Monday, May 25, 2020

Chemical Change Examples in Chemistry

Chemical changes involve chemical reactions and the creation of new products. Typically, a chemical change is irreversible. In contrast, physical changes do not form new products and are reversible. Some Common Chemical Changes The rusting of ironCombustion (burning) of woodThe metabolism of food in the bodyMixing an acid and a base, such as hydrochloric acid (HCl) and sodium hydroxide (NaOH)Cooking an eggDigesting sugar with the amylase in salivaMixing baking soda and vinegar to produce carbon dioxide gasBaking a cakeElectroplating a metalUsing a chemical batteryThe explosion of fireworksRotting bananasGrilling a hamburgerMilk going sour Less-familiar chemical reactions are also examples of chemical changes. While its not always easy to tell a chemical change has occurred (as opposed to a physical change), there are some telltale signs. Chemical changes may cause a substance to change color, change temperature, produce bubbles, or (in liquids) produce a precipitate. Chemical changes can also be considered to be any phenomenon that allows a scientist to measure  chemical properties.

Thursday, May 14, 2020

The Bachelor the Bachelorette Can’t Buy Me Love Essay

The Bachelor the Bachelorette: Can’t Buy Me Love? Do you know the guiltiest pleasure of the American public? Two simple words reveal all—reality TV. This new segment of the TV industry began with pioneering shows like MTV’s The Real World and CBS’s Survivor. Switch on primetime television nowadays, and you will become bombarded by and addicted to numerous shows all based on â€Å"real† life. There are the heartwarming tales of childbirth on TLC, melodramas of second-rate celebrities on Celebrity Mole, and a look into a completely dysfunctional family on The Osbornes. Yet, out of all these entertaining reality shows arises the newest low for popular culture, a program based on the idea of a rich man or woman in search of†¦show more content†¦The Bachelorette, created in order to be politically correct in my opinion, is the same show in reverse—twenty-five young dashing men after one single, attractive and rich woman. Addressing these shows with an eye bent to cultural analy sis, the messages and constructed social meanings depicted are decidedly derived from a capitalist society. Therefore, the Marxist base-superstructure model must be consulted, and the capitalist ideology behind The Bachelor explained. Karl Marx’s theory basically states that the base determines the superstructure’s content. Upon relating that idea to mass media or more specifically TV as the superstructure, the base can be defined as capitalist corporations consisting of writers, producers, editors and directors who all support capitalist ideology. As a result, the American audience sees what capitalists believe should be America’s dominant ideology. The primary message that The Bachelor sends is that money can bring a lasting happiness and a loving marriage. There are also the inferred ideas that people should value a person’s youth and attractiveness above personality and intellect, and that a meaningful relationship can be formed into a marriage proposal in just a few months. For many skeptical and educated viewers, it is hard to see the re ality or truths in these shows. So this is when

Wednesday, May 6, 2020

Network Security And Management Policy - 3822 Words

Abstract The purpose of this paper is to discuss the security and vulnerabilities dealing with network security and management policy in information technology to maintain the integrity, confidentiality, and availability of a system or network, its information, resources, and its immediate infrastructure. The topics are the overview of Web services, social engineering, system components, architecture, protocols, future security trends, security vulnerabilities programs, the evolution of network security, internet vulnerabilities, online security and the protection of civil rights, practical attacks on mobile cellular networks and possible countermeasures, analysis of network security policy-based management, the risks and threats that†¦show more content†¦The conclusions will draw forth all the findings and results that were found during the research of this paper. Threats Vulnerabilities The security threats and vulnerabilities in information security are weaknesses that expose people and companies to risks that are either acceptable or mitigated. The key to understanding vulnerabilities is the first step of mitigating or accepting them. Risk revolves around and is caused by business disruption, financial loss, damage to reputation, loss of privacy, loss of life, loss of confidence, legal penalties, and impairs business growth. The concerns about security are a major deterrent to companies considering the use of technology (Kearney, Chapman, Edwards, Gifford, He, 2004). The security threats are caused by angry or disgruntled employees, dishonest employees, criminals, governments, terrorists, the News and press, competitors of other businesses, hackers, crackers, and natural disasters or unforeseen events that may occur. The vulnerabilities are the areas that have yet to be found, updated, or patched. The vulnerabilities are caused by software bugs, broken processes, ineffective controls, hardware flaws, business changes, old or legacy systems, inadequate business continuity plan, and of-course human error. An employee can fall under two categories and they are current and former. Current employees cover a lot of the normal business process of day

Tuesday, May 5, 2020

Performance Modeling and Design of Computer†

Question: Discuss about the Performance Modeling and Design of Computer Systems. Answer: Introduction: Green computing is the environmentally responsible as well as eco-friendly use of the computers and their resources. According to some scholars, they regard it as where the organization adopt a policy in order to ensure that the setup as well as operations of the information technology can produce the minimal carbon footprint (Harchol-Balter, 2013). The key issues are the energy efficiency in the computing as well as promoting environmentally friendly computer technology. It is all about the practice of designing, manufacturing, using as well as disposing the computers, servers and their associated subsystems. Greening your computing equipment is essentially a low risk way for the business is to help the environment but also reduce on the costs. This is one of the growing trends in the business today. This has been achieved through making of the proper decision in order to go green in the workplace such as in the offices, to improve on the net profit of the business as well as reduce on the carbon footprint (Harchol-Balter, 2013). Moreover, this also refers to reducing on the energy usage, which in turn reduces the carbon dioxide emissions and the energy bill, which is an effective thing to do in an organization. The term green computing was essentially coined after the energy star program back in 1992. One of the initial result of the green computing was the sleep mode function of the computer monitors. As the concept was developing, the green computing had begun to encompass on the thin solutions for the clients, energy costs, and the virtualization practices (Levy, 2014). There are numb er of reason to go green these are: savings, green computing can lead to serious saving of the costs overtime especially when it comes to reduction in the energy costs from the servers, cooling as well as lighting (Lee, Subramanian, Ausavarungnirun, Choi Mutlu, 2015). Secondly, reliability of the power; as the demand for the energy increases over the world, the supply of energy declines. The energy systems that are efficient helps to ensure there is healthy power system. The von Neumann architecture, which is the basis for most digital computers today, suffers from the von Neumann bottleneck. Explain The Von Neumann bottleneck has been regarded as the idea that the computer system throughput has been limited due to the relative ability of the processors as compared to the top rates of the data transfer. This bottleneck looks at how to serve a faster CPU through allowing a faster memory access (Null Lobur, 2014). The computer essentially stores programming instructions, along with the actual data. The von Neumann architecture usually stores both the program code and the data in the memory. There is essentially a single path, which is between the main memory and the CPU, which forces instruction fetch cycle and the execution cycles to be able to share this pathway. Java is called an interpreted language, yet Java is a compiled language that produces a binary output stream. Explain how this language can be both compiled and interpreted. The java source code is initially complied into a standard, a platform that is the independent bytecode file. This file is then interpreted at the runtime by a means of machine specific interpreter, which is the java virtual machine (Jain, 2015). The java source code is turned into the binary instructions, much like the ordinary microprocessor machine code. The java runtime interpreter usually executes the compiled java bytecode. The runtime usually performs all normal activities of the hardware processor (Null Lobur, 2014). It usually executes the stack-based instruction set and manages on the memory just as the operating system. Why should assembly language be avoided for general application development? Under what circumstances would you argue in favour of using assembly language code for developing an application program? The assembly programming is usually very difficult to program and understand and more time consuming especially to debug than the higher-level languages. The assembly language programs are also harder when it comes to maintain, since there are more statements for any given amount of the functionality than it is for the equivalent high-level language program (Jain, 2015). When the execution time or perhaps the space are imperative issues, the portions of the code could be rewritten in the assembly language despite many compilers today they do a good job for optimizing on the object code. There are usually small chunks for the codes, which are run many times, and this should be optimized in order to prevent them from becoming bottlenecks. Between ten to twenty percent of the code requires more than eighty percent of the execution time. It is thus this code segment, which should be investigated. In regards to space, in case the programmer is experienced in the assembly language they sho uld cut out everything, which should not be in the code that result to less code (Null Lobur, 2014). Lastly, it could be that HLL one could be using may not access the operations of the machine or perhaps the device in the manner, which is required. In such a situation, the use of assembly language could be very important. Explain how DMA (Direct Memory Access) is different from other ways of I/O controlling mechanisms. The DMA is different from other ways of controlling mechanism since it is efficient in moving large amount of data between the I/O devices and the main memory (Opitz, Krup Kolbe, 2014). It has the capability of instructing the devices controller in order to move the data between the devices as well as the main memory. The DMA controller offers some few options for transferring the data as compared to the other controller mechanism. These features enable the data to be transferred between the system memory and the peripheral devices, such as the burst transfer as well as the cycle stealing. The burst transfer mode is the fastest way for the transfer memory (Opitz, Krup Kolbe, 2014). The controller in the DMA assumes both the source and the destination memory address port could transfer as well as accept the information as much quick as possible since the DMA controller can be able to produce them. The cycle stealing mode transfer the data one byte at a time. When the DMA controller after transfer of the data one byte after another releases the control of the system buses by sending of the grant signal to the control bus (Voelter, Deursen, Kolb Eberle, 2015). Moreover, in the DMA transfer, it is the CPU, which initiates the transfer and do all the other operation while the transfer is in progress, and it can be able to receive an interrupt from the DMA controller once the operation has finished unlike the other controlling mechanisms. References Harchol-Balter, M. (2013). Performance modeling and design of computer systems: queueing theory in action. Cambridge University Press. Jain, R. K. (2015). Art of Computer Systems Performance Analysis: Techniques for Experimental Design Measurements... Simulation and Modeling. John Wiley. Lee, D., Subramanian, L., Ausavarungnirun, R., Choi, J., Mutlu, O. (2015, October). Decoupled Direct Memory Access: Isolating CPU and IO Traffic by Leveraging a Dual- Data-Port DRAM. In Parallel Architecture and Compilation (PACT), 2015 International Conference on (pp. 174-187). IEEE. Levy, H. M. (2014). Capability-based computer systems. Digital Press. Madukkarumukumana, R., James, A. S. I., Schoinas, I., Uhlig, R. (2014). U.S. Patent No .8,706,942. Washington, DC: U.S. Patent and Trademark Office. Null, L., Lobur, J. (2014). The essentials of computer organization and architecture. Jones Bartlett Publishers. Opitz, N., Krup, H., Kolbe, L. M. (2014, January). Green Business Process Management--A Definition and Research Framework. In System Sciences (HICSS), 2014 47th Hawaii International Conference on (pp. 3808-3817). IEEE. Voelter, M., Deursen, A. V., Kolb, B., Eberle, S. (2015). Using c language extensions for developing embedded software: A case study (Vol. 50, No. 10, pp. 655-674). ACM.

Tuesday, March 10, 2020

The King is Dead. Long Live the King!

The King is Dead. Long Live the King! The King is Dead. Long Live the King! The King is Dead. Long Live the King! By Maeve Maddox A reader is puzzled by an expression: This is regarding the proverb The *Something* is Dead. Long Live *Something*. Ive seen it being used in various contexts where *Something* is replaced by wordssuch as Internet, Article etc. Could you please elaborate on it, as I have been unable to find any reference to it. The reader is not a native English speaker, but there may be native speakers who use the expression without being aware of its origin. The expression derives from the announcement that follows the death of a monarch. My first encounter with it came when I read Twain’s The Prince and the Pauper: The King is dead. Long live the King! The first King refers to the deceased ruler; the second King refers to his successor. When King George VI of England died in 1952, the announcement was: The King is dead. Long live the Queen! The expression has been adapted by headline writers to convey the idea that something old has been replaced by something new. Here are two examples from the Web: The ATM is Dead. Long Live the ATM! The article that follows is about the decline in the use of cash that is making the old type of ATM obsolete. It describes new functions being added to ATMs to enable them to provide services other than cash delivery. The Euro is Dead – Long Live the Swissy The article that follows reports the fact that the Swiss government has freed their national currency to rise in value above the euro. Swissy refers to the Swiss franc. When used in contexts other than the passing of a monarch, the â€Å"Long Live† expression means that something has been updated or replaced. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:How to Punctuate References to Dates and TimesOne Sheep, Two Sheep, One Fish, Two Fish . . .Comma After Introductory Phrases

Saturday, February 22, 2020

The Structure and Business of Blackstone Essay Example | Topics and Well Written Essays - 4000 words

The Structure and Business of Blackstone - Essay Example It's a veritable feast for the discerning investor's eyes: 37% compound annual revenue growth, 65% operating margins, $3 million in profit per employee, returns on invested capital in the triple digits. And a cherry on top: the Blackstone Group is arguably the uber-buyout firm. Led by billionaire cofounders Steven Schwarzman and Peter Peterson, Blackstone has gone from relative obscurity to global renown in the span of roughly two decades, parlaying a penchant for deal making and a yen for competition into a war chest that now brims with billions of dollars in investment capital. Blackstone Capital has extensive expertise in structuring transactions under Regulation D, SCOR, Rule 144A, Reg. A, Reg. S, and other public or private direct offerings, as well as commercial lending, mezzanine financing, commercial paper, and subordinated debt transactions. Their structures provide an exit strategy for investors with short or long-term holding periods. Basically what Blackstone does is delivers to its client’s necessary capital, for less cost, more efficiently, and strategically structured. It operates from a style, which avails itself of the richness of a variety of investment philosophies and techniques that will ultimately provide superior returns while exposing a particular partnership to lesser risk. It is here, that Blackstone prides itself in creating the innovative financial solutions for its clients. Their primary objective is to maximize value for their clients. Blackstone’s business is organized into four segments: 1) corporate private equity, which focuses on management of the Company’s private equity funds; 2) real estate, which is responsible for management of Blackstone’s various real estate investment funds; 3) â€Å"marketable alternative asset management,† which involves management of Blackstone’s various hedge funds, mezzanine funds, and other â€Å"alternative† in vestment vehicles; and 4) The financial advisory group, which comprises the Company’s advisory services business that provides, for example, merger and acquisition analysis and services to other companies. These various funds are generally structured as limited partnerships that are capitalised by limited-partner investors (such as institutional investors and pension funds) and managed by Blackstone, which, through subsidiary holding partnerships, serves as general partner. Blackstone therefore does not own directly either the various portfolio companies in which it’s corporate private equity funds invest or the real estate assets owned by its real estate funds. Rather, Blackstone derives revenue from two principal sources: It earns a â€Å"management fee† equal to 1.5% of the value of the assets under management; It earns a â€Å"performance fee† or â€Å"carried interest† equal to 20% of the profits generated on the capital it invests for limited partners. Blackstone is subject, however, to having its performance fees â€Å"clawed back.† That is, the Company is obligated to return performance fees to investors if investments perform poorly. In contrast to those who invest in Blackstone’s various funds, investors in Blackstone itself acquire a stake in Blackstone’s investment management business, hoping that strong performance by the various investment funds will generate performance fees for the Company. 4.2 Southern Cross Healthcare Southern Cross He