen to build the Jakarta MRT System was signed by the Indonesian Government (represented by the Indonesian Ambassador for Japan) and JICA in Tokyo, Japan. [7] This loan is to be forwarded from the National Government to the Jakarta City Administration as a grant (on-granting agreement). 8] After the signing of the granting agreement for LA2, city administration will propose another two loan agreements for LA3 and LA4 to the central government. These proposals will become a lending agreement for the local government. The total amount of LA3 and LA4 addressed as a loan by the local government is about 71867 billion yen. This amount is based on the progress, outcome and absorbance of LA2. The total loan package from JICA for the development of the Jakarta MRT system is worth a total of 120 billion yen.Work on the basic design for the first phase of the current version of the project began in late 2010. The tender process was underway in late 2012 when the new governor of Jakarta, Joko Widodo, unexpectedly said that he wanted a review of the project. After several months of uncertainty governor Joko Widodo announced that the project would go ahead. He listed it as one of the priority projects in the Jakarta city budget for 2013. [9] Physical construction is expected to begin in 2013[10] and the line is expected to be operational by 2017. [edit]PT Mass Rapid Transit JakartaPT Mass Rapid Transit Jakarta (PT MRTJ) is a limited liability (Perseroan Terbatas) company founded by the Jakarta Provincial Government. Its establishment was approved by the provincial parliament (DPRD) on 10 June 2008 and final establishment was by notary act on 17 June 200 8. Its purpose is to operate the Jakarta MRT System. The shares are made up from 99% Jakarta Provincial Government and 1% PT Pasar Jaya (another Jakarta Reginal-Government-Owned-Company). PT MRTJ is classed as a Regional-Government-Owned-Company (Badan Usaha Milik Daerah-BUMD).The BUMD form for PT MRTJ is designed not to create profits for the shareholders, but instead to create flexibility in accessing alternative financing, which would otherwise be impossible if the company was directly part of the government. With this, the cost of tickets sold to clients will be reduced with some of the operational cost being subsidised by other sources. The BUMD form also ensures transparency and accountability through the shareholders' General Meeting, Decision Making and Reporting System which will be publicly available.

Saturday, November 9, 2019

Unknown

B. Sc. (H) Computer Science 3-YEAR FULL TIME PROGRAMME RULES, REGULATIONS AND COURSES CONTENTS DEPARTMENT OF COMPUTER SCIENCE FACULTY OF MATHEMATICAL SCIENCES UNIVERSITY OF DELHI DELHI – 110007 2010 Semester Systems at the undergraduate level Course of Study: B. Sc. (H) Computer Semester – I CSHT-101 Programming Fundamentals CSHT-102 Discrete Structures Digital Electronics Calculus and Matrices CSHT-203 Data Structures Semester – II CSHT-204 computer Systems Architecture English Calculus and Geometry using C++ Semeser – III CSHT-305 Algorithms CSHT-306 Systems Programmin g CSHT-307 File Structures and Database Basic Probability and Statistics Semester – IV CSHT-408 Operating Systems CSHT-409 Data Communica tion and Computer CSHT-410 Software Engineering Real Analysis / Differential Equations Semester – V CSHT-511 Theory of Computations CSHT-512 Microproces sors CSHT-513 Internet Technologie s Optimization I/ Real Analysis/To be decided by the student Semeser – VI CSHT-614 Computer Graphics CSHT-615 Information Security CSHT-616 Electives Statistical Methodology/ DE/To be decided by the student Electives: 1. Software Testing 2. Artificial Intelligence 3. Network Programming and Administration 4. Data Mining 5. Combinatorial Optimizations Proposed Structure and Syllabi for B. Sc. (H) Computer Science – July 2010 Semester I Coding Title L–T–P Credits Total Marks 100 Pre-requisites CSHT-101 Programming Fundamentals using C++ Discrete Structures Digital Electronics Calculus and Matrices Software Lab based on 101 Lab based on Digital Electronics 5 – 0-0 5 – CSHT-102 ** ** CSHP-101 5 – 0-0 5 100 – 0-0-8 4 100 Semester II Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-203 CSHT-204 ** ** CSHP-202 CSHP-203 Data Structures Computer Systems Architecture EL – II (Language) Calculus and Geometry Software Lab based on 203 Lab based on 204 5 – 0-0 5 –0-0 5 5 101 0-0-8 0-0-4 4 2 100 50 Semester III Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-305 CSHT-306 Algorithms Systems Programming 5-0-0 5 – 0 -0 5 5 101,203 101, 203 CSHT-307 ** CSHP-304 CSHP-305 CSHP- 306 Database Systems Basic Statistics and Probability Software Lab based on 305 Software Lab based on 306 Software Lab based on 307 5–0-0 5 100 101, 203 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester IV Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-408 CSHT-409 Operating Systems Data Communication and Computer Networks Software Engineering Real Analysis/ Differential Equations Software Lab based on 408 Software Lab based on 409 Software Lab based on 410 5 – 0-0 5 – 0-0 5 5 101, 203 CSHT-410 ** 5 – 0-0 5 100 101, 203 – CSHP-407 CSHP-408 CSHP-409 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester V Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-511 CSHT-512 CSHT-513 ** CSHP-510 Theory of Computations Microprocessors Internet Technologies Optimization I/Real Analysis/* Software Lab based on 512 5 – 0– 0 5–0-0 5–0-0 5 5 5 01 204 409 0-0-4 2 50 CSHP-511 Lab based on 513 0-0-4 2 50 Semester VI Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-614 CSHT-615 CSHT-616 ** Computer Graphics Information Security Elective Differential Equations/ Statistical Methodology/* Software Lab based on 614 Softwar e Lab based on 615 Software Lab based on 616 5-0-0 5-0-0 5-0-0 5 5 5 – CSHP-612 CSHP-613 CSHP-614 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 †¢ To be decided by the student from any discipline * * Will be finalized after the syllabi by the respective departments (Electronics / Mathematics / Statistics / English) are made. CSHT-101 Programming Fundamentals (60 Lectures) Basic Computer Organization: Functional Units, basic I/O devices and storage devices; Representation of integers, real (fixed and floating point), characters (ASCII and Unicode); Basic operations of a programming environment. Problem Solving Approaches: Notion of an algorithm, problem solving using top-down design and decomposition into sub-problems, stepwise methodology of developing an algorithm, methodology of developing an algorithmic solution from a mathematical specification of the problem, use of recursion for problems with inductive characterization. Programming using C++: basic data types; constants and variables, arithmetic and logical expressions, assignment; input-output interface; control structures in conditionals, loops; procedural abstractions; strings and arrays; command line arguments; file handling; error handling. Introduction to the object-oriented programming paradigms; data abstraction and encapsulation — objects and classes; inheritance; polymorphism; Recommended Books: 1. B. A. Forouzan and R. F. Gilberg, Computer Science, A structured Approach using C++, Cengage Learning, 2004. 2. R. G. Dromey, How to solve it by Computer, Pearson Education 1982 3. E. Balaguruswamy, Object Oriented Programming with C++ , 4th Edition, Tata McGraw Hill 1997 4. G. J. Bronson, A First Book of C++ From Here to There, 3rd Edition, Cengage Learning 2005. 5. G. Seed, An Introduction to Object-Oriented Programming in C++, with applications in Computer Graphics Springer 2nd Edition 2001. CSHT 102 Discrete Structures (60 Lectures) Introduction: Sets – finite and Infinite sets, uncountably Infinite Sets; functions, relations, Properties of Binary Relations, Closure, Partial Ordering Relations; counting – Pigeonhole Principle, Permutation and Combination; Mathematical Induction, Principle of Inclusion and Exclusion. Growth of Functions: Asymptotic Notations, Summation formulas and properties, Bounding Summations, approximation by Integrals Recurrences: Recurrence Relations, generating functions, Linear Recurrence Relations with constant coefficients and their solution, Substitution Method, Recurrence Trees, Master Theorem Graph Theory: Basic Terminology, Models and Types, multigraphs and weighted graphs, Graph Representaion, Graph Isomorphism, Connectivity, Euler and Hamiltonian Paths and Circuits, Planar Graphs, Graph Coloring, Trees, Basic Terminology and properties of Trees, Introduction to Spanning Trees Prepositional Logic: Logical Connectives, Well-formed Formulas, Tautologies, Equivalences, Inference Theory Recommended Books: 1. C. L. Liu & Mahopatra, Elements of Discrete mathematics, 2nd Sub Edition 1985, Tata McGraw Hill 2. Rosen, Discrete Mathematics and Its Applications, Sixth Edition 2006 3. T. H. Coremen, C. E. Leiserson, R. L. Rivest, Introduction to algorithms, Prentice Hall on In dia (3rd edition 2009) 4. M. O. Albertson and J. P. Hutchinson, Discrete Mathematics with Algorithms 1988 Johnwiley Publication 5. J. L. Hein, Discrete Structures, Logic, and Computability, Jones and Bartlett Publishers, 3rd Edition, 2009 6. D. J. Hunter, Essentials of Discrete Mathematics, Jones and Bartlett Publishers, 2008 Digital Electronics In consultation with Department of Electronics) Number System and Codes: Decimal, Binary, Hexadecimal, Octal, BCD, Conversions, Complements (1’s and 2’s), Signed and Unsigned numbers, Addition and Substraction, Multiplication Gray and Hamming Codes Logic Gates and Boolean Algebra: Truth Tables, OR, AND, NOT, EXOR, Universal (NOR and NAND) Gates, Boolean Theorems, DeMorgan’s Theorems. Combinational Logic Analysis and Design: Standard representation of logic functions (SOP and POS), Minimization Techniques(Karnaugh Map Method: 4,5 variables). Multiplexers(2:1,4:1)) and Demultiplexers (1:2,4:1), Adder (half and full) and th eir use as substractor, Encoder (8-line-to-3-line) and Decoder (3-line-to-8-line) , Code Converters( Binary to BCD and vice versa). Sequential logic design: Latch, Flip flop, S-R FF , J-K FF, T and D type FFs, Clocked FFs, Registers, Counters (ripple, synchronous and asynchronous, ring, modulus), State Table, State Diagrams and Sequential Machines. A/D and D/A Converters: Successive Approximation ADC, R/2R Ladder DAC. Memories: General Memory Operation, ROM, RAM (Static and Dynamic), PROM, EPROM, EEPROM, EAROM. Suggested Books: 1. Digital Electronics, Principles and Applications, R. L. Tokheim, Tata McGraw-Hill. 2. Digital Principles, R. L. Tokheim, Schaum’s Outline Series, Tata McGraw-Hill. 3. Digital Systems, Principles and Applications, R. J. Tocci and N. S. Widner, Pearson Education Asia. 4. Digital Principles and Applications, A. P. Malvino and D. Leach, Tata McGraw Hill. 5. Digital Design, M. M. Mano, Pearson Education Asia. 6. Digital Fundamentals, T. L. Floyd, Pearson Education Asia. 7. Solved Problems in Digital Electronics, S. P. Bali, Sigma Series, Tata McGraw-Hill. 8. Digital Electronics, W. H. Gothmann, Prentice Hall of India. 9. Modern Digital Electronics, R. P. Jain, Tata McGraw-Hill. CSHT 203 Data Structures (60 Lectures) Introduction: Abstract Data Types, Arrays- Single and Multidimensional arrays, Sparse matrices. Linear structures: Stacks, Queues (linear as well as circular implementation), singly-, doubly-, and circularly- linked lists — Operations and applications. Recursion: Problem solving using recursion, run time stack in recursion, tail recursion, and its removal. Searching techniques: Linear search, Binary search and their efficiency, Skip Lists, Hashing. Tree Structures: Trees, Binary Trees, Complete Binary trees and almost complete Binary trees, binary search trees, Insertion, Deletion, Tree traversal algorithms, Threaded trees (recursive as well as Non recursive), applications of trees. Multiway trees – B-Trees and introduction to B+ Trees. Recommended Books: 1. A. Drozdek, Data Structures and algorithm in C++, 3rd Edition, Course Technology 2004. 2. Data Structures using C and C++, Tannenbaum, 2nd edition ** 1995 3. Data Structures and Algorithms in C++. Publication John Wiley 2003 4. S. Sahni, Data Structures, Algorithms and applications in C++, Publication Silicon Press 2004 5. B. R. Preiss, Data structures and algorithms with object oriented design patterns in C++, John Wiley and sons, 1998. CSHT 204 Computer System Architecture (60 Lectures) Basic Computer Organization and Design: Computer registers, bus system, instruction set, timing and control, instruction cycle, memory reference, input-output and interrupt, Interconnection Structures, Bus Interconnection design of basic computer. Central Processing Unit: Register organization, arithmetic and logical micro-operations, stack organization, micro programmed control. Instruction formats, addressing modes, instruction codes, machine language, assembly language, input output programming, RISC, CISC architectures, pipelining and parallel architecture. Memory Organization: Cache memory, Associative memory, mapping. Input-output Organization: Input / Output: External Devices, I/O Modules, Programmed I/O, Interrupt-Driven I/O, Direct Memory Access, I/O Channels Recommended Books: 1. M. Mano, Computer System Architecture, Prentice Hall of India Third edition / Pearson Education 1992. 2. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004. 3. W. Stallings, Computer Organization and Architecture Desiguing for Performance 8th Edition 2009, Prentice Hall of India. CSHT 305 Algorithms (60 Lectures) Introduction: Basic Design and Analysis techniques of Algorithms, Correctness of Algorithm. Algorithm Design Techniques: Iterative techniques, Divide and Conquer, Dynamic Programming, Greedy Algorithms. Sorting and Searching Techniques: Elementary sorting techniques – Bubble Sort, Insertion Sort, Merge Sort, Advanced Sorting techniques – Heap Sort, Quick Sort, Sorting in Linear Time Bucket Sort, Radix Sort and Count Sort, Searching Techniques, Medians & Order Statistics, complexity analysis; Lower Bounding Techniques: Decision Trees Balanced Trees – Red-Black Trees Advanced Analysis Technique: Amortized analysis Graphs: Graph Algorithms – Breadth First Search, Depth First Search and its Applications, Minimum Spanning Trees. String Processing: String Matching, KMP Technique Recommended Books: 1. T. H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein Introduction to Algorithms, PHI, 3rd Edition 2009 2. Sarabasse & A. V. Gelder Computer Algorithm – Introduction to Design and Analysis, Publisher – Pearson 3rd Edition 1999 CSHT 306 Systems Programming (60 Lectures) Introduction: Introduction to Systems Software and machine architecture. Assemblers: Example of an assembly language, programming in assembly language, assembler features and functions, Load and Go assembler, One-pass and two pass assemblers, Macros and macro processors. Compilers: Compiler functions and features, phases of compilation, optimization. Loaders and Linkers: Basic Loader functions and features, Relocation, Program Linking, static and dynamic linking. Recommended Books: 1. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004 2. D. M. Dhamdhere Systems Programming and Operating Systems, Tata McGraw-Hill Publishing Company, Ltd; Second Revised Edition 1996 3. L. Beck, D. Manjula, System Software, An Introduction to Systems Programming, Pearson, 3rd Edition 1996. 4. S. Chattopadhyay, Systems Software, PHI 2007. CSHT 307 Database Systems (60 Lectures) Introduction: Characteristics of database approach, data models, database system architecture and data independence. Entity Relationship(ER) Modeling: Entity types, relationships, constraints. Relation data model: Relational model concepts, relational constraints, relational algebra, SQL queries, programming using embedded SQL. Database design: mapping ER model to relational database, functional dependencies, normal forms. Transaction Processing: ACID properties, concurrency control, recovery. Web based databases: XML documents and databases. Books Recommended: 1. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems 6th Edition, Pearson Education 2010. 2. R. Ramakrishanan, J. Gehrke, Database Management Systems 3rd Edition, McGraw-Hill 2002. 3. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts 6th Edition, McGraw Hill 2010. CSHT 408 Operating Systems (60 Lectures) Introduction: Basic OS functions, resource abstraction, types of operating systems – multiprogramming systems, batch systems , time sharing systems; operating systems for personal computers & workstations, process control & real time systems. Operating System Organization: processor and user modes, kernels, system calls and system programs. Process Management: System view of the process and resources, process abstraction, process hierarchy, threads, threading issues, thread libraries; Process Scheduling, non-pre-emptive and pre-emptive scheduling algorithms; concurrent and processes, critical section, semaphores, methods for inter-process communication; deadlocks. Memory Management: Physical and virtual address space; memory allocation strategies -fixed and variable partitions, paging, segmentation, virtual memory File and I/O Management: Directory structure, file operations, file allocation methods, device management. Protection and Security: Policy mechanism, authentication, internal access authorization. Recommended Books: 1. A Silberschatz, P. B. Galvin, G. Gagne, Operating Systems Concepts, 8th Edition, John Wiley Publications 2008. 2. A. S. Tanenbaum, Modern Operating Systems, 3rd Edition, Pearson Education 2007. 3. G. Nutt, Operating Systems: A Modern Perspective, 2nd Edition Pearson Education 1997. 4. W. Stallings, Operating Systems, Internals & Design Principles 2008 5th Edition, Prentice Hall of India. 5. M. Milenkovic, Operating Systems- Concepts and design, Tata McGraw Hill 1992. CSHT 409 Data Communication and Computer Networks (60 Lectures) Introduction to Computer Networks: Network definition; network topologies; network classifications; network protocol; layered network architecture; overview of OSI reference model; overview of TCP/IP protocol suite. Data Communication Fundamentals and Techniques: Analog and digital signal; data-rate limits; digital to digital line encoding schemes; pulse code modulation; parallel and serial transmission; digital to analog modulation-; multiplexing techniques- FDM, TDM; transmission media. Networks Switching Techniques and Access mechanisms: Circuit switching; packet switching- connectionless datagram switching, connection-oriented virtual circuit switching; dial-up modems; digital subscriber line; cable TV for data transfer. Data Link Layer Functions and Protocol: Error detection and error correction techniques; data-link control- framing and flow control; error recovery protocols- stop and wait ARQ, goback-n ARQ; Point to Point Protocol on Internet. Multiple Access Protocol and Networks: CSMA/CD protocols; Ethernet LANS; connecting LAN and back-bone networks- repeaters, hubs, switches, bridges, router and gateways; Networks Layer Functions and Protocols: routing; routing algorithms; network layer protocol of Internet- IP protocol, Internet control protocols. Transport Layer Functions and Protocols: Transport services- error and flow control, Connection establishment and release- three way handshake; Overview of Application layer protocol: Overview of DNS protocol; overview of WWW & HTTP protocol. Recommended Books: 1. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd 2007. 2. A. S. Tanenbaum: Computer Networks, Fourth edition, PHI Pvt. Ltd 2002. CSHT 410 Software Engineering (60 Lectures) Introduction: The Evolving Role of Software, Software Characteristics, Changing Nature of Software, Software Engineering as a Layered Technology, Software Process Framework, Framework and Umbrella Activities, Process Models, Capability Maturity Model Integration (CMMI). Requirement Analysis: Software Requirement Analysis, Initiating Requirement Engineering Process, Requirement Analysis and Modeling Techniques, Flow Oriented Modeling, Need for SRS, Characteristics and Components of SRS. Software Project Management: Estimation in Project Planning Process, Project Scheduling. Risk Management: Software Risks, Risk Identification, Risk Projection and Risk Refinement, RMMM Plan. Quality Management: Quality Concepts, Software Quality Assurance, Software Reviews, Metrics for Process and Projects. Design Engineering: Design Concepts, Architectural Design Elements, Software Architecture, Data Design at the Architectural Level and Component Level, Mapping of Data Flow into Software Architecture, Modeling Component Level Design. Testing Strategies & Tactics: Software Testing Fundamentals, Strategic Approach to Software Testing, Test Strategies for Conventional Software, Validation Testing, System Testing, BlackBox Testing, White-Box Testing and their type, Basis Path Testing. Recommended Books: 1. R. S. Pressman, Software Engineering: A Practitioner’s Approach (7th Edition), McGrawHill, 2009. 2. P. Jalote, An Integrated Approach to Software Engineering (2nd Edition), Narosa Publishing House, 2003. 3. K. K. Aggarwal and Y. Singh, Software Engineering (revised 2nd Edition), New Age International Publishers, 2008. 4. I. Sommerville, Software Engineering (8th edition), Addison Wesle, 2006. 5. D. Bell, Software Engineering for Students (4th Edition), Addison-Wesley, 2005. 6. R. Mall, Fundamentals of Software Engineering (2nd Edition), Prentice-Hall of India, 2004. CSHT 511 Theory of Computation (60 Lectures) Languages: Alphabets, string, language, Basic Operations on language, Concatenation, Kleene Star Finite Automata and Regular Languages: Regular Expressions, Transition Graphs, Deterministics and non-deterministic finite automata, NFA to DFA Conversion, Regular languages and their relationship with finite automata, Pumping lemma and closure properties of regular languages. Context free languages: Context free grammars, parse trees, ambiguities in grammars and languages, Pushdown automata (Deterministic and Non-deterministic), Pumping Lemma, Properties of context free languages, normal forms. Turing Macines and Models of Computations: RAM, Turing Machine as a model of computation, Universal Turing Machine, Language acceptability, decidability, halting problem, Recursively enumerable and recursive languages, unsolvability problems. Recommended Books: 1. Daniel I. A. Cohen, Introduction to computer theory – John Wiley (1996 2nd Edition). 2. Lewis & Papadimitriou, Elements of the theory of computation – II Edition PHI 1997. 3. Hoperoft, Aho, Ullman, Introduction to Automata theory, Language & Computation –3rd Edition 2006, Pearson Education. 4. P. Linz, An Introduction to Formal Language and Automata 4th edition Publication Jones Bartlett 2006 CSHT 512 Microprocessors (60 Lectures) Microprocessor architecture: Internal architecture, system bus architecture, memory and I/O interfaces. Microprocessor programming: Register Organization, instruction formats, assembly language programming. Interfacing: Memory address decoding, cache memory and cache controllers, I/O interface, keyboard, display, timer, interrupt controller, DMA controller, video controllers, communication interfaces. Recommended Books: 1. Barry B. Brey : The Intel Microprocessors : Architecture, Programming and Interfacing. Pearson Education, Sixth Edition. 2. Walter A Triebel, Avtar Singh; The 8088 and 8086 Microprocessors Programming, Interfacing, Software, Hardware, and Applications. PHI, Fourth Edition 2005. CSHT 513 Internet Technologies (60 Lectures) JavaScript: Data types, operators, functions, control structures, events and event handling. Java: Use of Objects, Array and ArrayList class , Designing classes, Inheritance, Input/Output, Exception Handling. JDBC: JDBC Fundamentals, Establishing Connectivity and working with connection interface, Working with statements, Creating and Executing SQL Statements, Working with Result Set Objects. JSP: Introduction to JavaServer Pages, HTTP and Servlet Basics, The Problem with Servlets, The Anatomy of a JSP Page, JSP Processing, JSP Application Design with MVC, Setting Up the JSP Environment, Implicit JSP Objects, Conditional Processing, Displaying Values, Using an expression to Set an Attribute, Declaring Variables and Methods, Error Handling and Debugging, Sharing Data Between JSP Pages, Requests, and Users, Database Access. Java Beans: Java Beans Fundamentals, JAR files, Introspection, Developing a simple Bean, Connecting to DB Recommended Books: 1. Web Enabled Commercial Application Development Using Html, Dhtml,javascript, Perl Cgi By Ivan Bayross, BPB Publications, 2009. 2. BIG Java Cay Horstmann, Wiley Publication , 3rd Edition. , 2009 3. Java 7 ,The Complete Reference, Herbert Schildt, 8th Edition, 2009. 4. The Complete Reference J2EE, TMH, Jim Keogh, 2002. 5. Java Server Pages, Hans Bergsten, Third Edition, O'Reilly Media December 2003. CSHT 614 Computer Graphics (60 Lectures) Introduction to Graphics systems, Basic elements of Computer graphics, Applications of computer graphics. Graphics Hardware: Architecture of Raster and Random scan display devices, input/output devices. Fundamental Techniques in Graphics: Raster scan line, circle and ellipse drawing, thick primitives, Polygon filling, line and polygon clipping algorithms, 2D and 3D Geometric Transformations, 2D and 3D Viewing Transformations (Projections- Parallel and Perspective), Vanishing points. Geometric Modeling: Representing curves & Surfaces. Visible Surface determination: Hidden surface elimination. Surface rendering: Illumination and shading models. Basic color models and Computer Animation. Books Recommended: 1. J. D. Foley, A. Van Dan, Feiner, Hughes Computer Graphics Principles & Practice 2nd edition Publication Addison Wesley 1990. 2. D. Hearn, Baker: Computer Graphics, Prentice Hall of India 2008. 3. D. F. Rogers Procedural Elements for Computer Graphics, McGraw Hill 1997. 4. D. F. Rogers, Adams Mathematical Elements for Computer Graphics, McGraw Hill 2nd edition 1989. CSHT 615 Information Security (60 Lectures) Introduction: Security, Attacks, Computer Criminals, Security Services, Security Mechanisms. Cryptography: Substitution ciphers, Transpositions Cipher, Confusion, diffusion, Symmetric, Asymmetric Encryption. DES Modes of DES. ,Uses of Encryption. ,Hash function,key exchange, digital signatures,Digital Certificates. Program Security: Secure programs,Non malicious Program errors, Malicious codes virus,trap doors,salami attacks, covert channels,Control against program Threats. Protection in OS: Memory and Address Protection, Access control, File Protection, User Authentication. Database Security: Requirements, Reliability, Integrity, Sensitive data, Inference, Multilevel Security. Security in Networks: Threats in Networks s Networks security Controls, detection systems, Secure e-mails firewalls, Intusion Administrating Security: Security Planning, Risk Analysis, Organisational Security Policy, Physical Security. Ethical issues in Security: Protecting Programs and data. Information and law. Recommended Books: 1. C. P. Pfleeger, S. L. Pfleeger; Security in Computing, Prentice Hall of India, 2006 2. W. Stallings ; Network Security Essentials: Applications and Standards, 4/E, 2010 CSHT 616 (i) Foundations of Software Testing Fundamentals of testing: Need for testing, process, The psychology of testing General testing principles, Fundamental test Testing throughout the software life cycle: Software development models, Test levels (Unit, Integration, System Acceptance testing), Test types (functional, non-functional, regression testing), Maintenance testing Static techniques: Static techniques and the test process, Review process (types of review, roles and responsibilities), Test design techniques: The Test Development Process, Categories of test design techniques, Specification-based or black-box techniques (Equivalence partitioning, Boundary value analysis, Decision table testing, State transition testing, Use case testing), Structure-based or white-box techniques (Statement testing and coverage, Decision testing and coverage, other structure-based techniques), Experience-based techniques, Choosing test techniques Test management: Test organization (test leader, tester), Test planning and estimation ( Test planning, Test planning activities, Exit criteria, Test estimation, Test approaches), Test progress monitoring and control (Test progress monitoring, test reporting, test control), Configuration management, Risk and testing (Project risks, Product risks), Incident management Web Application Testing Foundation: Basic test planning and testing methods for web applications, Introduction to gray-box testing and its application to testing web applications, Outline knowledge, methods and tools for testing web applications, Introduction to web testing tools and sources, Introduction to research tools on the Net. Tool support for testing: Types of test tool, Test tool classification, Tool support for management of testing and tests, static testing, test specification, test execution and logging, performance and monitoring, specific application areas, using other tools, Effective use of tools: potential benefits and risks Recommended Books: 1. 2. 3. 4. 5. Boris Beizer, â€Å"Software Testing Techniques†, Van Nostrand Reinhold Louise Tamres, â€Å"Software Testing†, Pearson Education Paul Jogerson, â€Å"Software Testing† CRC Press Roger R Pressman, â€Å"Software Engineering – A Practitioner’s approach† Mc Graw Hill Testing Applications on the Web, 2nd Edition by Nguyen, Michael Hackett, and Bob Johnson (Wiley, 2003 CSHT 616 (ii) ARTIFICIAL INTELLIGENCE Introduction: (60 Lectures) Introduction to Artificial Intelligence, Background and Applications, Turing Test and Rational Agent approaches to AI, Introduction to Intelligent Agents, their structure, be havior and environment. Problem Solving and Searching Techniques: Problem Characteristics, Production Systems, Control Strategies, Breadth First Search, Depth First Search, Hill climbing and its Variations, Heuristics Search Techniques: Best First Search, A* algorithm, Constraint Satisfaction Problem, Means-End Analysis, Introduction to Game Playing, Min-Max and Alpha-Beta pruning algorithms. Knowledge Representation: Introduction to First Order Predicate Logic, Resolution Principle, Unification, Semantic Nets, Conceptual Dependencies, Frames, and Scripts, Production Rules, Conceptual Graphs. Programming in Logic (PROLOG). Dealing with Uncertainty and Inconsistencies: Truth Maintenance System, Default Reasoning, Probabilistic Reasoning, Bayesian Probabilistic Inference, Possible World Representations. Understanding Natural Languages: Parsing Techniques, Context-Free and Transformational Grammars, Recursive and Augmented Transition Nets. BOOKS RECOMMENDED: 1. 2. DAN. W. Patterson, Introduction to A. I and Expert Systems – PHI, 2007. Russell & Norvig, Artificial Intelligence-A Modern Approach, LPE, Pearson Prentice Hall, 2nd edition, 2005. Rich & Knight, Artificial Intelligence – Tata McGraw Hill, 2nd edition, 1991. W. F. Clocksin and Mellish, Programming in PROLOG, Narosa Publishing House, 3rd edition, 2001. 5. Ivan Bratko, Prolog Programming for Artificial Intelligence, Addison-Wesley, Pearson Education, 3rd edition, 2000. 3. 4. CSHT 616 (iii) Network Programming and Administration Transport Layer Protocols: TCP, UDP, SCTP protocol. Socket Programming: Socket Introduction; TCP Sockets; TCP Client/Server Example ; signal handling; I/O multiplexing using sockets; Socket Options; UDP Sockets; UDP client server example; Address lookup using sockets. Network Applications: Remote logging; Email; WWWW and HTTP. LAN administration: Linux and TCP/IP networking: Network Management and Debugging. Books recommended: 1. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff, Unix Network Programming, The sockets Networking API, Vol. 1, 3rd Edition, PHI. 2. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd. 3. Nemeth Synder & Hein, Linux Administration Handbook, Pearson Education, 2nd Edition 4. R. Stevens, Unix Network Programming, PHI 2nd Edition CSHT 616 (iv) Data Mining Overview: Predictive and descriptive data mining techniques, supervised and unsupervised learning techniques, process of knowledge discovery in databases, pre-processing methods Data Mining Techniques: Association Rule Mining, classification and regression techniques, clustering, Scalability and data management issues in data mining algorithms, measures of interestingness Books Recommended: 1. Introduction to Data Mining, Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Pearson Education. 2. Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Information; Pearson Education 2003. 3. Introduction to Data Mining with Case Studies, G. K. Gupta, PHI,2006. 4. Insight Into Data Mining: Theory And Practice, Soman K P,Diwakar Shyam, Ajay V, PHI, 2006 CSHT 616 (v) Combinatorial Optimization Introduction: Optimization problems, neighborhoods, local and global optima, convex sets and functions, simplex method, degeneracy; duality and dual algorithm, computational considerations for the simplex and dual simplex algorithms-Dantzig-Wolfe algorithms. Integer Linear Programming: Cutting plane algorithms, branch and bound technique. Graph Algorithms: Primal-Dual algorithm and its application to shortest path, Math-flow problems Dijkstra’s algorithm, Max-flow problem, matching problem, bipartite matching algorithm, non-bipartite matching algorithms. Books recommended: 1. C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and complexity, Prentice-Hall of India, 2006 2. K. Lange, Optimization, Springer, 2004 3. Mokhtar S. Bazaraa, John J. Jarvis and Hanif D. Sherali, Linear Programming and Network Flows, John Wiley & Sons, 2004 4. H. A. Taha, Operations Research: An Introduction (8th Edition), Prentice Hall, 2006 Unknown Life is an experience that comes along with failure. Have you ever had the feeling like you haven't done your best at something or the feeling that you're disappointing the people you care about most? Well Eve had that feeling multiple times especially in middle school. In middle school Eve experience lots of failure; failure with friendships, relationships, and rejection. Failure to me is being unhappy with yourself and not doing what you believe in.My 8th grade year in middle school was a earning experience that came along with lots of failure. The beginning of 8th grade was the easiest part of middle school because there was no drama and less friends. As time went by I gained more friends and more pressure was put on my shoulders. I learned a lot about friendships and the meaning of them. Losing the friends that meant the most to me is one of my failures and something that was challenging. Friendships from the past have a huge impact on the friendships that Eve made today.In middl e school I was always open to meeting new people and starting new reined friendships with anyone but now I realize that I can't do that without getting to know the person first. During my years in high school Eve been more selective with how I choose my friends. Eve learned that in order to trust someone in full and to consider them a good friend, I would have to get to know that person first. Throughout my high school experience Eve gained many friends and learned to trust them. Whenever I had a problem, I would turn to them for advice. Their advice always helped me through my problems and anything else I needed.Throughout my experience in high school and middle school, Eve learned a lot about friendship and values. Eve been making better decisions for myself and how I have been choosing my friends. How I chose my friends will help me in college because Eve had experience with good friends and bad friends. My experience with friends at school is teaching me so much about life. Midd le school and high school has helped me with better decision making when choosing friends. I will use this decision making in college to help me build new friendships.

Thursday, November 7, 2019

Major Assignment Essays

Major Assignment Essays Major Assignment Essay Major Assignment Essay This assignment requires students to compile a BUSINESS REPORT based on the attached news article and related questions. 2. This assignment must be done in pairs; individual assignments will not be accepted. Preferably, you must select a person from within your tutorial group as your assignment partner. 3. Your assignment MUST be word processed. Hand written assignments will NOT be accepted. 4. Ensure that your names, ID No’s, tutors name and tutorial day and time are stated clearly on the cover page, which can be downloaded from Moodle. 5. A penalty of 10% will be deducted each day or part thereof that the assignment is late. Check late assignment policy. 6. Use proper in text referencing, footnotes and a bibliography. Plagiarized/copied assignments will be awarded a ZERO (0) mark. 7. Font size of 12 should be used with single line spacing. 8. Word limit for this assignment is 1500 words. 9. All answers will have to be submitted into TURN-IT-IN on moodle on the due date. A submission box will be made available on moodle. 10. Case Article: Read â€Å"Wainivesi seeks mining lease extension† by Rachna Lal, Fiji Sun 5th March, 2013. A copy of the article is attached on next page] Required Compile a BUSINESS REPORT based on the following questions, in light of reading the case article and relevant readings. In writing your answers, you may provide quotes from the article to support your answer. Assume that you and your partner have been appointed as consultants and have been requested by the investors of Asia Pacific Resources Limited to provide them a business report in regards to the following: * Explain which underlying ‘accounting assumption’ is managing director Mathew Huggan most concerned about and the reasons for his concerns. * â€Å"For the investors, the Government and the landowners the only way in which to earn income from Wainivesi is by operating the mine. † * Clearly explain how each party would earn income from the Wainivesi mine. | * Evaluate whether ‘exploration costs’ for mining companies’ are assets? Why or why not? | * Evaluate whether the land on which the Wainivesi Mine sits, is an asset of Asia Pacific Resources Limited or the landowners. * | * Evaluate whether the company would have a liability in regards to the damages to the environment as a result of mining. * | ~THE END~

Tuesday, November 5, 2019

How to Conjugate the French Verb Montrer (to Show)

How to Conjugate the French Verb Montrer (to Show) Montrer,  (to show, display, produce, exhibit)  is a  regular French  -er  verb, which means it belongs to the largest group of verbs in the French language. They share conjugation patterns in all tenses and moods. Montrer Is a Regular -er Verb To use à ©tudier,  begin by removing the  -er  ending from the infinitive. This reveals the stem of the verb. Then to conjugate the verb, add the endings (shown in the table below) to the stem. Note that the table lists only simple conjugations. Compound conjugations, which consist of a form of the auxiliary verb  avoir  and the past participle montrà ©, are not included. Generally speaking, the five largest categories of verbs in French are: regular  -er, -ir  and  -re; stem-changing; and irregular. Once you  learn the rules of conjugation for each kind of regular verb, you should have no problem actually  conjugating  them. The largest category of French verbs is by far regular  -er  verbs. Montrer: Uses and Expressions Montrez-moi votre billet. Show me your ticket.Picasso montrait son chef dÅ“uvre Paris. Picasso exhibited his masterpiece in Paris.Jai montrà © Marie au docteur.  (familiar)  Ã‚  I had the doctor take a look at Marie.montrer le poing quelquun to shake ones fist at someonemontrer patte blanche to produce ones credentialsmontrer ses cartes to show ones handIl a montrà © la richesse extraordinaire de sa famille. He flaunted his familys extraordinary wealth.montrer la sortie to point out the exità §a montre bien que... it just goes to show that...se montrer [pronominal] to appear (in public)Je ne peux pas me montrer dans cet à ©tat  ! I cant let people see me like this.se montrer son avantage to show oneself in a good lightElle adore se montrer. She loves to be seen (in public).se montrer  dun  grand  Ãƒ ©goà ¯sme to display great selfishness Common French Regular -er Verbs   aimer  Ã‚  to like, to lovearriver  Ã‚  to arrive, to happenchanter  Ã‚  to singchercher  Ã‚  to look forcommencer  Ã‚  to begindanser  Ã‚  to dancedemander  Ã‚  to ask fordà ©penser  Ã‚  to spend (money)dà ©tester  Ã‚  to hatedonner  Ã‚  to giveà ©couter  Ã‚  to listen toà ©tudier  Ã‚  to studyfermer  Ã‚  to closegoà »ter  Ã‚  to tastejouer  Ã‚  to playlaver  Ã‚  to washmanger  Ã‚  to eatnager  Ã‚  to swimparler  Ã‚  to talk, to speakpasser  Ã‚  to pass, spend (time)penser  Ã‚  to thinkporter  Ã‚  to wear, to carryregarder  Ã‚  to watch, to look atrà ªver  Ã‚  to dreamsembler  Ã‚  to seemskier  Ã‚  to skitravailler  Ã‚  to worktrouver  Ã‚  to findvisiter  Ã‚  to visit (a place)voler  Ã‚  to fly, to steal Simple Conjugations of the Regular French Verb Montrer Present Future Imperfect Present participle je montre montrerai montrais montrant tu montres montreras montrais il montre montrera montrait nous montrons montrerons montrions vous montrez montrerez montriez ils montrent montreront montraient Pass compos Auxiliary verb avoir Past participle montr Subjunctive Conditional Pass simple Imperfect subjunctive je montre montrerais montrai montrasse tu montres montrerais montras montrasses il montre montrerait montra montrt nous montrions montrerions montrmes montrassions vous montriez montreriez montrtes montrassiez ils montrent montreraient montrrent montrassent Imperative tu montre nous montrons vous montrez

Saturday, November 2, 2019

The Cold War in Berlin Research Paper Example | Topics and Well Written Essays - 1750 words

The Cold War in Berlin - Research Paper Example He stated that if one was claiming that communism was good, he should come to West Berlin and see the capitalism taste. This was meant to demonstrate how well the capitalism ideology had spurred significant economic growth and political freedom in West Berlin. He also asserted that dividing people and putting them under oppression was not only contravention of individual human rights but a recipe to economic backwardness. He reiterated the need for a united people and pursuit of capitalism which was characterized by democracy â€Å"Freedom has many difficulties, and democracy is not perfect But we have never had to put a wall up to keep our people in, to prevent them from leaving us!† He demonstrated how West Berlin had prospered despite being physically separated from the rest of the world and directly championed for adoption of democracy as a tool towards capitalism before he gave a closing remark amidst a cheering crowd of how proud he was to be a West Berliner (Smyser, 200 9).It is worth to note that John. Kennedy’s visit was also meant for a meeting with the Soviet Union Leader Nikita Khrushchev in Vienna Austria for a retreat in terms of the oppressive rule over the East Berlin people. The meeting ended in a stalemate and increased tension between US and Soviet Union. At some point, the US threatened to react with military force if their rights in West Berlin were interfered with in any way by the communist Soviet Union. To achieve this, the second wall which was known as border wall 75 was created in 1975.

Thursday, October 31, 2019

Engineering accomplishment-Air traffic control systems Essay

Engineering accomplishment-Air traffic control systems - Essay Example moved during the day with sufficient lighting and a clear sky. This meant that a pilot could easily see other aircrafts when taking off, landing or when on flight on the sky. Traffic avoidance was based on ‘see and be seen’ principle. This implied that aircrafts could only be flown in conditions that would easily allow them to see other aircrafts and change their flight paths to avoid others. All pilots were expected to abide by this principle and were also not allowed to fly the aircrafts under cloudy conditions. Furthermore, pilots were only allowed to fly the aircrafts in areas where visibility was not less than 3 miles. Nolan (2010) notes that pilots and aviation operators were comfortable with these rules since the aircrafts of those days were slow and pilots could easily see and avoid other aircrafts on flight making the establishment of more organized system of aircraft control unnecessary. Nevertheless, as technology advanced and people began to move all over the world in 1930s, their came a need of a more advanced air traffic control system to allow aircrafts to be flown at anytime, day or night, irrespective of prevailing condition leading to the establishment of instruments that would allow pilots to navigate the aircraft without having to depend on visual inference to the natural horizon. In addition, Navigation aids (navaids), which are ground-based systems, were also constructed to allow pilots to be able to control aircrafts without reference to ground (Gorton, 1998). When all these systems had been put in place, pilots could now be able to have easy take-off, travel en route and safely land in poor whether conditions that cannot allow them to see and avoid other aircrafts. This invention is indeed, a great accomplishment in the field of the aviation industry, which has helped improve aircraft movement throughout the country irrespective of whether condition, day or night. The reason being, it helps pilots in controlling the aircraft s thereby avoiding collision and accidents. For instance, it is reported that during peak hours in the US, approximately 5,000 aircrafts are flown on the sky every hour (Federal Aviation Administration, 2008). Mathematically, this figure translates to 50,000 airplanes being flown on the sky on a daily basis. This implies that without proper control mechanism, there could be high chances of these airplanes colliding with each other. It is here that air traffic control system comes in to ensure safe operation of aircrafts. For instance, a visit at most of the airports in Canada and the US, one thing for sure that one will see is an air traffic controller. The duty of an air traffic controller basically is to regulate aircraft take-offs and landings as required (Nolan, 2010). This is arguably the earliest method which involves the controller standing at a strategic position with colored flags which he or she uses to communicate with the pilots. For example, raising a green flag means t hat the pilot is at liberty to proceed with their planned landing or takeoffs. On the other hand, waving of a red flag implies that the pilot should hold on until controllers are sure that the pilots are free to proceed, when the green flag is waved according to Gorton (1998). This has indeed help reduce instances of aircraft accidents and collisions during landing and takeoff thereby restoring traveler’s confidence on the safety of aircrafts. However, since the safety of the aircraft is still has to be maintained on the sky this lead to the

Tuesday, October 29, 2019

Research, identify and discuss the 4 basic functions of management Essay

Research, identify and discuss the 4 basic functions of management. .Week TWO - Essay Example Having done a SWOT analysis, it can then proceed to making a more detailed strategic plan. An example of the planning stage is when a marketing manager designs a marketing plan in launching a new product. Wijesinghe enumerates various positive characteristics of planning such as being â€Å"goal-oriented, primacy, pervasive, flexible, continuous, involves choice, futuristic and involves mental exercise† (Wijesinghe, 2010, par 5). The second function of management is organizing. Organizing involves gathering all the resources of the company including the physical, human and financial resources. The tasks or activities that are needed to be done should be classified and assigned to the particular departments and individuals. Responsibilities are created and authorities delegated (Norman, n.d.). The organizing function of management is important because it encourages specialization, describes the work that must be done and by whom and it categorizes authority and command (Wijesinghe, 2010). Leading is the third management function. Under this function, the manager motivates and positively influences the employees so that they will be able to perform their tasks well. Managers should learn to communicate effectively with the employees to ensure that the company’s goals are achieved. Providing for monetary as well as non-monetary incentives may be necessary to influence and motivate the employees. Managers must be able to teach and assist the employees especially when they are faced with difficulties in performing their duties. The last function of management is controlling. Controlling involves â€Å"measuring achievement against established objectives and goals† (Norman, n.d., par 5). If there is any deviation from the achievement of the goals, the manager must identify the reason for the deviation and think of a way to correct it (Norman, n.d.). Monitoring and evaluating employee performance is a part