Saturday, November 30, 2019

Molecular stability (rheology) of a plastic carrier bag through stress strain tests Essay Example

Molecular stability (rheology) of a plastic carrier bag through stress strain tests Essay I am going to study the molecular stability (rheology) of a plastic carrier bag through stress strain tests. I will do this through a simple viscoelastic experiment of where I will be able to calculate the Young Modulus and assess Hookes Law. Plastic carrier bags are made from polyethylene or polyethene, which is a homopolymer. Polyethylene comes from ethylene. Ethylene is an alkane made up of a series of saturated hydrocarbons. The alkane series are known as homologous series as they share the properties and general formula: (CnH2n+2) 1.1 Origin of plastic Essentially plastics are materials that can be heated and moulded and maintains this moulded shape once it cools. We will write a custom essay sample on Molecular stability (rheology) of a plastic carrier bag through stress strain tests specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Molecular stability (rheology) of a plastic carrier bag through stress strain tests specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Molecular stability (rheology) of a plastic carrier bag through stress strain tests specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Plastics have existed since the beginning of time. Plastic contains natural elements such as carbon(C), hydrogen (H), nitrogen (N), chlorine (Cl) and sulphur (S). These elements can be originated from naturally grown organic materials such as wood, horn and rosin. Animal horn and amber are examples of natural plastics. Already renown for his work in the rubber industry, Alexander Parkes invented a material that was based on cellulose nitrate at the Great Exposition of 1862 in London. He called this material Parkesine, which was the first synthetic polymer. His invention was due to a new scientific movement to utilise by-products of natural gas production. We are now in the Age of plastics where plastic dominates our industrial world. Plastic is a force that will shape the twenty-first century, bringing to fruition new wonders in tomorrows world. Carin Glaser 1.2 Polymer Polymer comes from the Greek word, poly meaning many and mer meaning part. Polymerisation is the chemical process of forming polymers from their components of monomers. Polymerisation is often an intricate process that may be initiated or sustained by pressure, heat or with catalysts. Monomers generally contain carbon and hydrogen including, sometimes, chlorine, nitrogen, oxygen or fluorine. A polymer is a chemical compound with a high molecular mass constructed of chains of monomers linked together through bonds. Polymers can be categorised into two forms of polymers, addition polymers and condensation polymers. Condensation polymers consist of repeats of units that are bonded, which contain fewer atoms than the original monomer/s because of the loss of substances such as water. Addition polymers consist of the same monomer units that attach one at a time i.e. they have the same structural unit. A resultant of additional polymerisation, of monomer to polymer, with polyethylene is shown below. Ethylene; Polyethylene; 1.3 Cracking in the plastics industry Cracking is a process in industry where large chains of aliphatic hydrocarbons that make up crude oil/petrochemicals are broken down into smaller, more useful fractions. Factors such as high temperature, high pressure and catalysts are needed to break these long chains into shorter chains. Petrochemical such as oil or natural gas contain hydrocarbons. These hydrocarbons are processed through a reactor into a procedure known as cracking. In the plastic industry a natural gas derivative known as resin is produced. Resin pellets are then moulded or formed to produce several different kinds of plastic products with application in many major markets. The fickleness of the resin pellets proves a complex resin to be specifically designed for the consumers requirements. The different resins produced in the industry is the reason why certain plastics are better for different applications while others are best suited for entirely different applications. The production of a plastic bag is done through a process known as blown film extrusion. This process involves the resin being blown up and extruded to produce tubes of film. 1.4 Polymerisation of ethylene Branched polyethylene is produced through a free radical addition reaction. As shown above polyethylene are ethylene molecules bonded together. There are three stages to this process, these are: 1.4.1 Initiation Oxygen is the initiator of this process. The oxygen reacts with the ethylene to produce organic peroxide. Oxygen peroxide consists of double oxygen single bonds that are extremely reactive and break easily to give free radicals. This process can be avoided by adding other organic peroxides directly to the ethylene. The free radicals vary depending on the source, the basic formula for these free radicals is Ra*. These free radicals then react with the monomer to find its pair. This then pushes the monomers molecule leading the reaction back to the free radical stage. 1.4.2 Propagation The adding of more and more monomers to the growing chains is called propagation. The conductor of the experiment can add extra ethylene molecules to construct a long chain of them. Self-perpetuating reactions like this one are called chain reactions. The ethylene molecule consists of a double bond. One pair is held loosely on an orbital, this is known as a pi bond. The other pair is called a sigma bond and is held sturdily onto the nuclei. The free radical breaks the pi bond to form with another monomer. This is efficient because the previously weak pi bond is broken and the new carbon bond is stronger. This concluding that the more energy that is produced results in an additional stability to the system. This propagation results in the radical becoming larger and lengthened. Therefore each longer, larger radical can react with its other radicals to produce a polymer that extends further. 1.4.3 Termination This chain reaction must eventually end. The instability of the radicals means that eventually they will collide and form a pair without making a new radical. This then becomes one of the final molecules of the polyethylene chain. This termination process is called coupling. 1.5 Metal and plastic As we move closer to the future we can see that plastics are slowly taking over the function of metals on our society. The reasons for this are pretty simple, plastics are cheaper to make in industry than metals. Forms of iron are renown for its strength in the field of life but iron oxidises and slowly degrades. Plastics are non-biodegradable, meaning that they are suitable for long term uses unlike metals that are prone to disintegrate. Plastics do not need a great deal of heat to be moulded into shapes but metals tend to have a high melting point, this is cheaper for industries because less energy is used to make their products. The strengths of plastics are shown in industry through fire resistant material, bulletproof vests and puncture resistant tyres, buildings etc. Plastics are also known now to be able to conduct electricity (although not to a degree of a metal like copper) by modifying polyacetylene by blasting the material with iodine vapour. Thus, eradicate an electron giving the material a positive charge, allowing the material to conduct electricity. This may eventually resulting in plastics replacing metals in the electricity components, making modern technological equipment, such as DVD players, computers, TVs etc., cheaper to produce. Plastics are currently manufactures from crude oil through the cracking process but now scientists have discovered producing biodegradable plastics using waste food. The process is considerably cheap and could revolutionise issues such as protecting our ozone (as waste food release methane gas) and also keeping landfills clear of pollution. 1.6 The forces between the molecules The physical properties of polyethylene are judged by its intermolecular forces. The intermolecular force is the force attracting one molecule to another, Van der Waals attractions or hydrogen bonds. The melting and boiling point of any molecule would depend on the potency of the intermolecular forces. Van der Waals attractions are more likely to occur with larger molecules and these attractions need more energy to split. Presence of hydrogen bonds will lift the melting and boiling points. When covalent molecular substances are heated, they usually melt at low temperatures. The molecules do not decompose but remain as separate groups of atoms. This implies that the forces within the molecules are strong but the forces between molecules are not very strong. The forces holding the molecules together are not the strong forces of attraction resulting from the sharing of electrons. Source http://www.nelson.com.au/chemistry/guide/unit1chemistry/s1b.htm Polymers are normally long chains of hydrocarbons, the longer the chain of molecules, the higher the melting and boiling points are. This is due to the increase in dispersion forces as the size of the molecule increases. Hydrogen and carbon are non-metals and in general covalent bonds are associated with two (or more) non-metals bonding. In this bond the electrons are shared between the atoms. Electronegativity is the power of an atom in a molecule to attract electrons to itself. Carbon has an electronegativity of 2.5 and hydrogen 2.2. Therefore the higher electronegativity of the carbon atom signifies that the bonding electrons are attracted to the carbon atom rather than the hydrogen atoms. As the carbon atom contains more electrons it becomes vaguely negative and the hydrogen becomes slightly positive. This negative and positive bond is known as polarised and each molecule is a polar molecule or dipole. The hydrocarbons can organise themselves to result in the negative end of one molecule to be supported with the positive end of the next molecule. This type of intermolecular bonding is called dipole-dipole attraction. Molecules that are not polar have the weakest forces of intermolecular bonding between them. These types of substances are observed to have the lowest melting and boiling points. These molecules are held together by dispersion forces, which result from instantaneous dipoles caused by the constant movement of electrons within the molecules. The strength of the dispersion forces increases as the number of electrons in the molecule increases. Source http://www.nelson.com.au/chemistry/guide/unit1chemistry/s1b.htm 1.7 HDPE ; LDPE High and low density polyethylene are created in conditions under that ethylene is polymerised, the molecules become attracted towards each other in the solids by Van Der Waals dispersion forces. 1.7.1 High-density polyethylene (HDPE) A linear polymer is the most basic form of polymer structures (HDPE) HDPE has generally no branched chains. This allows molecules to attach nearer to the molecule in a normal way, which is almost crystalline. This signifies that the dispersion forces are more effectual therefore the material is moderately stronger and has a higher melting and boiling point compared to LDPE. 1.7.2 Low Density polyethylene (LDPE) LDPE has many short branches besides the chain. The extra chains stop the other chains from lying closely together in a neat arrangement, dispersion forces are therefore lower compared to HDPE and the material is fragile and has a lower boiling and melting point. The density of the material is lower since the wasted space within the irregularly packed formation. 1.8 Thermosets Thermoplasts There are two distinguished features of plastic. These two are thermosetting and thermoplastic: * Thermoplastic (thermoplast) is a polymer that is cross-linked. When heated the cross links are softened and then the polymer has the ability to be moulded into different shapes. Once cooled the polymer returns to its original stability. This process can be repeated many times. Its is of great use in the plastics industry because materials that do not need great strength but personalised structure such as plastic bags can be made with ease. * Thermosetting polymers are significant for their strength and durability. They are vastly stronger but brittle compared to thermoplasts. They are, in general, linearly structured such as HDPE. When heated a thermoset is made substantially infusible or insoluble, therefore the polymer cannot return to its original shape, or the polymer experiences plastic deformation. 1.9 Youngs Modulus The Youngs Modulus is stress/strain at the elastic limit. It is basically a measurement of the strength of a material or how much the material yields for each pound of force. Deformation relates to the stress strain behaviour of a material. Stress can be seen as the pressure exerted onto a material. To calculate stress the formula stress = load/area of cross section is used. Strain is the deformation of a material in relation with stress, or the deflection of a material due to force. For this experiment I need to calculate these three. 2.0 Prelimary work Preliminary work is done to pre determine the needs for the final experiment to be a success. I shall cover issues such as safety and dimensions. 2.1 Dimensions of plastic strip To calculate the length and width of the plastic strip of bag that I would use for the experiment I had to test the maximum strength of different lengths and widths of bags. From pre-knowledge of structures of molecules, the wider strip should be able to withhold more weight and the longer bag should extend further. I will choose various lengths of the plastic strips and summarise the maximum load limit of the strips. To measure this limit I shall use the method chosen for the experiment. N.B: Throughout the experiments I shall be taking Gravity (g) as 10ms-1 2.1.1 Results Prelimary Experiment Max Load (N) Length (mm) Width (mm) 1 2 3 Average 100 10 8 8 9 8.3 150 10 10 9 9 9.3 200 15 12 14 12 12.7 200 20 16 15 16 15.7 250 20 17 17 17 17 2.1.2 Summary I conclude that the wider the strip of plastic, in general, the heavier it holds before breaking. The weight holders carry around 15 Newtons each therefore I shall use 200mm by 20mm for my experiment. I noticed that when I added more weights the width of the bag shortened as the extension became greater, this may affect the eventual outcome of the result. To indicate this later in the experiment I shall identify any anomalies. I also need to calculate the impact that I did when I added the weights on directly, later in the experiment I need to add the weights on Newton by Newton simultaneously. Calculating stress To calculate the stress I need to use the formula: Stress = Load Area of cross section First I need to calculate the area of the cross section. To do this I shall use the formula: Area = width ? thickness The cross section of the paper strip is: The thickness of the bag varied in each strip so I took the average of the thickness of the plastic strips from 6 samples using a micrometer. Average (mean) = ?x ?f Samples thickness: 1. 0.019mm 2. 0.022mm 3. 0.02mm 4. 0.018mm 5. 0.019mm 6. 0.02mm These results are fairly close together therefore I shall use these results, as they seem accurate. ? Mean = 0.019 + 0.022 + 0.02 + 0.018 + 0.019 + 0.02 6 Thickness = 0.0197mm If area = width x thickness Thickness = 0.0197mm Width = 20mm ? Area = 20 ? 10-3 (m) ? 0.0197 ? 10-3 (m) Area = 3.94 ? 10-7 m2 From these results I can calculate the stress. I shall go to the force of 17N because from previous knowledge I can say that the strip will be likely to break at this point or below. Load Applied (N) Stress = load/area of cross section (Pa) 0 0 1 2.5 x 106 2 5.1 x 106 3 7.6 x 106 4 1.0 x 107 5 1.3 ? 107 6 1.5 ? 107 7 1.8 ? 107 8 2.0 ? 107 9 2.3 ? 107 10 2.5 ? 107 11 2.8 ? 107 12 3.0 ? 107 13 3.3 ? 107 14 3.6 ? 107 15 3.8 ? 107 16 4.1 ? 107 17 (max) 4.3 ? 107 2.3 Prediction I predict that to the elastic limit the force will be proportional to length. Beyond the elastic limit the extension of the plastic strip will increase excessively. 2.3.1 Deformation This is because of deformation. Deformation is the modification of a material in response to force. The two types of deformation are elastic and inelastic (plastic). Elastic deformation is when a material returns to its original shape after the force has been applied. Inelastic deformation is the change of the original shape after a force has been removed. The reason of deformation is related to the bonds in the material. In deformation the bonds are being re-arranged. For example, when stretching a polymer the connecting covalent bonds are given energy and the bonds are stretched. The reason of inelastic deformation is that when the energy is applied to the bonds the cross links are moved then the object therefore changes its original shape. With a large enough force the bonds will break and the polymer breaks. 2.4 Reasons for testing The reasons for testing are: 1. Safety measurements. 2. Provide a basis for reliability. 3. Quality control. 4. Establish design ideas. 5. Meet the standards and specifications set by producers and standard agencies. 6. Verify manufacturing process. 7. Evaluate and compare against competitors products. 8. Establish history for new materials. 2.4.1 Costs of testing I need to research the cost of testing polymers to understand the importance of testing in the plastic industry. From Dr. Shastri I have found that the costs of testing polymers in industry are: Property (Single-point data) Cost Range Per Grade Average Cost Mechanical properties $780 $3120 $1500 Thermal properties $1030 $3270 $2000 Rheological properties $ 370 $ 650 $ 500 Electrical properties $1020 $1860 $1500 Other properties $ 170 $ 540 $300 $5800 Property (Multi-point data) [viz, creep, stress-strain] Average Cost $14,484 $93,140 This concluded that the testing of polymers at an industry level is out of my budget and time range. Therefore I must keep the experiment at, to a degree, a simplistic level. The large cost of the testing of polymers in the industry justifies the importance of the material to society. This relates with why that safety is needed when testing the material, I shall later resolve safety procedures. 2.5 Possible solutions to conduct this experiment in a laboratory are: 1. This method of conducting the stress relaxation test is needed with a pc to measure the length and force applied; the computer can then create a diagram of force/extension. I cannot execute this method because I have not got the right equipment and this experiment does not allow me to calculate the effects manually, which is what I wish to accomplish. 2. This experiment is capable of doing but I think that the material stretched along the table at such a length would mean I would have to use a long plastic bag which are hard to get hold of; apart from that this method would be acceptable for wire dimensions materials. 3. The ruler held into a fixed position means that there are less human errors in the measurements. The fixed position with the clamps and retort stand shows the stability and rigid structure of this method. This experiment allows me to manually draw up diagrams to calculate the Youngs Modulus. I am going to use experiment 3 to perform my experiment. Method to perform experiment 3 2.5 Apparatus Apparatus that I will need to conduct this experiment from the method I have chosen are: * Ballpoint pen. * Paper. * Metal wire. * Meter rule. * Micrometer. * Plastic carrier bag. * Retort stand. * Scalpel. * Safety (metal) ruler. * Scissors. * Sticky tape. * Wire clippers. * Cushion. * Weights. * Stop watch. A strip of plastic bag needs to be measured using a ruler accurately onto the bag with a pen. The marked out strip then needs to be cut using a sharp tool such as a scalpel and a safety ruler is needed for precision cutting and safety. The device I have chosen to hold the material to the weights and clamp is a metal wire that has been twisted. The wire will be 100mm long and then twisted into a circle like shape as shown in the diagram (left). The wire will be firstly looped into a ring of plastic from the bag; each side of the bag will be a fixed length for the wire to loop into. 2.6 Method 1. Set up the experiment as shown in the diagram. 2. Measure the length of the plastic bag between the two marked points using the ruler that is attached to the retort stand. 3. Add one Newton to the plastic bag. 4. Begin the stopwatch. 5. Once 5 seconds have passed measure the new length using the ruler. 6. Continue steps 3-5 adding one extra Newton each time until the plastic bag snaps. 7. Repeat the experiment 5 times for a fair test. The most important factor is always making accurate measurements. By checking the results of measurements more than once using a ruler and then obtaining an average will provide me with suitable evidence of recurring measurements therefore showing that they have been accurate. 2.7 Safety procedures Safety is one of the major factors of doing any experiment, or anything. The safety factors that I will take into hand in this experiment is: * Work in a large open area that will be sufficient to be a good distance away from people. * Keeping my body away from the weights and putting a cushion underneath the weights to soften the blow when the plastic strip breaks. * Take care when handling scalpels. * Use a safety metal ruler when cutting with the scalpel. * Using wire clippers to cut wire. * Use retort stand so weights are sturdily held. * Use weight holders so weights are held tightly together in an order. * Always be aware. 2.8 Fair test For the result of the experiments to be valid and contain fewer errors I need to suggest factors that will affect the result and then resolve them with solutions. The fair test factors that I have taken into practice in this experiment are: * Use the same plastic bag because of specimen variations. * The molecule variation in the bag, the bags handles might be made stronger than the bag, although this may not be true. * Do the experiment in room temperature, as the heat affects the atom bonds. * Keep the rate of loading the weights simultaneously because of impact strength. * Keep the ruler attached to the same place on the retort stand. * Repetitive. * Conduct the experiment five times to devise anomalies. * Use the same dimensions of plastic strips and wires. * Accurately measure with a ruler and avoid parallax errors. * Accurately cut the plastic strips with a sturdy ruler. Other factors that I have taken into place are the weight of the metal wire, but this was under a gram so it would not have affected my result by a lot and if I used the same wire consistently I could justify with the errors. 2.9 Creep Creep is a major factor when using heavier weights because the strip will gradually deform to relieve stress. This is why I need a fixed time to measure the extension when doing the experiment. 3.2 Conclusion My prediction was: I predict that to the elastic limit the force will be proportional to length. Beyond the elastic limit the extension of the plastic strip will increase excessively. My prediction in accordance to my results states clearly that this statement is true. Therefore my results are a success. The strips broke at different forces. This means that some of the strips may have been stronger than the other ones. This may have affected my results before the material reached its elastic limit because the bonds might have been stronger, also maybe because of human errors. The bonds in the different parts of the bags may have been engineered differently to suit its purposes i.e. the handle of the bag may have been made stronger than the body because of the force applied to it. I found that after the material reached its elastic limit the results became a little random. This may have been due to creep and the difficulty to measure the extension when the material is constantly going through deformation and the bonds are weakening making the material extend at a faster and easier rate. I have not included results after the elastic limit in my calculations because of this. The bag may also have contained additives such as colorants to produce colours on the bag; this may affect the bonds in the bag slightly and therefore affecting my results. I found the strip went through plastic deformation at around 10 N, which is equal to 1 kg. Bags are made to carry around 7 kg and the strip I cut was 1/10th of the bag, meaning that the strip cannot be justified as the strength of the bag as the shape of the bag differs from the strip and is stronger than the strip because of the way it is built. To summarise the results fairly I have created an averages of my results. I shall use the average results to do my calculations of the Youngs Modulus and strain energy. 3.3 Evaluating Graphs 3.3.1 Calculating Strain Energy When the strip is stretched we can say that energy has been applied to it, i.e. it extends (goes through deformation). The force extension graph can calculate the work done on the strip. Energy is measured in joules and is the area below the elastic limit on the graph. This energy is called work done and is the elastic potential energy, or the strain energy in the strip. Strain energy is the area underneath the force extension graph up to the elastic limit. ?This area must be a triangular shape because the line up to the elastic limit is straight. The area of a triangle = 1/2 base x height ? Strain energy = 1/2 f.x Where f is the force to produce the extension, x. Strain energy = 1/2 x 9 x 8 x 10-3 = 0.036 J 3.3.2 Calculating Youngs Modulus (E) Youngs Modulus is a measurement of the stiffness material. It is similar to calculating the gradient of the line up to the elastic limit. Youngs Modulus = Stress Strain = 2.5 x 107 0.096 = 2.604166667 x 108 Pa = 2.60 x 108 Pa (to 3 s.f) 3.4 Calculating the % errors for Strain Energy and E All experimental measurements have some degree of error associated with them. Physics Dept. New College Durham. There are systematic and random errors. A systematic error is when the method of measuring is always to large or to small. Such as a non-parallax error or when instruments such as the micrometer are not zeroed correctly. Random errors are when repeated results have different outcomes. To avoid this the experiment can be repeated and then take an average from the results. The formula used to calculate error = ? Smallest division Height gained Error in 100g masses = ? 0.1g ? ? 1.0 x 10-4kg Error in metre rule reading = ? half the smallest division of the rule. = ? 0.5mm Since a measurement is the difference between 2 readings error = ? 1mm ? ? 1.0 x 10-3m Error in vernier reading = ? half the smallest division = ? 0.0005mm Therefore the measurement error (2 readings) = ? 0.0001mm ? ? 1.0 x 10-6m 3.4.1 Strain Energy Strain Energy = 1/2 x load x extension Elastic Limit = 0.9 kg and 8 x 10-3 m % Error in mass (9 x 100g) = 9 x 1.0 x 10-4 kg x 100 9 = ? 0.1% % Error in extension (metre rule) = 1.0 x 10-3m x 100 8 x 10-3 m = ? 12.5% To obtain the total error for strain energy, add the % errors = ? (0.1% + 12.5%) = ? 12.6% Strain energy = 1/2 f.x = 1/2 x 9 x 8 x 10-3 = 0.036 J ?Strain energy = 0.036 J ? 12.6% = 0.036 J ? 0.00454 J 3.4.2 Youngs Modulus Youngs Modulus = Stress Strain = (Force/area of cross section) (Extension/original length) = Force/area of cross section x original length/extension = (Mass x gravity/thickness x width) x (original length/extension) Mass % error = ? 0.1% Material thickness = 0.0197mm ? 0.0197 x 10-3m Material width = 20mm ? 20 x 10-3m Original length (between lines) = 100mm ? 100 x 10-3m Extension = 8mm ? 8 x 10-3 m at elastic limit Material thickness % error = 1.0 x 10-6m x 100 (Vernier) 0.0197 x 10-3m = ? 5.076142132 ? ? 5.08 (to 3 s.f) Width % error = 1.0 x 10-3m x 100 (Rule) 20 x 10-3m = ? 5% Original length % error = 1.0 x 10-3m x 100 20 x 10-3m = ? 0.5% Extension % error = 1.0 x 10-3m x 100 8 x 10-3m = ? 12.5% For the total error, add the % errors = (mass + thick + width + ori length + extension) = ? (0.1 + 5.08 + 5 + 0.5 + 12.5) = ? 23.18% ?Youngs Modulus = 2.60 x 108 Pa ? 23.18% = 2.60 x 108 Pa ? 60268000 Pa = 2.60 x 108 Pa ? 6.03 x 107 Pa (to 3 s.f) 3.5 Evaluation The experiment conducted allowed me to calculate the Youngs Modulus using a carrier bag, the method I used was suitable to the objective of measuring force against extension (the investigation). From my results and graphs I can see that there were no spurious readings in the investigation. Therefore my experiment was a success. The problems of this experiment was the cutting of the plastic bag as due to the lack of friction the plastic bag was not held properly onto the work surface. I tried to resolve this by embracing the carrier bag onto the work surface whilst I cut it but this was still difficult as the bag still moved. When the strip had a force applied its width reduced and the strip became compact into a wire dimensional shape. I would have preferred f I was able to hold the original shape intact when adding the weights. I did try other methods, such as replace the wire with a pencil and hold the weights on each side but this meant that the weight addition was going up by 2N instead of 1N simultaneously. Also putting on the 2 weights at the same time was difficult because of balancing the pencil, this meant that creep came into affect and I it was hard to record measurements at a fixed time. I would have preferred to use a PC to help me record my results, as this would have reduced the human errors and recorded the results more accurately than I could have. But the costs of using a computer and setting it up was time consuming and would not have correlated with the time I was given to conduct this experiment. The strain energy and Youngs Modulus % errors were both above 10% and this is quite a high figure when trying to measure accurately. If I used a computer this would have reduced my errors and made my measurements accurate. If I were going to extend this testing into measuring hardness, viscosity or ductility then I would have re-done the experiment using a PC. At a more advanced level plastic deformation is caused by the motion of dislocations, which involves the breaking and reforming of bonds. This can be seen as a random procedure because the force applied would have to be done on the same material with the exact structure and the force applied in the exact place. As carrier bags are made in masses I doubt that the structures are exactly the same. Therefore it would be pointless for me to have measured beyond the elastic limit.

Tuesday, November 26, 2019

Great Gatsby4 essays

Great Gatsby4 essays Defined by a book of current literary terms, a climax is "the arrangement of a series of ideas or expressions in ascending order of importance or emphasis; the last term of the arrangement; a culmination." Written by F. Scott Fitzgerald during the roaring 20's, The Great Gatsby provides a look into the upper class circle of the East and West Villages of New York City. Known as East and West Egg in the novel, Fitzgerald, through the eyes of bachelor, portrays a cynical view of the high social society and the morality which it lacks. This scarcity of ethics ultimately causes the downfall of their hollow world in a clatter of broken hearts and mislead minds. The climax of The Great Gatsby takes place in a New York Hotel suite when, after many hints toward the reason for Gatsby's company, the true nature of his presence is revealed to Tom Buchanan. Ever since Jay Gatsby returned from World War I, which swept him away from his boyhood love Daisy, he has made every indirect effort to make contact and rekindle her love for him. Even with the knowledge that she is married and leads a separate life from his, Gatsby, without regrets, lives his life for her. When, at long last, he has the chance to interact with Daisy, he capitalizes on it immediately. With the assistance of Jordan Baker and his neighbor Nick Carraway (Daisy's second cousin), Gatsby arranges a meeting with Daisy. At this meeting the two hearts are reunited and again would be one, if not for the plate glass barrier of Daisy's marriage to Tom Buchanan which separates them. Originally held apart by a young boys' ineptitude to provide for a wealthy girl, Daisy is now held back by a seemingly insincere knot of matrimony. This keeps the all important bonds of love to be formed between the two former lovers. Tom, a wealthy man with family history, is enlightened to the existence of this perennial relationship in a slow weave of events which...

Friday, November 22, 2019

Civil Rights Movement Timeline From 1960 to 1964

Civil Rights Movement Timeline From 1960 to 1964 This civil rights movement timeline chronicles important dates during the struggles second chapter, the early 1960s. While the fight for racial equality began in the 1950s, the non-violent techniques the movement embraced began to pay off during the following decade. Civil rights activists and students across the South challenged segregation, and the relatively new technology of television allowed Americans to witness the often brutal response to these protests. President Lyndon B. Johnson  successfully pushed through the historic Civil Rights Act of 1964, and a number of other groundbreaking events unfolded  between 1960 and 1964, the span covered by this timeline. 1960 Civil Rights Sit-In at John A Brown Company. Oklahoma Historical Society / Getty Images On Feb. 1, four young African American men, students at North Carolina Agriculture and Technical College, go to a Woolworth in Greensboro, N.C., and sit down at a whites-only lunch counter. They order coffee. Despite being denied service, they sit silently and politely at the lunch counter until closing time. Their action marks the start of the Greensboro sit-ins, which sparks similar protests all over the South.On April 15, the Student Non-Violent Coordinating Committee holds its first meeting.On July 25, the downtown Greensboro Woolworth desegregates its lunch counter after six months of sit-ins.On Oct. 19, Martin Luther King Jr.  joins a student sit-in at a whites-only restaurant inside of an Atlanta department store, Richs. He is arrested along with 51 other protesters on the charge of trespassing. On probation for driving without a valid Georgia license (he had an Alabama license), a Dekalb County judge sentences King to four months in prison doing hard labor. Presidential con tender John F. Kennedy phones Kings wife, Coretta, to offer encouragement, while the candidates brother, Robert Kennedy, convinces the judge to release King on bail. This phone call convinces many African Americans to support the Democratic ticket. On Dec. 5, the Supreme Court hands down a 7-2 decision in the Boynton v. Virginia case, ruling that segregation on vehicles traveling between states is unlawful because it violates the Interstate Commerce Act. 1961 Policemen await to arrest Freedom Riders. Bettmann Archive / Getty Images On May 4, the Freedom Riders, composed of seven African American and six white activists, leave Washington, D.C., for the rigidly segregated Deep South. Organized by the Congress of Racial Equality (CORE), their goal is to test Boynton v. Virginia.On May 14, Freedom Riders, now traveling in two separate groups, are attacked outside Anniston, Ala. and in Birmingham, Ala. A mob throws a firebomb onto the bus in which the group near Anniston is riding. Members of the Ku Klux Klan attack the second group in Birmingham after making an arrangement with the local police to allow them 15 minutes alone with the bus.On May 15, the Birmingham group of Freedom Riders is prepared to continue their trip down south, but no bus will agree to take them. They fly to New Orleans instead.On May 17, a new group of young activists join two of the original Freedom Riders to complete the trip. They are placed under arrest in Montgomery, Ala.On May 29, President Kennedy announces that he has ordered the Inte rstate Commerce Commission to enact stricter regulations and fines for buses and facilities that refuse to integrate. Young white and black activists continue to make Freedom Rides. In November, civil rights activists participate in a series of protests, marches, and meetings in Albany, Ga., that come to be known as the Albany Movement.In December, King comes to Albany and joins the protesters, staying in Albany for another nine months. 1962 James Meredith Registering at the University of Mississippi. Bettmann Archive / Getty Images On Aug. 10, King announces that he is leaving Albany. The Albany Movement is considered a failure in terms of effecting change, but what King learns in Albany allows him to be successful in Birmingham.On Sept. 10, the Supreme Court rules that the University of Mississippi must admit African American student and veteran James Meredith.On Sept. 26, the governor of Mississippi, Ross Barnett, orders state troopers to prevent Meredith from entering Ole Misss campus.Between Sept. 30 and Oct. 1, riots erupt over Merediths enrollment at the University of Mississippi, or Ole Miss.On Oct. 1, Meredith becomes the first African American student at Ole Miss after President Kennedy orders U.S. marshals to Mississippi to ensure his safety. 1963 Bettmann Archive / Getty Images King, SNCC and the  Southern Christian Leadership Conference  (SCLC) organize a series of 1963 civil rights demonstrations and protests to challenge segregation in Birmingham.On April 12, Birmingham police arrest King for demonstrating without a city permit.On April 16, King writes his famous Letter from a Birmingham Jail in which he responds to eight white Alabama ministers who urged him to end the protests and be patient with the judicial process of overturning segregation.On June 11, President Kennedy delivers a speech on civil rights from the Oval Office, specifically explaining why he sent the National Guard to allow the admittance of two African American students into the University of Alabama.On June 12, Byron De La Beckwith assassinates  Medgar Evers, the first field secretary for the National Association for the Advancement of Colored People (NAACP) in Mississippi.On Aug. 18, James Meredith graduates from Ole Miss.On Aug. 28, the  March on Washington for Jobs and Fre edom  is held in D.C. Around 250,000 people participate, and King delivers his legendary  I Have a Dream speech. On Sept. 15, the Sixteenth Street Baptist Church in Birmingham is bombed. Four young girls are killed.On Nov. 22,  Kennedy is assassinated, but his successor, Lyndon B. Johnson, uses the nations anger to push through civil rights legislation in Kennedys memory. 1964 President Lyndon Johnson Signs Civil Rights Act. PhotoQuest / Getty Images On March 12,  Malcolm X  leaves the Nation of Islam. Among his reasons for the break is Elijah Muhammads ban on protesting for Nation of Islam adherents.Between June and August, SNCC organizes a voter registration drive in Mississippi known as Freedom Summer.On June 21,  three Freedom Summer workersMichael Schwerner, James Chaney, and Andrew Goodmandisappear.On Aug. 4, the bodies of Schwerner, Chaney, and Goodman are found in a dam. All three had been shot, and the African American activist, Chaney, had also been badly beaten.On June 24, Malcolm X  founds  the Organization of Afro-American Unity along with John Henrik Clarke. Its aim is to unite all Americans of African descent against discrimination.On July 2, Congress passes the  Civil Rights Act of 1964, which bans discrimination in employment and public places.In July and August, riots break out in Harlem and Rochester, N.Y.On Aug. 27, the Mississippi Freedom Democratic Party (MFDM), which formed to challenge the segr egated state Democratic Party, sends a delegation to the  National Democratic Convention in Atlantic City, N.J.  They ask to represent Mississippi at the convention.  Activist Fannie Lou Hamer, spoke publicly and her speech was broadcast nationally by media outlets.  Offered two nonvoting seats at the  convention, in turn, the MFDM delegates reject the proposal. Yet all was not lost. By the 1968 election, a clause was adopted requiring equal representation from all state delegations. On Dec. 10, the Nobel Foundation awards King the  Nobel Peace Prize. Updated by African-American History Expert, Femi Lewis.

Wednesday, November 20, 2019

Water in the California desert Research Paper Example | Topics and Well Written Essays - 1000 words

Water in the California desert - Research Paper Example As the climate continues to change the appearance of the planet,those who inhabit it, are faced with the various issues that come with such changes occurring in the first place. In times of considerable rain occurring,the concern becomes the potential flooding that would require specific plans in place,in order to aid those most affected. The same would also be said in instances were there would be a lack of water in the given environment that would also lead to problems that would need to be addressed in order to aid the general populous in the surrounding area, as well as any other regions that may be impacted. One such region to consider, in terms of discerning as to whether or not they would have a noticeable issue with water, would be the southern part of California.Different factors would be in place, in terms of assessing the situation in its entirety and determining whether or not the area of Southern California, would in fact have an issue with water availability. In terms o f describing the region of Southern California, "California's 25,000 square miles of desert can be divided into two basic zones; the Mojave, or high desert, and the Colorado, or low desert. Each of these areas contains unique fauna and flora, as well as other natural resources that make them an important part of California's present and future. California's deserts are home to two National Parks (Death Valley and Joshua Tree), a National Reserve (East Mojave), and California's largest state park, Anza- Borrego," ("California's", p.1). With the above mentioned importance that this region of California would have, it would remain essential to answer any problems that may arise for the area, which in this case, would be the issue of water shortage. Different organizations would be in place, with the essential purpose of gauging the water levels present within their locale. In the case of Southern California, according to testimony provided by the chairman of the board of directors for the Metropolitan Water District of Southern California, in his testimony before a Senate committee handling such an issue, the director would outline what he felt were the issues facing the region, in testimony that would go toward the assertion that, in terms of a potential water issue for the region of Southern California, they would in fact be facing such a problem. In terms of describing the group that Timothy F. Brick would represent, "Metropolitan Water District of Southern California is the nation's largest provider of imported water to an urban area. The population in its service area is more than 18 million, and it is projected to rise to 22 million by 2030. Metropolitan is comprised of 26 member public agencies that service an area spanning 5,200 square miles and six southern California counties," (Childs, 2007). As an organization that would represent a wide a rea and would service multiple counties within the region of Southern California, in terms of making the assertion that there would in fact be an issue with the availability of water in the area, they would be an organization that would know what they were talking about. In the period of time just before the Director would give his testimony, the area of Los Angeles alone, would have received an alarmingly low amount of rain, which in turn, would have translated into an issue for the overall water supply. From a political standpoint, the Governor for California would set forth with a plan to handle the continuing issue of water deficiency that areas within the state, such as California would continue to see. As those involved would allude to, there would be methods possible in the process toward remedying the issue and seeking the best possible outcome. In terms of the political legislation suggested from the state level, "The plan is comprised of four policy bills and an $11.14 billion bond. The package establishes a

Tuesday, November 19, 2019

Discussion 2 Week 10 Contract Termination Liability Risk Assignment

Discussion 2 Week 10 Contract Termination Liability Risk - Assignment Example ssionals on adequately addressing potential termination risks on their contracts, and on how potential termination costs would be funded in the event of a termination† (GAO, 2011, p. 11). The recommendations are consistent with the findings which allegedly cause potential termination practices. As emphasized, NASA does not observe consistency in application of detailed and specific instructions for the implementation of FAR clauses. As such, the contractors assume diverse interpretations of reported â€Å"risks and financial responsibilities related to potential termination liability, which may be due in part to NASA’s inconsistent practices† (GAO, 2011, p. 10). As such, the recommendation requiring NASA professionals to monitor potential termination costs would only be successful if and when the root cause of the dispute and inconsistency in practices is addressed. Thus, first and foremost, NASA should be able to design structured and consistent policies and prac tices concerning termination liability funding to avoid problems ensuing from contract termination in the future. One alternative to reinforce consistency in contract termination practices is to enforce review and monitoring of long term government projects and contracts within a definite time frame, say, every three years. Any need for changes, adjustments, and updates which are not within the original scope of the contract should be identified within that stage of progress. As such, as early as possible, when termination costs are not yet significant, the government and contracting parties should already set the stage for appropriate action (either termination or proceed with the contract) within a maximum ceiling (costs) stipulated. The changes and conditions should be subject to the regulations set in terminations for default and convenience (OConnor,

Saturday, November 16, 2019

Evaluation of Training Essay Example for Free

Evaluation of Training Essay The evaluation of training identifies the extent to which the program has succeeded in enhancing the knowledge or skill-set of the participants. Kilpatrick’s model of training evaluation identifies four levels of evaluation: trainee reaction, participant’s learning, behavioral change, and impact on business. The major tools of training evaluation include interviews, questionnaires and surveys, observations and secondary data, and pre and post assignments or tests. The emerging trend is empowered evaluation, or making participants responsible for the evaluation. Introduction: Objectives of Training Evaluation The broad objective of evaluating training is to measure the effectiveness of the program in relation to the enhancement of knowledge or skills and the application of such skills and knowledge at work by the participants. The secondary objective of evaluating training is to improve future editions of the program in terms of modules, facilities, and contextual factors. The evaluation of training also helps identify the factors that help and hinder effective training of individuals and provide a guide map for support the participant requires at work The successful evaluation of a training program depends on application of the correct objectives while designing the evaluation exercise and the correct feedback from the participants in relation to the inputs received from the trainer. Kilpatrick’s Model of Training Evaluation Donald L Kilpatrick of the University of Wisconsin proposed four levels of evaluation. The first level of Kilpatrick’s model is seeking trainee reaction, or the participant feelings regarding the training experience. The instruments used to capture such reaction include post-survey questionnaires or feedback forms and verbal reactions of the participants during the conclusion of the training program. Some of the common questions included in such surveys include whether the participants enjoyed the training, whether they considered the training relevant, whether they liked the venue, style, timings and the like, their opinion on the ease and comfort of the experience, and the like. The answers to such questions could be in either an open-ended format or a series of multiple-choice options. This level of evaluation is easy to obtain and analyze and takes place immediately after the training ends. It gives a broad and general indication regarding the success or failure of the training program. The second level of Kilpatrick’s evaluation model focuses on the participants learning, and measures the whether the desired skill and knowledge enhancements have taken place. The measures in this level indicate the extent of advancement or change in the intended direction or area. The common measurement instruments for this factor include pre and post training tests or assignments and interviews. The success of evaluation however depends on the establishment of a reliable and clear scoring measurement scale. The third level of Kilpatrick’s evaluation model focuses on measuring behavior change, or the extent of application of the acquired knowledge or the implementation of acquired skills on the job. The evaluation of this factor depends on any noticeable and measurable change in the activity and performance of the participants when they return to their job roles after the training, and on whether such changes are sustained or temporary. The evaluation also extends to measuring whether the participants could transfer their learning to others and whether they are aware of their change in behavior, knowledge, skill level. The common evaluation tools for such measures include ongoing observation and interview over time. The use of 360-degree feedback is a convenient tool to measure performance on a continuous basis. The measures required at this level are not easy to quantify and arbitrary snapshot assessments and subjective ratings often hamper successful evaluation at this level. The fourth level of evaluation in Kilpatrick’s model is measuring business results, or the effects of the training on the business or environment. The measures would typically be business or organizational key performance indices such as volumes, values, percentages, timescales, return on investment, staff turnover, quality ratings, achievement of standards and accreditations. Most of such measures would already be in place as part of the normal management reporting systems. Organizations traditionally focused on the first two levels of evaluation. In recent years, the third and fourth levels have also become common points of evaluation. The Process of Training Evaluations The process of conducting the training evaluation depends on the objective of evaluation, or the level of evaluation required. The instruments used to measure of participant’s reaction to the program and their acquisition of knowledge and skills need to be devised prior to the program and administered to the participants immediately after the program concludes. The evaluation of the behavioral change or the application of the acquired knowledge and skills to the job and measuring their impact on the business is complicated and a sustained effort. The various tools to evaluate such measures, such as interviews, questionnaires, 360-degree appraisals, feedback from supervisors, secondary data, observations and the like need to be structured and phased over a period of time, and the results compared with the previous data and the intended objectives of the training program. Conclusion The latest concept in training evaluation is empowered evaluation, wherein participants improve their programs themselves through self-evaluation and reflection. The responsibility for evaluation in this model rests with the participants and professional agency or entity conducting the training on a collective basis, and the process of evaluation necessitate cooperation, collaboration, and sharing of resources. References Goodstein, J. Goodstein, L. D. (1991). A Matrix for Evaluating Training in The 1991 Annual: Developing Human Resources (pg: 184). San Deigo: University Associates.

Thursday, November 14, 2019

Clara Barton :: essays research papers

Clara Barton was born on Christmas day, 1821 in Oxford Massachusetts. She was the youngest of her 4 siblings by at the least 10 years of age. Growing up in a middle class family, Clara was home schooled until the age of 15, then she became the teacher. As a child, in her spare time Clara enjoyed treating sick and injured pets and neighborhood animals. When she was 11 her brother David got really sick. So then she stood aside her brother for two years. She started to learn about medicine that way. She opened a free school in New Jersey for kids who have health problems. But because she wasn?t a man she couldn?t be head of the school. Clara was so unhappy that she quit teaching. Later she got a job as a clerk in the U.S. Patent Office. Then she quit her job as a clerk and became a volunteer for the soldiers in the Civil War. First Clara accomplished the task of starting a relief program for the injured soldiers. Next Clara was brought to attention of a medical supply shortage, and quickly organized a donation. As she arrived at the ?Cornfield? she wasted no time before acting as medical staff and distributing her supplies to surgeons. After the battle at Cedar Mountain, she appeared at a field hospital at night with a four-mule-team load of supplies. She saved hundreds of soldiers in the battlefield that day. That?s why she was known as "the Angel of the Battlefield.?In 1864 Clara was granted the position as superintendent of the Union Nurse. She had some medical problems though. Her problem was that she was suffering from greatly tireless work. She suffered because she had done to many things that tired her out. So her physician sent her on a vacation. While she was there she read a very famous book called ?A Memory of Solferino? by Henry Dunant, the founder of the Red Cross Movement. The Movement agreed for protection of the sick and wounded during the war.

Monday, November 11, 2019

Network security threats Essay

The purpose of this memo is to let you know the importance of network security. Here I will discuss the network security threats, law that affects network security and processes and procedures for disaster recovery, data backup, and data restoration along with future action plans. Network security threats can be defined as any method used to try to breach the security of a network or system (Tulloch 2003). The goal of network security is to sustain and defend three critical properties of information, which are confidentiality, integrity and availability. This threats originate from variety of sources such as External and internal. External threats are structured threats from malicious individuals or organizations and unstructured threats from inexperienced attackers such as script kiddies. Internal threats are threats from disgruntled employees or contractors. Various network security threats exist. Some of the threats are Firewall and System Probing, Network File Systems (NFS) Application Attacks, Vendor Default Password Attacks, Denial of service (DoS) attacks, Social Engineering Attacks, Electronic Mail Attacks, Spoofing, Sniffing, Fragmentation and Splicing Attacks, Easy-To-Guess Password Compromise, Destructive Computer Viruses, Prefix Scanning, Trojan Horses and Reconnaissance attacks. The top three security threats to a network are discussed in below paragraphs. Disgruntled Employees This is the most common network security threat. Disgruntled employees, who are the group most familiar with their employer’s computers and applications, including knowing what actions might cause the most damage can create both mischief and sabotage on a computer System. The disgruntled current employees actually cause more damage than former employees do. According to Parmar, the common examples of computer-related employee sabotage are entering data incorrectly, changing and deleting data, destroying data or programs with logic bombs, crashing systems, holding data hostage and destroying hardware or facilities. Denial of Service (DoS) Attacks According to Tulloch (2003), DoS is a type of attack that tries to prevent legitimate users from accessing network services. In this type of threats, the attacker tries to prevent access to a system or network by several possible means. Some of these are: Flooding the network with so much traffic that traffic from legitimate clients is overwhelmed; Flooding the network with so many requests for a network service that the host providing the service cannot receive similar requests from legitimate clients; and Disrupting communications between hosts and legitimate clients by various means, including alteration of system configuration information or even physical destruction of network servers and components. (Tulloch 2003) Malicious Code and Electronic Mail Attacks. According to Parmar, malicious code refers to viruses , worms , Trojan horses , logic bombs, and software (uninvited). Electronic e-mail attacks are emails that hackers send to compromise network systems and whenever companies accept this e-mail from the Internet that have exposed versions of the sendmail program are potential targets from this attack. NETWORK SECURITY LAWS As such, no network security laws exist for network security. However, some of the acts that are applicable for network security threats are discussed in below paragraphs. Privacy Act of 1974 The concept of information privacy has been one of the most critical issues. It takes into serious consideration. Imagine a world without information privacy. The lack of information privacy creates a breeding ground for technological sharing and distribution. In 1974, the Privacy Act of 1974, passed by the Unites States Congress, states that: No agency shall disclose any record, which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains (â€Å"Privacy Act of 1974† 88 Stat. 1897). CFAA – Computer Fraud and Abuse Act. According to Robinson (2003), the current United States law of information security is the Computer Fraud and Abuse Act (18 U. S. C). It was originally enacted solely as a computer crime statute, but in its present form, it imposes both civil and criminal liability for a wide variety of acts that compromise the security of public and private sector computer systems. DMCA – The Digital Millennium Copyright Act The Digital Millennium Copyright Act (17 U. S. C), provides that â€Å"no person shall circumvent a technological measure that effectively controls access to a work protected under this title [the Copyright Law]†. (Robinson, 2003) There are other laws (acts), such as the Wiretap Act, the Stored Communications Act, and the Computer Security Act are also applicable on network security threats. PROCESS AND PROCEDURES FOR NETWORK SECURITY The three important techniques used by companies to protect their network are firewalls, encryption and VPN, which are discussed below: Firewalls Firewalls are used to control access between networks. It separate intranets and xtranets from the Internet so that only employees and authorized business partners can access. Firewalls are implemented by Packet filtering to block â€Å"illegal† traffic, which is defined by the security policy or by using a proxy server, which acts as an intermediary. Encryption To protect against sniffing, messages can be encrypted before being sent (over the Internet). In general, two classes of encryption methods Secret Key encryption (DES) and Public Key encryption (RSA, public and private key are needed) are used today. Public Key encryption is incorporated into all major Web browsers and is the basis for secure socket layer (SSL). Virtual Private Networks (VPN) VPN maintains data security as it is transmitted by using tunneling and encryption. Tunneling creates a temporary connection between a remote computer and the local network. Tunneling blocks access to anyone trying to intercept messages sent over that link. Encryption scrambles the message before it is sent and decodes it at the receiving end. Another important area for companies are (implementing) Security policy, Disaster Recovery and Business Continuity (plans), which are discussed in below paragraphs: Security policy Security policy is defined as rules, directives and practices that govern how asset, including sensitive information are managed protected and distributed within an organization. Every organization should define and document a security policy that defines the limits of acceptable behavior and how the organization will respond to violation of such behavior. Security policy defined should be concise, to the point, easy to understand and widely publicized in the organization. The security policy implemented should ensure compliance with all laws. The security policy should be reviewed periodically to respond to changes in technology or circumstances. There should be restrictions on playing of computer games on corporate computers and visiting of non-productive web sites using corporate network. In addition, employees should be monitored for prohibition against taking copies of certain corporate electronic document out of office, use of pirated software and use of corporate e-mail account for sending the personal e-mail. Proper Documentation for Disaster Recovery and Business Continuity There are various types of vulnerabilities associated with computer-based information systems. Now these days’ organizations are being more dependent upon their computer systems, therefore the survival of business depend very much on the security of these systems. Initially (few years back), physical disasters such as floods a hurricane, and fires were the most probable security risks. Nowadays, computer operations are also liable to loss or damage from hackers, computer viruses, industrial spies and similar causes which until recently were in the realms of science fiction. The terrorist attacks on September 11, 2001, showed that there is a big difference between disaster recovery and business continuity. In the past, disaster recovery meant getting computers and networks up and running after a hurricane, flood, fire, or other disaster. However, September 11 taught a broader issue getting the business up-and-running. According to McNurlin & Sprague (2006), Business continuity broadens the discussion to include: Safeguarding people during a disaster; Documenting business procedures so that not dependent upon a single employee; Giving employees the tools and space to handle personal issues first so that they can then concentrate on work; Alternate workspace for people and Backup IT sites not too close but not too far away; Up to date evacuation plans that everyone knows and has practiced; Backed up laptops and departmental servers; and Helping people cope with a disaster by having easily accessible phone lists, e-mail lists, instant-messenger lists so people can communicate with loved ones and colleagues. CONCLUSIONS The goal of network security is to sustain and defend three critical properties of information, which are confidentiality, integrity and availability. The most common threats to network security comes from disgruntled employees, DoS attacks and malicious code attacks. All these threats try to breach the security of a network or system. Various information security and privacy laws exist, which must be followed by companies while installing and managing their computer network. Various techniques such as firewalls, encryption and VPN are used for securing network. In addition, security polices and disaster recovery and business continuity plan are implemented for securing network. FUTURE ACTION Below are some methods for securing network from the top three security threats to a network. Disgruntled employees type of threats can be limited by invalidating passwords and deleting system accounts in a timely manner by network (system) administrator. According to Tulloch (2003), defenses against DoS attacks can be done by disabling unneeded network services to limit the attack surface of companies network ; enabling disk quotas for all accounts including those used by network services; implementing filtering on routers and patch operating systems to reduce exposure to SYN flooding ; base-lining normal network usage to help identify such attacks in order to quickly defeat them ; and regularly backing up system configuration information and ensuring strong password policies. To prevent malicious code attacks from occurring, regular check with vendors to ensure systems are running a correct version of sendmail or some more secure mail product are necessary. Network Security through Software and Hardware can be implemented by: †¢ Modular and cheaper workgroup firewalls. †¢ By having host based and network based Intrusion detection systems †¢ Active security by providing auto mated responses to agents. †¢ Centralized management †¢ Content filtering †¢ Acceptance of PKI †¢ By having token, smartcard or biometric based access solutions. Some basic protecting tips for computer (in network) that should be provided to all the staffs in the organization are: †¢ Always use Anti-virus Software †¢ Download security updates and patches regularly and update computer systems. †¢ Do not check or download emails and attachments from unknown sources: †¢ Back Up your data regularly. †¢ Use Firewall †¢ Do not share access to your computer hard drives in network Attachments. REFERENCES Tulloch, M.2003, ‘Microsoft Encyclopedia of Security’, Microsoft Press, Washington, United States of America. Parmar, S. K. & CST, N. Cowichan Duncan RCMP Det (cmpl), ‘An Introduction to Security Manual’ McNurlin, B. C & Sprague, R. H 2006, ‘Information Systems Management in Practice’, 7th ed. , Pearson Education, New Jersey United States Congress, Privacy Act of 1974. Public Law No. 93-579, 88 Stat. 1897 (Dec. 31, 1974) CERT Training and Education software Engineering Institute (2006). Information Security for Technical Staff, Student handbook, Camegie Mellon University, USA Robinson, S, 2003, ‘U. S. Information Security Law’, accessed on October 20, 2007 from .

Saturday, November 9, 2019

The Secret of Finding Meaning in Life

The Secret of Finding Meaning in Life Life is truly too short, this phrase really bothered me because it made me think of how I could make my life meaningful and with sense; something that is living life to the fullest and touching the life of others by serving them because in serving you will know what really life is Just like Jesus who came to earth not to be serve but to serve. But how we could make our life living with significance and meaning?This question is so stunning especially when we realized that we are at the wrong path since we are living here on earth. Is there such thing as secret of finding meaning in life? That might some what answers me base on certain articles that I Just read and as well as the video that amazed me while viewing. This first article defines life and it's meaning which is â€Å"Meaning in Life [live the life that you want]† by Albert S. Wang, written on November 19, 1997.This article, questions you if you are really contented and happy of wh at you have and if this is really the life that you wanted. It is said in here that to be able to live a life that you want and to put a meaning on it; you must first know yourself from within because this makes you know of who you are, second is know where you want o go for it gives you direction in finding your happiness. These things are beginning of having a meaningful life.To find the meaning of your life, you must find it with action not Just by waiting for it to come and you can also find this meaning in life not just in distant place but mostly it is found near you. Putting a meaning in your life is all about the choices and decisions that you made on where you want to go. Just live your will and you'll see that each day you will grow in having a meaningful life. The second article that touches me is entitled â€Å"So What Will Matter? † sent by Leandro G. Cruz and shared by Joe Gatuslao of Bacolod City, Philippines. Its original title is A Life That Matters.This arti cle is so inspiring because it stresses that all that you have got starting from yourself Just like beauty, fame, wealth and all other things that you have are Just in vain because these things are not forever yours, these are just passing things and you cannot bring these things when you leave earth but what really matters are the thing that you made that others will remember you of your goodness, the things that you gave not Just in material aspects but in all, living your ife with significance, teaching others and set yourself as an example to them.All of these things are living a life that matters. This third article has an unknown author which entitles â€Å"A Purpose†. The article speaks that all of us who are created by God has a unique and significant purpose. Each of us is given a chance to find our designated purposes but you must wait when the right time comes because nas set it tor you at a time when you are equipped and ready. Most of the time you'll experience t he roughness of life but don't be dismayed because there is always a helping hand that will take care of you, which isGod who never leaves you. Just stay at the right path and do good deeds for in the end you will find your own way to the pearly white gate. The next article is the one that I liked most which is â€Å"The Journey of Our Life† shared again by Joe Gatuslao from Bacolod City, Philippines. This article actually tells a story about the Emperor who owned a huge land and he told his horseman that if he could ride on his horse and cover as much land area as he likes, then the Emperor would give him the area of land he has covered.The horseman did not stop riding and whipping the horse because he wanted to cover as much area as possible. Came to a point when he had covered a substantial area and he was exhausted and was dying. Then he asked himself, â€Å"Why did I push myself so hard to cover so much land area? Now I am dying and I only need a very small area to bury myself. † This story is really similar with the Journey of our life because most of us are always striving for richness, properties, possessions, power etc.So we work harder and harder until we come to realized that all of these things are not necessary for living a happy and meaningful life; we must balance our way of living so that we could not missed omething in life that might happen once. The next thing that I am going to share is all about the video clip that I watched; it's about an old woman at the age of 47 and her name is Susan Boyle who joined in a certain show that searches for extraordinary talents namely Britain's Got Talent.During her performance, a big shock was made by Susan because at the beginning when she first introduced herself, everybody was against her like they are judging Susan of Joining the show where she looks like so ordinary and nothing to show up but when she start on singing all where stunned by her angelic voice and hey gave her a standing ov ation but most importantly the three big yes from the strict Juries. This gives us an insight that we must not Judge the person's appearance because you'll never know what's the biggest surprise that comes from within.God created us with equal gifts and we must use this as an inspiration to others. This last article is a prayer entitled as â€Å"Mere Possessions†. It's all about the prayer of a woman who asked a help from the Lord, asking that she might not put much stock in possessions because things don't last and you cannot bring all of these things when you leave earth. That we come into the world with nothing, we leave with nothing.Having a meaningful life is about your choices and decisions that were made; Just make sure you have chosen the right path because if you do then you'll end walking along the pearly white gate and that is the fulfillment of having a meaningful life. There is really no such thing as a secret of finding a meaning in life; it's Just you who will make it meaningful by doing what is right and Just; live happy and be happy all the time because life is Just too short, you might missed something so let's make the most of it.

Thursday, November 7, 2019

Life of Georg Simon Ohm

Life of Georg Simon Ohm Georg Simon OhmAt the time Georg Simon Ohm was born not much was known about electricity, he was out to change this. Georg grew up in Bavaria which is why most information about Georg is in German. There is even a College named after him: Georg-Simon-Ohm Fachhochschule Nuernberg. To much dismay not a whole lot has been written about him. Usually you will find a paragraph of the summary of his life. I hope to change this flaw in the history books by telling you as much as I could find on his life.When Georg was growing up his dad, owner of a prosperous locksmith business, wanted young Georg to study mathematics before joining the family business. Georg attended a Gymnasium, like a college, in Erlangen, Bavaria (now Germany) . During his time at this Gymnasium a professor noticed how he excelled in math. This professor's name was Karl Christian von Langsdorf, Georg owes this man much credit from his recommendations to others.ä ¸ ­Ã¦â€"‡: Ã¥ ¾ ·Ã¥Å"‹ç‰ ©Ã§ â€ Ã¥ ­ ¸Ã¥ ® ¶Ã¯ ¼Å' æ ­ Ã¥ §â€ After he graduated he took a job teaching mathematics at Erlangen University in 1805. He spent the next years looking for a better teaching position. He found what he was looking for in 1817 when a job was made available to him at Cologne Gymnasium. He now looked to research electrical current. In 1827 he published Die galvanishce Kette, mathematisch bearbeit (The Galvanic Circuit, Mathematically Treated). This was a mathematical description of conduction in circuits modeled after Fourier's study of heat conduction. This is also known as Ohm's Law.Ohm's Law, which is Georg's greatest accomplishment, started as an experiment. The experiment's purpose was to find the relationship between current and the length of the wire carrying it. Ohm's results proved that as the wire increased the current decreased.Ohm came up with a formula...

Monday, November 4, 2019

How to Write University of Wisconsin-Madison Essays 2017-18

The University of Wisconsin–Madison (the official state university of Wisconsin) is a public university that was founded in 1848, directly following Wisconsin’s acquisition of statehood. Wisconsin is well known not only for its excellent academics, but also for its hugely successful NCAA athletic teams. The 936-acre campus is located right next to downtown Madison, which is consistently ranked as one of the best college towns in the country. With nearly 5,000 unique courses and over 200 distinct majors, it’s no wonder that the University of Wisconsin–Madison attracted 32,887 applicants to the Class of 2016. The 52.6% acceptance rate necessitates strong supplemental essays, and we at are here to help you break them down step by step! Students can apply online, using either the Common Application or the University of Wisconsin Application System. Both application options require two supplemental pieces of writing: a short prompt and a long prompt. Below, you’ll find the two prompts along with our take on the best way to tackle the essays, as well as some tips on what you should (and shouldn’t) include in your supplements. This prompt shouldn’t be too difficult — with a limit of 100 words, you’re going to be writing no more than a few sentences. While you should use this short essay as an opportunity to elaborate on the activity that portrays you in the best light, make sure that the selected activity is actually â€Å"important to you.† If the extracurricular that you select appears impressive (think three-time section leader in your all-state band, or coordinator of a peer tutoring program that works with nearly one hundred kids), but you’re not able to articulate why it’s relevant to your life and your journey through high school, the admissions committee won’t be impressed. Don’t feel like the activity you write about needs to be one in which you held leadership; while leadership in the activity is of course looked highly upon, the genuine story you tell about its importance to you is key. Take this scenario: You were elected student body president as a junior and presided over all student council meetings. While you enjoyed the position, you’re planning on majoring in biology and not government. Last summer, you were one of the few interns at a local research hospital, where you helped discover a previously unknown bacterium. Even though you’ll likely put â€Å"student body president† as the first item on your activity list, you may want to write the short essay about your experience at the hospital, which led you to decide on a biology major. If you participated in any type of volunteer work, at a local soup kitchen or homeless shelter, and feel that those experiences had a profound impact on you, you could write about the volunteer work. That being said, you don’t necessarily need to write about volunteer/community service activities! If you were the president of your high school’s school store, or the captain of your town’s travel soccer team, and that significantly defined your past few years, you can absolutely choose it as your activity. The key is just to make sure admissions officers get a more in-depth look at who you are through the lens of the activity. Whichever activity you choose, be sure that your writing is clear, concise, and effective. There’s no need for complex metaphors, nor overly intense descriptions. As long as it’s evident to the reader that your activity had a meaningful impact on your development as an individual, you’ve done your job! Submit your essay and we’ll get back to you with helpful edits. In the long essay prompt, the University of Wisconsin-Madison is looking for a modified version of the â€Å"why us† supplement. Even if Wisconsin isn’t your top choice, for the purposes of this essay, you should put yourself in the shoes of a student that’s wanted to attend Wisconsin for the past few years. If you have family ties to the university, or live in Wisconsin and have grown up rooting for the Badgers in sporting events, don’t hesitate to mention it! The admissions committee wants to see commitment and genuine interest in the school—they should instantly feel your passion for Wisconsin as they read through your essay. While the prompt appears to pose two questions: â€Å"Why Us?,† and â€Å"What opportunities would you take advantage of as a student?† you should be blending the two questions together throughout your supplement. Show your passion by mentioning specific courses, clubs, or programs that you are interested in. The university website will be your greatest resource for this — there’s a wealth of information available! Explain how your experiences throughout high school qualify you for admission to the University of Wisconsin. Articulate how those experiences demonstrate, in the words of the admissions website, â€Å"leadership, concern for others and the community, and achievement in the arts, athletics, and other areas.† Try to provide an example of each of those three areas (or, better yet, find an activity that combines multiple). Serving as the captain of a school athletic team demonstrates both leadership and athletic achievement while selling handmade crafts at charity auctions demonstrates concern for community and artistic achievement. Don’t try to make the entire essay just about these three facets of your personality, but do make sure that you adequately explain how your activities exemplify each character trait. Also, don’t be afraid to talk about experiences unrelated to your major: If you’re applying to the School of Education, you can absolutely bring up an organization in the School of Business that focuses on entrepreneurship, like the WAVE or WEB program, or a research opportunity, like the Grainger Institute in the School of Engineering — the more well-rounded your interests are at Wisconsin, the more likely you are to be accepted. The last, and optional, component of the prompt asks you to explain any â€Å"circumstance that could have had an impact on your academic performance and/or extracurricular involvement.† Be very careful with what you write here, and remember that it’s completely optional. If you choose not to include it, there’s really no harm done (and, if anything, it eliminates the possibility of writing something that could decrease your chances of admission). If there was a situation throughout high school that was thrust upon you (think family/personal medical emergency or moving schools), you can absolutely write about that, as it will help to establish sympathy with the reader. If you’ve had any experiences that could reflect negatively on you, including them in the essay may not be wise. Writing about depression, drug/alcohol use, or criminal activity could raise red flags and prevent you from being accepted. If you feel strongly about including one of these topics (or something similar), definitely reach out to a guidance counselor, teacher, or trusted adult to ensure that you’re crafting your message in the best possible way. We hope our analysis of the two supplemental essay prompts has helped you to fine-tune your plans for your Wisconsin-Madison application!

Saturday, November 2, 2019

Marketing in a regulated market Essay Example | Topics and Well Written Essays - 1250 words

Marketing in a regulated market - Essay Example Although it is a regulated market, the government decides on the production practices it realizes the tobacco monopoly and does not try to implement measures that would eventually curb the business out of operation (Pampel, 2009:89). The script outlines the basis at which producers deceive buyers, market the product against the wish of ethics and morals, and ignore the constraints issued by the world health organizations to amass profits at the long run, and a documented inclusion of defiant states to the constraints. Further, the script entails the marketing mix variables and the ethical concerns of tobacco. Ethical issues pertaining GBT’s practices The company advertises the Gold brand uniformly through social networks and media, and this aspect catches the public equally, but fails to warn possible buyers on the consequences of smoking. Another ethical concern arises from the untamed advertising that, tobacco contains medicinal value, which is an ancient belief, and the com pany expresses it to increase demand on the output (Smith, 2003:42). The third ethical dilemma arises from the product design and packaging of the cigarettes since there are no warning signs on the Gold brand depicting the possible health hazards of smoking. Distribution of the GBT’s Gold Brand (Place) Tobacco market decline would adversely affect a nation that grows, processes, produces, and sells the cigarettes. The economy of Malu produces tobacco and depends upon it for economic growth and change in the people’s lifestyles. The government allows distribution of tobacco product brands in different channels to reach a wide range of consumer effectively. The famous homemade cigarette brand of â€Å"Gold† sells among all ages in Malu, despite the constraints to refrain from the practice, this practice is unethical to the extent that it will harm the health of the citizens. The product reaches the market via proper distribution and adequate creation of awareness throughout the potential market segments in the south Asian country (Mani and Sandhu, 2006:69). Promotion marketing mix strategy of the GBT’s Gold Brand The various promotion practices of the Gold brand cigarettes are deceptive and meant to retain buyers, entice new ones, recall old consumers, and increase the marginal consumptions. The idea of deception enables the GBT firm to survive in the market since buyers tend to retain the â€Å"value† they derive from consumption of cigarettes and avoid quitting altogether, as they feel affiliated to the product. Therefore, Fiona’s practices are unethical and morally bend to lure citizens in promoting economic growth through consumption of cigarettes and, at the expense of their general welfare and health (Weightman, 2011:87). Pricing strategy of the GBT’s Gold brand The international Tobacco products Manager at GBT, Fiona Fuller defines the best practices that the company intents to take in the process of wedgin g out possible threats that may injure the company’s operations and the desire to acquire the set goals profitably in the next decade. Fiona adapts to penetration pricing in acquiring the market that guarantees the company that the new venture is profitable (Pampel, 2009:95). She understands the presence of strong brands in the market from European nations that currently dominate 20% of market. Therefore, she strategically prices the