Friday, September 6, 2019

Kite Runner Essay Notes Essay Example for Free

Kite Runner Essay Notes Essay Q1 â€Å"I never thought of Hassan and me as friends†¦ history isn’t easy to overcome. Neither is religion. In the end, I was a Pashtun and he was a Hazara, I was Sunni and he was Shi’a, and nothing was ever going to change that. Nothing† (Hosseini 27) †¢DESPITE THE FACT THAT AMIR HAS SPENT HIS ENTIRE LIFE IN HASSAN’S company he does not consider Hassan to be his friend. This is because of social status. Hassan religion is seen to be below Amir and this is why they will never be able to be friends. Hassan does not understand this and takes every opportunity to please Amir, to make him happy. The two boys grew up together, they learned to crawl together, and they later taught each other how to ride a bicycle. But history and religion override all of the mitigation factors in this relationship, and Amir has decided that he doesn’t value this relationship to be anything more than a master and his servant. Q2 â€Å"I had one last chance to make a decision. One final opportunity to decide who I was going to be. I could step into that alley, stand up for Hassan- the way he’d stood up for me all those time in the past- and accept whatever would happen to me. Or I could run. In the end, I ran† (pg 82) †¢AMIR WAS ALWAYS TRYING TO PLEASE BABA, TO MAKE HIM PROUD, TO SEEK HIS approval. Amir was finally able to do this when he won the Kite Flying tournament. Baba had never been so proud. The only task left was for Hassan to run and find the winning kite. After a period of time Amir went to look for Hassan. He found him in the alley with Assed, and other bullies. Hassan had the winning kite, but there was a price to pay for this kite. Nothing is free in this world. Amir witnessed an act of unwavering loyalty from Hassan, as Hassan was being raped in order to keep the kite. Amir had the opportunity to step in and protect his companion, but instead chose to close his eyes. This was the price he had to pay to receive Baba’s affection, and this haunts Amir for his entire lifetime. Q3 â€Å"Mostly, I remember this: His brass knuckle flashing in the afternoon light; how cold they felt with the first few blows and how quickly they warmed with my blood†¦ for the first time since the winter of 1975, I felt at peace. I laughed because I saw that, in some hidden nook in a corner of my mind, I’d ever been looking forward to this† (302). †¢AMIR HAS FOUND HASSAN’S SON WITH ASSEF, LEADER OF THE TALIBAN AND rapist. Assef issues a challenge for the boy and Amir accepts, this is Amir’s way of forgiving himself for all of his past sins. He is finally being punished for never stepping in and trying to protect Hassan because of his cowardice. With each physical injury that Assef inflicts Amir is forgiven more and more. This incident will make it possible for Amir to atone himself of his sins and create a future relationship with Sohrab, Hassans son and his part nephew. Second Body Paragraph Q1 â€Å"Maybe he would call me Amir Jan like Rahim Khan did. And maybe, just maybe, I would finally be pardoned for killing my mother† (60) †¢BABA, AMIR’S FATHER, LOVED HIS WIFE. WHEN SHE DIED DURING CHILD BIRTH IT broke his heart. This created initial discord between Amir and Baba. One that was never able to abolish itself. Amir had different interests than Baba; this made it difficult for Amir to please Baba, which made it impossible for Amir to forgive himself for killing his mother at birth. Q2.

Thursday, September 5, 2019

History About Wifi Technology Information Technology Essay

History About Wifi Technology Information Technology Essay ABSTRACT In many of the industrial sectors, the wireless networking technologies are gaining rapid approval because of its cost effectiveness, improved reliability and flexibility. The increase in the wireless networks is one of the technological advances that are having a major impact on the way we do business [10]. This paper refers how Wi-Fi technology is organized and some of its applications and advantages over customary means. It also explores how Wi-Fi technologies communicate in the spread spectrum and also its configurations. The Wi-Fi refers to the 802.11b wireless Ethernet standard that was designed to support the wireless LANs. The essential enabling technology is the Wi-Fi technology and it is the only practicable infrastructure for the home which allows the user to extend their networks for home entertainment. The most popular user access technology is the Wi-Fi (WLAN/IEEE 802.11) because of its high bandwidth and low cost. Keywords: Wireless Fidelity, Wi-Fi, WLAN, wireless technologies, IEEE 802.11a/b/g, spread spectrum, configurations. Introduction In the recent years only, the wireless technology has grown rapidly which allows the users more reliable, effective and can access the internet without using the wire. Wireless networks are more effectively used in many applications such as home entertainment, offices, radio, military areas and public places. The term wireless does not mean the disturbance or group of switches. Wireless means the communication without the use of wires other than the antenna, the Ethernet, and the ground taking the place of wires [2]. For several industrial operations, wireless technology affords cost-effective and effective connectivity solutions. Using the wireless technology there are many benefits such as remote facilities, processes and field operation which results in improving productivity, downtime, faster and more accurate data collection. The term Wi-Fi technology is also referred as Wireless Fidelity. The Institute of Electrical and Electronics Engineers Inc. (IEEE) is the association liable for setting the standards on how the technology and products works, operate and communicate [3]. The 802.11 technology standards, better known as Wi-Fi technology and it is being set up into the Broadband Wireless Access (BWA) equipment and Local Area Network (LAN) access points to quickly connect computer to LANs and as well as internet service providers. The 802.11 standards are growing to supply a higher data rates and better quality of service. Wireless LANs operates on two frequencies such as radio wave and infrared. In the past decades, the wireless access point has come into the market with infrared but in todays world the radio frequencies are used most popularly. The advantage of the radio wave frequency is more penetrate through the walls, floors and doors but whereas the infrared device is on line of sight. Wi-Fi netwo rk connect computer to each other to the internet and to the wired network. 1.2 History of WLAN A WLAN is a local area network without wires and whereas a wired network in which the clients send/receive the data through the cables. The wireless network uses a radio wave frequency. As part of the large family of the spread spectrum systems, the Wi-Fi technology uses single carrier direct-sequence spread spectrum radio technology and multi-carrier OFDM (Orthogonal Frequency Division Multiplexing) radio technology. In 1985, the unlicensed spread spectrum was first approved by the Federal Communications Commission (FCC) [5]. In all major countries, these FCC regulations were later copied with enabling some changes in the use of this technology and these regulations were then enabled the growth of Wi-Fi technology according to requirements such as offices, online games and so on. In 1991, the Wi-Fi technology was invented by NCR corporation/ATT (later Lucent and Agere systems) in Nieuwegein, the Netherlands. Initially for the cashier systems, the first wireless product were brought on the market which is marked as WaveLAN with speeds of 1Mbits/s to 2Mbits/s. Vic Hayes, who was the first discoverer of the Wi-Fi and later has been named as Father of Wi-Fi, was involved in designing standards such as 802.11a/b/g. Wireless LANs communicate via the 2.4 GHz or 5GHz band with the unlicensed Industrial, Scientific and Medical (ISM) radio bands where cordless phones, instant monitor and other personal device can also operate. According to Mr. Phil Belanger of the Wi-Fi Alliance contradict the most popular conclusion that Wi-Fi stands for Wireless Fidelity [5]. 1.3 Benefits of WLAN A new way to communicate with the user is through the WLANs while accommodating the way business is done. The following are the benefits achieved through WLANs: Mobility within building. Flexibility Lower cabling costs To set up temporary spaces, it is easier Productivity gains Reduced errors Improved efficiency Improved performance, efficiency and security for enterprise partners and guests Easier to collaborate Easier adds, moves and changes and lower support and maintenance costs More efficient use of office space. Wireless Fidelity (Wi-Fi) Technology The IEEE 802.11 standard was projected for the WLANs. To handle the networking the short way for Wi-Fi is the wireless. Wi-Fi is easy to access and it is very simple to connect to computer anywhere in the office or homes without the use of wires. Using the radio signals the computer connects to the network. In 1997, the first standard (802.11) was released and works in the frequency band at 5GHz with the data rate of 54Mbits/s and uses the OFDM (Orthogonal Frequency Division Multiplexing) modulation [4]. The Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) is the media access method. The term 802.11.x terms is used to donate the set of amendments to the standard. Within the scope of one building and one room, we can connect to the wireless to the restricted signal range (indoor range is approximately about 1m). skhema Figure 1: Internet connection with wire and without wire (Wi-Fi) At present, the best values of the bit rate have a networks designed accordance with the 802.11n standard that has the typical raw data rate of 540Mbits/s [3]. Wi-Fi network operates in the unlicensed with the 2.4 and 5GHz radio bands, with 11Mbps (802.11b) or 54Mbps (802.11a) data rate or some of the products have dual bands. Wi-Fi network uses radio technologies to transmit and receive the data at high speed. IEEE 802.11 is available in three modes- 802.11a, 802.11b and 802.11g. IEEE 802.11a/b/g actually describes three different wireless Ethernet standards which are currently implemented in industrial applications as well as commercial applications. These three alternatives are based around the same physical layer of the OSI model and it also defines the bands on what the wireless network is used and also defines the modulation technique. IEEE 802.11 standards include Wi-Fi, W-LAN and Wireless Ethernet. IEEE 802.11a: This standard operation is used in OFDM which operates at a frequency of 5GHz band and thereby allowing the raw transmission data rate up to 54Mbps. It is introduced in 2001. For this band, some of the countries have other uses such as military and air traffic control, so therefore this band is not globally accepted and to be used in the ISM applications. But in some cases, this band can be used inside the building with limited power. In the U.S, the band 5GHz is treated as other 900MHz and 2.4GHz ISM bands. One advantage of the IEEE 802.11a is that it operates with same data rate (54Mbps) as IEEE 802.11g but it escapes sometimes due to crowded with the 2.4GHz channels. Less interference in the 5GHz band appears means the potential for more reliable transmission. The theoretical speed of this standard is 54Mbps but the raw transmission rate of this standard is in between 15-20 Mbps. The range of this standard is 50-75 feet. This is not compatible with 802.11b and it is more expensive . IEEE 802.11b: This standard was implemented in 1999, uses 2.4GHz band with the DSSS (Direct Sequence Spread Spectrum) modulation. The maximum transmission rate of this standard is 11Mbps within 30m range. It is most popular and least expensive. But the actual speed of this standard is 4-6 Mbps. The range of the wireless is 100-150 feet. The subsection of this standard is called Wi-Fi. IEEE 802.11 g: The OFDM technology of 802.11a is adopted in this standard and which is globally accepted with 2.4GHz band. Using the OFDM technique these data rates increased to 54Mbps over the air. It is important that 802.11g is compatible backwards with 802.11b. But this standard is more expensive so prefer to go for the least expensive and better performance which is 802.11b. Components of Wi-Fi: In order to access the Wi-Fi, we require some of the components such as adapters, access point, Wi-Fi antenna, Wi-Fi Bridge, PCI cards that accept wireless PC cards and external USB wireless NICs. The following are the component figures: accecpoint.jpg Figure 2: Access Point Figure 3: Adapters wifi antena.jpg wifi bridge.jpg Figure 4: Wi-Fi Antenna Figure 5: Wi-Fi Bridge Figure 6: PCI cards that accepts wireless PC card Figure 7: External USB wireless NICs How Wi-Fi network works? Wi-Fi network uses the radio waves to communicate each other among devices. The basic concept of the Wi-Fi network is same as the walkie talkies. An access point to the internet connection can be installed through the Wi-Fi hotspot. This access point acts as base station. With this access point, an antenna is physically connected to conventional wired Ethernet network and serves as a bridge to the wireless network. A device encounters the hotspot when the Wi-Fi is enabled and the device can connect to that network wirelessly. Between the client systems, the Wi-Fi can also support communication and allowing the devices to communicate with one another during the peer-to-peer method. A Wi-Fi 802.11b typically can transmit the maximum data rate up to 11Mbps with an approximation range of 150 feet. Beyond that distance, the signal fallback very slow up to 5.5 Mbps, 2Mbps and 1Mbps and this slower speed can move the signals as far as 1500 feet. The actual performance of the network depends upon the signal pattern and the number of obstacles in the area. To indicate the wireless within the area, an access point itself announces through broadcasting, a Service Set Identifier (SSID) approximately 10 times per second. The SSID indicates the name of the network. PCs that are within the range and has equipped with wireless network interface card can receive the SSID, associate with WLAN and request an IP address that will allow them to connect to the local network, surf the internet and view network folders [4]. Wi-Fi Network Topologies Access Point (AP) in the Wi-Fi may vary greatly depending upon their cost but in some of the cases these AP gives selection for roaming where the wireless clients can switch from one AP to another. There are three kinds of network topologies. AP (Access Point)-based topology (Infrastructure Mode) Peer-to-Peer topology (Ad-hoc Mode) Point-to-multipoint bridge topology. AP-Based Topology: Access Point (AP) is the wireless component through which the client can communicate. Access point is the device that contains standard IEEE 802.11 conformant MAC and PHY interface to the wireless medium and provides access to the distribution system for associated stations. Through an AP, BSA-RF (Basic Service access is the area of the radio frequency (RF)) coverage is provided. ESA (Extended Service Access) consists of two or more BSA. In order to allow the roaming, ESA cell consists of 10-15% overlap. The following figure shows the AP-based topology [9]. Figure 8: AP-Based topology Peer-to-Peer Topology: In this topology, the access point is not required. Within the cell, the client devices can communicate directly with one another. This topology is useful in setting up the wireless network very quickly and easily. The following figure shows the peer to peer method. Figure 9: peer-to peer method Point-to-multipoint bridge topology: This type of topology is used in buildings from one to another building apart within the miles. This is required to connect a LAN in one building to a LANs in another building. A clear line of sight is achieved among buildings under these conditions. Based on the type of antenna and wireless bridge used the line-of-sight range varies and as well as in environmental conditions. The following figure shows the point to multipoint bridge topology Figure 10: point-to-multipoint bridge topology Access Point and Wireless Card are the two ways that can use for the networking. Ad-hoc: In this method, the entire wireless cards are used from peer-to-peer network and there is no access point (AP). Infrastructure: All wireless cards connect to the central access point that provides them connectivity with each other as well as wired network [1]. Wi-Fi Configurations A Wi-Fi network is very simple and can be easily set up to the homes and offices that allow the network to share the files, printer and so on. Figure 11: Wireless network set up The public Wi-Fi hot spots are rapidly becoming common in airports, business, hotels, libraries and so on. Wi-Fi Security Security is one of the first disquiet of people deploying a wireless LAN, the 802.11 has addressed the issue through providing what is called WEP (Wired Equivalent Privacy). The main concerns of the users are that an intruder would not be able to access the network resources through similar wireless LAN equipment and be able to capture the wireless LAN traffic (eavesdropping). There are two primary components which are required for Wi-Fi network security to be broken down. Authentication Privacy There are two types of authentication is required: first is user authentication and second is server authentication. Authentication means keeping the unauthorized users off from the network. In user authentication server, the username and password is required. This authentication has a risk as well as a solution in sending the data. The risk one is the data is send before the secure channel is established and level to passive eavesdropping by attackers. The solution for this is, before sending the username and password, encrypted channel is established. Secondly in server authentication, the digital certificate is used and within the client software the validation of the digital certificate occurs automatically. Wireless Protected Access (WPA) is a standard based specification, interoperable security enhancement that strongly increase the level of data protection and for existing access control and future wireless LAN systems. Wi-Fi Applications Wi-Fi technology is simple and easy to access the network without the wire. At present, the Wi-Fi is most popular technology that has been used in the market. There are several applications through the Wi-Fi technology. It is used at homes, office, small businesses, large corporations and campuses, health care, wireless ISP (WISP) and travellers. Advantages and Disadvantages of Wi-Fi Advantages of Wi-Fi: It allows the LANs to be set up without cabling and also it reduces the costs and expansion of the network. Wi-Fi network support roaming such that a laptop can move from one access point to another. Wi-Fi is global set of standards. Mobility Ease of installation Reliability and Flexibility Security Use unlicensed part of radio spectrum Disadvantages of Wi-Fi: It can access to limited range. Higher power consumption The most common wireless encryption standard, Wired Equivalent Privacy (WEP) has been broken even if the correct configuration is set up. Interference Typically, Wi-Fi Access Point is set to default to an open (encryption-free) mode. Conclusion: In the past few years, the Wi-Fi technology is growing very rapidly in the rural development areas. In the rural areas, the technology has been helped the consumers in receiving the high speed internet service. All through urban environment the Wi-Fi hot spots are becoming more popular. When the Wi-Fi technology has brought up to the rural and urban areas the broadband internet access price has been drive down. According to the various industrial applications, the network connectivity for the industrial wireless solution provides that is cost effective and efficient. To ensure the reliability of wireless connectivity and safety of industrial operations, a hazardous area classification is necessary that provides the redundant links radio. Currently, there are several standard-based wireless technologies that are used for the industrial applications for the field sensors networking such as ISA100, WHART and ZigBee. Wi-Fi technology is simple and easy to deploy to the network. The IEEE 802.11 is the standard used for the Wi-Fi hot spots. With appropriate security features, industrial hardware and industrial interface products, Wi-Fi technology has a certain association of commercial technology, based on the 802.11 technology and is becoming a solution for many industrial communications and networking.

Wednesday, September 4, 2019

Advantages And Disadvantages In Hospitality

Advantages And Disadvantages In Hospitality Hospitality management is both a field of work and a field of study. In the work sense, it refers to management of hotels, restaurants, travel agencies, and other institutions in the hospitality . As a field of study, it refers to the study of the hospitality industry and its management needs. People who are interested in careers in hospitality management may opt to pursue it as a field of study so that they can start their careers on solid footing.The hospitality industry is vast and very diverse. Any time people travel, stay in a hotel, eat out, go to the movies, and engage in similar activities, they are patronizing establishments in the hospitality industry. The management of such establishments is very challenging, as managers need to be flexible enough to anticipate and meet a wide variety of needs. They must also handle tasks such as training employees, handling staff, setting standards, and so forth. Question 1 Define the term Hospitality Industry and give examples, advantages and disadvantages of their use in the hospitality industry. Answer Question 1 Hospitality industry is one of the largest industries in both global and national contexts. Hospitality industry is service industry that includes lodging, restaurants, theme park, cruise line, event plan and http://upload.wikimedia.org/wikipedia/commons/d/d4/Button_hide.pngadditional fields within the tourism industry. The hospitality industry is a several billion dollar industry that mostly depends on the availability of leisure time and disposable income. A hospitality unit such as a restaurant, hotel, or even an amusement park consists of multiple groups such as facility maintenance, direct operations (servers, housekeepers, porters, kitchen workers, bartenders, etc.), management, marketing, and human resources. The hospitality industry covers a wide range of organizations offering food service and accommodation. The industry is divided into sectors according to the skill-sets required for the work involved. Sectors include accommodation, food and beverage, meeting and events, ga ming, entertainment and recreation, tourism services, and visitor information. Examples Accommodations Hotels Motels Restaurants Bars Cafes Nightclubs Public houses Restaurants Travel and Tourism Airline Cabin Staff Travel agents Top of Form Bottom of Form Advantages Advantage in the hospitality sector is that there are a lot of entry level positions available. These junior roles can provide candidates with the relevant experience that is vital to career progression within the industry. Some of these roles include jobs like restaurant assistants, Junior Chefs, Receptionists, Bar Staff and Hotel catering staff. These roles offer the potential to progress into management if you work hard and show that you have the necessary skills and experience to take on more responsibility. Moreover, if you do decide to try a new role there is great deals of transferable skills that can be used across several different job roles in the hospitality industry. Employees working in this industry will also have to be prepared to work fairly long hours in some roles in order to prove themselves. For example Chefs and restaurant managers have to work long and sometime unsociable hours. Another advantage to working in the hospitality sector is jobs are available all ove r the country and they are not area specific. Obviously there is a large amount of appealing jobs available in London but there are hotels, restaurants and pubs all over the country. Therefore unless you specifically want to work in the hospitality industry in London then you will not have to relocate to get the job you want. Advantages Hospitality : everywhere, every city in the world requires a tendency for this sector and some G.K. a nice presentable personality a good team work meet new and new people, even they have something in common they want a personal touch good prospect when in the higher position recruit new people and train them mix with similar people like event management etc, dont be driven away by the limelights and glamours change to others for better pays Disadvantages The time factor is perhaps the biggest drawback to creating a blog. Blogs are easy to start but difficult to maintain. Publishing a good blog takes a significant amount of time. Of course, writing takes the most time, but you must also allow time for interacting with your readers.Related to the time factor is the risk of publishing a blog that damages your brands reputation. Fortunately, you can hedge against this by creating publishing guidelines for yourself and whoever is involved with the blog. On the other hand, it can be very dangerous to open your door to strangers for obvious reasons. For those of you who are guileless in your ways, I shall enlighten you to the ways of those that could prove to be a major threat to you if you are a hospitable, good natured person. Such people cannot help but take advantage of those who are vulnerable to them. Answer Question 2 Find out the factors that affecting travel and tourism. Explain in detail. Answer Question 2 Tour operators can be defined as providers and organizers of package holidays. They normally operate by making contracts with transport companies, airlines and hoteliers. After getting the contracts, they advertise assembled holidays. Travel agents are concerned with booking and advising customers. Travel agencies also sell travel related services and products to customers. They do this on behalf of tour companies, hotels, and airlines. Travel agents also deal with local tourists. They carry out travel arrangements for travelers. There are different types of travel agencies; they include Independent agencies, Miniples and Multiples. Tour operators and travel agents have continued to be dominant in the tourism sector. There are potential threats to travel agents to and tour operators especially in the hospitality and tourism sector. A close analysis to the travel and tourism industry shows that one of the potential threats to tour operators and travel agents is change in laws and poli cies. There are laws and policies that travel agents have to adhere to in carrying out their tasks. Every nation has got rules, laws, regulations, policies that directly affect tour guides. There is normally potential threat to tour operators when embassies give advisory policies to citizens not to travel due to factors like terrorism and bombing. When an embassy changes or advises citizens not to travel to a country due to various reasons, this becomes a threat to them because citizens normally adhere to such advice. It results to decrease in tourists and therefore their business actually slows down. Travel guides and tour operators normally help tourists to locate good hotels and tourist sites in the country. There are always instances when travel guides help tourists in locating such services but in the long run the tourists do not receive quality services. Tourists always communicate one to another and therefore this becomes bad publicity. Conclusion Cultural heritage is the essence of tourism in many destination areas worldwide. Every year, millions of people travel to view the Acropolis of Athens, the Colosseum in Rome and many other historic sites of international renown. These sites are of general interest to visitors, even though the visitors probably have no significant ties to the heritage sites that they visit. Although world heritage attractions draw large numbers of international and domestic tourists, for most foreign tourists these sites consist only a small part of a more extensive travel package. These attractions can evoke feelings of admiration, but they probably do not evoke feelings of personal attachment. Visits to historic sites are mostly motivated by the belief that such places (and the objects at these places) are linked to the remote past. In addition, millions of other people engage in travel to experience heritage of a more personal nature; most of the world s historic sites are not internationally known and only relatively few ever attract international tourists, except perhaps in combination with other relevant attractions. For every world renowned cultural attraction, there are hundreds of other not famous sites that are appreciated at a more local basis.

Tuesday, September 3, 2019

Social Contract Essay -- essays research papers

The purpose of a Social Contract is to keep society in order. Ways of keeping society in order are human rights, the constitution, police departments, and education in which all contributes in having a progressing society. Human rights have to be protected which are the first 13 or 14 amendments that’s states people’s rights. If humans didn’t have any rights of their own we would feel enslaved due to that we have no freedom. The Constitution contains laws that every human being has to follow unless if you live somewhere else other than the U.S. Police departments maintains society regarding the Constitution; even the police must obey the laws and their own rules. In addition, the education we take also sets examples of how we should always follow rules or laws. In classrooms we have rules that we must follow like listening to the teacher and so on.   Ã‚  Ã‚  Ã‚  Ã‚  The definition of a Social Contract and some other information is, a voluntary agreement among people defining the relationship of individuals with one another and with government and by this process forming a distinct organized society. Concern over the origin and conditions of political obligation was manifest even in the writings of philosophers and statesmen in ancient Greece and Rome. Such ideas were not systematically formulated, however, until the latter part of the 16th century, when Protestant philosophers sought a democratic principle with which to oppose the authoritarian theory of the divine right of kings. In the 17th and 18th centuries the theory of a social compact among individuals of a society was linked with the doctrine of natural law.   Ã‚  Ã‚  Ã‚  Ã‚  A setting for a social contract would be like in school, at home, basically everywhere you go which contains written and unwritten rules. At school students rights are commonly violated and yet some aren’t. For example, â€Å"articles about controversial subjects written for student newspapers are censored. Lockers and backpacks are searched without reasonable suspicion. Minority students are excessively pushed in lower track programs. Majoritarian religious practices are officially allowed by teachers and school administrators. Female students are excluded from certain extracurricular activities, and gay students are intimidated into silence. Teachers and administrators have a responsibility to provide a s... ...ot perform, but be careful to keep your promise.   Ã‚  Ã‚  Ã‚  Ã‚  An example of a Social Contract is Evergreens S.C. and Rousseau’s Philosophy. In Evergreens S.C. under Right to Privacy he states, â€Å"All members of the college community have the right to organize their personal lives and conduct according to their own values and preferences, with an appropriate respect for the rights of others to organize their lives differently. All members of the Evergreen community are entitled to privacy in the college’s offices, facilities devoted to educational programs and housing. The same right of whether extends to personal papers, confidential records and personal effects, whether maintained by the individual or by the institution.† An example of Rousseau’s Philosophy or S.C. he stated, â€Å"Man is born free but everywhere is in chains.† These quotes are important to me because one states ones privacy in a community which is needed for people in order to function well in life, I mean you don†™t want to be spreading your information to many others especially important ones, and the other states that a man may be free but everywhere he goes he is chained by rules or laws to enforce.

Performance Budgeting :: American Government, Budgeting Initiatives

This paper examines the benefit of performance based budgeting as a practical theory of efficiency for government programming. Confronted by fiscal limitation and demand for improved public services, government agencies are utilizing the budget as a means to elevate government accountability and efficiency, rather than simply as a means for distributing funds and controlling expenses. Performance based budgeting has been defined as a system wherein managers are provided with the flexibility to utilize agency resources as required, in return for their commitment to achieve certain performance results. (Brewer, 3) Performance budgeting is a system of planning, budgeting, and evaluation that emphasizes the relationship between money budgeted and results expected. (Government of Alberta, 1) Performance budgeting signifies an important divergence from habitual line item budgeting. A line item budget is mainly a tool for controlling expenditures it characteristically indicates the amount of spending permitted for particular purposes. As a fiscal year progresses, departmental spending must remain within the budgeted amounts unless formal budget amendments are approved. Under line item budgeting spending in one category cannot automatically be used to supplement another category. (Government of Alberta, 2) While traditional budgets can be useful in assisting managers with internal control, they are not typically as useful as a policy or decision making tool. Line-item budgets assure elected and administrative officials that money is being spent only for approved purposes, but they do not show what is being accomplished with the money. (Government of Alberta, 3) Additional drawbacks to line-item budgets involve the promotion of indolence, due to the minor modifications made to budget planning each year. Line-item budgeting can result in ineffective and costly actions because management is not allowed the flexibility to address changing situations. (Virginia Society of Certified Public Accountants, 7) Many government programs are often forced to use funding, or lose funding at the end of a program year; these restrictive processes have the potential to invite micromanagement and impede the fulfillment of program objectives. (Government of Alberta, 3) In comparison, performance budg eting has more of a policymaking orientation it links plans, measures, and budgets and it pushes administrators and policymakers to contemplate the big picture. (Brewer, 23) Performance budgeting provides useful information about the impact of budget decisions on people and gives departments increased budgetary flexibility. Additionally, performance budgeting allows for ongoing monitoring and strengthens legislative decision making and oversight.

Monday, September 2, 2019

Research Paper on Extraction of Pectin Essay

Sampalok, being of prehistoric introduction, is planted throughout the settled areas of the Philippines and is cultivated for its many uses. The plant is a large tree from 12 to 25 meters in height. The pods are oblong, thickened, and 6 to 15 centimetres by 2 to 3 centimeters, slightly compressed, and provided with a thin, crustaceous epicarp and a pulpy, acid, edible mesocarp. The young leaves flowers, leaves, and young pods are being used by people for seasoning foods like â€Å"sinigang†. The pulp surrounding the seeds, called â€Å"malasebo† is eaten outright either with or without salt (E. Quisumbing, 1951). Sampalok pulp contains Pectin which can be useful in our society and possibly be extracted. Pectin is a structural heteropolysaccharide contained in the primary cell walls of terrestrial plants. The main use for pectin (vegetable agglutinate) is as a gelling agent, thickening agent and stabilizer in food. On this account, the researcher would like to experiment on tamarind pods, which has Pectin content and to extract it for further use, which can help in the food industry here in our country. Statement of the Problem The study aims to extract Pectin from Sampalok (Tamarindus indica) pods. Specifically to answer, the following questions: * How can Pectin be extracted from Sampalok? * How much Pectin can be extracted from the Tamarind fruit? * What general characteristics did the Pectin from the Tamarind fruit exhibit? Hypotheses * Pectin cannot be extracted from Tamarind. * No amount of Pectin can be extracted from the Tamarind. * The tamarind fruit did not exhibit characteristics of Pectin. Significance of the Study This study will help reduce the country’s importation of pectin from other countries. . Based from Government’s statistical data, our country had imported about 93,150 kilos of pectin in 2008. The cost incurred in importing Pectin is about P27, 000 per kilo. Finding an alternative source of pectin from locally grown plants like tamarind will help reduce the country’s dependence on pectin importation as well as help the local economy. If proven that pectin can be commercially extracted from tamarind then the local populace will be encouraged to cultivate tamarind as extra income. Scope and Limitations In this study, the researcher is only limited to use the tamarind pulp surrounding the seeds, called â€Å"malasebo† Tamarind pulp is the main independent variable in the extraction of pectin except for the materials needed for the extraction process. This project is limited only in extracting pectin from tamarind pulp. Review of Related Literature Pectin is defined as complex mixtures of polysaccharides that make up approximately one third of the cell-wall dry substance of most types of plants (Van Buren, 1991). The function of pectin in plants is to contribute structural integrity to the cell wall and adhesion between cells.   The methods of extraction will vary based on the actual makeup for each particular plant type. For example, protopectins are brought into solution by hot dilute acids. The general makeup of the pectin content varies with ripening of the plant and it is fairly easily brought into solution depending on the plant type (Van Buren, 1991). Commercial pectin extraction is mainly from citrus peel and apple pomace, but several other sources exist such as sugar beets and sunflower heads.   Because it is a natural additive for foods, pectin is being considered for a number of applications beyond the traditional jams and jellies. Pectin is now used as thickeners, water binders, and stabilizers. It is used in yogurts and pastry glazes and as a stabilizer in drinkable yogurts and blends of milk and fruit juices (May, 1990). Pectin is also being used as a texturizing fat replacer to mimic the mouth-feel of lipids in low-calorie foods and shorter chain galacturonic acids have been considered as clarification agents in fruit juices (Braddock, 1999). Pectin is also being used as a texturizing fat replacer to mimic the mouth-feel of lipids in low-calorie foods and shorter chain galacturonic acids have been considered as clarification agents in fruit juices (Braddock, 1999). Pectin has also been investigated for its usefulness in the pharmaceutical industry. Among other uses it has been considered in the class of dietary fibers known to have a positive effect on digestive processes and to help lower cholesterol (Braddock, 1999). It also is utilized to stabilize liquid pharmaceutical emulsions and suspensions. Pectin is capable of forming gels with sugar and acid. Because of this gelling ability one of the well-known uses of pectin is in high sugar jams and confectionery jellies, dating back to at least the 18th century (IPPA, 2001). METHODOLOGY The subsequent materials were used in the study: 1 kg fresh tamarind fruit, 750g water, kettle, a large bowl, cheese cloth, sieve, isopropanol, and drying oven. The fruit pods will then be put in the kettle and boiled for one hour. When boiling, heat to low and stir occasionally to break up pods. Transfer cooked pods with water in the large bowl and strain using a sieve, pressing pulp against it to extract all the juice. Then, strain the extracted juice again using the cheese cloth to produce a clear liquid extract. To remove impurities, use the most common method in which, mix the liquid extract with an organic solvent in which pectin is insoluble. As International Food Standards permit the use of only methanol, ethanol, or isopropanol as an organic solvent, the researcher treated the liquid extract with isopropanol (isopropyl alcohol) in the ratio of 1 part liquid extract to 2 parts alcohol. In this process, when the liquid extract is mixed with sufficient alcohol, it solidifies the extract, making it firm enough to be handled. This precipitate (Pectin) is then washed several times to further remove other impurities. Once the pectin is isolated, it is dried in a drying oven overnight at 45 degrees Celsius, then ground to powder. Definition of Terms Pectin – is a structural heteropolysaccharide contained in the primary cell walls of terrestrial plants. It is used in food as a gelling agent particularly in jams and jellies. It is also used in fillings, medicines, sweets, as a stabilizer in fruit juices and milk drinks, and as a source of dietary fiber. Tamarind – is a long-lived, medium-growth, bushy tree, which attains a maximum crown height of 12.1 to 18.3 metres (40 to 60 feet). The crown has an irregular, vase-shaped outline of dense foliage. The fruit is an indehiscent legume, sometimes called a pod, 12 to 15 cm (3 to 6 inches) in length, with a hard, brown shell. The fruit has a fleshy, juicy, acidulous pulp. It is mature when the flesh is coloured brown or reddish-brown. The tamarinds of Asia have longer pods containing six to 12 seeds, whereas African and West Indian varieties have short pods containing one to six seeds. The seeds are somewhat flattened, and glossy brown. The tamarind is best described as sweet and sour in taste, and is high in acid, sugar, B vitamins and, oddly for a fruit, calcium. Extraction – the process of obtaining something from a mixture or compound using physical or chemical means. BIBLIOGRAPHY Book Sources: * Quisumbing, E. (1951) Philippine Medicinal Plants. Genus TAMARINDUS Linnaeus pp. 434-436, Manila * Srivastava, P. & Malviya, R. (2011) Indian Journal of Natural Products and Resources Vol. 2 (1) Sources of pectin, extraction and its applications in pharmaceutical industry. pp. 10-18 * May, C. D. Handbook of Hydrocolloids pp. 169-188 * Huang, J. M. G. Improved method for the extraction of Pectin, PO Box 4200 Highstown, New Jersey 08520

Sunday, September 1, 2019

Native Son character Essay

The protagonist and main character of Native Son is Bigger Thomas. He is the focus of the novel and the embodiment of its main idea–the effect of racism on the mental state of its black victims. Richard Wright’s exploration of Bigger’s psychological corruption gives us a perspective on the effect that racism had on the black population in 1930s America. Some critics of Native Son have questioned the effectiveness of Bigger as a character. For instance, the famous black writer James Baldwin has considered Bigger as too narrow to represent the full scope of black experience in America, but I believe he is a powerful and disturbing symbol of black rage. As a 20-year-old black man cramped in a Chicago South Side apartment with his family, Bigger has lived a life defined by the fear and anger he feels toward whites. Bigger is limited by the eighth-grade departure from school, and by the racist real estate practices that forced him to live in poverty. Furthermore, he is subjected to messages from a popular culture that portrays whites as civilized and sophisticated and blacks as barbaric and subservient. Racism has severely reduced Bigger’s opportunities in life and even his conception of himself. He is ashamed of his family’s poverty and afraid of the whites who control his life–feelings he works hard to keep hidden, even from himself. When these feelings overwhelm him, he reacts with violence. â€Å"These were the rhythms of his life: indifference and violence; periods of abstract brooding and periods of intense desire; moments of silence and moments of anger–like water ebbing and flowing from the tug of some far-away, invisible force.† (31) Bigger robs people with his friends–though only other blacks, as the gang is too frightened to rob a white man–but his own violence is often directed at these friends as well. Bigger sees white people as an overpowering and hostile force that is set against him in life. Just as whites fail to conceive of Bigger as an individual, he does not really distinguish between individual whites–to him, they are all the same, frightening and untrustworthy. Bigger feels little guilt after he accidentally kills Mary, the daughter of his white employers. In fact, he feels for the first time as though his life actually has purpose and meaning. Mary’s murder makes him believe that he has the power to assert himself against whites. Wright goes out of his way to show  that Bigger is not a conventional protagonist, as his brutality and capacity for violence are extreme, especially in graphic scenes such as the one in which he decapitates Mary’s corpse in order to stuff it into the furnace. Wright does not present Bigger as a hero to admire, but as a frightening and disturbing character created by racism. Wright’s point is that Bigger becomes a brutal killer because the dominant white culture fears that he will become a brutal killer. Wright emphasizes this vicious cycle of racism: though Bigger’s violence stems from racial hatred, it only increases the racism in American society, as it confirms racist whites’ basic fears about blacks. In Wright’s depiction, whites effectively transform blacks into their own negative stereotypes. Only when Bigger meets Max, his white, communist lawyer, does Wright offer any hope of breaking this cycle of racism. Through interaction with Max, Bigger begins to perceive whites as individuals. Only when sympathetic understanding exists between blacks and whites will they be able to see each other as individuals, not merely as members of a stereotyped group. After he meets Max and learns to talk through his problems Bigger begins to redeem himself, recognizing white people as individuals for the first time and realizing the extent to which he has been affected by racism. Early on in Native Son, Wright describes how Bigger retreats behind a â€Å"wall† to keep the reality of his situation from overwhelming him. This passage from Book Two shows the destructive effects of Bigger’s retreat. â€Å"There was something he knew and something he felt; something the world gave him and something he himself had†¦Never in all his life, with this black skin of his, had the two worlds, thought and feeling, will and mind, aspiration and satisfaction, been together; never had he felt a sense of wholeness.† (225) He is isolated not only from his friends and family, but from himself as well. It seems that the black psyche is always divided. Bigger’s mind is split in two, leaving him unable to interact with others and unable to understand himself. It is this quest for wholeness that dominates Bigger’s  life. Tragically, it is not until he has murdered two women and is soon to be executed that he is able to understand and grasp this wholeness. He is thrilled by his new realization, yet tormented by the fact that it comes too late, when he has only precious little time left to live.