D1555982
stringlengths 2
8
| https://answers.yahoo.com/question/index?qid=20071007114826AAwCFvR
stringlengths 14
573
| The hot glowing surfaces of stars emit energy in the form of electromagnetic radiation.?
stringlengths 1
39.2k
⌀ | Science & Mathematics Physics The hot glowing surfaces of stars emit energy in the form of electromagnetic radiation.? It is a good approximation to assume that the emissivity e is equal to 1 for these surfaces. Find the radius of the star Rigel, the bright blue star in the constellation Orion that radiates energy at a rate of 2.7 x 10^32 W and has a surface temperature of 11,000 K. Assume that the star is spherical. Use σ =... show more Follow 3 answers Answers Relevance Rating Newest Oldest Best Answer: Stefan-Boltzmann law states that the energy flux by radiation is proportional to the forth power of the temperature: q = ε · σ · T^4 The total energy flux at a spherical surface of Radius R is Q = q·π·R² = ε·σ·T^4·π·R² Hence the radius is R = √ ( Q / (ε·σ·T^4·π) ) = √ ( 2.7x10+32 W / (1 · 5.67x10-8W/m²K^4 · (1100K)^4 · π) ) = 3.22x10+13 m Source (s):http://en.wikipedia.org/wiki/Stefan_bolt...schmiso · 1 decade ago0 18 Comment Schmiso, you forgot a 4 in your answer. Your link even says it: L = 4pi (R^2)sigma (T^4). Using L, luminosity, as the energy in this problem, you can find the radius R by doing sqrt (L/ (4pisigma (T^4)). Hope this helps everyone. Caroline · 4 years ago4 1 Comment (Stefan-Boltzmann law) L = 4pi*R^2*sigma*T^4 Solving for R we get: => R = (1/ (2T^2)) * sqrt (L/ (pi*sigma)) Plugging in your values you should get: => R = (1/ (2 (11,000K)^2)) *sqrt ( (2.7*10^32W)/ (pi * (5.67*10^-8 W/m^2K^4))) R = 1.609 * 10^11 m? · 3 years ago0 1 Comment Maybe you would like to learn more about one of these? Want to build a free website? Interested in dating sites? Need a Home Security Safe? How to order contacts online?
stringlengths 2
1.32M
⌀ |
|---|---|---|---|
D1701258
|
http://www.livestrong.com/article/23079-benefits-rosehip-tea/
|
Benefits of Rosehip Tea
|
Benefits of Rosehip Teaby KAREN MCCARTHY Aug. 14, 2017Although today they're typically revered for their beauty and symbolism, roses were used for medicine in the past. Rose hips are edible and are sometimes used in jams, jellies and syrups for their sweet and tangy flavor. They can also be used to make herbal tea. Rosehip tea has many properties that can help protect you from disease. However, always consult with your doctor before drinking herbal tea if you're pregnant, breast-feeding or on medication. Video of the Day Error loading player: Flash plugin failed to load Antioxidants Rosehip tea is rich in vitamin C and flavonoids, which are responsible for its antioxidant effect. Antioxidants help prevent diseases related to oxidation, such as heart disease, arthritis and cancer. They also inhibit damage caused by free radicals, which play a role in premature aging. A study published in "Molecular Aspects of Medicine" in 2003 found that rosehip tea is a significant source of lycopene, an antioxidant also abundant in tomatoes. This antioxidant has been linked with reduced risk of heart disease and cancer. Cancer-Fighting Properties In a study published in the "Journal of the Science of Food and Agriculture" in 2012, scientists isolated different phytochemicals from rosehip tea and found that the polyphenols quercetin and ellagic acid inhibited the proliferation of tumor cells in test tubes. The lycopene found in rosehip tea at normal concentrations has been found to block the growth of human prostate cancer cells without damaging cells, according to "Experimental Biology and Medicine." Since studies haven't been done directly on cancer patients, the benefits of rosehip tea for preventing and treating cancer have not been confirmed. Immune-Boosting Activities According to the University of Maryland Medical Center, taking high amounts of vitamin C regularly may reduce the severity and frequency of colds. Since rosehip tea is a potent source of vitamin C, drinking it often may produce these effects. Rosehip tea is also a source of vitamin A, which is another immune system booster. Vitamin A helps protect you from getting bacterial and viral infections and helps fight off existing ones. Potentially Disease-Preventing Properties A study published in "Preventive Nutrition and Food Science" in 2013 found rosehip extract to reduce fat storage and the accumulation of fat in cells. Rosehip in the form of tea was not evaluated in this study. However, another study points to similar effects. In a study published in the "European Journal of Clinical Nutrition" in 2012, obese participants drank either a daily drink made from rosehip powder or a placebo for six weeks. Scientists measured their body weight, cholesterol levels, glucose tolerance and blood pressure at the beginning and end of the study. By the end of the study, scientists concluded the participants who had the rosehip drink had a lower risk of heart disease than the placebo group. Lose Weight. Feel Great!Change your life with My Plate by LIVE STRONG . COMGOALGENDER AGEWEIGHT HEIGHTGET MY CALORIE GOALYOU MIGHT ALSO LIKERose Hips Benefits Is Rosehip Herbal Tea Safe for Pregnancy? Rosehip and Hibiscus Tea Benefits Rose Tea Health Benefits What Are the Benefits of Green Tea With Rose? Allergy to Rose Hips The Benefits of Flaxseed Tea Which Teas Are Good for Digestion? How Long Does Herbal Tea Stay in Your System? Is It Safe for Infants to Drink Herbal Teas? The Effects of Rose Hips During Pregnancy What Are the Health Benefits of Gohyah Tea? Drinking Decaf Green Tea While Pregnant The Best Teas for Flu Can Herbal Tea Dehydrate You? What Are the Benefits of Rose Hips Oil? Tazo Passion Tea & Health Side Effects of Spearole Tea Sage Tea & Pregnancy Does Hot Tea Help Bloating and Gas After Meals?
|
D252122
|
http://www.answers.com/Q/What_animal_eats_a_mango
|
How do you eat a mango?
|
Maria Arevalo 16 Contributions How do you eat a mango?peel the mango (with a pear peeler) . then cut the mango length wise along the edge of the seed . rotate the mango 90 degrees and cut off any excess flesh. **eati …How do you eat mango? You ea it either with the peel and all or you can cut the right side and leftside and eat out the slices Kitti 26 3 Contributions How do you eat mangos? First of all......we should pick the mango that is more orange...secondly u cut it in medium pieces not very big and not very small.....thirdly u cut the cover like we cut an …What animals eat mangos? Humans, dogs, cats, pigs, goats, seals, whales, and dolphins. What do you eat mango with?you can eat mango with lemon,salt and tajin (a type of chili powder)Who eats a mango? Anyone who likes awesome-tasting fruit will eat a mango. What eats a mango?mostly people eat mangos Is a mango an animal? No. it's a fruit. How do you you eat a mango?you can cut it in half, and eat it with a spoon. How can you eat mango?peel the skin and eat it What animals eat mango? There are a variety of animals that eat the mango fruit. Some ofthese animals include squirrels, caterpillars and monkeys. How do your eat a mango?you shove it in ya mouth
|
D1904332
|
https://familydoctor.org/blood-test-lipid-panel/
|
Blood Test: Lipid Panel
|
Complete Blood Count (CBC) Rapid Strep Test Magnetic Resonance Imaging (MRI) Pelvic Ultrasound Abdominal Ultrasound CT Head Scan Electrocardiogram (EKG or ECG) Pap Smear (Pap Test)Home Tests and Procedures Blood Test: Lipid Panel Blood Test: Lipid Panel Share Print Advertisement A lipid panel is a simple blood test to check your cholesterol levels. Cholesterol is a soft, sticky substance found inside your body. Total cholesterol is made up of three parts: good (HDL) and bad (LDL) cholesterol, as well as triglycerides (a certain type of fat). A lipid panel is an important test because cholesterol can clog your arteries. This can lead to heart disease and stroke. The blood test can be done in a doctor’s office, laboratory, or hospital. A nurse or lab technician inserts a needle into a vein in your arm to collect a small sample of blood. Sometimes the blood can be collected through a prick to your finger. Your blood will be collected into a tube and sent to a lab for testing. The results will be sent to your doctor and your doctor’s office will notify you of the results. The test can be done at any time of the day. However, it’s recommended that you fast (have no food or liquid to drink, except water) for 8 to 12 hours before the test. So it’s best to schedule the test for the morning. Path to improved well being Normal lipid panel total cholesterol is 180 to 200 milligrams per deciliter (mg/d L) or less. Between 201 and 240 mg/d L is considered borderline. This means your doctor may test you more often and suggest diet and lifestyle changes. A high reading (unhealthy) is greater than 240 mg/d L. At this level, your doctor will recommend diet and lifestyles changes and may prescribe medicine to lower your cholesterol. Statins are a class of medicine most often prescribed to lower cholesterol. The American Academy of Family Physicians (AAFP) recommends that healthy adult men have their first lipid panel test by age 35. Healthy adult women should have their first test at age 45 if they are at risk for coronary heart disease. All adults should be tested earlier if they have certain diseases (diabetes, heart disease, stroke, high blood pressure) or a family history of heart disease. The AAFP has concluded there is not enough evidence of the benefits of lipid panel testing in children and adolescents 20 years or younger. If your results were normal, you should have your cholesterol checked again in five years. If you are taking cholesterol medicine and have any of the diseases mentioned above, you might be required to have your cholesterol tested once a year. Your lipid panel test also will provide individual results for your good and bad cholesterol and triglycerides. Good (HDL) cholesterol: Your body needs good cholesterol to lower your risk of heart disease. This is one test where you want high numbers. Aim for a good cholesterol of 40 to 60 mg/d L. You can increase your good cholesterol through a healthy diet and exercise. Bad (LDL) cholesterol: Your goal is to lower your number for your bad cholesterol. A reading of 100 mg/d L or less is considered normal. Between 100 and 129 mg/d L is near normal, 130 to 159 mg/d L is borderline high, and above 190 mg/d L is considered high. Results between 70 and 189 mg/d L are considered too high if you are between the ages of 40 and 75 and have diabetes, if you have diabetes and a high risk of heart disease, or if you have a medium to high risk of heart disease. Your doctor will prescribe a cholesterol medicine based on your results and health history. Triglycerides: 150 md/d L or less is considered normal, between 150 and 199 mg/d L is considered borderline high, between 200 and 499 mg/d L is considered high, and anything higher than 500 mg/d L is considered very high. Things that affect your triglycerides include liver damage, a high carbohydrate/low protein diet, underactive thyroid, a kidney disorder called Nephrotic syndrome, some medicines (hormone replacement medicines), uncontrolled diabetes, and genetics. Treatment includes a combination of prescription medicine, a healthy diet and exercise. If your results are higher than 500 mg/d L, you may have an increased risk of pancreatitis. This is a chronic, acute disease of your pancreas. Things to consider You may have brief pain during the blood test as the needle is inserted. You may have a bruise at the site a day or two after the test. If you are dehydrated (your body doesn’t’ have enough fluids), it may be difficult to find a good vein for the test. Drink plenty of water one to two days before the test. People who have suffered a recent heart attack, surgery, infection, injury, or pregnancy should wait two months before having their cholesterol checked. Questions to ask your doctor Are there any risks to having a lipid panel blood test? Can lipid panel results be affected by a cold or the flu? Should I take my prescription pills before having the test? How soon will I find out my results? How do I prepare for the test if I have a latex allergy? What if I mistakenly eat something within the 8 to 12 hours before I take the test? Resources Medline Plus Cholesterol Testing and Results National Heart, Lung, and Blood Institute, How is High Blood Cholesterol Diagnosed? Last Updated: January 10, 2017This article was contributed by: familydoctor.org editorial staff Categories: Tests and Procedures Tags: blood tests, screening and diagnosis Copyright © American Academy of Family Physicians This information provides a general overview and may not apply to everyone. Talk to your family doctor to find out if this information applies to you and to get more information on this subject. Advertisement Featured Content Read Article >>Imaging and Medical Radiation Safety Read Article >>Pap Smear (Pap Test)Read Article >>Preconception Carrier Screenings Visit our interactive symptom checker Get Started Advertisement Related Articles Read Article >>Tests and Procedures Imaging and Medical Radiation Safety Learn more about imaging and medical radiation, including safety precautions and things to consider. Read Article >>Tests and Procedures Pap Smear (Pap Test)A Pap smear (Pap test) is a medical exam used to determine if a woman has cervical cancer. Read Article >>Tests and Procedures Preconception Carrier Screenings Preconception carrier screening is a genetic test done before pregnancy to see if you could pass on a genetic…
|
D355738
|
http://www.healthline.com/health/ringworm
|
Ringworm
|
Ringworm Pictures Symptoms Types Causes Risk factors Diagnosis Treatment Outlook Prevention What is ringworm? Ringworm, also known as dermatophytosis or tinea, is a fungal infection of the skin. The name “ringworm” is a misnomer, since the infection is caused by a fungus, not a worm. Ringworm infection can affect both humans and animals. The infection initially presents with red patches on affected areas of the skin and later spreads to other parts of the body. The infection may affect the skin of the scalp, feet, groin, beard, or other areas. Pictures Pictures of ringworm Symptoms Recognizing ringworm Symptoms vary depending on where you’re infected. With a skin infection, you may experience the following:red, itchy, scaly, or raised patchespatches that develop blisters or begin to oozepatches that may be redder on the outside edges or resemble a ringpatches with edges that are defined and raised If you’re experiencing dermatophytosis in your nails, they may become thicker or discolored, or they may begin to crack. If the scalp is affected, the hair around it may break or fall off, and bald patches may develop. Types Types of ringworm Ringworm can go by different names depending on the part of the body affected. Ringworm of the scalp (tinea capitis) often starts as small sores that develop into itchy, scaly bald patches. It is most common among children. Ringworm of the body (tinea corporis) often appears as patches with the characteristic round “ring” shape. Jock itch (tinea cruris) refers to ringworm infection of the skin around the groin, inner thighs, and buttocks. It is most common in men and adolescent boys. Athlete’s foot (tinea pedis) is the common name for ringworm infection of the foot. It is frequently seen in people who go barefoot in public places where the infection can spread, such as locker rooms, showers, and swimming pools. Causes What causes ringworm? Three different types of fungi can cause this infection. They are called trichophyton, microsporum, and epidermophyton. It’s possible that these fungi may live for an extended period as spores in soil. Humans and animals can contract ringworm after direct contact with this soil. The infection can also spread through contact with infected animals or humans. The infection is commonly spread among children and by sharing items that may not be clean. Risk factors Who is at risk for ringworm? Anyone can develop ringworm. However, the infection is very common among children and people who own pet cats. Both cats and dogs can catch ringworm and then pass it on to humans who touch them. Signs to be aware of in pets include:hairless patches of skin that appear circularcrusty or scaly patchespatches that may not be completely hairless but have brittle or broken hairsopaque or whitish areas around the claws You may be more likely to develop dermatophytosis if you come into contact with the fungi while you’re wet or if you have minor skin injuries or abrasions. Using a public shower or public pool areas may also expose you to the infective fungi. If you’re often barefoot, you may develop ringworm of the feet (athlete’s foot). Those who often share items such as hairbrushes or unwashed clothing also have an increased risk of developing the infection. Diagnosis Diagnosing ringworm Your doctor will diagnose ringworm by examining your skin and possibly using a black light to view your skin in the affected area. The fungus will fluoresce (glow) under black light. If you’re infected, the areas of the skin where fungus is located will glow. Your doctor may confirm a suspected diagnosis of ringworm by requesting certain tests: If you’re getting either a skin biopsy or fungal culture, your doctor will take a sample of your skin or discharge from a blister and send it to a lab to test it for the presence of fungus. If you’re getting a KOH exam, your doctor will scrape off a small area of infected skin and place it in potassium hydroxide (KOH). The KOH destroys normal cells and leaves the fungal cells untouched, so they’re easy to see under a microscope. Treatment Treating ringworm Your doctor may recommend both medications and lifestyle adjustments to treat ringworm. Medication Your doctor may prescribe various medications depending on the severity of your ringworm infection. Jock itch, athlete’s foot, and ringworm of the body can all be treated with topical medications, such as antifungal creams, ointments, gels, or sprays. Ringworm of the scalp or nails may require prescription-strength oral medications such as ketoconazole, griseofulvin, or terbinafine. Over-the-counter medications and antifungal skin creams may be recommended for use as well. Over-the-counter products may contain clotrimazole, miconazole, terbinafine, or other related ingredients. Find antifungal treatments on Amazon. Home care In addition to prescription and over-the-counter medication, your doctor may recommend that you care for your infection at home by practicing some of the following behaviors:avoid clothing that irritates the infected areacover it with a bandage if you’re unable to avoid clothing that irritates the areawash bedding and clothes daily during an infection to help disinfect your surroundingsclean and dry your skin regularly If you’ve been scratching your skin frequently due to the infection, you may also develop a staph or strep infection of the skin. Your doctor may prescribe antibiotics to treat this bacterial infection as you continue your treatment for the ringworm. Outlook How long does ringworm last? Skin medications may clear ringworm in two to four weeks. If you’re experiencing severe dermatophytosis that isn’t responding to over-the-counter treatments or treatment at home, your doctor may prescribe antifungal pills to clear up the infection. Most people respond positively to treatment. Prevention Preventing ringworm You can prevent ringworm by practicing healthy and hygienic behaviors. Many infections come from contact with animals and lack of proper hygiene. Tips to avoid ringworm include:wash your hands after interacting with an animaldisinfect and clean pet living areasavoid people or animals with ringworm if you have a weakened immune systemshower and shampoo your hair regularlywear shoes if showering in community areasavoid sharing personal items like clothing or hairbrushes with people who might have ringwormkeep your feet clean and dry Healthline and our partners may receive a portion of revenues if you make a purchase using a link above.
|
D3512971
|
https://www.youtube.com/watch?v=3hxQPfAVPPY
|
YouTube TV first look
|
You Tube TV first look The Verge Subscribe 1.8MAdd to Share More362,234 views4,932357Published on Apr 5, 2017You Tube TV is a streaming service that combines web video with traditional television. For $35 a month, customes get access to all four major broadcast networks, over forty cable channels, and a DVR with unlimited storage. Subscribe: https://goo.gl/G5RXGs Check out our full video catalog: https://goo.gl/lfc Gfq Visit our playlists: https://goo.gl/94Xb Kx Like The Verge on Facebook: https://goo.gl/2P1a Gc Follow on Twitter: https://goo.gl/XTWX61 Follow on Instagram: https://goo.gl/7Ze Lv X Read More: http://www.theverge.com Show more Loading...
|
D1614122
|
http://www.altools.com/ALTOOLS/ALZIP.aspx
|
ALZipUnzip All Zip
|
ALZip Unzip All Zip ALZip is a file compression program that can unzip 40 different zip file archives. ALZip can zip files into 8 different archives such as ZIP, EGG, TAR and others. In ALZip version 8, ALZip’s own EGG format, that Unicode and other powerful function supported, can be used. System Requirement OS | Windows 2000, XP, Vista (32/64bit), 7 (32/64bit)ALZip’s own EGG file ALZip represents it’s own made EGG file which has the abilities to:1. Support Unicode2. Compress large-capacity files3. Support powerful compressing methods4. Compatibility in different platforms See more about EGG file... Features Archive Compatibility1. Unzip 40 different formats ZIP, 7Z, RAR, EGG, TAR, TBZ, LZH, Z, JAR, ALZ, ACE, ARC, ARJ, B64, BH, BHX, BIN, BZ, BZ2, CAB, EAR, ENC, GZ, HA, HQX, ICE, IMG, LHA, MIM, NRG, PAK, TBZ2, TGZ, UUE, UU, WAR, XXE, ISO, LCD, ZOO2. Zip files into 8 different formats ZIP, EGG, ALZ, TAR, TBZ, TGZ, LZH, JARLanguage Compatibility1. Unicode support for EGG file 2. Language Encoding function to view different characters around the world Advanced Options1. Restore corrupted files 2. Span a zip file into zip files 3. Merge spanned files into one 4. Set password using AES-128bit / AES-256bit encryption 5. Check for virus using your anti-virus software 6. Create Self-extracting archive (EXE) to let people open your archive with no file compression program installed 7. Check for errors in zip files 8. Command line functions for expert users User-Friendly Options1. Functional in context menu to zip files or unzip in 3 mouse clicks 2. Peek (Preview) files in archive 3. Attach archive to email after compressing 3. Search tools to find specific files
|
D2179684
|
http://rationalwiki.org/wiki/Campaign_for_Nuclear_Disarmament
|
Campaign for Nuclear Disarmament
|
Splitting more than hairs Nuclear energy Ionizing pages Arnold Gundersen Benjamin K. Sovacool Chernobyl Christopher Busby Fukushima IHans Blix Iodine tablets Nuclear energy Nuclear fusion Radiophobia Tooth Fairy Project Yellowcakev - t - e The Campaign for Nuclear Disarmament (CND) is an organisation founded in 1958, founded as a campaign for unilateral nuclear disarmament by the United Kingdom. Its mandate has grown over the years to cover chemical, biological and nuclear weapons as well as opposing the construction of nuclear power stations. Its symbol has become an international symbol for peace. Contents [ hide ]1 History2 State surveillance3 Current day4 Symbol5 External links6 References History [ edit]The Campaign for Nuclear Disarmament was formed in late 1957 and launched in 1958. After Aneurin Bevan's support for maintaining the United Kingdom's nuclear deterrent, the CND was formed by the editor of the New Statesman, Bertrand Russell, Michael Foot and many others (including journalists, left-wing politicians and clergymen). Five thousand people attended the first public meeting in February '58 and the CND became the biggest peace and anti-nuclear movement in the United Kingdom. Nuclear issues took second position as the peace movement began massive popular protests against the United States 's part in the Vietnam War. CND survived but as a much smaller movement. Some protests continued, particularly in Scotland where both British and US nuclear missile submarines were now based. In 1979 the decision was made to deploy American Cruise and Pershing missiles in Britain and several other Western European countries. This resulted in such famous actions as the Greenham Common womens' protest. State surveillance [ edit]Britain's internal security services, MI5, closely monitored the CND and considered it a subversive group with communist links. [1] In 1985, an MI5 officer involved in the monitoring of the CND resigned and released information to Channel 4 about her investigations. She alleged that the investigation was more politically-motivated than related to any actual subversive threat. [2] The CND treasurer was believed by MI5 to be a 'communist sympathiser'. Opponents of the CND have often raised the specter of it being a communist-funded organisation. Certainly, communists have played an active role in the organisation, and John Cox, its chairman from 1971 to 1977, was a member of the Communist Party of Great Britain. [3]In the spring of 1959, as interest in, and membership of, the CND was growing, they were approached by the communist-led British Peace Committee, with the aim of joining forces and supporting each others' initiatives. CND, however, rejected thee overtures. [4]Similarly, stories were frequently circulated, by the Conservative Party and mass-media, that the CND was funded by the Kremlin. Once again, these allegations were untrue. Funds were raised via donations by members, as well as the sale of literature. In an attempt to squash these allegations, Bruce Kent, the then-general secretary of CND and a Roman Catholic priest, offered a £100 award to anyone who prove a link between the CND and Moscow existed. The award was never claimed. [5]Current day [ edit]Support for the CND fell after the end of the Cold War, but popular support and membership increased dramatically after Tony Blair stated his commitment to nuclear power. [6] Though quieter and smaller, the organisation continues to exist and to campaign against nuclear weapons and power. The organisation has campaigned against British involvement in the Middle East and has co-organised anti-war rallies with the Stop the War Coalition and the Muslim Association of Britain. In March 2007, the CND began one of its biggest campaigns of recent years - rallying in Parliament Square as parliament voted on renewal of the Trident Missile Programme. The government's own party (at the time, Labour) had enough rebels that votes from the opposition were required for the motion to pass - as had previously been the case with Britain's participation in the Iraq War . Symbol [ edit]The CND symbol, a combination of the semaphore symbols for N and D has become an international 'peace sign' which is well recognised. It was picked up by American pacifists during the Cold War. The original drawing of this symbol is housed in the Peace Museum in Bradford, West Yorkshire. If you happen to be an insane Christian fundamentalist it is instead clearly a satanic symbol showing an inverted cross with the arms broken or an upside-down pitchfork, with the circle probably representing some pagan thing or other. External links [ edit]CND's Homepage The Christian CNDSee the Wikipedia article on Campaign for Nuclear Disarmament. References [ edit]↑ https://www.mi5.gov.uk/output/myths-and-misunderstandings.html#8↑ http://news.bbc.co.uk/1/hi/programmes/true_spies/2336987.stm↑ Daily Mail - Cathy Ashton EUs new Foreign Minister↑ Resisting the bomb: a history of the world nuclear disarmament movement; Lawrence S. Wittner; pg 331; Stanford University Press; 1997↑ Toward Nuclear Abolition: A History of the World Nuclear Disarmament; Lawrence S. Wittner; Stanford University Press; 2003↑ http://www.independent.co.uk/news/uk/politics/cnd-membership-booms-after-nuclear-uturn-408265.html
|
D2271612
|
http://www.academia.edu/1259466/Disrespect_Towards_the_Dead_Frameworks_for_Remembrance_and_Rectification
|
Disrespect Towards the Dead: Frameworks for Remembrance and Rectification
|
pdf Disrespect Towards the Dead: Frameworks for Remembrance and Rectification38 Pages Disrespect Towards the Dead: Frameworks for Remembrance and Rectification Uploaded by Timothy Waligoreconnect to download Get pdf Disrespect Towards the Dead: Frameworks for Remembrance and Rectification Download Timothy Waligore Mc Gill University Article under review Disrespect Towards the Dead: Constraints on Acceptable Frameworks of Justice Abstract: A publicly adopted theory of justice should avoid displaying disrespect towards the dead. Acceptable theories of justices provide a framework which (1) is able to count the wrongs done to dead victims as wrongs, and (2) would not encourage the dead perpetrators to act unjustly, had the framework been publicly known to the dead. A theory of justice should be judged by its publicity effects, but publicity effects should not be confined to the living. My approach generates reasons to think in some ways rather than others about wrongs that were committed in the past, and about their enduring consequences. 1 Disrespect Towards the Dead: Constraints on Acceptable Frameworks of Justice Liberal theories of justice are generally forward-looking, concerned with the claims, interests, well-being, or rights of living and future individuals.1 In this article I argue that this is not completely sufficient, that we have sound reason to avoid various forms of disrespect towards the dead. I first examine the accounts of two historical figures, Immanuel Kant and his contemporary Johann Fichte, taking them as models of thinking about justice and the dead. Understanding the form of each of their arguments makes clear the form of my argument, which holds that acceptable theories of justice have certain structural constraints. We should consider how our theory of justice, if it had held in a past context, would have treated then-living and then-future individuals. Would it have counted as wrong the wrongs suffered by the then-living? Would it have adequately discouraged injustice to the then-living by having sufficient duties of reparation following the wrong? If not, we can display disrespect toward the dead now. My approach generates reasons for us to think in some ways rather than others about wrongs that were committed in the past, and about their enduring consequences. Fichte and the Social Contract Approach Fichte holds that the dead lack a basic moral status which would ground claims of justice. The living, however, can optionally protect their own interests, if they enact a law with universal application, thereby treating the dead with respect. Fichte’s account 1 A weaker version has living and future individuals as the primary focus, leaving open the possibility of counting recently dead individuals. See Thomas Pogge, World Poverty and Human Rights (Malden, MA: Blackwell Publishers, 2002), 248 n68. 2 importantly relies on the existence of a concrete social morality in the world. I do not adopt the specifics of Fichte’s account, but I will often refer back to its structure in the course of this paper. Fichte asks why the living should honor the will of the deceased in cases of testaments. Fichte suggests it may be to the advantage of living persons that there be a belief that testaments are valid. They might, for example, receive better care and devotion from relatives: “In short, this belief in the validity of testaments is a benefit to the living, who may very well have a right to this benefit… The issue here has nothing to do with the rights of the deceased (they have no rights), but only the rights of the living.”2 Without considering the rights of the living, Fichte does think we have any basis for saying the dead have rights. For Fichte, the concept of justice or Right [Recht]3 applies only if two parties are in reciprocal interaction with one another in the physical 2 Johann Fichte, Foundations of Natural Right, trans. Michael Baur (Cambridge: Cambridge University Press, 2000), 224. Fichte emphasizes improving the treatment of the living while they live. An alternative social contract account suggests that persons, while alive, have an interest in what happens after their deaths. See Ernest Partridge, "Posthumous Interests and Posthumous Respect," Ethics, 91 (1981), 243-64. 3 Recht is a German word without an exact English translation. It is a mixture of “Right,” “justice,” and “law.” It is equivilent to the Latin Ius. Recht or “Right” is not the same as the plural rights. The two are, however, related. See the editorial introduction to Fichte, Foundations. 3 world.4 The dead are not in such a relationship with the living. The living may have duties of conscience towards the dead, but these are not duties of justice. Fichte says that when human beings “have a need to believe in the validity of testaments” they will make provision for it in the social contract.5 Relations of justice or Right [Recht] can exist without such provision, so it is an optional, not a necessary, part of the social contract. 6 So if members want to receive the benefits of belief in testamentary rights, they must legislate its validity. “But any such belief concerning the validity of testaments can arise only if testaments are valid according to a law, i.e. valid without exception… And so, for their own sake, all guarantee the validity of the decedent's last will. By guaranteeing this, they also guarantee the validity of their own last will; the decedent's rights are bound to the rights of the citizens who survive him.”7 Fichte says that it is the universal will that binds, rather than the will of the deceased. This universal will binds living persons, subjecting them to duties, and also binds the state, which would otherwise inherit the property.8 This legislating universal will is the will of the living and concerns the shared interest they have in there being a shared public belief in the validity of testaments. 4 Ibid., 224. 5 Fichte refers specifically to the “property contract,” since there are a series of contracts in his social contract theory. I ignore that complication here. 6 Fichte, Foundations, 224. 7 Ibid., 225. 8 Ibid. 4 If the now-living have an interest in the validity of testaments, then they have an interest in there being a concrete social morality declaring the validity of testaments after their death, which in turn requires that the interests of the dead are to be treated with respect now. Further, a state that decrees that a belief in testaments is valid must also declare the extent to which they are valid – it must enact specific legislation. This results in a concrete system of rights and duties. Moral philosophers might talk about morality in a transcendental sense, as if it consists in abstract standards. Here, in contrast, we are talking about a system of justice publicly adopted as the official one by a society. With the social contract approach, respect for the dead (or its equivalent) must be a specific practice in the world with wide validity and consistent application if this practice is to exist. Kant and the Moral Status of the Dead Unlike Fichte, Kant suggests that the living can directly injure the dead, as the dead have a moral status that should be respected. The same features that ground the moral status of the living also ground the moral status of the dead. In Kant’s framework, respecting the living presupposes respecting the dead. The form of Kant’s argument suggests a lesson I will use in my own account. Kant says that a dead person can be robbed of his honor by a slanderer, by being deprived of his good name, by a malicious (and false) rumor.9 Every person is born with 9 Immanuel Kant, Practical Philosophy, trans. Mary Gregor (Cambridge: Cambridge University Press, 1996), 442n, 6:296 MM §35. Citations to The Metaphysics of Morals 5 an entitlement to a good reputation.10 A human being is originally “beyond reproach” in that he has not done wrong to anyone before he does any juridical acts.11 To be beyond reproach is part of the innate right of freedom, which belongs to “every man by virtue of his humanity.”12 As I discuss below, someone’s humanity refers in this context to his personality.13 Kant says: “A person is a subject whose actions can be imputed to him.”14 A free being is the author of his actions and only his actions. Even after his death, a dead person still can be thought of as having done right or wrong actions. Assuming a person does no wrong in his life, his good reputation continues to be attached to his “person” after he physically ceases to exist. Kant claims that if someone slanders me after my death, he still wrongs me. Kant writes: “in a relation purely of rights, which is entirely intellectual, abstraction is made will first list the page number of the Cambridge edition, then the Academy edition number, the abbreviation “MM”, and (where appropriate) the section number. 10 Kant says that “a good reputation is an innate external belonging, though an ideal one only, which clings to the subject as a person, a being of such a nature that I can and must abstract from whether he ceases to be entirely at his death or whether he survives as a person; for in the context of his rights in relations to others, I actually regard every person simply in terms of his humanity, hence as homo noumenon.” See ibid., 441-42, 6:295 MM §35. 11 Ibid., 394, 6:238 MM. 12 Ibid., 393, 6:237 MM. 13 Ibid., 395, 6:239 MM. 14 Ibid., 378, 6:224 MM. 6 from any physical conditions (of time), and whoever robs me of my honor (a slanderer) is just as punishable as if he had done it during my lifetime…”15 In the realm of Right [Recht] or justice, we abstract from time and space to consider whether a wrong is done.16 Kant uses this general procedure when discussing property rights and contract rights among the living. Someone wrongs me when he trespasses on my land, even when I am not physically connected to it.17 Such abstraction is crucial to the concept of Right. To be sure, the types of wrongs that can be done to a person diminish vastly after his death. For Kant, property rights to physical things cannot exist after death.18 However, a defense of my name, even after my death, brings me satisfaction through righting a wrong. Anyone, not just relatives, is authorized to play the role of apologist for the dead. Note that publicly calling someone a liar for falsely speaking ill of the dead takes away the liar’s honor. An apologist for the dead could do this, and thereby punish the liar, if she “could rightly assume that the dead man [was] wronged by” the lie, owing not to a duty of virtue but to “the right of humanity as such.”19 15 Ibid., 442, 6:296 MM §35. 16 On translating Recht, see the note in the section on Fichte above. 17 Kant, Practical Philosophy, 401, 6:245 MM §1. 18 It might be objected that the goods in a deceased person’s estate still belong to him before they are distributed to his heirs. But this is not Kant’s view. At the moment of death, the heir acquires the exclusive right to accept the goods. The state stops others from acquiring the goods in the meantime. Ibid., 440-41, 6:294 MM §34. 19 Ibid., 442, 6:296 MM §35. 7 Kant says that there are two ways of seeing a human being. A homo noumenon is a human being seen in terms of “his humanity, his personality independent of physical attributes…” This is to be “distinguished from the same subject represented as affected by physical attributes, a human being (homo phaenomenon).”20 A person can be seen in terms of his humanity, even after his death, since his humanity is personality independent of physical attributes. I am not arguing for adopting Kant’s specific account. Rather, I want to use his account to suggest a form of an argument. We need not say the dead are harmed or wronged simply because we, the living, deny that they hold a moral status that makes them worthy of respect. Instead, we can hold that the dead being accorded a certain status is (or is bound up with) a presupposition of our consistently using a certain framework. The right of humanity is a linchpin of Kant’s concept of Right or justice. 21 Kant specifically mentions how all human beings have an innate right of freedom, which belongs to them by virtue of their “humanity.”22 On Kant’s account, it is not so much that we have an interest in practices that recognize the dead as having humanity (though we do have that). Rather, the status that accords rights refers to humanity, and this refers specifically to persons, be they alive or dead. On this logic, we cannot consistently deny the humanity of a dead human being and restrict respect to the living, because his 20 Ibid., 395, 6:239 MM. 21 Rosen’s account of duties to the dead also relies on Kant and the respect owed to humanity. He does not focus on the concept of Right, my concern here. Michael Rosen, Dignity (Cambridge, Mass. : Harvard University Press, 2012). 22 Kant, Practical Philosophy, 393, 6:237 MM. 8 humanity is independent of his physical attributes, including whether a person is physically alive. The concept of Right or justice involves abstracting from space and time in examining whether wrong was done. The point is not whether Kant has the correct framework. Kant’s moral concept of Right may be optional in the sense that there are other candidate frameworks for theorizing about justice. In this paper, I do not even assume Kant has the correct type of framework for thinking about justice and rights. For example, Rawls’ method of reflective equilibrium, discussed later, may be superior.23 The point is the form of the argument: given the reasons for according the living status within a given framework, consistency within that framework presupposes according status to the dead. Unlike Kant, the type of framework with which I will be concerned about undermining is not that of the mere concept of justice or Right. Unlike Fichte, I will not be concerned simply with a concrete legislated system of rights and duties towards the dead. I will discuss “frameworks of justice,” which are midway between that of Kant and Fichte. A “framework of justice,” as I use the term, is a particular conception of justice that is publicly adopted for a society, social context, or set of social contexts.24 John Rawls’ domestic theory of justice is an example of such a framework.25 A framework of justice has two parts: First, it is a way of thinking about justice, with some basic 23 John Rawls, A Theory of Justice (Cambridge, Mass. : Harvard University Press, 1971). 24 On a “framework of justice,” see Thomas Pogge, "Making War on Terrorists," Journal of Political Philosophy, 16 (2008), 1-25. 25 Rawls, Theory. 9 commitments or guiding lights that animate it. It provides the public criterion for regulating and evaluating social practices and institutional schemes.26 Second, when these general principles are articulated and made concrete, the framework also provides (principles for) a specific system of rights and duties, which can be evaluated for its concrete effects in the real world.27 Fichte discussed how a society could legislate a belief in the validity of respecting the interests of those now dead. I will discuss how a society could commit itself to (or “legislate”) the validity of a belief regarding respecting the moral status of those now dead. A society can do so through upholding a certain framework of justice. I combine a Kantian idea (that using a certain framework presupposes the dead having a moral status) with a Fichtean idea (that the validity of a belief regarding respecting the dead is not something given, but is officially adopted or legislated by a society).28 I will not offer a specific framework of justice. But I will suggest constraints for acceptable frameworks of justice. I will argue that when a society adopts a certain framework of justice, it can adopt an unjustified partiality towards the living. How a framework of justice thinks about justice, and how it is articulated into a concrete system of justice, should avoid disrespect towards the dead. The living are accountable for the framework of justice they commit to upholding. 26 Pogge, World Poverty and Human Rights, Ch. 3. 27 Ibid. 28 This contrast may be overdrawn, as Kant also talks about self-legislation. 10 Disrespect Towards the Dead Within a Framework of Justice In evaluating a framework of justice, we need to consider how it would have treated the dead, had it been the framework under which the dead operated. (It might be maintained that a theory of justice has a limited scope, and the framework of justice does not apply to the context in which the dead lived; I discuss such cases nearer to the end of the paper.) Even if justice should indeed be focused on the treatment of living and future individuals, we should consider how our framework of justice, if embedded in a past context, would have treated then-living and then-future individuals. This has two aspects. One concerns the ability to sincerely count as wrong the wrongs suffered by dead victims. The second concerns avoiding perverse incentives for the dead. First, the framework of justice that a political society adopts for itself today has implications for the types of past events the society can sincerely remember as having been unjust. The framework makes claims about what past wrongs can be counted as wrongs. If our framework of justice does not allow us to remember a past atrocity as unjust, then those whom we want to count as victims of past injustice cannot be seen as such under our theory of justice. Suppose that a framework of justice would not condemn a past event that intuitively seems to be a great atrocity. In some sense, the framework of justice displays disrespect towards the dead, since it cannot count them as victims of (significant) wrongs. This can be compared to a teacher who sends a message to his class that bullying certain students is not wrong or is not that big a deal. A framework of justice should provide principles that enable us to condemn odious acts that we ought to judge as unjust. It should also not treat lightly the occurrence of such events, but also (as appropriate) condemn them not merely as wrong, but as seriously wrong. 11 For example: some global egalitarian theories of distributive justice might judge that indigenous peoples once had a share of resources that was larger than the amount to which they were entitled.29 A theory of equality of resources may count unused resources (including large tracts of sacred land) as part of the wealth of indigenous peoples, wealth to which other people in the world could be entitled.30 To the extent that views of justice can legitimate coercion to realize justice, this could in turn imply that force might be justified to rectify such an unjust distribution.31 If so, the state or theorist using that theory of justice could not adequately encapsulate the complete injustice of colonialism. At most, they could say the force used by colonists might have been "excessive," but allow that fundamentally the indigenous peoples were also unjust in not sharing their resources. Second, even if an event can be condemned as wrong, we can imagine what the framework of justice would have encouraged or not adequately discouraged, had the dead 29 See Will Kymlicka, Politics in the Vernacular (Oxford: Oxford University Press, 2001); G. Peter Penz, "Development Refugees and Distributive Justice," Public Affairs Quarterly, 6 (1992), 105-31. Similarly, a left-libertarian theory might have such a strong proviso that indigenous peoples are not allowed to have a (greatly) disproportionate share of resources. I worry these may be the implications of Otsuka's egalitarian proviso. See Michael Otsuka, Libertarianism without Inequality (Oxford: Clarendon, 2003). 30 Kymlicka says that there should “probably” be a "resource tax” that would be in effect even on unused resources. Kymlicka, Vernacular, 150. 31 My point is what a bad theory would look like, not to say Kymlicka and Otsuka are examples of it. 12 known what duties of repair would or would not be demanded were an injustice to have occurred. The framework may make it too easy to gain from that wrong, and may create an incentive to do wrong.32 A framework might officially condemn an atrocity as an injustice, but might not demand correction after its occurrence. A teacher might say that the bully does not have to give back any of the money he took because he does not have the money any more—even if he clearly has the candy he bought with it. Given the publicly expressed (if perhaps only implicit) principle that the bully need not restore what he no longer has, the bully has a perverse incentive in the future to continue snatching lunch money and quickly spending it (or at least, he is not adequately discouraged from doing so). A just system would have reason to allow the victimized child to have a claim to restitution or compensation of some kind. A system that publicly announces otherwise in some sense disrespects the victim. This is true even if it were the last day of class and the victim and bully would never meet again. Now, suppose that a new teacher teaches the class the following year. The teacher’s system of discipline would have encouraged the bullying that took place in the previous year, had it been in place then. If the new teacher upholds this disciplinary system in his new class in a way that suggests it would be appropriate for the old classes, he could be said to continue to display a certain sort of disrespect to students victimized 32 Thomas Pogge, "The Effects of Prevalent Moral Conceptions," Social Research, 57 (1990), 649-63; Pogge, World Poverty and Human Rights, Ch. 3; Lea Ypi, Robert E. Goodin, and Christian Barry, "Associative Duties, Global Justice, and the Colonies," Philosophy and Public Affairs, 37 (2009), 103-35. 13 in the past.33 Of course, in one sense, there cannot literally be “incentives to act in the past,” since past people will not act differently.34 Nonetheless, the teacher can signal what he would have encouraged or not adequately discouraged in the past. A more specific instance of “incentives to act in the past” is “incentives for the dead.” Four Grounds for Counting the Dead The above mentioned two aspects, ability to count as wrong the wrongs done to the dead victims and avoiding perverse incentives for dead perpetrators, explain two core parts of what I mean here by disrespect to the dead.35 But why should we care if the dead are disrespected in a framework of justice? I explore four possible grounds. The first possible reason does not assume duties are owed directly to the dead. Rather, the duties presently living people have with regard to the dead are duties owed to other presently living people, especially members of historically victimized groups. If past discrimination is not repudiated, the members of a historically victimized group may feel insecure, and may worry about future targeting. Forms of remembrance and even reparations may be a way to assure members of historically victimized groups that the 33 Perhaps no such endorsement follows, as the context in which he teaches is fundamentally different than the past context. Teaching in a foreign study program may require a different system. I discuss context shifts below. 34 Mulgan argues “the dead are still with us.” However, even such dead cannot change their past actions. Tim Mulgan, "The Place of the Dead in Liberal Political Philosophy," Journal of Political Philosophy, 7 (1999), 52-70. 35 I do not claim these are the only, or even the most important, forms of disrespect. 14 state today will now treat them fairly. (Further, it may be important to their identity and self-respect that a past event be remembered as unjust.36) Later in the paper, I discuss how incorporating the status of the dead into a framework of justice can help provide this assurance. This account is structurally similar to Fichte’s view that the needs of the living generate an obligation to respect the dead. However, this cannot capture situations in which all the members of the victimized group have died. If colonists kill all native members of an island, is there any duty to remember this action as wrong? If genocide is thoroughly successful, there are no members of the group left who might suffer harms. Indeed, upholding this as the only ground of the duty to display respect toward the dead may actually create an incentive for perpetrators to eliminate all members of a group. The second possible reason assumes that the dead can be harmed or benefitted, even apart from whether any particular living person is benefitted or is wrong or harmed.37 On a popular account of what it means to harm or benefit the dead, living 36 Jeremy Waldron, "Superseding Historic Injustice," Ethics, 103 (1992), 4-28. 37 For an overview, see Lukas H. Meyer, "Intergenerational Justice," in Stanford Encyclopedia of Philosophy (2008), §5. For an argument that the dead can be both wronged and harmed, see George Pitcher, "The Misfortunes of the Dead," American Philosophical Quarterly, 21 (1984), 183-88. For a defense of direct obligations to the dead, see Bob Brecher, "Our Obligation to the Dead," Journal of Applied Philosophy, 19 (2002), 109-19. Aristotle famously said that one’s happiness could change after his death. Aristotle, Nicomachean Ethics, trans. Terence Irwin, 2nd ed. (Indianapolis, IN: Hackett, 1999), I.10-11. Noting this, Kagan argues that a person’s life can go better because of events after his death, even if his well-being cannot be changed thus. Shelley Kagan, "Me 15 persons form interests while alive, and the thwarting of these interests constitutes harm, even if this takes place after death.38 When a corpse is desecrated, the harm is not simply that living people worry their corpses will suffer the same fate. When a deathbed promise is not kept, the harm is not simply that living people worry about whether their last wishes will be fulfilled. Conversely, we might be able to benefit the dead by furthering their preferences or interests, such as making their descendants better off. A concern to benefit the dead might justify reparations for slavery. 39 However, these accounts problematically assume an interest can attach to a person after he or she no longer exists.40 I prefer not to depend on this ground. My concern here is to present the most minimal version: the dead can be harmed or wronged now if the living deny that they had a moral status while alive. This is minimal because it does not mean (so far) that any other interests survive past one’s death. The third possible reason for avoiding disrespect towards to the dead concerns duties we have towards ourselves. I particularly have in mind the ‘self’ as a political society that is seen as existing over time. If a society adopts a framework of justice that and My Life," Proceedings of the Aristotelian Society, 94 (New Series) (1994), 309-24. For a recent attack on posthumous rights, see Stephen Winter, "Against Posthumous Rights," Journal of Applied Philosophy, 27 (2010), 186-99. 38 Joel Feinberg, Harm to Others: The Moral Limits of Criminal Law, vol. 1 (Oxford: Oxford University Press, 1987), 79-95; Thomas Nagel, "Death," Noûs, 4 (1970), 73-80. 39 Michael Ridge, "Giving the Dead Their Due," Ethics, 114 (2003), 38-59 at 42. 40 Alternative accounts of wrong may suggest other ways to explain this ground, but my purpose here is not to defend any one particular ground in great detail. 16 relies on false moral reasoning (for example, by not condemning a past atrocity), this perhaps can only be done in a manner that either distorts the public political culture of that society or is inconsistent with the self-image of that society. Hypocrisy can degrade moral discourse in society.41 On the individual level, a person may owe it to herself to keep a deathbed promise, even if no one would know if she did otherwise, for reasons of integrity and character.42 She sees himself as the kind of person who would keep such a promise (without making calculations at each instance). Similarly, if a society wants to be entitled to a certain view of itself, it might need to adopt a certain stance and attitude. Distortions in moral reasoning in the public political culture may result if the society engages in self-deception. A political society can adopt different attitudes towards its past and towards past atrocities. It should take into account at least the cases and experiences it has faced in order to make sense of itself. Indeed, there may be an existential choice about what sort of thing a society wants to be. To the extent that the experiences of the dead victims of historical injustice are left out of the self-understanding of a society, this can be a violation of a duty to the living successors of the historical victims, or towards the dead, but it can also violate the self-understanding of that particular society.43 41 Pogge, "Making War on Terrorists." 42 See Williams’ account of integrity in J. J. C. Smart and Bernard Williams, Utilitarianism for and Against (Cambridge: Cambridge University Press, 1973). 43 Rather than seeing this as a duty society as a whole has to itself, we can instead see this as a duty individual citizens have. Citizens may have a duty in their role as citizens to adopt certain types of public reasoning, assuming they wish to be citizens of this society and see their society in a certain way. 17 The fourth possible reason to avoid disrespect towards the dead involves arguing that the authority of the moral framework that we are using depends on incorporating respect for the dead into it. Respect for the dead is not a duty, but a presupposition of adopting a certain framework of justice. We saw this type of argument when examining Kant’s account. We can undermine morality, or at least the moral framework through which we approach issues of justice, by denying the status of the dead. If what is wrong and right is in part determined by the larger of theory of justice we construct for ourselves, then we can be accountable for not considering the status of the dead when constructing such a theory of justice.44 Again, this does not necessarily get us towards the idea that the dead have posthumous rights or interests, or that they should be treated as if they do. Rather, it minimally says that a theory of justice that provides a concrete framework of justice should not withdraw the status that dead victims had while alive, the status which allowed us to say they were wronged and were victims. Four Structural Constraints on Frameworks of Justice Each of these grounds can establish the following postulate: the once-living were entitled to a certain sort of respect when alive, and the now-living ought to display a 44 The argument supposes either that a theory of justice is constructed or that one has duties regarding how one thinks about justice in the absence of complete knowledge of the ultimate principles of justice. Thus, anti-constructivists about justice might be able to adopt modified versions of my arguments. Cf. G. A. Cohen, "Constructivism," in Rescuing Justice and Equality (Cambridge, Mass. : Harvard University Press, 2008), 274- 343. 18 certain type of respect towards those now dead. Minimally, we disrespect the dead now when we deny that they suffered injustice when alive.45 This need not yet make any assumption that there are other duties towards the dead that continue past the death of the individual.46 Nothing said so far need involve the view that the dead continue, today, to have claims to reparations for injustices that survive their deaths. Indeed, establishing that the once-living have (or had) moral status does not yet give us a reason to honor dying wishes or to not dishonor corpses. Any claims for reparations arguably could die with the victim. My argument so far is independent of any assertions about what claims the dead (or their descendants) now have on the living. The only reference to a wrong is to the injustice suffered by the once-living in their own time (though this does not exclude the possibility that we wrong the dead now by effectively denying they were wronged in the past).47 In this way, my starting point more precisely concerns how to count the once-living, rather than the dead. 45 Here, I am remaining neutral between whether there is a direct duty to the dead, or merely an indirect duty with regard to the dead. It depends on which of the grounds we invoke. 46 On such “surviving duties,” see Lukas H. Meyer, "Surviving Duties and Symbolic Compensation," in Justice in Time, ed. Lukas Meyer (Baden-Baden: Nomos Verlagsgesellshaft, 2004), 173-83. 47 The claim that those now dead had a status while alive is be distinguished from the claim that those now dead still retain a status. I start from the former, so my account differs from W. James Booth, "'From This Far Place': On Justice and Absence," American Political Science Review, 105 (2011), 750-64 at 752. 19 Nonetheless, it is assumed that the once-living were owed respect then, and our framework of justice should display this attitude now towards the atrocities committed against these victims. What I am saying so far is that acceptable frameworks of justice (assuming they have a broad scope) have structural constraints: they must incorporate the types of injustices suffered by the once-living into their theories.48 From this starting point, my argument will eventually aim to establish the basis for claims for reparations for wrongs done to the dead. The first two structural constraints demand we avoid the two forms of disrespect towards the dead discussed above. First, our framework should be able to count the wrongs the dead suffered as wrongs (at least when we claim the scope of our theory is also large enough to say that claims of reparations do or do not persist). Second, we imagine how our framework might have encouraged certain injustices, if its system of justice had been in place at the time of the past injustice. Our framework should avoid perverse incentives for the dead. The third structural constraint imagines what incentive effects would have existed for past actors, had they known how present people would or would not have repaired the injustice done to dead victims. This varies slightly from the above constraint, which deals with applying a framework in a past context. In this constraint, we consider the publicity effects our framework of justice would have had on the now dead, had they been aware of how our framework would address claims stemming from wrongs done to people in their time. In this respect, we should consider the message we send when we adopt a 48 Pogge similarly calls for a "systematic coherence in morality" in theories of justice. See Pogge, World Poverty and Human Rights, 94. 20 system of principles that does not take any account of how the once-living perpetrators would have had an incentive to do injustice. While the very denial of reparations may not disrespect the dead, the way we justify the denial (or the way in which we do not even consider the problem worthy of consideration) could send a message of disrespect; it could indicate that our system of justice does not care about discouraging injustice. This arguably disrespects the dead directly. It can also give their living successors less reason to trust state authorities. It also can contradict the image a society holds of itself. In circumstances of gross historical injustice, the legitimacy of the state depends on giving assurance to those successors, in a way that is not the case in absence of this history. The state should fairly treat the successors of victims of historical injustice by formulating a framework of justice, which outlines what constitutes a wrong, and gives principles for determining how claims of reparations for those wrongs might persist. The fourth structural constraint is that we have a duty to reflect upon the wrong done to these victims and incorporate these reflections into our framework of justice. Now, we might deny that reparations for historical injustice are appropriate today in particular cases; in itself, this does not mean we necessarily disrespect those dead victims. However, our framework of justice, including the principles of reparative justice, should incorporate the wrongs that were done to the dead. The grounds on which we do or do not deny reparations should be part of a framework that does not involve, implicitly or explicitly, disrespect for the dead. However, it is not enough just to say or sincerely believe these past injustices were unjust. It is not enough to have a “settled conviction” that a past event like the coercive settlement of North America was wrong. We must not only count the wrongs 21 past victims suffered as wrongs. We must have general principles that account for the supposedly settled conviction that these wrongs count as wrongs. If we do not, we must either abandon these convictions or come up with such principles.49 We must be able to say why such past events were wrong, not just that they were wrong. For Rawls, the process of reflective equilibrium allows us to bring convictions and principles into balance, and the chooser can choose which to keep and which to change. However, such a choice also evinces attitudes to specific historical injustices and towards the dead, which can have their own effects if publically known (I discuss this further below). Proposed principles of justice are like proposed rules of grammar, and past unjust events are like instances of language use. Different rules of grammar might be appropriate with a different universe of cases of language use. So adding or subtracting cases of language use might change which rules of grammar best capture the universe of cases. Similarly, adding or subtracting “settled convictions” changes the universe of cases that it is claimed should be judged as unjust. This can change which principles of justice best account for the relevant universe of cases. Making certain cases suffered by dead victims into more central cases means that we assess candidate principles of justice based on whether they better account for the wrongfulness of these cases. Since we stand in special relation to the dead victims who suffered through our own state's own actions, we have a special obligation to make 49 See Rawls, Theory, §9; I draw on Pogge, "Making War on Terrorists," 4. 22 judgments about how they were or were not wronged.50 For us, their case is, other things beings equal, a more central case than other dead victims. This can be a form of respect towards the dead. Frameworks of justice that incorporate such reflections about wrongs done to the dead may differ from frameworks not incorporating such reflections. First, we have to come up with principles for why these wrongs were wrongs, rather than just saying it was wrong. Second, we may focus on certain cases, seeing them as more central than before. Since principles, like rules of grammar, can only imperfectly capture the universe of cases, making a case more central is important. By redirecting our reflection and demanding that the general principles account for certain cases in particular, we may indirectly be led to a new theory of justice through the process of reflective equilibrium. Focusing on wrongs done to the dead, perhaps especially on those committed by our own state, may result in a different system of justice. This different system of justice may have different principles for reparations. Surviving Duties of Reparation I have already argued that we should not deny that the dead victim suffered wrong while alive. If a framework of justice is silent on such a past injustice, this could effectively say that such violations do not count, according the authority of the framework. It might then be difficult to sincerely remember a past wrong as unjust. 50 Cf. Jürgen Habermas, "On the Public Use of History," in The New Conservatism: Cultural Criticism and the Historians' Debate (Cambridge, Mass. : MIT Press, 1989), 229-40. 23 Indeed, this may undermine the authority of the framework. Further, if a framework of justice judges past atrocities as wrong then, presumably, it should also admit that, while alive, the victims potentially had claims of reparation following the wrong. Our framework of justice should not now, in effect, withdraw the claims of reparation the victims would have justly had against the original perpetrators. The next question is whether it is disrespectful to hold that the claims of reparation vanish after the death of the victim. It is at this point, and not before, that my argument brings into play the concept of “surviving duties.”51 Meyer makes a general claim that duties can survive the expiration of the person to or towards whom the duty was owed. For example, we can continue to have a surviving duty to keep a promise we made to someone on her deathbed, if the reasons that led to our acquiring that duty are still relevant now. Meyer does not say much explicitly about what those reasons could be. The candidate I offer for a reason for these surviving duties is that they derive from a justified framework of justice, which is held to apply to the present as well as certain past contexts. It tests this framework’s principles and their implications in these contexts. So it considers the implications of the principles on a broad scale (as Rawls does in engaging in reflective equilibrium). It considers not only what the theory directly declares wrong or right or acceptable, but also its incentive effects. The theory should not make it too easy to get away with doing wrong. Recall how a teacher who punishes a bully, but only lightly, can send the signal that the victim is not as worthy of respect as somebody who counts fully. If we are concerned about the incentive effects that our present theory gives for all contexts for which it is relevant, including past contexts, then our system of 51 Meyer, "Surviving Duties." 24 principles should incorporate some discouragements. The motivation is to provide a theory or framework of justice that is coherent across all contexts for which it claims relevance.52 This must minimally include the context where the dead were wronged, if our framework claims to address their reparative claims. This can provide the basis for surviving duties. In discussing the content of surviving duties, we should be concerned about incentive effects, even when they are no longer likely to encourage or discourage anything in the future. If a framework of justice is public, then there are publicity effects. Successors of victims of historical injustice may feel insecure if a framework of justice allows the successors of the perpetrators to benefit from the injustice on principled grounds. This suggests they are adopting a present-oriented framework of justice. While this framework may condemn wrongs done now to members of historically victimized groups, it does not adequately discourage such victimization. It may make it too easy for one group to gain advantage, without any penalty or consideration of a penalty. For example, if a temple of a minority group was recently destroyed by a mob, it is hard for the minority to believe that the majority regrets this earlier violence when they erect a temple of the majority’s faith in its place. Context Shifts and the Scope of a Framework of Justice In the discussion so far, I have assumed that the framework of justice we adopt now would have applied to past contexts where the dead were victimized. If one endorses a framework in the present context, one endorses that framework for past contexts, and 52 Thomas Pogge, "Cohen to the Rescue!," Ratio, 21 (2008), 454-75. 25 one could be judged for what that framework would have counted as wrong and what it would have encouraged in past contexts where those now dead were victimized. I mentioned earlier the possibility that a framework of justice might instead be presented as a theory of justice relevant only for a limited range of contexts. Below I try to show why concerns about disrespecting the dead still apply, though in a different way. Different relational contexts might have different demands. If you and I live in a context of shared citizenship, then I may owe you thick duties of distributive justice. If the context is international, some theorists believe the duties are less thick and that different parties might relate to each other as peoples.53 Different types of relational contexts may require different frameworks of justice, which in turn require stronger or weaker duties towards different parties. Suppose that an indigenous people has been brought into the orbit of the state through injustice. There is a danger in affirming a belief that they are now in the context of a unified state, where the only important relationship is shared citizenship, and that all claims of justice should be made on this assumption. By saying this belief is valid, we may create an incentive for actors to create “facts on the ground” in the form of creating new relational contexts, in the hopes that a new, more advantageous framework of justice will apply. Suppose it is believed that the taking of land through eminent domain for “public purposes” (such as building an oil pipeline) is only possible within the context of 53 Compare Rawls’ theory of domestic justice to his theory of international justice. See John Rawls, The Law of Peoples (Cambridge, Mass. : Harvard University Press, 1999). 26 shared state. Then someone who wants to build a pipeline may have an incentive to make those who own the land part of the same state.54 Which framework matters when determining whether reparative claims persist today? By according validity to certain beliefs about this, we may disrespect the dead. If the state does not grapple with the possibility of context and framework shifts, then it cannot claim that it has principles for dealing with transitions between contexts and frameworks. It must admit that its theory of justice is incomplete. Perhaps a theory of justice has a restricted scope and its principles do not deal directly with what happened before the state was "unified." If so, then its principles can hardly claim to bar claims for reparations stemming from wrongs done in that context. If the state maintains that the situation where the past injustice occurred is part of present context where the present framework is applicable, it should have a unified framework appropriate to these contexts. There should be an account of how the framework would have discouraged the past injustice through incentive effects, or a justification for why it ought not have done so. If the framework would have led to legitimate claims for reparations within that system, it should be explained why these claims do not persist into the present. Alternatively, if the state holds that the injustice was committed in a fundamentally different context, where a different framework and different basic principles hold, then there may be an incentive to switch contexts. The state must then 54 Similarly, there may be an incentive for a rich province to secede from a larger state, if leaving a context of shared citizenship leads to weakened or non-existent duties of distributive justice. See Allen Buchanan, Secession (Boulder: Westview Press, 1991). 27 explain how to tell when a transition to the fully domestic context occurs. It must explain why claims from the previous context do not remain valid in the new one, or why they only partially persist. Otherwise it cannot claim it has thought fully about why reparations are not owed for wrongs done to the dead. Summing Up on Incentive Effects and Reparations It seems implausible to say that a framework of justice would insist on always fully rectifying historical injustices. Indeed, this is not always possible. An adequate framework of justice considers what incentive effects it would have had, if people in the past would have known how the framework would treat reparative claims today. Consideration of incentive effects would provide some guidelines for a framework of justice, which would also include principles guiding decisions about reparations. Specifically, we should consider what actions a framework would encourage (and what sorts of meanings this communicates) if we consider it embedded in both past and present situations. This includes consideration of incentive effects created through what the concrete framework of justice legitimizes, not simply effects that are judged on a strictly prospective standard. We consider how our framework looks if embedded in different contexts, and what sort of meanings would be communicated if we allow perverse incentives. Below, I argue that one way to provide assurance to living descendants or successors of victims of historical injustice is to morally reflect on and publically articulate a framework for how to justly address claims for reparation. 28 Assurance to Contemporaries Through Moral Reflection I discussed above how we might see certain past situations where wrong occurred as central cases in our theories of justice. We reflect on these cases, come up with more general principles accounting for our judgment that a wrong occurred, and apply these more general principles to unfamiliar cases. In the course of this, we consider whether claims for reparations may survive the death of the victim. But why engage in this process? Why focus on cases where the dead were victimized? Here, I argue that we have strong reasons for reflecting on certain wrongs done to past victims of historical injustice and on whether claims of reparations endure from these wrongs. Our process of moral theorizing can publically communicate something to present day successors of the dead victims of historical injustice. If we do not even consider what it would mean to make up for past wrongs (or why this is impossible now), this can send a message about what implicit disposition the state (or the citizenry) holds toward the successors of the dead victims. The successors of historically oppressed victims may reasonably doubt they will be treated fairly by the state if the state does not provide assurance that it repudiates the past. Theories emphasizing publicity, like Rawls’, are concerned that all know that everyone follows the principles of justice.55 Thomas Pogge is likewise concerned not only with the provision of the objects of human rights, but also with providing secure access to those objects.56 Such assurance - that current officials and citizens are committed to following the principles of justice - may vary in specific implementation depending on past injustice. A 55 John Rawls, Political Liberalism (New York: Columbia University Press, 2005), 181. 56 Pogge, World Poverty and Human Rights, ch. 2. 29 state authority claims to speak in the name of its citizens, so it should articulate a public framework of justice that assures present-day citizens that it adequately condemns past injustice. The living should publicly articulate the reasons why the wrongs suffered by the dead should count as wrong; this should lead them to publicly articulate whether reparations are owed to the living and the reasons behind this view. Assurance involves not only having such a view, but also publicly demonstrating and communicating it. Talk can be cheap since it can allow one to mouth the words “I am sorry,” without articulating all the reasons why the wrong should be counted as wrong. The living may need to assure the living successors of dead victims that the reasons for not giving reparations do not rely simply on a lack of adherence to principles. One way to assure commitment going forward is to consider whether there are still claims from the past that should be honored now. There should be assurance that citizens do not adhere to a framework of justice that implies an injustice did not happen in the past, or one that would have encouraged such an injustice. This assurance cannot happen unless such a framework of justice is articulated into a system of (principles for) concrete rights and duties. If the articulated system is inconsistent with publicly remembering some atrocities as injustices, then this communicates the opposite of assurance. Our grounds for denying reparations may contradict the reasons for condemning the past wrong. Consider how a theory of justice might, for example, deny reparations using a theory of equality of resources. Not articulating the reasons for condemning the past wrong may obscure this. A Native American nation might be denied the return of a 30 large amount of sacred land on the basis that it would make them ‘resource rich,’ even if they would not develop the land. However, such a theory might have justified the initial taking of the resource-rich undeveloped land. In articulating a framework, citizens should reflect on how long reparative duties persist. This involves being able to count the past wrong as a wrong, and not articulating principles that in fact justify or turn a blind eye towards what happened to dead victims. It also involves incorporating into the articulated framework concern for not incentivizing the wrongs done to past victims. If one articulates the grounds for why a past injustice was wrong, and why reparative duties might persist today, then the result may be a system of justice that recognizes concrete reparative duties. We morally reflect on how the dead were wronged in order to assure the living. This reflection may ultimately justify reparations. In an early work, Rawls prefers to restrict the cases judged and reflected upon to cases likely to occur today, in part because one is likely to be familiar with these cases and able to judge well.57 His argument suggests we should not be concerned about certain historical cases. However, if adequately remembering past injustices requires us to become familiar with these cases, this worry subsides. I reject a “practical action” meta- principle that insists that theorizing about justice should be restricted only to contexts we can now affect directly through practical action. I instead hold we should test the adequacy of our framework of justice by examining what it would say if it were applied in past contexts where the dead were 57 John Rawls, "Outline of a Decision Procedure for Ethics," in Collected Papers, ed. Samuel Freeman (Cambridge, Mass. : Harvard University Press, 1999), 1-19 at 5. 31 victimized. We can still display disrespect towards those now dead, those who lived in these historical contexts, if we never see the need to reflect on that context. The dead cannot now be guided by principles of practical action, since they cannot act. But if our framework of justice is thought relevant to a past context, we can imagine how it would have guided practical action then, had the dead known about it. So there is a connection to the idea of guiding practical action, even if those circumstances cannot reoccur now. Our framework of justice today cannot change how the dead were treated in the past, but we can, through imagined practical guidance, signal what treatment would have been better. We can avoid disrespect toward the dead by sending the message that our framework would have discouraged such victimization of the dead. We ought to consider what signals of respect and disrespect our framework of justice would have sent, had it been publicized to the dead while they were living. We ought to consider what signals we send to the living by the respect or disrespect we thereby display towards the dead. We can also make it more difficult for the dead perpetrators of injustice to provide to their living successors benefits stemming from unjust context shifts. Consider the question of how a state is to treat the descendants (or successors) of dead victims who were non-citizens when they suffered wrong. States often claim that indigenous peoples are now fully incorporated into the state. This is belief about when shifts between frameworks or contexts of justice occur. But what if such incorporation only occurs through an unjust context shift that wronged the dead? Today, it might be believed that past injustice has unfortunately resulted in the indigenous and non-indigenous existing in a relational context of shared citizenship, which is often thought to increase the strength 32 of duties one owes to others. According to many liberal theories of justice, states are obligated not only to protect negative rights, but to provide some positive rights to citizens. Citizens are obligated to protect and pay the costs of other citizens’ rights and claims of justice in a way that non-citizens are not. This is not to say that the only claims of justice are domestic, but only that many theorists hold that duties are typically stronger in that context. Some theories say that indigenous peoples do not have strong duties of distributive justice outside the state; it is only within the state that their undeveloped land counts as wealth.58 If indigenous peoples are held to only have such duties within the state, then there is an incentive for colonizers to shift the relational context, bringing them within the orbit of the state. This might be done through injustice, and there may be an incentive to do so if our framework rewards such injustice, by holding that a different framework should now resolve these claims. If we allow this transition to take place too easily, then our view of justice disrespects the dead through perverse “incentives for the dead.” We could make it so our framework of justice would not provide great incentives for such an action. For example, indigenous peoples could have an ‘opt-out,’ so that their unexploited resources need not count as a form of wealth, as some theories of egalitarian justice hold would be the case for citizens generally. Indigenous peoples would not be 58 Dworkin holds that equal respect through strong egalitarian justice is the virtue of sovereigns, implying this holds only within a state; he further measures equality in a way that counts unused resources as wealth. See Ronald Dworkin, Sovereign Virtue (Cambridge: Cambridge University Press, 2000); Law's Empire (Cambridge, Mass. : Belknap Press, 1986). 33 obliged to provide (at least not to the same extent) the resources used to protect the positive rights of others. Rather than focusing on present disadvantage without regard to the past history of someone or some group came into the orbit of a state, the state would determine what constitutes fair treatment in part through factoring in the need to discourage unjust actions or unjust context shifts. The state should be concerned not just with incentives for the living but also with “incentives for the dead.” One reason for being concerned with “incentives for the dead” is that the living has an interest in this being the case. Today’s living are tomorrow’s dead. If we reject a concern for creating perverse “incentives for the dead,” then the interests and status of tomorrow’s dead could be ignored in the future. What happened to dead victims in a past context could be ignored or slighted. So this interest means we have a present interest in upholding the validity of the belief that incentives for the dead do count, and that the dead should not be disrespected. The only way to do this is through a “law” or norm that says that “past incentives” can matter. The interest the living have going forward justifies taking the past and the dead seriously. A society can signal acceptance of this norm, and assure people it will follow it, by applying it retroactively before the time of it acceptance of its norms. The society should consider seriously how to address reparative claims left over from unjust context shifts. This may not be the only way to provide assurance, but it sends a costly signal. This is similar in structure to Fichte’s social contract account, where the living have an interest in the dead being seen to have rights. However, Fichte was discussing statutory legislation within a society. Here, the form of the argument is now broadened to a framework of justice for a particular society or even broadened to a wider approach to 34 justice regarding how and when a transition between contexts occurs. To be sure, one society cannot legislate for all contexts or legislate for all transitions between contexts. But for Fichte, the only way the living could have their testaments respected after they died was through a universal law. The state can implicitly or explicitly legislate about reparative duties left over from past contexts where the dead were wronged by that state. It does this through the stance adopted by its framework of justice with regard to those wrongs. One problem is whethe r and why a society must legislate in this way, rather than just being permitted to legislate with an eye towards the dead. After all, Fichte thought that considering the interests of the dead was optional for a society: Only if the living want certain benefits do they need to legislate a belief in the validity of the wills of the dead. So a society might see the benefit in discouraging future unjust context shifts or otherwise discouraging unjust creation of "facts on the ground." But it might find the costs more burdensome. Is there a more fundamental reason? Our earlier analysis of Kant can help us further. Kant was concerned with a conceptual framework, the language we must adopt if we want to talk about Right [Recht] or justice. For Kant, if we wanted to use this framework, consistency requires we apply it to the dead. My suggestion is that the legitimacy of upholding a society’s framework of justice depends on according status to the dead. As with Kant’s example of basing the status of the dead with reference to their humanity, the grounds for respecting the dead within a certain framework also presuppose respecting the dead in some way. This differs from Fichte’s view that there is an optional choice. However, Kant based the status of the dead on their humanity, which does not change (and so cannot be brought to 35 bear on context shifts). Here I take up Fichte’s concern with legislating for one society, even if the reference is to “legislating” (or demonstrating a commitment to) a framework of justice, rather than a written system of property law. But I claim that upholding a legitimate framework of justice for a society requires including a concern for the status of the dead. The legitimacy of a society depends on not displaying disrespect to the dead, and so providing public assurance to the successors of the dead victims of historical injustice. We can also imagine the legitimacy our framework of justice would acquire in the eyes of the dead victims, if they had known how our present framework would react to claims of reparations today. We can imagine how the dead could be assured through a framework of justice that attempts to discourage their victimization. Providing such imagined assurance to the dead is a way to assure the living as well.59 In a way, this may be an existential choice about whether or not citizens want a just society that reasons about justice in a consistent manner. Conclusion When a historical injustice has occurred, we ought to publically judge it to have been unjust. This means that we should not simply mouth the words “this was unjust,” but should formulate or extend our principles to explain why it was unjust. At the very least, the framework of justice we uphold should not be inconsistent with principled and sincere condemnations of past atrocities as unjust. If our framework is silent about these injustices, this may indicate disrespect for the status of the dead within our framework. Alternatively, if our framework is held not to apply to past contexts, then it needs to be 59 This may not be sufficient to provide assurance. 36 explained why and when a transition from one context occurs to the next. Also subject to moral scrutiny is the adequacy of any larger theory encompassing both contexts, and the criteria for context transition itself. The very principles for transition are subject to something like Rawls’s method of reflective equilibrium. If we say, our present system of justice need only repair the past to a certain degree or not at all, then we ought to consider the public effects of this statement. Publicity effects should not be confined to the living. We ought to consider how such a public announcement might have changed the incentive effects for those contemplating certain actions in the past, had they known about it. We ought to see the dead victims of historical injustice as part of our public audience. Incentive effects are not thought of as confined to present and future contexts. We should also imagine what past generations would have been encouraged to do, had they been aware of what our framework would require now. We ought to consider the message that our framework would convey to past victims and past perpetrators, regarding when we thought it appropriate to still give reparations or not. We ought to consider what message living successors of these victims will thereby receive regarding how seriously we view these past wrongs. To assure indigenous peoples and other members of historically victimized groups of the legitimacy of the system of justice we claim to be appropriate, we must reflect upon certain actual past contexts where injustice occurred. We must consider what our framework of justice would have directly justified and what injustices it would have encouraged. If it is held that our framework of justice does not extend to the past context, we must consider what injustices would have been encouraged by any difference in the principles between the different contexts. 37 A public framework of justice can encourage injustice. We can announce our tolerance for such encouragement through how our framework addresses claims for reparations today. In addressing these claims, it is presumably a condition of the legitimacy of democratic societies that the principles of justice involve reflection upon (and make appropriate judgments about) cases in contexts outside the domestic sphere. This is certainly the case when the democratic state expects the allegiance of groups like indigenous peoples now, and wants to assure them it is guided by principles such that it will not repeat the mistakes of the past. We ought to imagine how our framework of justice would publically assure the dead that we take their wrongs seriously. Through respecting the dead, we help provide an assurance necessary to legitimate the state to the living. 38 READ PAPER
|
D1307623
|
http://dkmm.org/types-of-composting
|
Types of Composting
|
This information was obtained from the EPA website. Types of Composting Backyard or Onsite Composting Backyard or onsite composting can be conducted by residents and other small-quantity generators of organic waste on their own property. By composting these materials onsite, homeowners and select businesses can significantly reduce the amount of waste that needs to be disposed of and thereby save money from avoided disposal costs. Learn how to create your own compost pile. Types of Waste and Waste Generators: Backyard or onsite composting is suitable for converting yard trimmings and food scraps into compost that can be applied on site. This method should not be used to compost animal products or large quantities of food scraps. Households, commercial establishments, and institutions (e.g., universities, schools, hospitals) can leave grass clippings on the lawn-known as “grasscycling”-where the cuttings will decompose naturally and return some nutrients back to the soil. Backyard or onsite composters also might keep leaves in piles for eventual use as mulch around trees and scrubs to retain moisture. Climate or Seasonal Considerations: Climate and seasonal variations do not present major challenges to backyard or onsite composting because this method typically involves small quantities of organic waste. When conditions change-for example, if a rainy season approaches-the process can be adjusted accordingly without many complications. Environmental Concerns: Improper management of food scraps can cause odors and also might attract unwanted attention from insects or animals. Requirements: Backyard or onsite composting requires very little time or equipment. Education is the most critical aspect of backyard or onsite composting. Local communities might hold composting demonstrations and seminars to encourage homeowners or businesses to compost on their own properties. Results: The conversion of organic material to compost can take up to two years, but manual turning can hasten the process considerably (e.g., 3 to 6 months). The resulting natural fertilizer can be applied to lawns and gardens to help condition the soil and replenish nutrients. Compost, however, should not be used as potting soil for houseplants because of the presence of weed and grass seeds. Vermicomposting Through this method, red worms-not nightcrawlers or field worms found in gardens- are placed in bins with organic matter in order to break it down into a high-value compost called castings. Worm bins are easy to construct (they are also commercially available) and can be adapted to accommodate the volume of food scraps generated. Types of Waste and Waste Generators: Worms will eat almost anything you would put in a typical compost pile (e.g., food scraps, paper, plants). Vermicomposting can be ideal for apartment dwellers or small offices that want to derive some of the benefits of composting and reduce solid waste. It is frequently used in schools to teach children conservation and recycling. Climate or Seasonal Considerations: Worms are sensitive to variations in climate. Extreme temperatures and direct sunlight are not healthy for the worms. The optimal temperatures for vermicomposting range from 55° F to 77° F. In hot, arid areas, the bin should be placed under the shade. By vermicomposting indoors, however, one can avoid many of the problems posed by hot or cold climates. The primary responsibility is to keep the worms alive and healthy by providing the proper conditions and sufficient food. Requirements: Vermicomposting has only a few basic requirements, among them: worms, worm bedding (e.g., shredded newspaper, cardboard), and a bin to contain the worms and organic matter. Maintenance procedures include preparing bedding, burying garbage, and separating worms from their castings. Results: One pound of mature worms (approximately 800-1,000 worms) can eat up to half a pound of organic material per day. It typically takes three to four months for these worms to produce harvestable castings, which can be used as potting soil. Vermicomposting also produces compost or “worm” tea, a high-quality liquid fertilizer for house plants or gardens. Aerated (Turned) Windrow Composting Organic waste is formed into rows of long piles called “windrows” and aerated by turning the pile periodically by either manual or mechanical means. The ideal pile height, which is between 4 and 8 feet, allows for a pile large enough to generate sufficient heat and maintain temperatures, yet small enough to allow oxygen to flow to the windrow's core. The ideal pile width is between 14 and 16 feet. Types of Waste and Waste Generators: This method can accommodate large volumes of diverse wastes, including yard trimmings, grease, liquids, and animal byproducts (such as fish and poultry wastes), but only with frequent turning and careful monitoring. This method is suited for large quantities, such as that generated by entire communities and collected by local governments, and high volume food-processing businesses (e.g., restaurants, cafeterias, packing plants). Climate or Seasonal Considerations: In a warm, arid climate, windrows are sometimes covered or placed under a shelter to prevent water from evaporating. In rainy seasons, the shapes of the pile can be adjusted so that water runs off the top of the pile rather than being absorbed into the pile. Also, windrow composting can work in cold climates. Often the outside of the pile might freeze, but in its core, a windrow can reach 140° F. Environmental Concerns: Leachate is liquid released during the composting process. This can contaminate local ground-water and surface-water supplies and should be collected and treated. In addition, windrow composting is a large scale operation and might be subject to regulatory enforcement. Samples of the compost should be tested in a laboratory for bacterial and heavy metal content. Odors also need to be controlled. The public should be informed of the operation and have a method to address any complaints about animals or bad odors. Other concerns might include zoning and siting requirements. Requirements: Windrow composting often requires large tracts of land, sturdy equipment, a continual supply of labor to maintain and operate the facility, and patience to experiment with various materials mixtures and turning frequencies. Results: This method will yield significant amounts of compost, which might require assistance to market the end-product. Alternatively, local governments can make the compost available to residents for a low or no cost. Aerated Static Pile Composting In aerated static pile composting, organic waste is mixed together in one large pile instead of rows. To aerate the pile, layers of loosely piled bulking agents (e.g., wood chips, shredded newspaper) are added so that air can pass from the bottom to the top of the pile. The piles also can be placed over a network of pipes that deliver air into or draw air out of the pile. Air blowers might be activated by a timer or a temperature sensors. Types of Waste and Waste Generators: Aerated static piles are suitable for a relatively homogenous mix of organic waste and work well for larger quantity generators of yard trimmings and compostable municipal solid waste (e.g., food scraps, paper products), which might include local governments, landscapers, or farms. This method, however, does not work well for composting animal byproducts or grease from food processing industries. Climate or Seasonal Considerations: Like windrow composting, in a warm, arid climate, aerated static piles are sometimes covered or placed under a shelter to prevent water from evaporating. In the cold, the core of the pile will retain its warm temperature, but aeration might be more difficult in the cold because this method involves passive air flowing rather than active turning. Some aerated static piles are placed indoors with proper ventilation. Environmental Concerns: Since there is no physical turning, this method requires careful monitoring to ensure that the outside of the pile heats up as much as the core. One way to alleviate bad odors is to apply a thick layer of finished compost over the pile, which can help maintain high temperatures throughout the pile. Another way to deal with odor, provided that the air blower draws air out of the pile, is to filter this air through a biofilter made from finished compost. Requirements: This method typically requires equipment such as blowers, pipes, sensors, and fans, which might involve significant costs and technical assistance. Having a controlled supply of air enables construction of large piles, which require less land than the windrow method. Results: This method produces compost relatively quickly-within 3 to 6 months. In-Vessel Composting Organic materials are fed into a drum, silo, concrete-lined trench, or similar equipment where the environmental conditions-including temperature, moisture, and aeration-are closely controlled. The apparatus usually has a mechanism to turn or agitate the material for proper aeration. In-vessel composters vary in size and capacity. Types of Waste and Waste Generators: In-vessel composting can process large amounts of waste without taking up as much space as the windrow method. In addition, it can accommodate virtually any type of organic waste (e.g., meat, animal manure, biosolids, food scraps). Some in-vessel composters can fit into a school or restaurant kitchen while others can be as large as a school bus to accommodate large food processing plants. Climate or Seasonal Considerations: In-vessel composting can be used year-round in virtually any climate because the environment is carefully controlled, often by electronic means. This method can even be used in extremely cold weather if the equipment is insulated or the processing takes place indoors. Environmental Concerns: In-vessel composting produces very little odor and minimal leachate. Requirements: In-vessel composters are expensive and might require technical assistance to operate properly, but this method uses much less land and manual labor than windrow composting. Results: Conversion of organic material to compost can take as little as a few weeks. Once the compost comes out of the vessel, however, it still requires a few more weeks or months for the microbial activity to stabilize and the pile to cool.
|
D1977140
|
http://analysistabs.com/excel-vba/change-row-height-column-width/
|
Change Row Height and Column Width using Excel VBA
|
Description: Some times we may enter the data into cells more than it’s width. In this case we can not able to see entire text. So we can change row height and Column width using excel using VBA. So that we can see entire data in that cell. When you have more lengthy data in cells, you can Auto Adjust Column Width or Row Height in Excel VBA to show the entire data. So that users can see the entire data in the cells. We will see with Examples. PREMIUM TEMPLATES LIMITED TIME OFFERON SALE 80% OFFBROWSE ALL TEMPLATES50+ Project Management Templates Pack Excel Power Point Word VIEW DETAILSAdvanced Project Plan & Portfolio Template Excel Template VIEW DETAILSBusiness Presentations Templates Pack Power Point Slides VIEW DETAILS20+ Excel Project Management Pack Excel Templates VIEW DETAILS20+ Power Point Project Management Pack Power Point Templates VIEW DETAILS10+ MS Word Project Management Pack Word Templates VIEW DETAILSChanging Row Height in Excel VBAWe can change row height in Excel using Row Height Property of a Row in VBA. See the following example to do it. Examples The following example will change the height of the 3rd Row to 25. Sub sb Change Row Height () 'Changing the 3rd row Height Rows (3). Row Height = 25 End Sub We can also set the height for multiple rows, the following example will change the height of the 3rd to 20th row height to 25. Sub sb Change Row Height Multi () 'Changing the 3rd-25the row Height Rows ("3:25"). Row Height = 25 End Sub Instructions: Open an excel workbook Press Alt+F11 to open VBA Editor Insert a Module for Insert Menu Copy the above code and Paste in the code window Save the file as macro enabled workbook Press F5 to execute itit Changing Column Width in Excel VBAWe can change column width in Excel using Column Width Property of a Column in VBA. See the following example to do it. In this Example I am changing the Column B width to 25. Sub sb Change Column Width () Columns ("B"). Column Width = 25 End Sub Examples We can also set the column width for multiple columns at a time, see this Example I am changing the Column B to E width to 25. Sub sb Change Column Width Multi () Columns ("B: E"). Column Width = 25 End Sub Instructions: Open an excel workbook Press Alt+F11 to open VBA Editor Insert a Module for Insert Menu Copy the above code and Paste in the code window Save the file as macro enabled workbook Press F5 to execute it Auto Adjust Column Width and Row Height using Excel VBAWe can use Auto Fit method of Columns and Rows in Excel using VBA to Auto Adjust the rows and Columns. Examples Code to Auto Adjust Column Width Following are the example to show you how to do this. Sub sb Auto Adjust Column Width () Columns (2). Auto Fit End Sub Code to Auto fit Row Height Following are the example to show you how to do this. Sub sb Auto Adjust Row Hight () Rows (2). Auto Fit End Sub Instructions: Follow the instructions below to test the codes above. Open an excel workbook Press Alt+F11 to open VBA Editor Insert a Module for Insert Menu Copy the above code and Paste in the code window Save the file as macro enabled workbook Press F5 to execute it LIMITED TIME OFFER - Get it Now! Advanced Project Plan Excel Template LIMITED TIME OFFER - Get it Now! Business Power Point Presentations Templates Pack Related Resource Excel VBA Reference Project Management Reference VBA Reference: VBA Code Explorer VBA Excel Application VBA Excel Workbook VBA Excel Worksheet VBA Excel Range VBA Active X Controls VBA Userforms VBA Projects Excel Reference: Excel Tutorial Microsoft Excel 2003Microsoft Excel 2007Microsoft Excel 2010Microsoft Excel 2013Microsoft Excel 2016What is a Project? Project Appraisal Project Management Project Plan Project Resource What is Gantt Chart? Excel Templates Excel Project Management Templates Power Point Project Management Templates MS Word Project Management Templates Excel Basics Tutorials Excel VBA Tutorials Excel Functions and Formulas External VBA Reference Excel VBA Reference Project Management Reference VBA Reference: Getting Started with VBA in Office VBA for MS Office Application: Complete References Excel VBA Reference VBA Tutorials VBA Macros VBA Functions Excel Reference: Microsoft Excel Reference Excel Formulas Excel 2016Excel Functions Excel Quick Tutorials Project Management Methodologies MS Project Templates Excel, Word, Power Point Timeline Templates Excel, Word, Power Point Planners and Trackers Microsoft Excel Templates MS Power Point Excel Templates MS Word Templates MS Office Schedules Templates Excel, Word, Power Point Agenda Templates Excel, Word, Power Point Invoices Templates Excel, Word, Power Point Business Plans Templates Excel, Word, Power Point Financial Management Templates Excel, Word, Power Point Minutes Templates By Valli | May 18th, 2013 | Excel VBA | 4 Comments Share This Story, Choose Your Platform!About the Author: Valli Excel VBA Developer having around 8 years of experience in using Excel and VBA for automating the daily tasks, reports generation and dashboards preparation. Valli is sharing useful VBA examples ad Tips to helps us automating daily tasks. Related Posts Show or Hide|Unload a userform Show or Hide|Unload a userform Column Number to Column Name Gallery Column Number to Column Name Column Name to Column Number Gallery Column Name to Column Number Remove Check Box on Worksheet or User Form in Excel Gallery Remove Check Box on Worksheet or User Form in Excel4 Comments Koert penne March 29, 2016 at 2:35 PM - Reply I wanted the row height for content of one column, regardsless what was in the other columns. I did it as follows: Sub rowheight_one_column ()Column = Input Box (“Hoeveelste kolom?”) + 0Rows (20). Delete For x = 4 To 13 Cells (20, Column) = Cells (x, Column) Rows (20). Auto Fit hoogte = Cells (20, Column). Row Height Rows (x). Row Height = hoogte Next x Rows (20). Delete End Sub Sathish October 26, 2016 at 11:39 AM - Reply Please help me for auto fit the entire sheet1Jack February 21, 2017 at 7:43 PM - Replywhere have you declared your Variables, It does confuse people when your code is not neat and is exposed on the Internet where everybody does search and get stuck.dskar April 13, 2017 at 7:10 AM - Replythe difference between writing the code in code window and a module? Leave A Comment
|
D2843967
|
http://www.nobelprizes.com/nobel/peace/1989a.html
|
.
|
1989 Nobel Peace Prize Laureate Religious and political leader of the Tibetan people. Excerpt from the Nobel Peace Prize acceptance speech"I pray for all of us, oppressor and friend, that together we succeed in building a better world through human understanding and love, and that in doing so we may reduce the pain and suffering of all sentient beings. "Favorite verse, from eighth century Buddhist saint Shantideva For as long as space endures And for as long as living beings remain, Until then may I too abide To dispel the misery of the world. Background Born: July 6, 1935Residence: Dharamsala, India Original Name: Lhamo Dhondrub Full Name: Jetsun Jamphel Ngawang Lobsang Yeshe Tenzin Gyatso - Holy Lord, Gentle Glory, Compassionate, Defender of the Faith, Ocean of Wisdom. Tibetans normally refer to His Holiness as Yeshe Norbu, the Wishfulfilling Gem or simply Kundun - The Presence Place of Birth: Takster, Tibet Biographical highlights:1937 - Recognized at the age of two as the reincarnation of the 13th Dalai Lama1940 - February 22, enthroned in Lhasa1950 - Assumed full political power as Head of State and Government of Tibet1959 - Received Geshe Lharampa Degree (Doctorate of Buddhist Philosophy)1959 - Forced into exile in India after Chinese occupation of Tibet1987 - Proposed Five-Point Peace Plan for resolving future status of Tibet1988 - June 15, in Strasbourg, proposed creation of self-governing Tibet "in association with the People's Republic of China. "1989 - Awarded Nobel Peace Prize1991 - Strasbourg Proposal declared invalid Book Store Books by Dalai Lama Books about Dalai Lama Featured Internet Links The 14th Dalai Lama – Biography from Nobel e-Museum (submitted by Wanda Ndungu)Nobel Prize Acceptance Speech Nobel Prize Presentation Speech Nobel Prize Press Release Nobel Lecture Nobel Symposia Search WWW Search The Nobel Prize Internet Archive Nobel News Links Giving Comfort in a World of Chaos A Fitting Prize for Peace Links added by Nobel Internet Archive visitors The Dalai Lama Home Page (submitted by Jennifer S. Johnson)The Dalai Lama, Quotes, a brief history and visit to San Francisco (submitted by Richard)Current Affairs in Tibet (submitted by J. Mason)World Peace Sports International (submitted by Johannes Paul Martin Zimmer, President)The Spirit of Tibet - A Portrait of a Culture in Exile (by Alison Wright) (submitted by Alison Wright)Peace Council Dalai Lama's Death Penalty Message (submitted by Rev. Kobutsu Malone)Do you want to help out Tibet and his holiness, the Dalia Lama? Then help here. (submitted by Mary)Vietnamese Buddhism ( English & Vietnamese) (submitted by Ven. THICH NGUYEN TANG)Voice of Tibet' s Web Site link here (submitted by Tsering Dorjee)World Tibet Network's News (submitted by Tsering Dorjee)A small family lineage within the Vajrayana Buddhism (submitted by joe)Buddha's Words - Gotaro (@Geocities) (submitted by gotaro)Tibetan Buddhist Center (submitted by Shantung)Dharamsala a little lhasa in india (submitted by y bali)Tibetan World linking tibetan world wide (submitted by yukti)A Message From The Dalai Lama on the Death Penalty. (submitted by Davis)The Dalai Lama (submitted by Jackson)A small family lineage within the Vajrayana Buddhism (submitted by Swen Manson)Dalai Lama Page (submitted by Spirital Connections Group)Dalai Lama Page (submitted by Spiritual Connections Group)Letter in support of www.worldmessageday.org (submitted by Jonathan Crabtree)Dalai Lama and Buddha information.. (submitted by )Dalai Lama (submitted by Neel)Block Print Portrait of the Dalai Lama (submitted by Justin Kempton)Dalai Lama (submitted by Shannon)Teachings by the Dalai Lama (submitted by Bill Scheffer)Relationships with Dalai Lama (submitted by Shlomo Tommer)the dalai lama (submitted by Anonymous)Religious and political leader of the Tibetan people (submitted by shreder)Tibet. Religious and political leader of the Tibetan people. (submitted by Vendor)Dalai Lama Tenzin Gyatso by tomas (submitted by tomas)Vietnamese Buddhism in Australia (submitted by Venerable Nguyen Tang)Dalai Lama - The Born Leader (submitted by Andrews)About Dalai Lama (submitted by xavier22@yahoo.com)The Dalai Lama's biography (submitted by Ian)Wikipedia entry about Tenzin Gyatso, 14th Dalai Lama (submitted by David M. Hartzell)
|
D1725154
|
http://www.food-solutions.org/haccp_ccp_limits.html
|
Establish critical limits
|
Establish critical limits Previously, we have identified and analysed food safety hazards within your business, using a flow chart. Using a decision tree, we identified critical control points where a food safety hazard must be controlled. Now we look at the critical limits for the control points identified. The third HACCP Principle Third Principle of HACCP is: Establishing critical limits at critical control points which separate acceptability from unacceptability for the prevention, elimination or reduction of identified hazards;Critical limit definition: A criterion which separates acceptability from unacceptability. You must state your limits - what is acceptable at this point and what is not. Defining your critical limits This means deciding what you may have to do at a critical point to control or eliminate the hazard. You must have a particular routine or procedure which results in the hazard being controlled or eliminated. This should be written down as part of your procedures not only to satisfy inspectors but also to ensure your food is safe. However, having a control written down is not actually doing it, so you also need records of when you have carried out the control. Critical control limits may be as simple as using a temperature probe to ensure cooked food has reached the correct temperature, or that chiller equipment is keeping food cold. Summary This HACCP principle is about deciding what you will accept as safe at a particular point in your processes. You need to write down what you do and keep records to prove you are doing it. Inspectors are not all ogres. They want to see you have thought about what you do, why and how you achieve it – that is the"confidence in management" bit of your inspection. If you write things down and keep records, your inspection will be a doddle. What next? In the next two HACCP principles we shall look at monitoring CCP’s and defining corrective actions if a limit is not met. HACCP Explained Sign up to our free newsletter to keep up with the latest food news and developments in food law. Hazard Analysis Explained gives useful suggestions on hazard identification, hazard analysis and assessing which identified hazards must be controlled. Identifying Critical Control Points covers how to decide where your critical control points are. Subscribers also have access to the HACCP Checklist which helps with HACCP review. The next article will cover the " fourth principle of HACCP ": Establishing and implementing effective monitoring procedures at critical control points;Contact john@food-solutions.org to subscribe, comply with Food Regulations easily.
|
D1906927
|
http://time.com/4471773/expired-epipens-what-you-need-to-know/
|
Expired EpiPens: What You Need to Know
|
By Alice Park August 30, 2016TIME Health For more, visit TIME Health. The whole point of an emergency medication is that it’s there, ready to kick in, at a moment’s notice if anything goes wrong. That’s the purpose of epinephrine, the drug in Epi Pens, to curtail anaphylactic shock caused by allergies. But not only do these potentially life-saving drugs need to be available, they need to be working at their highest effectiveness. That’s what the expiration date is there to do. It’s a gauge of how close to its optimal effectiveness a drug will function. That date is based on a number of factors, including how well the drug worked when it was tested and then sealed in its unopened container, and whether it was maintained at certain temperatures and moisture levels. Once a bottle of pills is opened, for example, that expiration date isn’t as useful a gauge of that drug’s effectiveness. That’s not the case for Epi Pens, the subject of a controversial price increase by its manufacturer, Mylan, because those factors, like light and moisture, are non-factors since the pens are airtight. In fact, with Epi Pens, experts think the expiration date is a pretty good gauge of the injectable drug’s potency. Because epinephrine doesn’t maintain its chemical integrity and can’t remain potent for very long, those dates are among the shortest in the drug industry, at about 18 months. And because Epi Pens are needed to immediately combat the body’s potentially deadly spiral into shock, it’s imperative that the epinephrine be as close to its optimal effectiveness as possible. Mohamed Jalloh, spokesperson for the American Pharmacists Association and assistant professor of pharmacy at Touro University, California, says there’s another reason to follow expiration dates on the drugs: “The primary concern is that epinephrine will oxidize over time, and because of that, create a byproduct that is associated with hallucinations and other psychiatric symptoms.”That’s another reason why it’s critical that people keep their Epi Pens up to date, discard expired ones and replace them with fresh versions. Still, that doesn’t mean that an Epi Pen turns toxic or unusable the day after the date stamped on the box. Many doctors say, for example, that using an Epi Pen that’s expired by a few weeks or even a month or two is better than not treating someone who might be going into anaphylactic shock after an allergic reaction. “As a pharmacist, if a patient needs an Epi Pen and unfortunately the only one available is an expired one versus nothing, then the expired Epi Pen is better than nothing in relieving the shock symptoms,” says Jalloh. For people who still find the price of the new authorized generic out reach, there is another option. People can ask doctors to write them prescriptions for an epinephrine autoinjection drug, which would allow pharmacists to fill it with another brand, known as Adrenaclick. It takes a little longer to administer (10 seconds to Epi Pen’s 3) but it’s far less expensive. According to Consumer Reports, Adrenaclick can be bought for $140-205, depending on where you buy it and whether or not you use coupons. To read more about other Epi Pen alternatives, read Cheaper Epi Pen Alternatives You Can Buy Right Now…Plus More Coming Soon. SPONSORED FINANCIAL CONTENTYou May Like Health The Surgeon General Says More People Should Carry Naloxone, the Opioid Antidote. Here's Where to Get It and How Much It Costs Health Weekend Recipe: A Stress-Busting Smoothie Health This Study Could Explain Why Our Brains Perform Worse As We Age Health Easy Ways to Actually Improve Your Posture Health FDA Orders Mandatory Recall of Kratom-Based Herbal Supplements Over Salmonella Outbreak Health CDC Finds 'Nightmare Bacteria' Across the U. S. Here's What That Means
|
D1754647
|
http://www.century21.com/real-estate/Bulls-Gap-TN/LCTNBULLSGAP/
| null |
866-732-6139 Live Chat Commercial Real Estate • Luxury Homes USA (English)Home Find a Home Sell a Home Mortgage Join C 21Map Grid Search Entire Map
|
D2753508
|
https://iia.org.sg/content/cia
|
Certified Internal Auditor
|
Certified Internal Auditor The CIA designation is the only globally accepted certification for internal auditors and remains the standard by which individuals demostrate their competency and professionalism in the internal auditing field. Since the program’s launch in 1973, it has opened up countless doors of opportunity for practitioners around the world as it communicates their ability to serve as a key player in their organization’s success. Candidates leave the program enriched with educational experience, applicable knowledge, and business tools that can deliver a positive impact in any organization or business environment. The CIA credential can be your master key to professional success, opening doors for career opportunities and earning you increased credibility and respect within the profession and your organization. Internal Audit Practitioner The Internal Audit Practitioner designation is a great way to quickly demostrate your internal audit aptitude. You can earn this new designation through social badging by completing the Internal Audit Practitioner application and taking and passing the Certified Internal Auditor (CIA) Part One exam. Candidates who have successfully completed the CIA Part One exam within the past 24 months are also eligible to apply. For more information, please visit the Internal Audit Practitioner web page. Use Your Key to Open the Door The CIA credential can be your master key to professional success, opening doors for career opportunities and earning you increased credibility and respect within the profession and your organization. Ultimately, the CIA designation will: Distinguish you from your peers. Demonstrate your proficiency with internal staff and external clients. Develop your knowledge of best practices in the industry. Demonstrate your proficiency and professionalism. Lay a foundation for continued improvement and advancement. Earning the CIA designation is a valuable accomplishment and a professional advantage for auditors at all stages of their careers, including chief audit executives, audit managers, audit staff, risk management staff, and also students enrolled in an accounting or other business or financial degree program." Being a member of a global professional body like The IIA has helped open doors to many career opportunities. At the same time, I am able to network with like-minded professionals through the local chapter, IIA Singapore. This has helped me develop professionally and keep abreast of the latest changes in the world of audit and compliance. Having the CIA credential on my name card also earns respect from finance professionals across the globe. The CIA designation is definitely an asset to have in Singapore and globally! "Kelvin Leong, CIA, CRMAAPAC Financial Planning & Analysis Manager, Online Payments/E-Commerce Industry The following are the steps and processes for application of IIA Certification: Only member of IIA Singapore can apply their examinations through the CCMS. For 1st time user of CCMS (new candidate), you will need to create a new profile in CCMS. Name entered in the system must be the same as per your NRIC or Passport. Visit the Forms section and select the application form of your choice and make online payment by credit card. Please note other mode of payment is not available for IIA Singapore members. If candidate opted for payment mode other than credit card, your application may not be processed or delayed due to non-payment. Once you have made your application through the CCMS, submit the following documentation to IIA Singapore within three business days for our processing: i) Printout from CCMS on Program Status ii) CIA Character Reference Form iii) Work Experience Verification Formiv) Proof of identificationv) Proof of education For item i), ii), iv) and v) are mandatory. For item iii), candidate can submit this form at a later date within the 4-year programme upon obtaining the required experience. Upon receipt of an automated email from IIA Global on the approval of your application, you may proceed to register your exams in the CCMS. You may select to register for more than one exams/exam parts by completing a separate registration form. Once your exam registration has been processed, you will receive an email on "Authorization to Test". However, you should wait for 48 hours after receiving your "Authorization to Test" notification before contacting Pearson VUE to schedule your exam, in order to allow time for your registration data to be uploaded to their scheduling system. Kindly note that your "Authorization to Test" will allow you to schedule and sit for your test within the authorization period of 180 days (approximately 6 months) only. For existing candidate, you may proceed to register your exam directly through the CCMS. Upon receipt of your "Authorization to Test", you may then proceed to schedule your exam with Pearson VUE. For a detailed guide, click here to download the information. Please feel free to contact the Certification Team at+65 6324 9027 or certification@iia.org.sg for queries. Use Your Key to Open the Door The CIA credential can be your master key to professional success, opening doors for career opportunities and earning you increased credibility and respect within the profession and your organization. Computer-based Testing The CIA exam is available through computer-based testing, allowing you to test year-round at more than 500 locations worldwide. Candidates are able to sit for exams at any IIA-authorized Pearson VUE testing center worldwide, regardless of whether the testing center is located in your hometown or country. To locate the testing centers nearest you, visit the Pearson VUE website. Click here for the CBT Exam Tutorial. In Singapore, the IIA-authorized Pearson VUE testing centres are located at: NTUC LEARNINGHUB PTE LTDPEARSON PROFESSIONAL CENTERS-SINGAPORENTUC Trade Union House73 Bras Basah Road Level 3, Room 3JSingapore 189556Singapore51 Cuppage Road#05-02/03/04Singapore 229469Singapore CIA Exam Preparation Resources The Gleim CIA Exam Study Guides and the CIA Exam Practice Questions books are available for loan to members. Members can reserve and collect the books either by phone call at 6324 9029 or email to secretariat@iia.org.sg. CIA Exam Prep Course Part IPart IIPart III7 April 20185 May 20183 & 10 March 2018$128.40$128.40$256.80Register Here Register Here Register Here CIA Learning System The CIA Learning System is available for sale at IIA Bookstore here.
|
D1707780
|
http://speedydeletion.wikia.com/wiki/Roubaix_(fabric)
|
Roubaix (fabric)
|
This article does not cite any references or sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (December 2009)Roubaix fabric is a soft, warm, stretchy cloth popular for use in the manufacture of certain items of cycle-specific clothing such as leg warmers, tights and gloves . This article about textiles could benefit from further information. You can help us by expanding it. This clothing -related article could benefit from further information. You can help us by expanding it. This cycling-related article could benefit from further information. You can help us by expanding it. This article uses material from the Wikipedia article Roubaix (fabric), that was deleted or is being discussed for deletion, which is released under the Creative Commons Attribution-Share Alike 3.0 Unported License . Author (s): Dark Silver Crow Search for "Roubaix (fabric)" on Google View Wikipedia's deletion log of "Roubaix (fabric)"Categories: All articles lacking sources Textile stubs Clothing stubs Cycling stubs Technical fabrics Deleted Wikipedia articles
|
D75514
|
http://www.mymedicare.com/medicare-guidelines/
|
Medicare Guidelines
|
Medicare Guidelines Medicare is a public healthcare program managed by the Department of Health and Human Services. Generally, the program offers prescription and medical insurance along with hospital care for Americans over the age of 65. Permanent U. S. residents and citizens will qualify for Medicare, if they’ve been working for at least 40 fiscal quarters in a position which contributed to the Medicare plan. People who are currently employed can view their paycheck stub to see if the contribution towards the plan is made. Individuals that are diagnosed with kidney failure who needs dialysis or a transplant or for people with certain permanent disabilities can also qualify. Medicare Part A pays for inpatient stays at a skilled nursing facility or hospital. Home health care and hospice are additionally addressed within the Part A plan. Medicare Part A requirements will be met if a person is a minimum of 65 and is getting or is eligible to get retirement benefits from Social Security or the Railroad Retirement Board. If the government employed the beneficiary or his/her spouse into a position which qualified for Medicare, they could collect additional benefits. For those under age 65, eligibility requirements of Medicare involves getting disability benefits from the Railroad Retirement Board for a minimum of two years. Medicare Part B pertains to outpatient services that are not covered by Part A. Requirements of Part B are that a monthly premium be paid. Medicare-Paid Hospice Admissions Must Meet Medicare Guidelines• Medicaid and Medicare, which pay for 89% percent of United States hospice services, impose 3 strict requirements of reimbursement on an end-of-life care agency to discourage them from enrolling patients who are inappropriate.• The attending doctor and the doctor of the hospice both must certify that the beneficiary’s illness is terminal and confirm that the patient has no more than 6 months in which to live; and offer a particular prognosis that’s accompanied by some clinical data or documentation that supports their position.• A beneficiary or his/her representative should sign and agree to an election statement picking the Medicare hospice, and agree that they will waive curative care.• There should be a certain hospice program of care that is periodically reviewed. It should involve the assessment of the individual’s necessities, address the management of symptom relief and discomfort, and have a statement in detail of the frequency and scope of services that are required.• The program must be set up by an interdisciplinary group, an attending doctor, and the physician or medical director. Hospices Violate Medicare Guidelines for Patients in Nursing Facilities During September of 2009, the Office of Inspector General, United States Department of Human Services, let out a report of the continuous issue of widespread fraud that was committed by hospice agencies while residents in nursing homes are enrolled within hospice programs. The Office of Inspector General’s report decided the extent to which hospice claims for beneficiaries within nursing institutions within 2006 met the requirements of Medicare coverage:• 82% of hospice claims didn’t meet a minimum of a single requirement of Medicare coverage. All non-profit hospices were a little more likely to be negligent in this regard than most for-profit agencies.• 33% of claims didn’t meet requirements of the election statement. Commonly, the statements did not clearly explain that care in a hospice was palliative rather than curative, or that the beneficiaries had waived Medicare coverage of specific services that were related to their illnesses that were terminal.• 63% of claims didn’t meet the requirements for plan of care, like a description in detail of the frequency and scope of services. The Hospice Foundation of America defines that a hospice is made to provide support and comfort for those with a life-limiting illness who do not respond to treatments that are cure-oriented. But, most “life limiting” and “incurable” conditions, from heart and lung diseases, dementia, down syndrome, and spina bifida isn’t terminal. They will often respond to therapy, and sufferers could live for years.
|
D1327788
|
http://www.insurancelibrary.com/health-insurance/what-does-hdhp-stand-for-in-health-insurance
|
What Does HDHP Stand For In Health Insurance?
|
What Does HDHP Stand For In Health Insurance? Asked April 4, 2013 in Health Insurance15986 POINTSContact Meview profile Bob Vineyard PROFounder, Georgia Medicare Plans, Atlanta,GAHDHP means high deductible health plan. The typical plan design does not have copay's for doctor visits or prescription drugs. Policyholders that use par (network) providers pay the pre-negotiated rate for all covered services. The amounts paid for covered medical services accrue towards the deductible. HDHP policies are a simple, easy to understand concept. Unlike copay plans, there are no "moving parts" to the HDHP. Once the deductible is satisfied, all covered charges for the balance of the year are paid by the carrier (subject to coinsurance provisions). Most plans offer 100% coinsurance above the deductible but it is not unusual to see plans with 80%, 70% or 50% coinsurance. The HDHP design is a requirement for those who want an HSA (health savings account) but not all HDHP's are HSA compliant. Policyholders looking for good value and minimal risk exposure for catastrophic claims will choose the HDHP. Answered on April 4, 2013+1 +1 this answer flag this answerview more answers by Bob Vineyard5527 POINTSContact Meview profile Marlin Mc Kelvy PROPresident, Consumer Directed Benefit Solutions, Memphis, Tennessee HDHP stands for High Deductible Health Plan. Generally, this term has been used in association with a type of health insurance policy purchased that was specifically designed to be used with a Health Savings Account (H. S. A). In this context the health insurance plan design has an upfront deductible that must be paid by the policyholder before any co-insurance cost sharing and/or copayments can be applied to the policy's coverage. The IRS determines the minimum deductible and out-of-pocket maximums for H. S. A eligible high deductible health plans each year. For this reason the deductible associated with HDHPs changes over time. In 2014 the minimum individual deductible for a HDHP is $1250, in 2015 it will increase to $1300. Re-designs of health insurance plan benefits prompted by the Affordable Care Act have introduced new health insurance plans that have substantially higher deductibles that previously were most often associated with an H. S. A based plans. As such, the consumer must closely examine the detailed benefits summary of the health insurance plans they are considering. This is because there are plan designs now that certainly have a high deductible but they also have other benefit features like office visit or prescription copayments that disqualify them from being used with an H. S. A. In short, you will be best served to seek out the services of a health insurance broker who is knowledgeable in these matters. Answered on June 9, 2014+0 +1 this answer flag this answerview more answers by Marlin Mc Kelvy Did you find these answers helpful? Yes No Add Your Answer To This Question You must be logged in to add your answer.<< Previous Question Questions Home Next Question >>
|
D3277779
|
https://www.wired.com/2014/05/absurd-creature-of-the-week-this-marsupial-has-marathon-sex-until-it-goes-blind-and-drops-dead/
|
Absurd Creature of the Week: This Marsupial Has Marathon Sex Until It Goes Blind and Drops Dead
|
In the forests of Australia, every year just before spring, there erupts a sexual frenzy unlike any other on Earth. It’s bigger than an ultra-romantic Neil Diamond concert, bigger even than spring break in Cancun. Here a tiny hyperactive marsupial called antechinus sprints around mating almost non-stop for an exhausting three weeks, with single romps lasting as long as 14 straight hours. More absurd creatures: The Incredible Critter That’s Tough Enough to Survive in Space Pink Fairy Armadillo Crawls Out of the Desert and Into Your Heart10-Foot Bobbit Worm Is Ocean’s Most Disturbing Predator Males relentlessly bound from partner to partner, as massive hormone releases in their bodies cause their immune systems to crash and their fur to fall out. They bleed internally. Some males even go blind, yet still stumble around the leaf litter hoping for one last tryst. In a few short weeks, every single male lies dead, leaving the females to raise their offspring. And so it seems that in perpetually dangerous Australia, even the sex can kill you. For these three weeks of sexual kamikaze, antechinus males are concerned with nothing–absolutely nothing–other than mating with as many females as they possibly can. Ecologist Andrew Baker of Australia’s Queensland University of Technology, who studies these critters’ astonishing habits, has even picked up a copulating pair, who ignored him entirely and went about their business in his hands. “It’s pretty frenzied,” said Baker. “There’s no courtship or anything like that. The males basically just grab the females and go for it.”Driving males to such feats are astronomical levels of testosterone. Think of an MMA fight wrapped in an Insane Clown Posse concert wrapped in the Insane Clown Posse playing during an MMA fight. While the hormone mobilizes all the sugars in the antechinus’ body so it doesn’t need to feed for the three-week orgy, it also glitches the mechanism responsible for regulating the production of cortisol, a stress hormone that in small amounts results in bursts of energy and higher pain tolerances. With runaway levels of cortisol, though, the males’ bodies literally begin to fall apart. Bone density plummets and blood-sugar levels go nuts. Their immune systems essentially degrade to worthlessness, as open sores form and never heal. Of course, females are also quite stressed during all of this, but they don’t produce anywhere near the same levels of testosterone, so their cortisol regulation remains normal. A rare picture of antechinus on top of something other than another antechinus. Photo: Gary Cranitch, Queensland Museum The whole affair is one of nature’s most striking manifestations of the true meaning of life: At a very basic level, all critters, including you and me, are on this planet to pass along their genes, even if it means an early demise. Antechinus males, after all, were only born after the previous year’s mating season. Not a single one reaches 12 months old, while females live up to three years. And while it may not seem like anything other than strange hedonism, the males, with their mass suicide, in a way help guarantee the success of the offspring they’ll never get to enlighten with what would have been a truly epic sex talk. (You see, son, when a man loves a woman very much, it’s not long before he goes blind and dies. )“It’s all geared toward the young being born when spring starts,” said Baker, “so there will be a big flush of insects in spring. The female will give birth to the young and then she’ll have plenty of food available because the population has been halved, because all the males are dead.”In the eight to 12 weeks leading up to the mating season, though, males are taking more than their fair share of food, scurrying around frantically and hoovering up insects. “They’re spending all of their time building up food and fat stores,” said Baker, “because they know they’re going to need it across that intensive mating block.”Plus, the more weight you pack on, the more energy you can devote to producing sperm, which males store in enormous quantities before the mating season begins. Bigger males will also beat out smaller ones for the right to mate–Baker has found individuals that are twice the weight of others (MMA enthusiasts, obviously). In the end, though, females find themselves alone in a forest of dead males, carrying an incredible amount of sperm from perhaps dozens of different potential fathers. But this seems to be problematic for one of evolution’s most basic principles: sexual selection. Typically, females pick only the most fit of males, so they can better guarantee offspring with strong genetics. But antechinus ladies aren’t exactly picky–it’s not like they roll up to a sperm bank and studiously flip through catalogs of donors. So aren’t they inevitably stuck with sub-par sperm? Well, sure, she’s carrying sperm from smaller, less fit males. But larger males produce more sperm, boosting the chance that theirs will win out in the fertilization game. And obviously, with that many partners the competition is fierce. Indeed, a single brood will consist of young from several different fathers. She’ll actually give birth to up to three times as many young as she has teats. This, too, is where good genes from their fathers benefit the diminutive, barely developed young. “They haven’t got much going for them except for a really strong mouth and sucking mechanism and some little hands and arms to crawl their way up,” said Baker. “They’ll crawl up and attach to a teat and then once all the teats are occupied all the other extras that were born will die within an hour or two.”As a marsupial, antechinus gives birth to highly underdeveloped jelly beans. Photo: Gary Cranitch, Queensland Museum So right from birth, natural selection favors only the strongest young from the strongest fathers. The ones that survive settle into a kind of pouch, though it’s nowhere near as luxurious as a baby kangaroo’s digs. This is more of a depression in the lower abdomen, with raised and slightly enclosed walls, where the young hole up even while the mother hunts. And the female must feed ravenously, for milk production in marsupials is extremely energy-intensive. In placentals, most of the energy in rearing young is spent in utero, as you mothers out there can attest (that’s not to say that significant energy isn’t eventually spent on the uniquely human duties of keeping kids from tumbling down stairs and eating crayons). “But marsupials are born small and immature,” said Baker, “and most of the energy is driven toward milk production. So when she’s producing milk for the growing young, it’s an incredible imposition on her energetics.”After six weeks, the young have become too large for their mother to schlep around, so they’ll detach and hang tight in the nest and resume suckling when the mother returns. After another six weeks, they’re large enough for the female to evict entirely. And so the tiny critters scurry toward their fates: for males, certain death–for females, a male-free paradise of boundless food. Ah, la petite mort. Browse the full Absurd Creature of the Week archive here. Have an animal you want me to write about? Email matthew_simon@ wired.com or ping me on Twitter at@mr Matt Simon. Antechinus has an itch to scratch, if you get my meaning. Photo: Gary Cranitch, Queensland Museum Absurd Creature of the Week
|
D3321235
|
https://www.reddit.com/r/Buffalo/comments/5bae9h/what_is_a_meat_raffle/
|
.
|
all 9 commentssorted by: best (suggested)Want to add to the discussion? Post a comment!Create an account [–] TOMALTACH resident ginger 10 points 1 year ago *Haha. It's exactly what it sounds like... a bunch of meat for raffle. Pounds of burgers, sausages, steaks, whateverpermalink embed save [–] Intanjible 7 points 1 year ago It's Ron Swanson's dream event.permalink embed save [–] Fancy And Important Man West Side is the Best Side 14 points 1 year ago What should be the name for any gay strip club in Cheektowaga.permalink embed save [–] Sayoshinn 1 point 1 year agohttp://data.whicdn.com/images/24323335/large.jpgpermalink embed save parent [–] brownguy13 4 points 1 year ago The best few hours of your lifepermalink embed save [–] Dar_Winning 5 points 1 year ago A meat raffle is a fundraiser usually held by firehalls or other community organizations. Depending on who's hosting it, you pay for tickets to get in, booze and tickets to try to win meat (steaks, chops, burgers, chicken, turkey are usual). Be prepared to drink and have a good time. It's kind of hokey, but the people make it interesting.permalink embed save [–] Fudgeworth 4 points 1 year agohttp://www.wnymeatraffles.com/whatisameatraffle/permalink embed save [–] countrygirl1014 2 points 1 year ago The one in East Concord includes pies into the raffle too. They are a ton of fun and for a good cause most of the time. Just remember to bring singles!permalink embed save [–] [deleted] 4 points 1 year ago It's awesome, you should go and prob arrange a ddpermalink embed save
|
D2005866
|
http://www.usmagazine.com/celebrity-news/news/jewel-rodeo-star-ty-murray-split-after-nearly-six-years-of-marriage--201427
|
Jewel, Rodeo Star Ty Murray Split After Nearly Six Years of Marriage
|
Breaking Jewel, Rodeo Star Ty Murray Split After Nearly Six Years of Marriage By Stephanie Webber July 2, 2014Jewel and her rodeo star husband Ty Murray have split after nearly six years of marriage, the singer announced via her official blog on Wednesday, July 2 Christopher Polk/ACA2012/Getty He just wasn't meant for her. Jewel and rodeo star Ty Murray have split after nearly six years of marriage. The singer announced the news via her official blog on Wednesday, July 2. PHOTOS: Celebrity splits in 2014"Dear World. It is infinitely strange to write those words, especially considering the personal nature of the topic, which is the purpose of my writing today. But the truth is I have lived my life in the public eye since I was nineteen. And while it is intimidating to live a life in the public, it has also been a privilege to make a living with my words, my thoughts, my feelings," the 40-year-old wrote. "Which brings me to this highly personal announcement today," she continued. "My husband, friend and partner of 16 years and I have decided to get a divorce. "PHOTOS: Stars gone country! "Ty and I have always tried to live the most authentic life possible, and we wanted our separation as husband and wife to be nothing less loving than the way we came together," she added. "For some time we have been engaged in a private and difficult, but thoughtful and tender undoing of ourselves. Allowing ourselves the time and space to redefine what we are to each other with love rather than malice. "With that, the pair "both value growth" despite enduring this "heartbreaking" step in their lives. PHOTOS: Friendly exes"Lastly, a message from us both," she concluded. "Our dedication to our son is unwavering and we are both committed to being the best partners in raising our son," she wrote. "Due to the spirit in which we have gone about this separation, we trust we can remain dear friends who hold each other in high esteem, which is so important to us as parents- as we wish only what is best for our son." (The pair welcomed son Kase in July 2011. )The "Foolish Games" entertainer and Murray, 44, secretly eloped to the Bahamas in August 2008. They last stepped out on a red carpet together at the Academy of Country Music Awards in Las Vegas in December 2012. PHOTOS: Country's blonde bombshells In April, the Alaska native spoke to San Diego magazine in anticipation of her upcoming 20th anniversary since releasing her first debut album, Pieces of You, in 1995. All business, she kept mum about her relationship with Murray.
|
D73576
|
http://thelawdictionary.org/check-stub/
|
What is CHECK STUB?
|
What is CHECK STUB? A check’s portion retained as a record by the check writer; for account keeping purposes, such as the stub part of a payroll check. The stub has an area for payments to date and information about the current paycheck. It may written or it may a carbon copy of the check. When the check is written, a stub is also usually written. More On This Topic International Business Law What Is the Purpose of an EEGTL Tax? It’s Election Time in the US: 5 Options for Americans Planning Immigration to Canada Four Important Factors to Consider Before Renouncing Dual Citizenship How To Do Payroll Without Tax Tables What Does An FBI Background Check Show? How Far Back Does A Background Check Go? Auto Insurance Definitions Eleven Types of Legal Motions in U. S. Law How To Change The Name Of The Owner On A House Title Related Legal Terms CHECK ENDORSEMENT, STUB, CHECK-BOOK, ELECTRONIC CHECK PRESENTMENT (ECP), STUB STOCK, POSTDATED CHECK, CHECK HOLD, CERTIFIED CHECK, STALE CHECK, CLAIM CHECKLink to This Definition Did you find this definition of CHECK STUB helpful? You can share it by copying the code below and adding it to your blog or web page.<a href="https://thelawdictionary.org/check-stub/" title="CHECK STUB">CHECK STUB</a>Written and fact checked by The Law Dictionary BYTE D RATIO
|
D3301806
|
http://www.nepaha.org/
|
.
|
Welcome!Since our founding in 1950 we have strived to improve the lives of people in Luzerne County. We believe a partnership exists between the Authority, its tenants and Luzerne County as a whole.homeprogramsapplicationabout us Landlord Access Landlord Access Users : If you experience problems with access, please call (570) 287-9661. Website Designed by Luzerne Co. Housing Authority © 2016 at Homestead™ Get a Website and List Your Business
|
D1175680
|
http://www.espn.com/nba/story/_/id/9530074/nba-schedule-released-tuesday
|
NBA schedule released Tuesday
|
NBA schedule released Tuesday Aug 1, 2013Associated Press Facebook Twitter Facebook Messenger Pinterest Emailprintcomment NEW YORK -- The NBA regular-season schedule will be released Tuesday. The schedule will be unveiled during an NBA TV special program at 6 p.m. EDT that will highlight opening-week matchups and other games of interest. It also will be posted along with the show on NBA.com. Some teams have already begun releasing their preseason schedules. Sponsored Headlines Comments
|
D2617682
|
http://www.urbandictionary.com/define.php?term=socialist
|
.
|
Top definitionsocialist1. (Noun) A person who embrace some or all of the ideas of Marx. Common political agendas include: Redistribution of wealth (from rich to poor), social security, free education & healthcare, strengthening of labour unions. Socialists usually have less orthodox oppinions than communists, though a person can be both. A socialist will usually distance himself from communist dictators like Stalin, and instead claim loyalty to the original ideas of Marx and Lenin. Unlike a communist, a socialist need not to be an atheist. 2. (Verb) Attributed to a country said to have a socialist system. This is often confused with communism, which according to Marx is a system where true equality exist, and the state have been made unneccesary. Most socialist agree that no country have had a truely communist regime.1. "He is a socialist, not a communist ." "Why?" "He doesn't support dictators like Stalin ." 2. The socialist party favour better healthcare over tax cuts.#socialism #communism #communist #marxist #marxism #liberalism #marx #leninby mig B September 05, 2007566 317The Urban Dictionary Mug One side has the word, one side has the definition. Microwave and dishwasher safe. Lotsa space for your liquids. Buy the mug
|
D215864
|
http://www.tlc-inc.net/
|
.
|
Military, Government & Private Industry Logistics Support From a Service-Disabled, Veteran-Owned Small Business Core Capabilities Core Capabilities Maintenance Tactical & Non-Tactical Vehicle Repair, Maintenance Management, Production Control - Technical Inspections Learn More Supply Warehouse Management & Operations, Equipment Inventory & Accountability Specialists, Hazardous Material Support Learn More Transportation Motor Pool Operations, Rail Operations, Training & Licensing Learn More Training Logistics Training, Range Operations, Individual & Small Unit Training Learn More Information Technology Logistics Automation Specialists, LOG STAMIS, Transition to G-Army Learn More Base Operations Support Transition Center, Maintenance Operations, Housing/Billeting Management, Security Guards (Armed & Unarmed)Learn More Why Choose TLCOur difference transcends nearly 20 years of base operations and logistics support. It surpasses our military service and private industry leadership experience. Our difference is a dedication to quality and integrity. Our standards emphasize ethics and corporate social responsibility. We rank the welfare of all our stakeholders, employees, clients, and those serving in our military above all else. This is why we’re the go-to support for government agencies, the U. S. military and third party contractors in need of logistic and operations support. Our commitment is to mission success – and our track record proves that. More Info Qualifications, Certifications & Contract Mechanisms Previous OPTAR SS Operations, Planning, Training, and Resource Support Services CECOM S3 Communications-Electronics Command Strategic Services Sourcing SCo E Sustainment Center of Excellence ISO 9001:2008 EAGLE Enhanced Army Global Logistics Enterprise DCAA Defense Contract Audit Agency OPTAR SS Operations, Planning, Training, and Resource Support Services CECOM S3 Communications-Electronics Command Strategic Services Sourcing SCo E Sustainment Center of Excellence ISO 9001:2008 EAGLE Enhanced Army Global Logistics Enterprise DCAA Defense Contract Audit Agency Next
|
D1027167
|
http://www.aboutkidshealth.ca/En/ResourceCentres/PrematureBabies/UnderstandingDiagnosis/PrematurityandPain/Pages/Assessing-Pain-in-the-NICU.aspx
|
Assessing Pain in the NICU
|
Sections Print Read to me Tweet// Resource Centres /Premature Babies Assessing Pain in the NICUFrom the day they are born, infants, including premature babies, can feel and express pain. Over the years, heath care experts have learned to assess pain in newborns. An assessment of pain in babies relies mostly on observing behaviours. For example, newborns can respond to painful events such as a heel prick within the first minutes of life. In addition to noting behavioural changes that might indicate pain, there are physiological measures that can be used to assess pain in premature and newborn babies. These include temperature, blood pressure, heart rate, and oxygen consumption, among others. The situational context is also taken into account when assessing pain. In the case of premature babies, gestational age and the infant’s sleep and waking states are important in this regard. Although there are established and proven methods to assess pain in premature babies, pain assessment is not an exact science. To lessen the guesswork, pain assessment tools, which are generally checklists of possible pain indicators, take into account behavioural, physiological, and contextual measures. However, it should be noted that changes in behaviour and physiology can be due to other factors. Behaviour in response to pain Premature babies in pain tend to display pain in their facial expressions, arm and leg movements, and cries. They may try to guard or protect a sore part of their body or even pull on it. Changes in eating, moving, and sleeping can also be indicators of pain. Facial expressions are generally regarded as the best single behavioural indicator of pain in all age groups. A grimace, eyes squeezed shut and mouth stretched open with a tensed and curled tongue, are common expressions of pain. Babies cry for reasons such as hunger, anger, or fear, but the cries of pain are distinctive. The typical pain cry is high-pitched, tense, harsh, non-melodious, sharp, short, and loud. However, the absence of crying does not mean a baby is not in pain. An infant in severe pain may not cry at all, especially if he is very premature. He may simply not have the energy to cry. Premature and very young babies may not move and may become still in response to pain. This absence of movement has also been noted in older children recovering from surgery. They recognize that moving hurts and so remain still to minimize the amount of pain. Assessing an infant’s pain by observing takes skill and requires an understanding of infant development. This is why no single measure is used exclusively. Several measures are used to make a determination of pain. Physical reactions to pain Physiologic indicators, including heart rate, breathing rate, blood pressure, skin colour, vomiting, sweating, and dilatedor widened pupils, are also used to determine if an infant is in pain. Because changes in these indicators can result from other causes, including physical stress, fear, or anxiety, they can be difficult to interpret. Despite these limitations, when used with behavioural and contextual indicators, these signs can be useful as part of an overall assessment for a baby in pain. Contextual indicators In addition to behavioural and physical reactions to pain, a baby’s context will also be taken into account when assessing pain. For example, when multiple procedures are going on, sometimes a premature baby will respond with an exaggerated response to pain or may painfully respond to non-painful procedures. Other premature babies may become limp and cease responding to repeated painful procedures. Studies are underway to determine why premature babies tend to respond one way or the other. A premature baby’s gestational age can also influence pain. In general, extremely premature infants tend to have less response to pain compared to older premature babies. However, this does not necessarily mean they are feeling less pain. Neurologically impaired babies, that is to say babies who have sustained some degree of brain damage, show less behavioural and physiological response to pain. Again, this does not mean they don’t have pain. Time and experience can also be contextual factors that influence pain. For example, if a premature baby has had to endure multiple painful procedures, over time his response to the next painful procedure is often reduced. How well and how much a premature baby sleeps can also be an indication of pain. This is another area that is currently being studied. Common events and conditions that cause pain In the NICU, pain is experienced either through procedures or because of conditions and injuries. Common painful procedures include heel pricks or needles, intravenous insertions, suctioning of mouth and nose, lumbar punctures, and intramuscular injections. Common painful conditions include severe intraventricular hemorrhage (IVH), necrotizing enterocolitis (NEC), burns, skin conditions, surgery, and fractures. Pain assessment tools for premature babies Premature Infant Pain Profile (PIPP)PIPP is a comprehensive assessment tool used for newborn babies born either at term or preterm. A newborn infant's pain intensity is determined by measuring behavioural indicators such as facial expressions, physiological indicators such as heart rate and oxygen level in the blood, and considering them along with contextual indicators such as the child's gestational age at birth as well as her sleep/wake state. These indicators are scored together to provide an indication of acute pain. Other pain assessment tools In addition to PIPP, other pain assessment tools can be used to help determine how much pain a premature baby is experiencing. These include:the Neonatal Facial Coding Scale (NFCS)the Faces, Legs, Activity, Cry, and Consolability Scale (FLACC)the Neonatal Infant Pain Scale (NIPS)the CRIES Score In general, all of these tools use similar behavioural, physiological, and contextual markers to assess pain in premature babies. Sharyn Gibbins, NNP, Ph D10/31/2009
|
D3490710
|
http://www.whatsthebestbed.org/is-an-adjustable-bed-right-for-you/
|
Is an Adjustable Bed Right for You?
|
Is an Adjustable Bed Right for You? Posted on May 1, 2013 by What's The Best Bed Learn if an adjustable bed might help you sleep better. Adjustable bed bases have become quite popular recently, due to wider availability online and more affordable options than ever before. This type of bed offers owners the ability to adjust their position with simple controls and can be helpful for a wide range of people. Though previously associated with hospitals, modern adjustable beds blend seamlessly into home decor and offer a range of benefits for perfectly healthy people as well. In this article, we will go over the basics of adjustable beds of offer some tips for deciding whether or not an adjustable bed might be a good addition to your home. Adjustable beds have actually been around for a long time; some evidence suggests rudimentary adjustable beds may have been used as early as the 16th century! Today’s three-part adjustable bases, featuring the ability to raise and lower each segment, were developed by Dr. Willis Gatch in the early 1900s. The Gatch Bed revolutionized health care due to its ability to elevate the patient into specific positions to promote healing through increased circulation and oxygen levels after surgeries. Anyone suffering from long bouts of bed rest also found them to be considerably more comfortable for a variety of activities, making sitting up and relaxing bed easier. In order to extend this comfort to consumer markets, several manufacturers began producing home adjustable beds in the mid to late 1900’s. These were made popular by brands like Leggett & Platt, and targeted towards aging consumers. In addition to health benefits, modern bases also offer several comfort features like massage and are designed to coordinate with home furnishings. Now, adjustable beds appeal to wide range of buyers, from baby boomers to young couples. If you are trying to determine if an adjustable bed would be a good purchase, understanding the benefits they offer is a good place to start. Therapeutic Benefits of Adjustable Bases Circulation Swelling Breathing Acid Reflux Post-Surgery Healing Back Pain These types of beds were originally developed to aid health and healing, as therapeutic inclination can be used to aid a variety of health concerns. Poor circulation often causes swelling (edema) in the legs and feet which can be alleviated by elevating your feet above your heart. The Fowler’s position (upper body elevated 45-60 degrees) is a medical position utilized to facilitate breathing and to promote healing after some surgeries and childbirth. The serious heart burn caused by acid reflux, often referred to as GERD, is caused when stomach contents leak into the esophagus. By elevating the chest and head, this can be eliminated and tends to be more comfortable than sleeping on mounds of pillows. The “zero gravity” position, in which the head is slightly raised and feet are above the heart, can be helpful for relieving back pain and improving circulation as well. In addition to these specific positions, people can tailor the bed shape to fit their own personal needs and comfort preferences. Comfort Benefits of Adjustable Beds Relax in bed more comfortably Massage benefits Luxury/convenience Customizable for couples In addition to the health benefits mentioned, an adjustable base also offers creature comforts. Most people enjoy reading or watching TV while in bed and use a variety of pillows to prop themselves into an upright position, or experience uncomfortable strain on their back and arms. An adjustable bed eliminates this hassle by allowing the user to position themselves upright for reading, watching a movie, or enjoying breakfast in bed. You can also slip into a lounger position with knees slightly elevated. More upgraded models often come with additional functions like massage, alarms, and even anti-snore controls. The massage is a vibration-based sensation that helps relax muscles and encourage circulation. Other types of features vary by model, but add to the comfort and luxury of your bedroom. Couples can also benefit from adjustable beds that come in split models. Many brands offer split king and split queen bases on which each half operates independently. Thus, partners who have different needs and preferences can both be comfortable and sleep side-by-side as well. Other Considerations In addition to the benefits, here are few other questions you might consider to decide if an adjustable bed is right for you. Do you have enough room in your budget? Home adjustable bases usually start around $1000. They are typically not covered by insurance, though some policies will cover them as durable medical equipment. While they may be a pricier item, these products are meant to last for upwards of 10-20 years and the cost is similar a mid-range mattress. What type of furniture do you have? Modern adjustable beds will work with a majority of bed frames and headboards. However, platform beds may not be suitable if the base’s legs cannot reach the ground, or if the platform is not designed to support the weight of the base and mattress. Wallhugger design is also an important feature to look for if you plan on using your base within furniture. Will your mattress work or will you need a new one? The average innerspring mattress is not meant for an adjustable bed. In order to avoid damaging the mattress and/or impairing the function of the base, you should use a flexible option like memory foam or latex. These materials mold to the base and prove durable. Can you set the bed up yourself? Adjustable bases do require some minimal assembly, and they are also fairly heavy items. If you have limited mobility and will need assistance taking the base from your door to your bedroom, look for a retailer that offers “white glove” delivery. This means that the deliverer will bring the bed into your home and set it up. Choosing the Right Adjustable Bed A study by Burke Research on behalf of Leggett and Platt indicated that 90% of adjustable bed owners are happy with their beds. Sleep Like The Dead.com reports that 84% of people report satisfaction with adjustable bases overall. The above figures mean that overall, people that buy adjustable beds are happy with their decision. So long as you take care to understand the features of the product you select and check owner reviews, it is likely you will come away satisfied. When considering an adjustable bed, you should determine which features are most important to you, your budget and the size you will need. The other critical factor is the base’s warranty. Most reputable manufacturers will offer around 20 years of limited warranty coverage, but the full coverage periods can vary significantly from 0-5 years, and some warranties might exclude critical components like motors all together. You may run into difficulties finding quality adjustable beds locally, but don’t get discouraged as many online retailers offer good, affordable options. Buying an adjustable bed online will allow you to thoroughly research and compare products. While it is true that returning an adjustable base can be difficult or costly, this is true for local stores as well due to the nature of the product. In a previous articles, we looked at leading adjustable bed brands and manufacturers to see how they compared on dimensions like price, warranty, durability, and owner reviews. Two that stood out were Amerisleep’s adjustable base and Leggett & Platt’s Prodigy base. The Amerisleep Adjustable Bed starts at $1800 and includes wireless controls, massage, presets, and pillow tilt angles, as well as USB ports, app controls and more. The Prodigy from Leggett and Platt starts at $1699, and offers wave massage, sleep timers, wifi remotes, and raises up to 63-degrees. Both receive owner satisfaction ratings over 90% on average, making either a good bet. An adjustable bed looks like a traditional mattress by day, but at night it develops a unique personality, cradling the user in supreme comfort. The old institutional look is gone, replaced by clean lines, quiet motors, and hidden mechanics. In addition to health benefits, there are numerous comfort advantages to owning an adjustable base making it appealing for a wide variety of consumers. Considering your personal preferences and the potential benefits will help you decide whether an adjustable bed right for you. Posted in Find the Best Bed Tagged Adjustable Beds, Back Pain, Featured
|
D234784
|
https://www.tablespoon.com/recipes/mini-cannoli-calzone/16b6c7f8-2959-4d26-9d61-a7b2676ea61e#!
|
Mini Cannoli Calzone
|
Mini Cannoli Calzone4 Ratings0 Comments Prep15min Total30min Servings6Refrigerated pizza crust becomes a perfect pocket for cream cheese cannoli filling. Topped with a rich chocolate drizzle and mini chocolate ... ... MORE+Cheeky Kitchen Ingredients1 can (11 oz) Pillsbury™ Refrigerated Pizza Crust, thin variety4 oz cream cheese1/2 cup ricotta cheese1 teaspoon vanilla Pinch cinnamon1 1/2 cups powdered sugar1/2 cup (8 tablespoons) butter, melted and divided1 cup mini chocolate chips, divided Steps Hide Images1 Preheat oven to 350ºF. Line a baking sheet with parchment paper. Unroll refrigerated pizza crust. Cut into six 4 to 5-inch rounds.2 In a stand mixer, beat together cream cheese, ricotta, vanilla, cinnamon, and powdered sugar until smooth. Spoon into the center of one side of each pizza crust round.3 Fold each crust round over the filling, using a fork to seal the edges together. Place on prepared baking sheet. Baste calzones with 1/4-cup (4 tablespoons) of melted butter. Bake in preheated oven for 11-17 minutes, or until the calzones turn a light golden brown. Remove and cool slightly.4 In a medium microwave-safe bowl, melt 2/3 cups of the chocolate chips and 1/4-cup (4 tablespoons) melted butter together. Stir until smooth. Drizzle over calzones. Sprinkle with remaining mini chocolate chips. Serve warm. Enjoy!Nutrition Information More About This Recipe© 2018 ®/TM General Mills All Rights Reserved Advertisement We Also Love How to Make Mini Cauliflower-Crust Pizzas Mini Oreo™ Cheesecake Bites Mini Conversation Heart Pizza Calzones Mini Calzones Mini Chocolate Peanut Butter Cupcakes Saltine Cracker Toffee Try These Next Mini-Calzones with Roasted Butternut Squash and a Sage-Walnut Pesto Strawberry Cream Cheese Mini Wraps Caprese Calzones Taco Crescent Calzones Hawaiian Calzone Pepperoni Pizza Braid Comment
|
D3375143
|
http://www.nature.com/scitable/topicpage/Sex-determination-in-honeybees-2591764
|
Sex Determination in Honeybees
|
In honeybees (or honey bees), sex is normally determined by the fertilization or non-fertilization of eggs, rather than the presence or absence of sex chromosomes. This mode of sex determination was first discovered by Johann Dzierzon, a Catholic priest, in 1845. Dzierzon reported that a virgin queen which has not taken a mating flight (the queens mate only while in free flight away from nest) produces only male progeny (Dzierzon et al., 1945). His report was the first rigorous description of a sex determination system, occurring more than 50 years before the discovery of sex chromosomes (Mc Clung, 1902; Wilson, 1905). We now know that honey bees are not unique and that about 20% of animal species use a haplodiploid mode of reproduction. In haplodiploid systems, male progeny normally develops from unfertilized eggs, which are haploid and have just one set of chromosomes. The fertilized honey bee eggs, which are diploid and have two sets of chromosomes, differentiate into queens and worker bees. Complementary Sex Determination Figure 1Figure Detail Figure 2: Honeybee colony. Inbreeding produces colonies with reduced numbers of progeny. Diploid male larvae homozygous at the sex determination locus (SDL) are consumed shortly after they hatch, resulting in empty cells on brood combs.© 2009 Nature Education All rights reserved. In the years that followed the observation that honey bees lack sex chromosomes, investigators were surprised to discover that diploid males appeared in inbreeding studies with honey bees. The presence of these diploid males suggested that neither the fertilization process nor the haploid or diploid state of the egg provides the primary signal for sex determination in honey bees (Mackensen, 1951). Since the appearance of diploid males was associated with inbreeding, investigators proposed a hypothesis of complementary sex determination, in which a single sex determination locus (SDL) determines the sexual fate (Whiting, 1933; Whiting, 1943). According to this hypothesis, fertilized eggs that are homozygous at SDL differentiate into diploid males, while fertilized eggs that are heterozygous at SDL develop into females. Fertile males are produced from the queen's unfertilized, haploid eggs, which are necessarily hemizygous at the SDL (Figure 1). Homozygosity at the SDL is lethal to males. The diploid males are eaten by worker bees shortly after they hatch from the egg. This results in a typical brood pattern in honey bee colonies that bee keepers refer to as shoot brood (Figure 2). The isolation of the sex determination locus in honey bees led to the identification of the complementary sex determiner ( csd) gene (Beye et al ., 2003) (Figure 3A). The csd gene encodes a potential splicing factor that exists in at least 15 allelic variants that differ on average in ~3% of their amino acid residues (Hasselmann and Beye, 2004). The csd gene product is necessary for female development, because inactivation of csd gene product in female embryos causes a full switch into male development (Beye et al ., 2003). The target of the csd gene product was recently identified as the feminizer ( fem) gene (Hasselmann et al ., 2008) (Figure 3A). The fem transcript is splicing differently in males and females, so that only female cells have a functional fem gene product. In males, splicing introduces a stop codon into the fem coding sequence. Evolution of Complementary Sex Determination Figure 3Figure Detail The complementary mode of sex determination occurs in a variety of hymenopteran species, including bees, wasps and ants, but not all these species rely on products of the csd gene for sex determination. Comparison of gene orthologs in other bee and wasp species showed that the csd gene arose recently by gene duplication within the honey bee lineage from a copy of the ancestral progenitor gene feminizer ( fem) (Figure 3B). The fem gene remains a conserved component of sex determination pathways among insects. During the evolution of honey bees, the fem gene has become the target of csd activity (Figure 3A). The csd gene has most likely acquired its modern function by adaptive evolution. According to one model (Figure 3B) (Hasselmann et al ., 2008), duplication of the ancestral sex-determining fem gene was followed by positive selection in one of the duplicates, favouring the presence of a new upstream signal that ultimately resulted in the novel sex determination system in the honey bees (Figure 3). The evolution of the csd gene is an example of how easily a new sex determination systems can arise by simple molecular changes of the existing genetic repertoire. The reduction of meiotic recombination that is observed at the sex determination locus of the honey bee may also indicate that the csd gene will gradually degenerate over time (Charlesworth et al ., 2005), which would again facilitate the evolution and positive selection of alternative sex determination signals over evolutionary time scales in the honey bee lineage. References and Recommended Reading Beye, M., Hasselmann, M., Fondrk, M. K., Page, R. E. & Omholt, S. W. The gene csd is the primary signal for sexual development in the honeybee and encodes an SR-type protein. Cell 114, 419-429 (2003). Charlesworth, D., Charlesworth, B. & Marais, G. Steps in the evolution of heteromorphic sex chromosomes. Heredity (2005). Dzierzon, J. Gutachten über die von Herrn Direktor Stöhr im ersten und zweiten Kapitel des General-Gutachtens aufgestellten Fragen. Eichstädter Bienenzeitung 1, 109-113, 119-121 (1845). Hasselmann, M. & Beye, M. Signatures of selection among sex-determining alleles of the honey bee. Proc Natl Acad Sci U S A 101, 4888-4893 (2004). Hasselmann, M. et al. Evidence for the evolutionary nascence of a novel sex determination pathway in honeybees. Nature 454, 519-522 (2008). doi:10.1038/nature07052 ( link to article)Mackensen, O. Viability and sex determination in the honey bee ( Apis mellifera L.). Genetics 36, 500-509 (1951). Mc Clung, C. E. The accessory chromosome - sex determinant? Biol. Bull. Mar. Biol. Lab. , Woods Hole 3, 43-84 (1902). Whiting, P. W. Selective fertilization and sex-determination in Hymenoptera. Science 78, 537-538 (1933). Whiting, P. W. Multiple alleles in complementary sex determination of Habrobracon. Genetics 28, 365-382 (1943). Wilson, E. B. The chromosomes in relation to determination of sex in insects. Science 22, 500-502 (1905).
|
D2197832
|
https://quizlet.com/78747186/ap-flash-cards/
|
A&P
|
33 terms guyton_temple A&PLearn Flashcards Write Spell Test Match Gravity Advertisement Upgrade to remove ads Sort What are the two major functions controlled by hormones Coordinate the activities of specific cells in certain parts on the body What are the chemical messengers of the endocrine system Hormones What are the changes that follow the binding of s hormone to its target cell Proteins are synthesized in cell plasma membrane permeability changes mitosis is stimulated enzymes are activated or inactivated What are prostaglandins Lipid hormones are manufactured in cell plasma membranes What type of stimulus prods organs into action by hormones Hormonal stimulus What are the tropic hormones Stimulate other endocrine glands to secrete hormones What are growth hormones Promotes growth in long bones and skeletal muscles What is the hypothalamus most closely associated with Pituitary gland What is a goiter and what causes it Enlargement of the thyroid gland resulting from a deficiency of dietary iodine What does hyposecreation of the anti diuretic hormone cause Gigantism Where is the thyroid gland located Below the Adam's apple What is the body's major metabolic hormone Thyroid hormone What element is necessary for proper thyroid function Iodine What hormone is released by the adrenal medulla Epinephrine What enzyme is produced by the kidneys when blood pressure drops Renin Rising blood levels of aldosterone cause the kidney tubules to Reabsorb sodium Glucocorticoids do what Help resist long term stress increase blood glucose levels decrease edema suppress in plasma motion Insulin is produced by what and where are they located Pancreatic beta cells in the pancreas Insulin works as an antagonist to what Glucagon Insulin causes Liver cells to convert glycogen to glucose and excrete into the blood The Pineal gland produces Melatonin The hormone that appears to help regulate our sleep wake cycles Melatonin The hormone responsible for the maturation of white blood cells known as T lymphocytes Thymosin Estrogens do what Develop of female secondary sexual characteristics What hormones play a role in reproduction Estrogen and progesterone What cells produce testosterone Leyden cells or interstitial cells What organ produces growth hormone Pituitary gland What organ produces prolactin Pituitary gland What organ produces thyroid stimulating hormone Pituitary gland What organ produces thyroxin Thyroid gland What organ produces cortisone Adrenal gland What organ produces insulin Pancreas What organ produces melatonin Pineal gland Advertisement Upgrade to remove ads Features Quizlet Live Quizlet Learn Diagrams Flashcards Mobile Help Sign up Help Center Honor Code Community Guidelines Students Teachers About Company Press Jobs Privacy Terms Follow us Language© 2018 Quizlet Inc.
|
D1998737
|
http://www.back-surgery.com/why-you-should-stop-taking-fish-oil-before-back-surgery/
|
Why You Should Stop Taking Fish Oil Before Back Surgery - Back Surgery
|
Why You Should Stop Taking Fish Oil Before Back Surgery Fish oils, and the omega 3 essential fatty acids this can contain, has become a popular remedy in recent years for aches and pains, including back pain. Omega 3 can lessen inflammation, encourage healthy circulation and cardiovascular health, improve mood, and help cell membranes function more optimally. However, if you’re scheduled for back surgery and are taking fish oil you will likely be told to stop the supplements a week or more before your procedure. Why? Read on to find out. What is Fish Oil? The kind of fish oil found in supplements is usually taken from cold water fish like mackerel whose bodies contain a lot of the omega 3 family essential fatty acids eicosapentanoic acid and docosahexanoic acid, or EPA and DHA for short. These long chain polyunsaturated fatty acids can be synthesised by the body from alpha linolenic acid (ALA) that is found in flaxseed, walnuts, and other plant foods but the conversion relies on a number of co-factors, including vitamins C and B6, as well as magnesium and zinc. By taking fish oil you’re cutting out the need to convert ALA to EPA and DHA, sparing these nutrients and energy for other processes in the body. Of course, not everyone wants to sacrifice fish for their own health needs and so it is possible to get EPA and DHA from the very same source that the fish get them from, namely marine algae. Algal oil is a rich source of EPA and DHA, albeit lower than fish oil concentrate, so any vegetarians, vegans, or those who simply don’t eat fish can still ensure a good intake of longer-chain EFAs for joint and heart health. What Does Fish Oil Do? The EFAs in fish oil have a number of effects on the body, including supporting cell membrane structure and function and providing necessary precursors for chemicals called eicosanoids such as prostaglandins which affect inflammation and blood coagulation, amongst other things. By improving cell membrane function omega 3 can help cells maintain hydration and let in and out nutrients and waste products, respectively. Healthy cell membranes also mean better electrolyte activity, helping the cells to communicate more effectively, and better responses to hormones such as insulin and parathyroid hormone which play a role in inflammation and bone health. In addition to helping keep cell membranes flexible and healthy, EFAs can be converted into prostaglandins, thromboxanes and leukotrienes, a group of chemicals called eicosanoids. These are involved in a whole raft of activities in the body, many of which have a direct effect on the experience of inflammation, pain, and swelling. Eicosanoids also influence blood pressure, heart rate, digestion, kidney function, nerve signalling, and hormone production. The EFA Synthetic Pathway I mentioned earlier that omega 3 found in the form of ALA in flax seed (as well as hemp seeds, walnuts, and chia seeds) can be converted into EPA and DHA in the body. The process by which this happens requires a number of steps, each requiring nutrient co-factors, a depletion of which can compromise conversion. The pathway is as follows: Alpha-linolenic acid (ALA) is converted to stearidonic acid, using the enzyme detla 6-desaturase (relies on vitamins B3, B6, and C, and magnesium and zinc). Stearidonic acid is converted to eicosatetranoic acid, using elongase (relies on co-factor B6). Eicosatetranoic acid is converted to eicosapentanoic acid (EPA), using delta 5-desaturase (relies on B3, zinc, and vitamin C). EPA is converted into docosapentanoic acid, using cyclo-oxygenase 5-lipoxygenase. Docosapentanoic acid is then converted into docosahexanoic acid (DHA), using elongase again. Throughout this process, the fatty acids are competing for the enzymes with other fatty acids from the omega 6 family, which begins with linoleic acid (LA), being converted to gamma-linolenic acid (GLA), di-homo-gamma-linolenic acid (DHGLA) and then arachidonic acid (AA). At the point where EPA and AA are synthesised the body can then create series 3 and series 2 prostaglandins and thromboxanes, and series 5 and series 4 leukotrienes respectively. Why Are EPA and DHA so Important? EPA and DHA, and the eicosanoids that can be produced from these, are important for managing inflammation and blood coagulation, amongst other things. People who have an excess of omega 6 (LA, GLA, or AA) in their diets, which is almost everyone in North American, will have higher levels of pro-inflammatory eicosanoids, as well as an increased risk of abnormal blood clotting, and blood vessel constriction, affecting blood pressure and increasing the risk of arterial damage. The eicosanoids metabolised from AA are also potent chemotoxic agents. Why is Arachidonic Acid Bad? You might be wondering why we have evolved the ability to synthesise these eicosanoids if they are so bad for the body. The fact is that we do need to be able to quickly produce an inflammatory response, to constrict blood vessels, and to clot the blood. These actions can help us fight off an acute infection, and prevent massive blood loss following an injury, as well as to direct blood flow to vital organs when needed. The problem occurs when the normal state of being is similar to that produced by a response to stress or trauma. Consistently high blood pressure, increased platelet aggregation (blood stickiness), and inflammation all increase the risk of damage to blood vessels and other tissues, including those in the spine. Meanwhile, increasing the levels of omega 3 fatty acids in the diet and favouring the metabolism of DHA and EPA and the eicosanoids associated with these can help decrease systemic inflammation, improve blood flow, and prevent dangerous blood clots forming. Why Limit Fish Oil Before Spine Surgery? Due to the effects of eicosanoids derived from fish oil, anyone taking these in the run-up to spine surgery may have a decreased ability to effectively form blood clots and stop blood loss. This is especially true if pain medications such as aspirin have also been used to manage back pain as these also have an anticoagulant effect. Fish Oil After Back Surgery Resuming fish oil supplementation a few days to a week after back surgery (under physician guidance) may help reduce swelling and pain, and lessen the risk of blood clots forming in the deep veins of the legs if the person is more sedentary than usual. As such, anyone who is taking fish oils, algal oil, or who has a very high intake of flax seeds, chia seeds, etc., should discuss tailing off their omega 3 consumption prior to elective surgery to minimise the risk of problematic bleeding. In addition, anyone whose diet is excessively high in animal products, which are the only dietary source of arachidonic acid, should consider a more plant-based diet for back surgery recovery as this may help lessen their risk of back surgery complications including pain, swelling, and even constipation and blood sugar dysregulation.
|
D391053
|
https://answers.yahoo.com/question/index?qid=1006050708629
|
Where is the difference between general purpose and specific purpose of a speech?
|
Education & Reference Higher Education (University +)Where is the difference between general purpose and specific purpose of a speech? Follow 1 answer Answers Relevance Rating Newest Oldest Best Answer: GENERAL PURPOSE The general purpose of any speech refers to the overall intent of the information in the speech. There are many general speech purposes.- to inform (either descriptive or process speeches), to persuade, (to actuate, convince, or stimulate), or to entertain. All you need to do in the section on general purpose is to write any one of the above general purposes you were assigned to accomplish. SPECIFIC PURPOSE A specific purpose is one of the most important items in your outline and in your speech. The specific purpose is the point, the objective, or the intention of the speech. The specific purpose should combine the general purpose and the specific topic on your outlinesoccer_mind · 1 decade ago0 0 Comment Specific Purpose Source (s):https://shrink.im/a9E2weber · 1 year ago0 0 Comment This Site Might Help You. RE: Where is the difference between general purpose and specific purpose of a speech? Source (s):difference general purpose specific purpose speech: https://tr.im/NYZ2s Anonymous · 3 years ago0 0 Comment Maybe you would like to learn more about one of these? Need a Small Business Loan? Looking for a new chandelier? Need debt consolidation loans? Find Moving Container Services
|
D2458811
|
http://www.hnom.org/ave.htm
|
.
|
Mary, the Mother of Jesus, is the patroness of Holy Name of Mary Parish. The following items are available on this web site: History of the Hail Mary prayer Hail Mary prayer in fifteen languages Litany of the Holy Name of Mary Lovely Lady Dressed in Blue Novena To Our Lady of the Miraculous Medal THE HISTORY OF THE HAIL MARY PRAYER. The Hail Mary is composed of three parts. The first two parts are from the New Testament written by Saint Luke. Annunciation by Murillo 1660-65"Hail, full of grace, the Lord is with thee, blessed art thou among women", are the words of the angel Gabriel at the Annunciation (Luke 1:28). Visitation"Blessed art thou among women and blessed is the fruit of thy womb", are the words of Mary's cousin Elizabeth, who was soon to become the mother of St. John the Baptist. These words were spoken at the Visitation (Luke 1:42). The words "Mary" and "Jesus" along with "Holy Mary, Mother of God, pray for us sinners now and at the hour of our death. Amen." were added by the Church. The Hail Mary prayer presented here in fifteen languages. Click any blue underlined item to view that item. English Latin Italian Spanish French Portuguese Dutch German Swedish Polish Tagalog Finnish Gaelic Indonesian Norwegian English Hail Mary, full of grace, the Lord is with thee. Blessed art thou among women, and blessed is the fruit of thy womb, Jesus. Holy Mary, Mother of God, pray for us sinners, now and at the hour of our death. Amen. Latin Ave Maria, gratia plena, Dominus tecum. Benedicta tu in mulieribus, et benedictus fructus ventris tui, Iesus. Sancta Maria, Mater Dei, ora pro nobis peccatoribus, nunc et in hora mortis nostrae. Amen. Italian Ave Maria, piena di grazia, il Signore è con te. Tu sei benedetta fra le donne, e benedetto è il frutto del tuo seno, Gesú. Santa Maria, Madre di Dio, prega per noi peccatori, adesso e nell'ora della nostra morte. Amen. Spanish Dios te salve, María, llena eres de gracia, el Señor es contigo. Bendita tú eres entre todas las mujeres, y bendito es el fruto de tu vientre, Jesús. Santa María, Madre de Dios, ruega por nosotros pecadores, ahora y en la hora de nuestra muerte. Amen. French Je vous salue, Marie, pleine de grâce, Le Seigneur est avec vous. Vous êtes bénie entre toutes les femmes, et Jésus, le fruit de vos entrailles, est béni. Sainte Marie, Mère de Dieu, priez pour nous, pauvres pécheurs, maintenant et à l'heure de notre mort. Amen. Portuguese Avé Maria, cheia de graça, o Senhor é convosco. Bendita sois vós entre as mulheres, e bendito é o fruto do vosso ventre, Jesus. Santa Maria, Mãe de Deus, rogai por nós pecadores, agora e na hora da nossa morte. Amen. Dutch Wees gegroet, Maria, vol van genade. de Heer is met u. Gij zijt de gezegende onder de vrouwen, en gezegend is Jezus, de vrucht van uw schoot. Heilige Maria, Moeder van God. bid voor ons zondaars, nu en in het uur van onze dood. Amen. German Gegrüßet seist du, Maria, voll der Gnade, der Herr ist mit dir. Du bist gebenedeit unter den Frauen, und gebenedeit ist die Frucht deines Leibes, Jesus. Heilige Maria, Mutter Gottes, bitte für uns Sünder jetzt und in der Stunde unseres Todes. Amen. Swedish Hell dig Maria, full av nåd. Herren är med dig. Välsignad är du bland kvinnor och välsignad är din livsfrukt Jesus. Heliga Maria Guds Moder bed för oss syndare nu och i vår dödsstund. Amen. Polish Zdrowaś Maryjo, laski pełna Pan z Tobą, błogosławionaś Ty miedzy niewiastami błogosławiony owoc żywota Twojego, Jezus. Święta Maryjo, Matko Boża, módl się za nami grzesznymi teraz i w godzinę śmierci naszej. Amen. Tagalog Abà, Ginoóng Maria! napupunò ka ng grasya, Ang Panginoóng Diyós ay sumásaiyó, Bukód kang pinagpalâ sa babaeng lahát, at pinagpalâ namán ang iyóng Anák na si Hesús. Santa Maria, Iná ng Diyós: ipanalangin mo kamìng makasalanan, ngayón at kung kamì'y mamamatáy. Amen. Finnish Terve Maria, armoitettu, Herra sinun kanssasi. Siunattu sinä naisten joukossa ja siunattu kohtusi hedelmä Jeesus. Pyhä Maria, Jumalanäiti, rukoile meidän syntisten puolesta nyt ja kuolemamme hetkenä. Amen. Gaelic Sé do bheatha, a Mhuire, atá lán de ghrásta, Tá an Tiarna leat. Is beannaithe thú idir mná, Agus is beannaithe toradh do bhroinne, Íosa. A Naomh-Mhuire, a Mháthair Dé, guigh orainn na peacaigh, anois, agus ar uair ár mbáis. Amen. Indonesian Salam Maria, penuh rahmat, Tuhan sertamu, terpujilah engkau di antara wanita, dan terpujilah buah tubuhmu, Yesus. Santa Maria, bunda Allah, doakanlah kami yang berdosa ini, sekarang dan waktu kami mati. Amen. Norwegian Hill deg, Maria, full av nåde, Herren er med deg, velsignet er du iblant kvinnene, og velsignet er ditt livs frukt, Jesus. Hellige Maria, Guds Mor, bed for oss syndere, nå og i vår dødstime. Amen. The Litany of the Holy Name of Mary (The responses for each of the following are shown in italics. )Beginning Lord, have mercy. Lord, have mercy. Christ, have mercy. Christ, have mercy. Lord, have mercy. Lord, have mercy. Son of Mary, hear us. Son of Mary, graciously hear us. Heavenly Father, of Whom Mary is the Daughter, have mercy on us. Eternal Word, of Whom Mary is the Mother, have mercy on us. Holy Spirit, of Whom Mary is the spouse, have mercy on us. Divine Trinity, of Whom Mary is the Handmaid, have mercy on us. Invocations and Response Mary, Mother of the Living God, pray for us. Mary, daughter of the Light Eternal, pray for us. Mary, our light, pray for us. Mary, our sister, pray for us. Mary, flower of Jesse, pray for us. Mary, issue of kings, pray for us. Mary, chief work of God, pray for us. Mary, the beloved of God, pray for us. Mary, Immaculate Virgin, pray for us. Mary, all fair, pray for us. Mary, light in darkness, pray for us. Mary, our sure rest, pray for us. Mary, house of God, pray for us. Mary, sanctuary of the Lord, pray for us. Mary, altar of the Divinity, pray for us. Mary, Virgin Mother, pray for us. Mary, embracing your Infant God, pray for us. Mary, reposing with Eternal Wisdom, pray for us. Mary, ocean of bitterness, pray for us. Mary, Star of the Sea, pray for us. Mary, suffering with your only Son, pray for us. Mary, pierced with a sword of sorrow, pray for us. Mary, torn with a cruel wound, pray for us. Mary, sorrowful even unto death, pray for us. Mary, bereft of all consolation, pray for us. Mary, submissive to the law of God, pray for us. Mary, standing by the Cross of Jesus, pray for us. Mary, Our Lady, pray for us. Mary, Our Queen, pray for us. Mary, Queen of Glory, pray for us. Mary, glory of the Church Triumphant, pray for us. Mary, Blessed Queen, pray for us. Mary, advocate of the Church Militant, pray for us. Mary, Queen of Mercy, pray for us. Mary, consoler of the Church Suffering, pray for us. Mary, exalted above the angels, pray for us. Mary, crowned with twelve stars, pray for us. Mary, fair as the moon, pray for us. Mary, bright as the sun, pray for us. Mary, distinguished above all, pray for us. Mary, seated at the right hand of Jesus, pray for us. Mary, our hope, pray for us. Mary, our sweetness, pray for us. Mary, glory of Jerusalem, pray for us. Mary, joy of Israel, pray for us. Mary, honor of our people, pray for us. Mary, Our Lady of the Immaculate Conception, pray for us. Mary, Our Lady of the Assumption, pray for us. Mary, Our Lady of Loreto, pray for us. Mary, Our Lady of Lourdes, pray for us. Mary, Our Lady of Fatima, pray for us. Mary, Our Lady of Czestochowa, pray for us. Mary, Our Lady of the Miraculous Medal, pray for us. Mary, Our Lady of Mount Carmel, pray for us. Mary, Our Lady of the Angels, pray for us. Mary, Our Lady of Dolors, pray for us. Mary, Our Lady of Mercy, pray for us. Mary, Our Lady of the Rosary, pray for us. Mary, Our Lady of Victory, pray for us. Mary, Our Lady of La Trappe, pray for us. Mary, Our Lady of Divine Providence, pray for us. Closing Lamb of God, Who takes away the sins of the world, spare us, O Lord Jesus. Lamb of God, Who takes away the sins of the world, graciously hear us, O Lord Jesus. Lamb of God, Who takes away the sins of the world, have mercy on us, O Lord Jesus. Son of Mary, hear us. Son of Mary, graciously hear us. Versicle - - I will declare your name unto my brethren. Response - - I will praise you in the assembly of the faithful. Let Us Pray: O Almighty God, Who beholds Thy servants earnestly desiring to place themselves under the shadow of the name and protection of the Most Holy Virgin Mary, grant, we beseech You, that by her charitable intercession, we may be delivered from all evil on earth, and may arrive at everlasting joys in Heaven, through Jesus Christ Our Lord. Amen. TO OUR LADY LOVELY Lady dressed in blue–— Teach me how to pray! God was just your little Boy, Tell me what to say! Did you lift Him up, sometimes, Gently, on your knee? Did you sing to Him the way Mother does to me? Did you hold His hand at night? Did you ever try Telling stories of the world? O! And did He cry? Do you really think He cares If I tell Him things–— Little things that happen? And Do the Angels’ wings Make a noise? And can He hear Me if I speak low? Does He understand me now? Tell me–—for you know! Lovely Lady dressed in blue, Teach me how to pray! God was just your little Boy. And you know the way. Author: Mary Dixon Thayer The Child On His Knees, pages 24 and 25 The Mac Millan Company, New York, 1926 This prayer-poem was popularized in the 1950s by Archbishop Fulton Sheen. Novena To OUR LADY OF THE MIRACULOUS MEDALLeader: In the name of the Father and of the Son and of the Holy Spirit. People: Amen Leader: Come, O Holy Spirit, fill the hearts of Your Faithful, and kindle in them the fire of Your love. Send forth Your Spirit, and they shall be created. People: And You shall renew the face of the earth. Leader: Let us pray. O God, who did instruct the hearts of the faithful by the light of the Holy Spirit, grant us in the same Spirit to be truly wise and ever to rejoice in His consolation, through Jesus Christ Our Lord. People: Amen. Repeat the following two lines, 3 times. Leader: O Mary, conceived without sin, People: Pray for us who have recourse to you. Leader and People: O Lord Jesus Christ, who have vouchsafed to glorify by numberless miracles the Blessed Virgin Mary, immaculate from the first moment of her conception, grant that all who devoutly implore her protection on earth, may eternally enjoy Your presence in heaven, who, with the Father and Holy Spirit, live and reign, God, for ever and ever. Amen. O Lord Jesus Christ, who for the accomplishment of Your greatest works, have chosen the weak things of the world, that no flesh may glory in Your sight; and who for a better and more widely diffused belief in the Immaculate Conception of Your Mother, have wished that the Miraculous Medal be manifested to Saint Catherine Labouré, grant, we beseech You, that filled with like humility, we may glorify this mystery by word and work. Amen. MEMORARELeader and People : Remember, O most compassionate Virgin Mary, that never was it known that anyone who fled to your protection, implored your assistance, or sought your intercession, was left unaided. Inspired with this confidence, we fly unto you, O Virgin of Virgins, our Mother; to you we come; before you we kneel sinful and sorrowful. O Mother of the Word Incarnate, despise not our petitions, but in your clemency hear and answer them. Amen. NOVENA PRAYERLeader and People : O Immaculate Virgin Mary, Mother of Our Lord Jesus and our Mother, penetrated with the most lively confidence in your all-powerful and never-failing intercession, manifested so often through the Miraculous Medal, we your loving and trustful children implore you to obtain for us the graces and favors we ask during this Novena, if they be beneficial to our immortal souls, and the souls for whom we pray. (Here privately form your petitions.) You know, O Mary, how often our souls have been the sanctuaries of your Son who hates iniquity. Obtain for us then a deep hatred of sin and that purity of heart which will attach us to God alone so that our every thought, word and deed may tend to His greater glory. Obtain for us also a spirit of prayer and self-denial that we may recover by penance what we have lost by sin and at length attain to that blessed abode where you are the Queen of angels and of men. Amen. AN ACT OF CONSECRATION TO OUR LADY OF THE MIRACULOUS MEDALLeader and People : O Virgin Mother of God, Mary Immaculate, we dedicate and consecrate ourselves to you under the title of Our Lady of the Miraculous Medal. May this Medal be for each one of us a sure sign of your affection for us and a constant reminder of our duties toward you. Ever while wearing it, may we be blessed by your loving protection and preserved in the grace of your Son. O most powerful Virgin, Mother of our Savior, keep us close to you every moment of our lives. Obtain for us, your children, the grace of a happy death; so that, in union with you, we may enjoy the bliss of heaven forever. Amen. Repeat the following two lines, 3 times. Leader: O Mary, conceived without sin, People: Pray for us who have recourse to you. Ave Maria (F. Schubert 1797-1828)
|
D3281668
|
http://www.esquire.com/food-drink/drinks/recipes/a3827/mint-julep-drink-recipe/
|
How to Make a Mint Julep
|
By Esquire Editors Mar 8, 2018 376Getty Images These days, we drink mint juleps by the gallon as we watch horses with names like Good Magic, Promises Fulfilled, and Audible tear around a race track. The cool, refreshing bourbon-based cocktail is near synonymous with the Kentucky Derby. But back in the 18th century, the mint julep was an American Southern cocktail that denoted the provider as a person of means. This mostly comes down to the fact it's made with ice, and ice was hard to come by back in the olden days. It's also a drink that was once traditionally served in a silver cup, and silver cups were not exactly common among working folk. Luckily, though, you don't have to travel all the way to Churchill Downs to get one. It's a pretty easy cocktail to make at home. All you need is bourbon, sugar, ice, and a few sprigs of fresh mint. And if you really want to do it right, a frosty pewter cup. Ingredients Yields: 1 serving3 oz. agave syrup bourbon5-6 mint leaves1 tsp. sugar Directions Prep Time: 0:05Cook Time: 0:00Total Time: 0:05Place mint leaves in the bottom of a pre-chilled, dry old-fashioned glass or pewter cup. Add sugar and crush slightly with a muddler. Pack glass with finely cracked ice. Pour a generous 3 ounces of Kentucky bourbon over the ice. Stir briskly until the glass frosts. Add more ice and stir again before serving. Stick a few sprigs of mint into the ice so that the partaker will get the aroma. A few things to keep in mind for a truly great mint julep: Use a pre-chilled, dry 12- or 14-ounce glass, tall and slim (better yet, a traditional silver beaker). Crack the ice, making sure to drain off any excess water before putting it in the glass. Don't handle the glass with bare hands, as the touch of a hand kills the frost. Likewise, each julep should be served with a napkin or small linen doily. The glass will not frost if in the wind, if wet, with undried ice, or if excessively handled. You can sometimes speed the frost by twirling the glass or by placing it in coldest part of refrigerator for about 30 minutes. Use only the freshest mint and, of that, the smallest, most tender leaves. If you use a straw, keep it short so you can get your nose in among the mint.
|
D2837738
|
http://www.bloomberg.com/research/stocks/private/people.asp?privcapId=128209
|
Key Executives for Fiserv, Inc.
|
March 27, 2018 12:56 PM ETIT Services Company Overview of Fiserv, Inc. Snapshot People Overview Board Members Committees Key Executives for Fiserv, Inc. Name Board Relationships Title Age Jeffrey W. Yabuki 35 Relationships President, CEO & Director 57Robert W. Hau No Relationships CFO & Treasurer 51Mark A. Ernst 10 Relationships Chief Operating Officer 59Thomas A. Allanson No Relationships President of Electronic Payments 59Kevin Collins No Relationships President of Lending Solutions --View More Key Executives Fiserv, Inc. Board Members*Name Board Relationships Primary Company Age Glenn Morris Renwick 128 Relationships The Progressive Corporation 62Jeffrey W. Yabuki 35 Relationships Fiserv, Inc. 57Kim Marie Robak 39 Relationships Fiserv, Inc. 62Doyle R. Simons 39 Relationships Weyerhaeuser Company 53Denis J. O'Leary 41 Relationships Fiserv, Inc. 61View All Board Members Fiserv, Inc. Executive Committees*Committee Name Chairperson Board Relationships Members Audit Committee Denis J. O'Leary 41 Relationships 3 Executives Compensation Committee Doyle R. Simons 39 Relationships 4 Executives Nominating Committee Kim Marie Robak 39 Relationships 3 Executives Corporate Governance Committee Kim Marie Robak 39 Relationships 3 Executives View Committee Details*Data is at least as current as the most recent Definitive Proxy. Request Profile Update\
|
D2895054
|
http://emedicine.medscape.com/article/1240789-treatment
|
Approach Considerations
|
Approach Considerations If a congruent reduction cannot be achieved or if the dorsal instability is unstable in 30° of supination, then arthroscopic evaluation of the triangular fibrocartilage complex (TFCC) is recommended with repair as needed. Repairing TFCC tears is contraindicated in the presence of infection or degeneration. Palmer class 2 degenerative TFCC tears (see Overview, Pathophysiology) represent a pathologic progression of disease associated with ulnar impaction syndrome. Degeneration of the TFCC is found with repetitive pronation and axial grip loading in association with positive ulnar variance and impaction between the ulnar head and the proximal pole of the lunate. Treatment of degenerative TFCC tears associated with ulnar impaction syndrome consists of nonoperative treatment first with immobilization, avoidance of aggravating activities, and nonsteroidal anti-inflammatory drugs (NSAIDs). Palmer class 2A and 2B lesions that fail to respond to conservative treatment are treated with gentle debridement. If the patient is ulnar-positive and symptomatic, a formal ulnar shortening is considered. An arthroscopic wafer is contraindicated, in that this would require resection of intact TFCC to perform the procedure or require performing the procedure entirely through the distal radioulnar joint (DRUJ) portals. The surgical indications for an arthroscopic wafer procedure are a Palmer class 2C or 2D lesion in a positive ulnar variance of not more than 2 mm without evidence of lunate-triquetrum instability. If lunate-triquetrum instability is present, this is addressed with formal ulnar shortening in an attempt to tighten the ulnocarpal ligaments and decrease the motion between the lunate and triquetrum. For patients with a positive ulnar variance of more than 2 mm, formal ulnar shortening is performed. For patients with neutral or negative ulnar variance and a Palmer class 2C lesion, an arthroscopic debridement is performed. Palmer class 2E lesions respond unpredictably to arthroscopic debridement. They are usually treated with a salvage procedure such as a limited ulnar head resection, a Sauve-Kapandji procedure, or a Darrach procedure that addresses the DRUJ and lunotriquetral (LT) joint pathology. Next: Medical Therapy
|
D2443248
|
https://weatherspark.com/m/23912/3/Average-Weather-in-March-in-New-York-City-New-York-United-States
|
Average Weather in March in New York City New York, United States
|
Average Weather in March in New York City New York, United States Daily high temperatures increase by 9°F, from 46°F to 55°F, rarely falling below 34°F or exceeding 68°F. Daily low temperatures increase by 8°F, from 33°F to 41°F, rarely falling below 21°F or exceeding 50°F. For reference, on July 21, the hottest day of the year, temperatures in New York City typically range from 71°F to 85°F, while on January 29, the coldest day of the year, they range from 28°F to 39°F. Average High and Low Temperature in March The daily average high (red line) and low (blue line) temperature, with 25th to 75th and 10th to 90th percentile bands. The thin dotted lines are the corresponding average perceived temperatures. The figure below shows you a compact characterization of the hourly average temperatures for the quarter of the year centered on March. The horizontal axis is the day, the vertical axis is the hour of the day, and the color is the average temperature for that hour and day. Average Hourly Temperature in March The average hourly temperature, color coded into bands: frigid < 15°F < freezing < 32°F < very cold < 45°F < cold < 55°F < cool < 65°F < comfortable < 75°F < warm < 85°F < hot < 95°F < sweltering. The shaded overlays indicate night and civil twilight. Gedzhukh, Russia (5,672 miles away) and Yatsuomachi-higashikumisaka, Japan (6,752 miles) are the far-away foreign places with temperatures most similar to New York City ( view comparison ). Clouds The month of March in New York City experiences essentially constant cloud cover, with the percentage of time that the sky is overcast or mostly cloudy remaining about 51% throughout the month. The clearest day of the month is March 12, with clear, mostly clear, or partly cloudy conditions 50% of the time. For reference, on January 3, the cloudiest day of the year, the chance of overcast or mostly cloudy conditions is 53%, while on August 29, the clearest day of the year, the chance of clear, mostly clear, or partly cloudy skies is 64%. Cloud Cover Categories in March The percentage of time spent in each cloud cover band, categorized by the percentage of the sky covered by clouds: clear < 20% < mostly clear < 40% < partly cloudy < 60% < mostly cloudy < 80% < overcast. Precipitation A wet day is one with at least 0.04 inches of liquid or liquid-equivalent precipitation. In New York City, the chance of a wet day over the course of March is gradually increasing, starting the month at 26% and ending it at 29%. For reference, the year's highest daily chance of a wet day is 35% on August 1, and its lowest chance is 22% on January 28. Over the course of March in New York City, the chance of a day with only rain increases from 19% to 27%, the chance of a day with mixed snow and rain decreases from 5% to 1%, and the chance of a day with only snow remains an essentially constant 1% throughout. Probability of Precipitation in March The percentage of days in which various types of precipitation are observed, excluding trace quantities: rain alone, snow alone, and mixed (both rain and snow fell in the same day). Rainfall To show variation within the month and not just the monthly total, we show the rainfall accumulated over a sliding 31-day period centered around each day. The average sliding 31-day rainfall during March in New York City is rapidly increasing, starting the month at 2.6 inches, when it rarely exceeds 4.9 inches or falls below 1.0 inches, and ending the month at 3.7 inches, when it rarely exceeds 6.5 inches or falls below 1.4 inches. Average Monthly Rainfall in March The average rainfall (solid line) accumulated over the course of a sliding 31-day period centered on the day in question, with 25th to 75th and 10th to 90th percentile bands. The thin dotted line is the corresponding average liquid-equivalent snowfall. Snowfall We report snowfall in liquid-equivalent terms. The actual depth of new snowfall is typically between 5 and 10 times the liquid-equivalent amount, assuming the ground is frozen. As with rainfall, we consider the liquid-equivalent snowfall accumulated over a sliding 31-day period centered around each day. The average sliding 31-day liquid-equivalent snowfall during March in New York City is gradually decreasing, starting the month at 0.5 inches, when it rarely exceeds 1.6 inches, and ending the month at 0.1 inches, when it rarely exceeds 0.4 inches. Average Monthly Liquid-Equivalent Snowfall in March The average liquid-equivalent snowfall (solid line) accumulated over the course of a sliding 31-day period centered on the day in question, with 25th to 75th and 10th to 90th percentile bands. The thin dotted line is the corresponding average rainfall. Sun Over the course of March in New York City, the length of the day is rapidly increasing. From the start to the end of the month, the length of the day increases by 1 hour, 21 minutes, implying an average daily increase of 2 minutes, 42 seconds, and weekly increase of 18 minutes, 57 seconds. The shortest day of the month is March 1, with 11 hours, 17 minutes of daylight and the longest day is March 31, with 12 hours, 39 minutes of daylight. Hours of Daylight and Twilight in March The number of hours during which the Sun is visible (black line). From bottom (most yellow) to top (most gray), the color bands indicate: full daylight, twilight (civil, nautical, and astronomical), and full night. The earliest sunrise of the month in New York City is 6:15 AM on March 10 and the latest sunrise is 58 minutes later at 7:14 AM on March 11. The earliest sunset is 5:47 PM on March 1 and the latest sunset is 1 hour, 33 minutes later at 7:19 PM on March 31. Daylight saving time (DST) starts at 3:00 AM on March 11, 2018, shifting sunrise and sunset to be an hour later. For reference, on June 21, the longest day of the year, the Sun rises at 5:24 AM and sets 15 hours, 6 minutes later, at 8:30 PM, while on December 21, the shortest day of the year, it rises at 7:16 AM and sets 9 hours, 15 minutes later, at 4:31 PM. Sunrise & Sunset with Twilight and Daylight Saving Time in March The solar day over the course of March. From bottom to top, the black lines are the previous solar midnight, sunrise, solar noon, sunset, and the next solar midnight. The day, twilights (civil, nautical, and astronomical), and night are indicated by the color bands from yellow to gray. The transitions to and from daylight saving time are indicated by the 'DST' labels. Humidity We base the humidity comfort level on the dew point, as it determines whether perspiration will evaporate from the skin, thereby cooling the body. Lower dew points feel drier and higher dew points feel more humid. Unlike temperature, which typically varies significantly between night and day, dew point tends to change more slowly, so while the temperature may drop at night, a muggy day is typically followed by a muggy night. The chance that a given day will be muggy in New York City is essentially constant during March, remaining around 0% throughout. For reference, on August 2, the muggiest day of the year, there are muggy conditions 54% of the time, while on December 15, the least muggy day of the year, there are muggy conditions 0% of the time. Humidity Comfort Levels in March The percentage of time spent at various humidity comfort levels, categorized by dew point: dry < 55°F < comfortable < 60°F < humid < 65°F < muggy < 70°F < oppressive < 75°F < miserable. Wind This section discusses the wide-area hourly average wind vector (speed and direction) at 10 meters above the ground. The wind experienced at any given location is highly dependent on local topography and other factors, and instantaneous wind speed and direction vary more widely than hourly averages. The average hourly wind speed in New York City is gradually decreasing during March, decreasing from 10.2 miles per hour to 9.3 miles per hour over the course of the month. For reference, on February 26, the windiest day of the year, the daily average wind speed is 10.3 miles per hour, while on August 1, the calmest day of the year, the daily average wind speed is 6.2 miles per hour. Average Wind Speed in March The average of mean hourly wind speeds (dark gray line), with 25th to 75th and 10th to 90th percentile bands. The wind direction in New York City during March is predominantly out of the west from March 1 to March 14 and from March 21 to March 31 and the north from March 14 to March 21. Wind Direction in March The percentage of hours in which the mean wind direction is from each of the four cardinal wind directions (north, east, south, and west), excluding hours in which the mean wind speed is less than 1 mph. The lightly tinted areas at the boundaries are the percentage of hours spent in the implied intermediate directions (northeast, southeast, southwest, and northwest). Water Temperature New York City is located near a large body of water (e.g., ocean, sea, or large lake). This section reports on the wide-area average surface temperature of that water. The average surface water temperature in New York City is gradually increasing during March, rising by 3°F, from 39°F to 42°F, over the course of the month. Average Water Temperature in March The daily average water temperature (purple line), with 25th to 75th and 10th to 90th percentile bands. Growing Season Definitions of the growing season vary throughout the world, but for the purposes of this report, we define it as the longest continuous period of non-freezing temperatures (≥ 32°F) in the year (the calendar year in the Northern Hemisphere, or from July 1 until June 30 in the Southern Hemisphere). The growing season in New York City typically lasts for 7.8 months ( 238 days ), from around March 29 to around November 22, rarely starting before March 12 or after April 14, and rarely ending before November 4 or after December 13. During March in New York City, the chance that a given day is within the growing season is very rapidly increasing rising from 0% to 57% over the course of the month. Time Spent in Various Temperature Bands and the Growing Season in March The percentage of time spent in various temperature bands: frigid < 15°F < freezing < 32°F < very cold < 45°F < cold < 55°F < cool < 65°F < comfortable < 75°F < warm < 85°F < hot < 95°F < sweltering. The black line is the percentage chance that a given day is within the growing season. Growing degree days are a measure of yearly heat accumulation used to predict plant and animal development, and defined as the integral of warmth above a base temperature, discarding any excess above a maximum temperature. In this report, we use a base of 50°F and a cap of 86°F. The average accumulated growing degree days in New York City are gradually increasing during March, increasing by 43°F, from 17°F to 59°F, over the course of the month. Growing Degree Days in March The average growing degree days accumulated over the course of March, with 25th to 75th and 10th to 90th percentile bands. Solar Energy This section discusses the total daily incident shortwave solar energy reaching the surface of the ground over a wide area, taking full account of seasonal variations in the length of the day, the elevation of the Sun above the horizon, and absorption by clouds and other atmospheric constituents. Shortwave radiation includes visible light and ultraviolet radiation. The average daily incident shortwave solar energy in New York City is increasing during March, rising by 1.2 k Wh, from 3.4 k Wh to 4.7 k Wh, over the course of the month. Average Daily Incident Shortwave Solar Energy in March The average daily shortwave solar energy reaching the ground per square meter (orange line), with 25th to 75th and 10th to 90th percentile bands. Topography For the purposes of this report, the geographical coordinates of New York City are 40.714 deg latitude, -74.006 deg longitude, and 7 ft elevation. The topography within 2 miles of New York City is essentially flat, with a maximum elevation change of 85 feet and an average elevation above sea level of 11 feet. Within 10 miles is essentially flat ( 367 feet ). Within 50 miles contains only modest variations in elevation ( 1,657 feet ). The area within 2 miles of New York City is covered by water ( 58%) and artificial surfaces ( 40% ), within 10 miles by artificial surfaces ( 78%) and water ( 20% ), and within 50 miles by artificial surfaces ( 32%) and trees ( 32% ). Data Sources This report illustrates the typical weather in New York City year round, based on a statistical analysis of historical hourly weather reports and model reconstructions from January 1, 1980 to December 31, 2016. Temperature and Dew Point There are 3 weather stations near enough to contribute to our estimation of the temperature and dew point in New York City. For each station, the records are corrected for the elevation difference between that station and New York City according to the International Standard Atmosphere, and by the relative change present in the MERRA-2 satellite-era reanalysis between the two locations. The estimated value at New York City is computed as the weighted average of the individual contributions from each station, with weights proportional to the inverse of the distance between New York City and a given station. The stations contributing to this reconstruction are: New York City, Central Park (57%, 8 kilometers, northeast); Newark Liberty International Airport (29%, 14 kilometers, west); and John F. Kennedy International Airport (15%, 22 kilometers, east). Other Data All data relating to the Sun's position (e.g., sunrise and sunset) are computed using astronomical formulas from the book, Astronomical Tables of the Sun, Moon and Planets, by Jean Meeus. All other weather data, including cloud cover, precipitation, wind speed and direction, and solar flux, come from NASA's MERRA-2 Modern-Era Retrospective Analysis. This reanalysis combines a variety of wide-area measurements in a state-of-the-art global meteorological model to reconstruct the hourly history of weather throughout the world on a 50-kilometer grid. Land Use data comes from the Global Land Cover SHARE database, published by the Food and Agriculture Organization of the United Nations. Elevation data comes from the Shuttle Radar Topography Mission (SRTM), published by NASA's Jet Propulsion Laboratory. Names, locations, and time zones of places and some airports come from the Geo Names Geographical Database. Time zones for aiports and weather stations are provided by Ask Geo.com. Maps are © Esri, with data from National Geographic, Esri, De Lorme, NAVTEQ, UNEP-WCMC, USGS, NASA, ESA, METI, NRCAN, GEBCO, NOAA, and i PC. Disclaimer The information on this site is provided as is, without any assurances as to its accuracy or suitability for any purpose. Weather data is prone to errors, outages, and other defects. We assume no responsibility for any decisions made on the basis of the content presented on this site. We draw particular cautious attention to our reliance on the MERRA-2 model-based reconstructions for a number of important data series. While having the tremendous advantages of temporal and spatial completeness, these reconstructions: (1) are based on computer models that may have model-based errors, (2) are coarsely sampled on a 50 km grid and are therefore unable to reconstruct the local variations of many microclimates, and (3) have particular difficulty with the weather in some coastal areas, especially small islands. We further caution that our travel scores are only as good as the data that underpin them, that weather conditions at any given location and time are unpredictable and variable, and that the definition of the scores reflects a particular set of preferences that may not agree with those of any particular reader.
|
D1735537
|
http://beforeitsnews.com/health/2013/04/do-flax-seeds-help-with-weight-loss-2480982.html
|
Do Flaxseeds Help with Weight Loss?
|
By Kyle Norton Contributor profile | More stories Story Views Now: Last Hour: Last 24 Hours: Total: Do Flaxseeds Help with Weight Loss? Saturday, April 13, 2013 6:25Home of Kyle J. Norton for The Better of Living & Living Health Guested Author: Elena Mauceri Yup. It’s true. Flax seeds can help you to lose weight. How?�ϋO��n<�*�iq7X�TY��-c��w M�72ft�y�����ݤ�)V����7��^�d Q~j���*�@�pe���F���7�v Oa�Z��9νK�yo�y���W�V���*��"A=�����ij�$g� ۫O�J�oyw���M����������w�բ��97�1%U�������FHĮ*sr M�68������ٸk V��އ��n3.����� Z�l��a�i T�A��o F�Z�i5 o57c 3����e��f˯\��ђ|����_���7���?�z�p����6�6���� ��dv?7��_������\��<�]�_"C|s 0��HK�0� [F� ru� {���:�:�-zv�:�#���CO2�E�����c$����@ ��� L��9�rh C��=��#e#�L� [�5�3�^Gt AP�+*�Q��G�8�������r?4����?�?�����y�2,��� c��z��I�3z��I�3 54�� �S�>�R)�3�!��;�#�>?=�b&�&A\q WI #���4������})�#���Qbt���ݛ�x)��w��ݸ�&X�"�l����p E��ĺ�� � n � ��Y�����@m (�3��=�R,��s~��Hy�1� ������-����C�Y�� �)����Yk�L=�X&�BSD�f �"��k �<;���7�h C# tŔ����f�����$�5� u� { �h��p�3�54h�f�`��� (ℼ�kb Wb B.u Zg*��hs��0 �m�v0t�ź@\e�"%�_��Q$MHR�����p�>�����Ct�v|41�%#`��q�b�d�� ����x��� (|��`�.u����9������XVt�p6�W� �?��ǁk�^�w F`�#�X����W�d`���m��0Xݓ�a����c�9a���Sa�c Sr��N�D�$ [� ("�&<:7���Y&������d�X��d Y�!�l�� ���B���<��8�e�R���Sd���<��i������2�X�\3t�+ �7/îY6K�$�K ģ�T�N��xڡ���\6ɥj��`��K6�PYk ҄��<�m>c2 ���I�2l6,��v����K>,����f�j �Ԛ��mm�Q�3T� (��1hy�7Ĥd�A�D {�Q�r���-䗁��p�̪4GB�B<�$c]�a (�]hg3@����Y���zv��w�q Fx��v`?�߉�ߕ6�y Lg�M�;����>�D��z!���n�ч�;��]mi�v�b������R�4ޅ��ţ�x {�5ܛx�"��7'���"�]Χ��0�m���b Mg����ꮕ�����nղ�4~�ي$�f�έp�7�m�l��6g�ě�u��0 �כ����y]2��%��;�9��f�'D��S��J�ު�]I�s�Q �Z��f���T ��n4KU�9���� [ #\妃͜�x��� [f��g z LN\~��E��8�ƅ:��V��Vk�<�K��Y���+y J������V��^��. ?�)a:���nӛU���C� �o��l��%����Rޗk��\R����ihsu����2�i����>fۣB�) {x� M zc B�k K_2X�Eߒ4o�ct���u�g��%6h��,_b�VM:�]�M@�����t X���-���갮���8�����҃ 2Z|p���Ou S����դ�Rk�v1��P�Җh�8���<�W`#QS�Vml+�O�`v��ϧ;U���\���Q]�� ��G5}:���W�v N�%� [q73RW�:�=y"5���� [�@�Y�K0^���p Z�c {Q�Z�F�� �`�����o, ��ϞБ-.�k�=���UE�j��|6X ��X���C_�Ӽ4���6kc W�vd�`�k� w>�`� ��D3�뢆�+���b�5?���Rmg˥�� �>�8��ި��������!��L3pm��UI+ڽI� ��6��|����p V�=Я�+ٗ?%@N�و� [&��� ̗��]�&��u����|>���=��7;�ܺ]��9�E�n�����N�`�X��>�4}��������}��h5����pmw�Z�y������/ժ�D�-1��9Y���ҒKzn1k�r}�����5��� (`m��Gќ��.� ��m-X'��&z;����z��^g��F$�� (�!~D���xk�����t�����Znx R�gࣰ&>�C�al�e�~Jh�Ɵv V"5��*�k��~��D�&��� {��Xc MX��\c~ �6�]�\�Yd�EM?�]B�?�Ai ���d��7p�B��q���F_�цؒ�d��Q'�4z�����|����7i���h�.�xԛ��>N�4C6�)���vl#�;S$XX�� ��b! {s�f|~�m��� [�9 �j8�ެqxq�ֿ3������l�6�.���x O "<�!�c����z F�y {�"���t������ĜT���\j �������GE$;�8E6 �ӎ��>�� ֘|��OY��A�V}ζF�7"D͍*n��-c�U:�5f�b����f C�ԕ k4��u v���>]WP�:��N��Nw�������F4N [;���i E�y�� {��d/���1�#��H�䇈�4�Z�U��`>�;�uk>Fg�����Y]�6 &+�K_��v����~�7a����n���H��a�� [����4l S�*�+���i5�k [�7��HЛ!_���;��MIH�n���S���U�or� {P {�ښ`���9&�v Hƈ�l C�����!n���\���\k (�G�OՐ���K� �����)½������A��wg� p���t�����0� \�Q.6c�Ip�,w���U����|�\�Z� � z6泉+W��!OX_=�lЬ��3�S����s Q< [j�a��0/��\H�x-�!�Ȟ��Q%�z��:��Hu�o A�k;w9�� ����}��i�Y@l�. !�� (/f�<��:��uΉƄJ�~#�C��V��H'��q M�p��f ZA^k RGZ�]��5���>�F� "�K4ē��|V�g@'�vѨz�q �X �k�J@����\�L*rך {���d2�!f�s B�js��]� ���� (C5w�J��uw7��6�����h M��HA�v T%s �g��3 ()c}�,�._Es [ {��d�.�'T�����Guvq�7d/a�^�@����SYo V�r'����t��T��V}@K�1ԅ;���l�U�� �����p����d.�i�q}��z���:��#U�v�:��.��0�!��DX�w�yh�I�?�'�_��r#WK�c��Tľ9���p�7�ڍC�����g�K��s_�x챠�D<�m P�h�t�w�r���+d�M��O����0����D9=���?����$� ,�"�������qĝ��3:���x��E�@�ى%L���M��������hw�.�'� y���?�<P۷jk6Y���'�~K���/��|y�s�P��l~&/SP} (� [�6Ҋ��s�G��0%��F�ɺ"�`f@���Y��1�Tzۚ6��<3���JP�ܪ��T�ۺ:��Z�zq��>��j���E�e ��� jpwy���}��9&�F2l��V�l@w���-�������k�i�ض��:�c�s_.����>�������Ӫq>��w4W����E|�g�yb7�`����9�`�U���6����k�DR���J�]�l`� �k��s����K�W; [���s���q%���%�k`�9������u Q����o��E����= ��h� ~���d� qi��к��!�������Ջ��G�s E�3#���͡��+B���X_��WQ��C�����^�X��I��l���&��A�\Έlv F���f C~��&�ݛ��%Bm����R��1 (5݅: K�F�o��� &����kc XC�G��Dy��۴�@�6�J�R�e���9�+5��o!�ua�ȞAg�=�;��Z'P�p�V�B��z���_�3 {�_D2��4�&h�f�-ܯ�� � 1�����K����l�����C��A���$���_j��0}�'�|M�w�Ϋo� �/��Q�P�~���A�8� ��%.�OU]� (�"��� �^|ۥ�=�h�. {r���������g U�A��F�*k F�6� {L�O7k YWv��0���1^A.7�|�7�о�w���Pq�|�3�|L�Y�$Gԛ�E #��~��f Nշ��,)}�1�$7��P��Fڧ�j�6o�zh 8�F { {�&�� ������ {F,�Bֺ��/��w Q��ܽIg��;����d ��7�ry�o/���`� {���+�v+�A\���!�1�?�����3�ML��S?�/��0�I��� ]T {���o F�7���� �Z�F��� %�e��h����*�}�c-���O��$k+��5̡��_��@V�j�)�o��O��﮵X�����~��P�#l�k���g Q�⃟�疜�s|in; �!���\��� {�}��"��@�> [�E~s�I��^F6BU af/`�!O�\��C���k�>�I�����m���/�y��,f���ꇎq�j��"��E5X�hy��h�g Rc���N���� ��u��� {a�a��.���������Y�.����i�����6�yr���A {;�����������z�ضvd���ꮲ ��u ~ (�P��]�?#e U�B�u�f�5g�a�N����&��o�H�a˚�\|GH�h�zˀ<���<9v����6Wr����5� �'ٻ��S%�k�������6���r|=}�R���K �C�������c����e�S&/���l�Mt�-��@t&W~SL� l O��4�v����GJʹ}���\�7�L��ߨ|^�:��\����ʕ�|����od�;2�UF��Hd >O�")�D�n M�8+�Aّ�T�W��Ki�J�z����qŢ�����Cv L«m�f���E��&}��w`&r Y�m�����D$�y o�ZS`^��%��� [��֔ZթZ�єy���Ҍ�Nji� �d�;��;���߳���� (�|e2 �Ȥ ����ẫ��Z�jj��3K��YYXu�B_|ou�V�W (���n Y [E�����T�K��f�~������V�;Z���'�<.��B}]���� �� o Z *���*���5�����y-;��j Y5X�]_WZ%�����7��y N���9�Qv����-���n��Ŀcz� {��L\. @k���^U�.�Ffu Z��x :�N���7�|w3�X�C�����C�=d [\t�3c [��7��N��̈́�!�����9�1���3vw��w �#��W�! �]��}�N���%���L/>����ߘ\��l^I�_Ѹu N��� �M)����&:=�7 ���d^�e.a���v���� ̿��_J�,�����3��c R*w]�i����M������7�T�#�g�d P>�Υ�z��Cx�M3�ym�Well, flax seeds are very high in fiber. Health experts have promoted the use of fiber for weight loss, and with good reason. Fiber makes you feel full because it absorbs fluid, then expands, which creates a satisfied feeling. Research supports the use of flax seeds for weight loss, too. It is proven to reduce blood sugar levels, and may even help to prevent type 2 diabetes! Healthy blood sugar levels are critical to achieving, and maintaining, a healthy weight. Flax seeds also have a whole host of other nutrients that make them a true superfood. They are known for their anti-inflammatory and anticancer abilities. So use flaxseed for weight loss–you’ll get lots of additional benefits!How do you eat flax seed? I don’t recommend using flax seed oil because it can go rancid so easily. It’s a very fragile oil, and must be kept away from any light and refrigerated at all times, or it will go bad. Some people have difficulty digesting oils, too. So it’s best to eat flax seed in its whole seed form, or grind it just before you’re going to use it. I grind about a cup at a time, then keep it in the fridge. I use this up within a week, so it stays very fresh. You can use your blender to grind the seeds, or a food processor. Some people use a coffee grinder–just make sure you clean all the coffee grounds out before you put the flax seed in!There are LOTS of ways you can eat flax seed. I make low carb muffins with it, using ground flax seed as a flour replacement. You can add flax seeds to just about anything. It’s best to eat them raw. I sometimes put a teaspoon or two into my smoothies. This makes for a grain-y smoothie that might need some chewing, but I like that. Give it a try. Another way to eat flax seed is in a pre-made fiber mix. There are several fiber products available that include flax as a primary ingredient. You could also use a fiber product during the mid-afternoon when you get the “munchies”, and it will help to keep you from turning to fattening foods. Bottom Line The connection between flax seeds and weight loss is strong, and research shows the importance of fiber for weight loss. Use flaxseed in a variety of ways, including shakes/smoothies and in your baking recipes. It will keep you full, and away from eating foods that promote weight gain. Learn about the best diet for weight loss at http://www. Quick-Weightloss-Solutions.com. This site provides unique, proven weight loss solutions that WORK, including the SECRET to lasting weight loss. (It’s a pleasant surprise! )Chinese Secrets to Fatty Liver and Obesity Reversal A groundbreaking e book about why almostnobody in China suffers from fatty liver or obesity Back to Vitamin and minerals for http://medicaladvisorjournals.blogspot.ca/p/the-world-most-healthy-food-recipes.html Back to home of living health of 50 and over http://healthyliving50over.blogspot.ca/http://medicaladvisorjournals.blogspot.com2013-04-13 06:18:39Source: http://medicaladvisorjournals.blogspot.com/2013/04/do-flax-seeds-help-with-weight-loss.html Source: We encourage you to Share our Reports, Analyses, Breaking News and Videos. Simply Click your Favorite Social Media Button and Share.��d��1O��>���f�9Ԇ�C�&*�_:�!�@� {��䑲�n&�-U��a��h��:��P�+K� {�����>~9 (����F;}��/��p�g U�=N�KA�8��ؾ��`��� p��W�)��yn F [����*h S��D!���9�\E��˘� KAVt����b��!����6 �)����Y�d��Sty���l�*�_D�"p (��D�|�p�/U�w̡)��zs^���|���E��� ���K�l {��kd�$1�t��%�W+��ES뒮-�V�b�����0Ɠ`6�__S�).���*��/Ey L9�8�ϑQ�g�"����ǔ�����T��9,"GAm���9 (�AO8t R|L�P�H�Y�"s�ǔ���A��cr�;/-~��)����. X� A��n��#�d �Bn��n�223�?�T� {H~ ��� [�A!��"<���|Lyv���? A� ����%S���?or������^u K�H����?c I���/�vo H����E�M= ?�Š�E)�I��U�̹R>; ��A���-r����$ ���K��N�V��@Ü>�8�2��c����vv�^� N�P���vw�z LB�$jx1���.j���bf7:��q�:�^�Fu#�c ����*ZF (<.^��#f�:�L.ڟ���L� A���χ�_������%W}x�D��Z�z�S������띴yw-����ӻ�r$��Z�B���^&j�_c�Y�$�!_�o�� (��$�M*�i� [��OP��' j�WТ�N�J���-�ǩp (]|�N���E���s]J�E�����I���Ԩ1�rh Or��Lv�t|�DȽ����Q�h����Xp.���"��d�n�^Iyx4�Qg��v�˦g)=܄�Y�fq��F:�ۺʼn�S~)�Ya)J/$�-�)�Y� �lv���E�ϋy��r�yj�I����I��u�A�?9� {M���0�-f J`��+��y�}��I���â���g� ��CJ~&& {ړ;WB�?�y���FW:�0;�s F��������� (��9\\ș�N�N� (AN�0OQ]l�;A� {$�+����~3Xm (�丘��P�}�HZ׀�v.�!�M=Ab�JH�x���b*ǧ��`�P�~ (K�F�u�s���~\�D&��w S9�7Oc-���G��?����֒�ԯx���L=h����a O�}'�r�?��i ]��E�n W,�z��D�o�>c���y��?�w`I?���k����;��-Ѵ��+GG|�+��ŒO;��݊�H��q�k���Š�혫�*Ķ��]�z�I�k��_��U<���_PC�'��b6\r��-�u���yv$�Lõu,���:�g�Λ_�Ou����l�C���ȡ"֫��b���3]���E �f�����X�p�B�7���,�C [u A�����: K�F�f�ߪOl���9u�YT6'����n�q��V� {�b��� d���˫z�1��@�7�ٵEc���8-��s�چ�dg���`�e4���5M4��p��˨;�]��ˑ�ԃ2�be����3�b�+bc Wd�L��-,f V�%�U�l�GU�: S��Ђ�*o�l���=R7Z��}��_Ov ~6��JN��a�mvq �h���6�V�^��z-=5a�W5w��7s}�����r8�n�|���E���V�1�7O�ϊ^g]�c|�yc�5�"�F����Y �*����> [Q�65X�#���5�e}#�6Ÿ����e�g����4��]��OWHϭ �s�)�h��x���3u�c�d T��\ E�f��� [As+���s�^���m��D��Zg��u����o��e��5�����"Yڳ�����@�a ���; [��:�Ҫ4W�/+.`ܤ� ��՜]���4��� �d�M���:����Hy�:k������ ̪���f|Rc�4!V�]�jꌉ_�;�}d�YPS| o�5��Mb��)�b�� ������"�P����g�S����^���Ρ��u�Y�H������OY��V0h�=�����b E����u�/襶����&����.�>t��4�����|����|���V�z�` �~+���3�>D�0�,-Q��ø}�1T����Y�2�j���m� [��"�@�9S����:���IJU�y�2Q��%w�p�?��� (��s]l���=�5p�)NC9����^0'�M���褬� ����`����1 ���U�7�?. }�W4�ہ-�8�f��w6}�炤5v:�&� ? D� []�]b>%���Wm�L*�Z���Ͳ"�]0�^κ��]���;��+p�4�3���ahk���<�7�+�-�+7٠ z Kر}�� z*\��2�p�I!Z� k {�>`��Mw�0K��6 [Y� (���h�:�C�:�"|�kc���9'��j�+�q*�_�_���q��7��6,Ę9`;����&�)� 6��q�Y־�?������*���f S�x J�Y���Y|�B����=�Dz]ȱcmd? ��b GZB�,������, {.Ķ�6'� ��:�BEu���0Ç��W����F��7��<�z1�;!N�\���h�9�����k F� ��Y�w��h N����\���@�ߞ������.`���������.�����$�Yva=��6o�f�C��<Խ�5��@_��q|q�r3����,�c�#�N�^V��ߐ�`z �;ݰ`k�n�#�#|�G�M� [w8�瀧1�V;���@g$;�!6����>ꓝ+}VU��K��7��k {��.���بy��~�>��2v+P�~ܥNR���i��uk�Z⪨2�s^��a���mۃΪ� [�Y Ę�m�s Jo��7��� ��)ěS�t����x��/�6*|]� }ˎ3����eƄ�#}���d�]+��0��}s U৶�� ��r�Ř� [������D���ns�n0 (�. [c K [qy�e� ^�W� . _w�+ ۡ���TGX���7� [Pw�����?�i P�}��}��*·����/�|c8=�}���b��+��|�=o���x�h�P�8p��b���u��_a�Seg�넷*���� ��8����ֶ]i.�N y��C��p �?��qx ND���<G�t18��h F (,9��݁}��C3�������7���B�Z�X<�����"��7!�蓵-7�z`os2� {��h� {�8�3��='�� [�P����_�n��L'��Ɠ�ԯ5һ�� ��h�B�cj�D^Ƹ�elu/�&~i3�X�\3ZӞA�阏'�� ���;So�����pn�qɄx�����x>♉؊G9#���߀c�\ ������+Y3ّs0�N���~���4�C���y Y���5q6���. ;��y��� �f T��K�`q\����ϓ�y">�Om�Tp�HJL��6-v��\c��c�`�G��4X�S���=���*�j��e=��/]�Ab EVa��S�k7:4o J�F>�%�Dž%�/O��u�� ���j`9�"�~Ȇ��b,ī��3pw�����b� {�����$�����-@�B}g#��#ȉ�Ul8�P�N��I { (���o�u�SCx3������P��N�)���_�g����9�x�ݟ%rՊ~��ɘ2� �Uys���*� {�0��M�9U��@W����<��~�^>�y7������`9̀ �����}Ѡݐ_�X����|��G���EN ~���VSM�k��A���f7|pr����y {G�U�k,���0� ��7�7鄰��n��Ec0+K���j E��>����� (>B�?b6`Z��#��TE {��b<�=��:�q�\h�+�J�`����8�X�� (�=Mv$l D� ٬N�7����ݨ6��߈^������X�=� H���k1����rz��vk�1���N�Oȓ-&�'c�� �QC��&!�'p��$ {h�m���w� [:�Ÿ����~z6O�b�����P���5��RC��V@\�ڵ���V}`/���ܰ r��"Pݐ/��cq��y��C���P��w�O�����?��}�/� {z �Um�F�o3an�E�u��w ��A���m��_��A��|F� [ {;o��&���d��l�o�mx';�ѽ �d��8���E�;�܋g��^���S�6pr�3P��>L�o��C��6�ڏ�m�z��}�Ȏ4�"Vs���y�S᭨�F4������8^��c�6�|)|��AN���l���V\��ݣ=���ˍ4;�g�A���w J��� 9���������,���6��kܼ����@�5�����^�����3��c������ �G�̭��Z���-��o�`h��~���O�����Z�f��^�����������ٰ=M �����9@Ϥ��W��1Ok������n� �=E�'�C�E��s���z�]j��w�L�ρ�O �s�����%f�#��gq��` ��x������� � [��m ܠk�.����ƮȎ�����$�넧J�b O��0�i����������i���y��\�q����j�찲����ф� Q [1 [ꊌ����P�R���+�Ew4*ʽ��5ۂ%-� ٧Vh���. U.�+���j�#��׀o���d��Г����/�v���o��5����r G9�zo�LV��GԆm�7d�v~K ��j<�*�}�����uq� [/f���k��`�3ے3& ~�h9�܅� �� [���y%7���\�a+U�^Y���i G!�Kނ��r�_��m�yd' [��K�X�P� {��V {�U�-��7��]m0q�����&Tsw�;���rg��M'�Z� :^�>�!���� :^��?�&�P������Jt Z�l�ʇӹ�_ou��P�~^�y��fqy�� (n�ŵ~��n�>��t��36�-~��@g�w�����%V�����|�����������IRRelated Stories Leukotriene B4 receptors BLT1 and BLT2 in inflammatory arthritis How to Survive Cancer and the Truth about AIDS w/ Dr. Lorraine Day6 Foods and Herbs for Arthritis and Other Inflammatory Pain Black Elderberry: Natural Cold and Flu Treatment Banana Remorse Alternative Cancer Treatments Prepper’s Harvest Heirloom Seed Bank Duke Professor Suggests Simple Solution to “Ag-Gag” Laws What Type of Naturopath is Right for You? Activated Charcoal: Natural Toxin Removal Comments Your Comments
|
D3273853
|
http://www.statcan.gc.ca/pub/85-004-x/2009001/part-partie1-eng.htm
|
Section 1: The Crime Severity Index
|
Section 1: The Crime Severity Index View the most recent version. Archived information Archived information is provided for reference, research or recordkeeping purposes. It is not subject to the Government of Canada Web Standards and has not been altered or updated since it was archived. Please "contact-us" to request a format other than those available. Next Each year, Statistics Canada reports on the number and type of criminal incidents coming to the attention of police. This annual report analyses changes in police-reported crime rates across the country. To facilitate comparisons among geographic areas as well as over time, police-reported crime has traditionally been expressed as a rate per 100,000 population. The traditional "crime rate" provides information on the number of police-reported incidents that have occurred for a given population. It measures the volume of crime coming to the attention of the police. The rate is simply a count of all criminal incidents reported to and by police divided by the population of interest. Each criminal incident, regardless of the type or seriousness of the offence, counts the same in the rate. For example, one homicide counts the same as one act of mischief. A new, additional tool has now been developed for measuring police-reported crime in Canada. The Crime Severity Index will, for the first time, enable Canadians to track changes in the severity of police-reported crime from year to year. It does so by taking into account not only the change in volume of a particular crime, but also the relative seriousness of that crime in comparison to other crimes. The Crime Severity Index helps answer such questions as: is the crime coming to the attention of police more or less serious than before; and, is police-reported crime in a given city or province more or less serious than in Canada overall? The new Index does not replace, but rather complements, existing measures of crime. It provides a different way of looking at crime and addresses some of the limitations of the traditional crime rate. The background In 2004, the Police Information and Statistics Committee of the Canadian Association of Chiefs of Police asked Statistics Canada to create a new measure of police-reported crime that would address the limitations of the traditional crime rate. The traditional crime rate is heavily influenced by fluctuations in high-volume, less serious offences. This is because each offence reported by police, regardless of its seriousness, carries exactly the same weight in calculating the crime rate. About 40% of police-reported crime in Canada comes from two relatively less serious offences: thefts under $5,000 and mischief. Any change in the number of these offences reported by police will have a significant impact on the overall crime rate. If the number of minor thefts and mischief both decrease in a given year, the crime rate is likely to decline, even with significant increases in more serious crimes such as murder and break-ins. In other words, because of their relatively low volume, more serious crimes have little impact on changes in the overall crime rate. Variations in reporting crimes have long been a fundamental limitation of using police-reported data to understand trends and make comparisons among jurisdictions. Victimization data have consistently shown that reporting to police is related to the seriousness of the offence. Less-serious offences, which dominate the crime rate, are more likely to go unreported to police. 1 In turn, these offences are not always reported consistently by police to Statistics Canada. These reporting issues have had an impact on the comparability of crime rates among provinces, territories and police services. The traditional crime rate does not provide information on the overall seriousness of crimes reported by police. Historically, changes in the seriousness of police-reported crime have been assessed by reviewing offence-specific crime rates. However, it is difficult to create an overall picture of trends in crime severity using this approach. The Crime Severity Index was designed in collaboration not only with the police, but also with provincial and territorial justice partners and academics across the country. 2 A working group was given a mandate to create a measure that would provide a more meaningful indicator of change in police-reported crime from year to year, and which would enhance the comparability of crime statistics at the provincial, territorial and municipal level by taking into account the relative seriousness of each offence. Designing the Crime Severity Index The principle behind the Crime Severity Index was to have more serious crimes carry a higher weight than less serious crimes. As a result, changes in more serious crimes would have a greater impact on the Index than on the traditional crime rate. This would reduce the impact of high-volume, less serious offences and allow the Index to better reflect changes in the incidence of more serious crimes. It would also minimize the impact of differences in the way the public and police in various jurisdictions report high-volume, less-serious crimes, thereby improving comparisons among provinces and municipalities. The first step in the development of the Index was to find a way to assess the relative seriousness of crimes. Any such measure had to meet specific criteria. Namely, it had to be as empirical and objective as possible. It also had to be based on existing data, easy to update over time, and easy to understand. Further, the Index was to include all reported crimes, unlike the traditional crime rate which excludes traffic and drug offences as well as Federal Statutes. A detailed review of criminological literature provided a number of existing approaches for determining the relative seriousness of different crimes. Various options were explored: including only a subset of the most serious crimes; using information on public perceptions of crime; looking at the financial cost of crime; and, using maximum penalties outlined in the Criminal Code. However, none of the existing methodologies met all the criteria set out. In the search for another approach, it became apparent that data collected from Statistics Canada's surveys of adult and youth criminal courts 3 met all the criteria for defining a measure of relative seriousness. Canada is one of the few countries that collects extensive sentencing data from the court system. The underlying premise of sentencing is that more serious crimes will receive more serious punishments from the courts. Thus, the relative seriousness of each type of criminal offence can be determined by using objective sentencing data. These data already exist and are collected regularly, so updates can be made to the measure of relative seriousness over time. How the Index is calculated The Crime Severity Index tracks changes in the severity of police-reported crime by accounting for both the amount of crime reported by police in a given jurisdiction and the relative seriousness of these crimes. It tells us not only how much crime is coming to the attention of police, but also about the seriousness of that crime. To do this, each type of offence is assigned a seriousness "weight". 4 The weights are derived from actual sentences handed down by courts in all provinces and territories. 5 More serious crimes are assigned higher weights, less serious offences lower weights. The specific weight for any given type of offence consists of two parts. The first component is the incarceration rate for that offence type. This is the proportion of people convicted of the offence who are sentenced to time in prison. The second component is the average (mean) length of the prison sentence, in days, for the specific type of offence. 6Offences that tend to be subject to incarceration upon conviction are generally considered more serious than those that are not. Further, more serious crimes generally receive longer custodial sentences. The incarceration rate is multiplied by the average sentence length to arrive at the final seriousness weight for each type of offence reported by police. Each occurrence of a particular offence is assigned the same weight regardless of the specific outcome of any individual case. For example, all robberies reported by police carry the same weight in the Index, regardless of the specific characteristics of each incident. The weights are calculated using the five most recent years of available sentencing data. This ensures that there is a large amount of data available on which to base the weights. It also minimizes the impact of any fluctuations for low-volume offences. For the data released in this report, weights are based on the period 2002/2003 to 2006/2007. Table 1 provides examples of the specific weights based on court data for this period. The importance of the weights is not so much in their exact value for each offence, but rather in the relative differences between them. For example, an incident of murder would receive a weight 1,000 times higher than an incident of possession of cannabis. The weights will be updated every five years to ensure that they reflect any changes in sentencing patterns or new legislation. It is not necessary to update them each year as trends in court data do not tend to change substantially from year to year. To calculate the actual Crime Severity Index, the number of police-reported incidents for each offence is multiplied by the weight for that offence. 7 All weighted offences are then added together and divided by the corresponding population total. Finally, to make the Index easier to interpret, the Index is standardized to "100" for Canada (a system that is similar to the Consumer Price Index), using 2006 as a base year. Challenges of using sentencing data as a measure of offence seriousness Statistics Canada collects sentencing data from both youth and adult courts across the country. When it was decided that these sentencing data were the best available empirical measure of offence seriousness for the Crime Severity Index, the limitations of these data were also recognized. Examples of some of the challenges posed by the courts data include: Time served on remand – Time served in remand – the amount of time an accused person spends in jail prior to sentencing – is not directly collected by the courts surveys. Although the length of time served in remand is generally factored into the sentence by judges, it cannot be determined from the survey data if the full sentence has been recorded (including days spent in remand) or if just the additional time to be served has been recorded (excluding days spent in remand). Repeat offenders – The previous criminal record of an accused person is known to be a significant factor in sentencing; however, data on recidivism is not available from the courts surveys. Conditional sentences – Conditional sentences, also called "deferred custody" for youth, were treated as "non-incarceral" in the model, similar to sentences of probation or fines, even though the Criminal Code considers them to be a sentence of incarceration. This was done because no systematic and objective system exists for determining relative seriousness among different types of sentences. Life sentences – Life sentences in Canada are a custodial sentence for the rest of the natural life of the accused. As such, life sentences cannot be accurately measured in terms of days as it depends on a number of factors specific to the individual. For research purposes it is generally agreed to be quantified as 25 years, which represents the longest parole eligibility for an individual sentenced to life. Following parole, the accused remains under supervision for the remainder of their natural life. Life sentences thus were assigned a value of 25 years for the purposes of the Crime Severity Index weighting model. There will, in fact, be three indexes – an overall Crime Severity Index, a Violent Crime Severity Index and a Non-violent Crime Severity Index – similar to the structure of the traditional crime rate. The overall Crime Severity Index includes all Criminal Code and federal statute offences. The Violent Crime Severity Index includes all violent offences, 8 while the Non-violent Crime Severity Index includes everything that does not fall into the category of violent offences. Each index can be calculated at the national, provincial/territorial and census metropolitan area 9 levels, as well as for individual police services and detachments. By design, the specific Crime Severity Index value in a given jurisdiction depends on its mix of crimes and their relative seriousness. If a jurisdiction has a high proportion of less serious, and hence lower-weighted, offences, it will have a lower Index value. Conversely, a jurisdiction with a high proportion of more serious crimes will have a higher Index value. Understanding crime trends with the Crime Severity Index It is important to understand a few things before comparing the Crime Severity Index and the traditional crime rate. First, one can only compare trends in police-reported crime indicated by these two measures. The specific levels of police-reported crime provided by each measure are not directly comparable. Secondly, the Crime Severity Index is expressed as a standardized measure, meaning it has been adjusted to equal 100 in the base year (2006). On the other hand, the crime rate is expressed as the number of crimes per 100,000 population. As such, all graphs showing the two measures appear with two separate axes, one for the crime rate and another for the Crime Severity Index. Comparisons between the overall crime rate and the Crime Severity Index between 1998 and 2007 provide interesting insights into trends in overall police-reported crime (Chart 1.1 and Table 2 10 ). During that period, the crime rate decreased by 15%, while the Crime Severity Index dropped even further (21%). It should be noted that while drugs, traffic offences and Federal Statutes are all excluded from the traditional crime rate, they are included in the Crime Severity Index. Thus, not only was the volume of police-reported crime in Canada declining during this period, but overall, crimes coming to the attention of police were less serious in nature. Further, the severity of crime, as reported by police, declined at a faster rate over this decade than did the number of crimes reported. In most years, the crime rate and Index moved in the same direction. However, between 1999 and 2002, they did not. During this period, there was virtually no change in the amount of overall crime reported to police, as indicated by a stable crime rate. However, the Crime Severity Index dropped by 6%. During this time, the volume of several serious crimes fell significantly, such as break-ins (-16%) and robbery (-11%). At the same time, there was an increase in reported incidents of mischief (+3%), which is a high-volume, but relatively less serious offence. The conclusion is that between 1999 and 2002, the amount of overall crime reported by police remained stable, but there was a drop in the severity of crime coming to the attention of the justice system. This example demonstrates how the Crime Severity Index better reflects changes in more serious offences, while the crime rate reflects the overall volume of crime coming to the attention of police. In Table 3, data clearly show the differences between the two series. Theft under $5,000 accounts for 26% of all crimes in the crime rate. Weighting these crimes for seriousness in the Crime Severity Index effectively decreases their contribution by slightly more than half, to 12%. Conversely, breaking and entering, a high-volume offence that carries an above-average seriousness weight, makes up about one-quarter of the Index's weighted volume, compared with 10% in the crime rate. Robberies contribute 1% of the crime rate, but 11% of the Index. Separate severity indexes have been created for violent and non-violent crimes. Comparing the rates and indexes for these types of crimes further demonstrates the utility of each source of information for understanding trends in police-reported crime. For example, the violent crime rate rose between 1998 and 2000, then declined afterwards (illustrated by Chart 1.2 ). This indicates that the volume of violent crimes reported by police has been falling since 2000. Meanwhile, the Violent Crime Severity Index indicates that the severity of violent crimes reported by police remained relatively stable during the period. Of particular interest is the period between 2004 and 2006 when the violent crime rate and Violent Severity Crime Index moved in different directions. During this period, the violent crime rate declined slightly despite increases in most serious violent crimes, including attempted murder (+22%), level 3 assault (+20%), level 2 assault (+12%) and robbery (+10%). The drop in the violent crime rate was driven by a decline in level 1 assault, the least serious form of assault, but a high-volume offence. Conversely, the Violent Crime Severity Index rose 4% during this period, reflecting increases in more serious violent crimes. Data in Table 4 show the relative contributions of crimes comprising the Violent Crime Severity Index and the violent crime rate. While level 1 assaults, the least serious form of assault, account for the largest share (about 40%) of the violent crime rate, they comprise only 9% of the Violent Crime Severity Index. Robbery comprises the largest share of the Violent Crime Severity Index (40%), but a much lower share of the violent crime rate (8%). Homicide accounts for 8% of the Violent Crime Severity Index, compared with less than 1% of the violent crime rate. In terms of non-violent crime, trends in the two measures were similar between 1998 and 2007 (Chart 1.3 ). However, the 18% decline in the rate of non-violent crimes was less than the 26% decline in the Non-violent Crime Severity Index. This shows that the more serious non-violent crimes were dropping at a faster rate than the less serious offences. For example, breaking and entering, which has an above-average weighted seriousness, fell by 40% over this time, while theft under $5,000, with a lower–than-average weighted seriousness, dropped 26%. Data in Table 5 show the relative contribution of crimes comprising the Non-violent Crime Severity Index and the non-violent crime rate. The largest contributor to the Index was breaking and entering, accounting for 35%, while it comprised only 13% of the non-violent crime rate. Theft under $5,000 was the largest contributor of all crimes to the non-violent crime rate (32%), but comprised only 17% of the Non-violent Crime Severity Index. The impact of other less serious non-violent crimes is also minimized in the Non-violent Crime Severity Index. For example, the contribution of mischief to the Index was only half of its contribution to the rate. Provinces and territories The Crime Severity Index is also a tool for measuring the increase or decrease in the severity of crime over time in any given jurisdiction, such as provinces and territories, and for comparing the seriousness of crime among jurisdictions. Over time, police-reported crime rates have generally been higher in the west and north than in eastern and central regions of the country. This is also true for crime severity, as measured by the new Crime Severity Index (Chart 1.4 and Table 6 ). There are, however, some important differences when comparing jurisdictions using the two measures of police-reported crime. First, as illustrated by Chart 1.4, the Crime Severity Index in the three territories is much closer to the indexes for the provinces than is the crime rate. Crime rates in the three territories are about 60% to 230% higher than the crime rate for the highest province. In terms of the Index, the gap is much smaller. Crime Severity Indexes for all three territories are only about 15% to 100% higher than the Index for the highest province. This suggests there is less difference between the provinces and territories in the severity of crime reported to police than in the amount of crime being reported. The reason is the mix of crimes reported in the North. A higher proportion of less serious crimes are reported in the territories than in the rest of Canada. For example, mischief accounts for 29% of all reported crimes in the three territories combined, nearly twice the proportion of 15% for the provinces overall. In 2007, Saskatchewan had the highest Crime Severity Index among the provinces. Its severity index value for 2007 was 165, compared with 95 for Canada as a whole. This indicates that the severity of police-reported crime in Saskatchewan was about 75% higher than for the entire nation. Crime severity in Saskatchewan, however, dropped by 7% between 1998 and 2007. Manitoba and British Columbia, the provinces with the next highest Crime Severity Index values, also experienced drops in crime severity between 1998 and 2007 (-3% and -2 2% respectively). In all three provinces, the declines occurred predominantly between 2003 and 2007. Ontario and Quebec have had the lowest police-reported crime rates in recent years. When the severity of crime is considered, however, Prince Edward Island and New Brunswick have the lowest Index scores. While there may be less crime coming to the attention of police in Ontario and Quebec after adjusting for population differences, reported crime in these provinces is relatively more serious than in Prince Edward Island and New Brunswick. Chart 1.5 illustrates differences between the provinces in violent crime. Violent crime rates in the western and northern regions tend to be higher than those in eastern and central Canada. Again, however, territorial values for the Violent Crime Severity Index are much closer to the provinces than violent crime rates. And again this is due to the mix of violent crimes in the North. The territories have a higher proportion of less serious violent crimes, such as level 1 assault, than the provinces. While Saskatchewan has the highest violent crime rate among the provinces, Manitoba has a slightly higher Violent Crime Severity Index value. This is due to the high proportion of serious violent crimes, such as robbery and level 2 and 3 assaults, reported in Manitoba. The severity of violent crime in Manitoba was 12% higher in 2007 than it was in 1998. Chart 1.6 compares the provinces and territories in terms of their non-violent crime rates and their non-violent Crime Severity Indices. Non-violent crime rates tend to be higher in the western and northern regions of Canada. The same is true for the severity of non-violent crime. In 2007, Saskatchewan had the highest Non-violent Crime Severity Index value among the provinces, at 163, followed by Manitoba (141). The lowest Non-violent Crime Severity Index values were in Ontario (70), Prince Edward Island (72) and New Brunswick (72). Census metropolitan areas The Crime Severity Index is also a useful tool for comparing the severity of crime among large metropolitan areas (Chart 1.7 and Table 7 ). In 2007, the severity of crime was highest in Regina. It had a Crime Severity Index of 189, nearly twice the national average of 95. Crime severity in Regina was, however, down 18% from 1998. Regina was followed by Saskatoon (159) and Winnipeg (153). Saskatoon saw a drop of 12% in overall crime severity since 1998 due mostly to a 51% decrease in break-ins. On the other hand, the Crime Severity Index in 2007 was lowest in Toronto, Saguenay and Québec (all at 66), and Kitchener and Trois-Rivières (both at 69). In terms of violent crime a somewhat different pattern emerged, as illustrated by Chart 1.8. Index values for violent crime in the many large metropolitan areas in central Canada were closer to average. In Toronto, the Violent Crime Severity Index was 95, virtually equal to the national average. The severity of violent crime was above average in Montreal (108). The Crime Severity Index can be used to point out unusual regional characteristics of crime. In general, crime is less severe in the Atlantic Provinces than for Canada as a whole. But this does not necessarily hold for the country's largest metropolitan areas. In 2007, all three metropolitan areas in Atlantic Canada had Index values above the national average of 95: Saint John (107), Halifax (106) and St. John's (100). This indicates that police-reported crime in these cities tends to be of a more serious nature than in central Canada where the severity of crime in many central Canadian metropolitan areas was below average. In some Western metropolitan areas, values for the Violent Crime Severity Index were lower than their overall Index values. For example, Victoria had an overall Crime Severity Index value of 109, well above the national average. However, its Violent Crime Severity Index value of 81 was well below the national average. This indicates that while the severity of crime was relatively high in Victoria in 2007, the proportion of serious violent crimes was relatively low. Summary This analysis has demonstrated how the Crime Severity Index is a useful additional tool for analyzing crime trends in Canada. The Index addresses not only the amount of crime coming to the attention of police, but also the severity of this crime. In addition, it shows whether crime in general is relatively more or less serious than in previous years, and it helps in determining if reported crime is more or less serious in one jurisdiction than in another. The Crime Severity Index has a number of strengths. It better reflects trends in more serious crimes because it takes into account the relative seriousness of offences. Serious crimes have a greater impact on the Index than they do on the crime rate. It also improves the comparison of trends in crime among police services, provinces/territories and municipalities by reducing the impact of differences in the way less serious offences are reported. Chart 1.1Overall Crime Severity Index and traditional crime rate, Canada, 1998 to 2007Chart 1.2Violent Crime Severity Index and violent crime rate, Canada, 1998 to 2007Chart 1.3Non-violent Crime Severity Index and non-violent crime rate, Canada, 1998 to 2007Chart 1.4The Crime Severity Index versus the traditional crime rate, provinces and territories, 2007Chart 1.5The Violent Crime Severity Index versus the violent crime rate, provinces and territories, 2007Chart 1.6The Non-violent Crime Severity Index versus the non-violent crime rate, provinces and territories, 2007Chart 1.7Crime Severity Index, census metropolitan areas, 2007Chart 1.8Violent Crime Severity Index, census metropolitan areas, 2007Next
|
D2198768
|
http://www.longisland.com/towns/
|
.
|
Long Island has more towns and villages than Hollywood has movie stars, and it can get a little confusing – even to those of us who are born and raised here. Long Island New York is comprised of two counties – Nassau County and Suffolk County, two cities – Long Beach and Glen Cove, numerous local towns, villages, hamlets, postal zones and designated places. In Nassau County we have three towns – Oyster Bay, Hempstead, North Hempstead, and two cities – Long Beach and Glen Cove. In Suffolk there are ten towns – Babylon, Brookhaven, East Hampton, Huntington, Islip, Riverhead, Smithtown, Shelter Island, Southampton and Southold as well as two Indian reservations – Poospatuck and Shinnecock. In addition, there are local hamlets and villages within these towns (be sure to check out the full breakdown below). The Long Island.com Towns Pages feature all of the hyper-local information you've been looking for about your hometown including News Updates, the hottest Local Events & Things to Do, Dining, Weather and more for Your Hometown! Each Long Island Town has its own page, and is more than just a local directory – each page features local stats, an open forum, and the scoop on your favorite local businesses & hot spots, offering you an interactive way to get the most out of your local community. No matter where you are on Long Island, we've got you covered. Nassau County, NY ( About Nassau County)Town of Hempstead Atlantic Beach Baldwin Bellerose Terrace Bellmore Bethpage Cedarhurst East Meadow East Rockaway Elmont Floral Park Franklin Square Freeport Garden City Hempstead Hewlett Inwood Island Park Lawrence Levittown Lynbrook Malverne Merrick Mineola New Hyde Park North Lynbrook North Valley Stream North Woodmere Oceanside Point Lookout Rockville Centre Roosevelt Seaford South Hempstead Uniondale Valley Stream Wantagh West Hempstead Woodmere Town of North Hempstead Albertson Carle Place Floral Park Glenwood Landing Great Neck Greenvale Kings Point Manhasset Mineola New Hyde Park North New Hyde Park Old Westbury Port Washington Roslyn Roslyn Heights Sands Point Westbury Williston Park Town of Oyster Bay Bayville Bethpage Brookville East Norwich Farmingdale Glen Head Glenwood Landing Greenvale Hicksville Jericho Locust Valley Massapequa Massapequa Park Mill Neck Old Bethpage Old Westbury Oyster Bay Plainview Sea Cliff Syosset Woodbury City of Glen Cove City of Long Beach Suffolk County, NY ( About Suffolk County)Town of Babylon Amityville Babylon Copiague Deer Park Lindenhurst North Amityville North Babylon West Babylon Wyandanch Town of Brookhaven Bellport Blue Point Brookhaven Calverton Centereach Center Moriches Coram East Moriches East Patchogue Eastport East Setauket Farmingville Holbrook Holtsville Lake Grove Manorville Mastic Mastic Beach Medford Middle Island Miller Place Moriches Mount Sinai North Patchogue Patchogue Port Jefferson Port Jefferson Station Ridge Rocky Point Ronkonkoma Selden Shirley Shoreham Sound Beach Stony Brook Upton Wading River Yaphank Town of East Hampton Amagansett East Hampton Montauk Sag Harbor Wainscott Town of Huntington Centerport Cold Spring Harbor Commack East Northport Greenlawn Huntington Huntington Station Lloyd Harbor Melville Northport Town of Islip Bayport Bay Shore Bohemia Brentwood Brightwaters Central Islip East Islip Great River Hauppauge Holbrook Holtsville Islandia Islip Islip Terrace Oakdale Ocean Beach Ronkonkoma Sayville West Islip West Sayville Town of Riverhead Aquebogue Calverton Jamesport Laurel Manorville Riverhead South Jamesport Wading River Town of Shelter Island Shelter Island Shelter Island Heights Town of Smithtown Commack Hauppauge Kings Park Nesconset Saint James Smithtown Town of Southampton Bridgehampton Eastport East Quogue Hampton Bays Quogue Remsenburg Sagaponack Sag Harbor Southampton Speonk Water Mill Westhampton Westhampton Beach Town of Southold Cutchogue East Marion Fishers Island Greenport Laurel Mattituck New Suffolk Orient Peconic Southold PLEASE NOTE: The list of Long Island towns above in not a complete list, but are those towns that have Web sites, official sites, chambers of commerce and/or local community sites on Long Island. Other Long Island Town Resources List of Long Island Zip Codes LI Chambers of Commerce Map of Long Island Town Pictures Want to feature your business or organization on your local Long Island Town Page? Contact Us for all the details!Definitions County: A county is a municipal corporation, a subdivision of the state, created to perform state functions; a "regional government. All counties are divided into cities, towns and Indian reservations. City: A city is a unique government entity with its own special charter. Cities are not sub-divided, except into neighborhoods which are informal geographic areas. Town: A town is a municipal corporation and encompasses all territory within the state except that within cities or Indian reservations. Towns can be sub-divided into villages and hamlets. Village: A village is a general purpose municipal corporation formed voluntarily by the residents of an area in one or more towns to provide themselves with municipal services. The pattern of village organization is similar to those of a city. A village is divided into neighborhoods, which are informal geographic areas. Hamlet: A hamlet is an unincorporated area in one or more towns that is governed at-large by the town (s) it is in. A hamlet is divided into neighborhoods, which are informal geographic areas. Postal Zone: A postal zone "City and "Town" is an administrative district established by the U. S. Postal Service to deliver the mail. Postal zone "City" and "Town" may or may not conform to municipal or community border. Thus, postal zone location does not always determine city, village or hamlet location. Designated Place: A designated place is a term derived from the term "Census Designated Place" or CDP in censuses beginning with 1980. It replaced the designation (U) or unincorporated. A designated place is similar to that of a hamlet.
|
D2361750
|
http://www.sparkpeople.com/calories-in.asp?food=Dickeys+Barbecue+Pit+Baked+Potato
|
Calories in Dickeys Barbecue Pit Baked Potato
|
Nutrition Facts Calories in Baked Potato (baked potatoes)Serving Size: 1 potato (2-1/3" x 4-3/4")Amount Per Serving Calories 145.1Total Fat 0.2 g Saturated Fat 0.0 g Polyunsaturated Fat 0.1 g Monounsaturated Fat 0.0 g Cholesterol 0.0 mg Sodium 7.8 mg Potassium 610.0 mg Total Carbohydrate 33.6 g Dietary Fiber 2.3 g Sugars 2.7 g Protein 3.1 g Vitamin A 0.0 %Vitamin B-12 0.0 %Vitamin B-6 23.5 %Vitamin C 33.3 %Vitamin D 0.0 %Vitamin E 0.3 %Calcium 0.8 %Copper 16.8 %Folate 3.5 %Iron 3.0 %Magnesium 9.8 %Manganese 12.6 %Niacin 10.9 %Pantothenic Acid 8.7 %Phosphorus 7.8 %Riboflavin 1.9 %Selenium 0.7 %Thiamin 10.9 %Zinc 3.0 %*Percent Daily Values are based on a 2,000 calorie diet. Your daily values may be higher or lower depending on your calorie needs. Report as containing personal information Some of these foods were entered by users and are subject to error.
|
D1751446
|
http://www.medhelp.org/posts/Lung-Cancer/Blebs-in-the-Lung/show/984428
|
Blebs in the Lung
|
Blebs in the Lung Cup Cakes770Is there a treatment to get rid of blebs in the lung? or How do you get rid of blebs in the lung? How do you get Blebs in the Lung? Jun 25, 2009Follow - 1 Upvote - 0 5 Answers Next Question5 Answers Page 1 of 1Monica M, MDHi, Blebs are air filled pockets which occur due to weakness of the lung tissues. They usually occur on the lung surface. These may sometimes rupture due to drastic changes in lung pressure which occurs during scuba diving, mountain climbing etc. However, a single small bleb or even several small blebs may be asymptomatic and usually are not serious, so no treatment is indicated. Large blebs may rupture more frequently leading to pnemothorax or a collection of air in the pleural cavity outside the lung. Pnemothorax can cause pressure over the lung leading to lung collapse and difficulty in breathing. When this occurs, the pnemothorax needs to be drained by inserting a chest tube into the pleural cavity. The ruptured bleb can be surgically removed to prevent further occurence of pnemothorax. Air filled pockets withing the lung substance are called bullae and occur in a condition called emphysema which is caused due to COPD (chronic obstructive pulmonary disease). Small bullae do not need any treatment but large bullae causing pressure on the surrounding lung may need surgery. Hope that helps!Jun 26, 2009Upvote - 1Keith85Hello, i aswell have blebs on my lungs. I am 23 and had both lungs collapse last year as a result. Right lung in july08 left in aug08. They did exactly what Monica stated, chest tube, removed the blebs ect. Well, its not even a year later and I just found out that the Blebs either grew back or new ones formed. I cough up a "off yellow" substance daily ( i am a smoke as well). I go through random spells of sever chest pain, needless to say I rush to the ER when that happens and am given Dilaudid for the sever pains. After the Pnemothorax occured twice, My lung compacity is deffinetly different. Deep breathes can lead to sever pain at times...and the heat and humidity are worse. I was told that the doctors can and will remove the blebs if they are of a large enough size that may result in a Pnemothorax. I would suggest trying your best to cough mildly. I find that a hard cough only leads to pain, while very short shallow coughs help push out the mucus. If you EVER notice a constant pain in your lung that throbbs with every breathe...go the ER asap. Thats a sure sign of a Pnemothorax. Also please keep in mind, a Pnemothorax at times can be overlooked. For my 1st collapse that was the case. I was told i just had chronic chect wall pain..only to go home, go to bed and get a awaking phone call from the ER telling me to come back asap because the Pnemothorax was overlooked. Hope this helps you with knowing some sure signs to look for. Also i was told that the blebs sooner or later will lead to a Pnemothorax, Now i may be incorrect, just something to look out for.. God bless and take care Jul 10, 2009Upvote - 0gr8whtshrk A related discussion, pneumothorax was started. Sep 15, 2009Upvote - 0ostrov_d A related discussion, Hemothorax was started. Dec 28, 2009Upvote - 0jodibeth21A related discussion, Blebs and Bulla was started. Jan 24, 2012Upvote - 0Previous Question Next Question
|
D2582695
|
http://www.diabetesforum.com/insulin-pumps/22881-frestyle-test-strips-fail-omnipod.html
|
Frestyle test strips Fail in OmniPod
|
14 Likes Frestyle test strips Fail in Omni Pod Shared Thread Thread Tools11-04-2013, 16:19 # 1diabetes86Senior Member Join Date: Mar 2010Location: MA, USAPosts: 1,475 Type 2 Diagnosed in 1986 895 likes received913 likes given Frestyle test strips Fail in Omni Pod Hi all I had a bad batch of Freestyle test strips (Lot #1365655) They work in my Freestyle meeter but read 100 PTs low in my Omni Pod. They also failed the test solution in the OP and passed in the Freestyle meter. I used 50 strips between the two meters and every one from that batch of test strips failed in the OP. I called OP and after 30 second wait talked to a rep. She said they had some issues with some test strip batches. we did all kinds of testing and they put me in touch with Abbot. Abbot would only replace 100 strips. Ummmm I get a 3 month supply at a time and have 400 of that lot number, still they would only replace 100. I told her to get me someone that could, after a pause she came back and said they will replace 200 test strips, and will bump it up to the "resolution Dep" to see if they can replace the other 200. I got a call yesterday and they will replace all the test strips. I have test strips from 3 other batches and all work fine.hitcheca likes this.__________________ I am not a doctor this is what works for me You results may differ11-04-2013, 16:30 # 2Shanny Senior Member Join Date: Dec 2009Posts: 24,395 Type 2 Diagnosed in 2009 23911 likes received32255 likes given Is this part of the same issue Tamagno has? Omnipod strips/pods11-04-2013, 22:07 # 3diabetes86Senior Member Join Date: Mar 2010Location: MA, USAPosts: 1,475 Type 2 Diagnosed in 1986 895 likes received913 likes given No I dont know how she got the "Freestyle Light" strips to work in the old PDM it too is suppose to use the "Freestyle" strips not "Freestyle Light" (they are different strips) My problem was a bad batch of test strips__________________ I am not a doctor this is what works for me You results may differ11-05-2013, 01:30 # 4Shanny Senior Member Join Date: Dec 2009Posts: 24,395 Type 2 Diagnosed in 2009 23911 likes received32255 likes given Chris? Tamagno's name is John and he is definitely not a 'she'. Tamagno and Mary, like this.11-05-2013, 09:35 # 5Tamagno Senior Member Join Date: Sep 2011Location: Connecticut, USAPosts: 2,206 Type 1 Diagnosed in 2011 4235 likes received5260 likes given I spoke with both Abbott and my endo yesterday. Like you, Chris, Abbott was generous in replacing unusable strips. My endo re-wrote my 'script to read Freestyle "Regular." I had been using Freestyle "Lite" with absolutely no problem in the old Omnipod system. They work only sporadically in the new system returning "Error Message 3" eventually. I'll be getting the Freestyle "Regular" strips in a day or two and will let you know the result. Oh, thanks for the correction, Shanny. My recent hospital visit does not appear to have included the rearrangement of any, um, vital parts. Shanny, Mary,, walkerwally1 and 2 others like this.__________________ View Tamagno's full Diabetes Forum profile here .11-05-2013, 12:38 # 6diabetes86Senior Member Join Date: Mar 2010Location: MA, USAPosts: 1,475 Type 2 Diagnosed in 1986 895 likes received913 likes given Ok OK SORRY Mr Tamango Shanny, Mary, and Freya like this.__________________ I am not a doctor this is what works for me You results may differ11-06-2013, 08:36 # 7Tamagno Senior Member Join Date: Sep 2011Location: Connecticut, USAPosts: 2,206 Type 1 Diagnosed in 2011 4235 likes received5260 likes given Its, okay, diabetes86! Perhaps I'm using unnecessarily feminine syntax. New strips arrive today from Abbott. Did you get yours?__________________ View Tamagno's full Diabetes Forum profile here .11-06-2013, 13:17 # 8diabetes86Senior Member Join Date: Mar 2010Location: MA, USAPosts: 1,475 Type 2 Diagnosed in 1986 895 likes received913 likes given Yes I got all 400 strips__________________ I am not a doctor this is what works for me You results may differ11-07-2013, 08:46 # 9Tamagno Senior Member Join Date: Sep 2011Location: Connecticut, USAPosts: 2,206 Type 1 Diagnosed in 2011 4235 likes received5260 likes given Okay, so I got the Freestyle regular strips from Abbott. They don't work. Back to my original theory of PDM failure. Calling Insulet later.__________________ View Tamagno's full Diabetes Forum profile here .11-08-2013, 09:03 # 10Tamagno Senior Member Join Date: Sep 2011Location: Connecticut, USAPosts: 2,206 Type 1 Diagnosed in 2011 4235 likes received5260 likes given Hopefully, the end of this little saga... Called Insulet last night and they're sending me a new PDM. Shanny, diabetes86 and mbuster like this.__________________ View Tamagno's full Diabetes Forum profile here .« Omnipod strips/pods | Technology »Thread Tools Show Printable Version Email this Page Posting Rules You may not post new threads You may not post replies You may not post attachments You may not edit your posts BB code is On Smilies are On [IMG] code is On HTML code is Off Trackbacks are On Pingbacks are On Refbacks are Off Forum Rules Similar Threads Thread Thread Starter Forum Replies Last Post Omnipod strips/pods Tamagno Insulin Pumps 2 11-04-2013 12:02test strips Kim_m_kk Diabetes Treatment 16 02-13-2012 16:53Test Strips jacrabbitt Diabetes Forum Lounge 5 01-13-2012 17:01Food Test Strips starlynx Diabetes Diet and Nutrition 5 10-10-2010 02:29Test Strips Expensive Michele1974 Introduce Yourself 5 09-11-2010 16:50LEGAL NOTICEBy using this Website, you agree to abide by our Terms and Conditions (the "Terms"). This notice does not replace our Terms, which you must read in full as they contain important information. You must not post any defamatory, unlawful or undesirable content, or any content copied from a third party, on the Website. You must not copy material from the Website except in accordance with the Terms. This Website gives users an opportunity to share information only and is not intended to contain any advice which you should rely upon. It does not replace the need to take professional or other advice. We have no liability to you or any other person in respect of any content on this Website. All times are GMT +1. The time now is 02:45.
|
D48172
|
https://answers.yahoo.com/question/index?qid=20070820080918AA2kINu
|
Difference between hostname & domain name?
|
Yahoo Products Yahoo Mail Abuse and Spam Difference between hostname & domain name? Follow 7 answers Answers Relevance Rating Newest Oldest Best Answer: Hostnames are used by various naming systems, NIS, DNS, SMB, etc., and so the meaning of the word hostname will vary depending on naming system in question, which in turn varies by type of network. A hostname meaningful to a Microsoft Net BIOS workgroup may be an invalid Internet hostname. When presented with a hostname and no context, it is usually safe to assume that the network is the Internet and DNS is the hostname's naming system. Host names are typically used in an administrative capacity and may appear in computer browser lists, active directory lists, IP address to hostname resolutions, email headers, etc. They are human-readable nick-names, which ultimately correspond to unique network hardware MAC addresses. In some cases the host name may contain embedded domain names and/or locations, non-dotted IP addresses, etc. On a simple local area network, a hostname is usually a single word: for instance, an organization's CVS server might be named "cvs" or "server-1". Internet hostnames On the Internet, a hostname is a domain name assigned to the host. This is usually a combination of the host's local name with its parent domain's name. For example, "en.wikipedia.org" consists of a hostname ("en") and the domain name "wikipedia.org". This kind of hostname is translated into an IP address via the local hosts file, or the Domain Name System (DNS) resolver. It is possible for a single host to have several hostnames; but generally the operating system of the host prefers to have one hostname that the host uses for itself. Any domain name can also be hostname, as long as the restrictions mentioned below are followed. So, for example, both "en.wikimedia.org" and "wikimedia.org" are hostnames because they both have IP addresses assigned to them. The domain name "pmtpa.wikimedia.org" is not a hostname since it does not have an IP address, but "rr.pmtpa.wikimedia.org" is a hostname. All hostnames are domain names, but not all domain names are hostnames. Source (s):http://en.wikipedia.org/wiki/Hostname Indiana Frenchman · 1 decade ago1 0 Comment Hostname Vs Domain Name Source (s):https://shrinke.im/a8CYq? · 1 year ago0 0 Comment For the best answers, search on this site https://shorturl.im/ax UMs hostname In the Internet suite of protocols, the name that is given to a machine. Sometimes, host name is used to mean fully qualified domain name (FQDN). domain name A domain name is the text name corresponding to the numeric IP address of a computer on the Internet. A domain name must be unique. Internet users access your website using your domain name? · 2 years ago0 0 Comment This Site Might Help You. RE: Difference between hostname & domain name? Source (s):difference hostname domain name: https://biturl.im/vf OBa Shaniqua · 3 years ago0 0 Comment A hostname (occasionally also, a sitename) is the unique name by which a network-attached device (which could consist of a computer, file server, network storage device, fax machine, copier, cable modem, etc.) is known on a network. The hostname is used to identify a particular host in various forms of electronic communication such as the World Wide Web, e-mail or Usenet. A domain name is a Web address, such as coolexample.com, that is linked to an IP address (which represents a physical point on the Internet). When someone types a domain name into a Web browser, the requested Web page displays. A domain name consists of a top-level and a second-level domain. A top-level domain (TLD) is the part of the domain name located to the right of the dot (coolexample.com). The most common top-level domains are .com, .net, and .org. Some other popular top-level domains are .biz, .info, .name, and .ws. These common top-level domains have certain guidelines but are, for the most part, available to any registrant, anywhere in the world. There are also restricted top-level domains (r TLDs), like .aero, .biz, .edu, .mil, .museum, .name, and .pro, these require the registrant to represent a certain type of entity or to belong to a certain community. For example, the .name TLD is reserved for individuals, while .edu is reserved for educational entities. Country-code TLDs (cc TLDs) are for Web sites and registrants of a particular geographic location, such as .bz (Belize), .ca (Canada), .dk (Denmark), .ec (Ecuador), .ie (Republic of Ireland), .uk (United Kingdom), .us (United States), and .zw (Zimbabwe). The part of the domain name located to the left of the dot (coolexample.com) — "yourpersonaldomain," in this case — is called the second-level domain (SLD) name. The second-level domain name is the "readable" part of the address and refers to the organization or entity behind the Internet address. Second-level domain names must be unique on the Internet and registered with an Internet Corporation for Assigned Names and Numbers (ICANN)-accredited registrar. Hope you got it! Register your own domain name Today to mark your online presence. The best deals on the web: $1.99/yr!- . INFO - the world's information domain - is now $1.99 for one year registrations! $6.95/yr!- . COM domain name from http://domain-name-register-store.com/ for just $6.95/yr! FREE with every domain: • FREE! Quick Blog • FREE! Free Hosting • FREE! Complete Email • FREE! Forwarding / Masking • FREE! Change of Registration • FREE! Starter Web Page • FREE! "For Sale"/ Parked Page • FREE! Domain Name Locking • FREE! Total DNS Control Promotion extended upto 27th August 2007!!! Good luck!Source (s): Web Hosting Store http://domain-name-register-store.com/Anonymous · 1 decade ago0 0 Comment Interesting! Never really gave this much thought? · 2 years ago0 0 Commentthx for the answers everyone <3Anonymous · 2 years ago0 0 Commentum...there spelled different?? · 2 years ago0 0 Comment
|
D2189901
|
http://www.moviefanatic.com/2013/07/frozen-photos-meet-disneys-latest-characters/
|
Frozen Photos: Meet Disneyâs Latest Characters
|
Frozen Photos: Meet Disney’s Latest Charactersby Joel D Amos at July 12, 2013 9:45 am . Updated at July 12, 2013 12:32 pm . 0 Comments Disney has a long history of giving audiences some of the most memorable animated souls of all-time. Hoping to join that long legacy are the characters that inhabit the latest from the famed studio, Frozen. Up to now, fans of Walt’s animation studio have had to make do with a Frozen teaser trailer and a Frozen poster. Disney has released a slew of photos identifying their new legion of characters that inhabit the chilly world of Frozen. Frozen lands in theaters November 27 and features the vocal talents of The Internship star Josh Gad, Kristen Bell (of the currently filming Veronica Mars movie ), Jonathan Groff and Alan Tudyk. The story takes audiences into a world that is firmly entrenched in a winter with no end. That will not stop Anna (Bell) from joining forces with the outdoorsy Kristoff (Groff) to try to find a way to -- even figuratively -- warm things up a bit. They seek to embark on a mission to dethrone Anna’s sister Elsa (Idina Menzel), the Snow Queen, who is ruling with a Frozen fist. Share Tweet Email
|
D3028663
|
http://findaccountingsoftware.com/directory/infor/infor-erp-syteline/costing/
|
Infor SyteLine
|
Infor Syte Line No reviews yet. Write the first? A full ERP system designed by Infor for manufacturers. Demo Pricing Questions about Infor Syte Line? Call (800) 827-1151 and talk to a software expert now. Infor Syte Line is the solution of choice for over 5,000 manufacturers around the world. From repetitive to engineer-to-order, Infor Syte Line enables the processes you need to accelerate production and meet customer demand more quickly. Infor Syte Line enables you to: Increase customer satisfaction Plan and schedule order by order Increase forecasting speed and accuracy Minimize error-prone manual steps Deliver orders on time, every time Reduce inventory levels and shortages Leverage innovative technologies Packaged with smart functionality to address the key challenges manufacturers face today, Infor Syte Line requires less customization, shorter implementation time, and fewer IT resources to maintain. That means an immediate return on your investment, and lower total cost of ownership over the long term. From the very first day, you’ll see improvements in visibility and transparency of data to address your challenges. The solution’s lean planning and scheduling capabilities provide the latest in demand pull algorithms, but also honor traditional lean pull parameters, enabling you to achieve the best of both lean worlds. Software as a Service Infor Syte Line is also available through Software as a Service (Saa S) hosted and subscription models, including optional application managed services. This provides manufacturers with unprecedented choice in not only how they purchase, but also how they deploy and manage Syte Line. With Saa S, manufacturers gain access to the same functionality available in on-premises software, with the flexibility of on-demand access from Infor. With multiple deployment and buying options for Infor Syte Line , manufacturers can choose the model that meets their individual requirements. Features Infor Syte Line supports continual change as manufacturers strive to maintain their competitive edge and adapt their business processes to continually meet customer promises, demands and business-specific requirements. Specifically, Infor Syte Line provides: Advanced Planning and Scheduling (APS), a fully integrated, lean advanced planning engine that synchronizes material and capacity to customer orders with real-time available-to-promise and capable-to-promise capability. Product Configuration to ensure configured orders are accurate for the customer and feasible for production. High level of personalization ensures that the system is convenient and easy-to-use, putting the needed information and functions literally at the fingertips of each user based on industry, duties, and responsibilities Field Service Management to build long-term customer loyalty and satisfaction Quality Control System helps reduce costs by reducing labor, scrap, burden and other non-value adding activities while improving quality and meeting customer expectations Workflow to drive consistency and completeness, enhance communications, and simplify processes for cost and time savings Accounts Payable Infor ERP Syte Line Accounts Payable brings world-class functionality and control to your cash management system. With features that streamline and simplify the critical daily tasks that make sound financial management possible, Syte Line Accounts Payable helps managers stay abreast of critical cash positions to improve efficiency and profitability. Infor ERP Syte Line Account Payable’s rich connections to the entire suite of Syte Line‘s modules will give your payables process full, fast, and accurate financial and operational information to help you make better decisions and execute your business strategy more effectively. Centralized or decentralized A/P payments Consolidate vouchers (one voucher for multiple POs)Create recurring vouchers and specify the frequency Create vouchers automatically through POs/receipts matching Enter voucher prior to PO receipt (Voucher pre-register)Vendor and voucher holds Remit-To vendors Vendor Debit Memos Electronic fund transfer payments with remittance advice Multi-currency Payment processing Multi-lingual vendor paperwork Assign vendor accounts to specific A/P accounts on the G/L. Write checks ?on-the-fly? in support of immediate payment of invoices Accounts Receivable Other than inventory, no asset is typically larger than your Accounts Receivable (AR). Infor ERP Syte Line‘s AR helps you become more efficient, thus having a positive impact on cash flow, reduction of bad debt, and improved customer relationships. Infor ERP Syte Line‘s AR facilitates the process of applying receipts, allows you to view current account balances, and improves the communication between your billing, credit, and collection departments in real time. Payment information is tracked instantaneously, allowing you to gather statistical information about customer payment history which helps to improve customer support and cash flow. With Infor ERP Syte Line AR, you gain the accurate, real-time information you need to make immediate decisions about extending credit limits, collections, and managing a key component of your cash flow. Centralized or decentralized AR Cash Receipts that automatically post to Bank Reconciliations Consolidated Invoicing by period or group of shipments Multi-user Invoicing Credit management including customer and order holds Progressive billing Support complex invoicing terms3 Tier Customers (Corp— Bill To, Sold To (s), Ship To (s))Dunning letters Finance charges Letter of Credit support Multi-currency Multi-lingual invoices, credit memos & statements Generate A/R invoices automatically from shipping activities Assign customer accounts to specific A/R accounts Report customer prepayment and automatically deduct the amount of the prepayment or credit from the invoice total. Generate credit memos from returns Create credit memos for price adjustments, then apply them to open invoices Bills of Material Infor ERP Syte Line supports the creation of Bills of Materials for manufactured parts. A Bill of Material (BOM) is the set of materials needed to complete each of the operations. The BOM can be multi-level, which means one of the materials required for operation xyz is a subassembly that has its own routing and BOM. Changes to Bills of Materials are automatically captured at the time a Job is released. You can create a new BOM by copying it from another inventory item (which uses the current routing and BOM), another job, estimate job, or a production schedule item or release. Create both the routing and Bill of Material on one screen using Engineering Workbench. Copy bills of materials from jobs, items, estimates, or production schedules Assign fixed and variable overhead rates to materials Maintain reference information (bubble number, reference designator, assembly sequence)Define alternate Bills of Materials Set Items to back flush Enter the percentage of scrap expected for use with planning or purchasing Effectivity and obsolescence dates Phantom Items Where used Routings A routing is a group of steps which must be performed to assemble an item. This is typically a step within a Bill of Materials operation. Routings are used for planning, scheduling and costing. Create both the routing and Bill of Material on one screen using Engineering Workbench. Copy routings from jobs, items, estimates, or production schedules Define your production standards — pieces/hour, hours/piece, fixed hours Support of Outside Service routing steps Capture move, queue, setup, and finish times Assign fixed and variable overhead rates Unlimited Notes to operations Resource planning available Engineering Change Notices (ECN)Use the Infor ERP Syte Line Engineering Change Notices (ECN) form to control and track revisions made to a Bill of Material or to the routing of an item. The ECN process is crucial in ensuring high quality, safety, and consistency of products. Approvals of changes before it can be used on Jobs or Estimates Mass replace/delete Enter a priority code to determine the order in which you want to implement the ECNMaintain reason codes Maintain distribution codes for who must be notified of the ECN change Identify what needs to be changed Copy ECN functionality Revision Control Track ECN and revision history Maintain an audit trail of changes to the ECN record throughout the change process. Reporting that will allow you to see the Jobs that are affected by ECNs Maintain a comprehensive audit trail of changes to the Bill of Material and routings Update part or document revision levels automatically upon incorporating changes. Costing The Cost Accounting features within Infor ERP Syte Line support both actual costing and standard costing, providing you with the flexibility to choose the Cost Type and Cost Method that works best for you. Infor ERP Syte Line captures costs as changes occur, ensuring up-to-date and accurate costing. You can also link purchases directly to existing work orders through the Purchasing or Manufacturing module, earmarking costs specific to the appropriate job. Additionally, you can link work orders to specific customer orders, which allows you to know the true margin earned for each customer order. Infor ERP Syte Line automatically charges work order costs for customer orders to the Cost of Goods Sold upon shipment to the customer. Costs by Item or Item Warehouse Cost methods include Standard, Actual, LIFO, FIFO and Lot Specific Update stockroom and WIP inventory records in real-time automatically. Link POs to work orders to capture costs for a job. Link work orders to customer orders to measure true margins. Drive costs by Work Center and Department Break out Job tracking and costing into five cost buckets Create and post journals to the General Ledger quickly and easily. Customer Relationship Management (CRM)The customer relationship management (CRM) module was designed as an end-to-end customer centric solution that allows you to track customers from lead origination through the sales cycle and placing the order. The CRM module is integrated with front and back office modules streamlining the processes and ultimately decreasing costs and increasing revenue. Here are some other features: Track all elements of a marketing or sales campaign through Opportunities Manage all tasks associated with an opportunity using the Opportunity Tasks form Manage contact information and basic company information of your competitors Create and manage campaigns Track estimate orders assigned to prospects or customers Maintain territory information, the SIC code, company revenue and number of employees for each customer Cross reference your sales contacts with customers and prospects Assist prospects and customers from initial interest through order placement using the Prospects and Leads forms Convert prospects to customers Organize prospects and customers by Territories Create and manage sales teams for customers, prospects, and opportunities Track communications with sales contacts, prospects, and customers Maintain basic information about your sales contacts Create sales forecasts Add opportunities to a sales forecast Create sales periods Sales person homepage Mail Merge and email Blasts Syteline Customer Portal Allow your customer to become more involved in the order process through the Syteline Customer Portal. Your customers can use the customer Portal for checking on order status, view outstanding estimates, requesting an RMA or reprinting an invoice can now be handled directly by the customer. They can also look at product information including browsing products by category, displaying featured products and top sellers, and then drilling down to individual items with pictures, pricing and associate recommended terms. Electronic Data Interchange (EDI)Any organization that exchanges information, including enterprises involved in procurement/purchasing, finance, trade and transport, health, law, and revenue/tax collection, can use Electronic Data Interchange (EDI). EDI can help you reduce paperwork and administrative lead times, send timely business transactions, access information quickly and easily, and eliminate redundant data entry. These benefits allow your enterprise to adopt more efficient practices such as Just-In-Time Delivery. Infor ERP Syte Line is integrated with an EDI translator. The system imports inbound transactions from the translator and exports outbound transactions to the translator. The EDI translator interface supports six demand side and six supply side transaction sets. Infor ERP Syte Line EDI complies with the American National Standards Institute (ANSI) X12 and EDIFACT (International) standards. Create standard transactions to meet your trading partners‘ EDI requirements Convert inbound EDI documents into customer orders Manage releases and ship schedules from your customers Maintain fabricated and raw material authorizations Create data files for Advanced Ship Notices, Vendor Purchase Orders, and Invoices Cross-reference Customer Part IDs to Infor ERP Syte Line Part Numbers Fixed Assets It is crucial to have a full picture of your assets from the time the asset is accquired until the asset is retired or disposed of. The Infor ERP Syteline Fixed Asset module is a complete capital asset information and management system. Infor ERP Syte Line Fixed Assets allows you to manage your assets through their entire lifecycle. Cradle to grave asset management User-defined asset numbers Unlimited number of Asset classes Comprehensive Asset Definition Location Insurance Original PO and Invoice Number Serial and/or Model Number Manufacturer Costs Seven predefined depreciation methods and allows additional, user-defined depreciation methods to be added as needed. Maintain multiple depreciation schedules for each Fixed Asset. Interfaces to the General Ledger: Fixed Assets Disposal Fixed Assets Transfer Depreciation Posting (for BOOK schedule only)Entering of a Fixed Asset purchase General Ledger Infor ERP Syte Line‘s General Ledger tracks financial expenditures within the company and generates financial statements and reports for management, auditors, and investors. The General Ledger is tied to other parts of the system through the Chart of Accounts and the distribution journals. A Chart of Accounts is easily created to control how you want to report on your business. Financial information collected during dayto-day operations is posted frequently to distribution journals. In addition to the distribution journals, there is a General journal that you can use to hold closeout and summary entries for year-end procedures. You can also create user-defined journals - custom journals to store, retrieve, and track entries specific to your business. Unit Codes can be activated for each account in the Chart of Accounts, to collect key management data. Hierarchical General Ledger Define a Chart of Accounts that mirrors your enterprise structure. Statistical accounts Create recurring journals, reversal journals, and automatic allocations based on rules you specify. Account Class Export results of queries to Excel, ASCII file, Clipboard Full G/L drill down to source documents Budgeting Multi-site journal entries Bank reconciliation Obsolescence and effectivity dates on GL accounts Built in Financial Report Writer Cash flow analysis External Financial Interface Currency conversions Re-open closed years Security for out-of-period postings Multi-Site Ledger Consolidation Create your G/L reporting method (monthly, 4-4-5,13 Period)Infor Expense Management The days of frivolous spending and the corporate card are over as more and more companies tighten up their expenses and look for ways to decrease overall costs. More than just an end-to-end travel expense management solution, Infor Expense Management enables employees to plan and expense business travel; request and approve payment requests; capture time for charging to projects and cost centers; and calculate paid time off and overtime. These integrated applications share a single, intuitive interface, making them easy to learn, use, and maintain. With Expense Management, the result is comprehensive control over employee-initiated corporate spending. Infor Expense Management allows even complex, multinational organizations to automate expense-related business processes and enforce policy compliance, reducing associated administrative costs and decreasing the opportunity for accidental error and intentional fraud. With Expense management, you can implement instantaneous global updates to policies and processes to support continuous improvement, while simultaneously managing local policies and statutory requirements. Expense Management includes four core modules: Travel Plans, Reports, Payment Requests, and Timesheets. Each module features real-time policy notification, alerting employees to violations as they enter data and allowing them to provide explanations or make corrections before submitting plans or expenses; configurable workflow for alerting reviewers, obtaining necessary approvals, and then triggering events such as the issuance of plane tickets or the reimbursement of expenses; and business intelligence tools to analyze the solution‘s database and search for opportunities to transform spending into savings. These applications work where you do—in your office, on the road, and around the globe. They support multiple languages and currencies, work with all international date and currency formats, and enable you to apply rules and policies specific to independent divisions or geographic locations. Expense Management also accommodates country-specific per diem rates, local taxation requirements, variable VAT rates, and mileage rates. Benefits include: Improve employee compliance with spending policies Lower administrative costs Increase savings through effective vendor negotiation and rebate usage Reduce unnecessary travel and purchases Reduce people needed to process documents Reduce manager time spent on approvals Increase accuracy of time billed to clients and paid time off due employees Higher amounts of foreign taxes reclaimed Inventory Infor ERP Syte Line gives you more control over your inventory by providing greater accuracy and immediate access to inventory information throughout the company. Syte Line automates the process of tracking parts by adjusting inventory whenever you create a transaction involving a part. Infor ERP Syte Line updates and maintains raw materials, WIP and finished goods inventory quantities and costs. Inventory items can be designated as purchased, manufactured, or transferred so that you can immediately place a purchase order or issue a job order when you need a particular item. Infor ERP Syte Line also allows you to easily track material and costs on a per-project basis. The extensive reporting capabilities of Syte Line provide complete profiles of any part in the system. Assign comprehensive part definitions including variable length part numbers up to 30 characters long, extended part descriptions, user-definable fields, and supplier information. Stock goods in one unit of measure while purchasing, selling, and/or consuming on a work order in another unit of measure. Assign multiple warehouse locations for a part and/or multiple locations within a single warehouse. Issue materials by work order, operation, or sub-assembly automatically. Issue floor stock items automatically. Set up specialized item pricing such as quantity and discounted pricing, contract pricing, etc., for both purchasing and selling. Perform automated physical inventories, cycle counting, and ABC analysis. Real-time material tracking and allocations. Safety Stock, Reorder Points, Order min/multiple/max, Lot/serial control. Kitting. Selectable dedicated warehouses (as for spares). Temporary and permanent item locations. Inter and intra Warehouse transfers and moves. Obsolete and slow moving inventory flags and analysis. Inventory aging reporting. Cost methods, including standard, actual, LIFO, FIFO and Lot Specific by item. Costs by Item or Item Warehouse. User defined unit of measure conversion. Multi-lingual item descriptions. Physical Inventory Any company with inventory knows that conducting a physical inventory (counting all inventory in the warehouse) can be a daunting task. Profitable and successful business rely on accurate physical inventories. nfor ERP Syte Line Physical Inventory allows you to obtain accurate information about quantities on hand, which will help you make more informed business decisions. Freeze/unfreeze inventory Inventory tags or inventory tag sheets Generation of inventory count for every item/location/lot/serial combination Inventory pre-adjustment report that lists quantity and cost variance Physical inventory approval Void/unvoid inventory tag sheets Void tag sheet report Generate blank tags or sheets Cycle Counting To improve the efficiency of the physical inventory, it is important that your company does Cycle Counting which allows you to perform an inventory count a small subset of your inventory. This is similar to a physical inventory but on a smaller scale and doesn’t require a warehouse inventory freeze. Thus, cycle counts do not interrupt your daily operations, provide for continuous audits of the inventory and can be focused on specific skus. Multiple ways to determine the ABC Code on Items (Year-to-date usage, Future usage, or Unit Cost)Determine ABC percentages for Purchase, Manufactured, and Transferred Items Mass update to determine Cycle Type, Cycle Frequency, and Last Count Date for Items Count sheets automatically generated based on Cycle Triggers Exception reporting that does not allow records to post until corrected, such as: Item is not in Items Stockroom location not found On-hand quantity is not equal to on-hand quantity when cycle count was generated Variance reporting Eliminate the need for yearly physical inventory counts Shipping/Receiving Ship against a customer order or receive inventory from a purchase order directly to a job or directly into the inventory. Hard and soft allocations/reservations Picking and Packing lists Delivery Orders Goods Received Notices Available to ship analysis Multiple units of measure Receipt rejections and reason codes Landed Costs The ability to create payment vouchers from purchase order receipts The ability to create invoices from shipments to a customer Transfers Visibility of in-transit inventory across the system including Transfer Order number, item, quantity in-transit, quantity to be shipped, date, shipment mode, freight cost, and value of shipment. Financial transactions Landed cost Cross-reference functionality Picking List functionality Packing Slip functionality Bill of Lading functionality Pro Forma Invoice functionality Various costing and pricing methods Automatic updating of inventory fields for Planned Transfer Orders Ability to enter a transfer order without knowing the location or lot number. Location not required until receipt. Partial shipping and receiving Ability to track quantity differences, such as: loss, shrink, damage, rejects, and advance shipmen using Reason Codes. Data Collection for shipping and receiving transactions Quick Entry form Multi-Currency Infor ERP Syte Line Multi-Currency allows you to buy and sell in foreign currencies. Tracking of base (domestic) currencies as well as extensive exchange rate tables, reduce manual transactions. Syte Line supports the following scenarios: Companies who process all transactions for a month at a given exchange rate. At the end of each month (or the beginning of the next month), the company performs a revaluation of all foreign currency translations. Companies who negotiate each foreign currency transaction at a fixed rate agreed with the customer/vendor. Payments are at that fixed rate. When using a fixed rate, specify that rate on the Customer Orders or Purchase Orders form’s Amounts tab. (Running the Currency Revaluation utilities will not impact these entries. )Syte Line also allows for a mix (using both the system exchange rate and orders with fixed rates) of the previous methods described above. Maintain Currency Rates and Tables Use either fixed or variable rates Euro conversion tools FASB52 compliance Recognition of currency exchange rate gains or losses Maintain customer and vendor records in the foreign currency but can quickly be translated to your domestic currency Maintain general ledger in your domestic currency Specify the currency used by the bank for each of your accounts Customer Orders defaulted in your Customer‘s currency Invoices defaulted to Customer‘s currency Converts Cash Receipts automatically Purchase Orders defaulted in your Vendor‘s currency Print checks in the Vendor‘s currency Purchase Orders and Requisitions Purchase Order Requisitions Not just a purchase order system, the Infor ERP Syte Line Purchase Order Requisitions allows management to have better control of the company’s spending by tracking employees/departments spending. Purchase Order Requisitions provide an authorization for the purchasing department to procure goods and services. Requests are document and routed for approval prior to being sent to the purchasing department and accounting department. This module allows you to create a manual PO or cross-reference a customer, transfer order, BOM or job. Planned orders can also be set up as a PO Requisition. Proposed purchases are subject to approvals and can be approved by users with the proper authorization levels. Generate a unique Purchase Order Requisition number automatically Create PO‘s for Inventory and Non Inventoried Items Create PO Requisitions from Customer Order Lines, Customer Order Blanket Releases, Estimated Materials, Estimate Project Resources, Job Materials, Project Resources, and Transfer Order Lines automatically Set Approval Levels by PO Requisition Limit and PO Requisition Line Limit See and approve all of the PO Requisitions that an approver owns Convert approved PO Requisitions to Purchase Orders automatically Purchase Order Processing Once the requisitions are approved, they are sent to the purchasing department for processing. The purchasing system handles all types of purchases including inventory itmes, supply items, outside service operations pertaining to a manufacturing order, and subcontracted items that require components being sent to the vendor. Drop shipments can include ship to address such as warehouses or customer locations. Enter purchase orders, order receipts, and returns in real-time and let Infor ERP Syte Line automatically calculate the adjustments to POs Purchase materials directly to a job Link a PO line item to a specific job requiring that item Issue materials to a work order when you receive items purchased directly to a job. Generate vendor purchase requisitions with approval limits Maintain Blanket Purchase Orders, supporting multiple delivery schedules and shipping addresses Buyer Home Page Store and track information about a particular item from a specific Vendor using Vendor/Item Cross Reference function. Specify multiple parts and delivery dates on purchase orders and include the vendor‘s part number for cross-referencing. Access Vendor Performance information, the Vendor Communication Log, and a listing of vendor information for items purchased regularly. In this manner, you can ensure that you have selected the best vendor for each purchase. View the planned costs, actual unit costs, promise dates, and due dates for each line item. Place vendors on payment hold if their goods or services are unacceptable using the Payment Hold feature. Because a Purchase Order represents a contract with a vendor, Purchasing provides you with a utility for changing Purchase Orders and tracking the changes you make Quality Infor ERP Syte Line Quality Control Solution (QCS) integrates best-in-class quality into the Syte Line functions you already use to run your manufacturing operation. It supports quality activities related to receiving, manufacturing, shipping, and returns. QCS also manages advanced quality activities across your entire organization, including quality incidents, change management, and responses to audit findings. Infor ERP Syte Line Quality Control Solution creates the framework for building a culture of continuous improvement throughout your organization. QCS supports quality activities of your entire enterprise, not just the manufacturing process. The four distinct QCS modules, all built on a common foundation of powerful quality management tools, include: The QCS Enterprise module encompasses: Topics Changes Web portal Process flow QCS includes support for quality incidents, change management, responses to audit findings, machine and maintenance issues, safety, training, and opportunities for continuous improvements. With Infor ERP Syte Line QCS, you can make specific reviews mandatory and require that those reviews get addressed as a precondition to closing a change-management report. Because communicating quality issues and their status is such a critical component of any quality system, the QCS Web portal allows all employees to view quality data, without the need to log into Syte Line. It also monitors and reports quality performance data, and offers basic document management functions. The QCS Web portal allows all employees to view quality data, without the need to log into Syte Line. It also monitors and reports quality performance data, and offers basic document management functions. The QCS Supplier module manages: Receiving inspection Vendor Return Merchandise Authorization (RMA)Supplier performance reporting The process of managing your suppliers never ends. Beginning with a review of the supplier facilities and an approval process, the Syte Line QCS Supplier module helps track vendor communications and quality control (QC) status. The receiving process of this module includes material handling, safety alerts, printing tags, assigning unique tracking numbers, and putting material in a QC holding area pending disposition. From here, QC inspects and assigns the material to inventory for production or tracks non-conforming material to its final disposition. It also provides integrated Vendor RMA support, including links with accounting. QCS automatically calculates vendor product quality and delivery Sales The sales module in Syteline is more than just an order entry tool. It is a comprehensive module that allows users to manage a customer from the point of customer quotes through customer order entry, engineering, production, costing, shipping and customer services. Estimating Create comprehensive quotes by easily createing estimates quickly and easily by company from another estimate, an existing work order, or a bill of material and then modifiying the new estimate to match the customer’s specifications. Infor ERP Syteline creates a cost estimate that includes material, labor, burden and outside services. If the contract is approved by the customer you can easily convert that estimate to a sales order and a work order for production purposes. Here are some other features: Engineering Sandbox Development Quoting and Cost Analysis Copy an Estimate from another Estimate, a work order, or Bill of Material, and then make modifications as necessary. What-if Scheduling Pricing tables Multiple Price Breaks Estimate Status to reflect Customer acceptance Estimates Quick Entry Form Estimate Response Form for customers Customer Order Entry and Invoicing Quickly and easily access sales order information to provide high level customer service. Your customer service representatives have an online support center to enter and track customer orders and create invoices. This integration allows customer service reps to take action on credit problems, reschedule requirements, and release orders in a timely manner to meet required shipment dates. Other features: Centralized and decentralized order entry Customer Orders Quick Entry Form Automatic credit checking, warnings and hold Order change history Volume, customer/item, contract and matrix pricing Hard and soft allocations Three-tier Customers (Corp—Bill To, Sold To (s), Ship To (s))Drop Shipping by order/line/release Regular/Blanket Orders Kit orders Ship Early/Partial processing Time-phased item availability Ability to link customer order lines directly to Job Orders, Inventory, Purchase Orders and Transfer Orders Order/Line Discounts Available to promise for real delivery dates Features and Options order configuration Multi-lingual customer paperwork, including invoices Foreign currencies Sales tax calculations: VAT & GATProgressive billings Customer Document Profiles Letters of credit Order acknowledgements Advanced Shipping Notices Consolidated invoicing Drop ship orders (direct from vendor)Customer Service Homepage Service Management With exceptional flexibility and ease of use, Infor ERP Syte Line Field Service Plus is the ideal solution for nearly every field service requirement through the full spectrum of the service lifecycle. This robust service management solution meets the specific needs of companies that manufacture, install, or service complex products. Its powerful features include: Contact center - Give your call center easy access to detailed data for fast response to inquiries and work order creation. Work orders - Track and manage work orders for faster completion of service requests, more accurate billing, and greater customer satisfaction. Scheduling and dispatch - Gain visibility into each technician‘s schedule, route, certification level, and experience with Field Service Plus, so that you can match the right technician with the right job. You‘ll also increase resolution rates and minimize the cost of non-essential trips back to the warehouse. Plant maintenance - Schedule preventative maintenance for internal assets in order to prevent unexpected downtimes, extend the lifecycle of equipment, and maximize warranty cost savings. Service contracts - Track and manage service level agreements with maximum efficiency. Visibility into the contract details, unit, and service history improves decision making and creates opportunities to up sell or extend service agreements. Depot repair - Manage product returns for repair, refurbishment, or shipment to a third party vendor. Service History - Access complete historical data, including customer profile, unit description, contract status, and service history. Analytics - Integrated data, total visibility, and accurate tracking make it easy to analyze data down to the detail level. Flexible reporting aids in decision making, planning, and providing engineering with valuable information needed to adapt product or part designs Accounts Payable Infor ERP Syte Line Accounts Payable brings world-class functionality and control to your cash management system. With features that streamline and simplify the critical daily tasks that make sound financial management possible, Syte Line Accounts Payable helps managers stay abreast of critical cash positions to improve efficiency and profitability. Infor ERP Syte Line Account Payable’s rich connections to the entire suite of Syte Line‘s modules will give your payables process full, fast, and accurate financial and operational information to help you make better decisions and execute your business strategy more effectively. Centralized or decentralized A/P payments Consolidate vouchers (one voucher for multiple POs)Create recurring vouchers and specify the frequency Create vouchers automatically through POs/receipts matching Enter voucher prior to PO receipt (Voucher pre-register)Vendor and voucher holds Remit-To vendors Vendor Debit Memos Electronic fund transfer payments with remittance advice Multi-currency Payment processing Multi-lingual vendor paperwork Assign vendor accounts to specific A/P accounts on the G/L. Write checks ?on-the-fly? in support of immediate payment of invoices Accounts Receivable Other than inventory, no asset is typically larger than your Accounts Receivable (AR). Infor ERP Syte Line‘s AR helps you become more efficient, thus having a positive impact on cash flow, reduction of bad debt, and improved customer relationships. Infor ERP Syte Line‘s AR facilitates the process of applying receipts, allows you to view current account balances, and improves the communication between your billing, credit, and collection departments in real time. Payment information is tracked instantaneously, allowing you to gather statistical information about customer payment history which helps to improve customer support and cash flow. With Infor ERP Syte Line AR, you gain the accurate, real-time information you need to make immediate decisions about extending credit limits, collections, and managing a key component of your cash flow. Centralized or decentralized AR Cash Receipts that automatically post to Bank Reconciliations Consolidated Invoicing by period or group of shipments Multi-user Invoicing Credit management including customer and order holds Progressive billing Support complex invoicing terms3 Tier Customers (Corp— Bill To, Sold To (s), Ship To (s))Dunning letters Finance charges Letter of Credit support Multi-currency Multi-lingual invoices, credit memos & statements Generate A/R invoices automatically from shipping activities Assign customer accounts to specific A/R accounts Report customer prepayment and automatically deduct the amount of the prepayment or credit from the invoice total. Generate credit memos from returns Create credit memos for price adjustments, then apply them to open invoices Bills of Material Infor ERP Syte Line supports the creation of Bills of Materials for manufactured parts. A Bill of Material (BOM) is the set of materials needed to complete each of the operations. The BOM can be multi-level, which means one of the materials required for operation xyz is a subassembly that has its own routing and BOM. Changes to Bills of Materials are automatically captured at the time a Job is released. You can create a new BOM by copying it from another inventory item (which uses the current routing and BOM), another job, estimate job, or a production schedule item or release. Create both the routing and Bill of Material on one screen using Engineering Workbench. Copy bills of materials from jobs, items, estimates, or production schedules Assign fixed and variable overhead rates to materials Maintain reference information (bubble number, reference designator, assembly sequence)Define alternate Bills of Materials Set Items to back flush Enter the percentage of scrap expected for use with planning or purchasing Effectivity and obsolescence dates Phantom Items Where used Routings A routing is a group of steps which must be performed to assemble an item. This is typically a step within a Bill of Materials operation. Routings are used for planning, scheduling and costing. Create both the routing and Bill of Material on one screen using Engineering Workbench. Copy routings from jobs, items, estimates, or production schedules Define your production standards — pieces/hour, hours/piece, fixed hours Support of Outside Service routing steps Capture move, queue, setup, and finish times Assign fixed and variable overhead rates Unlimited Notes to operations Resource planning available Engineering Change Notices (ECN)Use the Infor ERP Syte Line Engineering Change Notices (ECN) form to control and track revisions made to a Bill of Material or to the routing of an item. The ECN process is crucial in ensuring high quality, safety, and consistency of products. Approvals of changes before it can be used on Jobs or Estimates Mass replace/delete Enter a priority code to determine the order in which you want to implement the ECNMaintain reason codes Maintain distribution codes for who must be notified of the ECN change Identify what needs to be changed Copy ECN functionality Revision Control Track ECN and revision history Maintain an audit trail of changes to the ECN record throughout the change process. Reporting that will allow you to see the Jobs that are affected by ECNs Maintain a comprehensive audit trail of changes to the Bill of Material and routings Update part or document revision levels automatically upon incorporating changes. Costing The Cost Accounting features within Infor ERP Syte Line support both actual costing and standard costing, providing you with the flexibility to choose the Cost Type and Cost Method that works best for you. Infor ERP Syte Line captures costs as changes occur, ensuring up-to-date and accurate costing. You can also link purchases directly to existing work orders through the Purchasing or Manufacturing module, earmarking costs specific to the appropriate job. Additionally, you can link work orders to specific customer orders, which allows you to know the true margin earned for each customer order. Infor ERP Syte Line automatically charges work order costs for customer orders to the Cost of Goods Sold upon shipment to the customer. Costs by Item or Item Warehouse Cost methods include Standard, Actual, LIFO, FIFO and Lot Specific Update stockroom and WIP inventory records in real-time automatically. Link POs to work orders to capture costs for a job. Link work orders to customer orders to measure true margins. Drive costs by Work Center and Department Break out Job tracking and costing into five cost buckets Create and post journals to the General Ledger quickly and easily. Customer Relationship Management (CRM)The customer relationship management (CRM) module was designed as an end-to-end customer centric solution that allows you to track customers from lead origination through the sales cycle and placing the order. The CRM module is integrated with front and back office modules streamlining the processes and ultimately decreasing costs and increasing revenue. Here are some other features: Track all elements of a marketing or sales campaign through Opportunities Manage all tasks associated with an opportunity using the Opportunity Tasks form Manage contact information and basic company information of your competitors Create and manage campaigns Track estimate orders assigned to prospects or customers Maintain territory information, the SIC code, company revenue and number of employees for each customer Cross reference your sales contacts with customers and prospects Assist prospects and customers from initial interest through order placement using the Prospects and Leads forms Convert prospects to customers Organize prospects and customers by Territories Create and manage sales teams for customers, prospects, and opportunities Track communications with sales contacts, prospects, and customers Maintain basic information about your sales contacts Create sales forecasts Add opportunities to a sales forecast Create sales periods Sales person homepage Mail Merge and email Blasts Syteline Customer Portal Allow your customer to become more involved in the order process through the Syteline Customer Portal. Your customers can use the customer Portal for checking on order status, view outstanding estimates, requesting an RMA or reprinting an invoice can now be handled directly by the customer. They can also look at product information including browsing products by category, displaying featured products and top sellers, and then drilling down to individual items with pictures, pricing and associate recommended terms. Electronic Data Interchange (EDI)Any organization that exchanges information, including enterprises involved in procurement/purchasing, finance, trade and transport, health, law, and revenue/tax collection, can use Electronic Data Interchange (EDI). EDI can help you reduce paperwork and administrative lead times, send timely business transactions, access information quickly and easily, and eliminate redundant data entry. These benefits allow your enterprise to adopt more efficient practices such as Just-In-Time Delivery. Infor ERP Syte Line is integrated with an EDI translator. The system imports inbound transactions from the translator and exports outbound transactions to the translator. The EDI translator interface supports six demand side and six supply side transaction sets. Infor ERP Syte Line EDI complies with the American National Standards Institute (ANSI) X12 and EDIFACT (International) standards. Create standard transactions to meet your trading partners‘ EDI requirements Convert inbound EDI documents into customer orders Manage releases and ship schedules from your customers Maintain fabricated and raw material authorizations Create data files for Advanced Ship Notices, Vendor Purchase Orders, and Invoices Cross-reference Customer Part IDs to Infor ERP Syte Line Part Numbers Fixed Assets It is crucial to have a full picture of your assets from the time the asset is accquired until the asset is retired or disposed of. The Infor ERP Syteline Fixed Asset module is a complete capital asset information and management system. Infor ERP Syte Line Fixed Assets allows you to manage your assets through their entire lifecycle. Cradle to grave asset management User-defined asset numbers Unlimited number of Asset classes Comprehensive Asset Definition Location Insurance Original PO and Invoice Number Serial and/or Model Number Manufacturer Costs Seven predefined depreciation methods and allows additional, user-defined depreciation methods to be added as needed. Maintain multiple depreciation schedules for each Fixed Asset. Interfaces to the General Ledger: Fixed Assets Disposal Fixed Assets Transfer Depreciation Posting (for BOOK schedule only)Entering of a Fixed Asset purchase General Ledger Infor ERP Syte Line‘s General Ledger tracks financial expenditures within the company and generates financial statements and reports for management, auditors, and investors. The General Ledger is tied to other parts of the system through the Chart of Accounts and the distribution journals. A Chart of Accounts is easily created to control how you want to report on your business. Financial information collected during dayto-day operations is posted frequently to distribution journals. In addition to the distribution journals, there is a General journal that you can use to hold closeout and summary entries for year-end procedures. You can also create user-defined journals - custom journals to store, retrieve, and track entries specific to your business. Unit Codes can be activated for each account in the Chart of Accounts, to collect key management data. Hierarchical General Ledger Define a Chart of Accounts that mirrors your enterprise structure. Statistical accounts Create recurring journals, reversal journals, and automatic allocations based on rules you specify. Account Class Export results of queries to Excel, ASCII file, Clipboard Full G/L drill down to source documents Budgeting Multi-site journal entries Bank reconciliation Obsolescence and effectivity dates on GL accounts Built in Financial Report Writer Cash flow analysis External Financial Interface Currency conversions Re-open closed years Security for out-of-period postings Multi-Site Ledger Consolidation Create your G/L reporting method (monthly, 4-4-5,13 Period)Infor Expense Management The days of frivolous spending and the corporate card are over as more and more companies tighten up their expenses and look for ways to decrease overall costs. More than just an end-to-end travel expense management solution, Infor Expense Management enables employees to plan and expense business travel; request and approve payment requests; capture time for charging to projects and cost centers; and calculate paid time off and overtime. These integrated applications share a single, intuitive interface, making them easy to learn, use, and maintain. With Expense Management, the result is comprehensive control over employee-initiated corporate spending. Infor Expense Management allows even complex, multinational organizations to automate expense-related business processes and enforce policy compliance, reducing associated administrative costs and decreasing the opportunity for accidental error and intentional fraud. With Expense management, you can implement instantaneous global updates to policies and processes to support continuous improvement, while simultaneously managing local policies and statutory requirements. Expense Management includes four core modules: Travel Plans, Reports, Payment Requests, and Timesheets. Each module features real-time policy notification, alerting employees to violations as they enter data and allowing them to provide explanations or make corrections before submitting plans or expenses; configurable workflow for alerting reviewers, obtaining necessary approvals, and then triggering events such as the issuance of plane tickets or the reimbursement of expenses; and business intelligence tools to analyze the solution‘s database and search for opportunities to transform spending into savings. These applications work where you do—in your office, on the road, and around the globe. They support multiple languages and currencies, work with all international date and currency formats, and enable you to apply rules and policies specific to independent divisions or geographic locations. Expense Management also accommodates country-specific per diem rates, local taxation requirements, variable VAT rates, and mileage rates. Benefits include: Improve employee compliance with spending policies Lower administrative costs Increase savings through effective vendor negotiation and rebate usage Reduce unnecessary travel and purchases Reduce people needed to process documents Reduce manager time spent on approvals Increase accuracy of time billed to clients and paid time off due employees Higher amounts of foreign taxes reclaimed Inventory Infor ERP Syte Line gives you more control over your inventory by providing greater accuracy and immediate access to inventory information throughout the company. Syte Line automates the process of tracking parts by adjusting inventory whenever you create a transaction involving a part. Infor ERP Syte Line updates and maintains raw materials, WIP and finished goods inventory quantities and costs. Inventory items can be designated as purchased, manufactured, or transferred so that you can immediately place a purchase order or issue a job order when you need a particular item. Infor ERP Syte Line also allows you to easily track material and costs on a per-project basis. The extensive reporting capabilities of Syte Line provide complete profiles of any part in the system. Assign comprehensive part definitions including variable length part numbers up to 30 characters long, extended part descriptions, user-definable fields, and supplier information. Stock goods in one unit of measure while purchasing, selling, and/or consuming on a work order in another unit of measure. Assign multiple warehouse locations for a part and/or multiple locations within a single warehouse. Issue materials by work order, operation, or sub-assembly automatically. Issue floor stock items automatically. Set up specialized item pricing such as quantity and discounted pricing, contract pricing, etc., for both purchasing and selling. Perform automated physical inventories, cycle counting, and ABC analysis. Real-time material tracking and allocations. Safety Stock, Reorder Points, Order min/multiple/max, Lot/serial control. Kitting. Selectable dedicated warehouses (as for spares). Temporary and permanent item locations. Inter and intra Warehouse transfers and moves. Obsolete and slow moving inventory flags and analysis. Inventory aging reporting. Cost methods, including standard, actual, LIFO, FIFO and Lot Specific by item. Costs by Item or Item Warehouse. User defined unit of measure conversion. Multi-lingual item descriptions. Physical Inventory Any company with inventory knows that conducting a physical inventory (counting all inventory in the warehouse) can be a daunting task. Profitable and successful business rely on accurate physical inventories. nfor ERP Syte Line Physical Inventory allows you to obtain accurate information about quantities on hand, which will help you make more informed business decisions. Freeze/unfreeze inventory Inventory tags or inventory tag sheets Generation of inventory count for every item/location/lot/serial combination Inventory pre-adjustment report that lists quantity and cost variance Physical inventory approval Void/unvoid inventory tag sheets Void tag sheet report Generate blank tags or sheets Cycle Counting To improve the efficiency of the physical inventory, it is important that your company does Cycle Counting which allows you to perform an inventory count a small subset of your inventory. This is similar to a physical inventory but on a smaller scale and doesn’t require a warehouse inventory freeze. Thus, cycle counts do not interrupt your daily operations, provide for continuous audits of the inventory and can be focused on specific skus. Multiple ways to determine the ABC Code on Items (Year-to-date usage, Future usage, or Unit Cost)Determine ABC percentages for Purchase, Manufactured, and Transferred Items Mass update to determine Cycle Type, Cycle Frequency, and Last Count Date for Items Count sheets automatically generated based on Cycle Triggers Exception reporting that does not allow records to post until corrected, such as: Item is not in Items Stockroom location not found On-hand quantity is not equal to on-hand quantity when cycle count was generated Variance reporting Eliminate the need for yearly physical inventory counts Shipping/Receiving Ship against a customer order or receive inventory from a purchase order directly to a job or directly into the inventory. Hard and soft allocations/reservations Picking and Packing lists Delivery Orders Goods Received Notices Available to ship analysis Multiple units of measure Receipt rejections and reason codes Landed Costs The ability to create payment vouchers from purchase order receipts The ability to create invoices from shipments to a customer Transfers Visibility of in-transit inventory across the system including Transfer Order number, item, quantity in-transit, quantity to be shipped, date, shipment mode, freight cost, and value of shipment. Financial transactions Landed cost Cross-reference functionality Picking List functionality Packing Slip functionality Bill of Lading functionality Pro Forma Invoice functionality Various costing and pricing methods Automatic updating of inventory fields for Planned Transfer Orders Ability to enter a transfer order without knowing the location or lot number. Location not required until receipt. Partial shipping and receiving Ability to track quantity differences, such as: loss, shrink, damage, rejects, and advance shipmen using Reason Codes. Data Collection for shipping and receiving transactions Quick Entry form Multi-Currency Infor ERP Syte Line Multi-Currency allows you to buy and sell in foreign currencies. Tracking of base (domestic) currencies as well as extensive exchange rate tables, reduce manual transactions. Syte Line supports the following scenarios: Companies who process all transactions for a month at a given exchange rate. At the end of each month (or the beginning of the next month), the company performs a revaluation of all foreign currency translations. Companies who negotiate each foreign currency transaction at a fixed rate agreed with the customer/vendor. Payments are at that fixed rate. When using a fixed rate, specify that rate on the Customer Orders or Purchase Orders form’s Amounts tab. (Running the Currency Revaluation utilities will not impact these entries. )Syte Line also allows for a mix (using both the system exchange rate and orders with fixed rates) of the previous methods described above. Maintain Currency Rates and Tables Use either fixed or variable rates Euro conversion tools FASB52 compliance Recognition of currency exchange rate gains or losses Maintain customer and vendor records in the foreign currency but can quickly be translated to your domestic currency Maintain general ledger in your domestic currency Specify the currency used by the bank for each of your accounts Customer Orders defaulted in your Customer‘s currency Invoices defaulted to Customer‘s currency Converts Cash Receipts automatically Purchase Orders defaulted in your Vendor‘s currency Print checks in the Vendor‘s currency Purchase Orders and Requisitions Purchase Order Requisitions Not just a purchase order system, the Infor ERP Syte Line Purchase Order Requisitions allows management to have better control of the company’s spending by tracking employees/departments spending. Purchase Order Requisitions provide an authorization for the purchasing department to procure goods and services. Requests are document and routed for approval prior to being sent to the purchasing department and accounting department. This module allows you to create a manual PO or cross-reference a customer, transfer order, BOM or job. Planned orders can also be set up as a PO Requisition. Proposed purchases are subject to approvals and can be approved by users with the proper authorization levels. Generate a unique Purchase Order Requisition number automatically Create PO‘s for Inventory and Non Inventoried Items Create PO Requisitions from Customer Order Lines, Customer Order Blanket Releases, Estimated Materials, Estimate Project Resources, Job Materials, Project Resources, and Transfer Order Lines automatically Set Approval Levels by PO Requisition Limit and PO Requisition Line Limit See and approve all of the PO Requisitions that an approver owns Convert approved PO Requisitions to Purchase Orders automatically Purchase Order Processing Once the requisitions are approved, they are sent to the purchasing department for processing. The purchasing system handles all types of purchases including inventory itmes, supply items, outside service operations pertaining to a manufacturing order, and subcontracted items that require components being sent to the vendor. Drop shipments can include ship to address such as warehouses or customer locations. Enter purchase orders, order receipts, and returns in real-time and let Infor ERP Syte Line automatically calculate the adjustments to POs Purchase materials directly to a job Link a PO line item to a specific job requiring that item Issue materials to a work order when you receive items purchased directly to a job. Generate vendor purchase requisitions with approval limits Maintain Blanket Purchase Orders, supporting multiple delivery schedules and shipping addresses Buyer Home Page Store and track information about a particular item from a specific Vendor using Vendor/Item Cross Reference function. Specify multiple parts and delivery dates on purchase orders and include the vendor‘s part number for cross-referencing. Access Vendor Performance information, the Vendor Communication Log, and a listing of vendor information for items purchased regularly. In this manner, you can ensure that you have selected the best vendor for each purchase. View the planned costs, actual unit costs, promise dates, and due dates for each line item. Place vendors on payment hold if their goods or services are unacceptable using the Payment Hold feature. Because a Purchase Order represents a contract with a vendor, Purchasing provides you with a utility for changing Purchase Orders and tracking the changes you make Quality Infor ERP Syte Line Quality Control Solution (QCS) integrates best-in-class quality into the Syte Line functions you already use to run your manufacturing operation. It supports quality activities related to receiving, manufacturing, shipping, and returns. QCS also manages advanced quality activities across your entire organization, including quality incidents, change management, and responses to audit findings. Infor ERP Syte Line Quality Control Solution creates the framework for building a culture of continuous improvement throughout your organization. QCS supports quality activities of your entire enterprise, not just the manufacturing process. The four distinct QCS modules, all built on a common foundation of powerful quality management tools, include: The QCS Enterprise module encompasses: Topics Changes Web portal Process flow QCS includes support for quality incidents, change management, responses to audit findings, machine and maintenance issues, safety, training, and opportunities for continuous improvements. With Infor ERP Syte Line QCS, you can make specific reviews mandatory and require that those reviews get addressed as a precondition to closing a change-management report. Because communicating quality issues and their status is such a critical component of any quality system, the QCS Web portal allows all employees to view quality data, without the need to log into Syte Line. It also monitors and reports quality performance data, and offers basic document management functions. The QCS Web portal allows all employees to view quality data, without the need to log into Syte Line. It also monitors and reports quality performance data, and offers basic document management functions. The QCS Supplier module manages: Receiving inspection Vendor Return Merchandise Authorization (RMA)Supplier performance reporting The process of managing your suppliers never ends. Beginning with a review of the supplier facilities and an approval process, the Syte Line QCS Supplier module helps track vendor communications and quality control (QC) status. The receiving process of this module includes material handling, safety alerts, printing tags, assigning unique tracking numbers, and putting material in a QC holding area pending disposition. From here, QC inspects and assigns the material to inventory for production or tracks non-conforming material to its final disposition. It also provides integrated Vendor RMA support, including links with accounting. QCS automatically calculates vendor product quality and delivery Sales The sales module in Syteline is more than just an order entry tool. It is a comprehensive module that allows users to manage a customer from the point of customer quotes through customer order entry, engineering, production, costing, shipping and customer services. Estimating Create comprehensive quotes by easily createing estimates quickly and easily by company from another estimate, an existing work order, or a bill of material and then modifiying the new estimate to match the customer’s specifications. Infor ERP Syteline creates a cost estimate that includes material, labor, burden and outside services. If the contract is approved by the customer you can easily convert that estimate to a sales order and a work order for production purposes. Here are some other features: Engineering Sandbox Development Quoting and Cost Analysis Copy an Estimate from another Estimate, a work order, or Bill of Material, and then make modifications as necessary. What-if Scheduling Pricing tables Multiple Price Breaks Estimate Status to reflect Customer acceptance Estimates Quick Entry Form Estimate Response Form for customers Customer Order Entry and Invoicing Quickly and easily access sales order information to provide high level customer service. Your customer service representatives have an online support center to enter and track customer orders and create invoices. This integration allows customer service reps to take action on credit problems, reschedule requirements, and release orders in a timely manner to meet required shipment dates. Other features: Centralized and decentralized order entry Customer Orders Quick Entry Form Automatic credit checking, warnings and hold Order change history Volume, customer/item, contract and matrix pricing Hard and soft allocations Three-tier Customers (Corp—Bill To, Sold To (s), Ship To (s))Drop Shipping by order/line/release Regular/Blanket Orders Kit orders Ship Early/Partial processing Time-phased item availability Ability to link customer order lines directly to Job Orders, Inventory, Purchase Orders and Transfer Orders Order/Line Discounts Available to promise for real delivery dates Features and Options order configuration Multi-lingual customer paperwork, including invoices Foreign currencies Sales tax calculations: VAT & GATProgressive billings Customer Document Profiles Letters of credit Order acknowledgements Advanced Shipping Notices Consolidated invoicing Drop ship orders (direct from vendor)Customer Service Homepage Service Management With exceptional flexibility and ease of use, Infor ERP Syte Line Field Service Plus is the ideal solution for nearly every field service requirement through the full spectrum of the service lifecycle. This robust service management solution meets the specific needs of companies that manufacture, install, or service complex products. Its powerful features include: Contact center - Give your call center easy access to detailed data for fast response to inquiries and work order creation. Work orders - Track and manage work orders for faster completion of service requests, more accurate billing, and greater customer satisfaction. Scheduling and dispatch - Gain visibility into each technician‘s schedule, route, certification level, and experience with Field Service Plus, so that you can match the right technician with the right job. You‘ll also increase resolution rates and minimize the cost of non-essential trips back to the warehouse. Plant maintenance - Schedule preventative maintenance for internal assets in order to prevent unexpected downtimes, extend the lifecycle of equipment, and maximize warranty cost savings. Service contracts - Track and manage service level agreements with maximum efficiency. Visibility into the contract details, unit, and service history improves decision making and creates opportunities to up sell or extend service agreements. Depot repair - Manage product returns for repair, refurbishment, or shipment to a third party vendor. Service History - Access complete historical data, including customer profile, unit description, contract status, and service history. Analytics - Integrated data, total visibility, and accurate tracking make it easy to analyze data down to the detail level. Flexible reporting aids in decision making, planning, and providing engineering with valuable information needed to adapt product or part designs Reviews of Infor Syte Line Write a Review No reviews have been submitted. Do you use Infor Syte Line? Write a review, and help other organizations like yours make smarter, more informed software selection decisions!Infor Syte Line At‑A‑Glance Developer Infor Type of Software Manufacturing Client OS Windows, Web Market Focus Evaluations of Infor Syte Line by market segment: Enterprise 18%Mid-market 59%Small business 24%Freelancers 0%Industry Focus Evaluations of Infor Syte Line by industry:manufacturing 81%service 6%distribution 6%construction 2%agriculture and natural resources 1%Similar Software Options Epicor E10 ERP Manufacturing ERP software for managing operations and profitability. ECi M1 An ERP system designed by ECi Software Solutions for manufacturing companies. SYSPRO 7 A full ERP system designed by SYSPRO for the SME market. Sage ERP X3 An ERP system designed by Sage for mid-sized companiesx Tuple Open Source ERP, CRM, Web Portal for Windows, Mac, Linux and Mobile True ERP A full ERP system designed by True ERP. Active ERP The newest technology, a mid-size Active ERP Software Suite that comes with robotic Artificial Intelligence users. Visual Ledger A full ERP system designed by Aboard Software specifically for manufacturing and distribution/wholesale trade companies Macola A comprehensive ERP and business software system designed by Exact for manufacturing and distribution companies. Infor VISUAL A an ERP system designed by Infor for manufacturing companies. Which software is right for you? For over 15 years, independent software experts have helped more than 100,000 businesses find the right software for their needs. We’d love to help you, too. Get your free software recommendations Other Products By Infor Infor VISUAL A an ERP system designed by Infor for manufacturing companies. Infor Cloud Suite Business A cloud-based ERP specifically for small and medium sized organizations Infor Service Management A multi-module management system designed by Infor. Infor Distribution SX.e An ERP system designed by Infor for large enterprises. Infor Cloud Suite Corporate A web-based software system designed by Infor. Infor Sun Systems A full ERP system designed by Infor. Infor d/EPM Controls & Risk Monitoring A web-based multi-module management system designed by Infor. Infor Distribution FACTS A web-based ERP system designed by Infor for distribution/wholesale trade companies. Infor Sun Systems PSA A web-based staff utilization solution designed by Infor. Infor Distribution A+ An ERP system designed by Infor for distribution/wholesale trade companies. Infor VISUAL Jobshop A software system designed by Infor for manufacturers. Infor EAM A multi-module management system designed by Infor. Infor d/EPM A risk monitoring software system designed by Infor. Infor M3 A full ERP system designed by Infor. Infor XA An ERP product designed by Infor for discrete manufacturing companies. PAR Pixel Point A software system designed by Infor for retail trade companies. Infor Fourth Shift A software system designed by Infor. Infor Expense Management A web-based report writer service designed by Infor. Infor LN An ERP software system designed by Infor. Infor ION A web-based integration platform for information sharing designed by Infor. Infor Adage An ERP software system for process manufacturers designed by Infor. Infor CRM An enterprise CRM system from Infor. Infor Cloud Suite An integrated suite of financial and supply management functionalities.
|
D1531714
|
http://web.mst.edu/~psyworld/anovadescribe.htm
|
.
|
Between-Subjects One-Way ANOVA Descriptionsteps | example | calculator The one-way Analysis of Variance (ANOVA) is used with one categorical independent variable and one continuous variable. The independent variable can consist of any number of groups (levels). For example, an experimenter hypothesizes that learning in groups of three will be more effective than learning in pairs or individually. Students are randomly assigned to three groups and all students study a section of text. Those in group one study the text individually (control group), those in group two study in groups of two and those in group three study in groups of three. After studying for some set period of time all students complete a test over the materials they studied. First, note that this is a between-subjects design since there are different subjects in each experimental condition. Second, notice that ,instead of two groups (i.e., levels) of the independent variable, we now have three. The t-test, which is often used in similar experiments with two group, is only appropriate for situations where there are only two levels of one independent variable. When there is a categorical independent variable and a continuous dependent variable and there are more than two levels of the independent variable and/or there is more than one independent variable (a case that would require a multi-way, as opposed to one way ANOVA), then the appropriate analysis is the work horse of experimental psychology research, the analysis of variance. In the case where there are more than two levels of the independent variable the analysis goes through two steps. First, we carry out an over-all F test to determine if there is any significant difference existing among any of the means. If this F score is statistically significant, then we carry out a second step in which we compare sets of two means at a time in order to determine specifically, where the significance difference lies. Let's say that we have run the experiment on group learning and we recognize that this is an experiment for which the appropriate analysis is the between-subjects one-way analysis of variance. We use a statistical program and analyze the data with group as the independent variable and test score as the dependent variable. Our results might look something like the following:source D. F. Sum of Squares Mean Squares F Ratio F Prob. Between Groups21392.47696.2311.87.0002Within Groups271583.4058.64Total292975.87The "Between Groups" row represents what is often called "explained variance" or "systematic variance". We can think of this as variance that is due to the independent variable, the difference among the three groups. For example the difference between a person's score in group one and a person's score in group two would represent explained variance. The "Within Groups" variance represents what is often called "error variance". This is the variance within your groups, variance that is not due to the independent variable. For example, the difference between one person in group one and another person in group one would represent error variance. Intuitively, it's important to understand that, at it's heart, the analysis of variance and the F score it yields is a ratio of explained variance versus error. This actual F score (ratio) is in the next to last column, and the probability of an F of this magnitude is in the final column. As you can see this F score is well below the .05 cut off, so that we can conclude then that the groups are statistically significantly different from one another. But two very important questions remain. First, which means are significantly different from which other means and, second what were the actual scores of the group? To answer the pair comparisons questions we run a series of Tukey's post-hoc tests, which are like a series of t-tests. The post-hoc tests are more stringent than the regular t-tests however, due to the fact that the more tests you perform the more likely it is that you will find a significant difference just by chance. Your post hoc tests which statistical programs often presented in a table, might look something like this: Mean Group G r p1G r p2G r p372.30Grp 186.60Grp 2*86.90Grp 3*This table represents a matrix with the groups listed along each axis. It’s important, at this point to note the way the groups were originally coded (1=individual; 2=dyad; 3=triad.). First of all, note the means. Clearly, the mean for those in group 1 was substantially lower than the other two groups, which were practically identical. When we look at the Tukey’s Post-hoc table, we see that the post hoc tests are consistent with what we observed with the means. Note that the stars are in the boxes that correspond to groups (1 vs. 2) and (1 vs. 3). This means that that these mean differences were statistically significant. We can sum these results up by saying something like "Those who studied individually scored significantly lower that those who studied in dyads or triads, while the latter two groups did not differ significantly from one another." In other words, this experiment indicates that studying in a group is more effective than studying individually, but the size of the group (two vs. three members) is not important. The experimenter’s original hypothesis that learning in triads is more effective than learning in dyads or individually was not supported. In the case of this experiment, this seems obvious based on the means, but in many "real world" studies this is not the case, and the estimates of statistical significance become very important. The analysis of variance is a simple test to do with a computer, but can get pretty complicated when calculated by hand, even with a small sample size. However, caculating a one-way analysis of variance and subsequent post hoc tests by hand will give you an appreciation for what the computer is doing and also help you to better understand the underlying logic. Formula for the One-Way Analysis of Variance and Tukey's Post Hoc Test An example of the step by step calculation of the One-Way Analysis of Variance and Tukey's Post Hoc Test Practice by creating your own values with groups sizes of 8, carrying out the calcuation yourself, and then comparing this to the step by step results using the Virtual Statistician Calculator for the One-Way ANOVA and Tukey's Post Hoc Test (virtual calculator will open in another window). Psychology World was created by Richard Hall in 1998 and is covered by a creative commons ( by-nc) copyright
|
D725644
|
http://www.drawinghowtodraw.com/stepbystepdrawinglessons/2011/01/how-to-draw-fuchsias-flowers-with-easy-steps-drawing-tutorial/
|
How to Draw Fuchsias Flowers with Easy Steps Drawing Tutorial
|
How to Draw Fuchsias Flowers with Easy Steps Drawing Tutorial January 16, 2011 by admin 4 Comments Facebook Twitter Google+ Stumble Upon Reddit Pinterest Email Print Friendly Share Learn how to draw this beautiful type of flower…they are called Fuchsias. The following step by step drawing tutorial will guide you easily through the steps. Have fun. Here are Some More Nature and Flowers Drawing Tutorials How to Draw Fuchsias Flowers with Easy Step by Step Drawing Tutorial Step 1Step 2Step 3Step 4Step 5Step 6Step 7Here are Some More Nature and Flowers Drawing Tutorials Technorati Tags: Fuchsias, fuchias, drawing fuchias, how to draw fuchias, draw Fuchsias, drawing Fuchsias, how to draw Fuchsias, drawing lessons, drawing tutorials, drawing for kids, flowers, drawing flowers, how to draw flowers Facebook Twitter Google+ Stumble Upon Reddit Pinterest Email Print Friendly Share Posted in: How to Draw Flowers
|
D248422
|
https://www.wunderground.com/MAR/GM/335.html
|
Marine Weather for GM 335
|
Forecast as of 3:14 PM CDT on April 7, 2018Small Craft Advisory in effect until 1 am CDT Sunday Galveston Bay-Tonight North winds 15 to 25 knots becoming northeast 15 to 20 knots after midnight. Bay waters choppy. Sunday Northeast winds 10 to 15 knots becoming southeast 5 to 10 knots in the afternoon. Bay waters slightly choppy becoming smooth in the afternoon. Sunday Night Southeast winds 5 to 10 knots becoming east after midnight. Bay waters smooth. A slight chance of showers after midnight. Monday East winds 5 to 10 knots. Bay waters smooth. A slight chance of showers. Monday Night Northeast winds 5 to 10 knots increasing to 10 to 15 knots after midnight. Bay waters smooth becoming slightly choppy after midnight. A chance of showers and isolated thunderstorms. Tuesday Northeast winds 10 to 15 knots. Bay waters slightly choppy. Tuesday Night Northeast winds around 10 knots. Bay waters smooth to slightly choppy. Wednesday East winds 5 to 10 knots becoming southeast in the afternoon. Bay waters smooth. Wednesday Night South winds 10 to 15 knots. Bay waters slightly choppy. Thursday South winds 10 to 15 knots. Bay waters slightly choppy. Thursday Night South winds 15 to 20 knots. Bay waters choppy. Watches & Warnings There are currently no watches in effect. Marine Weather Marine Weather Links Middle Texas coastal waters from Baffin Bay to Matagorda Ship Channel out to 60 nautical miles. Coastal waters from Baffin Bay to Port Aransas out 20 NMCoastal waters from Port Aransas to Matagorda Ship Channel out 20 NMWaters from Baffin Bay to Port Aransas from 20 to 60 NMWaters from Port Aransas to Matagorda Ship Channel from 20 to 60 NMBays and Waterways from Baffin Bay to Port Aransas Bays and Waterways from Port Aransas to Port O? Connor Lower Texas coastal waters from Baffin Bay to the mouth of the Rio Grande out to 60 nm. Coastal waters from Baffin Bay to Port Mansfield TX out 20 NMLaguna Madre From 5 nm North Of Port Mansfield To Baffin Bay TXCoastal waters from Port Mansfield TX to the Rio Grande River out 20 NMLaguna Madre From The Arroyo Coloardo To 5 NM North Of Port Mansfield TXLaguna Madre From the Port Of Brownsville to the Arroyo Colorado Waters from Port Mansfield TX to the Rio Grande River from 20 to 60 NMWaters from Baffin Bay to Port Mansfield TX from 20 to 60 NMUpper Texas coastal waters from High Island to the Matagorda Ship Channel out 60 nautical miles including Galveston and Matagorda bays Waters from Freeport to Matagorda Ship Channel TX from 20 to 60 NMCoastal waters from High Island to Freeport TX out 20 NMCoastal waters from Freeport to Matagorda Ship Channel TX out 20 NMWaters from High Island to Freeport TX from 20 to 60 NMMatagorda Bay Galveston Bay Gulf coastal waters from the mouth of the Suwannee River to Destin out to 60 nm Coastal waters from Apalachicola to Destin FL out 20 NMWaters from Apalachicola to Destin FL from 20 to 60 NMPascagoula to Atchafalaya River out 60 nm Lake Pontchartrain and Lake Maurepas Lake Borgne Coastal waters from Pascagoula Mississippi to Stake Island out 20 NMMississippi Sound Chandeleur Sound Breton Sound Coastal Waters from Port Fourchon LA to Lower Atchafalaya River LA out 20 nm Coastal Waters from Stake Island LA to Southwest Pass of the Mississippi River from 20 to 60 nm Coastal waters from Port Fourchon Louisiana to Lower Atchafalaya River LA from 20 to 60 NMCoastal waters from Pascagoula Mississippi to Stake Island Louisiana out 20 to 60 NMCoastal waters from Southwest Pass of the Mississippi River to Port Fourchon Louisiana from 20 to 60 NMCoastal Waters from Boothville LA to Southwest Pass of the Mississippi River out 20 nm Coastal waters from the Southwest Pass of the Mississippi River to Port Fourchon Louisiana out 20 NMCoastal waters from lower Atchafalaya to High Island TX out 60 nm Vermilion Bay Coastal waters from Intracoastal City to Cameron LA out 20 NMCalcasieu Lake Coastal waters from Cameron LA to High Island TX out 20 NMSabine Lake Coastal waters from Lower Atchafalaya River to Intracoastal City LA out 20 NMWaters from Intracoastal City to Cameron LA from 20 to 60 NMWaters from Lower Atchafalaya River to Intracoastal City LA from 20 to 60 NMWaters from Cameron LA to High Island TX from 20 to 60 NMGulf coastal waters Destin to Pascagoula out 60 nm Coastal waters from Destin to Pensacola FL out 20 NMCoastal waters from Pensacola FL to Pascagoula MS out 20 NMWaters from Pensacola FL to Pascagoula MS from 20 to 60 NMWaters from Destin to Pensacola FL from 20 to 60 NMNorth Mobile Bay Fornia waters from 60 nm to 250 nm offshore. South Mobile Bay Mississippi Sound Pensacola Bay Area Choctawhatchee Bay Perdido Bay Area21.57751 from 22N-26N between 87W-94W Central Gulf from 22N to 26N between 87W and 94W25.48964 north of 25N east of 87W NE Gulf N of 25N E of 87W26.89327 north of 26N between 87W-94W N Central Gulf including Flower Garden Banks Marine Sanctuary26.89327 north of 26N west of 94W NW Gulf including Stetson Bank21.57751 between 22N-26N west of 94W W Central Gulf from 22N to 26N W of 94W25.24899 from 22N-25N between 80.5W-87W E Gulf from 22N to 25N E of 87W including Straits of Florida
|
D768476
|
http://www.autoguide.com/auto-news/2017/04/top-10-things-you-need-to-know-about-the-2018-dodge-challenger-srt-demon.html
|
Top 10 Things You Need to Know About the 2018 Dodge Demon
|
Top 10 Things You Need to Know About the 2018 Dodge Demon Share Tweet Subscribe Get Auto Guide.com in your Inbox Like Auto Guide.com on Facebook By Dan Ilika Apr 11, 2017 Photos by Dan Ilika. Video by Ben Sanders. 9Previous Image Next Image Previous Next View Large After about 10,000 teasers the wait is over and the 2018 Dodge Challenger SRT Demon is finally here. Seriously, I don’t know what I’m happier about: The fact that we have a clearer picture of just how outrageous this thing is going to be, or that we don’t have to worry about Dodge dumping any more teasers on us. Diatribes aside, here are the top 10 things you need to know about the mightiest muscle car to ever hit the market.2018 Dodge Demon - 10 Things You Need to Know - 2017 New York Auto Show Your browser does not currently recognize any of the video formats available. Click here to visit our frequently asked questions about HTML5 video.0:00 / 4:491. It Makes 840 Horsepower With the same supercharged 6.2-liter under the hood as Dodge’s duo of Hellcats, the Demon’s engine has been upgraded to push out 840 horsepower and 770 lb-ft of torque. By comparison, the Dodge Challenger SRT Hellcat makes an already-impressive 707 horsepower and 650 lb-ft of torque. The additional output was achieved through the use of a larger supercharger that displaces 2.7-liters. All that power heads to the rear wheels through a beefed-up eight-speed automatic transmission.2. It Runs to 60 mph in 2.3 Seconds Dodge says it’ll sprint from a standing start to 60 mph in 2.3 seconds, which is, well, ridiculous. Helping it get there is a handful of drag-specific features like the first-ever transmission brake fitted to a production car. The system works by engaging both forward and reverse gears at the same time to keep the car from creeping while it builds engine speed before launching off the line.3. It Completes the Quarter-Mile in 9.65 Seconds Much like its run to 60 mph, the car’s quarter-mile time is other-wordly. The Demon’s trap speed is an NHRA-certified 140 mph, which is enough to force the governing body of drag racing to ban the Demon from competition for being too damn fast.4. The Tires are Seriously Wide Measuring more than 12 inches across, the Nitto tires designed specifically for the Dodge Demon are as ideally suited to the drag strip as they are big, smokey burnouts. Also helping on that front is the line-lock, which engages the front brakes to allow the back wheels to spin freely. Intended to build up the tire temperature before a trip down the strip, the line-lock is also perfect for parking lots.5. It Comes With Transition Tools Dubbed the Demon Crate, the box of goodies available with every car is aimed at helping make the transformation from the street to the strip — and back again — just a little bit easier. Included are items like a floor jack, tool bag, impact wrench and torque wrench, among others — all important for getting the car race-ready. It also includes a second set of wheels with the Demon logo displayed prominently on the center caps.6. It’s Lighter Than a Hellcat Tipping the scales at about 4,300 lb., the Demon weighs roughly 215 lb less than the Challenger Hellcat. It actually shed some 232 lb compared to the Hellcat coupe but gained a bit of it back on its ascent to the top of the muscle car heap. Much of the weight loss is attributed to lighter components like the brakes, suspension and wheels, while the back seat has also been sent to the scrap heap in the name of speed.7. It Can Run on 100+ Octane Fuel If you thought the two keys included with the Hellcat was a cool feature then you’ll love this: The Demon comes with a powertrain control module (PCM) that can be put into the car when it’s time to hit the drag strip. Dropping the new module into the car allows it to run on 100+ octane fuel, while also optimizing the engine to run on the race-specific stuff.8. It Can Get Cold Under the Hood Dodge says the Demon will be the first production car to feature a liquid-to-air charge air chiller system that will use the Demon’s air conditioning system to cut the intake air temperature by as much as 45°F.9. The Hood Scoop is Huge Helping keep the engine cool and breathing right is the Demon’s massive hood scoop, which is the biggest you can get on a factory car. It measures 45 inches across, and pushes a ton of air into the engine bay, helping the car make its outrageous output.10. You’ll Have a Hard Time Getting One Pricing hasn’t been announced, but it’s unlikely to cost anything close to the surprisingly affordable Challenger Hellcat. Making matters worse, it’s going to be rare, with production limited to just 3,300 units. The single model year production run will see 3,000 units sold in the U. S., and 300 sold in Canada, where the car is built. It will be available in 14 different colors, including B5 Blue, Billet Silver, Destroyer Grey, F8 Green, Go Mango, Granite Crystal, Indigo Blue, Maximum Steel, Octane Red, Pitch Black, Plum Crazy, Tor Red, White Knuckle and Yellow Jacket. Deliveries of the 2018 Dodge Challenger SRT Demon are expected to begin in the fall. Filed under: American Auto Show News Breaking News Coupes Dodge Drag Racing FCA Featured Articles Sports Cars Top 10 Videos Tags: 2017 new york auto show, Demon, dodge challenger, Dodge Demon, drag racing, hellcat, muscle cars
|
D981724
|
https://www.rxlist.com/consumer_digoxin_lanoxin/drugs-condition.htm
|
Digoxin
|
Heart Disease Slideshow Pictures Atrial Fibrillation Slideshow: Causes, Tests and Treatment Take the Heart Disease Quiz!What Is Digoxin and How Does It Work? What Are Side Effects Associated with Using Digoxin? What Other Drugs Interact with Digoxin? What Are Warnings and Precautions for Digoxin? Brand Name: Lanoxin Generic Name: Digoxin Drug Class: Antidysrhythmics, V; Inotropic Agents What Is Digoxin and How Does It Work? Digoxin is used to treat heart failure, usually along with other medications. It is also used to treat a certain type of irregular heartbeat ( chronic atrial fibrillation ). Treating heart failure may help maintain your ability to walk and exercise and may improve the strength of your heart. Treating an irregular heartbeat can decrease the risk for blood clots, an effect that may reduce your risk for a heart attack or stroke. Digoxin belongs to a class of medications called cardiac glycosides. It works by affecting certain minerals ( sodium and potassium) inside heart cells. This reduces strain on the heart and helps it maintain a normal, steady, and strong heartbeat. Digoxin is available under the following different brand names: Lanoxin. Dosage of Digoxin: Adult and Pediatric Dosage Forms and Strengths Oral solution0.05 mg /m LInjectable solution0.1 mg/m L0.25 mg/m LTablet0.0625 mg (Lanoxin only) (adult only)0.125 mg0.1875 mg (Lanoxin only) (adult only)0.25 mg Atrial Fibrillation Rapid digitalizing (loading-dose) regimen Intravenous (IV): 8-12 mcg/kg (0.008-0.012 mg/kg) total loading dose; administer 50% initially; then may cautiously give 1/4 the loading dose every 6-8 hours twice; perform careful assessment of clinical response and toxicity before each dose Oral: 10-15 mcg/kg total loading dose; administer 50% initially; then may cautiously give 1/4 the loading dose every 6-8 hours twice; perform careful assessment of clinical response and toxicity before each dose Maintenance Oral: 3.4-5.1 mcg/kg/day or 0.125-0.5 mg/day orally; may increase dose every 2 weeks based on clinical response, serum drug levels, and toxicity Intravenous/ intramuscular (IV/IM): 0.1-0.4 mg once/day; IM route not preferred due to severe injection site reaction Heart Failure As per ACCF/AHA guidelines, a loading dose to initiate digoxin therapy in patients with heart failure is not necessary0.125-0.25 mg orally/IV once/day; higher doses including 0.375-0.5 mg/day rarely needed Use lower end of dosing (0.125 mg/day) in patients with impaired renal function or low lean body mass Heart Failure/Atrial Fibrillation, Pediatric Use doses at the lower end of the spectrum when treating heart failure Reduce dose by 20-25% when changing from oral formulation or intramuscular (IM) to intravenous (IV) therapy Premature neonate Oral: 1st loading dose, 10-15 mcg/kg; 2nd and 3rd loading doses, 5-7.5 mcg/kg every 6-8 hours for 2 doses; maintenance: 5-7.5 mcg/kg/day divided every 12 hours Intravenous/intramuscular (IV/IM): 1st loading dose, 7.5-12.5 mcg/kg; 2nd and 3rd loading doses, 3.75-6.25 mcg/kg every 6-8 hours for 2 doses; maintenance: 4-6 mcg/kg/day divided every 12 hours Full-term neonate Oral: 1st loading dose, 12.5-17.5 mcg/kg; 2nd and 3rd loading doses, 6.25-8.75 mcg/kg every 6-8 hours for 2 doses; maintenance: 6-10 mcg/kg/day divided every 12 hours IV/IM: 1st loading dose, 10-15 mcg/kg; 2nd and 3rd loading doses, 5-7.5 mcg/kg every 6-8 hours for 2 doses; maintenance: 5-8 mcg/kg/day divided every 12 hours Infants and children 1-24 months Oral: 1st loading dose, 17.5-30 mcg/kg; 2nd and 3rd loading doses, 8.75-15 mcg/kg every 6-8 hours for 2 doses; maintenance: 10-15 mcg/kg/day divided every 12 hours IV/IM: 1st loading dose, 15-25 mcg/kg; 2nd and 3rd loading doses, 7.5-12.5 mcg/kg every 6-8 hours for 2 doses; maintenance: 7.5-12 mcg/kg/day divided every 12 hours2-5 years Oral: 1st loading dose, 15-20 mcg/kg; 2nd and 3rd loading doses, 8.75-10 mcg/kg every 6-8 hours for 2 doses; maintenance: 7.5-10 mcg/kg/day divided every 12 hours IV/IM: 1st loading dose, 12.5-17.5 mcg/kg; 2nd and 3rd loading doses, 6.25-8.75 mcg/kg every 6-8 hours for 2 doses; maintenance: 6-9 mcg/kg/day divided every 12 hours5-10 years Oral: 1st loading dose, 10-17.5 mcg/kg; 2nd and 3rd loading doses, 5-8.75 mcg/kg every 6-8 hours for 2 doses; maintenance: 5-10 mcg/kg/day divided every 12 hours IV/IM: 1st loading dose, 7.5-15 mcg/kg; 2nd and 3rd loading doses, 3.75-7.5 mcg/kg every 6-8 hours for 2 doses; maintenance: 4-8 mcg/kg/day divided every 12 hours Older than 10 years and less than 100 kg Oral: 1st loading dose, 5-7.5 mcg/kg; 2nd and 3rd loading doses, 2.5-3.75 mcg/kg every 6-8 hours for 2 doses; maintenance: 2.5-5 mcg/kg/day IV/IM: 1st loading dose, 4-6 mcg/kg; 2nd and 3rd loading doses, 2-3 mcg/kg every 6-8 hours for 2 doses; maintenance: 2-3 mcg/kg/day Dosing Modifications Adjust maintenance dose by estimating renal clearance and measuring serum levels In heart failure, higher dosages have no additional benefit and may increase toxicity; decreased renal clearance may lead to increased toxicity In geriatric patients, use lean body weight to calculate dose What Are Side Effects Associated with Using Digoxin? Common Side effects of Digoxin include: Dizziness Mental disturbances Diarrhea Headache Nausea Vomiting Red, bumpy rash Less common side effects of digoxin include: Loss of appetite Irregular heartbeat Arrhythmia in children (consider a toxicity)Other side effects of digoxin include: Visual disturbance (blurred or yellow vision)Heart block (1°/2°/3°)Cardiac arrest rhythm ( asystole)Fast heart rate This document does not contain all possible side effects and others may occur. Check with your physician for additional information about side effects. Heart Disease Slideshow Pictures Atrial Fibrillation Slideshow: Causes, Tests and Treatment Take the Heart Disease Quiz!What Other Drugs Interact with Digoxin? If your doctor has directed you to use this medication, your doctor or pharmacist may already be aware of any possible drug interactions and may be monitoring you for them. Do not start, stop, or change the dosage of any medicine before checking with your doctor, health care provider or pharmacist first. Severe Interactions of digoxin include:quill Digoxin has serious interactions with at least 49 different drugs. Digoxin has moderate interactions with at least 292 different drugs. Digoxin has mild interactions with at least 34 different drugs. This information does not contain all possible interactions or adverse effects. Therefore, before using this product, tell your doctor or pharmacist of all the products you use. Keep a list of all your medications with you, and share this information with your doctor and pharmacist. Check with your health care professional or doctor for additional medical advice, or if you have health questions, concerns or for more information about this medicine. What Are Warnings and Precautions for Digoxin? Warnings This medication contains digoxin Do not take Lanoxin if you are allergic to digoxin or any ingredients contained in this drug Keep out of reach of children. In case of overdose, get medical help or contact a Poison Control Center immediately Contraindications Hypersensitivity Ventricular fibrillation Effects of Drug Abuse No information available Short-Term Effects See "What Are Side Effects Associated with Using Digoxin? "Long-Term Effects See "What Are Side Effects Associated with Using Digoxin? "Cautions Use caution in chronic constrictive pericarditis, electrical cardioversion, severe bradycardia, severe heart failure, severe pulmonary disease, sick sinus syndrome, ventricular tachycardia, ventricular premature contractions,Wolff-Parkinson-White syndrome, electrolyte imbalance, hypothyroidism or hyperthyroidism, hypoxia, idiopathic hypertrophic subaortic stenosis, renal disease, concomitant diuretics . Not recommended in patients with acute myocardial infarction. Avoid in patients with myocarditis. Risk of advanced or complete heart block in patients with sinus node disease and AV block. Very narrow margin between effective therapeutic and toxic dosages: Therapeutic range, 0.5-2 ng/m L (target 0.5-1 ng/m L); toxic range, greater than 2.5 ng/m L. Generally avoid if left ventricular systolic function preserved, although may be used for ventricular rate control in subgroup with chronic atrial fibrillation. Less effective in presence of hypokalemia or hypocalcemia; avoid hypercalcemia or hypomagnesemia, which may predispose to serious arrhythmias. Heart failure patients with preserved ventricular function including acute cor pulmonale, amyloid heart disease, and constrictive pericarditis may be susceptible to digoxin toxicity. May cause false-positive ST-T changes during exercise testing. Do not switch between different oral forms or between brand and generic forms of digoxin; bioavailability varies. Serum levels drawn within 6-8 hours of dose will be falsely high because of prolonged distribution phase. Increased risk of estrogen -like effects in geriatric patients. Beriberi heart disease may not respond adequately if underlying thiamine deficiency not corrected. Atrial arrhythmias are difficult to treat if associated with hypermetabolic (hyperthyroidism) or hyperdynamic (hypoxia) states; treat underlying condition before initiating therapy. Avoid extravasation; ensure proper needle or catheter placement prior to and during administration. Monitor for pro- arrhythmic effects, especially with digoxin toxicity. Use caution in patients with acute myocardial infarction; may increase myocardial oxygen demand; during acute coronary syndrome, digoxin administered intravenously (IV) may be used to slow a rapid ventricular response and improve left ventricular function in the acute treatment of atrial fibrillation associated with severe LV function and heart failure or hemodynamic instability. Monitor serum concentration closely when used for rate control in patients with atrial fibrillation; serum concentration that are not properly controlled are associated with increased risk of mortality. Consider use of digoxin only in heart failure with reduced ejection fraction when symptoms remain despite guideline-directed medical therapy; withdrawal of digoxin in clinically stable patients with heart failure may lead to recurrence of heart failure symptoms. In hypertrophic cardiomyopathy, outflow obstruction may worsen due to positive inotropic effects of digoxin; avoid use unless used to control ventricular response with atrial fibrillation; in the absence of atrial fibrillation, digoxin is potentially harmful in the treatment of dyspnea in patients with hypertrophic cardiomyopathy. Avoid rapid IV administration in digitalized patients; may produce serious arrhythmias. Not necessary to routinely reduce or hold digoxin therapy prior to elective electrical cardioversion for atrial fibrillation; however, exclusion of digoxin toxicity is necessary prior to cardioversion; withhold digoxin and delay cardioversion until toxicity subsides if signs of digoxin excess exist. Pregnancy and Lactation Use digoxin with caution during pregnancy if benefits outweigh risks Animal studies show risk and human studies are not available, or neither animal nor human studies were done Digoxin enters breast milk; use with caution if breastfeeding ( American Academy of Pediatrics committee states, "compatible with nursing ")From Healthy Heart Resources Living With Heart Failure8 Heart Tests You May Need With Type 2 Diabetes Featured Centers How Could You Live Better With Migraine? Not Being Defined by Your Cancer Track Cold & Flu in Your Area Health Solutions From Our Sponsors Frequent Constipation? Greater Food Accessibility Reviewed on 5/30/2017Medscape. Digoxin. https://reference.medscape.com/drug/lanoxin-digoxin-342432
|
D114817
|
https://www.gourmetsleuth.com/articles/detail/convection-cooking-adjustments
|
Recipe Adjustments For Convection Ovens
|
Here are some tips on how to make adjustments for convection oven cooking times. Print out our handy chart of adjusted temperatures and cooking times for specific foods like your Thanksgiving turkey, baking cookies, cakes and pastries. These tips will help you transition from regular to convection cooking. Browse More In Select... select Article By: Barbara Bowman Email Print Published by: Gourmet Sleuth Last Updated: 04/07/2018General Convection Oven Recipe Conversion Guidelines There are three commonly accepted methods of converting recipes from conventional oven baking to convection oven baking. Bake at the same conventional oven temperature but for a shorter period of time. Bake for the same length of time as you would using a conventional oven but reduce the temperature by 25 degrees. Bake for a slightly shorter period of time and a reduced temperature. This tends to be the most successful method for most ovens. When Should Convection Cooking Be Used Rather Than Conventional Cooking Foods cooked in a convection oven cook about 25% - 30% faster than a conventional oven as the hot air is forced around the food. Foods tend to have less moisture loss and fewer nutrients are destroyed in the cooking process. One of the most important factors when determining which cooking method is most appropriate for your food is the type of dish or pan you are cooking in. If the cooking container blocks the flow of air around the food then there is no use in using convection cooking. Convection Cooking Is Good For Cookie sheets Shallow pans Convential Cooking Is Good For Covered casseroles, pans or dishes Deep roasting pans More Convection Cooking Tips Manufacturer Guidelines Follow the recommendations from the manufacturer of the oven. Your oven typically shipped with a user guide. It is a good idea to familiarized yourself with the specifics for your own oven. If you don't have a user manual then try contacting the manufacture to obtain a copy. Many provide printable copies online. Air Circulation Air circulation is important. Don't cover racks with foil. Allow 1 to 1 1/2 inches around pans (also above and below pans for multi-rack baking). Use Proper Pans For maximum browning, use pans with low sides, and rimless cookie sheets. Many ovens come with special pans and racks that lift roasts so air flows all around. If possible, place the long sides of the pan parallel to the oven door. Roasting Guidelines Roast meats and poultry Preheating is not necessary. Place meats on a rack in the roasting pan for better browning. Roasting time may be 20 to 30 percent less than in a conventional oven if temperatures aren't reduced. Some ovens offer a special roasting mode that provides top and/or bottom browning or an initial surge in heat in addition to the fan. These modes make it easy to get optimum results in a shorter time. Small Roasts or Unstuffed Poultry Do not reduce oven temperatures for small pieces, skinny roasts, or unstuffed poultry. In our tests, we roasted a 3 1/2-pound chicken at 375 |degrees~. In about an hour, about 20 percent less time than for conventional cooking, it was beautifully browned, with succulent flesh. Dense Roasts & Stuffed Turkeys For large, dense roasts and big stuffed turkeys, you may need to reduce the temperature 25 |degrees~ during part or all of the roasting time. When you lower the temperature, the meat may be juicier and shrink less, but it will take longer to cook. Convection Cooking Charts Method 1: Reduce temp by 25 to 30 degrees and bake per conventional recipe time Conventional Oven Temp Convection Less 25F Convection Less 30F225 200 195250 225 220275 250 245300 275 270325 300 295350 325 320375 350 345400 375 370425 400 395450 425 420475 450 445500 475 470525 500 495550 525 520Method 2: Bake at conventional oven temperature but reduce cooking time by 25%-30% less Conventional Baking Time In minutes 25% Less Time 30% Less Time10 8 715 11 10.520 15 1425 19 17.530 23 2135 26 24.540 30 2845 34 31.550 38 3555 41 38.560 45 4265 49 45.570 53 4975 56 52.580 60 5685 64 59.590 68 6395 71 66.5100 75 70105 79 73.5110 83 77115 86 80.5120 90 84125 94 87.5130 98 91135 101 94.5140 105 98145 109 101.5150 113 105
|
D2296745
|
https://en.wikipedia.org/wiki/Smosh:_The_Movie
|
Smosh: The Movie
|
From Wikipedia, the free encyclopedianavigation search Smosh: The Movie U. S. release poster Directed by Alex Winter Produced by Brian Robbins Shauna Phelan Written by Eric Falconer Steve Marmel Based on Smosh by Anthony Padilla and Ian Hecox Starring Ian Hecox Anthony Padilla Jenna Marbles Grace Helbig Harley Morenstein Jillian Nelson Brittany Ross Michael Ian Black Music by The Outfit Cinematography Joe De Salvo Edited by Scott Richter Production company Smosh Productions Defy Media Awesomeness TVDistributed by 20th Century Fox (U. S./Canada)Lionsgate (International)Release date July 22, 2015 (Los Angeles)July 24, 2015 (United States)Running time 83 minutes Country United States Language English Smosh: The Movie is a 2015 American comedy film directed by Alex Winter starring the You Tube comedy duo Smosh (Anthony Padilla and Ian Hecox) with appearances from other You Tube stars, such as Jenna Marbles, Grace Helbig, Markiplier, and Harley Morenstein. This is Smosh's first theatrical film, and revolves around Smosh going inside You Tube virtually to alter a clip that will ruin Anthony's chances of winning over his crush, Anna. The film premiered at Los Angeles and Vidcon 2015 on July 22–23, and was released in the United States on July 24, 2015 to mixed reviews. [1] [2] It was then released in the United Kingdom, by Lionsgate. Although the film was not released internationally, it received distribution on-demand through Vimeo and Netflix. [3]Contents [ hide ]1 Plot2 Cast3 Production4 Release4.1 Home media5 Reception5.1 Critical reception6 Soundtrack7 References8 External links Plot [ edit]In late September 2014, Anthony (Padilla) and Ian (Hecox) are best friends and live in a small house, with Ian's parents. Anthony has a dead-end job as a pizza delivery man and Ian is a stay at home You Tube stalking man-child. After Returning from the Game Bang game center, in which they were bullied by some street kids due to Anthony's pizza car, they find a video of Anthony reciting the Magic Pocket Slave Monsters theme (an obvious parody of the Pokémon theme song and a reference to Smosh's deleted video) at their high school graduation. In the video, Anthony attempts to impress his crush, Anna Reed (Nelson), by trying to do a backflip, but he fails, landing on his face, and resulting in the microphone going in his buttocks. They both decide to pull down the video before it blows Anthony's chances of reconnecting with his crush. They travel to the You Tube headquarters, where they meet a receptionist named Stephanie ( Helbig) who introduces them to the President of the company, Steve You Tube ( Michael Ian Black ). Steve explains that the only way to fix the video is by literally going inside You Tube through a portal and changing the video from the inside. Anthony decides that it is important enough to go through with it, so Ian accompanies him in traveling through You Tube. Steve provides Smosh with two electronic phones equipped with an artificial intelligence named Diri (a parody of Siri, voiced by Kimmy Gatewood ), and Steve shows them the portal that is behind his closet door. After tumbling through a series of You Tube videos, they eventually end up in a Jenna Marbles vlog. Jenna informs them that once their Diri phones run out of battery, they will be permanently stuck in You Tube, just like her; they find out there are two Jennas. They decide to split up, but Ian immediately abandons the mission and travels to his You Tube crush video, "Butt Massage Girl" (Brittany Ross), while Anthony escapes a furry party, gets advice from Steve Austin, and finds out that Anna really likes him too. Diri takes Anthony to the Butt Massage Girl video that Ian is getting a massage in. Anthony tells Ian that his and Butt Massage Girl's love is fake and that it's only a video. The duo then finally make it to the embarrassing video of Anthony. Anthony figures out that Ian was the one who recorded and uploaded the video. They both engage in a fight that lasts through three You Tube videos, ending with them returning to the start. Ian decides to make it up to Anthony by beating up his past self. Anthony then goes to help him, but past Ian interferes and attacks Anthony, while Ian is trying to knock out past Anthony. In the process, the other students also start to fight one another. During the battle, Diri reveals itself to be Steve You Tube, who tells them that sending the two into You Tube was part of his evil scheme to keep them in You Tube forever. Frightened, they race to escape You Tube via their video history, but Steve puts up several unsuccessful obstacles on their way, as they make it to the portal only for Steve You Tube to be there waiting for them. But a bear appears and kills Steve, allowing Smosh to escape You Tube. Returning to the real world, Anthony and Ian discover that, due to their changes to Anthony's embarrassing video, they have become famous, turning the video into the "Clone Fight" video; in which they met the President of the United States, created a movie, a TV show, and more. Through this, Ian is dating Butt Massage Girl, Ian's parents live with them, Anthony has thirty girlfriends (who he immediately gets rid of because he only wants Anna), they live in a much bigger and better house, and Steve You Tube (now You-too-bay) has Anthony's former job as a pizza delivery man and Jenna Marbles is the CEO of You Tube. Butt Massage Girl accompanies them as they go to their reunion. As they arrive to their reunion, they discover they are the most famous ones there. When Anthony seeks out Anna and finds her, he finds out that Anna loved him back in the day, but she was intimidated by him being rich and famous. It isn't until Anna sees him perform 'Magic Pocket Slave Monsters' (and successfully performing the back flip) that they kiss and get together. Butt Massage Girl and Anna meet onstage to which Butt Massage Girl reveals her name is Brad, to which Ian responded "What the fuck!? "In a post-credits scene, Ian marries Brad with Anthony crying in the background. Cast [ edit]Anthony Padilla and Ian Hecox played themselves in the film. Anthony Padilla as himself, a former pizza delivery man who is now a Rich & Famous Alumni, and is also Ian's best friend. Ian Hecox as himself, a best friend of Anthony, and is also Brad's love interest. Jillian Nelson as Anna Reed, Anthony's love interest. Brittany Ross as Brad/Butt Massage Girl, a love interest of Ian. Michael Ian Black as Steve You Tube/Steve You-too-bay, the CEO of You Tube who is now a pizza delivery man and is also the main antagonist in the film. Stone Cold Steve Austin as himself, an adviser of Anthony. Jenna Marbles as herself, a previously You Tuber who is stuck on You Tube, and now the new CEO of You Tube. Harley Morenstein as The Mailman, the main enemy of Ian after been thrown some milk balloons by Ian. Grace Helbig as Stephanie, the main receptionist of You Tube. Peter Breitmayer as Mr. Ellis, the master of ceremonies in all high school reunion. Mark Fischbach (Markiplier) as himself, a gamer on You Tube, who is responsible for nearly killing Anthony and Ian by playing "Gorilla Chainsaw Massacre" (a title name spoof of The Texas Chainsaw Massacre)Kristen O'Meara as Mrs. Hecox Kevin Will as Mr. Hecox Kimmy Gatewood as Diri, a personal computer assistance software who is sassy (a parody of Siri and is controlled by Steve). Gatewood also portrayed The Hair Stylist, a personal hair stylist of Anthony & Ian. Damion Poitier as Super Boring Man Dominic Sandoval as Nearby Student Kimoon Kim as Psy Lookalike Elisha Yaffe as High Driver Hal Landon, Jr. as Butler Mari Takahashi as herself (cameo appearance)Matthew Sohinki as himself (cameo appearance)Joshua "Jovenshire" Ovenshire as himself (cameo appearance)David "Lasercorn" Moss as himself (cameo appearance)Shane Dawson as Sex Simulator Guy (unrated)Production [ edit]Director Alex Winter On September 18, 2014, Lionsgate announced that it has picked up the international distribution rights to the movie, while 20th Century Fox picked up U. S. distribution rights to the movie, with production jointly financed by Dream Works Animation 's Awesomeness TV, and Defy Media. The picture was written by Eric Falconer, creator and executive producer of Blue Mountain State and writer of How I Met Your Mother. The film's executive producers are Padilla, Hecox, Barry Blumberg of Defy Media, Brett Bouttier, Joe Davola and Shauna Phelan. Awesomeness TV founder Brian Robbins serves as producer. Winter was signed to direct the film. It was entirely shot in You Tube Space in Los Angeles, California. [2]Release [ edit]On April 15, 2015, it was announced that the movie will be released on July 24, 2015 and will be having its gala world premiere at Vidcon 2015 in Anaheim, California. [4] [5] An official trailer was released on Smosh's official website on June 12, 2015. [6] They have also announced, via their You Tube channel, that they would do a live streaming on July 21, 2015. This took place on July 22, 2015 at 6:00 pm. Home media [ edit]Smosh: The Movie was released on DVD on August 18, 2015, exclusively at Walmart stores by 20th Century Fox Home Entertainment, with some deleted scenes. [7] The film also released in You Tube in the U. S. through the channel fhsfoxconnect. The film was also available in i Tunes, for the on-demand version. Reception [ edit]Critical reception [ edit]On the Review aggregation website Rotten Tomatoes the film has an audience score of 42%. [8]The New York Times described the film as "a fairly successful effort to apply the tone and comic style of those hastily produced weekly shorts to a feature-length script with an actual plot." [9] The review went on to note that it was "clever and surprisingly easy to sit through". [9] The review concluded that "Is it worth your $9.99? Maybe not, but if you can buy it on your parents' credit card, you’ll probably enjoy it." [9] Common Sense Media, which assigns an age recommendation as well as a 5-star rating, gave it a 2 out of 5, stating that although they are a "popular You Tube sensation, they have a Millennial Dumb and Dumber /slacker shtick that's funny for a second and then quickly grows tedious." [10] The review also stated that the movie lacked acting, and then finally summarized that " [i]f Hollywood was looking for a movie that truly elevates web celebs to the status of pulling off a feature-length film, this isn't it", but also recommended that for Smosh fans to watch it, "...it's sure to be an enjoyable endeavor others won't understand." [10]Soundtrack [ edit]There were four songs featured in Smosh: The Movie, courtesy of Epidmic Sound." Just Getting Started " by Hawk Nelson"Magic Pocket Slave Monsters" by Micah Tolentino"Dead and Gone""Midsummer Night's Dream - Wedding March"References [ edit]^ Spangler, Todd (18 September 2014). "Lionsgate Acquires Rights to 'The Smosh Movie,' Starring You Tube Comedy Duo". Variety. Retrieved 5 February 2015.^ a b Spangler, Todd (April 15, 2015). " ' Smosh: The Movie' Starring You Tube Comedy Duo Set to Premiere in July". Variety. Retrieved April 16, 2015.^ "Netflix Will Stream 'Smosh: The Movie' Starting September 22". Tubefilter. 2015-08-25. Retrieved 2017-10-26.^ " ' Smosh: The Movie' To Arrive On July 23rd At Vid Con". Tubefilter. 16 April 2015. Retrieved 23 April 2015.^ "DEFY MEDIA AND AWESOMENESSTV'S SMOSH: THE MOVIE TO PREMIERE WORLDWIDE JULY 23". Defy Media. 17 April 2015. Retrieved 23 April 2015.^ [1]^ http://www.walmart.com/ip/45776262?action=product_interest&action_type=title&item_id=45776262&placement_id=irs-6-b1&strategy=TIC&visitor_id=Ng WGAQav Bu Uu0fgzm Lxmv M&category=&client_guid=4b792ed2-bb1c-4519-83be-46c8bdb68078&customer_id_enc=&config_id=6&parent_item_id=45776262,44606831&parent_anchor_item_id=45776262&guid=8d0dc068-eb7a-4fbc-9d0f-45015a31cf41&bucket_id=irsbucketdefault&beacon_version=1.0.1&finding Method=p13n^ https://www.rottentomatoes.com/m/smosh_the_movie^ a b c Hale, Mike (July 23, 2015). "Review: 'Smosh: The Movie' Wades Through You Tube's Shallows". New York Times. Retrieved July 24, 2015.^ a b Angulo Chen, Sandie (23 July 2015). "Smosh: The Movie Movie Review". Common Sense Media. Common Sense Media Incorporated. Retrieved 27 July 2015. External links [ edit]Smosh: The Movie on IMDb Smosh: The Movie at Rotten Tomatoes Official website [ hide]v t e Films directed by Alex Winter Freaked (1993) Fever (1999) Ben 10: Race Against Time (2007) Ben 10: Alien Swarm (2009) Downloaded (2013)Deep Web: The Untold Story of Bitcoin and the Silk Road (2015) Smosh: The Movie (2015)Categories:2015 films English-language films Lions Gate Entertainment films 2010s comedy films American films American comedy films American independent films American teen comedy films20th Century Fox direct-to video films American buddy films You Tube Films set in California Films shot in California Films directed by Alex Winter Internet memes Films based on web series American comedy science fiction films
|
D1552327
|
http://www.map-game.com/stockholm
|
Where is Stockholm located on the map? Find Stockholm now!
|
Where is Stockholm located on the map? Find Stockholm now!Have you ever been to Sweden or even Stockholm before? Before starting your trip to Stockholm, make sure you know some facts about Stockholm or at least Sweden. There is so much to see and explore in Stockholm - take a look at our suggestions. Even if you are not planning to travel there, you can check your geography knowledge now. Stockholm is a great place to visit when travelling to Sweden. Did you know about these Stockholm sightseeing highlights? Just try them when visiting Stockholm: Stockholm University, Metro, Stockholm-Arlanda Airport, Olympic Stadium, Palace, Stockholm Open, Municipality, Globe Arena, Klara, Norrmalm, Jakob NEW: Play our new funny game The Distance between Stockholm and ... It's free, easy and fun to play. Where is Stockholm located on this blind map? Just click on the map right at the position where you think Stockholm is located. The map can be zoomed and shifted - as you are used to do with Google Maps - to ensure you can find Stockholm . You can drag and drop the red marker or just click anywhere else to change the location of Stockholm. When you are done, confirm your choice by clicking just on the red marker. You then will see, how far you missed Stockholm on the map: the yellow marker will show you the correct position of Stockholm. Image may be subject to copyright Terms of Use2000 km Did you here about Stockholm in the news? Or read tweets about Stockholm? Maybe you just want to improve your geography knowledge about Stockholm - then it is a good idea to log in using Twitter and keep track of your results. Whenever someone else finds Stockholm better than you, we send you a direct message on Twitter. This is not only a geography quiz about Stockholm - we have lots of other locations from all around the world. Just try a random location or choose from the menu above any location you search for or you might know. What about finding Hammamet on a blind map ? Did you try to find your hometown on the map?
|
D2449213
|
http://www.answers.com/Q/Is_phalanges_plural_or_singular
|
Is had plural or singular?
|
Simon Barnett 30,325 Contributions Military Police veteran with a love of languages, travel and useless trivia Is had plural or singular? Had is the past tense conjugation of the verb have , it is used for both singular and plural subjects. What is the singular for the word phalanges?phalanx E2dony 90 Contributions Is was singular or plural? Singular (present and past)Queenface 54 Contributions Is he a singular or plural? The word "he" is singular. Chipilina128 60 Contributions Is is plural or singular? "Is" is singular. More specifically, it is the verb TO BE conjugated to the third person singular, present tense. For example: He is smart. She is running. Henry is hilarious …Matthillio 1 Contribution Is was or were plural or singular? The words was and were are not singular or plural, BUT... WAS is used after a singular noun, and WERE is used after a plural noun. Examples: The dog (a singular no …Bennett Hammond 7,098 Contributions Is who singular or plural? Who may be singular or plural. Is we singular or plural? The pronoun 'we' is the plural form, first person subjective personal pronoun. The singular, first person subjective personal pronoun is 'I'. Glb6 34,746 Contributions Have is plural or singular? Have is used with plural noun phrase subjects or with I, we, they, you. We have a new car. The neighbours have an old car. Notyouraveragedummy ... 327,682 Contributions Is it a plural or a singular? The personal pronoun 'it' is singular , a word that takes theplace of a singular noun for a thing. The corresponding plural, personal pronouns are they as thesubject of a s …Simon Barnett 30,325 Contributions Military Police veteran with a love of languages, travel and useless trivia Is you a singular or plural? You is second person, singular. It is also second person, plural. Is does singular or plural?singular
|
D548325
|
http://www.techrepublic.com/pictures/from-dos-to-the-golden-age-of-windows-the-classic-operating-systems-you-can-run-in-the-browser/
|
From DOS to the golden age of Windows: The classic operating systems you can run in the browser
|
Image 1 of 10 Previous Next Related Topics: Enterprise Software Developer Open Source Software Mobility Cloud13IT jobs 2018: Hiring priorities, growth areas, and strategies to fill open roles As technology changes and companies adapt, IT hiring priorities will evolve as well. In September and October 2017, Tech Pro Research conducted a survey to find out if developments in areas like artificial intelligence, big data, and cloud have changed... Research provided by Tech Pro Research Travelling back in time Those of us who grew up with computers have witnessed great change: from the hulking tower PCs of yore to the pocket-sized smartphones of today and from blinking green screen cursors to 4K graphical displays. For those old enough to remember wrestling with a command line or battling Windows' blue screen of death, it's never been easier to relive those early memories of computing. These virtual trips down memory lane come courtesy of emulators that run directly in the web browser: offering the chance to experience everything from the birth of personal computing in the early 1980s to the golden age of Windows in the late 1990s. Here are some of the classic operating systems you can run in your browser. About Nick Heath Nick Heath is chief reporter for Tech Republic. He writes about the technology that IT decision makers need to know about, and the latest happenings in the European tech scene. Full Bio Contact See all of Nick's content Google+
|
D864941
|
http://hamptoninn3.hilton.com/en/hotels/north-carolina/hampton-inn-charlotte-monroe-MNONCHX/accommodations/index.html
|
Rooms & Suites
|
Rooms & Suites The spacious guest rooms at our Hampton Inn hotel in Monroe, North Carolina offer great amenities. Your non-smoking room includes free Wi Fi, a microwave, mini-fridge, desk with ergonomic chair, and an inviting, cozy bed. Guest Rooms Our promise to you includes a clean, comfortable hotel room. In fact, we have 122 of them! If you're traveling with your family, you may opt for a room with two beds. Or, if you're here by yourself on business, why not book a room with a plush, king-sized bed so you can stretch out and relax? View All Guest Rooms Accessible Rooms We've designed our accessible hotel rooms to make our guests with disabilities, as well as friends and family who accompany them, more comfortable. Click on the links below for more information. The corresponding photo may not reflect the specific accessible room type or room feature. View All Accessible Rooms
|
D980829
|
https://www.quora.com/unanswered/In-the-United-States-what-are-the-two-largest-mountain-ranges
|
In the United States, what are the two largest mountain ranges?
|
Mountain Ranges Mountains Geography The United States of America In the United States, what are the two largest mountain ranges? Update Cancel No Answers Yet Answer Wiki Related Questions How tall are the mountains on Mars compared to Mount Everest? What are the best mountain ranges in the United States to climb? What are the United States' major mountain ranges? What is the importance of the largest mountain range in the United States? Is Europe much worse than the United States? What are the major mountain ranges in North America? How do mountain ranges in Oklahoma differ from mountain ranges in Idaho? Who was the all time best President of the United States of America? How are mountain ranges named in the United States? Compared to Switzerland how mountainous is the United States? Will the United States ever collapse? What two mountain ranges influenced migration patterns in the Americas? Is China the next United States? Why did the United States drop two atomic bombs on Japan in World War II? How is a mountain range formed? Ask New Question Still have a question? Ask your own!Ask
|
D1814811
|
http://www.answers.com/Q/Can_you_stay_at_a_hotel_if_you_are_under_18
|
Can you stay at a hotel if you are under 18?
|
Answers.com ® Wiki Answers ® Categories Travel & Places Hotels and Lodging Hostels Can you stay at a hotel if you are under 18? Flag Can you stay at a hotel if you are under 18? Answer by Joyce Galloway Parker Confidence votes 23.3KMajored in psychology, studied domestic violence, spousal and child abuse, have a lifetime of observing people, their actions and reactions. No. Not unless you stay with somebody who is 18 or older. Some hotels will allow it, depending on their policy. Quite often, teens rent a suite of rooms to party on prom or graduation night. Some hotels will allow it if an adult will register the room in their name and assume responsibility for any damages, etc. Just call the hotel (s) and ask what their policy is on this.7 people found this useful Was this answer useful? Yes Somewhat No Macky 28,999 Contributions Can you stay in a New York hotel if you are under 21? The age of majority for the state is 18, therefore it is likely a person of that age or older would be allowed access if he or she had the proper identification and financial …How can you rent a hotel if you are under 18 but married? In many states you are considered emancipated once you are married, meaning that you can enter binding contracts. Simply call ahead and check that hotel's policy (I'd suggest …Cassius2k 243 Contributions How do you get a hotel room if you are under 18? Hotel policies vary, so the only way to know for sure is to call and ask. For most places you need to be at least 18 or 21 with a credit card and ID to check in. Katz2 137,479 Contributions Can you be under 21 to stay at a hotel with a casino? Yes, you can stay at any hotel that has a casino, but the casino area is off limits to underage guests. If you are under the age minimum for check ins then you must be accompa …Can a girlfriend stay with a boyfriend if they are under the age of 18?in my opinion it depends if either one of them are going to college if not and the love is strong the couple have a good chance to stay together Starppy 47 Contributions Does a felony stay with a person under 18 years old? That depends. If the minor was waived to adult court and tried as an adult, then yes it will stay on your record for life.. If the minor was tried as a minor in the juvenile …Under 18 hotels in magaluf?i want t know this too, can under 18's stay in hotels in maguluf alone? FR8301 1,876 Contributions How do you stay at an hotel or motel under the age of eighteen?you need a credit card... so you probably cant. Notyouraveragedummy ... 327,682 Contributions Can you stay in a hotel in the USA Chicago if you are under 18 but with someone who is 18 but is not your relative? Hotels don't usually ask a person's age, unless your 18 year old looks especially young. The only thing they would want to know is how you are going to pay. Montana Mom 31,740 Contributions Can two people under 18 years old stay one night in the hotel? No. Renting a Motel room is like a form of contract, and you must be 18 to enter into any type of contract. Thomas Ingebrigtsen 12 Contributions Can you stay in a hotel in Dubai at the age of 18? As long as you are over 18 you can do almost any activity you like except some places you cannot buy alcoholic drinks over a certain degree of alcohol, so yes you can stay in …Can you stay at a hotel if you are under 18 in France?yes but with some one over 18Answered In Age of Consent & Underage Relationships Can an 18 year old book the hotel and a 15 year old stay in it?yes but he needs an adult to check once in a while on him/her. Adrianna Monique 1,046 Contributions Answered In Teen Dating Can a 21 year old book a hotel and an 18 year old stay in it?yes Holly Trujillo 105 Contributions Answered In Emancipation and Ages for Moving Out Can a 16 year old stay at a hotel with a 18 year old?yes a 16 year old can stay at a hotel with a 18 year old because an 18 year old is considered an adult so they can stay at a hotel32waystomakeyousmile 215 Contributions Answered In Hotels and Lodging Can you stay at a hotel if you are under 21? Yes, if you're 21 you are legally allowed to book a room also. Jai Myers 6 Contributions Answered In Hotels and Lodging Can you rent a hotel room with people under 18 if your 18? Yes, I just depends on the City, State Laws.
|
D2989465
|
http://medical-dictionary.thefreedictionary.com/man+flu
|
man flu
|
man flu Also found in: Dictionary, Wikipedia .man flu A deprecating term that first appeared in the popular literature in the UK, referring to the purported way in which men respond childishly to a minor cold. While some people believe thatmen react differently than women to the flu, the current data is weak at best and regarded as unscientific and unreliable. The term appeared in the British Medical Journal in 2006, not in support of the concept of a specificman flu, but rather criticising an unscientific survey that the general population was quoting in themedia. Segen's Medical Dictionary. © 2012 Farlex, Inc. All rights reserved. Want to thank TFD for its existence? Tell a friend about us, add a link to this page, or visit the webmaster's page for free fun content . Link to this page: Facebook Twitter
|
D975486
|
http://www.ancestry.com/name-origin?surname=reese
|
.
|
Support Center Ancestry Blog Site Map Gift Memberships Careers Visit our other sites:© 1997-2018 Ancestry Corporate Information Privacy Terms and Conditions
|
D3263873
|
http://www.masslandrecords.com/Franklin/
|
.
|
For Instructions/Help: First time on the website? Use our Quick Start Tutorial . Difficulty viewing or printing documents? Use the Printing Tutorial. How do I download documents with the Basket? Use the Download Tutorial . Download the Search Instructions PDF for general search information. Download the Image Viewing and Printing Instructions PDF. Download the Download Instructions PDF for Basket details. This site uses Pop-ups when printing and downloading documents Test Pop-ups to see if the pop-up blockers are properly disabled. This site uses Adobe Reader when printing and downloading documents If you do not have Adobe Reader installed, download from Adobe Reader . Send us Your Feedback. Perform a Printer Test.
|
D2303529
|
http://www.answers.com/Q/Why_is_the_american_revolution_important_in_history
|
Why is the American revolution important in history?
|
Answers.com ® Wiki Answers ® Categories History, Politics & Society History War and Military History American Revolution Why is the American revolution important in history? Flag Why is the American revolution important in history? Answer by Nohlja Confidence votes 220In terms of American history, it is crucially important because without the Revolution, there would be no United States today. In terms of world history, it was the first instance of a new country being birthed from under the control of another.6 people found this useful Was this answer useful? Yes Somewhat No HOW did the Industrial Revolution affect American history? It created more jobs in American society, which lead to the printing of more money. America was also able to create goods faster, and create more, as well. Nohlja Why was the American Revolution important in history? The American Revolution was the fight for independence from the British crown. If the Revolution had not taken place, the United States would not exist and we would still be a …Peter Zavon 201,985 Contributions What was the American Revolution and its impact on American History? The American Revolution was the war and political activity through which 13 British colonies in North America separated from Britain and became independent states holding terr …USCitizen 477,196 Contributions How did the French Revolution affect American history? France provided support to the US during the War of 1812 although they were tied up militarily with the UK in Europe. Napoleon was the Seller to the United States of the Louis …Chinaa Doll69 69 Contributions The American Revolution was important in world history because?other nations have used the U. S. government as a model Xhannahbananax30 34 Contributions Why was the American Revolution important to early American history? The American Revolution was important to early American History because that is the war we gained our independence from Britian! then we started our own country after becoming …Zenon Hearts Black 8 Contributions The American revolution has been important in world history because it? It was encouraged/influenced later revolutions in other parts of the world What is a short history of the American Revolution? British-American colonists became angered by their government's arbitrary application of the law and taxation. They couldn't get a fair hearing in court, could not get justice …Megan Lester 23 Contributions The American Revolution was important in world history because what? Other nations have used the U. S. government as a model. Was the American revolution the first revolution in history? No, not at all. However, it is the most documented inside America. Ben Allen 64 Contributions The American Revolution was important in the world history because? The American Revolution was important in many aspects. Firstly, and most importantly it allowed the United States the freedom they fought for from the British Empire. Beyond t …Why is the American revolution important in the worlds history?it gave the world the idea of liberty,equality and fraternity Colin Peters 610,892 Contributions Be helpful Answered In History of the United States Who wrote the history of the american revolution? There have been dozens of books by different authors on the American Revolution. Answered In American Revolution Why the American revolution was important to the Americans? Yes they wanted to be free from British control. Answered In American Revolution Why was the American Revolution such an important event in the American History? Because if there was no American Revolution there would be no America, and therefor no American History. Answered In American Revolution Why is the American revolution important in Canada's history?if they didn't the british will go to the americans women and rapped them Answered In American Revolution What does revolution in warfare have to do with American History?the answer is that revolution in warfare is to remember the people who fought in the war for american history
|
D398522
|
https://en.wikipedia.org/wiki/Ponderosa_Pine
|
Pinus ponderosa
|
From Wikipedia, the free encyclopedia (Redirected from Ponderosa Pine)navigation search This article is about the tree. For the plant community that is dominated by this tree, see Ponderosa pine forest. "Ponderosa pines" redirects here. For the place, see Ponderosa Pines, Montana. Pinus ponderosa Pinus ponderosa subsp. ponderosa Conservation status Least Concern ( IUCN 3.1) [1]Scientific classification Kingdom: Plantae Division: Pinophyta Class: Pinopsida Order: Pinales Family: Pinaceae Genus: Pinus Subgenus: Pinus Species: P. ponderosa Binomial name Pinus ponderosa Douglas ex C. Lawson Natural range of Pinus ponderosagreen - P. ponderosa ssp. ponderosared - P. ponderosa ssp. benthamianablue - P. ponderosa ssp. scopulorumyellow - P. ponderosa ssp. brachyptera Pinus ponderosa, commonly known as the ponderosa pine, [2] bull pine, blackjack pine, [3] or western yellow-pine, [4] is a very large pine tree species of variable habitat native to the western United States and Canada. It is the most widely distributed pine species in North America. [5]: 4It grows in various erect forms from British Columbia southward and eastward through 16 western U. S. states and has been successfully introduced in temperate regions of Europe. It was first documented into modern science in 1826 in eastern Washington near present-day Spokane (of which it is the official city tree). On that occasion, David Douglas misidentified it as Pinus resinosa (red pine). In 1829, Douglas concluded that he had a new pine among his specimens and coined the name Pinus ponderosa [6] for its heavy wood. In 1836, it was formally named and described by Charles Lawson, a Scottish nurseryman. [7] It is the official state tree of Montana. [8]Contents [ hide ]1 Description1.1 Size1.2 Cultivation1.3 Use in nuclear testing2 Ecology and distribution3 Taxonomy3.1 Subspecies and varieties3.2 Distinguishing subspecies4 See also5 References6 External links Description [ edit]Pinus ponderosa in Idaho Pinus ponderosa is a large coniferous pine ( evergreen) tree. The bark helps to distinguish it from other species. Mature to over-mature individuals have yellow to orange-red bark in broad to very broad plates with black crevices. Younger trees have blackish-brown bark, referred to as "blackjacks" by early loggers. Ponderosa pine's five subspecies, as classified by some botanists, can be identified by their characteristically bright, green needles (contrasting with blue-green needles that distinguish Jeffrey pine ). The Pacific subspecies has the longest—7.8 in (19.8 cm)—and most flexible needles in plume-like fascicles of three. The Columbia ponderosa pine has long—4.7–8.1 in (12.0–20.5 cm)—and relatively flexible needles in fascicles of three. The Rocky Mountains subspecies has shorter—3.6–5.7 in (9.2–14.4 cm)—and stout needles growing in scopulate (bushy, tuft-like) fascicles of two or three. The southwestern subspecies has 4.4–7.8 in (11.2–19.8 cm), stout needles in fascicles of three (averaging 2.7–3.5 in (69–89 mm)). The central High Plains subspecies is characterized by the fewest needles (1.4 per whorl, on average); stout, upright branches at narrow angles from the trunk; and long green needles—5.8–7.0 in (14.8–17.9 cm)—extending farthest along the branch, resembling a fox tail. Needles are widest, stoutest, and fewest (averaging 2.2–2.8 in (56–71 mm)) for the species. [9] [10] [11]Sources differ on the scent of P. ponderosa, but it is more or less of turpentine, reflecting the dominance of terpenes (alpha- and beta-pinenes, and delta-3-carene). [12] Some state that it has no distinctive scent. [13]Size [ edit]The National Register of Big Trees lists a Ponderosa Pine that is 235 ft (72 m) tall and 324 in (820 cm) in circumference. [14] In January 2011, a Pacific ponderosa pine in the Rogue River–Siskiyou National Forest in Oregon was measured with a laser to be 268.35 ft (81.79 m) high. The measurement was performed by Michael Taylor and Mario Vaden, a professional arborist from Oregon. The tree was climbed on October 13, 2011, by Ascending The Giants (a tree-climbing company in Portland, Oregon) and directly measured with tape-line at 268.29 ft (81.77 m) high. [15] [16] This is the second tallest known pine after the sugar pine. Cultivation [ edit]This species is grown as an ornamental plant in parks and large gardens. [17]Use in nuclear testing [ edit]During Operation Upshot–Knothole in 1953, a nuclear test was performed in which 145 ponderosa pines were cut down by the United States Forest Service and transported to Area 5 of the Nevada Test Site, where they were planted into the ground and exposed to a nuclear blast to see what the blast wave would do to a forest. The trees were partially burned and blown over. [18]Ecology and distribution [ edit]Subspecies P. p, scopulorum, Custer State Park, South Dakota Pinus ponderosa is a dominant tree in the Kuchler plant association, the ponderosa shrub forest. Like most western pines, the ponderosa generally is associated with mountainous topography. However, it is found on banks of the Niobrara River in Nebraska. Scattered stands occur in the Willamette Valley of Oregon and in the Okanagan Valley and Puget Sound areas of Washington. Stands occur throughout low level valleys in British Columbia reaching as far north as the Thompson, Fraser and Columbia watersheds. Ponderosa covers 1 million acres (4,000 km 2 ), or 80%, [19] of the Black Hills of South Dakota. It is found on foothills and mid-height peaks of the northern, central, and southern Rocky Mountains, in the Cascade Range, in the Sierra Nevada, and in the maritime-influenced Coast Range. In Arizona, it predominates on the Mogollon Rim and is scattered on the Mogollon Plateau and on mid-height peaks in Arizona and New Mexico. It does not extend into Mexico. [20]The fire cycle for ponderosa pine is 5 to 10 years, in which a natural ignition sparks a low-intensity fire. [21]Pinus ponderosa needles are the only known food of the caterpillars of the gelechiid moth Chionodes retiniella. [22] Blue stain fungus, Grosmannia clavigera, is introduced in sapwood of P. ponderosa from the galleries of all species in the genus Dendroctonus ( Mountain Pine Beetle ), which has caused much damage. Taxonomy [ edit]Modern forestry research has identified five different taxa of P. ponderosa, with differing botanical characters and adaptations to different climatic conditions. Four of these have been termed "geographic races" in forestry literature. Some botanists historically treated some races as distinct species. In modern botanical usage, they best match the rank of subspecies and have been formally published. [9] [10]Subspecies and varieties [ edit]Pinus ponderosa subsp. brachyptera Engelm. — southwestern ponderosa pine. [23]Four corners transition zone including southern Colorado, southern Utah, northern and central New Mexico and Arizona, westernmost Texas, and a single disjunct population in the far northwestern Oklahoma panhandle. [24] The Gila Wilderness contains one of the world's largest and healthiest forests. [25] Hot with bimodal monsoonal rainfall; wet winters and summers contrast with dry springs and falls; mild winters. Pinus ponderosa subsp. critchfieldiana Robert Z. Callaham subsp. novo — Pacific ponderosa pine. Western coastal parts of Washington State; Oregon west of the Cascade Range except for the southward-extending Umpqua–Tahoe Transition Zone; California except for both that transition zone and the Transverse-Tehahchapi Mountains Transition zone in southern California and Critchfield's far Southern California Race. Mediterranean hot, dry summers in California; mild wet winters with heavy snow in mountains. Pinus ponderosa var. pacifica J. R. Haller & Vivrette — Pacific ponderosa pine. [26] [27]100–2,700 m (330–8,860 ft) on coastal-draining slopes of major mountain ranges in California, and in southwestern Oregon, Washington. [26]Pinus ponderosa subsp. ponderosa Douglas ex C. Lawson — Columbia ponderosa pine, North plateau ponderosa pine. [28]Southeast British Columbia, eastern Washington State and Oregon east of the Cascade Range, 1,200–1,900 m (3,900–6,200 ft) in northeastern California, Arizona, northwestern Nevada, Idaho and west of the Helena, Montana, transition zone. Cool, relatively moist summers; very cold, snowy winters (except in the very hot and very dry summers of central Oregon, most notably near Bend, which also has very cold and generally dry winters). [29] [30]Pinus ponderosa subsp. readiana Robert Z. Callaham subsp. novo — central High Plains ponderosa pine. Southern South Dakota and adjacent northern Nebraska and far eastern Colorado, but neither the northern and southern High Plains nor the Black Hills, which are in P. p. scopulorun. Hot, dry, very windy summers; continental cold, wet winters. Pinus ponderosa var. scopulorum ( Engelm. in S. Watson) E. Murray, Kalmia 12:23, 1982 — Rocky Mountains ponderosa pine. [31]East of the Helena, Montana, transition zone, North & South Dakota, but not the central high plains, Wyoming, Nebraska, northern and central Colorado and Utah, and eastern Nevada. Warm, relatively dry summers; very cold, fairly dry winters. Pinus ponderosa var. washoensis (H. Mason & Stockw.) J. R. Haller & Vivrette — Washoe pine. [32]Predominantly in northeastern California, and into Nevada and Oregon, at 2,000–3,000 m (6,600–9,800 ft), upper mixed-conifer to lower subalpine habitats. [33] [34]Distributions of the subspecies in the United States are shown in shadow on the map. Distribution of ponderosa pine is from Critchfield and Little. [35] The closely related five-needled Arizona pine ( Pinus arizonica) extends southward into Mexico. Before the distinctions between the North Plateau race and the Pacific race were fully documented, most botanists assumed that ponderosa pines in both areas were the same. When a botanist and a geneticist from California found in 1948 a distinct tree on Mt. Rose in western Nevada with some marked differences from the ponderosa pine they knew in California, they described it as a new species, Washoe pine Pinus washoensis. Subsequent research determined this to be one of the southern-most outliers of the typical North Plateau race of ponderosa pine. [9]: 30–31 [36] [37] [38] Its current classification is Pinus ponderosa var. washoensis. [32] [33] [34]An additional variety, tentatively named P. p. var. willamettensis, found in the Willamette Valley in western Oregon, is rare. [39] This is likely just one of the many islands of Pacific subspecies of ponderosa pine occurring in the Willamette Valley and extending north to the southeast end of Puget Sound in Washington. Distinguishing subspecies [ edit]The subspecies of P. ponderosa can be distinguished by measurements along several dimensions: [9]: 23–24 [10]: 17Common name Pacific Columbia Rocky Mountains Southwestern Central High Plains Scientific name P. p. critchfieldiana P. p. ponderosa P. p. scopulorum P. p. brachyptera P. p. readiana Years needles remain green 3.9±0.25, N=30 4.7±0.14, N=50 5.7±0.28, N=23 4.3±0.18, N=24 4.7±0.18, N=5Foliage length on branch (cm) 25.1±2.4, N=30 26.2±2.2, N=50 21.1±1.7, N=23 21.8±2.7, N=24 42.2±6.7, N=5Needle length (cm) 19.8±0.44, N=30 16.8±0.29, N=48 11.2±0.27, N=23 14.7±0.45, N=24 15.6±0.57, N=5Needles per fascicle 3.0±0.00, N=30 3.0±0.00, N=48 2.6±0.06, N=23 3.0±0.03, N=24 2.4±0.11, N=5Needle thickness 45.9±0.49, N=30 47.8±0.51, N=48 46.4±0.68, N=23 44.8±0.87, N=24 49.7±0.61, N=5Branches per whorl 4.4±0.13, N=30 3.7±0.11, N=50 3.0±0.17, N=23 3.4±0.25, N=23 2.3±0.11, N=5Branch angle (° from vertical) 56±1.8, N=30 51±1.7, N=50 50±2.3, N=23 48±3.1, N=24 36±1.9, N=5Seed cones length (mm) 101.4±2.48, N=25 88.7±1.24, N=36 70.7±2.20, N=22 74.9±2.51, N=20 71.1±2.46, N=5Seed cones width (mm) 77.1±1.35, N=25 71.6±0.73, N=36 61.5±1.08, N=22 62.6±1.77, N=20 63.3±2.18, N=5Seed cone form W/L 0.80±0.03, N=25 0.84±0.03, N=36 0.90±0.02, N=22 0.86±0.02, N=20 0.90±0.03, N=5Seed length (mm) 7.5±0.08, N=23 7.6±0.16, N=14 6.3±0.09, N=17 6.4±0.18, N=16 7.0±0.12, N=5Seed width (mm) 4.9±0.05, N=23 4.9±0.08, N=14 4.1±0.05, N=17 4.3±0.09, N=16 4.5±0.10, N=5Seed + wing length (mm) 32.3±0.58, N=23 24.8±0.62, N=14 22.9±0.63, N=17 23.3±0.68, N=15 23.1±0.78, N=5Mature cone color [40]apple green to yellow green green & red-brown to dark purple green & red-brown to dark purple green & red-brown to dark purple Notes Names of taxa and transition zones are on the map. Numbers in columns were derived from multiple measurements of samples taken from 10 (infrequently fewer) trees on a varying number of geographically dispersed plots. Numbers in each cell show calculated mean ± standard error and number of plots. See also [ edit]Southern yellow pine References [ edit]^ Farjon, A. (2013). " Pinus ponderosa ". The IUCN Red List of Threatened Species. IUCN. 2013: e. T42401A2977432. doi: 10.2305/IUCN. UK.2013-1. RLTS. T42401A2977432.en. Retrieved 13 December 2017.^ " Pinus ponderosa ". Natural Resources Conservation Service PLANTS Database. USDA. Retrieved 31 January 2016.^ Moore, Gerry; Kershner, Bruce; Craig Tufts; Daniel Mathews; Gil Nelson; Spellenberg, Richard; Thieret, John W.; Terry Purinton; Block, Andrew (2008). National Wildlife Federation Field Guide to Trees of North America. New York, New York: Sterling. p. 89. ISBN 1-4027-3875-7.^ "BSBI List 2007". Botanical Society of Britain and Ireland. Archived from the original (xls) on 2015-01-25. Retrieved 2014-10-17.^ Safford, H. D. 2013. Natural Range of Variation (NRV) for yellow pine and mixed conifer forests in the bioregional assessment area, including the Sierra Nevada, southern Cascades, and Modoc and Inyo National Forests. Unpublished report. USDA Forest Service, Pacific Southwest Region, Vallejo, CA, [1]^ Lauria, F. (1996). The identity of Pinus ponderosa Douglas ex C. Lawson (Pinaceae). Linzer Biologische Beitraege.^ The agriculturist's manual: being a familiar description of agricultural plants cultivated in Europe. Edinburgh U. K.: William Blackwood and Sons. 1836.^ Dickson, Tom. "Ponderosa Pine". Montana Outdoors. Montana Fish, Wildlife & Parks. Retrieved February 18, 2015.^ a b c d Callaham, Robert Z. (September 2013). "Pinus ponderosa: A Taxonomic Review with Five Subspecies in the United States" (PDF). USDA Forest Service. PSW RP-264.^ a b c Callaham, Robert Z. (September 2013). "Pinus ponderosa: Geographic Races and Subspecies Based on Morphological Variation" (PDF). USDA Forest Service. PSW RP-265.^ Eckenwalder, James (2009). Conifers of the World. Portland, Oregon: Timber Press. ISBN 978-0-88192-974-4.^ Smith, Richard H. (1977). Monoterpenes of ponderosa pine in Western United States. USDA Forest Service. Tech. Bull. 1532.^ Schoenherr, Allan A. (1995). A Natural History of California. University of California Press. p. 111.^ "Pacific ponderosa pine". National Register of Big Trees. American Forests.^ Earle, Christopher J. (ed.). "Pinus Ponderosa benthamiana". conifers.org. The Gymnosperm Database. Retrieved January 9, 2018.^ Fattig, Paul (January 23, 2011). "Tallest of the tall". Mail Tribune. Medford, Oregon. Retrieved January 27, 2011.^ "Pinus ponderosa". RHS Plant Selector. Retrieved July 1, 2013.^ Finkbeiner, Ann (May 31, 2013). "How Do We Know Nuclear Bombs Blow Down Forests?". Slate.com. Retrieved May 31, 2013.^ Meierhenry, Mark (March 2008). "The Old Growth Pines". South Dakota Magazine.^ Perry, JP Jr. (1991). Pines of Mexico and Central America. Portland, Oregon: Timber Press.^ Stecker, Tiffany; Climate Wire (March 22, 2013). "U. S. Starts Massive Forest-Thinning Project". Scientific American. Retrieved April 19, 2014.^ Furniss, RL; Carolin, VM (1977). Western Forest Insects. US Department of Agriculture Forest Service. p. 177. Miscellaneous Publication 1339.^ " Pinus ponderosa subsp. brachyptera ". USDA.gov. United States Department of Agriculture; with distribution map.^ "Pinus ponderosa, ponderosa pine". Catalog of the Woody Plants of Oklahoma. Oklahoma Biological Survey.^ "Arizona Mountains forests". Terrestrial Ecoregions. World Wildlife Fund.^ a b " Pinus ponderosa var. pacifica ". Jepson e Flora. The Jepson Herbarium, University of California, Berkeley. Retrieved January 9, 2018.^ " Pinus ponderosa var. pacifica (Pacific ponderosa pine)". calflora.org. Calflora Database.^ " Pinus ponderosa subsp. ponderosa (North plateau ponderosa pine)". calflora.org. Calflora Database.^ " Pinus ponderosa subsp. ponderosa ". Jepson e Flora. The Jepson Herbarium, University of California, Berkeley. Retrieved January 9, 2018.^ " Pinus ponderosa var. ponderosa ". USDA.gov. United States Department of Agriculture; with distribution map.^ " Pinus ponderosa var. scopulorum ". USDA.gov. United States Department of Agriculture; with distribution map.^ a b " Pinus ponderosa var. washoensis (Washoe pine)". calflora.org. Calflora Database.^ a b " Pinus ponderosa var. washoensis ". Jepson e Flora. The Jepson Herbarium, University of California, Berkeley. Retrieved January 9, 2018.^ a b " Pinus ponderosa var washoensis (Washoe pine)". USDA.gov. United States Department of Agriculture; with distribution map^ Critchfield, WB; Little, EL (1966). Geographic distribution of the pines of the world. USDA Forest Service. Miscellaneous Publication 991, p. 16 (Map 47).^ Haller, JR (1961). "Some recent observations on ponderosa, Jeffrey, and Washoe pines in northeastern California". Madroño. 16: 126–132.^ Haller, JR (1965). "Pinus washoensis: taxonomic and evolutionary implications". American Journal of Botany. 52: 646. JSTOR 2440143.^ Lauria, F (1997). "The taxonomic status of (Pinus washoensis) H. Mason & Stockw". Annalen des Naturhistorischen Museums in Wien. 99B: 655–671.^ Ryan, Catherine (March 19, 2012). "Loggers give unique Oregon ponderosa pine a lifeline". High Country News. Paonia, Colorado. Retrieved March 28, 2012.^ Smith, R. H. (1981). "Variation in cone color of immature ponderosa pine (Pinaceae) in northern California and southern Oregon". Madroño 28: 272–275. Chase, J. Smeaton (1911). Cone-bearing Trees of the California Mountains. Chicago, Illinois: A. C. Mc Clurg & Co. p. 99. LCCN 11004975. OCLC 3477527. LCC QK495. C75 C4, with illustrations by Carl Eytel – Kurut, Gary F. (2009), "Carl Eytel: Southern California Desert Artist", California State Library Foundation, Bulletin No. 95, pp. 17-20 (PDF), retrieved November 13, 2011Conifer Specialist Group (1998). " Pinus ponderosa ". IUCN Red List of Threatened Species. Version 2006. International Union for Conservation of Nature. Retrieved May 12, 2006. Conkle, MT; Critchfield, WB (1988). "Genetic variation and hybridization of ponderosa pine". In Baumgartner, DM; Lotan, JE. Ponderosa pine the species and its management. Cooperative Extension, Washington State University. pp. 27–44. Critchfield, WB (1984). "Crossability and relationships of Washoe Pine". Madroño. 31: 144–170. Critchfield, WB; Allenbaugh, GL (1965). "Washoe pine on the Bald Mountain Range, California". Madroño. 18: 63–64. Farjon, A (2005). Pines (2nd ed.). Leiden & Boston: Brill. ISBN 90-04-13916-8. Haller, JR (1962). Variation and hybridization in ponderosa and Jeffrey pines. University of California Publications in Botany. 34. pp. 123–166. Haller, JR (1965). "The role of 2-needle fascicles in the adaptation and evolution of ponderosa pine". Brittonia. 17 (4): 354–382. doi: 10.2307/2805029. JSTOR 2805029. Haller, JR; Vivrette, NJ (2011). "Ponderosa pine revisited". Aliso. 29 (1): 53–57. doi: 10.5642/aliso.20112901.07. Lauria, F (1991). "Taxonomy, systematics, and phylogeny of Pinus subsection Ponderosae Loudon (Pinaceae). Alternative concepts". Linzer Biol. Beitr. 23 (1): 129–202. Lauria, F (1996). "The identity of Pinus ponderosa Douglas ex C. Lawson (Pinaceae)". Linzer Biol. Beitr. 28 (2): 999–1052. Lauria, F (1996). "Typification of Pinus benthamiana Hartw. (Pinaceae), a taxon deserving renewed botanical examination". Ann. Naturhist. Mus. Wien. 98 (B Suppl. ): 427–446. Mirov, NT (1929). "Chemical analysis of the oleoresins as a means of distinguishing Jeffrey pine and western yellow pine". Journal of Forestry. 27: 176–187. Van Haverbeke, DF (1986). Genetic variation in ponderosa pine: A 15-Year Test of provenances in the Great Plains. USDA Forest Service. Research Paper RM-265. Wagener, WW (1960). "A comment on cold susceptibility of ponderosa and Jeffrey pines". Madroño. 15: 217–219. External links [ edit]Wikimedia Commons has media related to: Pinus ponderosa ( category)USDA Plants Profile for Pinus ponderosa (ponderosa pine)Gymnosperm Database: Pinus ponderosa Calflora Database: Pinus ponderosa (ponderosa pine, western yellow pine)Jepson Manual e Flora (TJM2) treatment of Pinus ponderosa UC Cal Photos Gallery − Pinus ponderosa Taxon identifiers Wd: Q460523 APDB: 184070 ARKive: pinus-ponderosa Eo L: 1061751 EPPO: PIUPOFNA: 200005351 Fo C: 200005351 GBIF: 5285053 GRIN: 28530 i Naturalist: 48461 IPNI: 307165-2ITIS: 183365 IUCN: 42401 NCBI: 55062 Pal Dat: Pinus_ponderosa Plant List: kew-2562565PLANTS: PIPO Tropicos: 24900205 VASCAN: 7191 WCSP: 380358Categories: IUCN Red List least concern species Pinus Trees of the Western United States Trees of the West Coast of the United States Trees of British Columbia Trees of Northwestern Mexico Trees of Northeastern Mexico Trees of the Southwestern United States Trees of the Northwestern United States Trees of the South-Central United States Trees of the North-Central United States Flora of the Cascade Range Flora of the Klamath Mountains Flora of the Rocky Mountains Flora of the Sierra Nevada (U. S.) Flora of Arizona Flora of California Flora of Colorado Flora of Idaho Flora of Montana Flora of New Mexico Flora of Nevada Flora of Northwestern Mexico Flora of Oklahoma Flora of South Dakota Flora of Texas Flora of Utah Flora of Washington (state) Flora of Wyoming Natural history of the Transverse Ranges San Gabriel Mountains San Bernardino Mountains Symbols of Montana Least concern flora of California Least concern flora of the United States Plants used in bonsai Garden plants of North America Ornamental trees
|
D2078142
|
https://answers.yahoo.com/question/index?qid=20090531105859AAd207s
|
What are all the literary devices? List them please!?
|
Education & Reference Homework Help What are all the literary devices? List them please!? List them plz 10pts for the most/best!18 following 5 answers Answers Relevance Rating Newest Oldest Best Answer: Ad Hominem An argument based on the failings of an adversary rather than on the merits of the case; a logical fallacy that involves a personal attack. Allegory Extending a metaphor so that objects, persons, and actions in a text are equated with meanings that lie outside the text. Alliteration The repetition of an initial consonant sound. Allusion A brief, usually indirect reference to a person, place, or event--real or fictional. Ambiguity The presence of two or more possible meanings in any passage. Analogy Reasoning or arguing from parallel cases. Anaphora The repetition of the same word or phrase at the beginning of successive clauses or verses. Antithesis The juxtaposition of contrasting ideas in balanced phrases. Aphorism (1) A tersely phrased statement of a truth or opinion. (2) A brief statement of a principle. Apostrophe A rhetorical term for breaking off discourse to address some absent person or thing. Appeal to Authority A fallacy in which a rhetor seeks to persuade not by giving evidence but by appealing to the respect people have for the famous. Appeal to Ignorance A fallacy that uses an opponent's inability to disprove a conclusion as proof of the conclusion's correctness. Argument A course of reasoning aimed at demonstrating truth or falsehood. Assonance The identity or similarity in sound between internal vowels in neighboring words. Asyndeton The omission of conjunctions between words, phrases, or clauses (opposite of "polysyndeton"). Chiasmus A verbal pattern in which the second half of an expression is balanced against the first but with the parts reversed. Circular Argument An argument that commits the logical fallacy of assuming what it is attempting to prove. Claim An arguable statement. Clause A group of words that contains a subject and a predicate. Climax Mounting by degrees through words or sentences of increasing weight and in parallel construction with an emphasis on the high point or culmination of a series of events. Colloquial Characteristic of writing that seeks the effect of informal spoken language as distinct from formal or literary English. Comparison A rhetorical strategy in which a writer examines similarities and/or differences between two people, places, ideas, or objects. Concession An argumentative strategy by which a speaker or writer concedes a disputed point or leaves a disputed point to the audience or reader to decide. Confirmation The main part of a text in which logical arguments in support of a position are elaborated. Connotation The emotional implications and associations that a word may carry. Deduction A method of reasoning in which a conclusion follows necessarily from the stated premises. Denotation The direct or dictionary meaning of a word, in contrast to its figurative or associated meanings. Dialect A regional or social variety of a language distinguished by pronunciation, grammar, or vocabulary. Diction (1) The choice and use of words in speech or writing. (2) A way of speaking, usually assessed in terms of prevailing standards of pronunciation and elocution. Encomium A tribute or eulogy in prose or verse glorifying people, objects, ideas, or events. Epiphora The repetition of a word or phrase at the end of several clauses. Ethos A persuasive appeal based on the projected character of the speaker or narrator. Euphemism The substitution of an inoffensive term for one considered offensively explicit. Exposition A statement or type of composition intended to give information about (or an explanation of) an issue, subject, method, or idea. Extended Metaphor A comparison between two unlike things that continues throughout a series of sentences in a paragraph or lines in a poem. Fallacy An error in reasoning that renders an argument invalid. False Dilemma A fallacy of oversimplification that offers a limited number of options (usually two) when in reality more options are available. Figurative Language Language in which figures of speech (such as metaphors, similes, and hyperbole) freely occur. Figures of Speech The various uses of language that depart from customary construction, order, or significance. Flashback A shift in a narrative to an earlier event that interrupts the normal chronological development of a story. Hasty Generalization A fallacy in which a conclusion is not logically justified by sufficient or unbiased evidence. Hyperbole A figure of speech in which exaggeration is used for emphasis or effect; an extravagant statement. Imagery Vivid descriptive language that appeals to one or more of the senses. Induction A method of reasoning by which a rhetor collects a number of instances and forms a generalization that is meant to apply to all instances. Invective Denunciatory or abusive language; discourse that casts blame on somebody or something. Irony The use of words to convey the opposite of their literal meaning. A statement or situation where the meaning is directly contradicted by the appearance or presentation of the idea. Isocolon A succession of phrases of approximately equal length and corresponding structure. Jargon The specialized language of a professional, occupational, or other group, often meaningless to outsiders. Litotes A figure of speech consisting of an understatement in which an affirmative is expressed by negating its opposite. Metaphor A figure of speech in which an implied comparison is made between two unlike things that actually have something important in common. Metonymy A figure of speech in which one word or phrase is substituted for another with which it is closely associated (such as "crown" for "royalty"). Mood The quality of a verb that conveys the writer's attitude toward a subject. Narrative A rhetorical strategy that recounts a sequence of events, usually in chronological order. Onomatopoeia The formation or use of words that imitate the sounds associated with the objects or actions they refer to. Oxymoron A figure of speech in which incongruous or contradictory terms appear side by side. Paradox A statement that appears to contradict itself. Parallelism The similarity of structure in a pair or series of related words, phrases, or clauses. Parody A literary or artistic work that imitates the characteristic style of an author or a work for comic effect or ridicule. Pathos The means of persuasion that appeals to the audience's emotions. Periodic Sentence A long and frequently involved sentence, marked by suspended syntax, in which the sense is not completed until the final word--usually with an emphatic climax. Personification A figure of speech in which an inanimate object or abstraction is endowed with human qualities or abilities. Point of View The perspective from which a speaker or writer tells a story or presents information. Prose Ordinary writing (both fiction and nonfiction) as distinguished from verse. Refutation The part of an argument wherein a speaker or writer anticipates and counters opposing points of view. Rhetoric The study and practice of effective communication. Rhetorical Question A question asked merely for effect with no answer expected. Running Style Sentence style that appears to follow the mind as it worries a problem through, mimicking the "rambling, associative syntax of conversation"--the opposite of periodic sentence style. Sarcasm A mocking, often ironic or satirical remark. Satire A text or performance that uses irony, derision, or wit to expose or attack human vice, foolishness, or stupidity. Simile A figure of speech in which two fundamentally unlike things are explicitly compared, usually in a phrase introduced by "like" or "as." Style Narrowly interpreted as those figures that ornament speech or writing; broadly, as representing a manifestation of the person speaking or writing. Syllogism A form of deductive reasoning consisting of a major premise, a minor premise, and a conclusion. Symbol A person, place, action, or thing that (by association, resemblance, or convention) represents something other than itself. Synecdoche A figure of speech in which a part is used to represent the whole, the whole for a part, the specific for the general, the general for the specific, or the material for the thing made from it. Syntax (1) The study of the rules that govern the way words combine to form phrases, clauses, and sentences. (2) The arrangement of words in a sentence. Thesis The main idea of an essay or report, often written as a single declarative sentence. Tone A writer's attitude toward the subject and audience. Tone is primarily conveyed through diction, point of view, syntax, and level of formality. Transition The connection between two parts of a piece of writing, contributing to coherence. Understatement A figure of speech in which a writer deliberately makes a situation seem less important or serious than it is. Zeugma The use of a word to modify or govern two or more words although its use may be grammatically or logically correct with only one. RHETORICAL TECHNIQUES FIGURES OF SPEECH metaphor simile personification oxymoron metonymy synecdoche antithesis irony allusion pathetic fallacy REPETITION anaphora epistrophe isocolon tricolon chiasmus antimetabole anadiplosis polysyndeton SYNTAX periodic sentence rhetorical question rhetorical fragment telegraphic sentence balanced sentence parallel structure aposiopesis anthyphophora SYNTAX periodic sentence rhetorical question rhetorical fragment telegraphic Source (s): SYNTAX periodic sentence rhetorical question rhetorical fragment telegraphic sentence balanced sentence parallel structure aposiopesis anthyphophora SYNTAX periodic sentence rhetorical question rhetorical fragment telegraphic sentence balanced sentence parallel structure aposiopesis anthyphophora SOUND DEVICES assonance consonance alliteration onomatopoeia euphony rhyme meter SOUND DEVICES assonance consonance alliteration onomatopoeia euphony rhyme meter These are what I used to review for the AP Language exam and they helped. Kathryn · 9 years ago58 4 6 comments Asker's rating Common Literary Devices Source (s):https://shorte.im/bbh CJcurcio · 1 year ago0 0 Comment Literary Elements List Source (s):https://shrinks.im/a73q Shamic · 1 year ago0 0 Comment There are lots of literary dvices but some are common which are mostly used are Aphorism, Archetype ,Assonance, Bildungsroman, Cacophony, Characterization, Conflict, Diction, Euphemism, Flashback and many more.sophia · 4 years ago0 0 Comment For the best answers, search on this site https://shorturl.im/axtiv accent- the prominence or emphasis given to a syllable or word. alliteration- the repetition of the same or similar sounds at the beginning of words. assonance- the repetition or pattern of similar sounds, especially vowel sounds. consonance- the repetition of similar consonant sounds especially at the ends of words, (like lost and past). couplet- in a poem, a pair of lines that are the same length and usually rhyme and form a complete thought. elegy- a poem that laments the death of a person or one that is simply sad and thoughtful. hyperbole- a figure of speech in which deliberate exaggeration is used for emphasis. metaphor- a figure of speech in which two things are compared, usually bu saying one thing is another. narrative- telling a story. personification- a figure of speech in which nonhuman things or abstract ideas are given human attributes. rhyme (obvious). simile- a figure of speech in which two things are compared using the word "like"or "as. stress- the prominence or emphasis given to particular syllables. Eleanor · 2 years ago0 0 Commentthere are lots of literary , there are common ones as well , and they get used a lot for mostly for school things .gage · 3 years ago0 0 Comment Want to see the answer to this toopatience · 2 years ago0 0 Commentbooo Muhammad Shaheer Talat · 4 years ago0 1 Comment LITERARY DEVICES Copyright © 2007 by Jay Braiman www.mrbraiman.com Literary devices refers to specific aspects of literature, in the sense of its universal function as an art form which expresses ideas through language, which we can recognize, identify, interpret and/or analyze. Literary devices collectively comprise the art form’s components; the means by which authors create meaning through language, and by which readers gain understanding of and appreciation for their works. They also provide a conceptual framework for comparing individual literary works to others, both within and across genres. Both literary elements and literary techniques can rightly be called literary devices. Literary elements refers to particular identifiable characteristics of a whole text. They are not “used,” per se, by authors; they represent the elements of storytelling which are common to all literary and narrative forms. For example, every story has a theme, every story has a setting, every story has a conflict, every story is written from a particular point-of-view, etc. In order to be discussed legitimately as part of a textual analysis, literary elements must be specifically identified for that particular text. Literary techniques refers to any specific, deliberate constructions or choices of language which an author uses to convey meaning in a particular way. An author’s use of a literary technique usually occurs with a single word or phrase, or a particular group of words or phrases, at one single point in a text. Unlike literary elements, literary techniques are not necessarily present in every text; they represent deliberate, conscious choices by individual authors. Allegory: Where every aspect of a story is representative, usually symbolic, of something else, usually a larger abstract concept or important historical/geopolitical event. Lord of the Flies provides a compelling allegory of human nature, illustrating the three sides of the psyche through its sharply-defined main characters. Alliteration: The repetition of consonant sounds within close proximity, usually in consecutive words within the same sentence or line. Antagonist: Counterpart to the main character and source of a story’s main conflict. The person may not be “bad” or “evil” by any conventional moral standard, but he/she opposes the protagonist in a significant way. (Although it is technically a literary element, the term is only useful for identification, as part of a discussion or analysis of character; it cannot generally be analyzed by itself.) Anthropomorphism: Where animals or inanimate objects are portrayed in a story as people, such as by walking, talking, or being given arms, legs, facial features, human locomotion or other anthropoid form. (This technique is often incorrectly called personification.) The King and Queen of Hearts and their playing-card courtiers comprise only one example of Carroll’s extensive use of anthropomorphism in Alice’s Adventures in Wonderland. Blank verse: Non-rhyming poetry, usually written in iambic pentameter. Most of Shakespeare’s dialogue is written in blank verse, though it does occasionally rhyme. Character: The people who inhabit and take part in a story. When discussing character, as distinct from characterization, look to the essential function of the character, or of all the characters as a group, in the story as a whole. Rather than focus on one particular character, Lord assembles a series of brief vignettes and anecdotes involving multiple characters, in order to give the reader the broadest possible spectrum of human behavior. Golding uses his main characters to represent the different parts of the human psyche, to illustrate mankind’s internal struggle between desire, intellect, and conscience. Characterization: The author’s means of conveying to the reader a character’s personality, life history, values, physical attributes, etc. Also refers directly to a description thereof. Atticus is characterized as an almost impossibly virtuous man, always doing what is right and imparting impeccable moral values to his children. Climax: The turning point in a story, at which the end result becomes inevitable, usually where something suddenly goes terribly wrong; the “dramatic high point” of a story. (Although it is technically a literary element, the term is only useful for identification, as part of a discussion or analysis of structure; it cannot generally be analyzed by itself.) The story reaches its climax in Act III, when Mercutio and Tybalt are killed and Romeo is banished from Verona. Conflict: A struggle between opposing forces which is the driving force of a story. The outcome of any story provides a resolution of the conflict (s); this is what keeps the reader reading. Conflicts can exist between individual characters, between groups of Source (s): Literary Devices ... storytelling which are common to all literary and narrative forms. ... story are essentially part of the plot, rather than a literary device in themselves. ... http://www.mrbraiman.home.att.net/lit.ht... - 72k - Cached? · 9 years ago11 6 Comment Maybe you would like to learn more about one of these? Explore Digital Home Security Look For an Accident Attorney Need a Home Security Safe? Need a DUI Attorney?
|
D1122641
|
https://www.thoughtco.com/tzedakah-more-than-charity-2076098
|
Tzedakah: More than Charity
|
Humanities ›Religion & Spirituality Tzedakah: More than Charity Share Flipboard Email Print Elad Matityahu / Eye Em / Getty Imagesby Lisa Katz Updated May 10, 2017Reaching out to those in need is central to Jewish being. Jews are commanded to give at least ten percent of their net income to charity. Tzedakah boxes for collecting coins for those in need can be found in central places in Jewish homes. It is common to see Jewish youth, in Israel and in the Diaspora, going door-to-door to collect money for worthy causes. Obligated to Give Tzedakah literally means righteousness in Hebrew. In the bible, tzedakah is used to refer to justice, kindness, ethical behavior and the like. In post-biblical Hebrew, tzedakah refers to charity, giving to those in need. The words justice and charity have different meanings in English. How is it that in Hebrew, one word, tzedakah, has been translated to mean both justice and charity? This translation is consistent with Jewish thought as Judaism considers charity to be an act of justice. Judaism holds that people in need have a legal right to food, clothing and shelter that must be honored by more fortunate people. According to Judaism, it is unjust and even illegal for Jews to not give charity to those in need. Thus, giving charity in Jewish law and tradition is viewed as obligatory self-taxation, rather than voluntary donation. Importance of Giving According to one ancient sage, charity is equal in importance to all the other commandments combined. The High Holiday prayers state that God has inscribed a judgment against all who have sinned, but teshuvah (repentance), tefilah (prayer) and tzedakah can reverse the decree. The duty to give is so important in Judaism that even recipients of charity are obligated to give something. However, people should not give to the point where they themselves become needy. Guidelines for Giving The Torah and Talmud provide Jews with guidelines on the how, what and when of giving to the poor. The Torah commanded Jews to give ten percent of their earnings to the poor every third year (Deuteronomy 26:12) and an additional percentage of their income annually (Leviticus 19:910). After the Temple was destroyed, the annual tithe levied upon each Jew for support of the Temple priests and their assistants was suspended. The Talmud instructed Jews to give at least ten percent of their annual net income to tzedakah (Maimonides, Mishneh Torah, "Laws Concerning Gifts for the Poor," 7:5). Maimonides devotes ten chapters in his Mishneh Torah to instructions on how to give to the poor. He describes eight different levels of tzedakah according to their degree of merit. He asserts that the most meritorious level of charity is helping someone to become self-supporting. One can fulfill the obligation to give tzedakah by giving money to the poor, to health care institutions, to synagogues or to educational institutions. Supporting grown children and elderly parents is also a form of tzedakah. The obligation to give tzedakah includes giving to both Jews and gentiles. Beneficiaries: Recipient, Donor, World According to Jewish tradition, the spiritual benefit of giving charity is so great that the giver benefits even more than the recipient. By giving charity, Jews recognize the good that God has given to them. Some scholars see charitable donation as a replacement for animal sacrifice in Jewish life in that it is a way to show thanks to and ask forgiveness from God. Contributing toward the welfare of others is a central and fulfilling part of one's Jewish identity. Jews have a mandate to improve the world in which they live (tikkun olam). Tikkun olam is achieved through the performance of good deeds. The Talmud states that the world rests on three things: Torah, service to God, and deeds of kindness (gemilut hasadim). Tzedakah is a good deed that is made in partnership with God. According to Kabbalah (Jewish mysticism), the word tzedakah comes from the word tzedek, which means righteous. The only difference between the two words is the Hebrew letter "hey", which represents the Divine name. Kabbalists explain that tzedakah is a partnership between the righteous and God, acts of tzedakah are permeated with God's goodness, and giving tzedakah can make the world a better place. As the United Jewish Communities (UJC) collects funds for the victims of Hurricane Katrina, the philanthropic nature of American Jewry, derived from Judaism's emphasis on doing of good deeds and caring for those in need, is being affirmed. Reaching out to those in need is central to Jewish being. Jews are commanded to give at least ten percent of their net income to charity. Tzedakah boxes for collecting coins for those in need can be found in central places in Jewish homes. It is common to see Jewish youth, in Israel and in the Diaspora, going door-to-door to collect money for worthy causes.cite
|
D2279301
|
http://www.naturaleyecare.com/health-conditions/UTI-bladder-infections/UTI-nutrition.asp
|
Bladder Infections
|
Bladder Infectionsurinary tract infection (UTI)Key herbs Vitamins Other herbs & foods Overview Key Herbs Cranberry Research has validated the historic knowledge that cranberry is effective for UTI and may prevent them as well. 10 In a double-blind study, senior women drinking 10oz cranberry juice daily had a signicant reduction of bacteria in the urine. In another study, nursing home residents given 4oz/daily cranberry juice or 6 capsules/daily of concentrated cranberry pills for thirteen months had 25% fewer bladder infections. 12 another trial demonstrated that supplemented with cranberry in capsule form, 400mg/twice daily for 3 months, markedly lowered bladder infection re-occurence in younger women (18-45) who had recurrent bladder infections. 13 Similar results arose with children consuming cranberry juice concentrates. 14Research demonstrates that cranberry is probably beneficial to fight bladder infections because it restricts the ability of the bacteria causing most UTI's, E.coli, to attach to bladder wall tissue. 15 But it is not an antibiotic substitute for severe infections. However, children who have bladder infections caused by the birth defect myelomeningocele (in which the backbone and spinal canal don't completely close before they are born) or caused by injury to the spinal cord, supplementing with cranberry juice is not effective. 16Most medical professionals recommend drinking 10-16 ounces/daily of lightly sweetened or unsweetened juice for prevention and for treatment of very mild cases. as a concentrated extract, the normal dose is 400mg/twice a day. Bromelain, Trypsin The proteolytic enzymes (those that convert proteins into amino acids), such as bromelain (from pineapple) and trypsin (produced in the pancreas) may make antibiotics more effective if you have a urinary tract infection. In double-blind research, patients with UTIs were given both antibiotics along with combined bromelain and trypsin at the rate of 400mg/daily for 2 days, or a placebo. All of the patients who were given the additional enzymes cured their infections compared to less than half of those with the placebo. 9 The study employed enteric-coated tablets which prevent stomach acid from degrading bromelain. Most bromelain that is available is not enteric-coated and it may not be as effective. Vitamins Vitamin CAdditionally, many health professionals suggest at least 5,000mg/daily for serious bladder infections and supplementing on a regular basis for patients who tend to frequent and repeating bladder infections. Research has demonstrated that vitamin C does restrict E. coli growth. 17 Futhermore, supplementing with at least 4,000mg/daily makes for slightly acidic urine, an "unfriendly" habitat for some bacteria that cause infection. additionally, pregnant women have been found to have 56% fewer UTI's when they supplement with 100mg/daily vitamin C. 19Vitamin AThe risk of infectious disease increases where there is a vitamin A deficiency. Most research has examined resistance to measles, but vitamin A may well be helpful for other infections such as bladder infections. Some medical professionals recommend vitamin A at 10,000-25,000UI/daily for bladder infections. that people with urinary tract infections take vitamin A. A typical amount recommended to correct a deficiency is 10,000 to 25,000 IU per day. Note that toxic levels of vitamin A can accumulate in the body at high doses/body weight over time. Multivitamins Many people take daily multivitamins and/or minerals on general principals since a healthy immune system requires many nutrients. Elderly people are often deficient in one or more vitamins or minerals. One double-blind study demonstrated that supposedly healthy seniors taking multivitamins/minerals for at least a year had better immune functioning with a marked reduction in infections of both the urinary system and the body as a whole. Other Herbs & Foods There is less research on these herbs and foods, but they are potentially helpful. Blueberry, like cranberry, also contains proanthocyanidins (and fructose) which inhibit the ability of E.coli to attach to bladder lining 22 so it may be helpful although research is inclusive. A number of foods and herbs are permitted in Germany for bladder infection treatment. They all operate by enhancing urine production so that bacgteria is flushed from the system more quickly. 23 Generally consumed as teas, they are asparagus, birch, horsetail, couch grass, goldenrod, Java tea, lovage, parsley, spiny restharrow, and nettle. Buchu leaf has a history of use for UTI, 24-25 but there is insufficient evidence of its effectivness in treating or preventing UTIs. Some studies demonstratethat horseradish oil can kill bacteria causing bladder infections 32-33 but more research are necessary to validate the effectiveness and safety of this treatment. Goldenseal contains berberine which is an alkaloid that, like cranberry, prevents bacteria from sticking to the lining of the bladder. 40 There are other plants like Oregon grape that also contain berberine. Berberine has been shown to kill many germs in test-tubes but hasn't been human-tested as a UTI therapy. Plaintain reduces inflammation and may therefore be helpful for some people with bladder infections. However, research is insufficient to validate this result. 41Bearberry, uva ursi, is employed as an extract in Europe and in North american native herbal medicine as a treatment for bladder infections. 43 Bearberry contains arbutin, which in urine, converts to hydroquinone, which, in turn kills or inhibits bacteria. The recommended tincture dosage is 3-5ml/three times daily or 100-250mg/three times daily as herbal extract tablets. However, since research may be inconclusive, you should follow your medical professional's advice. Key herbs Vitamins Other herbs & foods Overview
|
D3395201
|
http://fengshui-doctrine.com/index.php?q=feng-shui-candles.html
|
FENG SHUI CANDLES
|
FENG SHUI CANDLESPrevious article | Next article Feng Shui Candles are beautiful and the decorating trend. Every room looks beautiful when decorated with a Feng Shui candle. If you are decorating with candles and using the principles of Feng Shui, follow your individual feng shui map (the detailed description of the individual feng shui map is in my e-book The treasury Feng Shui Secrets of Success and Riches ) for ideal placement of those candles. Candles are used in feng shui for a number of reasons. Scented candles can be used for purification of a premises as well as help in meditation (to know more about meditation download my free e-book Meditation ). The fire of a candle can help to concentrate and relax when meditating. The dependence of color and shape of Candles for different purposes In feng shui candles are used to enhance or suppress positive or negative sector according to your individual feng shui map. Below I will name the colors of candles for different reasons but You should always follow your individual feng shui map (the detailed description of the individual feng shui map (IFM) is in my e-book The treasury Feng Shui Secrets of Success and Riches ). To fly to the skies, to become famouscone-shaped red or purple candle (depends on your IFM)to enhance romance or motherhoodcone-shaped pink or red candle (depends on your IFM)To stimulate creativity and sexual relations Rectangular or cone-shaped green, red or aqua candle (depends on your IFM)*To attract helpful people or to visit wished countries Rectangular or cone-shaped green, red or aqua candle (depends on your IFM)*To stimulate the carreer Cone-shaped red or purple candle (depends on your IFM)*for success at exams not only school exams but also life exams or you are learning a new skillor circle-shaped blue, green, or aqua candle (depends on your IFM)* Square or cone-shaped yellow, red or purple candle (depends on your IFM)*For fertility and good family relations Circular-shaped white or yellow candle (depends on your IFM)* Rectangular green or water candle (depends on your IFM)*To stimulate flow of prosperity and money Rectangular green or water candle (depends on your IFM)* Circular-shaped white or yellow candle (depends on your IFM)** Individual Feng Shui map Feng shui secrets Previous article | Next article Main » Free feng shui articles » Interior feng shui » Feng shui symbols » Feng shui candles Feng shui meaning of celestial bodies- sun, moon, and stars Q- What do the images of celestial bodies symbolize - sun, moon, and stars? A- The sunrise is the symbol of Fire element. FENG SHUI FISHESThe fish is a symbol of wealth, one that is widely used to attract wealth luck for its owners. Chinese word Yu, which means fish, phonetically matches the word for abundance,FENG SHUI DRAGONSDragons are the most representative symbols of the Chinese enhancers. Feng shui dragons are also very symbolic and allow to create balance in people's lives and space. Feng shui dragons Feng shui Laughing Buddha and symbol for Buddha Laughing Buddha is a standard and ultimate symbol of happiness in Feng Shui. Feng shui Buddha symbolizes good Luck and Abundance Feng Shui Energy. Happy Energy of Abundance SYMBOLS FOR SUCCESS AND HAPPINESSn our normal day-to-day routine, we are often confronted with negativity, whether due to people or situations. Subconsciously, we get anxious and are thrown out of balance, corrupting ourselves in the The use of red ribbon or tape - FAQRed is the color of success according to Chinese traditions. This color is very yang and symbolizes Fire. This is very powerful element and putting a ribbon you enhance positive influences Traditional mean of symbols in feng shui doctrine Traditional mean of symbols in feng shui doctrine MAGIC OF WIND CHIMESWind chimes are arrangements of metal, glass, wood, shell, pottery etc., that produce sound when the wind blows past them, also they balance the energy in the premise they hang THREE MAIN FENG SHUI ENHANCERSTo harmonize a room you need only three main feng shui enhancers: appropriate windchimes, candles and crystals. With the help of these simple things you can enhance positive energy and FENG SHUI PLANTSAny living plant or tree concerns to the wood element in five-element theory of Feng Shui. The wood element associates with constant growth: growth in money, at work, at living level and even in self-motivation FENG SHUI CANDLESFeng Shui Candles are beautiful and the decorating trend. Every room looks beautiful when decorated with a Feng Shui candle. If you are decorating with candles and using the principles FENG SHUI CRYSTALSThe crystals can protect you from the negative issues coming from people around you. Crystals come from deep within the earth so that we should not underestimate the power of crystals. FENG SHUI MONEY FROGThe money frog or toad is associated with monetary gain, wealth and good health The 3 legged frog holds a Chinese coin in it's mouth and sits upon a pile of coins; these 2 feng shui symbols: a coin in CHINESE FENG SHUI DRAGONThe Dragon protects a home from negative energies. The Dragon is feng shui symbol of longevity in your home, especially for the head of the house. The dragon headed turtle is also a CHINESE COINSChinese coins symbolize prosperity, abundance, and good fortune. The reason they bring prosperity is because of its unique shape. The square in the center represents the energy of the earth and the© www.fengshui-doctrine.com || FENG SHUI CANDLES
|
D1593428
|
http://www.thefreedictionary.com/heart+sac
|
pericardium
|
per·i·car·di·um (pĕr′ĭ-kär′dē-əm)n. pl. per·i·car·di·a (-dē-ə)The membranous sac filled with serous fluid that encloses the heart and the roots of the aortaand other large blood vessels. [New Latin, from Greek perikardion, from perikardios, around the heart : peri-, peri- + kardiā, heart; see kerd- in Indo-European roots . ]per′i·car′di·al (-dē-əl), per′i·car′di·ac′ (-dē-ăk′) adj. American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.pericardium ( ˌpɛrɪˈkɑːdɪəm) n, pl -dia ( -dɪə) (Anatomy) the membranous sac enclosing the heart [C16: via New Latin from Greek perikardion, from peri- + kardia heart]ˌperiˈcardial, ˌperiˈcardiˌac adj Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © Harper Collins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014per•i•car•di•um (ˌpɛr ɪˈkɑr di əm)n., pl. -di•a (-di ə)the membranous sac enclosing the heart. [1570–80; < New Latin < Greek perikárdion, n. use of neuter of perikárdios surrounding the heart = peri- peri - + -kardios, adj. derivative of kardía heart; compare -cardium]Random House Kernerman Webster's College Dictionary, © 2010 K Dictionaries Ltd. Copyright 2005, 1997, 1991 by Random House, Inc. All rights reserved.per·i·car·di·um (pĕr′ĭ-kär′dē-əm)The membrane sac that encloses the heart in vertebrate animals. The American Heritage® Student Science Dictionary, Second Edition. Copyright © 2014 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.pericardium1. The two-layered membrane enclosing the heart.2. A membranous sac surrounding the heart. Dictionary of Unfamiliar Words by Diagram Group Copyright © 2008 by Diagram Visual Information Limited
|
D1707879
|
http://www.cs.sandia.gov/loca/
|
LOCA: Library of Continuation Algorithms
|
LOCA: Library of Continuation Algorithms What is LOCA? LOCA is a new software library for performing bifurcation analysis of large-scale applications. The source code has been available for download since April 19, 2002. LOCA 1.1 Now Available 10/29/2002Multi-Parameter continuation capability via Henderson's MF library, which is now included with the download of LOCA 1.1. Ability to restart turning point talgorithm with previous null vector. LOCA Overview The algorithms in LOCA are being designed as part of an ongoing research project at Sandia National Laboratories in Albuquerque into scalable stability analysis algorithms. When implemented with an application code, LOCA enables the tracking of solution branches as a function of system parameters and the direct tracking of bifurcation points. LOCA (which is written in "C") is designed to drive application codes that use Newton's method to locate steady-state solutions to nonlinear problems. The algorithms are chosen to work for large problems, such as those that arise from discretizations of partial differential equations, and to run on distributed memory parallel machines. The approach in LOCA for locating and tracking bifurcations begins with augmenting the residual equations defining a steady state with additional equations that describe the bifurcation. A Newton method is then formulated for this augmented system; however, instead of loading up the Jacobian matrix for the entire augmented system (a task that involved second derivatives and dense matrix rows), bordering algorithms are used to decompose the linear solve into several solves with smaller matrices. Almost all of the algorithms just require multiple solves of the Jacobian matrix for the steady state problem to calculate the Newton updates for the augmented system. This greatly simplifies the implementation, since this is the same linear system that an application code using Newton's method will already have invested in. Only the Hopf tracking algorithm requires the solution of a larger matrix, which is the complex matrix involving the Jacobian matrix and an imaginary multiple of the mass matrix. The following algorithms are available in this version of LOCA: Zero order continuation First order continuation Arc length continuation Multi-parameter continuation (via Henderson's MF Library)Turning point continuation Pitchfork bifurcation continuation Hopf bifurcation continuation Phase transition continuation Eigenvalue approximation (via ARPACK)The current algorithms have been shown to scale to problem sizes of order 1 million unknowns on parallel fluid mechanics applications coming from the finite element code MPSalsa . LOCA has also been impelemented with a the Tramonto density functional theory code, the GOMA moving boundary finite element code, and a stand alone test code for solving 1D PDEs. For details on the results of using LOCA, please refer to the LOCA Publications and LOCA Presentations sections below. We are interested in cultivating new collaborations and a few friendly users to this new software. We are looking for feedback on the current algorithms applied to new applications, suggestions for new algorithms, improvements to the LOCA interface, improvements to the implementation manual. LOCA version 1.1Download LOCA 1.1: Theory and Implementation Manual (PDF)Download LOCA 1.1 Software LOCA Publications Publications focused on linear stability (PDF): Linear stability of flow in a differentially heated cavity via large-scale eigenvalue calculation Large Scale Eigenvalue Calculations for Computing the Stability of Buoyancy Driven Flows Large-Scale Eigenvalue Calculations for Stability Analysis of Steady Flows on Massively Parallel Computers Massively Parallel Linear Stability Analysis with P_ARPACK for 3D Fluid Flow Modeled with MPSalsa Publications focused on bifurcations (PDF): The Computational Design and Analysis of MOVPE Reactors Scalable Bifurcation Analysis Algorithms for Large Parallel Applications Understanding the 8:1 Cavity Problem vis Scalable Stability Analysis Algorithms Computationa Bifurcation and Stability Studies of the 8:1 Cavity Probler SQP Optimization of Large-Scale Reacting Flow Applications with MPSalsa Stability Analysis of Large-Scale Incompressible Flow Calculations on Massively Parallel Computers Selected LOCA Presentations Continuation Methods for Performing Stability Analysis of Large-Scale Applications (Power Point)Stability Analsysis Algorithms for Large-Scale Applications (Power Point)Understanding the 8:1 Cavity Problem via Scalable Stability Analysis Algorithms (PDF)Linear and Nonlinear Stability Analysis of Incompressible Flows on Parallel Computers (PDF)Studying Phase Transitions of DFT Models of Confined Fluids using Nonlinear Analysis Tools (PDF)Large-Scale Stability Analysis Algorithms (Power Point)Project Members Andy Salinger Louis Romero Roger Pawlowski Ed Wilkes Rich Lehoucq Beth Burroughs (UNM Grad Student)Nawaf Bou-Rabee (Caltech Grad Student)Related Projects MPSalsa , Sandia's MICS-supported research on advanced numerical methods for chemically reacting flow simulations. Tramonto, Sandia's MICS-supported research on numerical methods for modeling inhomogeneous soft materials. GOMA, Sandia's code for transport modeling of manufacturing flows of systems with free and moving boundaries. Sandia's MICS-supported research in Linear and Eigensystems Algorithm Development Aztec , Sandia's massively parallel iterative solver library for solving sparse linear systems Trilinos , Sandia's object-oriented parallel solver libraries. Anasazi, Sandia's eigensolver capability within Trilinos. NOX, Sandia's nonlinear solver capability within Trilinos. ARPACK , Rice University's collection of routines designed to solve large scale eigenvalue problems. AUTO Software for Continuation and Bifurcation Problems in ODEs by Doedel et al. Web page with links to many Dynamical Systems software packages What are the plans for LOCA? Interface LOCA with the NOX nonlinear solver as part of the Trilinos framework, making LOCA available to all Trilinos users. Once LOCA is interfaced to the linear solvers available through Trilinos (e.g Aztec_OO, IFPACK, PETSc), we will research and implement better, nonsingular formulations for the bifurcation tracking algorithms. Funding This project has been supported by DOE through the MICS, ASCI, and CSRF programs. Contact For more information, please contact Andy Salinger, agsalin@sandia.gov.
|
D760390
|
https://quizlet.com/38941450/bios-flash-cards/
|
BIOS
|
33 terms Murderangel PLUSBIOSLearn Flashcards Write Spell Test Match Gravity Advertisement Upgrade to remove ads Sort What kind of "Ware" is the BIOS Firmware What kind of memory is Firmware Non-volatile memory and software - Older computers are ROM and more modern computers use Flash Memory. Flash Memory and Read Only Memory are examples of what type of memory. Non-volatile memory/software When should you update your Firmware? Rarely, only when a problem occurs that is traced back to the specific Firmware or when a major security patch is released. How can you tell what Firmware/BIOS version is running on a system? Bring up RUN and type in Msinfo32 to bring up the System Information Utility and it will be under the item named "BIOS Version/Date"Why should you have a copy of the current Firmware version you are already running? Just in case something goes wrong thus allowing you to quickly restore the previous known working version. Why should you always read the documentation before preforming a BIOS update? Sometimes it will require you to have certain drivers updated to a particular version and to make sure the OS prerequisites are met. What are some steps to take concerning the power before updating your BIOS? If you are on a laptop, make sure it is plugged into the AC power adapter and it is working correctly and make sure it has a full battery. If you are on a desktop, use a UPS (universal power-supply) if available. When might you need a boot disk? On really old systems or BIOSes How are modern computer's BIOSes ran? As executable files Steps to take before running the update? Make sure you have all of the updates available for your current OS and to close all applications. When you update your BIOS, will your computer restart at some point? yes What does BIOS stand for? Basic Input/Output System Where is your BIOS configuration and Date/Time stored? The CMOSWhat does CMOS stand for? Complementary metal-oxide semiconductor? Is the CMOS non-volatile or volatile memory? It is volatile memory and uses a battery to keep information stored Typically, how large is the CMOS? 128 - 512 bytes Name 2 locations the CMOS might be on the motherboard. Next to the CMOS battery and BIOS, or integrated into the Southbridge. What type of battery does the CMOS use? Button Cell CR 2032How do you know your CMOS battery is going bad? You'll start getting error messages about your BIOS configuration was reset to default or missing What is an easy way to reset the BIOS configuration if it is password protected? Remove the battery and wait 30 seconds. What is a helpful feature that some BIOSes have? A diagnostic tool that will test all of the Hardware connected to the system without having to be in an OS. How do you make a backup of the current BIOS configuration? Write the settings down or take pictures with a camera or phone. When should you change a BIOS setting? Only when you a certain of what it does. What does the BIOS do? It provides instructions to your OS on how to boot up, it contains the language of all of your hardware allowing them to communicate, it maintains voltages for your hardware, and it allows you to disable certain ports on your motherboard or certain pieces of hardware. How do you get into the BIOS During the boot screen, you'll see a message that reads, "press a key to enter system setup." The key is different for reach BIOS, but normally it is an F key. Aside from the System Information Utility, where can you find the current BIOS version? On the Boot screen, typically where it displays memory and the Key to enter the System Setup (BIOS. )What settings can you change in the Main Tab of the BIOS? Date and Time, Disable/Enable Hardware, Keyboard functions,What settings can you change in the Advance Tab of the BIOS? Memory Information, Advance Chipset Controls, Change the Timing on the Memory and CPUWhat settings can you change in the Boot Tab of the BIOS? The oder of the storage devices that the BIOS will looks for the OSWhat settings can you change in the Security Tab of the BIOS? You can set passwords for the BIOS and when the computer boots up before reaching the OS. In the BIOS settings, what is the User Password for? To make the current user input a password when the computer is booting up. If they don't know the password, the computer will not boot to the OS. In the BIOS Settings, what is the Supervisor Password for? To make the current user input a password when trying to access the BIOS settings. Advertisement Upgrade to remove ads Features Quizlet Live Quizlet Learn Diagrams Flashcards Mobile Help Sign up Help Center Honor Code Community Guidelines Students Teachers About Company Press Jobs Privacy Terms Follow us Language© 2018 Quizlet Inc.
|
D53686
|
http://www.dir.ca.gov/dlse/FAQ_RightToInspectPersonnelFiles.htm
|
Personnel files and records
|
Labor Commissioner's Office Personnel files and records Personnel files and records Effective January 1, 2013, California law provides that current and former employees (or a representative) have the right to inspect and receive a copy of the personnel files and records that relate to the employee's performance or to any grievance concerning the employee. Labor Code Section 1198.5 Inspections must be allowed at reasonable times and intervals, but not later than 30 calendar days from the date the employer receives a written request. Upon a written request from a current or former employee, or a representative, the employer shall provide a copy of the personnel records, at a charge not to exceed the actual cost of reproduction, not less than 30 calendar days from the date the employer receives the request. To facilitate the inspection, employers shall do all of the following: (1) maintain a copy of each employee's personnel records for a period of not less than three years after termination of employment, (2) make a current employee's personnel records available for inspection, and if requested by the employee or representative, provide a copy at the place where the employee reports to work, or at another location agreeable to the employer and the requester. If the employee is required to inspect or receive a copy at a location other than the place where he or she reports to work, no loss of compensation to the employee is permitted, (3) make a former employee's personnel records available for inspection, and if requested by the employee or representative, provide a copy at the location where the employer stores the records, unless the parties mutually agree in writing to a different location. The employer is not required to make those personnel records or a copy available at a time when the employee is actually required to render service to the employer, if the requester is the employee. An employer is required to comply with only one request per year by a former employee to inspect or receive a copy of his or her personnel records. A former employee may receive a copy by mail if he or she reimburses the employer for actual postal expenses. An employer is not required to comply with more than 50 requests to inspect and receive a copy of personnel records filed by a representative or representatives of employees in one calendar month. The employer may take reasonable steps to verify the identity of a current or former employee or an authorized representative. Prior to making records available for inspection or providing a copy of those records, the employer may redact the name of any nonsupervisory employee. If a former employee seeking to inspect his or her personnel records was terminated for a violation of law, or an employment-related policy, involving harassment or workplace violence, the employer may comply with the request by doing one of the following: (1) making the personnel records available to the former employee for inspection at a location other than the workplace that is within a reasonable driving distance of the former employee’s residence, (2) providing a copy of the personnel records by mail. If an employer fails to permit a current employee, former employee, or representative to inspect or copy personnel records within the times specified, or times agreed to by mutual agreement , the current employee, former employee, or the Labor Commissioner may recover a penalty of $750.00 from the employer. A current or former employee may also bring an action for injunctive relief to obtain compliance, and may recover costs and reasonable attorney’s fees in such an action through the court process. The right to inspect personnel files and records does not apply to records relating to the investigation of a possible criminal offense, letters of reference, or ratings, reports, or records that (a) were obtained prior to the employee’s employment, (b) were prepared by identifiable examination committee members, or (c) were obtained in connection with a promotional exam. The right to inspect personnel files does not apply to an employee covered by a valid collective bargaining agreement if the agreement expressly provides for all of the following: (1) the wages, hours of work, and working conditions of employees, (2) a procedure for the inspection and copying of personnel records, (3) premium wage rates for all overtime hours worked, (4) a regular rate of pay of not less than 30 percent more than the state minimum wage rate. Employers are required to give an employee or job applicant, upon request, a copy of any instrument that the employee or applicant has signed relating to the obtaining or holding of employment. Labor Code Section 432Employers are required to permit current and former employees to inspect or copy payroll records pertaining to that current or former employee. Labor Code Section 226 (b) An employer who receives a written or oral request from a current or former employee to inspect or copy his or her payroll records shall comply with the request as soon as practicable, but no later than 21 calendar days from the date of the request. Failure by an employer to permit a current or former employee to inspect or copy his or her payroll records within the 21 calendar day period entitles the current or former employee to recover a penalty from the employer in a civil action before a court of competent jurisdiction. Labor Code Section 226, subdivisions (c) and (f)Employers are required to keep accurate payroll records on each employee, and such records must be made readily available for inspection by the employee upon reasonable request. Additionally, when a piece rate or incentive plan, such as a commission plan, is in operation, piece rates or an explanation of the incentive plan formula shall be provided to employees. The employer must maintain accurate production records. IWC Orders 1 through 15, Section 7, and IWC Order 16, Section 6,All employers must provide employees or their representative (s) access to accurate records of employee exposure to potentially toxic materials or harmful physical agents. Labor Code Section 6408 (d)Employment records may be subpoenaed from a current or former employer by a third party. If employment records are subpoenaed, the employee must be notified and has the right to object to production of the records. Code of Civil Procedure Section 1985.6 (e)1. Q. Do I have right to inspect my personnel file? A. Yes. You may inspect your personnel file/records at reasonable times and intervals. To facilitate your inspection, your employer must do all of the following: Maintain a copy of each employee’s personnel records for no less than 3 years. Make a current employee’s personnel records available, and if requested by the employee or representative, provide a copy at the place where the employee reports to work or at another location agreeable to the employer and the requester. Make a former employee’s personnel records available, and if requested by the employee or representative, provide a copy at the location where the employer stores the records, unless the parties mutually agree in writing to a different location.2. Q. I am on a leave of absence. Do I still have the right to inspect my personnel file? A. Yes. "Employee" is construed to mean a person who is currently employed, one who is laid off with rights of reemployment, or a person on leave of absence.3. Q. I am a former employee who quit my job. Do I still have the right to inspect my personnel file maintained by my former employer? A. Yes. Former employees also have a right of inspection.4. Q. What does "at reasonable times and intervals" mean? A. Although there is no specific definition for this phrase, the Division of Labor Standards Enforcement (DLSE) has opined that “reasonable times” is during the regular business hours of the office where personnel records are usually and ordinarily maintained. The employer is not required to make those personnel records or a copy available at a time when the employee is actually required to render a service to the employer. DLSE has further declared that its enforcement policy considers “reasonable intervals” to be once every year, unless there is reasonable cause to believe that the file has been altered in a manner that might adversely affect the interests of the employee, or the file contains information that is pertinent to an ongoing investigation affecting the employee, in which case more frequent inspections would be considered “reasonable”.5. Q. Do I need to put my request to inspect my personnel file in writing? A. Yes. The employer must make the employee’s personnel records available within 30 calendar days from the date the employer receives a written request for inspection.6. Q. Am I entitled to see everything in my personnel file? A. No. By law, the right to inspect does not apply to: Records relating to the investigation of a possible criminal offense. Letters of reference. Ratings, reports, or records that were: a. Obtained prior to your employment, b. Prepared by identifiable examination committee members, or c. Obtained in connection with a promotional examination.7. Q. What types of records in my personnel file am I entitled to see? A. Categories of records that are generally considered to be "personnel records" are those that are used or have been used to determine an employee's qualifications for promotion, additional compensation, or disciplinary action, including termination. The following are some examples of "personnel records" (this list is not all inclusive): Application for employment Payroll authorization form Notices of commendation, warning, discipline, and/or termination Notices of layoff, leave of absence, and vacation Notices of wage attachment or garnishment Education and training notices and records Performance appraisals/reviews Attendance records8. Q. Is my employer required to give me a copy of my personnel file? A. Yes. Upon written request, the employer must provide a copy of the personnel file, at a charge not to exceed the actual cost of reproduction, not later than 30 calendar days from the date the employer receives the request. A former employee may receive a copy by mail if he or she reimburses the employer for actual postal expenses.9. Q. Can my employer require that I inspect my personnel file on my own time? A. Yes. Your employer may require that you inspect your personnel file on your own free time. However, if you are required to travel to the location where the records are stored, the inspection must be during a time when you are required to render services to the employer, and you must be compensated for that time at your regular rate of pay.10. Q. If I make a request of my employer pursuant to Labor Code Section 1198.5 to inspect my personnel file and my employer denies such request, what can I do? A. You should contact the Division of Labor Standards Enforcement (DLSE) and file a claim for a $750.00 penalty against your employer for failure to comply with Labor Code Section 1198.5. DLSE will enforce the right to inspect and copy personnel records under the law. An employee may also bring an action for injunctive relief to ensure compliance and recover costs and reasonable attorney’s fees. Again, this is within the court system not DLSE. File a Claim Wage claims Bureau of Field Enforcement Public works complaints Claims for retaliation or discrimination More Services Public records requests Translations Verify a license or registration Find a wage order Online payments Haga un pago en línea Learn more about DLSEFrequently asked questions Archives DLSE site map Workplace postings Legislative reports
|
D1016257
|
https://ecare.robi.com.bd/selfcare/faces/userLogin
|
Sorry, Robi e-Care is currently unavailable for a planned maintenance.
|
Welcome to Robi e-Care Sorry, Robi e-Care is currently unavailable for a planned maintenance. We expect to be back by 1:30 a.m. For urgent support, dial *123# or email at 123@robi.com.bd
|
D1961258
|
http://indianausdamortgages.com/what-is-a-usda-loan/
|
What is a USDA loan?
|
What is a USDA loan? USDA stands for United States Department of Agriculture. USDA mortgages provide low-cost insured home mortgage loans with no down payment requirement. A USDA mortgage might be right for you if you are interested in buying a rural property as your primary home with a low out of pocket investment What Type of Loans does USDA offer? USDA Guaranteed Rural Housing Mortgage USDA Guaranteed Loans are the most common type of USDA mortgage and allow for higher income limits and 100% financing for home purchases. USDA Guaranteed Loan applicants may have an income of up to 115% of the median household income for the area. Area income limits for this program can be viewed here . All USDA Guaranteed Loans carry 30 year terms and are set at a fixed rate. We can help you with this type of loan. USDA Direct Rural Housing Mortgage USDA Direct Housing Loans are less common than USDA Guaranteed Loans and are only available for low and very low income households to obtain home ownership, as defined by the USDA. Very low income is defined as below 50 percent of the area median income (AMI); low income is between 50 and 80 percent of AMI; moderate income is 80 to 100 percent of AMI. We cannot help you with this type of loan. Here are a few benefits of a USDA mortgage. USDA Loans require NO money down – up to 103.5% financing (includes funding fee). Closing costs can be rolled into the loan or paid by the seller. There is NO maximum loan amount. You do NOT need assets to qualify. Qualifying for a USDA loan with lower credit scores is possible. (Current min required credit score is 640)USDA Mortgages are secure 30-year fixed terms at low market interest rates. USDA Loans are for ANY new & existing single family residence located in a USDA eligible area. Property being purchased can be a regular sale, short sale, foreclosure home, etc. Download or Print Flyernext page: “Borrower Eligibility”DISCLAIMER: Neither Indiana USDA Mortgages (Indiana USDAmortgages.com) nor Leader One Financial Corporation is affiliated with any government agencies, including the USDA .
|
D2018308
|
http://facts.stanford.edu/academics/graduate
|
Academics
|
Academics Graduate Studies In Stanford’s first year, 1891, 39 men and 12 women from 19 states registered in graduate standing, representing one of the first opportunities for graduate study on the West Coast. Today, 9,304 students in more than 90 departments and programs are pursuing post-baccalaureate degrees in all seven of Stanford’s schools: Business, Earth, Energy and Environmental Sciences, Education, Engineering, Humanities and Sciences, Law and Medicine. Exchange programs with the University of California-Berkeley and the University of California-San Francisco enable graduate students to take courses not offered at Stanford. About 82 percent of Stanford graduate students receive financial assistance, aside from loans, from Stanford or external sources. About 64 percent of graduate students live on campus. The Office of the Vice Provost for Graduate Education administers seven fellowship programs to support graduate student study. The Knight-Hennessy Scholars program is a new graduate-level scholarship aimed at preparing the next generation of global leaders to address the increasingly complex challenges facing the world. Starting in fall 2018, Knight-Hennessy Scholars will annually select up to 100 high-achieving students with demonstrated leadership and civic commitment, who will receive full funding to pursue a graduate education at Stanford. By the numbers Graduate Profile, 2015-16Graduate Admissions Admissions decisions are made by each department and program. Graduate Admissions in the Office of the Registrar provides application materials for nearly all graduate degree programs. Visit online or call (650) 723-4291. See also: Graduate School of Business admissions School of Law admissions School of Medicine’s M. D. program admissions This page last modified Feb 27, 2017. Schools Faculty Undergraduate Program Graduate Studies Graduate Studies Caitlin Taylor, a second-year graduate student in neuroscience, does research at Herrin Labs. See Also Vice Provost for Graduate Education Graduate Admissions Knight-Hennessy Scholars
|
D1344056
|
http://www.countyoffice.org/warminster-pa-courts/
|
Warminster Court
|
Warminster Court Home Law Enforcement & Military Offices Courts Pennsylvania Bucks County Warminster Find Warminster Pennsylvania courts and courthouses, such as federal, state, district, superior, criminal, common, circuit, judicial, judiciary, divorce, appeals, family, traffic, and small claims courts. Courts provide information on legal cases, law documents, case searches, and appeals. Warminster Magistrate Court 567 Newtown Road Warminster PA 18974215-672-5853Hatboro District Court 414 South York Road Hatboro PA 190402.5 miles from Warminster 215-954-5935Jamison Magistrate Court 2370 York Road Jamison PA 189293.5 miles from Warminster 215-343-0627Horsham District Court 903 Sheehy Drive Horsham PA 190443.8 miles from Warminster 215-675-2040Willow Grove District Court 102 York Road Willow Grove PA 190904.5 miles from Warminster 215-659-6840Warrington District Court 1277 Almshouse Road Warrington PA 189764.7 miles from Warminster 215-343-7961Richboro District Court 60 Township Road Richboro PA 189544.8 miles from Warminster 215-322-0144Northampton Magistrate Court I 55 Township Road Richboro PA 189544.8 miles from Warminster 215-322-0144Abington District Court 1440 Old York Road Abington PA 190015.9 miles from Warminster 215-887-2362Glenside District Court 875 Easton Road Glenside PA 190386.6 miles from Warminster 215-885-4120Feasterville Magistrate Court 1500 Desire Avenue Feasterville PA 190536.7 miles from Warminster 215-355-7380Ambler District Court 1301 South Bethlehem Pike Ambler PA 190026.9 miles from Warminster 215-542-1262Bucks County Common Pleas Court 55 East Court Street Doylestown PA 189017.5 miles from Warminster 215-348-6000Oreland District Court 1316 Bruce Road Oreland PA 190757.6 miles from Warminster 215-572-7845New Britain Magistrate Court 962 Town Center New Britain PA 189017.9 miles from Warminster 215-230-7265Montgomeryville District Court 601 Bethlehem Pike Montgomeryville PA 189368.7 miles from Warminster 215-855-3946Elkins Park District Court II 8230 Old York Road Elkins Park PA 190278.8 miles from Warminster 215-885-4796Newtown Magistrate Court 288 North State Street Newtown PA 189408.8 miles from Warminster 215-968-1657Blue Bell District Court 653 West Skippack Pike Blue Bell PA 194229.6 miles from Warminster 215-646-8201Elkins Park District Court I 7804 Montgomery Avenue Elkins Park PA 190279.6 miles from Warminster 215-635-1535Showing 1-20 of 200 Courts. 1 2 3 4 5 6 7 8 10
|
D3420041
|
http://whirlpool.net.au/news/?id=430
|
New tech support number for Bigpond
|
New tech support number for Bigpond Dan Warne, 11 Aug 2001Telstra has created a separate phone number for Bigpond tech support � presumably because the huge number of tech support calls to its 131 282 number was overloading its available lines for sales. The new number for technical support on all Bigpond services is 133 933. View recent replies | View all replies There are 28 replies posted.
|
D96224
|
http://www.autos.com/auto-repair/how-to-find-automotive-repair-shops-in-your-area
|
How to Find Automotive Repair Shops in Your Area
|
How to Find Automotive Repair Shops in Your Area Posted on Autos.com Editor in Auto Repair on October 7, 2013If you need to find automotive repair shops in your area, the Internet is a great resource. From the comfort and convenience of your home you can find out all the pertinent information about repair in your area. Auto repair can be a sensitive issue. Your number one priority should be finding a mechanic you can trust. When choosing a doctor, you want one who gives you peace of mind and in whose abilities and advice you have faith. A mechanic is a car doctor, so the same principals apply. It’s easy enough to locate an auto repair shop. You can do that with a phone book. What’s not so easy, though, is finding one who is reputable, experienced and gives honest estimates. Everyone has heard horror stories about untrustworthy auto repair shops, so it would behoove you to do a little research on your own, relying more on peoples’ first-hand experience than on the sales pitch of the repair shop itself. One of the best resources on the web for locating a mechanic in your area can be found at www.cartalk.com. You may or may not be familiar with the nationally syndicated radio program Car Talk, but if you’re not, it is a weekly program hosted by two brothers and mechanics that possess an encyclopedic knowledge of almost every car imaginable. Their show is produced with non-mechanics-ordinary people with cars-in mind, offering advice for purchases, diagnostics, and to debunk any conventional and often false wisdom relating to automobiles. In keeping with the online age, they have a website that offers their knowledge and recommendations 24 hours a day. This should be your first stop when searching for a reputable auto repair shop. Under the tab labeled “Actual Car Info”, scroll down and locate a link titled “Mechanics Files”. There you will click on the link “Find a Mechanic.” At this point, the search narrows. Enter your five digit zip code, and, if you wish, enter the specific make of your car and the maximum distance in miles you wish to extend the search. You will then be provided with a list of mechanics on file about which people just like you have posted. These are testimonials, not advertisements. Each mechanic is rated in eleven categories, including honesty, competence, location, convenience, and timeliness, to name a few. Their ratings are representative of the experience of other customers, so what you are reading are accounts of their satisfaction, or lack thereof. This website doesn’t necessarily show every mechanic in your area, only those people have gone to and posted about, but it’s of tremendous help when you need to narrow down your choices. If you are looking for first-hand information about a mechanic, www.cartalk.com offers an excellent service with you-the customer-in mind. Finding a good auto repair shop needn’t be a troublesome experience, requiring you to drive all over town conducting interviews with potential mechanics. It can be done from your home and with the online resources available to you, you are sure to find a mechanic you can trust with your car and your pocketbook. Related posts: How to Find Mobile Auto Repair in Your Area How to Find the Best Car Repair Shops for Classic Cars Where to Find Reliable Automotive Repair Help Online How to Find the Cheapest Car Repair Shops for Electrical Repair How to Find the Cheapest Car Repair Shops for Window Repair← Previous Post Next Post →
|
D2705438
|
http://www.robertslegalfirm.com/readdtodeed.html
|
How to Add Someone to a Deed*
|
How to Add Someone to a Deed*Generally One of the most frequent calls we get is, "How do I add someone to my deed?" In most cases the literal answer is quite simple: execute and record a deed granting an undivided ownership interest in the property to the person in question. In real life, though, things are rarely so simple. By way of example, assume that Jane owns some land and wants to add Bill as a co-owner. Lender Consent If the property is encumbered by a mortgage, the first issue to consider is whether adding Bill to the deed will violate the terms of Jane's loan documents. The vast majority of Texas mortgages contain a "due on sale clause." Essentially, a due on sale clause states that if the debtor attempts to convey any interest in the property before the loan is paid in full, the lender may declare the loan in default. If the loan documents contain a due on sale clause, the best approach is usually to ask the lender to consent to adding someone else to the deed. For everyone's protection, the consent should be in writing. Our experience has been that the smaller "home town" lenders are usually more willing to consent to transfers than the larger companies. If the lender will not consent, the options are limited. One possibility is for Jane to look for another lender to take over the loan. Of course, she will have to invest some time locating a willing lender and going through the loan application process, and there will be closing costs associated with the new loan. The other obvious alternative is to make the transfer without the lender's consent, but doing so can be dangerous. It is very likely that the lender will eventually discover the transfer even if Jane does not disclose it. (For example, the lender may receive an updated assessment notice from the tax appraisal district, or an updated binder from the insurance company, or Bill may contact the lender to inquire about the status of the loan.) If the lender discovers Jane has made an unauthorized transfer and declares her in default, the property may be foreclosed in a matter of weeks unless she either pays off the loan in full or agrees to refinance at rates that may be significantly higher than the original loan. Liability and Asset Protection Joining someone else as a co-owner of your property may expose that property to the claims of your co-owner's creditors. For example, if Jane adds Bill to her deed and Bill later causes an automobile accident for which he is sued, the plaintiff may be able force the sale of Jane's land to pay for the injuries. Similar problems may arise if Bill dies and an uncooperative heir inherits his interest, if Bill files bankruptcy or gets divorced, or if liens are filed against Bill for unpaid income taxes or child support. Loss of Control As the sole owner, Jane has absolute control over her property. For example, she alone has the right to decide whether to sell it, and at what price. She may choose whether to refinance, whether to take out a home equity loan, and what improvements should be made. However, once Bill acquires an ownership interest his consent will be required in all these matters. If Jane and Bill cannot agree, they may end up in court to resolve the dispute. Giving Away the Farm If the property is subject to a mortgage and Jane's lender consents to the transfer, Jane needs to consider that making Bill a co-owner does not make him liable for payment of the loan. The net effect will be that if they later end up on unfriendly terms Jane must continue to make payments on the mortgage from her funds, but Bill will remain an owner without any financial liability. Loss of Exemptions Assume that Jane has property tax exemptions for being over 65, and for homestead. Depending on the wording of her deed, Jane may lose the right to claim these exemptions when she makes the transfer to Bill. The net result is that Jane has not gotten any younger and is still living on the property, but the property taxes will be much higher. Gift Tax Consequences Under the current IRS rules, a person can give away a fixed amount of money or property per person per year. Any gift exceeding this limit may require the donor to pay gift taxes. If Jane proposes to give an interest to Bill rather than selling him a share at fair market value, she should consult with her tax professional to ensure there are no unpleasant surprises next April when her federal income tax return is due. Capital Gains A transfer by deed during the donor's lifetime (instead of by a Will upon death) can have other adverse tax consequences. If Jane leaves her land to Bill in her Will, Bill receives a "step up" basis. This means that when Bill eventually sells the property, capital gains taxes are computed based on the value of the property at the date of Jane's death--not when she originally purchased the property. Since land usually increases in value over time, the "step up" basis reduces capital gains taxes. However, if Jane makes a gift of that same property during her lifetime, Bill does not get a "step up" basis; rather his basis will be the same as Jane's. Medicaid Eligibility Transfers of property may also affect Medicaid eligibility. This topic is much too complex to cover here, but suffice it to say that unless Jane makes the transfer more than five years before filing her Medicaid application, she may be disqualified for Medicaid assistance. Concluding Remarks The client who asks "How do I add someone to my deed?" is usually getting the proverbial cart before the horse. In most cases, the better question is, "What issues do I need to address before deciding whether to add someone to my deed?" It may not be possible to fully resolve all the potential problems associated with co-ownership of property, but a skillful legal professional can at least help avoid unpleasant surprises in the process. About the Author The lawyers of Roberts & Roberts are Killeen attorneys providing legal services in the fields of real estate, probate, estate planning, business and family law. If you need a Bell County attorney, we would welcome the opportunity to assist you. Please contact our friendly staff at your convenience. Roberts & Roberts, LLP* A Quick Word About Words. In Texas, a land title is an intangible thing that is evidenced by a deed. Of course, you should keep your deed in a safe place, but once a deed has been delivered to you and recorded, the land belongs to you even if you lose the deed. (Contrast this with car titles, in which the paper certificate really is your title, and if you lose it you will have difficulty selling the car.) Throughout this article we make reference to "adding someone to a deed" because that is the way that most laypersons talk about the issue. However, legally speaking this is incorrect and it is better practice to talk about "adding someone to a chain of title." CIRCULAR 230 DISCLOSURE: Pursuant to Regulations Governing Practice Before the Internal Revenue Service, any tax advice contained herein is not intended or written to be used and cannot be used by a taxpayer for the purpose of avoiding tax penalties that may be imposed on the taxpayer.
|
D1959804
|
http://thesupplementreviews.org/fat-burners/performix-sst-review/
|
Performix SST Review | Top Fat Burner Supplement Reviews
|
0 Flares Performix SST Review | Top Fat Burner Supplement Reviews Performix SST is a fat burner that has extremely appealing packaging and product design, which almost makes you want to buy it immediately. Take a step back and look at the facts before getting too wrapped up in how cool the product looks. Read this review to see why Performix SST failed to make our list of the Top 10 Fat Burners, despite the fact that the product design is probably the coolest we have seen. The Claimed Benefits of Performix SSTEnhances performance Strength and stamina may be increased Decreases total body fat How Does Performix SST Work? Performix SST uses a proprietary blend that consists of natural ingredients, which have been pretty thoroughly researched with regard to their fat burning abilities. It would be ideal if you could use something safe and natural in order to lose weight rather than something dangerous like a steroid, and that’s the theory here. Natural fat burners like this one work through increased stimulation of fat stores, which can help to release the fat into your bloodstream where it can then be converted into energy. There are plenty of natural substances that are believed to work, but what separates the top fat burners from the average ones are the dosages and the overall formula comprehensiveness. Another way in which fat burners like this one can work is through decreasing your calorie intake. Certain ingredients can help to suppress or reduce your appetite, which can lead to you eating less often. The key to weight loss is placing equal focus on fat burning and fat gain prevention. Lastly, fat burners like Performix SST can work through the use of stimulants. Stimulants like caffeine are what can help you work out harder and for longer periods of time, which will ultimately get you burning more calories. Our main issue with this particular fat burner is its use of a proprietary blend, and the fact that the blend isn’t as potent as it could be. Due to these issues, we don’t recommend Performix SST and would encourage you to browse our other reviews of the top fat burners. Performix SST Ingredients – What Makes It Work? Performix Suspension Super Thermo Complex 1,172 MGThe proprietary blend does not lack potency at about 1,200 MG per serving, but we have reviewed other supplements where the potency is as high as 1,500 or even 2,000. 1,200 isn’t bad, but it’s not exceptional either. Potency aside, the ingredients of the blend are pretty solid. It includes Caffeine Anhydrous, Ashwagandha Root, Citrus Aurantium, and several others. The ingredient panel as a whole is impressive and makes this a pretty convincing blend…but, “convincing” isn’t good enough for us. We still have a major issue with this blend. Our issue lies in the fact that the individual dosages of ingredients are not disclosed. This fact alone is enough to make us dislike a supplement because, without that information, we can not determine whether or not the product is going to be effective. There just isn’t enough information available for us to make a confident final decision. Performix SST Reviews An important part of the process for determining whether or not a supplement is worth your money is reading the reviews submitted by people who have actually used it. The Performix SST reviews were generally positive, which is a good sign. Very few reviews of Performix SST were negative. The Pros Impressive ingredient panel Pretty potent blend Contains almost 10 ingredients The Performix SST reviews were mostly positive The Cons Uses a proprietary blend, which means we can’t confidently recommend this stuff The Final Verdict Performix SST has the appearance of an excellent supplement. The packaging looks cool as hell and the nutrition label is pretty impressive. However, all things considered, we simply don’t think it stacks up to some of the other top fat burners we have evaluated. We can’t get enough information from the label in order to confidently recommend Performix SST, which is why we would instead encourage you to view our list of the Top 10 Fat Burners (all of which we are confident in).0 Flares Twitter Tweet Facebook Pin It Share Supplement Categories Testosterone Boosters Fat Burners Top 10 Fat Burners Instant Knockout Review Phen Q Review Thermakor Review Capsiplex Review Clenbutrol Review Physique Series Review Fat Burn X Review Zantrex 3 Review Leptigen Review Hydroxycut Hardcore Elite Review Hydroxycut Black Review Hydroxycut Hardcore Next Gen Review Hydroxycut Original Review Lipo 6 Black Review Phen 375 Review Fat Burner Supplement Ingredients What is the Best Fat Burner? The Best Diet Pills for Weight Loss3 Ways to Lose Weight Fast Hydroxycut Reviews Comparing Hydroxycut Fat Burners Burner TEK Review Animal Cuts Review Belly Trim XP Review Garcinia Burn Review Hydroxyelite Review Leptiburn Review Lipo Garcinia Cambogia Review Oxy ELITE Pro Review Performix SST Review Pro Lean Forskolin Review Xenadrine Review What is the Best Way to Lose Weight Fast What is the Best and Fastest Way to Lose Belly Fat The 10 Best Weight Loss Pills Is Garcinia Cambogia Safe – How To Properly Supplement With Garcinia Super HD Review Apidexin Review Hydroxycut SX7 Black Onyx Review Ripped Fuel Review Trans4orm Review VPX Meltdown Review Shred Jym Review Thermoplus Review Shred Matrix Review Epiburn Pro Review Alpha Rush Pro Review Zantrex Black Review Ripped Freak Review Vintage Burn Review Hydroxycut SX7 Review Thyroid T3 Review Sub Q Review Slimera Review Forskolin Fit Pro Review Slim Trim Review Phentaslim Review Phentramin D Review Quadralean Review Slimfy Review Thermodyne Review Leptin Shred Review Leanfire XT Review Fastin Review PH.375 Review The Beginners Guide To Intermittent Fasting Top 10 Fat Burning Foods Does Running Burn Belly Fat? The Beginners Guide To The Ketogenic Diet The Beginners Guide To HIITBest Fat Burning Exercises You Can Do From Home Adipex Review Phentermine Review Qsymia Review Ephedrine Review Synedrex Review Fen Phen Review Hydroxycut Gummies Review Belviq Review Jadera Review Fastin XR Review Ace Diet Pills Review Man Scorch Review Tea Rexx Review Diablo Fat Burner Review Triple Tea Fat Burner Review B4 Fat Burner Review Black Widow Fat Burner Review Grenade Fat Burner Review Nitric Oxide Steroid Alternatives Male Enhancement HCG Diet HGHProtein Powders Gainers Women General Health Green Drink Powders Pre Workout Nootropics Sleep Supplements Fat Burners For Women
|
D1295034
|
http://www.solutionsirb.com/scientific-merit-2/
|
Scientific merit
|
Scientific merit Scientific merit is an important component of an IRB’s evaluation of a study. This Course will discuss concepts related to Scientific Merit. We will begin by examining the origins of scientific merit within individual disciplines and within the Nuremberg Code and the Helsinki Declaration. We will define scientific merit and examine the components of scientific merit in research design, grant funding and application evaluation, and in the dissemination of findings. Finally, we will look at how the NIH reviews studies for scientific merit. The module will conclude with a brief quiz. Objectives: Review the origins and definition of scientific merit Examine the importance of scientific merit to research Understand what IRBs review when evaluating the scientific merit of a study. Scientific Merit Introduction Scientific merit is an important component of an IRB’s evaluation of a study. Under the criteria for review in 45 CFR 46.111 (a), IRB’s are called to ensure that “ (1) Risks to subjects are minimized: (i) by using procedures which are consistent with sound research design, and which do not, unnecessarily, expose subjects to risk”. (ref 13) Thus, the IRB has a responsibility to evaluate scientific merit, or quality, as part of its review, especially when a study design poses greater than minimal risk to participants. Amdur and Bankert (ref 78, p. 88) suggest that “if revising the study design will meaningfully decrease the risk to subjects without a major compromise in the persuasiveness of the study results, then the IRB should not approve the protocol”. Where risk to subjects is minimal, however, they go on to say “there is really no ethical justification for the IRB to make such revisions a condition for IRB approval. Each case must be evaluated independently” (ref 78, p. 89). This Course will discuss concepts related to Scientific Merit. We will begin by examining the origins of scientific merit within individual disciplines and within the Nuremberg Code and the Helsinki Declaration. We will define scientific merit and examine the components of scientific merit in research design, grant funding and application evaluation, and in the dissemination of findings. Finally, we will look at how the NIH reviews studies for scientific merit. The Origins of Scientific Merit The origins of scientific merit lay within each scientific discipline’s desire to build the strongest knowledge base possible. However, within the last century, serious research abuses have given rise to documents like the Nuremberg Code and the Helsinki Declaration, which also specifically speak to the issue of scientific merit. The Nuremberg Code arose out of the Nuremberg Trials, where Nazi doctors were tried for experiments conducted on both prisoners and concentration camp victims during the Second World War. And while, arguably, some useful information did come from some of the Nazi studies, such as the work they did on hypothermia, none of their studies involved any form of consent and much of the research they conducted would be considered useless by the scientific community in general, such as the studies involving attempting to change eye color with the injection of dye into the eye. Because of the significant abuses of the Nazi doctors, the Nuremberg Code states that experiments should yield scientifically useful results. Hellstroem and Jacob (ref 68) point out that scientific merit “should be judged by researchers from disciplines or research orientations outside of that of the research being considered. . . Scientific merit is also an issue of whether a scientific field is ‘ripe for exploitation’ in terms of technology. Thus, scientific merit is founded on the value of the proposed research to the rest of science and technology. “ (ref 68, p. 388) research should not be engaged in on a whim or to simply repeat what is already known; the anticipated results of the study must contribute to science or benefit the field or discipline; and experiments must be conducted only by scientifically qualified persons. (ref 1) (ref 2)The Helsinki Declaration also addresses scientific merit. It states that research must conform to generally accepted scientific principles. The design and performance of each experimental procedure should be outlined in an experimental protocol which should be reviewed by an independent committee. Research should be conducted by scientifically qualified persons. (ref 3)Expectations of research with good scientific merit Download Scientific merit, in the most basic sense simply looks at whether or not a study represents good science. For any study to have scientific merit, it must contain the following components: address an area of importance to the discipline, utilize established scientific principles, exhibit alignment within the study, demonstrate how scientific knowledge will be garined (should be gained) from the study, and involve appropriately trained researchers. Addresses an area of importance to the discipline There is a key difference between what may be of interest to laypersons, practitioners and scientists. So while an individual may believe that a particular problem is worth studying because of casual observations made at work or in daily life, scientific merit requires that the problems being investigated are considered valuable to the larger scientific community. This means that the problem the researcher seeks to investigate comes from the appropriate academic literature. In turn, what the researcher is investigating should extend the literature in some way. This is how academic disciplines advance. The study must address a problem that is supported by the scientific literature and is important to the scientific community in general. Hellstroem and Jacob (ref 68) point out that scientific merit is not judged by scientists within the field that the research is a part of but “should be judged by researchers from disciplines or research orientations outside of that of the research being considered . . . . Scientific merit is also an issue of whether a scientific field is ‘ripe for exploitation’ in terms of technology. Thus, scientific merit is founded on the value of the proposed research to the rest of science and technology. “ (ref 68, p. 388)Utilize established scientific principles How research is conducted within the scientific community has evolved over a considerable period of time and what might have been considered acceptable even 25 years ago, may not be acceptable today. How a researcher conducts a study should always be based upon the ways in which studies are conducted in science in general and within the researcher’s particular field specifically. Research should conform to established scientific principles and procedures. This means that the researcher, whether designing a quantitative or qualitative study, must turn to the literature extant for guidance on the appropriate methods and procedures to be used within that study. While there are advancements and changes in how research may be conducted over time, and, in fact, research into methods is an area of study in and of itself, researchers should not simply make-up how a study is conducted out of thin air. Researchers do not need to invent new methods to carry out each new study, because appropriate methods already exist within the literature—and when an appropriate method does not, that, in and of itself, will be the object of a study. Exhibit Alignment within the study Any research study that has scientific merit is a coherent whole. From beginning to end, the study flows together. It makes logical sense. When we read the research questions, we should know what methodology the study will use, and we should be able to determine what the variables in the study are. The selection of subjects should flow from the methodology. The methods of data collection will make sense as will the data analysis. Everything within the study is linked together. The language of the study will also make sense. Qualitative studies talk about research in one way and quantitative studies in another. First and foremost, the research questions must be answerable. They should not be broad social or philosophical problems like “why is there war?” The research questions should be narrow in scope and they must be nested within the researcher’s discipline. Beyond having answerable research questions, they must also be answerable in the way that the study proposes. The entire study must represent a blueprint for answering the research questions. Demonstrate how scientific knowledge will be gained from the study. The outcome of any study should be an increase in scientific knowledge. This does not have to be a discipline-changing increase, or a paradigm shift, but it must be an increase none the less. A study cannot simply repeat what is already known—either from previous studies, or from general knowledge. Some of the most unethical studies that have been conducted violate this principle of scientific merit. For example, the San Antonio Contraception Study examined whether women who were given placebos rather than birth control pills were more likely to become pregnant. (ref 8)The directive of adding to the pool of scientific knowledge does not imply that for each and every study something of statistical significance must be found. To the contrary, the results of many studies show us that something does not work, that there is no significant difference, or that the expected outcome does not occur. But, this lack of a finding is, in and of itself, a finding. Involve appropriately trained researchers Good science cannot come from individuals who are untrained. The researcher and everyone involved in the study must have appropriate training to conduct the study. This training will include training in dealing with the subjects in the study, the instruments in the study, and even the statistics used within the study. If a study involves children, the researchers must be able to show that they have appropriate training in the psychological/medical/social/physical development of children or whatever aspect of child development the study involves. If a study involves veterans with post traumatic stress disorder, then the researchers must show that they have special training in working with individuals with this disorder. If a study involves administering psychological measures, like the Minnesota Multiphasic Personality Inventory, or the Wechsler Intelligence Scales then the researchers must possess the specialized knowledge to administer the test. If a researcher is interested in conducting research into Post Traumatic Stress Disorder (PTSD) and wants to measure PTSD, the researcher might decide to administer the Clinician-Administered PTSD Scale (CAPS) (ref 69). This is a good scale to make either a current or lifetime diagnosis of PTSD, but it must be administered by a clinician or clinical researcher who has a working knowledge of PTSD or an appropriately trained paraprofessional. If a researcher is investigating preschool settings, the Environment Rating Scales can be used to assess group programs for young children. And while certification is not required to administer the scales, the authors recommend extensive training. (ref 70) (ref 71)Proposed recruitment and data collection plans should be based on the population characteristics, topic, and on expected participation rates. The proposed study should have a sample size appropriate for the data analysis. However, researchers do not have a crystal ball. This may mean the recruitment efforts do not yield the sample size needed. It may also mean when the data is entered and ready for analysis the expected range of responses is not present. In these instances, revisions to the original plan may be needed. This should be noted in any publications, reports or dissemination efforts. Common sections for this information may be in the description of the sample, data analysis section and also in the limitations area. Scientific merit in grants and publication requirements (VIDEO ref 97)Scientific merit is a requirement for grants and publications. Funding agencies will often mention that the scientific merit of a particular proposal will be considered when making funding decisions. “The scientific merit of the proposal” is among the criteria that The Foundation for AIDS Research (amf AR), uses to evaluate the proposals and letters of intent that they receive. If a proposal does not have scientific merit, it will not be funded by them (ref 72). The Canadian Institutes of Health Research use both Scientific Merit and the potential impact of the research when reviewing research projects for funding (ref 73). A Humerous Look at Scientific Merit Download PDF (ref 74)The parachute study was written to poke fun at researchers who insist that double-blind, placebo studies must be done to insure that an intervention works. Clearly, no one needs to assign individuals to “parachute” and “no-parachute” groups. [Permission to use the parachute article provided by Dr. Gordon Smith.] (ref 74) We already know that parachutes do work, so there really is no need to create a study testing whether using a parachute as opposed to not using a parachute increases the survivability of a long “gravitational challenge.” There is no need to conduct a study to investigate something that we already know. And there is no need to put people in harm’s way to conduct this research. It’s not the case that research cannot be conducted on parachutes, but this would not be the way to design such a study—even though placebo studies may be appropriate in other studies, it certainly would not be appropriate in this study. Conclusion This Module discussed concepts related to Scientific Merit. We began by examining the origins of scientific merit within individual disciplines and within the Nuremberg Code and the Helsinki Declaration. We defined scientific merit and examined the components of scientific merit in research design, grant funding and application evaluation, and in the dissemination of findings. Finally, we learned how the NIH reviews a study for scientific merit.
|
D273786
|
https://www.reference.com/world-view/secondary-consumers-desert-6ff6890c0516ee75
|
What Are Secondary Consumers of the Desert?
|
Full Answer Secondary consumers rank high on the desert food chain; only tertiary consumers rank higher. The food chain begins with producers. Those organisms, primarily plants and vegetation, make their own food supplies. Most perform photosynthesis, which involves absorbing sunlight and converting light to energy. Plants make energy in the form of sugars called glucose. Producers supply primary consumers with energy. Primary consumers include small mammals like rodents, chipmunks and squirrels. They exist in larger numbers in most desert environments than secondary consumers, giving secondary consumers a variety of food choices. Some predators, like rattlesnakes, make noise to catch prey. Others, like the Elf Owl, take a silent, stealthy approach instead. These owls produce no noise during flight. They sneak up on unsuspecting predators; soft feathers on their wing tips damper noise. Elf owls reside in deserts across the American Southwest, and extend their range into parts of Mexico as well. Elf owls feed primarily on insects like moths, beetles and scorpions. In turn, other desert predators such as foxes and coyotes consume owls. Learn more about Economics Sources: exploringnature.org desertmuseum.org
|
D2491902
|
http://bedding.lovetoknow.com/table-linens/chart-standard-tablecloth-sizes
|
Chart of Standard Tablecloth Sizes
|
Chart of Standard Tablecloth Sizes By Sally Painter Former Commercial and Residential Designer A chart for standard tablecloth sizes is an excellent tool for finding the perfect size you need for your next tablecloth purchase. You can quickly reference it instead of trying to guess the correct size. How to Use the Tablecloth Chart The following steps are quick and easy to follow when using the printable pdf chart. Download and print the chart so you can save and use it when you need it. Click to download and print the chart. Step One Find the shape and size of your table using the far left column in the chart. If you don't know the size, use a retractable tape measure to take an exact measurement. This will give you the size of the tabletop and the measurements you'll use to determine the tablecloth size you need. Rectangle and oval tables come in two standard widths. The most common is 36" and the other is 40" wide. For a round table you will to know the diameter. Measure the center of the table from one end to the other. Square tables range from 30" to 72". You can determine the size of your table by measuring one side. Step Two Decide the length of the drop, which is the amount of material that will hang over the edge of the table, you want for your tablecloth. If you're undecided, then sit down at the table and with a ruler or tape measure find 8", measuring from the edge of the table. If this length isn't as long as you'd like, then try 10" and finally 12". Step Three Now that you know the size of your table and the drop length you want, you're ready to find the size of the tablecloth you'll need with the chart. Round For example if your table is round and 120" in diameter and you want an 8" drop, you will first find your table size underneath the Table Shape and Size column. Next, move across the chart underneath the Tablecloth Size Drop 8" column. The tablecloth size you need is 136" in diameter. Square To find the tablecloth size needed for a 42" square table with a long drop, find the table shape and size underneath the Table Shape and Size column. Next, move across the chart underneath the Tablecloth Size Drop 12" column. The tablecloth size you need is a 58" x 58" square. Rectangle and Oval To find the tablecloth size needed for a rectangle or oval table, you will use the length and width measurements you took earlier. In the chart listings you will see that the (40") widths are shown in parentheses in the Shape and Size column as well as each of the Tablecloth Size Drop columns. If your table is a rectangle shape and measures 72" x 36" and you wish for a 10" drop, then the tablecloth size you need is 92" x 56". If your table has a 40" width instead of 36", then you would use the numbers in parentheses - (60") for a tablecloth size of 92" x 60". For an oval table, you will use the rectangle size measurements and the correlating tablecloth sizes. Just be sure that when you purchase the tablecloth it is meant for an oval table and not a rectangle table. Understanding Tablecloth Drop Length Options The material of a standard tablecloth needs to fall over the edge of table. That material is called a drop and it impacts the length you need so the tablecloth fits your table and provides the look you desire.8 Inch Drop The drop length can vary depending on the dining event or personal preference. The standard drop length used by most food and catering services is 8". This means that the tablecloth will drop 8" over the edge of the table, evenly on all sides.10 and 12 Inch Drops You aren't limited to only using 8" for the drop in your tablecloth. Many people prefer the look of a 10" or 12" drop. However, these lengths tend to be uncomfortable for some diners since the tablecloth often bunches up underneath the table or makes it difficult for diners to move or even sit underneath the table. That's why the food service industry uses the 8" standard.30 Inch Drop If you want the banquet look where the tablecloth touches the floor, then the standard drop is 30". This drop length is used mostly for banquets dinners, especially wedding receptions. A 30" drop length will mean that the tablecloth puddles slightly on floor. Quick Reference for Finding Tablecloth Sizes Using the chart you have a quick way to find the correct size for any standard size tablecloth. With the various options for drop length, the chart becomes a highly valuable tool for making the right purchase for your next tablecloth. Related Topics Large Tablecloths Tablecloths for Round Tables Oval Tablecloths Fitted Tablecloths How to Display Bath Towels Cool Shower Curtain Ideas
|
D529343
|
https://en.wikipedia.org/wiki/Groveport,_Ohio
|
Groveport, Ohio
|
Groveport, Ohio From Wikipedia, the free encyclopedianavigation search Groveport, Ohio City One of the Groveport Log Houses Motto (s): "Central Ohio's Hometown"Location of Groveport, Ohio Location of Groveport in Franklin County Coordinates: 39°51′22″N 82°53′26″WCoordinates: 39°51′22″N 82°53′26″WCountry United States State Ohio County Franklin Area [1]• Total 8.79 sq mi (22.77 km 2)• Land 8.56 sq mi (22.17 km 2)• Water 0.23 sq mi (0.60 km 2)Elevation [2] 741 ft (226 m)Population ( 2010) [3]• Total 5,363• Estimate (2012 [4]) 5,540• Density 626.5/sq mi (241.9/km 2)Time zone Eastern (EST) ( UTC-5)• Summer ( DST) EDT ( UTC-4)ZIP codes 43125, 43195, 43196, 43198, 43199Area code (s) 614FIPS code 39-32606 [5]GNIS feature ID 1062797 [2]Groveport is a city in Franklin County, Ohio, United States. The population was 5,363 at the 2010 census. Groveport was the hometown of John Solomon Rarey, a 19th-century horse whisperer, and developer of the Rarey technique for rehabilitating horses. Contents [ hide ]1 History2 Geography3 Demographics3.1 2010 census3.2 2000 census4 Economy5 Schools6 Notable people7 References History [ edit]Groveport had its start as a single entity in 1846 when the neighboring rival towns of Wert's Grove and Rareysport merged. [6] A post office called Groveport has been in operation since 1847. [7]Geography [ edit]Groveport is located at 39°51′22″N 82°53′26″W (39.856163, -82.890544). [8]According to the United States Census Bureau, the village has a total area of 8.79 square miles (22.77 km 2 ), of which 8.56 square miles (22.17 km 2) is land and 0.23 square miles (0.60 km 2) is water. [1]Demographics [ edit]Historical population Census Pop. %±1850 483 —1860 540 11.8%1870 627 16.1%1880 650 3.7%1890 578 −11.1%1900 519 −10.2%1910 643 23.9%1920 671 4.4%1930 946 41.0%1940 1,052 11.2%1950 1,165 10.7%1960 2,043 75.4%1970 2,490 21.9%1980 3,286 32.0%1990 2,948 −10.3%2000 3,865 31.1%2010 5,363 38.8%Est. 2016 5,552 [9] 3.5%Sources: [10] [11] [12] [13] [14] [15] [5] [16]2010 census [ edit]As of the census [3] of 2010, there were 5,363 people, 2,099 households, and 1,471 families residing in the village. The population density was 626.5 inhabitants per square mile (241.9/km 2 ). There were 2,300 housing units at an average density of 268.7 per square mile (103.7/km 2 ). The racial makeup of the village was 82.1% White, 12.5% African American, 0.3% Native American, 1.9% Asian, 1.0% from other races, and 2.3% from two or more races. Hispanic or Latino of any race were 2.2% of the population. There were 2,099 households of which 32.9% had children under the age of 18 living with them, 54.3% were married couples living together, 10.8% had a female householder with no husband present, 5.1% had a male householder with no wife present, and 29.9% were non-families. 24.6% of all households were made up of individuals and 9.2% had someone living alone who was 65 years of age or older. The average household size was 2.56 and the average family size was 3.03. The median age in the village was 39.9 years. 23.7% of residents were under the age of 18; 7.7% were between the ages of 18 and 24; 26.3% were from 25 to 44; 30% were from 45 to 64; and 12.5% were 65 years of age or older. The gender makeup of the village was 48.1% male and 51.9% female.2000 census [ edit]As of the census [5] of 2000, there were 3,865 people, 1,575 households, and 1,080 families residing in the village. The population density was 482.9 people per square mile (186.5/km²). There were 1,668 housing units at an average density of 208.4 per square mile (80.5/km²). The racial makeup of the village was 92.88% White, 3.62% African American, 0.62% Native American, 1.09% Asian, 0.57% from other races, and 1.22% from two or more races. Hispanic or Latino of any race were 1.27% of the population. There were 1,575 households out of which 31.1% had children under the age of 18 living with them, 52.6% were married couples living together, 11.7% had a female householder with no husband present, and 31.4% were non-families. 26.0% of all households were made up of individuals and 9.5% had someone living alone who was 65 years of age or older. The average household size was 2.45 and the average family size was 2.94. In the village the population was spread out with 24.0% under the age of 18, 8.4% from 18 to 24, 32.0% from 25 to 44, 23.5% from 45 to 64, and 12.1% who were 65 years of age or older. The median age was 37 years. For every 100 females there were 92.5 males. For every 100 females age 18 and over, there were 89.8 males. The median income for a household in the village was $43,102, and the median income for a family was $51,525. Males had a median income of $32,133 versus $27,353 for females. The per capita income for the village was $19,576. About 3.2% of families and 5.9% of the population were below the poverty line, including 9.1% of those under age 18 and 4.5% of those age 65 or over. Economy [ edit]Due in large part to the presence of Rickenbacker International Airport and Air National Guard Base, Groveport is home to the headquarters of a number of large companies, including Air Tahoma and Staber Industries. Other organizations with significant operations include Amazon.com, Fed Ex, Gap, Inc., Eddie Bauer, Spiegel Brands, American Electric Power and Vista Print. Schools [ edit]The Groveport Madison School District has 10 schools. There are six elementary schools, three middle schools, and the Groveport Madison High School. Groveport Madison athletes are known as the Cruisers. Notable people [ edit]Le'Veon Bell, NFL All-Pro Running Back, Pittsburgh Steelers. Pam Higgins, golfer. Three-time winner on the LPGA Tour Emma Johnson, NPF pitcher for the Pennsylvania Rebellion. Johnson was a graduate of Groveport-Madison High School. Eric Smith, NFL Football (NY Jets 2006–present). Smith was a graduate of Groveport-Madison High School. [17]John Solomon Rarey. Rarey developed the Rarey method for training horses. Chief Warrant Officer 4 Thomas John Hennen (born August 17, 1952) is a United States Army warrant officer and NASA astronaut who flew aboard Space Shuttle mission STS-44 as a Payload Specialist. Amor L. Sims, Brigadier general, USMC who served during World War I and World War IIReferences [ edit]^ a b "US Gazetteer files 2010". United States Census Bureau. Archived from the original on 2012-01-24. Retrieved 2013-01-06.^ a b "US Board on Geographic Names". United States Geological Survey. 2007-10-25. Retrieved 2008-01-31.^ a b "American Fact Finder". United States Census Bureau. Retrieved 2013-01-06.^ "Population Estimates". United States Census Bureau. Archived from the original on 2013-06-17. Retrieved 2013-06-17.^ a b c "American Fact Finder". United States Census Bureau. Archived from the original on 2013-09-11. Retrieved 2008-01-31.^ Overman, William Daniel (1958). Ohio Town Names. Akron, OH: Atlantic Press. p. 55.^ "Post offices". Jim Forte Postal History. Retrieved 11 June 2016.^ "US Gazetteer files: 2010, 2000, and 1990". United States Census Bureau. 2011-02-12. Retrieved 2011-04-23.^ "Population and Housing Unit Estimates". Retrieved June 9, 2017.^ "Population of Civil Divisions Less than Counties" (PDF). Statistics of the Population of the United States at the Tenth Census. U. S. Census Bureau. Retrieved 28 November 2013. [ permanent dead link]^ "Population of Civil Divisions Less than Counties" (PDF). Statistics of the Population of the United States at the Tenth Census. U. S. Census Bureau. Retrieved 28 November 2013.^ "Population: Ohio" (PDF). 1910 U. S. Census. U. S. Census Bureau. Retrieved 28 November 2013.^ "Population: Ohio" (PDF). 1930 US Census. U. S. Census Bureau. Retrieved 28 November 2013.^ "Number of Inhabitants: Ohio" (PDF). 18th Census of the United States. U. S. Census Bureau. Retrieved 22 November 2013. [ permanent dead link]^ "Ohio: Population and Housing Unit Counts" (PDF). U. S. Census Bureau. Retrieved 22 November 2013.^ "Incorporated Places and Minor Civil Divisions Datasets: Subcounty Population Estimates: April 1, 2010 to July 1, 2012". U. S. Census Bureau. Archived from the original on 17 June 2013. Retrieved 25 November 2013.^ Michigan State profile for Eric Smith [ hide]v t e Municipalities and communities of Franklin County, Ohio, United States County seat: Columbus Cities Bexley Canal Winchester ‡ Columbus ‡ Dublin ‡ Gahanna Grandview Heights Grove City Groveport Hilliard New Albany ‡ Pickerington ‡ Reynoldsburg ‡ Upper Arlington Westerville ‡ Whitehall Worthington Villages Brice Harrisburg ‡ Lithopolis ‡ Lockbourne ‡ Marble Cliff Minerva Park Obetz Riverlea Urbancrest Valleyview Townships Blendon Brown Clinton Franklin Hamilton Jackson Jefferson Madison Mifflin Norwich Perry Plain Pleasant Prairie Sharon Truro Washington CDPs Blacklick Estates Darbydale Huber Ridge Lake Darby Lincoln Village Unincorporated communities Amlin Blacklick Flint Galloway Georgesville New Rome Footnotes ‡This populated place also has portions in an adjacent county or counties Authority control World Cat Identities VIAF: 146675783Categories: Cities in Franklin County, Ohio Cities in Ohio
|
D431186
|
https://en.wikipedia.org/wiki/Iridium
|
Iridium
|
From Wikipedia, the free encyclopedianavigation search Not to be confused with Indium. This article is about the chemical element. For other uses, see Iridium (disambiguation). Iridium, 77 Ir General properties Pronunciation / ɪ ˈ r ɪ d i ə m / ( ih- RID -ee-əm)Appearance silvery white Standard atomic weight ( A r, standard)192.217 (3) [1]Iridium in the periodic table Hydrogen Helium Lithium Beryllium Boron Carbon Nitrogen Oxygen Fluorine Neon Sodium Magnesium Aluminium Silicon Phosphorus Sulfur Chlorine Argon Potassium Calcium Scandium Titanium Vanadium Chromium Manganese Iron Cobalt Nickel Copper Zinc Gallium Germanium Arsenic Selenium Bromine Krypton Rubidium Strontium Yttrium Zirconium Niobium Molybdenum Technetium Ruthenium Rhodium Palladium Silver Cadmium Indium Tin Antimony Tellurium Iodine Xenon Caesium Barium Lanthanum Cerium Praseodymium Neodymium Promethium Samarium Europium Gadolinium Terbium Dysprosium Holmium Erbium Thulium Ytterbium Lutetium Hafnium Tantalum Tungsten Rhenium Osmium Iridium Platinum Gold Mercury (element) Thallium Lead Bismuth Polonium Astatine Radon Francium Radium Actinium Thorium Protactinium Uranium Neptunium Plutonium Americium Curium Berkelium Californium Einsteinium Fermium Mendelevium Nobelium Lawrencium Rutherfordium Dubnium Seaborgium Bohrium Hassium Meitnerium Darmstadtium Roentgenium Copernicium Nihonium Flerovium Moscovium Livermorium Tennessine Oganesson Rh ↑ Ir ↓ Mtosmium ← iridium → platinum Atomic number ( Z) 77Group group 9Period period 6Element category transition metal Block d-block Electron configuration [ Xe] 4f 14 5d 7 6s 2Electrons per shell 2, 8, 18, 32, 15, 2Physical properties Phase at STP solid Melting point 2719 K (2446 °C, 4435 °F)Boiling point 4403 K (4130 °C, 7466 °F)Density (near r.t.) 22.56 g/cm 3when liquid (at m.p.) 19 g/cm 3Heat of fusion 41.12 k J/mol Heat of vaporization 564 k J/mol Molar heat capacity 25.10 J/ (mol·K)Vapor pressure P (Pa) 1 10 100 1 k 10 k 100 kat T (K) 2713 2957 3252 3614 4069 4659Atomic properties Oxidation states −3, −1, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 [2]Electronegativity Pauling scale: 2.20Ionization energies1st: 880 k J/mol2nd: 1600 k J/mol Atomic radius empirical: 136 pm Covalent radius 141±6 pm Spectral lines Miscellanea Crystal structure face-centered cubic (fcc)Speed of sound thin rod 4825 m/s (at 20 °C)Thermal expansion 6.4 µm/ (m·K)Thermal conductivity 147 W/ (m·K)Electrical resistivity 47.1 nΩ·m (at 20 °C)Magnetic ordering paramagnetic [3]Magnetic susceptibility +25.6·10 −6 cm 3 /mol (298 K) [4]Young's modulus 528 GPa Shear modulus 210 GPa Bulk modulus 320 GPa Poisson ratio 0.26Mohs hardness 6.5Vickers hardness 1760–2200 MPa Brinell hardness 1670 MPa CAS Number 7439-88-5History Discovery and first isolation Smithson Tennant (1803)Main isotopes of iridium Isotope Abundance Half-life ( t 1/2)Decay mode Product188 Ir syn 1.73 d ε 188Os189 Ir syn 13.2 d ε 189Os190 Ir syn 11.8 d ε 190Os191 Ir 37.3% stable192 Ir syn 73.827 d β − 192Ptε 192Os192 m2 Ir syn 241 y IT 192 Ir193 Ir 62.7% stable193m Ir syn 10.5 d IT 193 Ir194 Ir syn 19.3 h β − 194Pt194m2 Ir syn 171 d IT 194 Irview talk edit| references | in Wikidata Iridium is a chemical element with symbol Ir and atomic number 77. A very hard, brittle, silvery-white transition metal of the platinum group, iridium is the second densest element (after osmium ). It is also the most corrosion -resistant metal, even at temperatures as high as 2000 °C. Although only certain molten salts and halogens are corrosive to solid iridium, finely divided iridium dust is much more reactive and can be flammable. Iridium was discovered in 1803 among insoluble impurities in natural platinum. Smithson Tennant, the primary discoverer, named iridium for the Greek goddess Iris, personification of the rainbow, because of the striking and diverse colors of its salts. Iridium is one of the rarest elements in Earth's crust, with annual production and consumption of only three tonnes. 191 Ir and 193 Ir are the only two naturally occurring isotopes of iridium, as well as the only stable isotopes; the latter is the more abundant of the two. The most important iridium compounds in use are the salts and acids it forms with chlorine, though iridium also forms a number of organometallic compounds used in industrial catalysis, and in research. Iridium metal is employed when high corrosion resistance at high temperatures is needed, as in high-performance spark plugs, crucibles for recrystallization of semiconductors at high temperatures, and electrodes for the production of chlorine in the chloralkali process. Iridium radioisotopes are used in some radioisotope thermoelectric generators. Iridium is found in meteorites in much higher abundance than in the Earth's crust. [5] For this reason, the unusually high abundance of iridium in the clay layer at the Cretaceous–Paleogene boundary gave rise to the Alvarez hypothesis that the impact of a massive extraterrestrial object caused the extinction of dinosaurs and many other species 66 million years ago. Similarly, an iridium anomaly in core samples from the Pacific Ocean suggested the Eltanin impact of about 2.5 million years ago. It is thought that the total amount of iridium in the planet Earth is much higher than that observed in crustal rocks, but as with other platinum-group metals, the high density and tendency of iridium to bond with iron caused most iridium to descend below the crust when the planet was young and still molten. Contents [ hide ]1 Characteristics1.1 Physical properties1.2 Chemical properties1.3 Compounds1.4 Isotopes2 History2.1 Platinum group2.2 Discovery2.3 Metalworking and applications3 Occurrence3.1 Cretaceous–Paleogene boundary presence4 Production5 Applications5.1 Industrial and medical5.2 Scientific5.3 Historical6 Precautions7 Notes8 References9 External links Characteristics [ edit]Physical properties [ edit]One troy ounce (31.1035 g) of arc-melted iridium A member of the platinum groupmetals, iridium is white, resembling platinum, but with a slight yellowish cast. Because of its hardness, brittleness, and very high melting point, solid iridium is difficult to machine, form, or work; thus powder metallurgy is commonly employed instead. [6] It is the only metal to maintain good mechanical properties in air at temperatures above 1,600 °C (2,910 °F). [7] It has the 10th highest boiling point among all elements and becomes a superconductor at temperatures below 0.14 K. [8]Iridium's modulus of elasticity is the second-highest among the metals, only being surpassed by osmium. [7] This, together with a high shear modulus and a very low figure for Poisson's ratio (the relationship of longitudinal to lateral strain ), indicate the high degree of stiffness and resistance to deformation that have rendered its fabrication into useful components a matter of great difficulty. Despite these limitations and iridium's high cost, a number of applications have developed where mechanical strength is an essential factor in some of the extremely severe conditions encountered in modern technology. [7]The measured density of iridium is only slightly lower (by about 0.12%) than that of osmium, the densest element known. [9] [10] Some ambiguity occurred regarding which of the two elements was denser, due to the small size of the difference in density and difficulties in measuring it accurately, [11] but, with increased accuracy in factors used for calculating density X-ray crystallographic data yielded densities of 22.56 g/cm 3 for iridium and 22.59 g/cm 3 for osmium. [12]Chemical properties [ edit]Iridium is the most corrosion-resistant metal known: [13] it is not attacked by almost any acid, aqua regia, molten metals, or silicates at high temperatures. It can, however, be attacked by some molten salts, such as sodium cyanide and potassium cyanide, [14] as well as oxygen and the halogens (particularly fluorine) [15] at higher temperatures. [16]Compounds [ edit]Oxidation states [note 1]−3 [Ir (CO) 3] 3−−1 [Ir (CO) 3 (PPh 3)] −0 Ir 4 (CO) 12+1 [Ir (CO)Cl (PPh 3) 2]+2 Ir Cl 2+3 Ir Cl 3+4 Ir O 2+5 Ir 4F 20+6 Ir F 6+7 [ (η 2-O 2)Ir O 2] ++8 Ir O 4+9 [Ir O 4] + [2]See also: Category: Iridium compounds Iridium forms compounds in oxidation states between −3 and +9; the most common oxidation states are +3 and +4. [6] Well-characterized examples of the high +6 oxidation state are rare, but include Ir F 6 and two mixed oxides Sr 2Mg Ir O 6 and Sr 2Ca Ir O 6. [6] [17] In addition, it was reported in 2009 that iridium (VIII) oxide ( Ir O 4) was prepared under matrix isolation conditions (6 K in Ar) by UV irradiation of an iridium-peroxo complex. This species, however, is not expected to be stable as a bulk solid at higher temperatures. [18] The highest oxidation state (+9), which is also the highest recorded for any element, is only known in one cation, Ir O +4; it is only known as gas-phase species and is not known to form any salts. [2]Iridium dioxide, Ir O 2, a brown powder, is the only well-characterized oxide of iridium. [6] A sesquioxide, Ir 2O 3, has been described as a blue-black powder which is oxidized to Ir O 2 by HNO 3. [15] The corresponding disulfides, diselenides, sesquisulfides, and sesquiselenides are known, and Ir S 3 has also been reported. [6] Iridium also forms iridates with oxidation states +4 and +5, such as K 2Ir O 3 and KIr O 3, which can be prepared from the reaction of potassium oxide or potassium superoxide with iridium at high temperatures. [19]Although no binary hydrides of iridium, Ir x H y are known, complexes are known that contain Ir H 4−5 and Ir H 3−6, where iridium has the +1 and +3 oxidation states, respectively. [20] The ternary hydride Mg 6Ir 2H 11 is believed to contain both the Ir H 4−5 and the 18-electron Ir H 5−4 anion. [21]No monohalides or dihalides are known, whereas trihalides, Ir X 3, are known for all of the halogens. [6] For oxidation states +4 and above, only the tetrafluoride, pentafluoride and hexafluoride are known. [6] Iridium hexafluoride, Ir F 6, is a volatile and highly reactive yellow solid, composed of octahedral molecules. It decomposes in water and is reduced to Ir F 4, a crystalline solid, by iridium black. [6] Iridium pentafluoride has similar properties but it is actually a tetramer, Ir 4F 20, formed by four corner-sharing octahedra. [6] Iridium metal dissolves in molten alkali-metal cyanides to produce the Ir (CN) 3+6 (hexacyanoiridate) ion. Vaska's complex Hexachloroiridic (IV) acid, H 2Ir Cl 6, and its ammonium salt are the most important iridium compounds from an industrial perspective. [22] They are involved in the purification of iridium and used as precursors for most other iridium compounds, as well as in the preparation of anode coatings. The Ir Cl 2−6 ion has an intense dark brown color, and can be readily reduced to the lighter-colored Ir Cl 3−6 and vice versa. [22] Iridium trichloride, Ir Cl 3, which can be obtained in anhydrous form from direct oxidation of iridium powder by chlorine at 650 °C, [22] or in hydrated form by dissolving Ir 2O 3 in hydrochloric acid, is often used as a starting material for the synthesis of other Ir (III) compounds. [6] Another compound used as a starting material is ammonium hexachloroiridate (III), (NH 4) 3Ir Cl 6. Iridium (III) complexes are diamagnetic ( low-spin) and generally have an octahedral molecular geometry. [6]Organoiridium compounds contain iridium– carbon bonds where the metal is usually in lower oxidation states. For example, oxidation state zero is found in tetrairidium dodecacarbonyl, Ir 4 (CO) 12, which is the most common and stable binary carbonyl of iridium. [6] In this compound, each of the iridium atoms is bonded to the other three, forming a tetrahedral cluster. Some organometallic Ir (I) compounds are notable enough to be named after their discoverers. One is Vaska's complex, Ir Cl (CO) [P (C 6H 5) 3] 2, which has the unusual property of binding to the dioxygen molecule, O 2. [23] Another one is Crabtree's catalyst, a homogeneous catalyst for hydrogenation reactions. [24] These compounds are both square planar, d 8 complexes, with a total of 16 valence electrons, which accounts for their reactivity. [25]An iridium-based organic LED material has been documented, and found to be much brighter than DPA or PPV, so could be the basis for flexible OLED lighting in the future. [26]Isotopes [ edit]Main article: Isotopes of iridium Iridium has two naturally occurring, stable isotopes, 191 Ir and 193 Ir, with natural abundances of 37.3% and 62.7%, respectively. [27] At least 34 radioisotopes have also been synthesized, ranging in mass number from 164 to 199. 192Ir, which falls between the two stable isotopes, is the most stable radioisotope, with a half-life of 73.827 days, and finds application in brachytherapy [28] and in industrial radiography, particularly for nondestructive testing of welds in steel in the oil and gas industries; iridium-192 sources have been involved in a number of radiological accidents. Three other isotopes have half-lives of at least a day— 188 Ir, 189 Ir, and 190 Ir. [27] Isotopes with masses below 191 decay by some combination of β +decay, α decay, and (rare) proton emission, with the exceptions of 189 Ir, which decays by electron capture. Synthetic isotopes heavier than 191 decay by β −decay, although 192 Ir also has a minor electron capture decay path. [27] All known isotopes of iridium were discovered between 1934 and 2001; the most recent is 171 Ir. [29]At least 32 metastable isomers have been characterized, ranging in mass number from 164 to 197. The most stable of these is 192m2 Ir, which decays by isomeric transition with a half-life of 241 years, [27] making it more stable than any of iridium's synthetic isotopes in their ground states. The least stable isomer is 190m3 Ir with a half-life of only 2 µs. [27] The isotope 191 Ir was the first one of any element to be shown to present a Mössbauer effect. This renders it useful for Mössbauer spectroscopy for research in physics, chemistry, biochemistry, metallurgy, and mineralogy. [30]History [ edit]Platinum group [ edit]The Greek goddess Iris, after whom iridium was named. The discovery of iridium is intertwined with that of platinum and the other metals of the platinum group. Native platinum used by ancient Ethiopians [31] and by South American cultures [32] always contained a small amount of the other platinum group metals, including iridium. Platinum reached Europe as platina ("silverette"), found in the 17th century by the Spanish conquerors in a region today known as the department of Chocó in Colombia. [33] The discovery that this metal was not an alloy of known elements, but instead a distinct new element, did not occur until 1748. [34]Discovery [ edit]Chemists who studied platinum dissolved it in aqua regia (a mixture of hydrochloric and nitric acids) to create soluble salts. They always observed a small amount of a dark, insoluble residue. [7] Joseph Louis Proust thought that the residue was graphite. [7] The French chemists Victor Collet-Descotils, Antoine François, comte de Fourcroy, and Louis Nicolas Vauquelin also observed the black residue in 1803, but did not obtain enough for further experiments. [7]In 1803, British scientist Smithson Tennant (1761–1815) analyzed the insoluble residue and concluded that it must contain a new metal. Vauquelin treated the powder alternately with alkali and acids [13] and obtained a volatile new oxide, which he believed to be of this new metal—which he named ptene, from the Greek word πτηνός ptēnós, "winged". [35] [36] Tennant, who had the advantage of a much greater amount of residue, continued his research and identified the two previously undiscovered elements in the black residue, iridium and osmium. [7] [13] He obtained dark red crystals (probably of Na 2 [Ir Cl 6 ]· n H 2O) by a sequence of reactions with sodium hydroxide and hydrochloric acid. [36] He named iridium after Iris ( Ἶρις ), the Greek winged goddess of the rainbow and the messenger of the Olympian gods, because many of the salts he obtained were strongly colored. [note 2] [37] Discovery of the new elements was documented in a letter to the Royal Society on June 21, 1804. [7] [38]Metalworking and applications [ edit]British scientist John George Children was the first to melt a sample of iridium in 1813 with the aid of "the greatest galvanic battery that has ever been constructed" (at that time). [7] The first to obtain high-purity iridium was Robert Hare in 1842. He found it had a density of around 21.8 g/cm 3 and noted the metal is nearly immalleable and very hard. The first melting in appreciable quantity was done by Henri Sainte-Claire Deville and Jules Henri Debray in 1860. They required burning more than 300 liters of pure O 2 and H 2 gas for each kilogram of iridium. [7]These extreme difficulties in melting the metal limited the possibilities for handling iridium. John Isaac Hawkins was looking to obtain a fine and hard point for fountain pen nibs, and in 1834 managed to create an iridium-pointed gold pen. In 1880, John Holland and William Lofland Dudley were able to melt iridium by adding phosphorus and patented the process in the United States; British company Johnson Matthey later stated they had been using a similar process since 1837 and had already presented fused iridium at a number of World Fairs. [7] The first use of an alloy of iridium with ruthenium in thermocouples was made by Otto Feussner in 1933. These allowed for the measurement of high temperatures in air up to 2000 °C. [7]In Munich, Germany in 1957 Rudolf Mössbauer, in what has been called one of the "landmark experiments in twentieth-century physics", [39] discovered the resonant and recoil -free emission and absorption of gamma rays by atoms in a solid metal sample containing only 191 Ir. [40] This phenomenon, known as the Mössbauer effect (which has since been observed for other nuclei, such as 57Fe ), and developed as Mössbauer spectroscopy, has made important contributions to research in physics, chemistry, biochemistry, metallurgy, and mineralogy. [30] Mössbauer received the Nobel Prize in Physics in 1961, at the age 32, just three years after he published his discovery. [41] In 1986 Rudolf Mössbauer was honored for his achievements with the Albert Einstein Medal and the Elliot Cresson Medal. Occurrence [ edit]Iridium is one of the least abundant elements in Earth's crust. The Willamette Meteorite, the sixth-largest meteorite found in the world, has 4.7 ppm iridium. [42]Iridium is one of the nine least abundant stable elements in Earth's crust, having an average mass fraction of 0.001 ppm in crustal rock; gold is 40 times more abundant, platinum is 10 times more abundant, and silver and mercury are 80 times more abundant. [6] Tellurium is about as abundant as iridium. [6] In contrast to its low abundance in crustal rock, iridium is relatively common in meteorites, with concentrations of 0.5 ppm or more. [43] The overall concentration of iridium on Earth is thought to be much higher than what is observed in crustal rocks, but because of the density and siderophilic ("iron-loving") character of iridium, it descended below the crust and into Earth's core when the planet was still molten. [22]Iridium is found in nature as an uncombined element or in natural alloys; especially the iridium–osmium alloys, osmiridium (osmium-rich), and iridosmium (iridium-rich). [13] In the nickel and copper deposits, the platinum group metals occur as sulfides (i.e. (Pt,Pd)S), tellurides (i.e. Pt Bi Te), antimonides (Pd Sb), and arsenides (i.e. Pt As 2 ). In all of these compounds, platinum is exchanged by a small amount of iridium and osmium. As with all of the platinum group metals, iridium can be found naturally in alloys with raw nickel or raw copper. [44]Within Earth's crust, iridium is found at highest concentrations in three types of geologic structure: igneous deposits (crustal intrusions from below), impact craters, and deposits reworked from one of the former structures. The largest known primary reserves are in the Bushveld igneous complex in South Africa, [45] though the large copper–nickel deposits near Norilsk in Russia, and the Sudbury Basin in Canada are also significant sources of iridium. Smaller reserves are found in the United States. [45] Iridium is also found in secondary deposits, combined with platinum and other platinum group metals in alluvial deposits. The alluvial deposits used by pre-Columbian people in the Chocó Department of Colombia are still a source for platinum-group metals. As of 2003, world reserves have not been estimated. [13]Cretaceous–Paleogene boundary presence [ edit]The red arrow points to the Cretaceous–Paleogene boundary. Main article: Cretaceous–Paleogene extinction event The Cretaceous–Paleogene boundary of 66 million years ago, marking the temporal border between the Cretaceous and Paleogene periods of geological time, was identified by a thin stratum of iridium-rich clay. [46] A team led by Luis Alvarez proposed in 1980 an extraterrestrial origin for this iridium, attributing it to an asteroid or comet impact. [46] Their theory, known as the Alvarez hypothesis, is now widely accepted to explain the extinction of the non-avian dinosaurs. A large buried impact crater structure with an estimated age of about 66 million years was later identified under what is now the Yucatán Peninsula (the Chicxulub crater ). [47] [48] Dewey M. Mc Lean and others argue that the iridium may have been of volcanic origin instead, because Earth 's core is rich in iridium, and active volcanoes such as Piton de la Fournaise, in the island of Réunion, are still releasing iridium. [49] [50]Production [ edit]Year Consumption (tonnes) Price ( USD / ozt) [51]2001 2.6 415.252002 2.5 294.622003 3.3 93.022004 3.60 185.332005 3.86 169.512006 4.08 349.452007 3.70 444.432008 3.10 448.342009 2.52 420.42010 10.40 642.15Iridium is also obtained commercially as a by-product from nickel and copper mining and processing. During electrorefining of copper and nickel, noble metals such as silver, gold and the platinum group metals as well as selenium and tellurium settle to the bottom of the cell as anode mud, which forms the starting point for their extraction. [51] To separate the metals, they must first be brought into solution. Several separation methods are available depending on the nature of the mixture; two representative methods are fusion with sodium peroxide followed by dissolution in aqua regia, and dissolution in a mixture of chlorine with hydrochloric acid. [22] [45]After the mixture is dissolved, iridium is separated from the other platinum group metals by precipitating ammonium hexachloroiridate ( (NH 4) 2Ir Cl 6) or by extracting Ir Cl 2−6 with organic amines. [52] The first method is similar to the procedure Tennant and Wollaston used for their separation. The second method can be planned as continuous liquid–liquid extraction and is therefore more suitable for industrial scale production. In either case, the product is reduced using hydrogen, yielding the metal as a powder or sponge that can be treated using powder metallurgy techniques. [53] [54]Iridium prices have fluctuated over a considerable range. With a relatively small volume in the world market (compared to other industrial metals like aluminium or copper ), the iridium price reacts strongly to instabilities in production, demand, speculation, hoarding, and politics in the producing countries. As a substance with rare properties, its price has been particularly influenced by changes in modern technology: The gradual decrease between 2001 and 2003 has been related to an oversupply of Ir crucibles used for industrial growth of large single crystals. [51] [55] Likewise the prices above 1000 USD/oz between 2010 and 2014 have been explained with the installation of production facilities for single crystal sapphire used in LED backlights for TVs. [56]Applications [ edit]The demand for iridium surged from 2.5 tonnes in 2009 to 10.4 tonnes in 2010, mostly because of electronics-related applications that saw a rise from 0.2 to 6 tonnes – iridium crucibles are commonly used for growing large high-quality single crystals, demand for which has increased sharply. This increase in iridium consumption is predicted to saturate due to accumulating stocks of crucibles, as happened earlier in the 2000s. Other major applications include spark plugs that consumed 0.78 tonnes of iridium in 2007, electrodes for the chloralkali process (1.1 t in 2007) and chemical catalysts (0.75 t in 2007). [51] [57]Industrial and medical [ edit]Molecular structure of Ir (mppy) 3The high melting point, hardness and corrosion resistance of iridium and its alloys determine most of its applications. Iridium and especially iridium–platinum alloys or osmium–iridium alloys have a low wear and are used, for example, for multi-pored spinnerets, through which a plastic polymer melt is extruded to form fibers, such as rayon. [58] Osmium–iridium is used for compass bearings and for balances. [59]Their resistance to arc erosion makes iridium alloys ideal for electrical contacts for spark plugs, [60] [61] and iridium-based spark plugs are particularly used in aviation. Pure iridium is extremely brittle, to the point of being hard to weld because the heat-affected zone cracks, but it can be made more ductile by addition of small quantities of titanium and zirconium (0.2% of each apparently works well) [62]Corrosion and heat resistance makes iridium an important alloying agent. Certain long-life aircraft engine parts are made of an iridium alloy, and an iridium– titanium alloy is used for deep-water pipes because of its corrosion resistance. [13] Iridium is also used as a hardening agent in platinum alloys. The Vickers hardness of pure platinum is 56 HV, whereas platinum with 50% of iridium can reach over 500 HV. [63] [64]Devices that must withstand extremely high temperatures are often made from iridium. For example, high-temperature crucibles made of iridium are used in the Czochralski process to produce oxide single-crystals (such as sapphires) for use in computer memory devices and in solid state lasers. [60] [65] The crystals, such as gadolinium gallium garnet and yttrium gallium garnet, are grown by melting pre-sintered charges of mixed oxides under oxidizing conditions at temperatures up to 2100 °C. [7]Iridium compounds are used as catalysts in the Cativa process for carbonylation of methanol to produce acetic acid. [66]The radioisotope iridium-192 is one of the two most important sources of energy for use in industrial γ-radiography for non-destructive testing of metals. [67] [68] Additionally, 192 Ir is used as a source of gamma radiation for the treatment of cancer using brachytherapy, a form of radiotherapy where a sealed radioactive source is placed inside or next to the area requiring treatment. Specific treatments include high-dose-rate prostate brachytherapy, bilary duct brachytherapy, and intracavitary cervix brachytherapy. [13]Iridium is a good catalyst for the decomposition of hydrazine (into hot nitrogen and ammonia), and this is used in practice in low-thrust rocket engines; there are more details in the monopropellant rocket article. Scientific [ edit]International Prototype Metre bar An alloy of 90% platinum and 10% iridium was used in 1889 to construct the International Prototype Metre and kilogram mass, kept by the International Bureau of Weights and Measures near Paris. [13] The meter bar was replaced as the definition of the fundamental unit of length in 1960 by a line in the atomic spectrum of krypton, [note 3] [69] but the kilogram prototype is still the international standard of mass. [70]Iridium has been used in the radioisotope thermoelectric generators of unmanned spacecraft such as the Voyager, Viking, Pioneer, Cassini, Galileo, and New Horizons. Iridium was chosen to encapsulate the plutonium-238 fuel in the generator because it can withstand the operating temperatures of up to 2000 °C and for its great strength. [7]Another use concerns X-ray optics, especially X-ray telescopes. [71] The mirrors of the Chandra X-ray Observatory are coated with a layer of iridium 60 nm thick. Iridium proved to be the best choice for reflecting X-rays after nickel, gold, and platinum were also tested. The iridium layer, which had to be smooth to within a few atoms, was applied by depositing iridium vapor under high vacuum on a base layer of chromium. [72]Iridium is used in particle physics for the production of antiprotons, a form of antimatter. Antiprotons are made by shooting a high-intensity proton beam at a conversion target, which needs to be made from a very high density material. Although tungsten may be used instead, iridium has the advantage of better stability under the shock waves induced by the temperature rise due to the incident beam. [73]Oxidative addition to hydrocarbons in organoiridium chemistry [74] [75]Carbon–hydrogen bond activation (C–H activation) is an area of research on reactions that cleave carbon–hydrogen bonds, which were traditionally regarded as unreactive. The first reported successes at activating C–H bonds in saturated hydrocarbons, published in 1982, used organometallic iridium complexes that undergo an oxidative addition with the hydrocarbon. [74] [75]Iridium complexes are being investigated as catalysts for asymmetric hydrogenation. These catalysts have been used in the synthesis of natural products and able to hydrogenate certain difficult substrates, such as unfunctionalized alkenes, enantioselectively (generating only one of the two possible enantiomers ). [76] [77]Iridium forms a variety of complexes of fundamental interest in triplet harvesting. [78] [79] [80]Historical [ edit]Fountain pen nib labeled Iridium Point Iridium–osmium alloys were used in fountain pen nib tips. The first major use of iridium was in 1834 in nibs mounted on gold. [7] Since 1944, the famous Parker 51 fountain pen was fitted with a nib tipped by a ruthenium and iridium alloy (with 3.8% iridium). The tip material in modern fountain pens is still conventionally called "iridium", although there is seldom any iridium in it; other metals such as ruthenium, osmium and tungsten have taken its place. [81]An iridium–platinum alloy was used for the touch holes or vent pieces of cannon. According to a report of the Paris Exhibition of 1867, one of the pieces being exhibited by Johnson and Matthey "has been used in a Withworth gun for more than 3000 rounds, and scarcely shows signs of wear yet. Those who know the constant trouble and expense which are occasioned by the wearing of the vent-pieces of cannon when in active service, will appreciate this important adaptation". [82]The pigment iridium black, which consists of very finely divided iridium, is used for painting porcelain an intense black; it was said that "all other porcelain black colors appear grey by the side of it". [83]Precautions [ edit]Iridium in bulk metallic form is not biologically important or hazardous to health due to its lack of reactivity with tissues; there are only about 20 parts per trillion of iridium in human tissue. [13] Like most metals, finely divided iridium powder can be hazardous to handle, as it is an irritant and may ignite in air. [45] Very little is known about the toxicity of iridium compounds, because they are used in very small amounts, but soluble salts, such as the iridium halides, could be hazardous due to elements other than iridium or due to iridium itself. [28] However, most iridium compounds are insoluble, which makes absorption into the body difficult. [13]A radioisotope of iridium, 192Ir, is dangerous, like other radioactive isotopes. The only reported injuries related to iridium concern accidental exposure to radiation from 192Ir used in brachytherapy. [28] High-energy gamma radiation from 192Ir can increase the risk of cancer. External exposure can cause burns, radiation poisoning, and death. Ingestion of 192 Ir can burn the linings of the stomach and the intestines. [84] 192 Ir, 192m Ir, and 194m Ir tend to deposit in the liver, and can pose health hazards from both gamma and beta radiation. [43]Notes [ edit]^ Most common oxidation states of iridium are in bold. The right column lists one representative compound for each oxidation state.^ Iridium literally means "of rainbows".^ The definition of the meter was changed again in 1983. The meter is currently defined as the distance traveled by light in a vacuum during a time interval of 1 ⁄ 299,792,458of a second. References [ edit]^ Meija, J.; et al. (2016). "Atomic weights of the elements 2013 (IUPAC Technical Report)". Pure and Applied Chemistry. 88 (3): 265–91. doi: 10.1515/pac-2015-0305.^ a b c Wang, Guanjun; Zhou, Mingfei; Goettel, James T.; Schrobilgen, Gary G.; Su, Jing; Li, Jun; Schlöder, Tobias; Riedel, Sebastian (2014). "Identification of an iridium-containing compound with a formal oxidation state of IX". Nature. 514: 475–477. Bibcode: 2014Natur.514..475W. doi: 10.1038/nature13795. PMID 25341786.^ Lide, D. R., ed. (2005). "Magnetic susceptibility of the elements and inorganic compounds". CRC Handbook of Chemistry and Physics (PDF) (86th ed.). Boca Raton (FL): CRC Press. ISBN 0-8493-0486-5.^ Weast, Robert (1984). CRC, Handbook of Chemistry and Physics. Boca Raton, Florida: Chemical Rubber Company Publishing. pp. E110. ISBN 0-8493-0464-4.^ Becker, Luann (2002). "Repeated Blows" (PDF). Scientific American. 286 (3): 77–83. Bibcode: 2002Sci Am.286c..76B. doi: 10.1038/scientificamerican0302-76. Retrieved January 19, 2016.^ a b c d e f g h i j k l m n Greenwood, N. N.; Earnshaw, A. (1997). Chemistry of the Elements (2nd ed.). Oxford: Butterworth–Heinemann. pp. 1113–1143, 1294. ISBN 0-7506-3365-4. OCLC 213025882.^ a b c d e f g h i j k l m n o Hunt, L. B. (1987). "A History of Iridium" (PDF). Platinum Metals Review. 31 (1): 32–41.^ Kittel, C. (2004). Introduction to Solid state Physics (7th ed.). Wiley-India. ISBN 81-265-1045-5.^ Arblaster, J. W. (1995). "Osmium, the Densest Metal Known". Platinum Metals Review. 39 (4): 164.^ Cotton, Simon (1997). Chemistry of Precious Metals. Springer-Verlag New York, LLC. p. 78. ISBN 978-0-7514-0413-5.^ Lide, D. R. (1990). CRC Handbook of Chemistry and Physics (70th ed.). Boca Raton (FL): CRC Press.^ Arblaster, J. W. (1989). "Densities of osmium and iridium: recalculations based upon a review of the latest crystallographic data" (PDF). Platinum Metals Review. 33 (1): 14–16.^ a b c d e f g h i j Emsley, J. (2003). "Iridium". Nature's Building Blocks: An A–Z Guide to the Elements. Oxford, England, UK: Oxford University Press. pp. 201–204. ISBN 0-19-850340-7.^ Emsley, John (2011). Nature's Building Blocks: An A-Z Guide to the Elements (New ed.). New York, NY: Oxford University Press. ISBN 978-0-19-960563-7.^ a b Perry, D. L. (1995). Handbook of Inorganic Compounds. CRC Press. pp. 203–204. ISBN 1439814619.^ Lagowski, J. J., ed. (2004). Chemistry Foundations and Applications. 2. Thomson Gale. pp. 250–251. ISBN 0028657233.^ Jung, D.; Demazeau, Gérard (1995). "High Oxygen Pressure and the Preparation of New Iridium (VI) Oxides with Perovskite Structure: Sr 2MIr O 6 (M = Ca, Mg)". Journal of Solid State Chemistry. 115 (2): 447–455. Bibcode: 1995JSSCh.115..447J. doi: 10.1006/jssc.1995.1158.^ Gong, Y.; Zhou, M.; Kaupp, M.; Riedel, S. (2009). "Formation and Characterization of the Iridium Tetroxide Molecule with Iridium in the Oxidation State +VIII". Angewandte Chemie International Edition. 48 (42): 7879–7883. doi: 10.1002/anie.200902733.^ Gulliver, D. J.; Levason, W. (1982). "The chemistry of ruthenium, osmium, rhodium, iridium, palladium and platinum in the higher oxidation states". Coordination Chemistry Reviews. 46: 1–127. doi: 10.1016/0010-8545 (82)85001-7.^ Holleman, A. F.; Wiberg, E.; Wiberg, N. (2001). Inorganic Chemistry (1st ed.). Academic Press. ISBN 0-12-352651-5. OCLC 47901436.^ Černý, R.; Joubert, J.-M.; Kohlmann, H.; Yvon, K. (2002). " Mg 6Ir 2H 11, a new metal hydride containing saddle-like Ir H 5−4 and square-pyramidal Ir H 4−5 hydrido complexes". Journal of Alloys and Compounds. 340 (1–2): 180–188. doi: 10.1016/S0925-8388 (02)00050-6.^ a b c d e Renner, H.; Schlamp, G.; Kleinwächter, I.; Drost, E.; Lüschow, H. M.; Tews, P.; Panster, P.; Diehl, M.; et al. (2002). "Platinum group metals and compounds". Ullmann's Encyclopedia of Industrial Chemistry. Wiley. doi: 10.1002/14356007.a21_075.^ Vaska, L.; Di Luzio, J. W. (1961). "Carbonyl and Hydrido-Carbonyl Complexes of Iridium by Reaction with Alcohols. Hydrido Complexes by Reaction with Acid". Journal of the American Chemical Society. 83 (12): 2784–2785. doi: 10.1021/ja01473a054.^ Crabtree, R. H. (1979). "Iridium compounds in catalysis". Accounts of Chemical Research. 12 (9): 331–337. doi: 10.1021/ar50141a005.^ Crabtree, R. H. (2005). The Organometallic Chemistry of the Transition Metals (PDF). Wiley. ISBN 0471662569. OCLC 224478241. Archived from the original (PDF) on 2012-11-19.^ Research and Development. furuyametals.co.jp^ a b c d e Audi, G.; Bersillon, O.; Blachot, J.; Wapstra, A. H. (2003). "The NUBASE Evaluation of Nuclear and Decay Properties". Nuclear Physics A. Atomic Mass Data Center. 729: 3–128. Bibcode: 2003Nu Ph A.729....3A. doi: 10.1016/j.nuclphysa.2003.11.001.^ a b c Mager Stellman, J. (1998). "Iridium". Encyclopaedia of Occupational Health and Safety. International Labour Organization. p. 63.19. ISBN 978-92-2-109816-4. OCLC 35279504.^ Arblaster, J. W. (2003). "The discoverers of the iridium isotopes: the thirty-six known iridium isotopes found between 1934 and 2001". Platinum Metals Review. 47 (4): 167–174.^ a b Chereminisoff, N. P. (1990). Handbook of Ceramics and Composites. CRC Press. p. 424. ISBN 0-8247-8006-X.^ Ogden, J. M. (1976). "The So-Called 'Platinum' Inclusions in Egyptian Goldwork". The Journal of Egyptian Archaeology. 62: 138–144. doi: 10.2307/3856354. JSTOR 3856354.^ Chaston, J. C. (1980). "The Powder Metallurgy of Platinum" (PDF). Platinum Metals Rev. 24 (21): 70–79.^ Mc Donald, M. (1959). "The Platinum of New Granada: Mining and Metallurgy in the Spanish Colonial Empire". Platinum Metals Review. 3 (4): 140–145.^ Juan, J.; de Ulloa, A. (1748). Relación histórica del viage a la América Meridional (in Spanish). 1. p. 606.^ Thomson, T. (1831). A System of Chemistry of Inorganic Bodies. Baldwin & Cradock, London; and William Blackwood, Edinburgh. p. 693.^ a b Griffith, W. P. (2004). "Bicentenary of Four Platinum Group Metals. Part II: Osmium and iridium – events surrounding their discoveries". Platinum Metals Review. 48 (4): 182–189. doi: 10.1595/147106704x4844.^ Weeks, M. E. (1968). Discovery of the Elements (7th ed.). Journal of Chemical Education. pp. 414–418. ISBN 0-8486-8579-2. OCLC 23991202.^ Tennant, S. (1804). "On Two Metals, Found in the Black Powder Remaining after the Solution of Platina". Philosophical Transactions of the Royal Society of London. 94: 411–418. doi: 10.1098/rstl.1804.0018. JSTOR 107152.^ Trigg, G. L. (1995). Landmark Experiments in Twentieth Century Physics. Courier Dover Publications. pp. 179–190. ISBN 0-486-28526-X. OCLC 31409781.^ Mössbauer, R. L. (1958). "Gammastrahlung in Ir 191 ". Zeitschrift für Physik A (in German). 151 (2): 124–143. Bibcode: 1958ZPhy..151..124M. doi: 10.1007/BF01344210.^ Waller, I. (1964). "The Nobel Prize in Physics 1961: presentation speech". Nobel Lectures, Physics 1942–1962. Elsevier.^ Scott, E. R. D.; Wasson, J. T.; Buchwald, V. F. (1973). "The chemical classification of iron meteorites—VII. A reinvestigation of irons with Ge concentrations between 25 and 80 ppm". Geochimica et Cosmochimica Acta. 37 (8): 1957–1983. Bibcode: 1973Ge Co A..37.1957S. doi: 10.1016/0016-7037 (73)90151-8.^ a b "Iridium" (PDF). Human Health Fact Sheet. Argonne National Laboratory. 2005. Archived from the original (PDF) on March 4, 2012. Retrieved 2008-09-20.^ Xiao, Z.; Laplante, A. R. (2004). "Characterizing and recovering the platinum group minerals—a review". Minerals Engineering. 17 (9–10): 961–979. doi: 10.1016/j.mineng.2004.04.001.^ a b c d Seymour, R. J.; O'Farrelly, J. I. (2001). "Platinum-group metals". Kirk Othmer Encyclopedia of Chemical Technology. Wiley. doi: 10.1002/0471238961.1612012019052513.a01.pub2.^ a b Alvarez, L. W.; Alvarez, W.; Asaro, F.; Michel, H. V. (1980). "Extraterrestrial cause for the Cretaceous–Tertiary extinction" (PDF). Science. 208 (4448): 1095–1108. Bibcode: 1980Sci...208.1095A. doi: 10.1126/science.208.4448.1095. PMID 17783054.^ Hildebrand, A. R.; Penfield, Glen T.; Kring, David A.; Pilkington, Mark; Zanoguera, Antonio Camargo; Jacobsen, Stein B.; Boynton, William V. (1991). "Chicxulub Crater; a possible Cretaceous/Tertiary boundary impact crater on the Yucatan Peninsula, Mexico". Geology. 19 (9): 867–871. Bibcode: 1991Geo....19..867H. doi: 10.1130/0091-7613 (1991)019<0867: CCAPCT>2.3. CO;2.^ Frankel, C. (1999). The End of the Dinosaurs: Chicxulub Crater and Mass Extinctions. Cambridge University Press. ISBN 0-521-47447-7. OCLC 40298401.^ Ryder, G.; Fastovsky, D. E.; Gartner, S. (1996). The Cretaceous-Tertiary Event and Other Catastrophes in Earth History. Geological Society of America. p. 47. ISBN 0-8137-2307-8.^ Toutain, J.-P.; Meyer, G. (1989). "Iridium-Bearing Sublimates at a Hot-Spot Volcano (Piton De La Fournaise, Indian Ocean)". Geophysical Research Letters. 16 (12): 1391–1394. Bibcode: 1989Geo RL..16.1391T. doi: 10.1029/GL016i012p01391.^ a b c d Platinum-Group Metals. U. S. Geological Survey Mineral Commodity Summaries^ Gilchrist, Raleigh (1943). "The Platinum Metals". Chemical Reviews. 32 (3): 277–372. doi: 10.1021/cr60103a002.^ Ohriner, E. K. (2008). "Processing of Iridium and Iridium Alloys". Platinum Metals Review. 52 (3): 186–197. doi: 10.1595/147106708X333827.^ Hunt, L. B.; Lever, F. M. (1969). "Platinum Metals: A Survey of Productive Resources to industrial Uses" (PDF). Platinum Metals Review. 13 (4): 126–138.^ Hagelüken, C. (2006). "Markets for the catalysts metals platinum, palladium, and rhodium" (PDF). Metall. 60 (1–2): 31–42. Archived from the original (PDF) on March 4, 2009.^ "Platinum 2013 Interim Review" (PDF). Platinum Today. Johnson Matthey Plc. Retrieved 2014-01-10.^ Jollie, D. (2008). Platinum 2008 (PDF). Johnson Matthey. ISSN 0268-7305. Retrieved 2008-10-13.^ Egorova, R. V.; Korotkov, B. V.; Yaroshchuk, E. G.; Mirkus, K. A.; Dorofeev N. A.; Serkov, A. T. (1979). "Spinnerets for viscose rayon cord yarn". Fibre Chemistry. 10 (4): 377–378. doi: 10.1007/BF00543390.^ Emsley, J. (2005-01-18). "Iridium" (PDF). Visual Elements Periodic Table. Royal Society of Chemistry. Retrieved 2008-09-17.^ a b Handley, J. R. (1986). "Increasing Applications for Iridium" (PDF). Platinum Metals Review. 30 (1): 12–13.^ Stallforth, H.; Revell, P. A. (2000). Euromat 99. Wiley-VCH. ISBN 978-3-527-30124-9.^ US 3293031A, Cresswell, Peter & Rhys, David, published 20/12/1966^ Darling, A. S. (1960). "Iridium Platinum Alloys" (PDF). Platinum Metals Review. 4 (l): 18–26. Bibcode: 1960Natur.186Q.211.. doi: 10.1038/186211a0. Retrieved 2008-10-13.^ Biggs, T.; Taylor, S. S.; van der Lingen, E. (2005). "The Hardening of Platinum Alloys for Potential Jewellery Application". Platinum Metals Review. 49 (1): 2–15. doi: 10.1595/147106705X24409.^ Crookes, W. (1908). "On the Use of Iridium Crucibles in Chemical Operations". Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character. 80 (541): 535–536. Bibcode: 1908RSPSA..80..535C. doi: 10.1098/rspa.1908.0046. JSTOR 93031.^ Cheung, H.; Tanke, R. S.; Torrence, G. P. (2000). "Acetic acid". Ullmann's Encyclopedia of Industrial Chemistry. Wiley. doi: 10.1002/14356007.a01_045.^ Halmshaw, R. (1954). "The use and scope of Iridium 192 for the radiography of steel". British Journal of Applied Physics. 5 (7): 238–243. Bibcode: 1954BJAP....5..238H. doi: 10.1088/0508-3443/5/7/302.^ Hellier, Chuck (2001). Handbook of Nondestructive Evlaluation. The Mc Graw-Hill Companies. ISBN 978-0-07-028121-9.^ Penzes, W. B. (2001). "Time Line for the Definition of the Meter". National Institute for Standards and Technology. Retrieved 2008-09-16.^ General section citations: Recalibration of the U. S. National Prototype Kilogram, R. S. Davis, Journal of Research of the National Bureau of Standards, 90, No. 4, July–August 1985 ( 5.5 MB PDF ); and The Kilogram and Measurements of Mass and Force, Z. J. Jabbour et al., J. Res. Natl. Inst. Stand. Technol. 106, 2001, 25–46 ( 3.5 MB PDF)^ Ziegler, E.; Hignette, O.; Morawe, Ch. ; Tucoulou, R. (2001). "High-efficiency tunable X-ray focusing optics using mirrors and laterally-graded multilayers". Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 467–468: 954–957. Bibcode: 2001NIMPA.467..954Z. doi: 10.1016/S0168-9002 (01)00533-2.^ "Face-to-Face with Jerry Johnston, CXC Program Manager & Bob Hahn, Chief Engineer at Optical Coating Laboratories, Inc., Santa Rosa, CA". Harvard-Smithsonian Center for Astrophysics; Chandra X-ray Center. 1995. Retrieved 2008-09-24.^ Möhl, D. (1997). "Production of low-energy antiprotons". Zeitschrift Hyperfine Interactions. 109: 33–41. Bibcode: 1997Hy Int.109...33M. doi: 10.1023/A:1012680728257.^ a b Janowicz, A. H.; Bergman, R. G. (1982). "Carbon-hydrogen activation in completely saturated hydrocarbons: direct observation of M + R-H → M (R) (H)". Journal of the American Chemical Society. 104 (1): 352–354. doi: 10.1021/ja00365a091.^ a b Hoyano, J. K.; Graham, W. A. G. (1982). "Oxidative addition of the carbon-hydrogen bonds of neopentane and cyclohexane to a photochemically generated iridium (I) complex". Journal of the American Chemical Society. 104 (13): 3723–3725. doi: 10.1021/ja00377a032.^ Källström, K; Munslow, I; Andersson, P G (2006). "Ir-catalysed asymmetric hydrogenation: Ligands, substrates and mechanism". Chemistry: A European Journal. 12 (12): 3194–3200. doi: 10.1002/chem.200500755. PMID 16304642.^ Roseblade, S. J.; Pfaltz, A. (2007). "Iridium-catalyzed asymmetric hydrogenation of olefins". Accounts of Chemical Research. 40 (12): 1402–1411. doi: 10.1021/ar700113g. PMID 17672517.^ Wang, X.; Andersson, M. R.; Thompson, M. E.; Inganäsa, O. (2004). "Electrophosphorescence from substituted poly (thiophene) doped with iridium or platinum complex". Thin Solid Films. 468 (1–2): 226–233. Bibcode: 2004TSF...468..226W. doi: 10.1016/j.tsf.2004.05.095.^ Tonzetich, Zachary J. (2002). "Organic Light Emitting Diodes—Developing Chemicals to Light the Future" (PDF). Journal of Undergraduate Research. Rochester University. 1 (1). Retrieved 2008-10-10.^ Holder, E.; Langefeld, B. M. W.; Schubert, U. S. (2005-04-25). "New Trends in the Use of Transition Metal-Ligand Complexes for Applications in Electroluminescent Devices". Advanced Materials. 17 (9): 1109–1121. doi: 10.1002/adma.200400284.^ Mottishaw, J. (1999). "Notes from the Nib Works—Where's the Iridium?". The PENnant. XIII (2).^ Crookes, W., ed. (1867). "The Paris Exhibition". The Chemical News and Journal of Physical Science. XV: 182.^ Pepper, J. H. (1861). The Playbook of Metals: Including Personal Narratives of Visits to Coal, Lead, Copper, and Tin Mines, with a Large Number of Interesting Experiments Relating to Alchemy and the Chemistry of the Fifty Metallic Elements. Routledge, Warne, and Routledge. p. 455.^ "Radioisotope Brief: Iridium-192 (Ir-192)" (PDF). Radiation Emergencies. Centers for Disease Control and Prevention. 2004-08-18. Retrieved 2008-09-20. External links [ edit]Wikimedia Commons has media related to Iridium. Look up iridium in Wiktionary, the free dictionary. Iridium at The Periodic Table of Videos (University of Nottingham)Iridium in Encyclopædia Britannica [ hide]v t e Periodic table (Large cells)1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 181 H He2 Li Be B C N O F Ne3 Na Mg Al Si P S Cl Ar4 K Ca Sc Ti V Cr Mn Fe Co Ni Cu Zn Ga Ge As Se Br Kr5 Rb Sr Y Zr Nb Mo Tc Ru Rh Pd Ag Cd In Sn Sb Te I Xe6 Cs Ba La Ce Pr Nd Pm Sm Eu Gd Tb Dy Ho Er Tm Yb Lu Hf Ta W Re Os Ir Pt Au Hg Tl Pb Bi Po At Rn7 Fr Ra Ac Th Pa U Np Pu Am Cm Bk Cf Es Fm Md No Lr Rf Db Sg Bh Hs Mt Ds Rg Cn Nh Fl Mc Lv Ts Og Alkali metal Alkaline earth metal Lanthanide Actinide Transition metal Post-transition metal Metalloid Polyatomic nonmetal Diatomic nonmetal Noble gas Unknown chemical properties [ show]v t e Iridium compounds Authority control LCCN: sh85068067 GND: 4162402-6 NDL: 00564222Categories: Iridium Chemical elements Transition metals Precious metals Noble metals Impact event minerals Meteorite minerals Native element minerals
|
D1768538
|
http://www.foodandwine.com/articles/best-sauvignon-blancs-for-fans-and-skeptics
|
Best Sauvignon Blancs for Fans & Skeptics
|
Some people love Sauvignon Blanc—it’s tart and refreshing, the perfect summer party wine. For others, it’s the liquid equivalent of nails on a chalkboard. F&W’s Ray Isle looks into this crisp white’s vast range of flavors and finds bottles even a Sauvignon skeptic can love. Ray Isle July 16, 2012In this Article15 Sauvignon Blancs to Try Video: Summer Wines When it comes to Sauvignon Blanc, the latest news is startling. Earlier this year, Moscato—celebrated in hip-hop hits by Drake, Lil’ Kim and Waka Flocka Flame—shoved Sauvignon Blanc aside to become the third-most-popular white-wine variety in America (after Chardonnay and Pinot Grigio). This is an ignoble fate for a noble grape, though it’s possibly a testimony to the unlikely power that hip-hop stars wield over the US wine market. But Sauvignon Blanc has always been a love-hate proposition, much like cilantro or beets. Some people adore it, and some people flat-out can’t stand it. What captivates people about Sauvignon Blanc is its crispness, its citrusy zing, its refreshing vivacity—all those qualities that make it one of the best wines for hot summer days. It’s an edgy wine, tart by nature, which is why acid heads, as they’re known in the sommelier world, are all for it. On the other hand, for fans of big, buttery Chardonnays (or soft, sweet Moscatos), that thrilling acidity may seem shrill and harsh. An even bigger problem for Sauvignon Blanc is that it sometimes smells and tastes like a green vegetable, specifically bell peppers. Some people find this pungency appealing, particularly when it’s relatively subtle and reminiscent of fresh-cut grass. Others—my wife, for instance—find it revolting. In fact, when I asked her recently why she didn’t like Sauvignon Blanc, that was the word she used. She also said it reminded her of the Wicked Witch of the West: “It’s green, pinched and nasty.” She made claws with her hands to emphasize Sauvignon’s Wicked Witch-ness and added matter-of-factly, “It’s really everything I loathe in the world.” And then she left for work. All right then, I thought, no Sauvignon Blanc for you. But it also occurred to me that, since my wife is hardly alone in her feelings, winemakers who specialize in Sauvignon Blanc must deal with this attitude all the time. So I called up Kevin Judd and asked him about it. For 25 years, Judd made wine at Cloudy Bay, New Zealand’s most famous Sauvignon Blanc producer, and he has continued producing it at his new winery, Greywacke. At Cloudy Bay, Judd pretty much defined the original New Zealand style: intense, herbaceous and flamboyant. Certainly he must have run into his share of Sauvignon despisers over the years. Judd admitted this was true. “I regularly meet people who say, ‘Oh, I’m not really a fan of Sauvignon Blanc,’ ” he said. “They almost whisper it, as if it were some sort of terrible secret.”He added, “But with Greywacke, I’m steering away from that in-your-face style.” While Judd’s 2011 Greywacke Sauvignon Blanc is fresh and vibrant, with zingy passion fruit and grapefruit flavors, it eschews the intense green-peppery notes that were once the hallmark of New Zealand Sauvignon Blanc. Many New Zealand producers have headed in a similar direction, including Cloudy Bay itself. Cloudy Bay’s current winemaker, Tim Heath, says, “We’re at a nice midpoint now, with ripe flavors underpinned by fresh herbal notes. They’re what I call the ‘positive greens’—more fresh herbs and grass than bell peppers and jalapeños.”Those notes come from a class of naturally occurring compounds called methoxypyrazines. The chemistry gets complex quickly, but the key thing to know is that by managing how much sunlight the grapes get—by pruning back the leaves that shade the grape bunches, for instance—and by choosing when to pick, a vineyard manager can influence how “green” a Sauvignon Blanc will be, at least to a degree. (And it’s really the vineyard manager who is in control, not the winemaker. As Heath explained to me, “Once the methoxypyrazines are in your juice, there’s not much you can do to them.”)Of course, winemaking also plays a role in how Sauvignon Blanc tastes. Age a Sauvignon in oak barrels instead of stainless steel tanks (as is common in Bordeaux, where blending with Sémillon is also standard) and it becomes a very different wine. But most aren’t oak-aged, and generally speaking, the climate of the region where Sauvignon Blanc is grown determines what character it will have more than anything else. Sauvignon Blanc has fans and skeptics. Illustration © Alex Nabaum. Warm places, like Napa Valley, much of Australia and central Chile, are known for softer, fruitier Sauvignon Blancs, with citrus-melon flavors and very few herbal or grassy notes—and sometimes no real acidity, either. That can be depressing, because a flabby Sauvignon Blanc is like a fat greyhound: It’s just wrong. But for a good, appropriately taut sense of this style, Napa Valley’s Honig is impressively reliable. For more zing, and flavors suggesting grapefruit and sometimes passion fruit with notes of fresh herbs or cut grass, head to cooler places, such as coastal Chile, northern Italy, Austria and especially France’s Loire Valley. The Loire was making great Sauvignon Blancs when people in New Zealand’s Marlborough region and Napa Valley were still selling lumber and harvesting prunes, respectively; it’s essentially the benchmark region for the variety. To get a sense of the differences between the Sauvignon Blancs of the Loire’s two most renowned appellations, Sancerre and Pouilly-Fumé, taste wines from a top property like Domaine Fournier or Pascal Jolivet side by side. Or compare a world-class Sancerre like Domaine Vacheron’s to Concha y Toro’s superb Terrunyo Sauvignon Blanc, from Chile’s windswept Casablanca Valley—the results can be fascinating. The coldest wine-growing areas, like Marlborough or Elgin in South Africa, give Sauvignons a distinctive passion fruit-gooseberry intensity. They’re also where the “positive greens,” as Tim Heath calls them—and sometimes notes of bell pepper or even jalapeño—are often most pronounced. Cloudy Bay is unquestionably the emblematic Marlborough wine (and it’s also very good). For a slightly subtler take on the New Zealand style, look for Craggy Range’s elegant Te Muna Road bottling, which comes from the moderately warmer Martinborough region, some 19 miles away, across the Cook Strait on the North Island. My advice to seekers of the ideal Sauvignon, though, is not simply to focus on Marlborough versus Martinborough or Sancerre versus Pouilly-Fumé. Instead, try wines from around the world, from all three climates: warm, cool, cold. Line them up next to one another and taste each one. You’ll know instantly which you prefer. Then cook something summery to go with it. Sauvignon Blanc is an incredibly food-friendly wine: The bright acidity refreshes the palate, the citrus flavors can accompany a vast range of foods, the alcohol levels tend to be modest, and in the end, the herbal notes accentuate food much the way herbs themselves do. But if, no matter how hard you try, this lovely, summery grape still reminds you of a green, pinched, nasty person on a broom, take comfort: At least Sauvignon Blanc is never going to come after you with an army of evil flying monkeys.15 Sauvignon Blancs to Try2011 Cliff Lede Sauvignon Blanc ($23)This ripe, almost luscious Napa Valley white from Cliff Lede (pronounced “lady”) comes from a Stags Leap District estate that also produces superlative Cabernet Sauvignon.2011 Franciscan Napa Valley Sauvignon Blanc ($17)Franciscan has made wine in Napa Valley since the early 1970s, but it only started producing this juicy, melony Sauvignon in 2007.2010 Joseph Phelps Estate Grown Sauvignon Blanc ($32)Phelps uses French oak barrels to age this generous wine—a technique borrowed from the classic white wines of Bordeaux that adds texture and richness.2010 Beckmen Vineyards Santa Ynez Valley Estate Sauvignon Blanc ($16)Juicy ruby-red grapefruit flavors mark this wine from one of the Central Coast’s top producers.2011 Geyser Peak California Sauvignon Blanc ($13)Year in and year out, this crisp, balanced white is one of the best California Sauvignon Blanc deals around.2011 Matetic Corralillo San Antonio Valley Sauvignon Blanc ($16)Unusual for Chilean Sauvignon Blanc (and Chilean wines in general), this minerally bottling from Matetic uses 100 percent organically certified grapes.2011 Montes Limited Selection Leyda Vineyard Sauvignon Blanc ($15)Montes was among the first Chilean wineries to explore the relatively cool Leyda Valley, where this citrusy white comes from.2011 Lake Chalice Marlborough Sauvignon Blanc ($19)Abundant citrus and passion fruit flavors—that is, classic New Zealand Sauvignon Blanc character—are the signature of this vibrant white.2011 Greywacke Marlborough Sauvignon Blanc ($20)Cut grass, a touch of green pepper and juicy passion fruit notes make Greywacke a New Zealand classic, even though this is only its third vintage.2011 Cloudy Bay Sauvignon Blanc ($25)The Sauvignon Blanc that made New Zealand’s reputation for that grape in the 1980s is still one of the country’s best: citrusy and lightly herbal, with a terrific, succulent texture.2011 Domaine Vacheron Sancerre ($34)Complex and impeccably balanced, with layers of herb and citrus flavor, this wine shows why Vacheron is one of Sancerre’s greatest producers.2011 Jean-Paul Picard Sancerre ($22)The Picard family’s 400 or so years of making wine show in the quality of this elegant white, all fresh herb and grapefruit flavors.2011 Alphonse Mellot La Moussière Sancerre ($30)Mellot’s La Moussière bottling is incredibly minerally—it’s almost as if one can taste the region’s limestone soil in the wine itself.2010 Domaine Fournier Père & Fils Les Deux Cailloux Pouilly-Fumé ($25)Pouilly-Fumé tends to have a slightly denser texture than Sancerre, as well as a light smoky note. Fournier’s bottling is a great example.2010 Tokara Reserve Elgin Sauvignon Blanc ($22)Those who appreciate Sauvignon Blanc’s green-peppery side will love this bottling, which comes from South Africa’s chilly Elgin appellation. Video: Favorite Summer Wines You May Like Sauvingnon Blanc Wine 101: Sauvignon Blanc Sauvingnon Blanc Best American Wines $15 & Under: Sauvignon Blanc Articles Summery Sauvignon Blancs Articles Blanc Check Articles Medlock Ames Winery: Nirvana in Sonoma White Wine Best $15-and-Under White Wines
|
D683360
|
http://www.parentingscience.com/authoritarian-parenting.html
|
Authoritarian parenting: What happens to the kids?
|
Authoritarian parenting: What happens to the kids? Photo by CEphoto, Uwe Aranas© 2010-2017 Gwen Dewar, Ph. D., all rights reserved The authoritarian parenting style is about being strict and stern. It insists on unquestioning obedience, and enforces good behavior through threats, shaming, and other punishments. As defined by psychologists, it's also a style associated with less parental warmth and responsiveness (Baumrind 1991). That doesn't bode well for a child's health outcomes, especially if she's growing up in an otherwise stressful environment. As I note in this article, studies suggest that responsiveness and warmth can protect kids from the effects of toxic stress. But what about other things -- like behavior problems? Social Skills? Emotional well-being? Academic achievement? If authoritarian parents are demanding, doesn't that at least suggest they'd produce kids who are better-behaved and more successful in the classroom? Surprisingly, the evidence indicates otherwise. Here is an overview of the research. Authoritarianism and the alternatives Researchers recognize at least three alternatives to authoritarian parenting:• Permissive parents are emotionally warm, but reluctant to enforce rules or standards of conduct.• Uninvolved parents are like permissive parents, but they lack warmth• Authoritative parents, like authoritarian parents, set limits and enforce standards. But unlike authoritarian parents, authoritative parents are very responsive or nurturing. In addition, authoritative parents encourage their kids to ask questions, and they explain the rationale behind the rules. Authoritative parents are also less likely to control kids through the induction of shame, guilt, or the withdrawal of love. How does authoritarianism measure up? Behavior problems Mounting evidence that heavy-handed tactics make kids worse When kids misbehave, it might seem tempting to enforce good behavior through threats, harsh punishments, and other forms of psychological control. But research suggests these tactics don't result in long-term behavioral improvements. On the contrary, they seem to make things worse. For instance, let's consider what psychologists call "externalizing behavior problems" -- disruptive, aggressive, defiant, or anti-social conduct. If authoritarian disciplinary tactics work, we should expect them to lead to fewer such behavior problems as children get older. But that isn't what we observe when we track children's development. In a recent meta-analysis of more than 1400 published studies, Martin Pinquart found that harsh control and psychological control were actually the biggest predictors of worsening behavior problems over time (Pinquart 2017). Kids subjected to these authoritarian tactics at one time point tended to develop more externalizing behavior problems at later time points. What about other types of misbehavior? Like adolescent alcohol use? Once again, the most current evidence suggests that kids with authoritarian parents are more, not less likely to use and abuse alcohol (Glozah 2014; Calafat et al 2014). Social skills and resourcefulness Kids from authoritarian families are less resourceful, less socially-adept, and more likely to become involved in bullying. This generalization appears to apply across a variety of cultures. Kids from authoritarian families may find it more difficult to fend for themselves and make friends. And they are at higher risk for involvement in bullying -- both as perpetrators and as victims. Examples? The United States Studies of American adolescents have reported that teens with authoritarian parents were the least likely to feel socially accepted by their peers. They were also rated as less self-reliant (Lamborn et al 1991; Steinberg et al 1992; Steinberg et al 1994). In addition, a recent study of U. S. college students found that students raised by authoritarian parents were more likely to engage in acts of bullying (Luk et al 2016). China One study of 2nd graders in Beijing found that kids from authoritarian families were rated as less socially competent by their teachers. They were also more aggressive and less likely to be accepted by their peers (Chen et al 1997). Other Chinese research has linked the punitive aspects of authoritarianism with poorer social functioning (Zhou et al 2004). Cyprus When researchers questioned 231 young adolescents about their cultural values and experiences with peers, they found that kids from authoritarian homes were more likely to have experienced bullying -- both as victims and perpetrators (Georgiou et al 2013). Turkey In a study of Turkish high school students, kids from authoritarian families were rated as less resourceful than kids from authoritarian or permissive parents (Turkel and Tzer 2008). South America and Spain Researchers in Latin cultures report that authoritarian parents are more likely to have kids with low social competence (Martinez et al 2007; Garcia and Gracia 2009). In addition, a Spanish study found links between authoritarian parenting and bullying. High school students with authoritarian parents were more likely to be involved in bullying, particularly if their parents attempted to control them through the use of punitive discipline (Gómez-Ortiz et al 2016). The Netherlands In Dutch studies, kids with authoritarian parents were rated as less helpful and less popular by their teachers and classmates. They were also rated as less mature in their reasoning about moral issues (Dekovic and Jannsens 1992; Jannsens and Dekovic 1997). Emotional problems Does authoritarian parenting put kids at greater risk of anxiety, low self-esteem, and depression? Maybe yes. For example, in a behavioral genetics study of Chinese twins, researchers found that kids with authoritarian fathers were more likely to suffer from a psychiatric disorder -- even after accounting for the influence of genes (Yin et al 2016). Other research in China suggests that authoritarian parenting puts children at higher risk for depression if they have trouble with self-control (Muhtadie et al 2013). And kids with harsh parents tend to have more trouble regulating their emotions (Chang 2003; Wang et al 2006). Links between authoritarianism and emotional problems have also been found in the United States. Behavioral genetics research suggests that authoritarian parenting contributes to the risk of major depression later in life (Long et al 2015). In addition, U. S. studies indicate that adolescents and adults are more likely to suffer depressive symptoms if they characterize their parents as having used authoritarian practices in the past (King et al 2016; Rothrauff et al 2009). Children are more likely to develop symptoms if their mothers embrace authoritarian child-rearing tactics (Calzada et al 2015). And research in other societies paints a similar picture: In Caribbean countries, kids raised by authoritarian parents are more likely to suffer from depression than kids raised by authoritative parents (Lipps et al 2012). Studies of Spanish and Brazilian adolescents have reported that teens from authoritarian homes had lower self-esteem than did teens from authoritative or permissive families (Martinez and Garcia 2007; Martinez and Garcia 2008). German researchers found that teens with authoritarian parents were more likely to suffer from trait anxiety. They were also more likely to experience depersonalization--the feeling of watching oneself act without being in control of one's actions (Wolfradt et al 2003). But the authoritarian parenting style isn’t always linked with emotional problems. Some studies of American adolescents have failed to find emotional differences between kids from authoritarian, authoritative, and permissive homes (Lamborn et al 1991; Steinberg et al 2006). And research on adolescents in the Middle East has also failed to find a link between authoritarian caregiving and psychological problems like depression (Dwairy 2004; Dwairy and Menshar 2006). Why the inconsistencies? I suspect the effects of authoritarianism depend on how harsh, cold, or punitive the parent is. For instance, some research suggests that corporal punishment is linked with higher rates of depression and anxiety among children. It also seems likely that culture plays a role. If kids perceive authoritarianism as normal and mainstream, they may be less distressed by it (Dwairy 2004). What about school? Experimental research suggests that authoritarian approaches interfere with learning. In a fascinating study of kindergarteners, Melissa Kamins and Carol Dweck have shown that a common tactic of authoritarian caregiving--shaming a child for poor performance-- can make kids perform more poorly on problem-solving tasks (Kamins and Dweck 1999). Moreover, experiments suggest that people learn better from positive feedback than from negative feedback, and this may be especially true for kids (Schmittmann et al 2006; van Duijvenvoorde et al 2008). Other studies report correlations between authoritarianism and lower school achievement. For example, a study of adolescents in the San Francisco Bay Area found that the authoritarian parenting style was linked with lower school grades for all ethnic groups (Dornbusch et al 1987). These findings are supported by other, similar studies (Steinberg et al 1989; Steinberg et al 1992). Counter evidence: Are the effects less harmful when parents are less educated? Or live in disadvantaged neighborhoods? Or Chinese? Some studies of kids from lower socioeconomic groups have failed to show any difference in academic performances between authoritative and authoritarian families (Lamborn et al 1996; Steinberg et al 2009). It's even been suggested that kids with relatively less-educated parents do better in school when they are from authoritarian homes (Leung et al 1998). There is also controversy about the effects of authoritarian care-giving in traditional Chinese families. On the one hand, authoritarianism has been linked with poorer school performance in Beijing (Chen et al 1997) and Taiwan (Pong et al 2010). On the other hand, studies of Hong Kong Chinese (Leung et al 1998) and of Chinese immigrants to North America (Chao 2001) have linked authoritarian parenting with higher school achievement. Why the discrepancies? Researchers have suggested several possibilities.• Perhaps kids living in dangerous, disadvantaged neighborhoods are less likely to run afoul of authority figures—in and out of school—when they are taught unquestioning obedience.• Maybe peer pressure swamps the effects of parenting. Some peer groups support school achievement. Others discourage it. One study of U. S. school students found that Asian Americans tended to have peer groups that encouraged scholarship, and they performed well at school even when their parents were authoritarian. African Americans tended to have peer groups that rejected good students. These kids did more poorly in school even when their parents were authoritative and highly-educated (Steinberg et al 1992).• Authoritarian parenting may have different meanings in different cultures. Ruth Chao has argued that the Chinese version of authoritarian parenting is fundamentally different. Unlike Western authoritarian parents, Chinese authoritarian parents have closer relationships to their kids, and closeness is a predictor of higher school achievement (Chao 2001). But I'm a bit skeptical about the idea that authoritarian parenting could make some kids into better students. The experimental research is compelling. Moreover, achievement in math, science, and many other academic fields depends on critical thinking—something that authoritarian parenting seems to discourage. Indeed, there is evidence that schools run along authoritarian principles produce inferior students. In a study comparing American high schools, Lisa Pellerin found that authoritative schools got the best results. Authoritarian schools had the worst rates of dropouts (Pellerin 2004). And morality? Authoritarian parents might see themselves as champions of morality. But, as noted above, studies suggest that kids with authoritarian parents are actually less advanced when it comes to self-regulation and moral reasoning (Dekovic and Jannsens 1992; Jannsens and Dekovic 1997; Karreman et al 2006; Piotrowski et al 2013). Moreover, kids from authoritarian families may be more likely to "tune out" their parents as they get older. For instance, when researchers tracked American middle and high school studies over 18 months, they found that kids who identified their parents as more authoritarian were more likely to reject their parents as legitimate authority figures. They were also more likely to engage in delinquency over time (Trinker et al 2012). And in a study of American undergraduates, researchers asked students who they consulted when they had to make moral decisions. Undergraduates with authoritative parents were the most likely to say they would talk with their parents. Students with authoritarian parents--like students from permissive families--were more likely to reference their peers (Bednar et al 2003). More information For more information about the four basic parenting styles, check out "Parenting styles: A guide for the science-minded." For a more information about the ways that researchers define and identify authoritarian parents, see "The authoritarian parenting style: Definitions, research, and cultural differences. "And if you're interested in Chinese child-rearing, see my article, Traditional Chinese parenting: What research says about Chinese kids and why they succeed References: Authoritarian parenting Bednar DE and Fisher TD. 2003. Peer referencing in adolescent decision making as a function of perceived parenting style. Adolescence. 38 (152):607-21. Calafat A, García F, Juan M, Becoña E, Fernández-Hermida JR. 2014. Which parenting style is more protective against adolescent substance use? Evidence within the European context. Drug Alcohol Depend. 138:185-92. Calzada E, Barajas-Gonzalez RG, Huang KY, Brotman L. 2015. Early Childhood Internalizing Problems in Mexican- and Dominican-Origin Children: The Role of Cultural Socialization and Parenting Practices. J Clin Child Adolesc Psychol. 4:1-12. Chang L, Schwartz D, Dodge K, Mc Bride-Chang C. 2003. Harsh parenting in relation to child emotion regulation and aggression. Journal of Family Psychology. 17:598–606. Chao R. 2001. Extending research on the consequences of parenting style for Chinese Americans and European Americans. Child Development 72: 1832-1843. Chao R. 1994. Beyond parental control; authoritarian parenting style: Understanding Chinese parenting through the cultural notion of training. Child Development 45: 1111-1119. Chen X, Dong Q, Zhou H. 1997 Authoritative and Authoritarian Parenting Practices and Social and School Performance in Chinese Children. International Journal of Behavioral Development, 21 (4): 855-873Crone EA, Ridderinkhof KR, Worm M, Somsen RJ, van der Molen MW (2004) Switching between spatial stimulus-response mappings: a developmental study of cognitive flexibility. Dev Sci 7:443–455. Dekovic M and Janssens JM. 1992. Parents' child: Rearing style and child's sociometric status." Developmental Psychology 28 (5): 925-932. Dornbusch SM, Ritter PL, Leiderman PH, Roberts DF, Fraleigh MJ. 1987. The relation of parenting style to adolescent school performance. Child Dev. 58 (5):1244-57. Dwairy M and Menshar KE. 2006. Parenting style, individuation, and mental health of Egyptian adolescents. J Adolesc. 29 (1):103-17. Dwairy M. 2004. Parenting styles and mental health of Palestinian-Arab adolescents in Israel. Transcult Psychiatry. 2004 Jun;41 (2):233-52. Day DM, Peterson-Badali M, and Ruck MD. 2006. The relationship between maternal attitudes and young people's attitudes toward children's rights. J Adolesc. 29 (2):193-207. Georgiou SN, Fousiani K, Michaelides M, and Stavrinides P. 2013. Cultural value orientation and authoritarian parenting as parameters of bullying and victimization at school. Int J Psychol. 48 (1):69-78. Ginsburg KR, Durbin DR, García-España JF, Kalicka EA, and Winston FK. 2009. Associations between parenting styles and teen driving, safety-related behaviors and attitudes. Pediatrics. 124 (4):1040-51. Glozah FN. 2014. Exploring the Role of Self-Esteem and Parenting Patterns on Alcohol Use and Abuse Among Adolescents. Health Psychol Res. 2 (3):1898. Gómez-Ortiz O, Romera EM, Ortega-Ruiz R. 2016. Parenting styles and bullying. The mediating role of parental psychological aggression and physical punishment. Child Abuse Negl. 51:132-43. Janssens JMAM and Dekovic M. 1997. Child Rearing, Prosocial Moral Reasoning, and Prosocial Behaviour. International Journal of Behavioral Development 20 (3): 509-527. Kamins M and Dweck C.1999. Person versus process praise and criticism: Implications for contingent self-worth and coping. Developmental Psychology 30 (3): 835-847. Karreman A, van Tuijl C, can Aken MAG, and Dekovic M. 2006. Parenting and self-regulation in preschoolers: a meta-analysis. Infant and Child Dev. 15: 562-579. Kim H, Chung RH. 2003 Relationship of recalled parenting style to self-perception in Korean American college students. J Genet Psychol. 164 (4):481-92. King KA, Vidourek RA, Merianos AL. 2016. Authoritarian parenting and youth depression: Results from a national study. J Prev Interv Community. 44 (2):130-9. Leung PWL and Kwon KSF. 1998. Parenting Styles, Motivational Orientations, and Self-Perceived Academic Competence: A Mediational Model. Merrill-Palmer Quarterly.44 (1): 1-19. Lipps G, Lowe GA, Gibson RC, Halliday S, Morris A, Clarke N, Wilson RN. 2012. Parenting and depressive symptoms among adolescents in four Caribbean societies. Child Adolesc Psychiatry Ment Health. 6 (1):31. Long EC, Aggen SH, Gardner C, Kendler KS. 2015. Differential parenting and risk for psychopathology: a monozygotic twin difference approach. Soc Psychiatry Psychiatr Epidemiol 50 (10):1569-76. Luk JW, Patock-Peckham JA, Medina M, Terrell N, Belton D, King KM. 2016. Bullying perpetration and victimization as externalizing and internalizing pathways: A retrospective study linking parenting styles and self-esteem to depression, alcohol use, and alcohol-related problems Subst Use Misuse. 51 (1): 113–125. Martínez I, García JF, Yubero S. 2007. Parenting styles and adolescents' self-esteem in Brazil. Psychol Rep. 2007 Jun;100 (3 Pt 1):731-45. Muhtadie L, Zhou Q, Eisenberg N, Wang Y. 2013. Predicting internalizing problems in Chinese children: the unique and interactive effects of parenting and child temperament. Dev Psychopathol. 25 (3):653-67. Pinquart M. 2017. Associations of parenting dimensions and styles with externalizing problems of children and adolescents: An updated meta-analysis. Dev Psychol. 53 (5):873-932Piotrowski JT, Lapierre MA, Linebarger DL.2013. Investigating Correlates of Self-Regulation in Early Childhood with a Representative Sample of English-Speaking American Families. J Child Fam Stud. 22 (3):423-436Pong , Johnsten J, Chen V. 2010. Authoritarian Parenting and Asian Adolescent School Performance: Insights from the US and Taiwa. International Journal of Behavioral Development 34 (1): 62-72. Querido JG, Warner TD, and Eyberg SM. 2002. Parenting Styles and Child Behavior in African American Families of Preschool Children Journal of Clinical Child & Adolescent Psychology, 31 (2): 272 - 277. Radziszewska B, Richardson JL, Dent CW, Flay BR. 1996. Parenting style and adolescent depressive symptoms, smoking, and academic achievement: ethnic, gender, and SES differences. J Behav Med. 19 (3):289-305. Rothrauff TC, Cooney TM, and An JS. 2009. Remembered parenting styles and adjustment in middle and late adulthood. J Gerontol B Psychol Sci Soc Sci. 64 (1):137-46. Schmittmann VD, Visser I, and Raijmakers MEJ. 2006. Multiple learning modes in the development of performance on a rule-based category learning task. Neuropsychologia 44:2079–2091. Steinberg L, Dornbusch SM, and Brown BB. 1992. Ethnic differences in adolescent achievement. An ecological perspective. Am Psychol. 47 (6):723-9. Steinberg L, Lamborn SD, Dornbusch SM, and Darling N. 1992. Impact of parenting practices on adolescent achievement: authoritative parenting, school involvement, and encouragement to succeed. Child Dev. 63 (5):1266-81. Steinberg L, Elmen JD, and Mounts NS. 1989. Authoritative parenting, psychosocial maturity, and academic success among adolescents. Child Dev. 60 (6):1424-36. Steinberg L, Elman JD, and Mounts MS. 1989. Authoritative parenting, psychosocial maturity, and academic success among adolescents. Child Development 60: 1424-1436. Trinkner R, Cohn ES, Rebellon CJ, and Van Gundy K. 2012. Don't trust anyone over 30: parental legitimacy as a mediator between parenting style and changes in delinquent behavior over time. J Adolesc. 35 (1):119-32. Underwood MK, Beron KJ, Rosen LH. 2009. Continuity and change in social and physical aggression from middle childhood through early adolescence. Aggress Behav. 35 (5):357-75. Wang L, Chen X, Chen H, Cui L, and Li M. 2006. Affect and maternal parenting as predictors of adaptive and maladaptive behaviors in Chinese children. International Journal of Behavioral Development. 30:158–166. Wolfradt U, Hempel S, and Miles JNV. 2003. Perceived parenting styles, depersonalisation, anxiety and coping behaviour in adolescents. Personality and Individual Differences 34 (3): 521-532Yin P, Hou X, Qin Q, Deng W, Hu H, Luo Q, Du L, Qiu H, Qiu T, Fu Y, Meng H, Li T. 2016. Genetic and Environmental Influences on the Mental Health of Children: A Twin Study. J Psychosoc Nurs Ment Health Serv. 54 (8):29-34. Zhou Q, Eisenberg N, Wang Y, and Reiser M. 2004. Chinese children's effortful control and dispositional anger/frustration: relations to parenting styles and children's social functioning. Dev Psychol. 40 (3):352-66. Image of boy sitting with back turned - © CEphoto, Uwe Aranas Content last modified 6/2017
|
D2632012
|
https://www.scribd.com/doc/140326951/Programming-Final-Exam-Review
|
Points Awarded 35.00 Points Missed Percentage 0.
|
Points Awarded 35.00 Points Missed Percentage 0.00 100%1. Methods in object-oriented programs use sequence, selection, and looping structures and make use of arrays. A) True B) False Points Earned:1.0/1.0Correct Answer (s): A2. In addition to their attributes, class objects have methods associated with them; every object that is an instance of a class possesses different methods. A) True B) False Points Earned:1.0/1.0Correct Answer (s): B3. Within any object-oriented program, you continuously make requests to objects’ methods, often including arguments as part of those requests. A) True B) False Points Earned:1.0/1.0Correct Answer (s): A4. Declaring a class does not create actual objects. A) True B) False Points Earned:1.0/1.0 Correct Answer (s): A5. Class diagrams are a type of Unified Modeling Language (UML) diagram. A) True B) False Points Earned:1.0/1.0Correct Answer (s): A6. The accessor method is another name for the set method. A) True B) False Points Earned:1.0/1.0Correct Answer (s): B7. Object-oriented programmers usually specify that their data fields will have private access. A) True B) False Points Earned:1.0/1.0Correct Answer (s): A8. All methods require a this reference. A) True B) False Points Earned:1.0/1.0Correct Answer (s): B9. No object is necessary with a static method. A) True B) False Points Earned:1.0/1.0Correct Answer (s): A10. Methods in a class are static instance methods by default. A) True B) False Points Earned:1.0/1.0Correct Answer (s): B11. ____ is a style of programming that focuses on an application’s data and the methods you need to manipulate that data. A) Classical programming B) Functional programming C) Procedural programming D) Object-oriented programming Points Earned:1.0/1.0Correct Answer (s): D12. Object-oriented programmers sometimes say an object is one ____ of a class. A) enumeration B) instantiation C) member D) reference Points Earned:1.0/1.0Correct Answer (s): B13. Objects both in the real world and in object-oriented programming contain ____ and methods. A) behaviors B) attributes C) help D) primitive data types Points Earned:1.0/1.0Correct Answer (s): B14. ____ are the characteristics that define an object as part of a class. A) Instances B) Attributes C) Behaviors D) Methods Points Earned:1.0/1.0Correct Answer (s): B15. When you think in an object-oriented manner, every object is a member of a ____. A) class B) struct C) method D) collection Points Earned:1.0/1.0Correct Answer (s): A16. Object-oriented programmers also use the term ____ when describing inheritance. A) has-a B) from-a C) is-a D) contains Points Earned:1.0/1.0 Correct Answer (s): C17. The concept of a class is useful because of its ____. A) reusability B) mapping to reality C) abstract nature D) portability Points Earned:1.0/1.0Correct Answer (s): A18. Object attributes are often called ____ to help distinguish them from other variables you might use. A) rows B) records C) columns D) fields Points Earned:1.0/1.0Correct Answer (s): D19. The data components of a class that belong to every instantiated object are the class’s ____. A) numeric variables B) string variables C) instance variables D) data variables Points Earned:1.0/1.0Correct Answer (s): C20. A (n) ____ is a program or class that instantiates objects of another prewritten class. A) instantiation B) method C) class client D) class definition Points Earned:1.0/1.0Correct Answer (s): C21. The term ____ is applied to situations in which you define multiple methods with a single name. A) overloading B) bonding C) renaming D) inferring Points Earned:1.0/1.0Correct Answer (s): A22. A ____ is a set of program statements that tell you the characteristics of the class’s objects and the methods that can be used by its objects. A) class interface B) class definition C) class reference D) class model Points Earned:1.0/1.0Correct Answer (s): B23. The term ____ implies that the type’s data can be accessed only through methods. A) abstract type library B) advanced data type C) abstract definition type D) abstract data type Points Earned:1.0/1.0 Correct Answer (s): D24. A (n) ____ is a programmer-defined type, such as a class. A) inheritance B) numeric data type C) primitive data type D) abstract data type Points Earned:1.0/1.0Correct Answer (s): D25. In older object-oriented programming languages, simple numbers and characters are said to be ____ data types. A) primitive B) simple C) complex D) higher-order Points Earned:1.0/1.0Correct Answer (s): A26. A (n) ____ consists of a rectangle divided into three sections. A) class tree B) dependency diagram C) class diagram D) entity-relationship diagram Points Earned:1.0/1.0Correct Answer (s): C27. The purpose of ____ is to set the values of data fields within the class. A) get methods B) put methods C) make methods D) set methods Points Earned:1.0/1.0Correct Answer (s): D28. Methods that set values are called ____ methods. A) modifier B) mutator C) creator D) access Points Earned:1.0/1.0Correct Answer (s): B29. The purpose of a (n) ____ is to return a value to the world outside the class. A) get method B) set method C) pull method D) access method Points Earned:1.0/1.0Correct Answer (s): A30. A ____ method is also known as a help method. A) work B) private C) public D) set Points Earned:1.0/1.0 Correct Answer (s): A31. A (n) ____ is the adjective defining the type of access (public or private) that outside classes will have to the attribute or method. A) control specifier B) control modifier C) access specifier D) access controller Points Earned:1.0/1.0Correct Answer (s): C32. In a class method, the ____ reference can be used only with identifiers that are field names. A) my B) this C) that D) me Points Earned:1.0/1.0Correct Answer (s): B33. ____ methods are those for which no object needs to exist. A) Dynamic B) Public C) Static D) Private Points Earned:1.0/1.0Correct Answer (s): C34. ____ methods are methods that exist to be used with an object created from a class. A) Nonstatic B) Static C) Hidden D) Controlled Points Earned:1.0/1.0Correct Answer (s): A35. In most programming languages, you use the word ____ when you want to declare a static class member. A) private B) friend C) public D) static Points Earned:1.0/1.0Correct Answer (s): DPoints Awarded 35.00 Points Missed Percentage 0.00 100%1. You can invoke or call a method from another program or method. A) True B) False Points Earned: 1.0/1.02. When methods must share data, you can pass the data into and return the data out of methods. A) True B) False Points Earned: 1.0/1.03. A method could be called using any numeric value as an argument, whether it is a variable, a named constant, or a literal constant. A) True B) False Points Earned: 1.0/1.04. A method’s return type is part of its signature. A) True B) False Points Earned: 1.0/1.05. A method’s declared return type must match the type of value used in the return statement. A) True B) False Points Earned: 1.0/1.06. Methods with identical names that have identical parameter lists but different return types are ambiguous. A) True B) False Points Earned: 1.0/1.0 7. All modern programming languages contain many methods that are predefined. A) True B) False Points Earned: 1.0/1.08. In implementation hiding, the calling method needs to understand only the interface to the method that is called and it need not know how the method works internally. A) True B) False Points Earned: 1.0/1.09. Most programmers consciously make decisions about cohesiveness for each method they write. A) True B) False Points Earned: 1.0/1.010. Programs that use recursion are error-prone but easy to debug. A) True B) False Points Earned: 1.0/1.011. The last statement in a method is a (n) ____. A) begin statement B) return statement C) exit statement D) end statement Points Earned: 1.0/1.012. Variables and constants are ____ within, or local to, only the method in which they are declared. A) in scope B) out of bounds C) out of scope D) limited Points Earned: 1.0/1.013. When a data item is known to all of a program’s modules, it is a ____data item. A) scope B) defined C) local D) global Points Earned: 1.0/1.014. A calling method sends a (n) ____ to a called method. A) parameter B) interface C) object D) argument Points Earned: 1.0/1.015. A called method accepts the value of an argument passed to it as its ____. A) parameter B) reference C) baseline D) argument Points Earned: 1.0/1.016. A method’s name and parameter list constitute the method’s ____. A) header B) interface C) contract D) signature Points Earned: 1.0/1.017. You can think of the ____ in a method declaration as a funnel into the method. A) braces B) brackets C) parentheses D) commas Points Earned: 1.0/1.018. A variable usually is passed into a method by ____. A) reference B) inference C) insinuation D) value Points Earned: 1.0/1.019. Each time a method executes, any parameter variables listed in the method header are ____. A) examined B) redeclared C) referenced D) copied Points Earned: 1.0/1.020. The variables in the method declaration that accept the values from the actual parameters are ____ parameters. A) defined B) proper C) formal D) actual Points Earned: 1.0/1.021. A method can return nothing, in which case the method is a ____ method. A) null B) void C) nul D) nil Points Earned: 1.0/1.022. Programmers use the term ____ to describe any extra time and resources required by an operation. A) black box B) overhead C) overload D) cohesion Points Earned: 1.0/1.0 23. ____ provide an overview of input to the method, the processing steps that must occur, and the result. A) Stacks B) Hierarchy charts C) IPO charts D) Flowcharts Points Earned: 1.0/1.024. When multiple parameters appear in a method header, they constitute a (n) ____. A) parameter list B) input list C) action list D) variable list Points Earned: 1.0/1.025. Arrays, unlike simple built-in types, are passed by ____. A) deference B) value C) reference D) configuration Points Earned: 1.0/1.026. ____ is the ability of a method to act appropriately depending on the context. A) Cohesion B) Chameleon C) Integrity D) Polymorphism Points Earned: 1.0/1.027. When you ____ a method, you write multiple methods with a shared name but different parameter lists. A) stack B) overload C) overhead D) void Points Earned: 1.0/1.028. Using implementation hiding means that the ____ is the only part of a method with which the method’s client interacts. A) argument list B) interface to the method C) parameter list D) internal detail Points Earned: 1.0/1.029. ____ refers to how the internal statements of a method serve to accomplish the method’s purpose. A) Coupling B) Cohesion C) Bonding D) Binding Points Earned: 1.0/1.0 30. ____ is a measure of the strength of the connection between two program methods. A) Coupling B) Cohesion C) Bonding D) Binding Points Earned: 1.0/1.031. ____ occurs when methods excessively depend on each other and makes programs more prone to errors. A) Late coupling B) Loose coupling C) Tight coupling D) Weak coupling Points Earned: 1.0/1.032. ____ occurs when methods do not depend on others. A) Tight coupling B) Loose coupling C) Data coupling D) Abstract coupling Points Earned: 1.0/1.033. ____ occurs when a method is defined in terms of itself. A) Referential integrity B) Repeatability C) Dependence D) Recursion Points Earned: 1.0/1.034. A method that calls itself is a ____. A) recursive method B) repeated method C) self-referencing method D) simple method Points Earned: 1.0/1.035. Every time you call a method, the address to which the program should return at the completion of the method is stored in a memory location called the ____. A) heap B) queue C) stack D) dump Points Earned: 1.0/1.0Points Awarded 35.00 Points Missed Percentage 0.00 100%1. The sorting process is usually reserved for a relatively large number of data items. A) True B) False Points Earned: 1.0/1.0 2. The most popular computer coding schemes include ASCII, Numeric, and EBCDIC. A) True B) False Points Earned: 1.0/1.03. You can make additional improvements to a bubble sort to reduce unnecessary comparisons. A) True B) False Points Earned: 1.0/1.04. An insertion sort is another name for a bubble sort. A) True B) False Points Earned: 1.0/1.05. Two-dimensional arrays are never actually required in order to achieve a useful program. A) True B) False Points Earned: 1.0/1.06. Some programming languages allow multidimensional arrays. A) True B) False Points Earned: 1.0/1.07. It is relatively easy for people to keep track of arrays with more than three dimensions. A) True B) False Points Earned: 1.0/1.08. You do not need to determine a record’s exact physical address in order to use it. A) True B) False Points Earned: 1.0/1.09. When a record is removed from an indexed file, it has to be physically removed. A) True B) False Points Earned: 1.0/1.010. Every time you add a new record to a linked list, you search through the list for the correct logical location of the new record. A) True B) False Points Earned: 1.0/1.011. When records are in ____ order, they are arranged one after another on the basis of the value in a particular field. A) random B) sequential C) binary D) incremental Points Earned: 1.0/1.0 12. The ____ is often used as a statistic in many cases because it represents a more typical case. A) mode B) mean C) average D) median Points Earned: 1.0/1.013. The ____ is skewed by a few very high or low values. A) mode B) median C) mean D) standard deviation Points Earned: 1.0/1.014. When you store data records, they exist in ____. A) some type of order B) the reverse order from how they were entered C) the same default ordering for all systems D) ascending order Points Earned: 1.0/1.015. When you create a ____ report, the records must have been sorted in order by a key field. A) summary B) control break C) detail D) totals Points Earned: 1.0/1.0 16. When computers sort data, they always use ____ values when making comparisons between values. A) numeric B) alphanumeric C) alphabetic D) ascending Points Earned: 1.0/1.017. Because “A” is always less than “B”, alphabetic sorts are ____ sorts. A) descending B) reversing C) ascending D) downward Points Earned: 1.0/1.018. In a ____, items in a list are compared with each other in pairs. A) quick sort B) shell sort C) bubble sort D) matrix sort Points Earned: 1.0/1.019. When you learn a method like sorting, programmers say you are learning a (n) ____. A) matrix B) addressed location C) algorithm D) linked list Points Earned: 1.0/1.0 20. To correctly swap two values, you create a (n) ____ variable to hold one of the values. A) per-swap B) inversion C) conversion D) temporary Points Earned: 1.0/1.021. A bubble sort is sometimes called a ____. A) dropping sort B) sinking sort C) compare sort D) pair sort Points Earned: 1.0/1.022. When using a bubble sort to sort a 10-element array, on the fourth pass through the array list you detect that no swap has occurred. This indicates ____. A) the elements in the array were badly out of order B) all elements in the array are already in the correct order C) you must make one more pass through the array D) you must make a total of 10 passes through the array Points Earned: 1.0/1.023. When you sort records, two possible approaches are to place related data items in parallel arrays and to ____. A) sort records as a whole B) sort fields in records individually C) place unrelated data items in parallel arrays D) sort data in spreadsheets Points Earned: 1.0/1.0 24. In a (n) ____, if an element is out of order relative to any of the items earlier in the list, you move each earlier item down one position and then insert the tested element. A) selection sort B) bubble sort C) sync sort D) insertion sort Points Earned: 1.0/1.025. An array whose elements you can access using a single subscript is a ____ array. A) one-dimensional B) multi-dimensional C) non-dimensional D) single-dimensional Points Earned: 1.0/1.026. A two-dimensional array contains two dimensions: ____. A) size and scope B) breadth and height C) height and width D) depth and width Points Earned: 1.0/1.027. Each element in a two-dimensional array requires ____ subscript (s) to reference it. A) one B) two C) three D) four Points Earned: 1.0/1.0 28. When mathematicians use a two-dimensional array, they often call it a ____ or a table. A) vector B) matrix C) square D) grid Points Earned: 1.0/1.029. ____ are arrays that have more than one dimension. A) Multidimensional arrays B) One-dimensional arrays C) Diverse dimensioned arrays D) Unary dimensional arrays Points Earned: 1.0/1.030. A record’s ____ field is the field whose contents make the record unique among all records in a file. A) primary B) column C) secondary D) key Points Earned: 1.0/1.031. As pages in a book have numbers, computer memory and storage locations have ____. A) positions B) pointers C) addresses D) references Points Earned: 1.0/1.0 32. When you ____ records, you store a list of key fields paired with the storage address for the corresponding data record. A) store B) tab C) reference D) index Points Earned: 1.0/1.033. When you use an index, you can store records on a ____ storage device. A) linear-access B) random-access C) sequential-access D) uniform-access Points Earned: 1.0/1.034. One way to access records in a desired order, even though they might not be physically stored in that order, is to create a (n) ____. A) linked list B) array C) matrix D) table Points Earned: 1.0/1.035. Every time you add a new record to a linked list, you search through the list for the correct ____ location of the new record. A) physical B) spatial C) logical D) key Points Earned: 1.0/1.0Points Awarded 35.00 Points Missed Percentage 0.00 100%1. Images and music are contained in binary files. A) True B) False Points Earned: 1.0/1.02. When you copy data from RAM into a file on a storage device, you read to the file. A) True B) False Points Earned: 1.0/1.03. The keyboard and printer are the default input and output devices. A) True B) False Points Earned: 1.0/1.04. Programmers usually use the word “write” to mean “produce hard copy output.” A) True B) False Points Earned: 1.0/1.0 5. To write a program that produces a report of employees by department number, the records must be grouped by department number before you begin processing. A) True B) False Points Earned: 1.0/1.06. You can easily merge files even if each file contains a different record layout. A) True B) False Points Earned: 1.0/1.07. You can merge more than two files. A) True B) False Points Earned: 1.0/1.08. You update the transaction file with data from the master file. A) True B) False Points Earned: 1.0/1.09. The terms “parent” and “child” can refer to file backup generations, but they are also used for a different purpose in object-oriented programming. A) True B) False Points Earned: 1.0/1.010. Files in which records must be accessed immediately are sometimes called instant access files. A) True B) False Points Earned: 1.0/1.011. A ____ is a collection of data stored on a nonvolatile device in a computer system. A) computer message B) computer interface C) computer file D) computer selector Points Earned: 1.0/1.012. When you write a program that stores a value in a variable, you are using ____ storage. A) permanent B) temporary C) resilient D) resident Points Earned: 1.0/1.013. ____ storage is not lost when a computer loses power. A) Temporary B) Intermediate C) Permanent D) Variable Points Earned: 1.0/1.014. Files exist on ____ storage devices, such as hard disks, DVDs, USB drives, and reels of magnetic tape. A) permanent B) transient C) scalable D) optical Points Earned: 1.0/1.015. The combination of the disk drive plus the complete hierarchy of directories in which a file resides is its ____. A) pointer B) path C) locator D) stream Points Earned: 1.0/1.016. Directories and ____ are organization units on storage devices. A) folders B) files C) partitions D) streams Points Earned: 1.0/1.017. ____ is the more general term for an entity that organizes files. A) Folder B) Path C) Structure D) Directory Points Earned: 1.0/1.018. ____ are groups of fields that go together for some logical reason. A) Tables B) Databases C) Columns D) Records Points Earned: 1.0/1.019. Characters are made up of smaller elements called ____. A) fields B) records C) bits D) bytes Points Earned: 1.0/1.020. A database holds groups of files or ____ that together serve the information needs of an organization. A) fields B) records C) control breaks D) tables Points Earned: 1.0/1.0 21. In most programming languages, before an application can use a data file, it must ____. A) open the file B) close the file C) read the file D) prepare the file Points Earned: 1.0/1.022. When you copy data from a file on a storage device into RAM, you ____ from the file. A) delete B) upload C) output D) read Points Earned: 1.0/1.023. When you ____ a file, it is no longer available to your application. A) examine B) rewrite C) close D) index Points Earned: 1.0/1.024. A ____ is a copy that is kept in case values need to be restored to their original state. A) read-only file B) backup file C) primary file D) secondary file Points Earned: 1.0/1.025. A ____ is a file in which records are stored one after another in some order. A) random access file B) serial file C) retired file D) sequential file Points Earned: 1.0/1.026. A ____ is a temporary detour in the logic of a program. A) sequence break B) control break C) control sequence D) break control Points Earned: 1.0/1.027. To generate a control break report, your input records must be organized in ____ order based on the field that will cause the breaks. A) random B) ascending C) sequential D) repeatable Points Earned: 1.0/1.028. A ____ break is a break in the logic of the program that is based on the value of a single variable. A) multiple-level control B) simple control C) serial control D) single-level control Points Earned: 1.0/1.029. ____ files involves combining two or more files while maintaining the sequential order. A) Merging B) Sorting C) Splitting D) Dividing Points Earned: 1.0/1.030. When the records in a file are sorted in order from lowest to highest values, the records are in ____ order. A) descending B) bubble C) ascending D) merged Points Earned: 1.0/1.031. The ____ file holds temporary data that is used to update the master file. A) directory B) transaction C) merge D) database Points Earned: 1.0/1.032. The saved version of a master file is the ____ file; the updated version is the child file. A) peer B) subordinate C) parent D) child Points Earned: 1.0/1.033. ____ is processing that involves performing the same tasks with many records, one after the other. A) Volume processing B) Batch processing C) Online processing D) Standard processing Points Earned: 1.0/1.034. ____ applications require that a record be accessed immediately while a client is waiting. A) Real-time B) Batch C) Database D) Sort Points Earned: 1.0/1.035. Because they enable you to locate a particular record directly (without reading all of the preceding records), random access files are also called ____ files. A) direct access B) indirect access C) sequential access D) temporary access Points Earned: 1.0/1.0 Points Awarded 35.00 Points Missed Percentage 0.00 100%1. Many newer programming languages such as C++, Java, and C# use subscript 1 to access the first element of the array. A) True B) False Points Earned: 1.0/1.02. You use subscripts 1 through 10 to access the elements in a ten element array. A) True B) False Points Earned: 1.0/1.03. Many newer programming languages such as C++, Java, and C# use the bracket notation for arrays. A) True B) False Points Earned: 1.0/1.04. Declaring a named constant makes code easier to modify and understand. A) True B) False Points Earned: 1.0/1.0 5. A parallel array is an array that stores another array in each element. A) True B) False Points Earned: 1.0/1.06. Parallel arrays must contain the same data type. A) True B) False Points Earned: 1.0/1.07. You can improve the efficiency of a program by leaving a loop as soon as a match is found in the array. A) True B) False Points Earned: 1.0/1.08. Arrays cannot be used if you need to search for a range of values. A) True B) False Points Earned: 1.0/1.09. When you have a five element array and use subscript 8, your subscript is said to be out of bounds. A) True B) False Points Earned: 1.0/1.010. The for loop is a good tool when working with arrays because you frequently need to process every element of an array from beginning to end. A) True B) False Points Earned: 1.0/1.011. An array is a (n) ____ of values in computer memory. A) list B) accumulation C) set D) record Points Earned: 1.0/1.012. A (n) ____ is another name for a subscript. A) pointer B) sequence C) index D) place holder Points Earned: 1.0/1.013. The number of elements in an array is called the ____ of the array. A) width B) size C) height D) depth Points Earned: 1.0/1.014. All array elements have the same group ____. A) subscript B) name C) memory location D) value Points Earned: 1.0/1.015. Array elements all have the same ____ in common. A) pointer B) memory location C) value D) data type Points Earned: 1.0/1.016. Array subscripts are always a sequence of ____. A) large numbers B) characters C) negative values D) integers Points Earned: 1.0/1.017. In all languages, subscript values must be sequential ____. A) characters B) fractions C) real numbers D) integers Points Earned: 1.0/1.018. A program contains an array that holds all the names of the days of the week. Which of the following is true? A) The highest subscript is 6. B) The highest subscript is 7. C) The lowest subscript is 1. D) The highest subscript is 12. Points Earned: 1.0/1.019. Providing array values is sometimes called ____. A) creating the array B) declaring the array C) accumulating the array D) populating the array Points Earned: 1.0/1.020. An array can be used to replace ____. A) records B) methods C) nested decisions D) loops Points Earned: 1.0/1.021. The true benefit of using an array lies in your ability to use a ____ as a subscript to the array. A) constant B) loop C) command D) variable Points Earned: 1.0/1.022. Named ____ hold values that do not change during a program’s execution. A) constants B) variables C) objects D) items Points Earned: 1.0/1.023. Besides making your code easier to modify, using a ____ makes the code easier to understand. A) standard constant B) named constant C) literal constant D) named variable Points Earned: 1.0/1.024. One advantage to using a named constant is that the statement becomes ____. A) self-perpetuating B) self-documenting C) self-referencing D) self-mitigating Points Earned: 1.0/1.0 25. When you search through a list from one end to the other, you are performing a ____. A) linear search B) binary search C) quadratic search D) single lookup Points Earned: 1.0/1.026. If you declare a variable to be Boolean, you can set its value to ____. A) any number B) true or false C) any integer D) 1 or -1 Points Earned: 1.0/1.027. Which statement is true of arrays? A) Only whole numbers can be used as array subscripts. B) Only whole numbers can be stored in arrays. C) Arrays cause more work for the programmer, but allow faster program execution. D) Array elements cannot be reset after the array is declared. Points Earned: 1.0/1.028. A ____ relates parallel arrays. A) superscript B) key C) subscript D) postscript Points Earned: 1.0/1.0 29. Parallel arrays are most useful when value pairs have a (n) ____ relationship. A) direct B) indirect C) linked D) tiered Points Earned: 1.0/1.030. A ____ search starts looking in the middle of a sorted list, and then determines whether it should continue higher or lower. A) linear B) binary C) quadratic D) single lookup Points Earned: 1.0/1.031. To search an array for a (n) ____ match, you can store either the highest or lowest value of each range for comparison. A) flag B) index C) subscript D) range Points Earned: 1.0/1.032. Every array has a (n) ____ size. A) infinite B) finite C) variable D) constant Points Earned: 1.0/1.033. The number of bytes in an array is always a multiple of the number of ____ in an array. A) subscripts B) elements C) iterators D) indexes Points Earned: 1.0/1.034. In every programming language, when you access data stored in an array, it is important to use a ____ containing a value that accesses memory occupied by the array. A) superscript B) subscript C) key D) condition Points Earned: 1.0/1.035. When a subscript is not within the range of acceptable subscripts, it is said to be ____. A) a superscript B) flagged C) out of bounds D) indexed Points Earned: 1.0/1.0 Points Awarded Points Missed Percentage34.00 1.00 97.1%1. The loop control variable is initialized after entering the loop. A) True B) False Points Earned: 1.0/1.02. In some cases, a loop control variable does not have to be initialized. A) True B) False Points Earned: 1.0/1.03. An indefinite loop is a loop that never stops. A) True B) False Points Earned: 0.0/1.04. You can either increment or decrement the loop control variable. A) True B) False Points Earned: 1.0/1.05. When one loop appears inside another is is called an indented loop. A) True B) False Points Earned: 1.0/1.06. Forgetting to initialize and alter the loop control variable is a common mistake that programmers sometimes make. A) True B) False Points Earned: 1.0/1.07. Every high-level computer programming language contains a while statement. A) True B) False Points Earned: 1.0/1.08. Both the while loop and the for loop are examples of pretest loops. A) True B) False Points Earned: 1.0/1.09. The safest action is to assign the value 1 to accumulators before using them. A) True B) False Points Earned: 1.0/1.010. It is the programmer’s responsibility to initialize all variables that must start with a specific value. A) True B) False Points Earned: 1.0/1.011. The first step in a while loop is typically to ____. A) compare the loop control variable to a constant value B) initialize the loop control variable C) increment the loop control variable D) execute the body of the loop Points Earned: 1.0/1.012. Once your logic enters the body of a structured loop, ____. A) the entire loop must execute B) the loop can be terminated with a break statement C) the loop will execute indefinitely D) a decision statement will be evaluated Points Earned: 1.0/1.013. The last step in a while loop is usually to ____. A) compare the loop control variable to a constant value B) initialize the loop control variable C) increment the loop control variable D) execute the body of the loop Points Earned: 1.0/1.0 14. A (n) ____ loop executes a predetermined number of times. A) terminal B) definite C) indefinite D) infinite Points Earned: 1.0/1.015. Many loop control variable values are altered by ____, or adding to them. A) incrementing B) decrementing C) accumulating D) deprecating Points Earned: 1.0/1.016. A (n) ____ is any numeric variable you use to count the number of times an event has occurred. A) accumulator B) key C) index D) counter Points Earned: 1.0/1.017. A loop within another loop is known as a (n) ____ loop. A) indefinite B) infinite C) nested D) hidden Points Earned: 1.0/1.0 18. When one loop appears inside another, the loop that contains the other loop is called the ____ loop. A) indefinite B) definite C) inner D) outer Points Earned: 1.0/1.019. Usually, when you create nested loops, each loop has its own ____. A) sentinel value B) goto statement C) entrance condition D) loop control variable Points Earned: 1.0/1.020. A mistake programmers often make with loops is that they ____. A) initialize the loop control variable prior to entering the loop body B) increment the loop control variable inside of the loop body C) include statements inside the loop that belong outside the loop D) enclose the inner loop entirely within the outer loop in a nested loop Points Earned: 1.0/1.021. A mistake programmers often make with loops is that they ____. A) neglect to initialize the loop control variable prior to entering the loop body B) increment the loop control variable inside of the loop body C) validate data to ensure values are the correct data type or that they fall within an acceptable range D) enclose the inner loop entirely within the outer loop in a nested loop Points Earned: 1.0/1.022. A comparison is correct only when the correct ____ and operator are used. A) expression B) operands C) statements D) index Points Earned: 1.0/1.023. Programmers use the term ____ to describe programs that are well designed and easy to understand and maintain. A) industrial B) intractable C) well behaved D) elegant Points Earned: 1.0/1.024. You usually use the for loop with ____ loops. A) indefinite B) definite C) inner D) outer Points Earned: 1.0/1.025. The ____ loop provides three actions in one compact statement. A) for B) while C) do until D) repeat Points Earned: 1.0/1.026. The amount by which a for loop control variable changes is often called a ____ value. A) group B) key C) step D) sentinel Points Earned: 1.0/1.027. In a ____, the loop body might never execute because the question controlling the loop might be false the first time it is asked. A) summary report B) pretest loop C) posttest loop D) loop control Points Earned: 1.0/1.028. In a ____, the loop body executes at least one time because the loop control variable is not tested until after one iteration. A) stub B) pretest loop C) posttest loop D) loop control Points Earned: 1.0/1.029. The ____ loop is particularly useful when processing arrays. A) for B) while C) infinite D) nested Points Earned: 1.0/1.030. A (n) ____ is very similar to a counter that you use to count loop iterations, except that you usually add a value other than one to this type of variable. A) transaction B) total C) validator D) accumulator Points Earned: 1.0/1.031. ____ is a technique with which you try to prepare for all possible errors before they occur. A) Incrementing B) Stub C) Nested loop D) Defensive programming Points Earned: 1.0/1.032. Business reports that list only totals, with no individual item details, are called ____. A) detail reports B) summary reports C) transaction reports D) control-break reports Points Earned: 1.0/1.033. Loops are frequently used to ____; that is, to make sure it is meaningful and useful. A) validate data B) restructure data C) simulate data D) corroborate data Points Earned: 1.0/1.034. Programmers employ the acronym ____ to mean that if your input is incorrect, your output is worthless. A) IOW B) GIGO C) IOCW D) GIGS Points Earned: 1.0/1.035. ____ a data item means you override incorrect data by setting the variable to a specific value. A) Flexing B) Tracing C) Forcing D) Blanking Points Earned: 1.0/1.0 Points Awarded Points Missed Percentage34.00 1.00 97.1%1. Every decision you make in a computer program involves evaluating a Boolean expression. A) True B) False Points Earned: 1.0/1.02. In any Boolean expression, the two values compared can be either variables or constants. A) True B) False Points Earned: 1.0/1.03. Any decision can be made using combinations of just two types of comparisons: equal and not equal. A) True B) False Points Earned: 1.0/1.04. Most programming languages allow you to ask two or more questions in a single comparison. A) True B) False Points Earned: 1.0/1.05. A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the entire expression is true or false. A) True B) False Points Earned: 1.0/1.06. When you need to satisfy two or more criteria to initiate an event in a program, you must make sure that the second decision is made entirely independently of the first decision. A) True B) False Points Earned: 1.0/1.07. Besides AND and OR operators, most languages support a NOT operator. A) True B) False Points Earned: 1.0/1.08. Most programming languages limit the number of AND and OR operators in an expression. A) True B) False Points Earned: 1.0/1.09. When you combine AND and OR operators, the OR operators take precedence, meaning their Boolean values are evaluated first. A) True B) False Points Earned: 1.0/1.010. You can use parentheses to override the default order of operations. A) True B) False Points Earned: 1.0/1.011. A selection with an action that is associated with each of two possible outcomes is known as a (n) ____ selection. A) unary B) binary C) octal D) semiconductor Points Earned: 1.0/1.012. The keyword that is NOT included in a single-alternative selection is ____. A) if B) then C) else D) endif Points Earned: 1.0/1.013. Boolean expressions are named after ____. A) Harold Boolean B) Henry Boole C) George Boole D) Gerhardt Boolean Points Earned: 1.0/1.014. ____ operators require two operands. A) Unary B) Tertiary C) Binary D) Double Points Earned: 1.0/1.015. The ____ sign means “greater than.” A) < B) = C) <= D) >Points Earned: 1.0/1.016. Usually, ____ variables are not considered to be equal unless they are identical. A) string B) integer C) character D) floating point Points Earned: 1.0/1.017. When you ask multiple questions before an outcome is determined, you create a ____ condition. A) dual-alternative B) nested C) single-alternative D) compound Points Earned: 1.0/1.018. A (n) ____ decision is a decision in which two conditions must be true for an action to take place. A) OR B) XOR C) AND D) OR-ELSEPoints Earned: 1.0/1.019. A series of nested if statements is also called a ____ if statement. A) stacked B) cascading C) bonded D) hooked Points Earned: 1.0/1.020. Most languages allow you to use a variation of the decision structure called the ____ structure when you must nest a series of decisions about a single variable. A) blocked B) case C) AND IF D) logical Points Earned: 1.0/1.021. Most programming languages allow you to ask two or more questions in a single comparison by using a (n) ____ operator that joins decisions in a single statement. A) AND B) OR C) IF D) XORPoints Earned: 1.0/1.0 22. For maximum efficiency, a good rule of thumb in an AND decision is to ____. A) first ask the question that is more likely to be true B) first ask the question that is more likely to be false C) rewrite it as an OR decision and ask the question more likely to be true D) rewrite it as an OR decision and ask the question more likely to be false Points Earned: 1.0/1.023. ____ evaluation is when each part of an expression that uses an operator is evaluated only as far as necessary to determine whether the entire expression is true or false. A) Truth B) Short-circuit C) Binary D) Loop Points Earned: 1.0/1.024. When creating a truth table, you must determine how many possible Boolean value combinations exist for the conditions. If there are two conditions, ____ combinations will exist. A) two B) four C) eight D) 16Points Earned: 1.0/1.025. In a truth table, the expression ____ is true. A) true AND true B) true AND false C) false AND true D) false AND false Points Earned: 1.0/1.026. The conditional AND operator in Java, C++, and C# is ____. A) & B) AND C) ** D) &&Points Earned: 1.0/1.027. ____ are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its parts. A) Decision matrices B) Decision diagrams C) Truth diagrams D) Truth tables Points Earned: 1.0/1.028. A (n) ____ decision is a decision in which at least one of two conditions must be true for an action to take place. A) OR B) nested C) AND D) NOTPoints Earned: 0.0/1.029. In a truth table, the expression ____ is false. A) true OR true B) true OR false C) false OR true D) false OR false Points Earned: 1.0/1.030. For maximum efficiency, a good rule of thumb in an OR decision is to ____. A) first ask the question that is more likely to be true B) first ask the question that is more likely to be false C) rewrite it as an AND decision and ask the question more likely to be true D) rewrite it as an AND decision and ask the question more likely to be false Points Earned: 1.0/1.031. C#, C++, C, and Java use the symbol ____ as the logical OR operator. A) % B) $ C) || D) ^Points Earned: 1.0/1.032. You use the logical ____ operator to reverse the meaning of a Boolean expression. A) AND B) XOR C) OR D) NOTPoints Earned: 1.0/1.033. You can perform a ____ by making comparisons using either the lowest or highest value in a range of values. A) range check B) nested if C) logic check D) trivial expression Points Earned: 1.0/1.034. When you combine AND and OR operators, the ____ operators take precedence, meaning their Boolean values are evaluated first. A) addition B) AND C) OR D) division Points Earned: 1.0/1.035. You can use ____ for clarity and to override the default order of operations. A) parentheses B) truth tables C) multiplication D) NOTPoints Earned: 1.0/1.0Points Awarded Points Missed Percentage33.00 2.00 94.3%1. Structured programs use spaghetti code logic. A) True B) False Points Earned: 1.02. In a selection structure, you perform an action or task, and then you perform the next action in order. A) True B) False Points Earned: 1.03. Repetition and sequence are alternate names for a loop structure. A) True B) False Points Earned: 1.04. In a structured program, any structure can be nested within another structure. A) True B) False Points Earned: 1.05. A structured program must contain a sequence, selection, and loop structure. A) True B) False Points Earned: 1.06. Because you may stack and nest structures while retaining the overall structure, it might be difficult to determine whether a flowchart as a whole is structured. A) True B) False Points Earned: 1.0 7. As a general rule, an eof question should always come immediately after an input statement because the end-of-file condition will be detected at input. A) True B) False Points Earned: 1.08. Structured programming is sometimes called goto-less programming. A) True B) False Points Earned: 1.09. No matter how complicated it is, any set of steps can always be reduced to combinations of the two basic structures of sequence and loop. A) True B) False Points Earned: 1.010. The case structure is a variation of the sequence structure and the do loop is a variation of the while loop. A) True B) False Points Earned: 1.011. Programs that use _____ code logic are unstructured programs that do not follow the rules of structured logic. A) case B) loop C) spaghetti D) nested Points Earned: 1.012. With a (n) ____, you perform an action or task, and then you perform the next action, in order. A) ordered structure B) sequence problem C) sequence structure D) loop sequence Points Earned: 1.013. The following pseudocode is an example of a ____ structure. get first Number get second Number add first Number and second Number print result A) sequence B) decision C) loop D) nested Points Earned: 1.014. The following pseudocode is an example of a ____ structure. if first Number is bigger than second Number then print first Number else print second Number A) sequence B) decision C) loop D) nested Points Earned: 1.0 15. Fill in the blank in the following pseudocode: if some Condition is true then do one Process ____ do the Other Process A) then B) while C) do D) else Points Earned: 1.016. if-else examples can also be called ____ because they contain the action taken when the tested condition is true and the action taken when it is false. A) do loops B) single-alternative selections C) repetition D) dual-alternative selections Points Earned: 1.017. The following pseudocode is an example of a ____ structure. get number while number is positive add to sum get number A) sequence B) decision C) loop D) nested Points Earned: 1.018. You may hear programmers refer to looping as ____. A) execution B) selection C) iteration D) case Points Earned: 1.019. The action or actions that occur within a loop are known as a (n) ____. A) loop body B) action body C) loop internals D) structure body Points Earned: 1.020. The following pseudocode is an example of ____. do step A do step B if condition C is true then do step D else do step E endif while condition F is true do step G endwhile A) nesting B) stacking C) single alternative structures D) a posttest Points Earned: 1.021. Attaching structures end to end is called ____ structures. A) linking B) stacking C) nesting D) building Points Earned: 1.022. The following pseudocode is an example of ____. if condition A is true then do step E else do step B do step C do step D endif A) nesting B) stacking C) a posttest D) a pretest Points Earned: 0.023. Placing a structure within another structure is called ____ structures. A) nesting B) stacking C) shelling D) selecting Points Earned: 1.024. You can use an ____ statement to clearly show where the actions that depend on a decision end. A) end B) endstructure C) endloop D) endif Points Earned: 1.0 25. The maximum number of entry points that any programming structure can have is ____. A) zero B) one C) three D) five Points Earned: 1.026. A structured program includes only combinations of the three basic structures: ____. A) sequence, iteration, and loop B) iteration, selection, and loop C) sequence, selection, and loop D) identification, selection, and loop Points Earned: 1.027. Structures can be stacked or connected to one another at their ____. A) entry points only B) exit points only C) entry or exit points D) entry or combination points Points Earned: 1.028. A ____ read is an added statement that gets the first input value in a program. A) nested B) stacked C) posttest D) priming Points Earned: 1.0 29. The priming read is an example of a (n) ____ task. A) declaration B) exit C) housekeeping D) selection Points Earned: 1.030. In older languages, you could leave a selection or loop before it was complete by using a ____ statement. A) loop B) go next C) next D) go to Points Earned: 1.031. Structured programs can be easily broken down into routines or ____ that can be assigned to any number of programmers. A) segments B) modules C) units D) sequences Points Earned: 1.032. One way to straighten out an unstructured flowchart segment is to use the ____ method. A) spaghetti code B) spaghetti bowl C) restructuring D) priming Points Earned: 1.0 33. A loop must return to the ____ question at some later point in a structure. A) start loop B) loop-controlling C) master loop D) continue loop Points Earned: 1.034. The do loop is a variation of the ____ loop. A) if-then-else B) while C) case D) sequence Points Earned: 1.035. The case structure is a variation of the ____ structure. A) selection B) while C) sequence D) do Points Earned: 0.0Points Awarded 35.00 Points Missed Percentage 0.00 100%1. A variable can hold more than one value at any given moment in time. A) True B) False Points Earned: 1.0/1.02. Because one memory location can be used repeatedly with different values, you can write program instructions once and then use them for thousands of separate calculations A) True B) False Points Earned: 1.0/1.03. In many programming languages, if you declare a variable and do not initialize it, the variable contains an unknown value until it is assigned a value. A) True B) False Points Earned: 1.0/1.04. Variable names can be more than one word with blanks between the words. A) True B) False Points Earned: 1.0/1.05. The assignment operator has left-to-right-to-left associativity, which means that the value of the expression to the left of the assignment operator is evaluated first and that the result is assigned to the operand on the right. A) True B) False Points Earned: 1.0/1.0 6. A string variable can hold digits such as phone numbers and zip codes. A) True B) False Points Earned: 1.0/1.07. Programmers generally write programs as one long series of steps. A) True B) False Points Earned: 1.0/1.08. Modularization makes it harder for multiple programmers to work on a problem. A) True B) False Points Earned: 1.0/1.09. Program comments are a type of internal documentation. A) True B) False Points Earned: 1.0/1.010. Most modern programming languages require that program statements be placed in specific columns. A) True B) False Points Earned: 1.0/1.011. When you write programs, you work with data in three different forms: ____. A) values; variables, or named values; and unnamed values B) variables; named constants; and named memory C) variables; literals, or unnamed constants; and named constants D) variations; transliterals, or unnamed constants; and named values Points Earned: 1.0/1.012. A specific numeric value is often called a (n) ____. A) named constant B) defined constant C) arithmetic constant D) numeric constant Points Earned: 1.0/1.013. Fractional numeric variables that contain a decimal point are known as ____ variables. A) partial B) string C) integer D) floating-point Points Earned: 1.0/1.014. In most programming languages, before you can use any variable, you must include a ____ for it. A) declaration B) definition C) header D) proclamation Points Earned: 1.0/1.015. The process of naming program variables and assigning a type to them is called ____ variables. A) initializing B) declaring C) identifying D) proclaiming Points Earned: 1.0/1.016. A variable’s unknown value is commonly called ____. A) initial B) default C) deterministically random D) garbage Points Earned: 1.0/1.017. Declaring a starting value for a variable is known as ____ the variable. A) initializing B) declaring C) defining D) identifying Points Earned: 1.0/1.018. When the variable starts with a lowercase letter and any subsequent word begins with an uppercase letter, this is called ____. A) Hungarian notation B) Pascal casing C) camel casing D) Turing notation Points Earned: 1.0/1.019. When the first letter of a variable name is uppercase, as in Hourly Wage, the format is known as ____ casing. A) Hungarian notation B) Pascal casing C) camel casing D) Turing notation Points Earned: 1.0/1.020. ____ is where a variable’s data type or other information is stored as part of the name. A) Hungarian notation B) Pascal case C) Turing notation D) Camel case Points Earned: 1.0/1.021. The assignment operator is the ____ sign. A) * B) + C) = D) /Points Earned: 1.0/1.022. A (n) ____ is similar to a variable, except it can be assigned a value only once. A) unnamed constant B) literal C) named constant D) constant Points Earned: 1.0/1.0 23. The ____ dictate the order in which operations in the same statement are carried out. A) rules of precedence B) statement rules C) operation rules D) rules of arithmetic Points Earned: 1.0/1.024. Depending on the programming language being used, modules are also known as ____ . A) subroutines, procedures, or methods B) subroutines, code bits, or methods C) tasks, functions, or methods D) procedures, functions, or hierarchy Points Earned: 1.0/1.025. The process of breaking down a large program into modules is called ____. A) decomposition B) modularization C) unification D) orientation Points Earned: 1.0/1.026. ____ is the process of paying attention to important properties while ignoring nonessential details. A) Abstraction B) Modularization C) Abbreviation D) Decomposition Points Earned: 1.0/1.0 27. Programmers say the statements that are contained in a module have been ____. A) embedded B) decomposed C) encapsulated D) modularized Points Earned: 1.0/1.028. Programmers say that variables and constants declared within a module are ____ only within that module. A) abstracted B) out of scope C) in scope D) in reference Points Earned: 1.0/1.029. ____ variables and constants are known to the entire program. A) Local B) Transient C) Heap D) Global Points Earned: 1.0/1.030. The mainline logic of almost every procedural computer program consists of these three distinct parts: ____ . A) housekeeping tasks, processing tasks, and end-of-job tasks B) clearing tasks, detail loop tasks, and end-of-job tasks C) housekeeping tasks, detail loop tasks, and end-of-job tasks D) housekeeping tasks, detail loop tasks, and math tasks Points Earned: 1.0/1.0 31. When a program has several modules calling other modules, programmers often use a program ____, which operates similarly to an organizational chart, to show the overall picture of how modules are related to one another. A) hierarchy chart B) tree chart C) flow chart D) data diagram Points Earned: 1.0/1.032. As programs become larger and more complicated, the need for good planning and design ____ . A) decreases B) is inefficient C) is not necessary D) increases Points Earned: 1.0/1.033. An ____ is most often represented by a three-sided box that is connected to the step it references by a dashed line. A) abstraction symbol B) annotation symbol C) abbreviation symbol D) enumeration symbol Points Earned: 1.0/1.034. Programmers refer to programs that contain meaningful names as ____. A) undocumented B) procedurally documented C) formally documented D) self-documenting Points Earned: 1.0/1.035. A ____ variable is not used for input or output, but instead is just a working variable that you use during a program’s execution. A) programming B) throw away C) temporary D) calculating Points Earned: 1.0/1.0Points Awarded Points Missed Percentage34.00 1.00 97.1%1. Software can be classified into two broad types: application software and programming software. A) True B) False Points Earned: 1.0/1.02. The heart of the programming process lies in planning the program’s logic. A) False B) True Points Earned: 1.0/1.03. A (n) ____ is a program that you use to create simple text files. A) GDE B) GUI C) IDE D) text editor Points Earned: 1.0/1.04. A (n) ____ is a repeating flow of logic with no end. A) variable B) infinite loop C) decision symbol D) nonterminated condition Points Earned: 1.0/1.05. If you use an otherwise correct word that does not make sense in the current context, programmers say you have committed a ____ error. A) semantic B) logic C) programming D) syntax Points Earned: 0.0/1.06. ____ errors are relatively easy to locate and correct because the compiler or interpreter you use highlights every error. A) Process B) Logic C) Input D) Syntax Points Earned: 1.0/1.0 7. Every programming language has rules governing its word usage and punctuation. A) False B) True Points Earned: 1.0/1.08. Computer programmers often refer to memory addresses using ____ notation. A) mathematical B) indirect C) hexadecimal D) binary Points Earned: 1.0/1.09. Once a program is completely coded, it is ready for a company or organization to use. A) True B) False Points Earned: 1.0/1.010. The ____ is the standard terminal symbol for a flowchart. A) circle B) square C) lozenge D) diamond Points Earned: 1.0/1.011. The process of finding and correcting program errors is called ____. A) syntax-checking B) desk-checking C) error correcting D) debugging Points Earned: 1.0/1.012. A (n) ____ is a software package that provides an editor, a compiler, and other programming tools. A) GDE B) CGI C) IDE D) GUIPoints Earned: 1.0/1.013. An infinite loop is a flow of program logic that repeats and never ends. A) True B) False Points Earned: 1.0/1.014. The major difference between the two main programming styles in use today is the ____. A) programmer’s focus during the earliest planning stages of a project B) use of flowcharts versus pseudocode C) testing procedure used by the programmer D) programming language used Points Earned: 1.0/1.015. A (n) ____ is a location on your computer screen where you type text entries to communicate with the computer’s operating system. A) command line B) input line C) communication line D) GCIPoints Earned: 1.0/1.016. Professional computer programmers write programs to satisfy their own needs. A) False B) True Points Earned: 1.0/1.017. The ____ is used to represent output in a flowchart. A) circle B) triangle C) parallelogram D) square Points Earned: 1.0/1.018. A (n) ____ tells the user what to enter. A) data line B) prompt C) input screen D) command line Points Earned: 1.0/1.019. Alan Turing is often regarded as the first programmer. A) False B) True Points Earned: 1.0/1.0 20. Many programming languages use the term ____ to refer to the marker that is used to automatically recognize the end of data in a file. A) data_end B) end_data C) eod D) eof Points Earned: 1.0/1.021. Programmers can use either procedural programming or object-oriented programming to develop programs. A) False B) True Points Earned: 1.0/1.022. A (n) ___ is a named memory location whose value can vary. A) logic B) variable C) input D) output Points Earned: 1.0/1.023. Before a programmer plans the logic of the program, he or she must ____. A) understand the problem B) write the program code C) maintain the program D) test the program Points Earned: 1.0/1.0 24. After a programmer plans the logic of a program, the next step is ____. A) testing the program B) coding the program C) translating the program D) understanding the problem Points Earned: 1.0/1.025. A ____ allows users to interact with a program in a graphical environment. A) GUI B) command line C) CGI D) GCIPoints Earned: 1.0/1.026. ____ data items may involve organizing or sorting them, checking them for accuracy, or performing calculations with them. A) Outputting B) Processing C) Inputting D) Converting Points Earned: 1.0/1.027. Using ____ involves writing down all the steps you will use in a program. A) pseudocode B) a flowchart C) an interpreter D) a compiler Points Earned: 1.0/1.0 28. The process of walking through a program’s logic on paper before you actually write the program is called ____. A) flowcharting B) pseudocoding C) desk-checking D) testing Points Earned: 1.0/1.029. The repetition of a series of steps is called a (n) ____. A) loop B) infinite loop C) repeat flow D) flow Points Earned: 1.0/1.030. Besides the popular, comprehensive programming languages such as Java and C++, many programmers use scripting languages such as Python, Lua, Perl, and PHP. A) False B) True Points Earned: 1.0/1.031. Typically, a programmer develops a program’s logic, writes the code, and ____ the program, receiving a list of syntax errors. A) tests B) compiles C) executes D) runs Points Earned: 1.0/1.0 32. In a flowchart, the ____ is used to represent processing. A) rectangle B) circle C) diamond D) triangle Points Earned: 1.0/1.033. After programs are put into production, making necessary changes is called _____. A) maintenance B) testing C) conversion D) debugging Points Earned: 1.0/1.034. You represent a decision in a flowchart by drawing a decision symbol, which is shaped like a ____. A) parallelogram B) square C) circle D) diamond Points Earned: 1.0/1.035. A flowchart is an English-like representation of the logical steps necessary to solve a problem. A) False B) True Points Earned: 1.0/1.0
|
D2362419
|
http://www.answers.com/Q/Who_is_Janus'_family_tree
|
Is there an Ostara family history or family tree?
|
R Harrison 4,720 Contributions Is there an Ostara family history or family tree? In ancestry.com. there are a number of family trees for the Ostara family. Peter Zavon 201,985 Contributions What is a family tree? A family tree is a description of the descendants of a particular person or of the ancestors of a particular person. It is often, but not always, provided in a graphical, bran …Who was Janus? Janus is the Greek god of choices, doorways, tunnels, and keys. Rescue Pets 109 Contributions Who is Janus? Janus is an ancient Roman god of doorways, of beginnings, and ofthe rising and setting of the sun, usually represented as havingone head with two bearded faces back to back, l …Patricia Waszkiewicz 18,831 Contributions I like to share my brainful of trivia and Wiki. Answers is a great place in which to do it!Why is a tree used for family tree? A tree is used because the branches well symbolize the spreading branches of a family. Nyeshea 25 Contributions What are family trees?family trees are diagrams of your family, and grandmas, and grandpas, and great grandmas, and great grandpa, etc. it is the history of your family's past and was there firs …Skinny92 97 Contributions Why is a family tree called a family 'tree'? A "family tree" is called that because, when you draw it out on paper, it resembles a leafless tree, thus family tree . Matthew Burgess 396,785 Contributions What is a Janus? A janus is a two-faced person or hypocrite. Ginger Lioness 13 Contributions What is the family tree of the Tudor family? The first Tudor to rule England was Henry the 7th and his wife Elizabeth of York. They had four children Arthur, Henry, Margaret, and Mary. Arthur was the heir to the throne a …Chc2 15,983 Contributions Do all families have family trees? A family tree is a graphical representation of your ancestors. As we all have ancestors we can all have a family tree. Most people just have not drawn theirs. Who is in the janus branch of the Cahill family? All art-based people, like painters, writers, musicians, and other people like that. Some examples are Mozart, Picasso, Michaelangelo, Mark Twain, Shakespere, and Patti Lu Pon …Peter Zavon 201,985 Contributions What family of trees are crabapple trees in? Carbapples are in the Rosaceae family (Rose family).
|
D2684011
|
http://americanpaperoptics.com/our-products/polarized
|
Polarized
|
American Paper Optics, the world's leading manufacturer of 3D polarized glasses for special venues, expos, and museums, produces superior polarized glasses featuring the highest quality 6-ml polarizer film. Linear polarized glasses contain light gray filters cut at opposing 45-degree angles for viewing slide shows, multi-media displays, concerts, movies, and ride simulators. American Paper Optics is THE source for all types of polarized 3D glasses. We manufacture both linear (45°/135° and 0°/90°) and circular polarized 3D glasses. We stock all lens configurations in plain white paper frames, reusable theme park plastic frames, and the more stylish aviator style plastic frames as well as single use theatrical style Circular Polarized glasses for digital theaters. In 2001, APO was awarded a prestigious six year contract to manufacture over 1.4 million 3D Polarized glasses per year for Radio City Music Hall® "Rockettes TM Christmas Spectacular" which opened with a two-minute digital 3D movie. For eight years, APO has manufactured 45°/135° polarized glasses for the Lausanne, Switzerland Olympic Museum's 3D presentation of the 1998 Nagano Winter Olympics. Two million glasses were manufactured for Coke® Mexico's touring 3D show, "Rockola." More than 2,000,000 of our 3D glasses have donned theater lovers’ faces for the revival of Andrew Lloyd Webber's roller skating Broadway spectacle "Starlight Express." The British Museum of Art in London choose APO to design and manufacture 700,000 polarized 0°/90° glasses for the multi-media experience "The Mummy: The Inside Story in 3D." American Paper Optics supplies both the World of Coke and the Georgia Aquarium in Atlanta millions of polarized glasses each year. Our Circular Polarized paper glasses are used all over the world in theaters including for the opening of Avatar in Egypt and for Piranha 3D in India. Recognized as the world's leader in polarized technologies, American Paper Optics can help you with all aspects of your next project. Whether it is just a few plain paper or plastic polarized 3D glasses for a stereo slide show or you need a custom shaped, custom lens orientation for a major theatrical production, APO can provide the ultimate depth experience-we do it all! Give us a call or e-mail us for custom quotes, projects, or if you need technical information on polarized glasses.
|
D615574
|
https://my.cedarcrest.edu/ics/
|
Cedar Crest College
|
My Cedar Crest About Cedar Crest Cedar Crest College Cedar Crest College is a liberal arts college for women dedicated to the education of the next generation of leaders. Cedar Crest College prepares women for life in a global community by educating the whole student. The curriculum is designed to enhance the development of critical thinking and leadership skills, creative abilities, social awareness and technological literacy. Committed to experiential and lifelong learning, the College’s curricular and co-curricular programs empower students to be ethical, engaged, and responsible members of their communities, to appreciate global diversity, and to provide stewardship for the environment. My Cedar Crest Replacing Campus Web, My Cedar Crest is your "one-stop shop" for information regarding Cedar Crest College. Before logging in, students, faculty and friends of the college can browse course schedules and find useful information related to a Cedar Crest education. By logging in, students and faculty can access individually customized information regarding their classes, activities and many other aspects of life on Cedar Crest's campus. Safety at Cedar Crest: Sexual Misconduct/Title IXSAFETY at Cedar Crest Cedar Crest College is committed to health, safety and well being of all members of the College community ensuring that everyone has a learning and working environment that is free from sexual misconduct and sexual harassment. Any acts of sexual misconduct, sexual harassment, dating violence, domestic violence or stalking are prohibited without exception. Cedar Crest College expects all members of the College community to share in the responsibility for ensuring that the College environment is free from any form of abuse, violence or verbal or physical intimidation. Please click on the following link to view the College's brochure on Sexual Misconduct: http://pub.lucidpress.com/CCCTitle IX/My Cedar Crest Announcements You have no incoming announcements. Show All Announcements Course Offerings Course Search Password Management > Default Page My Cedar Crest Password Management Forgot My Password Residence Life > Housing Applications, Forms and Information Residence Hall Guest Registration Guests are welcomed on campus and in the residence halls and are required to abide by all College rules and policies. It is the responsibility of each resident student to familiarize her guests with all College policies and expectations of behavior. Resident students are directly responsible for the behavior of their guests and share responsibility for ensuring the safety of the residence halls. Resident students must uphold the tenets of the Honor Code at all time, which includes ensuring that guests are not residing in the hall or causing an undue burden on the community. Guest visitation is a privilege on the Cedar Crest College campus; the Department of Residence Life will address any concerns regarding guest visitation. Violations of the visitation policy may result in a minimum sanction of a written warning and maximum sanctions of residence hall eviction. Resident students are required to register all off-campus, non-Cedar Crest student guests immediately. Residents are permitted to have guests over the age of 12 stay overnight in the residence halls. Overnight visits are limited to two consecutive nights at a time, and eight nights total each month. Residents must register non-Cedar Crest College guests (or Cedar Crest College commuters visiting between the hours of 11 p.m. and 8 a.m.) using the online guest registration system. Guests may not be in the hall if their hostesses are not in the hall and must carry valid photo identification at all times and provide it immediately upon request from any College official. The entire visitation policy can be viewedhere. Pleaseclick here to register a guest.
|
D2232598
|
http://personality-testing.info/tests/NPI/
|
.
|
This is an interactive version of the Narcissistic Personality Inventory. Introduction: Narcissism in personality trait generally conceived of as excessive self love. In Greek mythology Narcissus was a man who fell in love with his reflection in a pool of water. The NPI was developed by Raskin and Hall (1979) for the measurement of narcissism as a personality trait in social psychological research. It is based on the definition of narcissistic personality disorder found in the DSM-III, but is not a diagnostic tool for NPD and instead measures subclinical or normal expressions of narcissism. So, even someone who gets the highest possible score on the NPI does not necessarily have NPD. Procedure: The test consists of forty pairs of statements. For each pair you should select the one that you feel best reflects your personality. It should take most people five to ten minutes to complete. Participation: Your use of this assessment must be strictly for educational purposes. It can not be taken as psychological advice of any kind. If you are interested in anything more than learning about narcissism and how it is assessed, do not take this test. Also, your answers will be anonymously recorded and possibly used for research or otherwise distributed. Source: Raskin, R.; Terry, H. (1988). "A principal-components analysis of the Narcissistic Personality Inventory and further evidence of its construct validity". Journal of Personality and Social Psychology, Vol 54 (5), 890-902.
|
D760065
|
http://www.blackwasp.co.uk/SQLSavepoints.aspx
|
SQL Server Transaction Savepoints
|
SQL 2005+SQL Server Transaction Savepointsby Richard Carr, published at http://www.blackwasp.co.uk/SQLSavepoints.aspx Sometimes Transact-SQL (T-SQL) scripts require the ability to roll back some parts of a transaction whilst allowing other elements of a process to be committed to the database normally. This can be achieved with the use of transaction savepoints. Nested Transactions SQL Server includes the concept of nested transactions, where one transaction is started within the scope of another. You might conclude that this would allow you to create a nested transaction, perform some actions and then roll back the changes of the nested transaction, allowing the outer transaction to continue as normal and be rolled back or committed later. Unfortunately, nested transactions do not behave in this manner. You cannot use them to reverse parts of a transaction, which can lead to errors when transactions are nested inadvertently. To demonstrate the problem, we need a simple table. Create one in a test database with the following script: CREATE TABLE People (Name VARCHAR (30))Consider the code below. Here we start by creating a new transaction. Let's call this the outer transaction. We then insert a row into the People table, providing the name, "Tom". Next we create a nested transaction and insert another row with the name, "Dick". The final two lines attempt to complete the transactions, rolling back the inner transaction and committing the outer. If this was valid, the People table would receive one new row with the name, "Tom", as the "Dick" row is inserted during the rolled back transaction. BEGIN TRANINSERT INTO People VALUES ( 'Tom')BEGIN TRANINSERT INTO People VALUES ( 'Dick')ROLLBACK TRANCOMMIT TRANIf you execute the above sample you will find that it generates the error: The COMMIT TRANSACTION request has no corresponding BEGIN TRANSACTION. This error suggests that the final line of the script, which commits the outer transaction, failed because the outer transaction no longer exists. Indeed, this is the case. The problem is that nested transactions do not behave in the manner you might expect. When you try to rollback a nested transaction, all active transactions are cancelled. We can see this by reading the @@TRANCOUNT variable at several points in the script. @@TRANCOUNT returns an integer containing the number of active transactions. It is incremented each time a BEGIN TRAN command is encountered. A value of zero indicates that no transaction is currently active. Run the following script and view the messages that are outputted. Note that each BEGIN TRAN increments the transaction count but that the rollback operation cancels both the inner and outer transactions. SET NOCOUNT ONBEGIN TRANPRINT 'First Transaction: ' + CONVERT ( VARCHAR, @@TRANCOUNT)INSERT INTO People VALUES ( 'Tom')BEGIN TRANPRINT 'Second Transaction: ' + CONVERT ( VARCHAR, @@TRANCOUNT)INSERT INTO People VALUES ( 'Dick')ROLLBACK TRANPRINT 'Rollback: ' + CONVERT ( VARCHAR, @@TRANCOUNT)/* MESSAGESFirst Transaction: 1Second Transaction: 2Rollback: 0*/This behaviour means that nested transactions do not allow us to perform partial rollbacks. In addition, nested transactions can introduce error conditions. For example, imagine you have a stored procedure or trigger that contains a transaction that is rolled back. If the process calling the procedure also uses a transaction, it's transaction could be unexpectedly rolled back by the stored procedure. A solution to both of these problems is the use of transaction savepoints. Transaction Savepoints Within a transaction you can create one or more transaction savepoints. These mark a point in a transaction to which you may wish to rollback. When you rollback to a savepoint, all of the database updates performed after that savepoint are reversed. Updates that happened after the transaction started but before the savepoint was declared are not affected. You can create multiple savepoints within a single transaction and roll them back individually. However, it's important to note that rolling back to a savepoint also removes any savepoints that were created later. For example, if you created savepoints named "s1", "s2" and "s3" in that order, rolling back savepoint "s2" would remove savepoint "s3". Savepoint "s1" would still be active. You never commit a savepoint manually. The updates following a savepoint that has not been rolled back will be stored or discarded according to whether the containing transaction is committed or rolled back. To create a savepoint, use the SAVE TRAN or SAVE TRANSACTION command. You must provide a name for the savepoint. This should be a string of up to 32 characters. If the name is longer than 32 characters the additional text is ignored. You can provide the name within a variable if desired. SAVE TRAN savepoint-name Rolling back a partial transaction to a savepoint position is achieved with the standard ROLLBACK TRAN or ROLLBACK TRANSACTION statement, providing the name of the savepoint to roll back to. ROLLBACK TRAN savepoint-name We can now modify our original, failing example to use savepoints. Below we are creating the initial transaction in the same manner as before. The nested transaction has been replaced by a savepoint, with the name, "Savepoint1". After inserting the row for Dick, we rollback to the savepoint before committing the transaction. Try executing the example. You should find that "Tom" is inserted into the table as expected but that "Dick" is not. You can see from the outputted messages that only one transaction is used for the process. SET NOCOUNT ONBEGIN TRANPRINT 'First Transaction: ' + CONVERT ( VARCHAR, @@TRANCOUNT)INSERT INTO People VALUES ( 'Tom')SAVE TRAN Savepoint1PRINT 'Second Transaction: ' + CONVERT ( VARCHAR, @@TRANCOUNT)INSERT INTO People VALUES ( 'Dick')ROLLBACK TRAN Savepoint1PRINT 'Rollback: ' + CONVERT ( VARCHAR, @@TRANCOUNT)COMMIT TRANPRINT 'Complete: ' + CONVERT ( VARCHAR, @@TRANCOUNT)/* MESSAGESFirst Transaction: 1Second Transaction: 1Rollback: 1Complete: 0*/Next: Page 221 April 2012
|
D322949
|
http://www.bbc.co.uk/news/uk-england-cornwall-27132035
|
Cornish people granted minority status within UK
|
The Cornish will gain the same status as the Scots, Welsh and Irish Cornish people will be granted minority status under European rules for the protection of national minorities. Chief Secretary to the Treasury Danny Alexander made the announcement on a visit to the county. Dick Cole, leader of Mebyon Kernow, which campaigns for Cornish devolution, said: "This is a fantastic development. This is a proud day for Cornwall. "The Cornish will gain the same status as other Celtic communities the Scots, Welsh and Irish. What does minority status for the Cornish mean? The Cornish will be afforded the same protections as the Welsh, Scottish and the Irish This means that government departments and public bodies will be required to take Cornwall's views into account when making decisions. It ensures that the rights of national minorities are respected by combating discrimination, promoting equality and preserving and developing the culture and identity of national minorities. The status does not attract extra money Cornwall: A nation apart? On a visit to Bodmin Mr Alexander said: "Cornish people have a proud history and a distinct identity. "I am delighted that we have been able to officially recognise this and afford the Cornish people the same status as other minorities in the UK. "'Celtic pride'Mebyon Kernow leader Mr Cole said: "A lot of people have been working for many years to get Cornwall the recognition other Celtic people of the UK already receive. "The detail is still to come out on what this might mean, but make no mistake that this is a proud day for Cornwall. "Analysis By Martyn Oates Political editor, South West The less than snappily-named Framework Convention for the Protection of National Minorities prohibits "any discrimination based on belonging to a national minority". More specifically, states which have signed up to it have to undertake "appropriate measures" to protect people against "threats or acts of discrimination". What this actually means in practice, though, is less clear. The Convention also stipulates that national minorities should be protected from "assimilation". What that might entail for Cornwall's complex and longstanding relationship with England, east of the Tamar also raises many interesting questions. The Convention is nothing to do with the European Union but operates under the authority of the Council of Europe, an international organisation which promotes co-operation between European countries in areas like legal standards and human rights. The European Court of Human rights - which enforces the European Convention on Human Rights - is the Council's best-known body. Bards from Gorsedh Kernow, which represents "the national Celtic spirit of Cornwall" welcomed the "historic announcement". Grand Bard of Cornwall, Maureen Fuller, said: "Cornish people have a proud and distinct identity and a genuinely democratic society respects the ethnic, cultural and linguistic identity of people belonging to a national minority. "We are proud of our history and our unique language and look forward to the day when these feature as regular subjects on school timetables and are spoken of by Cornish people as a way of life. "A group of key figures within Cornwall has been working on the paper setting out why the Cornish should be recognised by the Council of Europe's Framework Convention for the Protection of National Minorities. Campaigner Bert Biscoe, an Independent councillor who is a member of the group, said: "I very much welcome that the Cornish as a group can stand equally beside all other groups in British society. "Cornwall Council leader John Pollard said: "There are obviously significant benefits for Cornwall in being included within the framework convention, which is worth celebrating, and I pay tribute to all those who have worked tirelessly over many years to achieve this status. "Cornwall in numbers Population532,300£75bn value of economy (0.6% of UK)£22,087 average annual earnings (GB £26,551)£1.1bn average annual tourism revenue In the worst 5% of UK areas for households at risk of poverty Note: All figs from 2011 or 2011/12Source: Census 2011, Cornwall Council, Visit England, Experian Getty Images
|
D1272450
|
http://www.thefreedictionary.com/Ribcage
|
ribcage
|
ribcage Also found in: Thesaurus, Medical, Encyclopedia, Wikipedia. Related to ribcage: vertebral columnribcage ( ˈrɪbˌkeɪdʒ) n (Anatomy) the bony structure consisting of the ribs and their connective tissue that enclosesand protects the lungs, heart, etc Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © Harper Collins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014Want to thank TFD for its existence? Tell a friend about us, add a link to this page, or visit the webmaster's page for free fun content . Link to this page: Facebook Twitter Feedback Flashcards & Bookmarks? Please log in or register to use Flashcards and Bookmarks. You can also log in with Facebook Twitter Google+ Yahoo The Free Dictionary presents: Write what you mean clearly and correctly.
|
D733953
|
http://www.calorieking.com/calories-in-canned+pears.html
|
Calories in canned pears
|
Calories in canned pears Find nutritional information like calories, carbs, fat, protein and fiber for canned pears. Average All Brands Canned or Bottled Fruits : Pears, canned in light syrup Canned or Bottled Fruits : Pears, canned in juice Canned or Bottled Fruits : Pears, canned in heavy syrup Canned or Bottled Fruits : Pears, canned in water Fruit/Vegetable Juices & Juice Drinks : Pear Nectar, canned Del Monte (view more)Canned or Bottled Fruits : Pears: Halves or Sliced, canned Canned or Bottled Fruits : Pears Halves in 100% Juice, canned Canned or Bottled Fruits : Cinnamon Flavored Pear Halves, canned Canned or Bottled Fruits : Lite Pears: Sliced or Halves, canned Canned or Bottled Fruits : Sliced Bartlett Pears, bottled Vons (view more)Canned or Bottled Fruits : Fruit Cocktail in Pear Juice From Concentrate Canned or Bottled Fruits : Pear Slices, Bartlett in Pear Juice From Concentrate Sprouts Farmers Market (view more)Canned or Bottled Fruits : Mandarin Oranges In Pear Juice Albertsons (view more)Canned or Bottled Fruits : Light Bartlett Pear Halves In Pear Juice Full Circle (view more)Canned or Bottled Fruits : Organic Bartlett Pear Halves In Organic Pear Juice From Concentrate Great Value (Walmart) (view more)Canned or Bottled Fruits : Sliced Pears In Water Canned or Bottled Fruits : Diced Pears Market Pantry (view more)Canned or Bottled Fruits : Diced Pears Fruit In A Cup Canned or Bottled Fruits : Bartlett Sliced Pears In Light Syrup Meijer (view more)Canned or Bottled Fruits : Bartlett Pear Slices, Bartlett Pear Slices In Pear Juice From Concentrate Wild Harvest (view more)Canned or Bottled Fruits : Diced Peaches & Pears Canned or Bottled Fruits : Organic Diced Pears Key Food (view more)Canned or Bottled Fruits : Bartlett Pears Tops (view more)Canned or Bottled Fruits : Diced Pears In Light Syrup Hannaford (view more)Canned or Bottled Fruits : Bartlett Pear Halves Haggen (view more)Canned or Bottled Fruits : Sliced Peaches In Peach & Pear Juice Western Family (view more)Canned or Bottled Fruits : Bartlett Pear Halves America's Choice (view more)Canned or Bottled Fruits : Lite Bartlett Pear Slices Canned or Bottled Fruits : Lite Bartlett Pear Halves Canned or Bottled Fruits : Bartlett Pear Halves In Heavy Syrup First Prev 1 2 3 4 5 Next Last Can't find a food?
|
D2434868
|
http://corporate.publix.com/careers/support-areas/distribution/forklift-operator
|
Forklift Operator
|
Forklift Operator Simply put, our Forklift Operators are master organizers. They help maintain a smooth and orderly process when moving product into Publix's warehouses. How to Apply Contributions Warehouse Forklift Operators maneuver powered industrial equipment to move cases and pallets and put them away into their assigned slots in the warehouse. When slots located on the ground floor level are full and cannot store any additional product, the Forklift Operators place product in overhead storage slots. As the ground floor slot is emptied by the Warehouse Selectors, the Forklift Operators replenish it, pulling product down from the overhead compartments. The Operators take care to rotate inventory using the most dated inventory first. Furthermore, the Operators help maintain a clean warehouse and sweep out empty slots. Occasionally, they may fill in for the Warehouse Selectors as business needs demand. Qualifications we look for At least 18 years old Experience as a forklift operator, preferred Able to work nights, weekends, holidays, and extended periods of time Able to obtain certification in pallet truck and forklift operations Able to lift and carry product weighing 40 to 85 pounds (depending on warehouse)Able to sit or stand for long periods of time Successfully complete a Work Attitude Survey How to apply Go to the Publix Jobs Center to begin searching our current openings. Click the appropriate link to view openings for Publix associates and non-associates. Click Search Openings and narrow your search by selecting Distribution from the Job Category list. You will receive follow-up communication once you're determined to be qualified and eligible for the job. The communication will inform you of additional information that is needed and/or assessments that need to be completed. Once that is done, your application will go directly to the hiring manager for consideration. If your skills, experience, and qualifications look like a good match to the requirements of the position, you will be contacted. Visit our website for additional applicant resources. Having a match to this job does not guarantee that you will be hired into this job if and when it becomes available on our Publix Jobs Center.
|
D3214713
|
http://support.bell.ca/Mobility/Smartphones_and_mobile_internet/Apple_iPhone_4S.how_to_update_the_software_on_my_apple_iphone_4s
|
8. The iPhone has been successfully updated.
|
6. i Tunes will download the software update. When new versions are available, you can update the software on your Apple i Phone 4S for extra features and better performance. Here, we show you how to update your phone using i Tunes v11.1.0.126.8. The i Phone has been successfully updated. When new versions are available, you can update the software on your Apple i Phone 4S for extra features and better performance. Here, we show you how to update your phone using i Tunes v11.1.0.126.
|
D680040
|
http://answers.google.com/answers/threadview/id/779159.html
|
.
|
Question Subject: GC/MS urine test Category: Health > Medicine Asked by: southernights-ga List Price: $50.00 Posted: 01 Nov 2006 11:41 PST Expires: 01 Dec 2006 11:41 PST Question ID: 779159A gc/ms urine test was given to me on 10/04/06 by my employer! I am on ridalin for ADD but that showed up as a negative for amphetamines on this supposedly fool proof test. I take a lot of advil on a daily basis as I suffered a broken back several years ago. I am 58 yrs old and a positive came back for THC. My employer is cheap I cannot see her paying $150 to $200 for any test and the test came back by fax in less than 24hrs. How long does it take to turn a gc/ms test around like this. Could she be lying to me just to intimidate me! When she found out I am a recovering alcoholic and have had no alcohol or illegeal drugs for 15 yrs. she backed up and mentioned false positive results. She asked me if I would take another urine test and I said of course! That was almost 3&1/2 weeks ago, she has not offered to give me a follow up test since then she is stone walling me now. That test is supposed to be 99% sure. Could that test have been a lie.? There were no control questions like what RXs or OTC drugs was I taking now, when I took the test! Please help me!Answer Subject: Re: GC/MS urine test Answered By: tutuzdad-ga on 01 Nov 2006 13:29 PSTDear southernights-ga; Thank you for allowing me to answer your interesting question. A GC/MS urinalysis is a dual laboratory test that utilizes a hybrid technology of both Gas chromatography (GC) and mass spectrometry (MS). I recommend you first read this article to get a good overview of how the tests are administered and I think you will see just how difficult they are to defeat, how accurate they really are and how unlikely they are to provide false-positive results. SCIENTIFIC. ORG http://www.scientific.org/tutorials/articles/gcms.html Before I begin let me remind you of our disclaimer at the bottom of this page. Before forming an opinion about your situation based on what you learn here, keep in mind that professional advice in this subject area is always a better course of action than online research. What I am telling you here is primarily public knowledge that I have ferreted out for you in an effort to answer your question. As a general rule a GC/MS test takes about 23 minutes to run. However, most testing labs have quite a number of samples (simply by virtue of what they do) which they run all at the same time in an autosampler. Fifty samples, for example take about 24 hours to run. Even then, after the run is complete, a technician must examine each of the spectrum results from the chromatograph and log where the peaks have indicated the presence of specific substances with regard to each individual sample. The process is time consuming and I find it questionable that any lab contracted by en employer to perform a random drug screen not involving an emergency issue would have only one sample to test and would return the results via fax in just 24 hours. Such a report is theoretically possible, I suppose, but in my opinion not at all typical of what the process normally entails or what testing time normally permits. Here you will see an article from the Mississippi State Crime Lab (one of the smallest and least busy of all state crime labs in the United States) where this very issue is discussed. Clearly a state crime lab receives the most serious and urgent testing requests of any submitted and even THEY say that 50 samples take a minimum of 24 hours to spin up. State Crime Lab Uses Combined Scan/SIM by GC/MS to Boost Drug Analysis Throughput http://las.perkinelmer.com/content/featured/state Crime Lab Uses Combined Scan-SIMby GC-MSCST.pdf In any laboratory test there is a potential margin for error relative to equipment, chemical, environmental, intentional tampering, unintentional contamination or human error. There is NO urinalysis that is 100% ?foolproof?. In fact, in my estimation a GC/MS test is probably as close to error free as a drug screen urinalysis test can be yet even this test can, and sometimes does, have problems because of the factors I mentioned. This level of accuracy is typically why the GC/MS if most often used as a second confirmation test rather than an initial (and less expensive) test. The federal government considers the GC/MS test the ?gold standard? of urinalysis tests and is one of the few agencies that I know of that administer this type of test as an initial analysis (though others may do it that I am not aware of). How do I know this? Well, as it turns out I actually happen to be a law enforcement evidence technician with more than 20 years of law enforcement experience; six of which are in this particular field or work. While I do not perform the actual GC/MS tests myself I do prepare forensic samples for testing, have some working knowledge of such tests and act as a liaison between a law enforcement agency and a notable state crime laboratory. While Advil (Ibuprofen) can sometimes result in a false-positive for THC in some tests, a GC/MS should have detected it, identified it and isolated that detection from the naturally occurring and illicit substances (if any). In my own work the test results I typically receive list all the known elements that the GC/MS has identified. As a rule, a GC/MS test detects what is PRESENT and not only for the presence of something IN PARTICULAR. In other words, if you were taking Advil, ? Ibuprofen? should have also been listed on the results as one of the detected substances. If THC was present ? Tetrahydrocannabinol? should have also have been listed on the results. On some lesser reliable tests where a specific substance is tested for and a false-positive has occurred, THC might show up IN LIEU OF Ibuprofen but rarely do these both show up because that is not the nature of the test. You see what I mean? They test for THC, detect some other substances that creates a false-positive result indicative of the presence of THC, but the test results shows ONLY THC and not the interfering compound because that compound was not specifically tested for. A GC/MS doesn?t normally provide this kind of result because it doesn?t JUST say there is A SUBSTANCE in your urine sample; it indicates WHAT ALL WAS DETECTED in the urine sample. That?s why this type of test is considered a gold standard. You will see here in this chart prepared by Toxicology Associates, Inc., a company that tests blood, serum, urine, and solids for trace evidence of various substances, lists Ibuprofen (Motrin, Advil) specifically as one of the substances that a GC/MS test is designed to identify and detect. TOXICOLOGY ASSOCIATES, INC http://www.toxassociates.com/special.htm Having said that, the best we can do is to say, ? Yes, it is POSSIBLE that your sample was subjected to a GC/MS test and it is POSSIBLE that through some interference the test provided a false-positive result?. Not knowing your employer, her ethics or perhaps her underlying motivation (as you suggested) it is also POSSIBLE that you are being misled. The fact that you were promised a follow-up test that never occurred, given the fact that you already suspect you are being unfairly targeted, does give rise to suspicion in my opinion. If we are to assume the GC/MS test was a typical test with typical results, the fact that your sample was supposedly subjected to a GC/MS test and ALL detected substances were not on the results (if they was the case) is also an issue to consider. Since the legal implications vary from state to state and we are prohibited from offering legal advice, it is probably in your best interest to consult an attorney if the issue rekindles and takes a turn for the worst. Otherwise, in the event nothing more comes from it, maybe you should just cut your losses and let the subject go. I hope you find that my answer exceeds your expectations. If you have any questions about my research please post a clarification request prior to rating the answer. Otherwise I welcome your rating and your final comments and I look forward to working with you again in the near future. Thank you for bringing your question to us. Best regards; Tutuzdad-ga ? Google Answers Researcher INFORMATION SOURCES Tests on Trial - - Jobs and Reputations Ride on Unproven Drug Screens http://www.cleartest.com/testinfo/unproven_drug_screens.htm SEARCH STRATEGY SEARCH ENGINE USED: Google ://www.google.com SEARCH TERMS USED: URINALYSIS DRUG SCREEN GC/MS GAS CHROMATOGRAPHY MASS SPECTROMETRYComments Subject: Re: GC/MS urine test From: aceresearcher-ga on 01 Nov 2006 16:02 PSTsouthernights, It certainly sounds to me as though the testing done on your sample was not a GC/MS but possibly a less-expensive, less-accurate test. A test like this one: http://www.drug-testing-solutions.net/homedrugtestkit.html might test positive for THC but certainly isn't going to indicate if the "positive" was caused by ibuprofen, not marijuana. It's possible that she is stonewalling you now because after your admission of your history she considers you a poor employee risk and wants to get rid of you, even though you have been clean and sober for 15 years. A quick review of the U. S. Equal Employment Opportunity Commissions page on EEO legislation would suggest that, if she persists in denying you the opportunity to clear your name, you might have just cause for a claim of discrimination in employment practices: http://www.eeoc.gov/abouteeo/overview_laws.html You might speak to her again, telling her that you have a right to have your own copy of the test results showing the type of test and the name, address, and phone of the testing lab, in addition to the results. Request the follow-up test she promised you. If she puts you off on either of these things, point out that you're sure she would not want to be investigated by the EEOC for discriminatory employment practices. But before doing so, be aware that confronting your employer in this way may cause her to make your work environment unbearable in an effort to get you to quit, perhaps in subtle ways that cannot really be proven. If that happens, however, or if she fires you because of your supposedly positive result, a labor-rights attorney could certainly advise you as to whether you might have a case for legal action. I'm sorry that you're experiencing this, and I wish you the best in achieving a positive resolution. Regards, aceresearcher Subject: Re: GC/MS urine test From: markvmd-ga on 01 Nov 2006 19:38 PSTGet yourself a hair follicle test NOW and slap her in the face with it. Well, maybe skip the last part. Subject: Re: GC/MS urine test From: probonopublico-ga on 01 Nov 2006 21:09 PSTDid I see aceresearcher-ga? If so, Hi! Or am I hallucinating yet again? Worried of Hove
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.