Sunday, May 24, 2020

Nuclear Weapons And The Atomic Bomb - 1432 Words

â€Å"If the Third World War is fought with nuclear weapons, the fourth will be fought with bows and arrows† Lord Mountbatten. This quotes, by a famous British Naval Officer, summarizes the threats nuclear weapons present to the entire world. With the development of the atomic bomb during the Second World War, a new war was started: the Cold War. The ideology behind this war continues on to this day and has led to many treaties and other attempts to stop the production and potential use of nuclear weapons. Nuclear weapons are a scientifically impressive feat; however, they present a difficult situation in terms of the global political system. The first ever nuclear test occurred on July 16, 1945 in Trinity, New Mexico (ICAN, n.d.). This†¦show more content†¦Critical mass is the smallest mass required for chain reaction fission to take place. The implosion type design requires a specialized, sophisticated arrangement of explosives to fire simultaneously from all direction to the pit, or center of the weapon, in this case plutonium (CTBTO, n.d.). However, these designs are not used by modern countries, who instead use thermonuclear weapons of 1,000X the strength in tons. A typical fission weapon has a blast of about 20 kilotons (20,000 tons of TNT), whereas thermonuclear weapons can have a yield up to 50 megatons (Nuclear Weapon Archive, 2007). The first thermonuclear weapons date back to the 1950s. The reason thermonuclear weapons have such a larger yield is due to their 2 part design. The primary part is based off of fission. Plutonium-239 is used in an implosion type fission weapon to start the fusion re action at the center of the plutonium (which is filled with hydrogen gas). The fission part of the weapon then serves to start the fusion part of the bomb. By igniting the spark plug of either plutonium or uranium, surrounding the lithium deuteride (a Lithium Hydride with a deuterium hydrogen), the metal undergoes fission, creating enough heat for fusion to occur in the deuterium (Nelson and Gronlund, 2009). There are numerous different types of thermonuclear weapons, such as the two

Wednesday, May 13, 2020

Ischemic Stroke Rates in Ireland - 678 Words

In Ireland there is a very high incidence of stroke with around 10,000 people a year having a stroke. Approximately 2,000 people die each year as a result and approximately 30,000 people within the Irish community are suffering with a disability as a result of stroke. (Irish Heart Foundation, 2011) This essay will discuss the topic of stroke, outlining the pathology of the disorder and discussing the recovery process. There are two major categories which stroke is divided into: Ischemic, which is the cause of 85% of strokes and Haemorrhagic, which causes 15%. In ischemic stroke, vascular occlusion and hypoperfusion occur, while in haemorrhagic stroke there is extravasation of blood into the brain or subarachnoid space. (Hinkle and Guanci, 2007). There are some similarities between the two, however differences exist in aetiology, pathophysiology and medical and surgical management. The causes and effects of each of the categories of stroke will be discussed and compared and the treatm ent and process of recovery will be described. An ischemic stroke is caused by the disruption of the supply of blood to part of the brain. Blood travels to the brain through arteries from the heart. In the case where an artery which supplies blood to the brain becomes narrowed or obstructed due to disease or other causes, blood flow to areas of the brain can become reduced. This reduces the supply of oxygen and glucose to the cells of the brain. According to Hickey (2003), 45% of ischemicShow MoreRelatedWith The Recent Shift In Our Country’S Political Climate1492 Words   |  6 Pagesfour major lifestyle behaviors, according to independent studies conducted by British scientists Janas Harrington and Phyo Myint. Myint’s longitudinal study aimed â€Å"to quantify the potential combined impact of four health behaviours on incidence of stroke in men and women living in the general community† (Myint, 2009). Subjects were categorized based on how many of the healthy lifestyle behaviors they participated in (or abstained from). The lifestyle behaviors are as follows: current non-smokingRead MorePatients Suffering From Acute Myocardial Infarction2550 Words   |  11 Pageswomen suffer heart attacks (62,000 men and 39,000 women) annually. This is juxtaposed with Scotland where 8,000 men and 5,000 women become heart attack patients annually. The gross figure for the UK yearly, when including Wales and Northern Ireland on a comparable rate to the UK is approximately 124,000 patients per year (British Heart Foundation 2010). For many years, pre-hospital primary intervention for this condition included high flow oxygen, as a matter of course based on anecdotal evidence andRead MoreHsc Level 5 Unit 534 Essay14626 Words   |  59 Pagesshows no obvious signs, whereas some cause significant functional impairments.A stroke occurs when the blood supply to part of the brain is suddenly interrupted or when a blood vessel in the brain bursts, spilling blood into the spaces surrounding brain cells. Brain cells die when they no longer receive oxygen and nutrients from the blood or there is sudden bleeding into or around the brain. The symptoms of a stroke include sudden numbness or weakness, especially on one side of the body; sudden confusionRead MoreNatural Dyes11205 Words   |  45 Pagesyellows, reds, browns, and bright pinks and purples. The lichen Rocella tinctoria was found along the Mediterranean Sea and was used by the ancient Phoenicians. In recent times, lichen dyes have been an important part of the d ye traditions of Wales, Ireland, Scotland, and among native peoples of the southwest and Intermontane Plateaus of the United States.[37] Scottish lichen dyes include cudbear (also called archil in England and litmus in Holland), and crottle.[45] [edit] Fungi Miriam C. Rice, (1918—2010)

Wednesday, May 6, 2020

Samsung Electronics Strategic Analysis Free Essays

The strategy of Samsung Samsung’s strtegy has many admirable things to learn . One of the point to make the success of Samsung is its managers interested in long-term growth rather than short-term profit. . We will write a custom essay sample on Samsung Electronics Strategic Analysis or any similar topic only for you Order Now Strategic thinking of the Samsung Group is focused on developing target market and making a huge bet on them. That ‘s the reason we don’t mention the short-term stratgy of Samsung bacause it isn’t the main point of Samsung;strategy and we can learn just a little thing from it. Come back to the long-term strategy of Samsung, we can devide it to 2 periods. Before the lawsuit with Apple Unlike other Android phone makers, Samsung chose a very different way which is competing head-to-head with Apple in the high-end smartphone segment, by creating products that have a similar design to the iPhone but do not forget to â€Å"put effort† for the low-range smartphone in order to control market share and create great motivation for the Galaxy’s brand name. While its competitors like Apple concentrated on creating new innovative products, Samsung waited their competitors test the market and then they determine the most suitable time to break into. It created the similar smartphones with those of other companies but better, faster and cheaper. When taking part in , Samsung will dominate the market with a series of models with various improvements that competitors can not keep up . This strategy has an interesting name in Vietnam :â€Å"di t? t, don d? u†. With this strategy, Samsung has many advantages when it has known the strengths or the wickness points to make the success and failure of its competitors. So it can decrese the risk when taking part in the market. After the lawsuit with Apple After having created a buzz in the market, Samsung started to follow their own direction that the Galaxy S III is the most typical example. No one can complain about the copyrihts when they compared the Galaxy S III to the iPhone 4S or iPhone 5. With products like the Galaxy S III or Galaxy Note, no one dared to say that Samsung copies competitors, they just rely on its opponents to make innovative products. How to cite Samsung Electronics Strategic Analysis, Essay examples

Monday, May 4, 2020

Networking Technology for Privacy and Freedom- MyAssignmenthelp

Question: Discuss about theNetworking Technologyfor Privacy and Freedom. Answer: Introduction Ethics is a discipline that governs how people conduct themselves in their occupation fields. Hence ethics for a network technology student is a set of moral principles that governs the use of network technology by the student.With the rise of technology use in classrooms, student should be conscious of ethical issues that come forth with the use of technology. Important Ethical Issues The most important and widely felt ethical issues include academic honesty by the students especially during educational research. Another one is the use of different networking communication channels when using schools computers systems which are shared by so many students and other school staffs. Cyber bullying is also a very dangerous technology issue that can ruin a life of a networking student. Student confidentiality is another important ethical issue that every student should consider. These ethical issues that every student should consider are discussed below. Analysis and Evaluation of Ethical Issues The following discuss some of the important ethical issues a networking technology student should be aware of. Plagiarism With the advanced used of technology in classrooms, access to online research materials has been made easier. This in turn has increased the high rates of plagiarism. This on other hand has been affected integrity of academic work institutions. Plagiarism is an unethical behavior that has risen due to use of networking technology in learning institutions. This has made it easier for students to fabricate research and fake information sources in their academic lives (Mattison, 2017). They just query the such engines and whatever result they get they hit copy and paste button without considering the authors contribution to that work they are copying. But for an ethical student, one will read other peoples work online, gather enough knowledge and form their own reports based on the research materials accessed online by acknowledging the authors Personal Security Every ethical student should conduct proper communication especially when using school computers or network. This will ensure students safety and privacy. Students should ensure that their emails and text messages are not exposed by using public communication devices within their institutions. They should ensure that they conduct their communication properly with other students or teachers. If not carefully monitored the use of network technology might expose the students communications to the public. An ethical student would put a boundary on how to communicate with other people within the institutions via the networking technology. Cyber Bullying This is the use of the internet to harm others by threatening and/or humiliating them. It can occur directly or by proxy, i.e using somebody else to harm others (Headlee, 2012). Students should not use networking technology to harm others (Mattison, Ethical Issues with Using Technology in Classroom, January 2017). Students should conduct themselves with proper netiquette and look around the networking sites before saying things that could harm others. Bullying has typically been found between students in the classroom, outside of the classrooms, and in many forms of social media forums. A technology student should use networking technology to promote sanity and not to expose other peoples details online by tarnishing their names or their reputations. Access Rights Ethical networking technology students should respect the site access policies outlined by a given institution. Accessing unauthorized sites via the internet might expose the institution to malicious attacks associated with some sites. Also unauthorized access of public sites violates the rules of an institution and is termed as unethical computer networking use. Technology can a highly affect the well-being of the students. Therefore, when using networking technologies, students should ensure that they remain within the authorized sites by the institution meant for study and research. For instance, (L, 2003) mentions an incident where computer students used the school computers to access X-rated materials and ended up broadcasting it to the entire school through the school network. This results to unethical behavior that students should not possess. Confidentiality / Privacy Networking Technology enables data exchange of information on a large scale from anybody, on any locations or parts of the world, at any times. In this situation, there is increased potential for disclosing information and violating the privacy of any individuals and groups of people due to its widespread sharing via network. It is therefore the networking technology students responsibility to maintain the privacy and integrity of data regarding others. This also includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. Student confidentiality is very important but it can be ruined easily using network technology. Students should use networking technology with caution when utilizing online forums, social media and other online applications. For example, the US education department found out that schools are collecting more information concerning students online. This is as a res ult of students sharing almost every part of their lives online by posting on social media platforms. This makes them more vulnerable to cyber bully as well as exposing their lives which ought to be private to the whole world. An ethical student should ensure that every information they share over the internet is safe and does not compromise their confidentiality. An ethical student should be well informed that the internet never forgets and every action they take when using the network technology leaves a trail of information that could be recorded and stored for future use. Students should not share their information with insecure sites. They should be able to find out who is in control of the information they share and what is to be done with it before sharing it on the online platforms (A, 1967). Justification of Ethical Issues Plagiarism According to (Lessig, 1999) a legal theorist, he said that due to the rise of networking technology in schools and world at large, people have more access to information stored online without the necessity of seeking authorization from the owners of the information and therefore a greater increase in plagiarism and fake ownership of others peoples contents. This therefore has highly questioned the credibility of students academic work as opposed to when networking technology was not so rapid in learning institutions. Confidentiality/Privacy (BRITZ, 1996) argued that, although networking technology has affected the lives of many positively in disseminating of information fast than before, it has also made it easier for people to access other peoples private information. Thus the student should be aware that the use of networking technology cannot be ethically neutral. Access Authorizations/Rights (Lou Berzai, 2012) explains the effects of unauthorized access by the students using the networking technology. He states that students should not use networking technology to access sites or prohibited information as this is unethical and it exposes the institutions information to malicious attacks. Thus in order to uphold ethic in using technology, students should adhere to the set access policy. To curb all these ethical issues related to network technology, (Rinaldi, 1999) stated that students should not use the computer network to harm others, neither interfere with other peoples work. Also acknowledging other peoples intellectual work among others. Conclusion In conclusion it is appropriate to say that there are many ethical concerns in the use of networking technology that every user should understand. Networking Technology in institutions can either promote integrity of the society or compromise it. Students therefore should share knowledge amongst themselves and consult more online educative sites that will help them in research activities as well as build ethical internet users. With such students in existence the unethical issues related to the use of technology will be highly reduced and be manageable hence raising the standards and bring out the positive side of the network technology to learning institutions (Warschaver, 2003). Students need to exercise proper online etiquette and behavior when interacting online with teachers or other students. References A, W. (1967). Privacy and freedom. New York. BRITZ, J. J. (1996). Ethical Challenges to the Information Profession. TECHNOLOGY AS A THREAT TO PRIVACY. Headlee, K. S. (2012). CYBERBULLYING . What is cyber bullying, exactly? L, S. (2003). Tools for teaching cyber ethics. Education World. Lessig, L. (1999). Code and Other Values of Cyberspace. New York: Basic Books. Lou Berzai. (2012). Ethical Problems in Computing. Mattison, L. (2017). Ethical Issues with Using Technology in the Classroom. technology in the classroom, 1. Mattison, L. (January 2017). Ethical Issues with Using Technology in Classroom. Technology in the classroom, 1-4. Rinaldi, A. (1999). 10 Comandments for Computer Network Users. Ten Commandments of Computer Ethics. Shea, V. (August 2010). Danger Online! Educating Kids and Parents About Internet Safety. Education World, 1-4. Warschaver, M. (2003). Technology and social inclusion. Rethinking the digital divide. Cambridge : MIT Press.