Wednesday, November 27, 2019

Predicting Formulas of Ionic Compounds Example Problem

Predicting Formulas of Ionic Compounds Example Problem This problem demonstrates how to predict the molecular formulas of ionic compounds. Problem Predict the formulas of the ionic compounds formed by the following elements: lithium and oxygen (Li and O)nickel and sulfur (Ni and S)bismuth and fluorine (Bi and F)magnesium and chlorine (Mg and Cl) Solution First, look at the locations of the elements on the periodic table. Atoms in the same column as each other (group) tend to exhibit similar characteristics, including the number of electrons the elements would need to gain or lose to resemble the nearest noble gas atom. To determine common ionic compounds formed by elements, keep the following in mind: Group I ions (alkali metals) have 1 charges.Group 2 ions (alkaline earth metals) have 2 charges.Group 6 ions (nonmetals) have -2 charges.Group 7 ions (halides) have -1 charges.There is no simple way to predict the charges of the transition metals. Look at a table listing charges (valences) for possible values. For introductory and general chemistry courses, the 1, 2, and 3 charges are most often used. When you write the formula for an ionic compound, remember that the positive ion is always listed first. Write down the information you have for the usual charges of the atoms and balance them to answer the problem. Lithium has a 1 charge and oxygen has a -2 charge, therefore2 Li ions are required to balance 1 O2- ion.Nickel  has a charge of 2 and sulfur has a -2 charge, therefore1 Ni 2 ion is required to balance 1 S2- ion.Bismuth has a 3 charge and Fluorine has a -1 charge, therefore1 Bi3 ion is required to balance 3 F- ions.Magnesium has a 2 charge and chlorine has a -1 charge, therefore1 Mg2 ion is required to balance 2 Cl- ions. Answer Li2ONiSBiF3MgCl2 The charges listed above for atoms within groups are the common charges, but you should be aware that the elements sometimes take on different charges. See the table of the valences of the elements for a list of the charges that the elements have been known to assume.

Saturday, November 23, 2019

Self-Publishing a Family Memoir

Self-Publishing a Family Memoir Self-Publishing a Family Memoir Having previously published many children's books, Malaika Rose Stanley is no stranger to publishing. Yet with Loose Connections, she attempted something completely different from her usual style of writing. Read on to know what it was like for her to  self-publish her book and go on a familiar yet new adventure.Loose Connections is my first independently published book, my first book for adults and my first non-fiction book. But I have a history of writing traditionally published books for children dating back to 1996. I had to look back and check - and I’ve completely shocked myself with the realization that I’ve been involved in this writing and publishing malarkey for twenty years!‘Write what you know’ is a well-worn authorial snippet of advice, a clichà ©. At times, I’ve taken heed but at others, I’ve totally ignored it. My motivation for Loose Connections and for all my books has been to write what I love, to write what stirs my soul ; I don't plan them so much as channel what flows through me.My sons were born in the 1980s and I started writing children’s books when I realized that the lack of diversity in children’s and young adult books had persisted from my childhood to theirs – and I wanted to do something about it. I started to write Loose Connections because I wanted to tell another invisible story - of my mother’s incarceration in a mental hospital as an unmarried mother of a mixed-race child, and of what came before and after. At first, I tried to write the story as fiction; I tried to write it without including myself so the transition to ‘creative non-fiction’ and ‘family memoir’ was a lengthy process. I have files buried on my hard-drive that are at least ten years old.Why I chose self-publishingI decided to go down the route of self-publishing partly because I am familiar with and realistic about the barriers into traditional publishing for peop le like me. I’m not a bright, young thing with a literature degree from Oxbridge or a creative writing master’s degree from East Anglia or City East, at the beginning of my writing career.I’m not seen as ‘commercially viable’ or ‘marketable’ with a blog with thousands of followers, a huge social networking platform or a reality TV fan-base. I’m more likely to be perceived as a grizzled old cynic, with a chip on my shoulder and an axe to grind.It’s not true, of course - I’m actually rather delightful, with a story to tell! Loose Connections was published at the beginning of June - and my first Amazon review says it’s a ‘†¦wonderfully moving book†¦ really well written, clear and simple but heartbreaking too.’ Also true! I decided to self-publish even though I didn't have a huge social networking platform or fan-base. The Reedsy experienceThe Reedsy marketplace was a revelation. Although there is an option to ‘shortlist’ up to five professionals, I quickly narrowed down my choice to two editors and sent them a request for a quote for a structural edit together with a synopsis and the first chapter of my book. They both responded very quickly and it was clear that they were highly skilled and experienced. I thought either would be able to do a good job so my final choice came down to cost, although I definitely struck gold with Gillian Holmes. She did a first read-through, followed up with a phone call about possibly libelous content and my overall intentions for the book, a few minor copy editing corrections and queries about continuity, proposed cuts and a couple of gaps, in tracked changes – and then a detailed restructuring proposal. Wow! Her recommendations were straightforward and simple but I clearly hadn’t been able to see the wood for the trees – excuse th e continuing lumberjack analogies – and her suggestions were spot on!How to Write a Memoir: Breathe Life into Your Story in 8 Steps Read post What were, for me, the unforeseen advantages of self-publishing have been huge: creative control of my own work, choosing my own editor and designer and yes, compared to traditional publishing, which can take months – or years – even the speed of the process from word doc manuscript to e-book download and beautifully typeset, beautifully packaged paperback book! I would definitely recommend Reedsy and the self-publishing option to any new and aspiring authors and to grizzled old cynics alike. Two months ago, I swore blind I would never do it again, but now I’m already planning my next project, an anthology.Loose Connections  is available on both  Amazon US and Amazon UK, get your copy now!Ever thought of writing a family memoir? Would you self-publish it like Malaika did? Leave your  thoughts and experiences, or any questions for Malaika, in the comments below.

Thursday, November 21, 2019

IS Project Implementation Plan Research Paper Example | Topics and Well Written Essays - 1500 words

IS Project Implementation Plan - Research Paper Example In citing an example of virtual organization, the case of an engineering company, John Brown Engineers and Construction concern comes into question. The company fulfills the globalization attribute of a virtual organization in operating through a network of 30 countries having a total employee base of around 21,000 people. Moreover, the company operates based on its own privately designed information systems linking the different offices of the concern. Through such developed and interlinked information technology network the employees of the company can effectively retrieve, share and implement information gained from large databases stored in the system. Thus, the people with information technology can effectively use the large pool of technological and other knowledge resources that would be required for the proper functioning of the organization. Moreover, the management of the company through the existence of information technology sources has also taken resort of developing a v ideo conferencing facility through which the directors and managers sitting at head office can learn the activities pursued in different units round the globe. Again, such use of technology also helps the management to get effective feedback from the employees in regards to operation and customers and thereby can design strategies differently to enhance business competitiveness (Igbaria and Tan, 1998, p.48). The business managers at John Brown Engineers and Construction concern worked to enhance and implement specific business strategies focused on globalization in the light of the information technology resources and opportunities gained. The Chief Executive Officer of the company identified the need for strategic alliances both within the internal and external policy framework to gain a competitive business position in the climate of globalization. Thus to gain the opportunity of strategic alliances the

Tuesday, November 19, 2019

Virtual Machine Essay Example | Topics and Well Written Essays - 1500 words

Virtual Machine - Essay Example Virtual machine is a collection of software like JVM (java virtual m/c) that provides run time environment (e.g. data structure support) to user applications. Such software is now referred with the terms virtualization that is running two or more copies of the same operating system or two or more different operating systems and virtual servers. The host software, which provides this capability, is often referred to as a virtual machine monitor or hypervisor. It resides between the hardware and the "guest" operating systems. There are four major conceptual models of Virtual Machines used today and cater for different problem The IBM Model as demonstrated in the IBM S/390 solved the need for a single computer system that could simulate multiple computers with different operating systems. instruction set and maps JVM calls to operating system calls. It simulates a fake CPU that interprets the fake CPU instructions (what is usually referred to as byte code). The most significant feature of the Java Virtual Machine the ability write a program once and execute it with Java Virtual Machines on multiple platforms. The OSI Virtual Machine and the Unix Virtual Machine, represented by the Unix user shell are used to create operating systems and providing services and functions at the operating system level that did not exist in the system hardware. The OSI Virtual Machine model solved the problem of providing services and functions at ... The OSI Virtual Machine model solved the problem of providing services and functions at the operating system level that did not exist in the system hardware. The Unix Virtual Machine model solved series of computer engineering problems by addressing the need for a modular approach to managing the launching and control of Unix processes. The success of the Unix operating systems is to a largely to the versatility and scalability of the Unix process. The History of Virtual Machines Around 1965 the researchers at IBM Yorktown Research center, developed first virtual machine environment, for the IBM System/360 mainframe called VM, which was entirely based in software. Later, IBM developed an implementation of its notion of a virtual machine and added hardware circuits to provide more robust and speedy partitioning between system images. This real world operating system, allows the user to share the resources available on their mainframe computers with many people, thus creating a multiple user environments. . This machine is now known as the IBM System 370 (S/370) and the IBM System 390 (S/390). These machines make use of the IBM VM/ESA operating system and are collectively referred to as IBM's VM lineage. Virtual Machine Research Paper 4 Benefits of running a virtual machine Virtual machine allow user to write applications on one OS and it can be executed on a machine which runs a different OS.One use is to provide multiple users the illusion of having an entire computer. Another advantage is that booting and restarting a virtual machine can be much faster than with a physical machine, since it may be possible to skip tasks such as hardware initialization. Virtual machine allows for testing OS's and requires less

Sunday, November 17, 2019

Hell Hath No Fury Like Medea Scorned Essay Example for Free

Hell Hath No Fury Like Medea Scorned Essay In Euripidess Medea, revenge can lead to destructive actions. This theme is a central part to the tragedy, mostly because it pops up time and time again. Euripides, through the use of motif, makes Medeas desire for revenge seem conceivable. Not only has Jason left her by marrying Creons daughter, but Creon has exiled her from Corinth because she â€Å"nourish[es] rancorous ill will toward [Jason and Creusa] whom [he] intends to protect† (Euripides 92). The protagonist is left with ultimately nothing and blames her misfortune on Jason. Throughout the play, Medea is described as a very determined and passionate woman who will stop at nothing to serve her sweet revenge. The death motif supports Medeas theme of revenge because it foreshadows her plans for vengeance. Medea shows the horror that can come when a person lets desire for revenge rule ones life. Death pops up very early in the play, when â€Å"death is [Medeas] wish† (87). She explains how she wishes death on herself, her enemies, and her children. She could â€Å"think of nothing but the death of three persons† (96). This foreshadows her plans for revenge because she eventually kills Creon, his daughter, and her own children, leaving Jason with nothing. Medeas plan for revenge starts with her children delivering a golden wreath and cloak that is cursed to burn the wearers body to death to Jasons new wife Creusa. This leads to not only the death of Creusa, but also her father, Creon. Although Medea has caused much damage and havoc, her vengeance does not stop there. She wants Jason â€Å"crushed, boneless, and crawling,† and she wants to sever all ties with him (119). She claims that â€Å"as long as [my children] live; I shall be mixed with him† (120). This brings her to her final and most destructive act of revenge: she kills her own children therefore leaving Jason with no wife or power. Ultimately, Medeas theme of revenge is supported throughout the tragedy and ends with Medea coming out victorious yet left with nothing to live for in her life. Death is brought upon multiple characters and is mentioned multiple times throughout the play. Euripides, by using theme and motif, sends a clear message that revenge can seem to control ones meaning of life and leave a person empty and with nothing except for a rancorous spirit. Medea ends with the protagonist exiting, carrying her dead boys with no home, family, or a reason to live. The protagonist’s need for revenge leads to irreversible destructive actions that not only leave Jason with nothing, but Medea as well.

Thursday, November 14, 2019

Portland Cement Essay -- essays research papers

PORTLAND CEMENT Chemical composition. Portland Cement is made up of four main compounds: tricalcium silicate (3CaOSiO2), dicalcium silicate (2CaOSiO2), tricalcium aluminate (3CaOAl2O3), and a tetra-calcium aluminoferrite (4CaO Al2O3Fe2O3). In an abbreviated notation differing from the normal atomic symbols, these compounds are designated as C3S, C2S, C3A, and C4AF, where C stands for calcium oxide (lime), S for silica, A for alumina, and F for iron oxide. Small amounts of uncombined lime and magnesia also are present, along with alkalies and minor amounts of other elements Hydration. The most important hydraulic constituents are the calcium silicates, C2S and C3S. Upon mixing with water, the calcium silicates react with water molecules to form calcium silicate hydrate (3CaO 2SiO23H2O) and calcium hydroxide (Ca [OH] 2). These compounds are given the shorthand notations C-S-H (represented by the average formula C3S2H3) and CH, and the Hydration reaction can be crudely represented by the following reactions: 2C3S + 6H = C3S2H3 + 3CH 2C2S + 4H = C3S2H3 + CH During the initial stage of hydration, the parent compounds dissolve, and the dissolution of their chemical bonds generates a significant amount of heat. Then, for reasons that are not fully understood, hydration comes to a stop. This quiescent, or dormant, period is extremely important in the placement of concrete. Without a dormant period there would be no cement trucks, pouring would have to be done immediately upon mixing. Following the dormant period (which can last several hours), the cement begins to harden, as CH and C-S-H are produced. This is the cementitious material that binds cement and concrete together. As hydration proceeds, water and cement are continuously consumed. Fortunately, the C-S-H and CH products occupy almost the same volume as the original cement and water; volume is approximately conserved, and shrinkage is manageable. Although the formulas above treat C-S-H as a specific stoichiometry, with the formula C3S2H3, it does not at all form an ordered structure of uniform composition. C-S-H is actually an amorphous gel with a highly variable stoichiometry. The ratio of C to S, for example, can range from 1:1 to 2:1, depending on mix design and curing conditions. Structural properties. The strength developed by portland cement depends on its composition and the fineness to whi... ...s. Dust emission from cement kilns can be a serious nuisance. In populated areas it is usual and often compulsory to fit cyclone arrestors, bag-filter systems, or electrostatic dust precipitators between the kiln exit and the chimney stack. Modern cement plants are equipped with elaborate instrumentation for control of the burning process. Raw materials in some plants are sampled automatically, and a computer calculates and controls the raw mix composition. The largest rotary kilns have outputs exceeding 5,000 tons per day. Grinding The clinker and the required amount of gypsum are ground to a fine powder in horizontal mills similar to those used for grinding the raw materials. The material may pass straight through the mill (open-circuit grinding), or coarser material may be separated from the ground product and returned to the mill for further grinding (closed-circuit grinding). Sometimes a small amount of a grinding aid is added to the feed material. For air-entraining cements the addition of an air-entraining agent is similarly made. Finished cement is pumped pneumatically to storage silos from which it is drawn for packing in paper bags or for dispatch in bulk containers.

Tuesday, November 12, 2019

FBI Case Study

The â€Å"Who Killed the Virtual Case File? † case study is a clear example of project failure which resulted on not only balloon the cost of the project, but also loss that could be counted on millions of dollars. Because of the size of the project and the failure of the project, it is broadly used to prevent future IT Project Management disasters. Project Overview: When special agent Larry Depew collected evidence of illegal activity of the Russian and Italian mafia tax skim activity, FBI didn’t have database system, which could organize and support all the information gathering processes that were needed for the organization. A decade later, Depew was landed in his first project management job called FBI Virtual Case File project (VCF), even though he had no previous experience. In the PMBOK Guide book describes what abilities a project manager should possess to successfully manage projects is: knowledge, performance and personal . In the results of lack of experience and ineffective planning the project was unfortunate failure. Because of availability of funds, the FBI’s 23 divisions developed own database system for each of the different divisions. In the result FBI ended up with 45-50 different investigative databases and applications, which are not communicating with each other. Also, the Automated Case Support (ACS) system was cumbersome to use, inefficient and had limited functional capabilities. Additionally all 13000 were really old which resulted in not supporting new software’s. Intranet that connected FBI offices had 56-kilobit-per second modems. SAIC (Applications International Corp. ) for software developed delivered 700,000 lines of code bug-ridden, off target system which resulted in $105 million worth loss. However, researches and findings showed that the FBI—lacking IT management and technical expertise—shares the blame for the project's failure. The research and study later on painted a picture of an enterprise IT project that fell into the most basic traps of software development, from poor requirement gathering, planning and bad communication between software developer and FBI. The key issues related to the failure of the project: * Violation of the Project Scope Management. One of the main factors of VSF project was poorly defined business requirements and overly specific nature of the requirements defined in systems design and analysis phase which resulted in creating 400 functional deficiencies found after testing the system. * Violation of the Project Cost Management The lack of IT investment processes resulted in ballooning the cost of the project in spite of the millions of dollars spending which was the also one of the main reason of VSF project failure. Violation of the Project Time Management Overly ambitious schedules and poorly defined schedule is one of the among VSF project failures. * Violation of Project Risk Management Procedure The lack of a plan to guide hardware purchases and deployment was one also of the failures of VSF project. Resolution: * The FBI’s higher management will be participating in the new software development to overcome the discrepancies associated with the previous those were VCF project. FBI is planning to purchase software from the vendor to digitize all documents, crime related evidence paperwork processes in the single database and still continue use VCF project systems up until it will be replaced with the desired software. * The new project will deploy and create new monitoring, risk management system which involves planning, scheduling and target oriented testing. Relevance to IT Project Management: * Project Scope Management Project Scope Management includes the processes required to ensure that project includes all the work required, to complete the project successfully. Scope Management includes following steps: clearly defining and documenting project business requirements by the company shareholders (collect requirements), develop a detailed description of the project (define scope), subdivide project deliverables and project work into smaller, manageable components (create WBS), formalize acceptance of the completed project deliverables, and monitoring the status and scope (verify scope), and managing changes to the scope baseline (control scope). FBI’s VSF project failed to define detailed project requirements, formalize acceptance of completed project deliverables by SAIC and monitoring and managing the scope by project manager. * Violation of the Project Cost Management Project Cost Management includes the processes involved in estimating, budgeting, and controlling costs so that the project can be completed within the approved budget. The cost management process includes: developing an approximation of the monetary resources (estimate costs), estimating costs of the individual activities (determine budget) and monitoring the status of the project budget and managing changes to the cost baseline (control costs). VSF project failed to address cost control in project cost management, because it had possibility to receive funding from the government. * Violation of the Project Time Management. Project Time Management includes the processes required to manage timely completion of the project. It includes following processes: identifying the specific actions to be performed to produce the project deliverables (define activities), identifying and documenting relationships among the project activities (sequence activities), estimating quantities of material, people, equipment, or supplies required to perform each activity (estimate activity resources), coming up with the approximate number of works periods needed to omplete individual activities with estimated resource (estimate activity durations), analyzing activity sequences, durations, resource requirements, and schedule constrains to create project schedule (develop schedule), and monitoring the status of the project to update project progress and managing changes to the schedule baseline (control schedule). In VSF project most of the required activities in time management FBI m anagement and SAIC failed to follow. * Violation of Project Risk Management Procedure. Project Risk Management includes the processes of conducting risk management planning, identification, analysis, response planning, and monitoring and control on the project. It includes following processes: defining how to conduct risk management activities (planning), determining which risks may affect the project and documenting their characteristics (identify risks), prioritizing risks for further analysis and combining their probability of occurrence and impact (perform qualitative risk analysis). Numerically analyzing the effect of identified risks on overall project objectives (perform quantitative risk analysis), developing options and actions to enhance opportunities and reduce threats to project objectives (plan risk responses), and implementing risk response plan, tracking identified risks, monitoring residual risks, identifying new risks, and evaluating risk process effectiveness throughout the project (monitor and control risk). In the FBI case none of the project risk management was applied to minimize risk associated with the possibility of the failure of the VSF project. Key Takeaways: It is important follow IT project management rules in order to develop the system. Main lessons learnt from the case study: * Business requirement analysis and technical requirements are crucial in the success of the project in planning phase. * Managing communication between companies’ key shareholders and server providers is required for productive outcome of the development. * Project monitoring and testing is vital task and should be accepted throughout the development * Prototypes be shown to client on regular basis to avoid all changes required at the end of the project * Having a individuals without proper knowledge in the rojects leads to the project success * Planning and monitoring leads to delivering the right product and timely completion of the project * Unsystematic approach in project time management could lead to delay in completion of projects * Deficient and unsatisfactory requirements lead to incomplete projects failure Research Approach For my research approach, I used Project Management and body of knowledge to identify main processes of the project management, and applied some basics acquired from the Systems Analysis and Design class to identify where FBI’s VSF project failed to address and manage this huge multimillion dollar project.

Sunday, November 10, 2019

Comparing and Contrast the Allegory of the Cave and the Matrix

Have you ever wondered whether, Plato, if he were alive in the 20 century, would he be a brilliant movie director, with productions that earned more than $400 million? Both Plato’s â€Å"Allegory of Cave† and Andy and Lana Wachowski’s movie â€Å"The Matrix† explore the abstruse question of perception of truth. What is truth, and how do we determine what is truth? â€Å"I know this steak doesn't exist. I know that when I put it in my mouth, the Matrix is telling my brain that it is juicy and delicious. This quote from the Matrix vividly illustrates the truth that how people perceive is the way they think, their realization of the truth is due to the world in which they live. Different people may have different perceptions of knowledge, which leads them to a distinct understanding of truth. It is about personal experience seeking the truth, in the process to knowledge – an image does not accurately reflect reality that is the challenge for both Socr ates and Neo, the protagonist in the Matrix.Considering one day there is a chicken that has lived with ducks since he was born, and never seen other chicken. Will that chicken ever know he is a chicken, or even when he sees other chicken, does he know it is a chicken? The prisoners in the cave have been chained together and have been separated from the outside world since birth. Consequently, their perceptions of objects are based on the shadows of those things, shadows produced by firelight in the cave as true representations. The environment where they have lived creates a world basic on their perception of things.Like Plato mentioned in the story: â€Å"To them, I said, the truth would be literally nothing but the shadows of the images. † The prisoners form their own opinion about things they perceive as true representation. By comparison, people who live in the Matrix accept the buildings and the things around them as the truth. However, the truth they have been accepting is merely their opinion, but no necessarily an opinion formed through knowledge. â€Å"If real is what you can feel, smell, taste and see, then ‘real' is simply electrical signals interpreted by your brain†.This quote identities are the result of opinions formed their brains. The tunnel in the Allegory of Cave and the red pill in The Matrix are the keys that open the door of knowledge for them. In the world of the Matrix, or the Cave, where everyone accepts objects as the truth, and real, like the shadows on the wall of the cave, this is a way to realize truth, to decide to walk through the tunnel and to pick a red pill, is a choice to enter a world of knowledge. As it is mentioned in the Matrix, â€Å"You take the blue pill – the story ends, you wake up in your bed and believe whatever you want to believe.You take the red pill – you stay in Wonderland and I show you how deep the rabbit-hole goes. † In both the story and the movie, everyone is so c lose to knowledge of the truth that they just need to put their foot across the threshold; nevertheless, it is the hardest step to enter door in their mind. It is a leap of faith into the unknown. â€Å"And if he is compelled to look straight at the light, will he not have a pain in his eyes which will make him turn away to take and take in the objects of vision which he can see, and which he will conceive to be in reality clearer than the things which are now being shown to him? This quote amply illustrates that everything is decided in their mind, it is their choice, and although Socrates and Neo suffer some physical discomfort in making the journey, they are now in the world of knowledge, the world of real truth. The profound brilliance of the sun can provide another source of discomfort, it cannot be seen directly through human eyes due to the intensity of the power it emits. Similarly, Socrates and Neo experience some physical suffering, such as, pain in their eyes and muscle problems while witnessing at true light for the first time. Why does my muscle hurt? Because you never used it. † This conversation dramatizes the difficulty faced by people as they make the transition from the limited world they know to the real world. The process of accepting and being able to â€Å"see† the real world is arduous; and comes about as a result of enormous changing in their belief and challenging knowledge of what they have long accepted. Knowledge is a concept that many philosophers, over thousands of years, strive to experience.Knowledge can be extremely powerful, but it can be illusive as well; however, once into the world of knowledge, people can distinguish the real truth from what they help as true. â€Å"And the first he will see the shadows best, next the reflections of men and other objects in the water†¦Ã¢â‚¬ ¦,Last of he will be able to see the sun,†¦Ã¢â‚¬ ¦ and he will contemplate him as he is. † Plato believed that, as long as there is a gradual process of adapting to the light, Socrates will be available adjust, and to see through the essence of things.In Plato’s Allegory of Cave, Socrates is fully aware of the truth after a process of adjusting to the light of real world, and then he returns to the cave and tries to teach to the others, the truth he has discovered. â€Å"Men would say of him that up he went and down†¦Ã¢â‚¬ ¦ and they would put him to death. † In spite of his efforts, the chained prisoners reject the real world due to the pain that is brought to them by the lights, they prefer to maintain the illusion of the images they saw as truer representations than the objects in the real world. Similarly, Cypher, the character in the Matrix, has been freed to see the real world.Unlike people who accept the truth and try to fight the agents in the Matrix, Cypher wants to go back to Matrix without knowing anything about real world. â€Å"The Matrix isn't real. I disagree, Trini ty. I think that the Matrix can be more real than this world. † People who free themselves may not perceive reality, like Cypher, he chooses go back to the Matrix because there is less suffering than in the real world. The same as the prisoners in Plato’s story, they would rather accept the illusion they see as truth, than go to the real world due to the pain it brings to them.Knowledge is the place where people want to be but may not necessarily be able to be in there. Even for people in the world of truth, the real world, who may also be bogged down in their search for truth, as apart from what they accepted before; this takes people’s mind to accept the changes from the previous knowledge held. In the Matrix, Neo does not confirm the truth in the real world where he is, until he accepts the training offered by Morpheus. Moreover, near the end of the movie, he makes the simple statement: â€Å"My name†¦is Neo! in which he accepts himself in the real world instead of the name, Thomas Anderson, used in the Matrix – a world build by computer programs. In comparison to the Allegory of the Cave, Socrates accepts the truth after he adapts to the real world and sees things clearly in the real world. As it is mentioned in the story â€Å"Last he will be able to see the sun†¦Ã¢â‚¬ ¦; and he will contemplate him as he is† No one can enlighten anyone else toward the world of knowledge, people have to enlighten themselves in their own minds.What is truth? The truth itself is a personal definition and realization of things in the world around us. Truth is a concept that seeks deeply to be defined in people’s minds; everyone has their subjective opinion of what truth it is. In both the story and the movie, some people realize the real truth but others do not; there is no right or wrong, just different view toward knowledge. Even now, the truth that people are accepting is not truth; even truth itself may not be truth.

Thursday, November 7, 2019

Major and Minor Moods in English Grammar

Major and Minor Moods in English Grammar In English grammar, mood is the quality of a verb that conveys the writers attitude toward a subject. It is also known as mode and modality. In traditional grammar, there are three major moods: The indicative mood is used to make factual statements (the  declarative)  or pose questions, such as the interrogative.The imperative mood is used to express a request or command.The (comparatively rare) subjunctive mood  is used to show a wish, doubt, or anything else contrary to fact. In addition, there are several minor moods in English. Major Moods in English The indicative mood is the  form of the verb used in ordinary statements: stating a fact, expressing an opinion, or asking a question. The  majority of English sentences are in the indicative mood.  It is also called (primarily in  19th-century grammar) indicative mode. An example would be this quote from writer, actor, and director Woody Allen: Life is full of misery, loneliness, and suffering- and its all over much too soon. Here, Allen is expressing a statement of fact (at least in his interpretation). The word is shows that he is stating a fact as he sees it. The imperative mood, by contrast, is the form of the  verb  that makes direct commands and requests, such as Sit  still and Count  your blessings. Another example would be this famous quote from President John F. Kennedy: Ask not what your country can do for you. Ask what you can do for your country. In this sentence, Kennedy was essentially giving a command to the American people. The  subjunctive mood expresses wishes, stipulates demands, or makes statements contrary to fact, such as this line from the play, Fiddler on the Roof: If I were rich, Id have the time that I lack. In this sentence, Tevye, the main character, is expressing that he would have more time if he were rich (which, of course, he is not). Minor Moods in English In addition to the three major moods of English, there are also minor moods. A. Akmajian, R. Demers, A. Farmer, and R. Harnish, explain in Linguistics: An Introduction to Language and Communication that minor moods are usually peripheral to communication, infrequently used, and vary widely. One of the more common minor moods is a tag, a sentence, question, or declaration added to a declarative sentence. These include: Tag declarative: Youve been drinking again, havent you.Tag imperative: Leave the room, will you! Other examples of minor moods are: Pseudo-imperative: Move or Ill shoot!Alternative question: a type of question (or interrogative) that offers the listener a closed choice between two or more answers: Does John resemble his father or his mother? (In this sentence, there is a rising intonation on father and falling intonation on mother.)Exclamative: a sudden, forceful expression or cry.  What a nice day!Optative: a  category of grammatical mood  that expresses a wish, hope, or desire,  May he rest in peace.One more sentence: One more beer and Ill leave.Curse:  a pronouncement of ill fortune. You are a pig!

Tuesday, November 5, 2019

I Said Jerry Rig

I Said Jerry Rig I Said Jerry Rig I Said Jerry Rig By Kate Evans All I did was ask him if he wanted me to jerry rig his shower curtain, but he looked at me like Id asked him something really inappropriate. Its not the first time Ive gotten confused or blank looks when Ive used the term jerry rig, which is a shame, because Im a very good jerry rigger. I can fashion a rain jacket out of a cereal box or repair my car engine with a paperclip and a piece of used chewing gum. Thats what jerry rigging is, making makeshift repairs or creating contraptions out of whatever materials you have on hand. MacGyver was also a very good jerry rigger. The origins of jerry rigging are debated. The term could could be a mutation of jury rigging, which in todays lexicon, can be used with jerry rigging interchangeably. Jury rig has roots as a nautical term, referring to the replacement mast and yards used in an emergency. The term has been used since at least 1788. It is probable that jury comes from the Old French, ajurie, meaning relief or help. Another theory is that the term jerry rigging is separate from jury rigging and actually comes from World War II. Apparently, American troops adopted the term to describe machines that were repaired with salvaged parts, left behind by retreating German soldiers (jerry being a pejorative term for Germans). In any case, you should use it, to make MacGyver proud or just to see the looks on peoples faces. Should you need inspiration, here are a few examples of jerry rigging as demonstrated by Angus MacGyver, fictional star of the action/adventure series, Macgyver: Plug a sulfuric acid leak with chocolate Fix a water pump with two half dollars Make a telescope out of a newspaper and a magnifying glass Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:Using "a" and "an" Before WordsBody Parts as Tools of MeasurementBail Out vs. Bale Out

Sunday, November 3, 2019

Preventing School Bullying Research Proposal Example | Topics and Well Written Essays - 250 words

Preventing School Bullying - Research Proposal Example The methodology of this study is based on 2 surveys conducted in 50 different high schools in the region. The study is applied to pupils between 6 and 10 grade and it is voluntary. The first survey is organized as a self-reported questions and answers, it is anonymous and tries to estimate the degree of bullying in the given school. The other survey concentrates on the desire of participants to name the reasons why they were bullied and the ways in which this was done. The collected data was statistically processed. The data collection process represented interviews with the pupils and classifications of their answers in the different categories. The study have found that bullies are predisposed to have positive attitude towards aggression, have negative attitudes towards school and education and have behaviour problems. On the bases of the collected data it was estimated that bullying takes two distinct phases - verbal and physical.

Friday, November 1, 2019

Strategy for Mega Bastard Corporation - Bionic Limbs Essay

Strategy for Mega Bastard Corporation - Bionic Limbs - Essay Example How fancy is that? The most important factors to consider in the introduction of bionic limbs is the strategic management variable involved in product and business development. Namely; Market entry, research and development, pricing, designing the product and competition prosthetic limbs producers. MBC will most probably benefit from a market segment of people interested in comic books, superhero movies and video games. The macro environment directly related to competition. DEKA is an example of prosthetic limb maker. They have made progress in making bionic arms, which basically gives MBC the advantage of differentiating their market segment to only limb/ legs bionic material. The market analysis will assume that MBC management has taken care of the approval process through the Food and Drug Administration body. MBC has two choices, either to enter the market or not to enter the bionic market. Now does not enter the bionic limbs market, then their competitors will obviously maintain the status quo and barely change the prices of bionic limbs. However, if MBC enters the market, then its potential competitors will definitely start a price war and that may affect the level of sales of bionic limbs. MBC will obviously be a credible threat to existing competitors in this monopolistic market as noted by Baines & Fill (2014). MBC already has the technology for making the bionic limbs, hence labour cost for the business and product development is greatly minimized and the only challenge will be for the management to identify a profitable market segment for their product. Getting a priced contract with competitors can always help MBC avoid any price wars that may emerge after they introduce their bionic limb. This is basically done by MBC paying a premium to a specific competitor and in exchange, the competition won’t start a price war against MBC. For MBC to effectively market the bionic limb, the product must be FDA approved in order to gain considerable favour even in the ‘villain’ market segment.  Ã‚