Thursday, November 28, 2019

Trials And Tribulations Of Ariel Dorfman Essays - Ariel Dorfman

Trials And Tribulations Of Ariel Dorfman Trials and Tribulations of Ariel Dorfman In the late 1950s Chile was fighting a political war. Ariel Dorfman wrote many stories and essays dealing with the political oppression. Ariel Dorfman was exiled from Chile because of his writings, and struggled with his writing in Paris. With ambitions to return to his country he became one of the most significant Hispanic writers in the 20th century. Chile was going through a time of change. After the death of President Salvador Allende, Augusto Pinochet took over. Ariel worked for Allende and wrote many not so nice things about Pinochet. In 1973 Pinochet didnt fire Dorfman, instead he just exiled Ariel from the country. After being exiled Dorfman went to Paris he came down with a case of writers block, which left him poor for a while. He eventually recovered and wrote many famous plays and poems. In one of his poems He describes Latin America as an enigma a vibrant, sprawling, messy reality which did not itself know where it was or where it was goinga series of half-formed nations trapped in a history not of its own, trying to invent an alternative. (Former Exiled Writer Dorfman 21) Born on May 6, 1942 in Buenos Aires, Argentina, Dorfmans family was well aware of the horrors of war and the pain of exile, his Jewish grandparents fled the pogroms of Eastern Europe. At the age of two his family moved to New York City and he attended grade school there. When he was seven he began writing childrens fiction. He also expressed himself through painting. At the age of twelve he and his family moved to Chile where he completed his education, married, and in 1967 became a naturalized Chilean citizen. He attended graduate school in Berkley California in 1968 and 1969 and then he returned to Chile. As an adult Dorfman worked as an activist, journalist and writer. Dorfman actively protested against political oppression in Chile. When Chiles democratically elected Allende and his Marxist government were overthrown in a coup by Augusto Pinochet in 1973 he found himself in opposition to those in power. Following Allendes death, thousands of politicians, intellectuals, clergymen and writers, of which Dorfman was one, were expelled from Chile. Many famous and significant writings came from Dorfman. His writings include Windows, his Memoir Heading South Looking North: A Bilingual Journey, Death and the Maiden, along with many short stories and poems. His widely acclaimed novel Windows portrays a peasant woman whose male relatives including her husband, father and sons were abducted by the military. The novel shows the realistic, emotional strain and grief that disappearances put on the families of the missing. Knowing that this highly sensitive subject would probably prevent the book from being published in Chile, he devised a scheme to have Windows printed first in Europe under the pseudonym Eric Lohmann. He planned to have the novel published in Danish, French or German and then issued as a Spanish translation of a European novel. However, at the last minute the Spanish-language published backed out and the novel was ultimately released under Dorfmans real name. After writing this novel, Dorfman wrote many poems focused on the same subject. Dorfman said, all of my poems are ways of giving voices to those who have disappeared, and those who are left behind; I am a bridge between them. Words become a way of returning to your countrya cemetery, but also a resurrection ground. (Contemporary Authors On Line Dorfman 1). Dorfmans Memoir called Heading South Looking North: A Bilingual Journey outlines his escape and account of his years in Argentina as a cultural advisor and writer for Allendes government. Dorfman said, The book is very much an attempt to show what you do control and what you dont control in your life. (C.A.O.L Dorfman 1) In 1992 Dorfman wrote the play Death and the Maiden. This story was based on three main characters; Paulina is the wife of a lawyer asked to serve on a commission investigating the crimes under the previous government including her own brutal rape by a doctor. Through her husband, she meets the man she believes raped her. She kidnaps him and decides to place him

Sunday, November 24, 2019

Chronology of Ancient Mesopotamian Kings of Sumeria

Chronology of Ancient Mesopotamian Kings of Sumeria Mesopotamia, the Land Between Two Rivers, was located in present-day Iraq and Syria  and was home to one of the most ancient civilizations: the Sumerians. Between the Tigris and Euphrates rivers, Sumerian cities such as Ur, Uruk, and Lagash provide some of the earliest evidence of human societies, along with the laws, writing, and agriculture that made them function. Sumeria in southern Mesopotamia was countered by Akkad (as well as Babylonia and Assyria) in the north. Rival dynasties would shift the center of power from one city to another over thousands of years; the Akkadian ruler Sargon united the two societies during his reign (2334-2279 B.C.) The fall of Babylon to the Persians in 539 B.C. saw the end of indigenous rule in Mesopotamia, and the land was marked by further conquests by Alexander the Great, the Romans, and before coming under Muslim rule in the 7th Century. This list of ancient Mesopotamian kings comes from John E. Morby. Notes based on Marc Van De Mieroops. Sumerian Timelines First Dynasty of Ur c. 2563-2387 B.C. 2563-2524... Mesannepadda 2523-2484... Aannepadda 2483-2448... Meskiagnunna 2447-2423... Elulu 2422-2387... Balulu Dynasty of Lagash c. 2494-2342 B.C. 2494-2465... Ur-Nanshe 2464-2455... Akurgal 2454-2425... Ennatum 2424-2405... Enannatum I 2402-2375... Entemena 2374-2365... Enannatum II 2364-2359... Enentarzi 2358-2352... Lugal-anda 2351-2342... Uru-inim-gina Dynasty of Uruk c. 2340-2316 B.C. 2340-2316... Lugal-zaggesi Dynasty of Akkad c. 2334-2154 B.C. 2334-2279... Sargon 2278-2270... Rimush 2269-2255... Manishtushu 2254-2218... Naram-Suen 2217-2193... Shar-kali-sharri 2192-2190... anarchy 2189-2169... Dudu 2168-2154... Shu-Turul Third Dynasty of Ur c. 2112-2004 B.C. 2112-2095... Ur-Nammu 2094-2047... Shulgi 2046-2038... Amar-Suena 2037-2029... Shu-Suen 2028-2004... Ibbi-Suen (The last king of Ur. One of his generals, Ishbi-Erra, established a dynasty in Isin.) Dynasty of Isin c. 2017-1794 B.C. 2017-1985... Ishbi-Erra 1984-1975... Shu-ilishu 1974-1954... Iddin-Dagan 1953-1935... Ishme-Dagan 1934-1924... Lipit-Ishtar 1923-1896... Ur-Ninurta 1895-1875... Bur-Sin 1874-1870... Lipit-Enlil 1869-1863... Erra-imitti 1862-1839... Enlil-bani 1838-1836... Zambiya 1835-1832... Iter-pisha 1831-1828... Ur-dukuga 1827-1817... Sin-magir 1816-1794... Damiq-ilishu Dynasty of Larsa c. 2026-1763 B.C. 2026-2006... Naplanum 2005-1978... Emisum 1977-1943... Samium 1942-1934... Zabaya 1933-1907... Gunnunum 1906-1896... Abi-sare 1895-1867... Sumu-el 1866-1851... Nur-Adad 1850-1844... Sin-iddinam 1843-1842... Sin-eribam 1841-1837... Sin-iqisham 1836... Silli-Adad 1835-1823... Warad-Sin 1822-1763... Rim-Sin (probably an Elamite. He defeated a coalition from Uruk, Isin, and Babylon and destroyed Uruk in 1800.)

Thursday, November 21, 2019

Corporate governance Essay Example | Topics and Well Written Essays - 2250 words

Corporate governance - Essay Example management styles with those of the U.S. Many of the largest British multinationals, such as GlaxoSmithKline and BP, have merged with or acquired large U.S. firms, and almost all leading U.K. companies derive substantial proportions of their revenues from the U.S. The differences in management style and culture have become far more nuance. Large British multinationals probably remain more international and cosmopolitan in their outlooks than their U.S. counterparts, slower to act and less inclined to adopt the latest management fads, and less ruthless in dealing with failure and under-performance. However, there is vast industry and firm differences. Under UK GAAP fair values are assigned to identifiable intangible assets only if the identifiable intangibles are capable of being disposed of or settled separately, without disposing of a business of the entity. Under US GAAP, identifiable assets are separately valued and amortised over their useful lives. The separately identifiable intangible assets included in the US GAAP balance sheet are principally comprised of brand rights, which are being amortised over periods between 25 to 30 years. US GAAP requires the Group to record all derivatives on the balance sheet at fair value. The Group has decided not to satisfy the SFAS No. 133 "Accounting for Derivative Instruments and Hedging Activities" (SFAS 133) requirements to achieve hedge accounting for its derivatives, where permitted, and accordingly movements in the fair value of derivatives are recorded in the profit and loss account. (Annual Report and Accounting, 2005) The new era of globalise businesses and increased awareness in the stakeholders have given importance to the notion of Corporate Governance. The execution of the notion will have important consequences for investors, companies, and, critically, for the stock and other financial markets of UK. With the increasing globalisation when every country can be seen as an opportunity for the investors the lack of understanding of effective corporate governance can adversely effect the investment intentions of investors. Nowadays corporate governance is seen as the key of attracting investors. Capital flow seems directed towards the companies, which practice fair and transparent ways of governing their organisations. With the changing global business scenario the need of understanding and effective practise of fair and technologically advance corporate governance has also increased. In my speech I will first explain the notion of Corporate Governance. ICAEW (2002) has explained corporate governance in a very effective and comprehensive manner as " Corporate governance is commonly referred to as a system by which organisations are directed and controlled. It is the process by which company objectives are established, achieved and monitored. Corporate governance is concerned with the relationships and responsibilities between the board, management, shareholders and other relevant stakeholders within a legal and regulatory framework."

Wednesday, November 20, 2019

Economics Essay Example | Topics and Well Written Essays - 1000 words - 17

Economics - Essay Example In a closed economy where there is no foreign trade, the level of outputs that are produced will be at market equilibrium as the demand levels will further be met by the supply levels. However, during recessions, when unemployment rate rises, the demand will still be met by the supply, although the demand level will be lower. This is why in the goods market prices and quantity will settle at the equilibrium but high unemployment can still be present in the economy. This has been termed as the â€Å"Keynesian unemployment†. As what has been described earlier, in determining output to meet the demands, there are two views—the Keynesian and the classical view. The classical view argues that prices and wages are flexible, in such a way that excesses in either demand or supply will quickly be absorbed by the economy and resume full employment of resources after economic shocks—or abrupt changes in the aggregate demand and supply curves. The Keynesian view on the other hand argues, as apparent in its sticky theory of prices and wages which says that these two factors are sticky in the short run because of contractual rigidities such as agreements made with different interest groups such as the labor unions. In the latter situation, the one proposed by Keynes, higher levels of aggregate demands are needed for output to respond positively because aggregate supply curve is relatively flat especially when output levels are low. In this situation, the economy can have long periods of unemployment b ecause prices and wages are slow to adjust to shocks, and reaching full employment of resources is slow to reach. When classical economists argue that unemployment results from the interaction of the labor demand and supply curves, and lowering the wages will spread the labor supply which can curb unemployment in the process,

Monday, November 18, 2019

CASE 1 HRM 402 - TD - Determining Training and Development Essay

CASE 1 HRM 402 - TD - Determining Training and Development - Essay Example hould be taught to achieve optimal performance.† The job or task will be analyzed which includes the requirements for performing the task by specifying the main duties or level of the skills needed. When conducting the task analysis, the following should be evaluated: performance of task, frequency of task performed, importance of each task, knowledge needed to perform the task, difficulty of the task and trainings available for each task. It is very important to organize the task in sequence or by importance. The employee should be observed while performing the task and the observation should be documented properly. The performance of the employee should be evaluated based on the job description such as taking note if the employee missed important part of the task or deviated from what are listed on the job description. It is important to check if there are differences between the top and bottom performers. This would lead to the question of what are the suitable trainings needed to improve productivity and overall performance of the

Friday, November 15, 2019

Jobs in Information Security

Jobs in Information Security Major: My major is information security. Information security: Information security, abbreviated to Information security, is the act of anticipating unapproved get to, utilize, exposure, disturbance, change, examination, recording or annihilation of data. Some of the time alluded to as PC security, data innovation security is data security connected to innovation (frequently some type of PC framework). It is advantageous to note that a PC does not really mean a home desktop. A PC is any gadget with a processor and some memory. Such gadgets can extend from non-organized independent gadgets as straightforward as adding machines, to arranged versatile registering gadgets, for example, cell phones and tablet PCs. IT security masters are quite often found in any real venture/foundation because of the nature and estimation of the information inside bigger organizations. They are in charge of keeping the majority of the innovation inside the organization secure from noxious digital assaults that frequently endeavor to rupture into basic private data or pick up control of the inner frameworks. Information assurance: The demonstration of giving trust of the data, that the Confidentiality, Integrity and Availability (CIA) of the data are not damaged, e.g. guaranteeing that information is not lost when basic issues emerge. These issues incorporate, yet are not constrained to: cataclysmic events, PC/server glitch or physical burglary. Since most data is put away on PCs in our present day time, data confirmation is commonly managed by IT security pros. A typical technique for giving data affirmation is to have an off-site reinforcement of the information in the event that one of the said issues emerge. Jobs Titles There are many jobs available in this major. Here I will discuss only 3 jobs. Information Security Manager Information Security Analyst Security Operations intelligence manager Information Security Manager The Security Governance, Risk and Compliance Manager is in charge of guaranteeing undertaking information systems and frameworks are agreeable with all Information Security, consistence and review controls and in addition corporate approaches intended to ensure business interests. Information Security Manager will counsel inside and track and deal with all innovation related dangers. With his/her propelled learning in data security he/she will be entrusted with setting up best practices here. Responsibilities: There are some major responsibilities for this job is given below. Make, keep up and deal with the Information Security, Technology Risk, Audit and consistence plans. Teams up Business and Technology initiative to build up a coordinated way to deal with data innovation hazard administration and consistence that properly adjusts organizations hazard hunger, values, computerized items and market position. Liaises and works with the Internal Audit and Group Functions to guarantee an incorporated plans. Selection criteria There are some selection criteria in given below Least of ten years administration encounter inside an Information Security/Risk Governance work inside a vast professional workplace Solid comprehension of key business goals and have the capacity to well-spoken hazard with regards to business targets; he or she will have a profound working information of significant consistence, administrative systems, for example, ISO27001, PCI-DSS, Sarbanes-Oxley. Solid comprehension of key business goals and have the capacity to well-spoken hazard with regards to business targets; he or she will have a profound working information of significant consistence, administrative systems, for example, ISO27001, PCI-DSS, Sarbanes-Oxley. Solid correspondence and introduction aptitudes required. Proficient security administration affirmation as a Certified Information Systems Security Professional (CISSP). Affirmed Information Security Manager (CISM), Certified Information Systems Auditor (CISA) Certified in Risk and Information Systems Control (CRISC) or other comparable favored. Information Security Analyst Information Security Analyst is a person that surveys and investigates IT conditions/foundations for data security plan, execution and upkeep related procedures. Data security experts audit IT conditions for security needs and necessities, and give their understanding into actualizing and enhancing the data security engineering of an association. Duties: Ensure effective delivery of the UAR service and all relevant processes. Investigating, responding to, remediating and reporting on any identified UAR issues. Investigating, responding to, remediating and reporting on any identified UAR issues. Provides well-informed advice and consultancy on UAR. Identity and implement changes or improvements to UAR processes. Maintain information security records and documentation to provide the level of assurance/governance required by the Westpac Group. Deliver requirements that form part of SOX Group Assurance audits that relate to the UAR process. Both internal and external Investigate, respond to, resolve, and report on security incidents/issues as directed, based on their risk level and advise on and ensure implementation of governance frameworks to ensure that incidents/events are actioned promptly based on their risk level Selection criteria Three years experience, with two years in an Information Security, Information Technology, Risk Management or equivalent role. Exposure to Access Control administration, processes and systems. A good understanding on IAM and in particular UAR best practice, standards and guidelines. Excellent verbal and written communication skills with an ability to achieve results working with all the businesses throughout the Bank. Formal education or certification in Information Security, Information Technology, Risk Management or equivalent discipline is desirable. Security Operations intelligence manager Accountabilities: Monitoring security systems for abnormal behavior. Mitigate and/or contain incidents, working with the suitable internal and external teams. Monitoring vulnerability and intelligence feeds for the latest news and alerts in the security industry. Monitoring the vendor and product landscape to know what products are available and offer advice on their value to the business. Identifying gaps or areas for improvement, where people, process changes or tools can assist. Educating the business on what is good practice, what are the current threats and how to avoid a data breach or security incident Providing specialist security advice to management, project teams, the supply chain and internal stakeholders Improve reporting to the Executive management and the business. Managing a team, mentoring technical staff and provide training. Planning and strategy development. Risk Assessments Vendor Management Presentations to clients and internal stakeholders Selection criteria Experience with Firewalls, WAFs, DLP and IPS. Experience testing and deploying security technologies. Penetration Testing Malware analysis Architecture experience CISSP, SANS and/or OSCP certificates Graduate or Postgraduate degree in IT Mobile and pervasive systems Mobile and pervasive systems is my elective in about Information Security because this very large industry and there is lots of chances to growing up thats why I am interested in this field. Mobiles and pervasive systems are every in the world. One prominent vision is that family gadgets apparatuses, stimulation focuses, telephones, indoor regulators, lights, and so forth will be invested with microchips permitting the gadgets to speak with each other and with the homes occupants. The dishwasher can ask the water radiator whether the water temperature is sufficient; occupants can phone home and remotely train the VCR to record a most loved show; the TV could choose news stories of exceptional enthusiasm to the tenant; the stereo may bring down its volume when the telephone rings; and the garments dryer may make a declaration over a radio framework when it has finished its cycle. An operator based architecture for supporting setting mindful frameworks in savvy spaces (e.g., shrewd meeting rooms, keen homes, and brilliant vehicles). Key to this engineering is a shrewd specialist called setting handle that keeps up a common model of setting for the benefit of a group of operators, administrations, and gadgets in the space and gives security insurances to the clients in the space by implementing the approach decides that they characterize. The utilization of operators permits execution of complex operations that includes a lot of information to be done successfully utilizing dispersed assets. Network planning and configuration is an iterative procedure, incorporating topological plan, arrange combination, and system acknowledgment, and is gone for guaranteeing that another media communications system or administration addresses the issues of the supporter and administrator. User experience design is the way toward upgrading client fulfillment with an item by enhancing the ease of use, availability, and joy gave in the collaboration the item. Analysis of data is a procedure of investigating, purifying, changing, and demonstrating information with the objective of finding helpful data, recommending conclusions, and supporting basic leadership. Information examination has numerous aspects and methodologies, incorporating various strategies under an assortment of names, in various business, science, and sociology areas.

Wednesday, November 13, 2019

Premenstrual Dysphoric Disorder ( PMDD ) Essay -- Biology Essays Resea

Premenstrual Dysphoric Disorder ( PMDD ) Everyone experiences some unhappiness in his or her lifetime whether it is a specific situation or not. It becomes more serious when the cause is a form of "depression." It is a fact that women experience depression about twice as much as men (1). These causes specifically for women can be complex and so are the solutions (3). A common syndrome affecting an estimated 3% to 8% of women in their reproductive years is called Premenstrual Dysphoric Disorder (PMDD) (4). PMDD is specifically known as a mood disorder of severe depression, irritability, and tension with symptoms worsening a week or so before a woman's menstrual period and usually settling out afterwards (5). PMDD can be devastating to all areas of a woman's everyday life, including family relationships, friendships, and the ability to work or go to school (3). Many people still believe that the emotional symptoms caused by PMDD are not real, and that a woman should be able to shake off the symptoms if only she tried hard enough. Because of these inaccurate beliefs, women with this depression either may not recognize that they have a treatable disorder or may be discouraged from seeking or staying on treatment. Often, women's concerns regarding their condition are not taken seriously which leads to feelings of self-doubt, frustration and hopelessness (6). Feeling sad or stressed during a menstrual period doesn't necessarily mean a woman is suffering from PMDD. This is a common assumption made by women who are confused about their emotional state. As a female suffering from PMS monthly, I can admit that PMDD has become questionable in my mind. There have been many times that I have suffered anything from constant tiredne... ...uffering so women can continue to live prosperous and fulfilling lives without the burden of PMDD's awful symptoms. Sources 1) Did you know? Depression, http://www.depression-net.com/dep.html 2) Information and Treatment for Depression, http://www.psychologyinfo.com/depression/index.html 3) Women and Depressive Episodes, http://www.womens-health.com/health_center/mental/depress_pms.html 4) Recognizing the range of mood disorders in Women, http://mentalhelp.net/articles/women.htm 5) Health Advice For Women, http://health.indiahit.com/ 6) Quick Self-Test, http://www.womens-health.com/health_center/mental/depress_pms.html 7) Symptoms and Treatment for PMDD, http://my.webmd.com/content/article/39/1663_52557 8) Premenstrual Dysphoric Disorder, http://serendip.brynmawr.edu/bb/neuro/neuro01/web2/www.dr-bob.org/babble/20010221/msgs/55293.html

Sunday, November 10, 2019

Langston Hughes’s “Theme for English B”

African American Literature can often be characterized by having a dual identity, especially in the early to mid-twentieth century. This dual reality is reflective of the African American’s heritage and present circumstances. With a heritage of forced immigration into the country, and limited rights and racism after slavery is abolished, there is a borderline pride and hatred. It is very possible to have both of these feelings, and authors reveal this confusing notion through the expression of poetry.Yes, the writers are proud of being Americans, but at the same time, are always conscience of the fact that in the land of opportunity, the color of their skin will perhaps always be not only noticed but also will limit them and their children. There are many texts that portray this dual identity of the African American, including Langston Hughes’s â€Å"Theme for English B† and Claude McKay’s â€Å"America†. Through â€Å"Theme for English B† Hu ghes explores his mixed identity: â€Å"So will my page be colored that I write? Being me, it will not be white† (26-27).Before this, he identifies himself as the only black student in his class, which seems to be away from Harlem, and that he resides in Harlem. He spends his time both in the majority black Harlem, but he is learning in a mostly white area, from white professors. He hears both Harlem and New York, and therefore can identify with the black (Harlem) and the larger picture of New York (America). He explains this is part of being American, different and yet working together, if not for the benefit of each other, then for the benefit of the country.He understands that his professor and himself often â€Å"don’t want to be a part† (35) of each other, but neither of them have a choice. I think that it is important to note that Hughes emphasizes his own unwillingness to be a part of the white man This may reflect the forced immigration of slavery, or si mply his own deterrence away from â€Å"whiteness†, even though it is necessary for him to achieve his education. McKay has a much bitterer viewpoint of his America. The poem â€Å"America†, as compared to â€Å"Theme for English B† has a much darker and critical tone of America, beginning with the first line â€Å"Although she feeds me bread of bitterness†(1).Starting off the poem like this immediately creates the feeling of paradox that McKay is trying to convey. Although the speaker is being fed, it is with foul tasting nourishment, not the kind that you would expect in the United States. The paradox is further heightened through the idea of life and death occurring simultaneously: â€Å"Stealing my breath of life, I will confess I love this cultured hell that steals my youth† (3-4). A â€Å"cultured hell† is an interesting phrase to use because it is so unexpected. It highlights the culture of America, perhaps both of black and white cul ture that is creating such a tumultuous environment.But, I doubt that this would be any better than an uncultured hell. It is this country that creates and destroys, loves and hates at the same time. It is in this paradox of impossibilities that unlocks multiple possibilities. It is all of this confusion and acknowledgement of inequality that creates the speaker â€Å"strength against her hate† (6). But this one man going against the country and the culture of hate and appeasement of that hate can hardly make a dent if â€Å"Her bigness sweeps me like a flood† (7).The stand that the speaker is taking against and for the country may not be going anywhere, but the can see a time in the future where â€Å"beneath the touch of Time’s unerring hand, like priceless treasures sinking in the sand† (13-14) America’s current culture would be buried. Although this can be interpreted as the downfall of the country, I see it as the downfall of the current cultu re of America. This is not an anti-America poem, but rather one dedicated to a better one, and towards the construction of a culture that embraces all Americans.

Friday, November 8, 2019

Turgor Pressure and the Important Tree Cell

Turgor Pressure and the Important Tree Cell Turgor pressure, also called turgidity when occurring in trees and most plants are the pressure of cell contents exerted against the plant cell wall including tree leaf and stem cells. A turgid plant cell contains more water and minerals in solution than flaccid (deflated) plant cells and exerts a greater osmotic pressure on its cell membrane and walls. So, turgor is a force exerted outward on a plant cell by the water contained within the sturdy cell wall. Water and its solutions fill up tree cells up to its optimum expansion capability determined by the cell wall. This force consequently gives a succulent plant rigidity and helps non-woody plants to keep erect. Woody-stemmed plants have extra structural support in the form of wood cells and bark. When you actually see a mature woody-stemmed plant like a trees leaf wilt due to low turgor pressure, major damage may have been done and tree health compromised. Extreme turgidity can result in the bursting of a cell but is rare in nature. The tree cell wall is designed to handle pressures beyond the cell membrane. Turgor and Osmosis in Trees Turgor pressure is not the mechanism that rises solutions from roots to leaves. Trying to describe this simply, the process of osmosis creates tree and plant turgidity by the osmotic propensity of moving a heavy water volume of weak solution from the roots toward a low water volume of high solution in the leaves and branches. A solution, in this case, is simply a water mixture of solutes in the leaves being concentrated and high and the water-holding solutes entering the root being diluted and low. In this particular botanical example, water is the solvent with a mixture of dissolved concentrations of various nutritive substances called the solute.   As the trees liquid reaches a static or equal solution mixture from root to crown, turgor pressure becomes optimal and pressure increase stops. The Important Tree Cell Wall and Membrane A trees cell wall is a tough, flexible wicker basket that is rigid but flexible and has the ability to stretch and expand as the cell membrane inside expands. It surrounds the delicate cell membrane and provides these cells with structural support and protection. The cell wall will also act as a filter but the major function of the cell wall is to act as pressure support for the cell and its contents. The trees cellular membrane is a protective and functional cell layer that separates tree cell contents from the outside environment but is permeable to the organic molecules and minerals necessary to support tree life. Osmosis through the cell membrane controls the movement of substances in and out of tree cells. The basic function of the cell membrane is devoted to the protection of the cell contents from outside invasions of foreign materials.

Wednesday, November 6, 2019

f=ma essays

f=ma essays The table below shows the results including average times and calculations of acceleration: Mass Force (N) Distance Speed (m/s) Average Time (S) Acceleration (m/s theoretically) Acceleration (m/s experiment) Firstly, the speed was calculated by dividing the distance by time. The common formula of speed, distance and time was used to work these results out. The distance is constant at 1metre divided by the average time (measured in seconds) equals to the speed written in the units of metres per second. From working out the speed the acceleration can also be worked out. The acceleration of an object is the rate at which its velocity changes. It is the measure of how quickly an object is speeding. With the results of this experiment the acceleration can be calculated by dividing the speed with average time. This should result to acceleration measured in m/s ². Graph 3 shows as the force of the object increases the acceleration also increases depending on the mass of the object. As the mass becomes heavier the acceleration decreases. Speed (m/s) = Distance (m) Acceleration (m/s ²) = Change in speed (m/s) Time taken (s) Time taken (s) Example: Velocity = distance divided time taken Velocity = 1 metre divided 3,16 seconds Acc = change in speed divided time taken Acc = (0.32 metres per sec - 0 miles per sec) divided 3.16 sec = 0.01 metres per second ² (m/s ²) Force (Newtons) = mass (kilograms) X Acceleration (metres per second ²) Example: Acceleration = force divided mass (F=MA) Acceleration = 0.1 Newtons divided 1 kilogram ...

Monday, November 4, 2019

Historians question whether or not social movements such as the civial Essay

Historians question whether or not social movements such as the civial rights and womens rights movements were successful in add - Essay Example The society today paints a picture of a highly prosperous country boasting of a cohesive social structure, one that integrates everyone despite their differences. The American society as it is today is the creation of a number of social movements such as civil rights and women rights group. Such groups of people worked hard to change a number of mindsets that could have otherwise led to either the collapse of the country or the emergence of one of the world’s worst human crisis in the history of humanity (Carl 98). With hard work and sound leadership, the country listened to the plights of the civil rights groups and addressed their issues. These led to serious changes in the American constitution through time and today America owes what it is to the sacrifices of some of the pressure group members who believed in the achievement of an all-inclusive society (Jonathan 71). Europeans took Africans into the United States to work in their plantations. However, soon after the slave ry period, the world became industrialized and for once people never needed many laborers to work in the field. This therefore led to the formation of regional and politics of segregations. The whites never considered the Africans as their equals. The whites discriminated against the African community and made sure they felt unwelcome. The society was segregated, and the Africans not allowed mingling freely with the rest of the population. They therefore never went to school and had no employment; they thus lived in abject poverty. The worst level of this discrimination was on politics and governance, the number of Africans in the country was nearing the number of the whites. Despite this large population, the rest of the Americans denied the African American community a chance to elect their leaders. They never took part in an electoral process and were not allowed to run for any electoral position. For a long time in the history of America, the African American community alongside other marginalized communities lived in abject poverty and in a humiliating environment. By the begining of the nineteenth century, a number of pressure groups sprung up to fight for the rights of the marginalized and the African American community. Led by radical and selfless African American leaders such as Martin Luther King Junior, this creed of Americans believed in equality before the law. They thus called for understanding and peaceful coexistence. They called for the abolishment of the racial segregation that was threatening to tear the country down into two. These struggles would get violent at times and the government would order for the attack on such groups and senseless murder. This drew the attention of the international community. There later followed a number of global human rights watch bodies calling for the restructuring of the American society (Jonathan 55). The African Americans were therefore allowed to vote and be voted into any elective force should they fee l like. Today, the country boasts an African American president. For a long time, this remained a dream that could not even be conceptualized at the time by the pressure groups (Johnson 66). The historical America did not only include a highly segregated population but also contained a male chauvinistic one. The men considered themselves the head of their families and therefore

Friday, November 1, 2019

Solo Project Research Paper Example | Topics and Well Written Essays - 500 words

Solo Project - Research Paper Example Diving into the market environment and making uninformed decisions may result in adverse effect on a business entity. In this regard, every marketing decision made should be based on some reliable information obtained from research exercises. Marketing is the most dynamic aspect of business characterized by rapid changes of operating forces in the field. In this case, research processes should be performed regularly to ensure acquisition of reliable and updated information. Just like any other research project, marketing research adopts the ideal scientific research procedures. These procedures include problem definition, formulation of hypotheses, and adoption of research methodology, data collection, data analysis and finally data interpretation. Conformity to all these steps ensures objectivity and reliability of the research results (Kolb, 2008). In this context, I am required to develop a practical plan on the appropriate steps of conducting a marketing research for setting wine price. Before developing a plan, we will evaluate the nature of the research project conducted by another party within the same pricing concept of marketing. This evaluative process entails appraising the research elements used in formulating the conclusion based on the research hypothesis (Kolb, 2008). The question of the research might be structured as follows; Does price level influences wine sales? Based on this question, a research will be conducted by formulating the appropriate hypotheses that provides some prepositions concerning the effect of price on the sales of wine. The null hypothesis that will be rejected in the research article states that the taste of wine determines its sales in the market. The actual hypothesis to be approved upon completion of the research states that the public perceives that higher priced wine are of higher quality than low priced wine. Based on the research article, the hypotheses contain two