Thursday, October 31, 2019

English Essay Example | Topics and Well Written Essays - 750 words - 1

English - Essay Example The rapid rate that our sea levels have been raising at has given many countries the dangers as it could wipe them off the world map that we know today, like the Caribbean. The people of the Caribbean have been trying to fight this problem over many years and scientists say by the year 2100, the Caribbean will no longer be a part of the world map. I think it will be the next atlantes this raising sea levels will also affect and scare many other countries like the Philippines, Indonesia and Bangladesh as they are very close to the sea levels and may also be joining the Caribbean. Also these raising sea levels have been causing tsunamis and other natural disasters due to the changing climate and sea levels. Global warming has many effects; one of these major effects is the Ozone hole which has many effects that have slowly been destroying our planet without our knowing, but thanks to the advanced technology of today, we have been able to notice theses problems and effects but it is too late, this Ozone hole especially affected Antarctica as the ice is melting which increased the sea levels affecting many countries and leading to their destruction. The increase in the climate has lead to the death of many penguins and their existence is linked to the polar bears. We have been destroying their homes and we might be the reason for their extinction, if we keep walking the path that we are walking today. Moreover, the organisms living in Antarctica have also been dying rapidly due to the fast climate change. Not only that but the effects of global warming have increased the rates of diseases especially skin cancer due to the UV rays from the sun as the Ozone hole is widening and as it is the only protection for us from these harmful rays which are bouncing back a large percentage of these rays, however it no longer exists in some areas of the world and is thinning at other areas. Pollution has been increasing over the years, especially the air pollution form cars, fac tories and green houses due to CO2 emissions which has many effects on people especially the new born and the elderly. Asthma has been rapidly increasing among us and we are starting to see it as a normal illness but indeed this is a man-made illness due to the air pollution that we have created which is affecting our children and the people at large. In conclusion, air pollution is raising the sea levels and the hole in our Ozone layer is a problem that we have created. The dying animals and the melting ice in Antarctica are the effects of the problem that we have created as we are killing the big blue inch by inch everyday and we are killing ourself as well. I ask everyone who reads this paper to please stop killing our planet and at least try to reduce the pollution in some

Tuesday, October 29, 2019

Broken Globe Stage 2 Essay Example for Free

Broken Globe Stage 2 Essay Characterization is the process by which authors make characters come alive for readers. Authors have many techniques available to portray characters, and they can broadly be divided into indirect and direct presentation. In the short story â€Å"The Broken Globe†, author Henry Kreisel brillantly develops the two principle characters, Nick Solchuk and his father, through indirect presentation. Consistency is the key to good characterization. From ? rst person point of view, the reader obtains a full portrait of both Nick and his father indirectly by learning what the narrator sees and hears somewhat objectively. Nick, the narrator’s friend, is a successful geophysicist studying the curvature of the earth. He demonstrates persistance, passion, and determination in the study of the earth. He asks the narrator â€Å"eagerly† with â€Å"his face reddening† about his paper to the International Congress. Even under the torture of his father, he still keeps his goal of proving that the earth moves. He even retorts his father by saying â€Å"You can beat me and break my globe, but you cannot stop [the earth] from moving. † This passage shows his determination in his belief. On the other hand, Nick’s father adopts personas of sophistication during the short visit of the narrator. His father is stubborn that he only believes what he sees is the truth: â€Å"[the earth] is ? at, and she stands still. † He is also imptuous and fractious that he â€Å"[beats] Nick like he is the devil† when he wants Nick to accept the same concept of the earth as he believes. Both characters are consistent and static, for they are still living in their own world: one lives in a ? at world and the other lives in the world of science. Another signi? cant objective of characterization is to reveal motivation. Kreisel’s story is set mainly in Alberta, a â€Å"land ? attens until there seemed nothing. † Living in Alberta, Nick’s father sees only the open prairies and ? elds every day; thus he perceives that the earth is exactly ? at and still as what he sees. Moreover, the reader learns that he is hard to change his mind because â€Å"he received an education of sorts when he was a boy. † Therefore, he believes that the earth is the center of the universe and the center is still. Similarly, Nick’s motivation is intrigued by a teacher who teaches him the earth is round and is moving. This teacher’s â€Å"enthusiasm [is] infectious† as Nick says. The teacher shows Nick a world larger than the ?at prairies, a world that is exuberent. Although the two characters’ own views of the world contradict one another, they do care and love each other. To build characters that convincing, the author must make their actions realistic and believable. Nick and his father are plausible due to their backgrounds. Nick’s father is taught that â€Å"the earth is ? at and still,† and what he sees outside in Alberta is only the far-distant prairies with â€Å"neither hill nor tree nor bush. † Furthermore, Nick, suffering from the violence of his father, always illustrates indomitable perserverence in seeking the truth. He continually shows to his father a globe can move, even though he knows his father will be mad. People with bond ? de determination can achieve their goals, just like Nick achieves his goal and becomes a geophysicist (to prove his father wrong? ). Altogether, they both are rounded characters in that they demonstrate many attributes and traits. Nick’s father is a stubborn, impulsive, and fractious father whereas Nick is a passionate, indomitable, and persistent geophysicist. In the story â€Å"The Broke Globe† Henry Kreisel effectively utilizes many techniques to develop characters, and further reveals a thoughtful insight into life. Nick’s father who insistently believes that the world is ? at and still lives in his own â€Å"broken globe†, where â€Å"Satan has taken over all the world† but him. 1. Sample Task for English 12 Writing Prepared by Seaquam Page 15 Characterization: A Father and a Son, How the Apple Falls Characters can make a short story rich and worth reading. In Henry Kreisel’s â€Å"The Broke Globe† the differences in ethics between a man and his father is seen through the eyes of a somewhat neutral narrator. Nick Solchuk is a brilliant man of science, while his father is the polar opposite. His father is a pious prairie farmer who does not value higher education or the values its teaches. Even though these characters are presented indirectly, Kreisel utilizes other methods to develop the characters. He shows them as static and round characters who are plausible and who remain consistent. Being ? rst person narrative, no direct presentation is used because the author cannot speak directly. He simply assumes the persona of a a narrator and therefore all presentation is indirect. One can ? nd out a lot about a character by what others say about him. Nick’s father is developed in the beginning during the conversation between Nick and the narrator. At this point the reader discovers that Nick and his father differ in many ways. Obviously, Nick is a man of great intelligence as the narrator say, â€Å"he studied at Cambridge and got his doctorate there and was now doing research at the Imperial College. † The reader also learns that despite being a brilliant man, nick whistfully remembers his simple childhood growing up in Three Bear Hills, Alberta. Nick’s father is developed much the same way later on in the conversation. Nick reveals that his father is a polar opposite. Nick’s father is shown as a religious prairie farmer with â€Å"a strange imagination. † Nick also explains why there is tension between himself and his father. â€Å"Curious man my father. He had strange ideas and a strange imagination too. He couldn’t understand why I was going to school or university. † â€Å"I suddenly realized that the shape of the world he lived in had O been O ? xed for him by some medieval priest in the small Ukranian villiage he was born in O But he still lived in the universe of the medieval church. : The reader now knows that Nick and his father are very different. Dialogue becomes a very important part of this story. The reader learns a lot about the father by what he says and by what he says he does. The ? rst meeting between the father and the narrator shows a lot about the father. â€Å"You friend of NickOWhat he do now? O still tampering with the earth? † Now, it has been con? rmed that Nick’s ideas differ greatly from his father’s. Nick’s father may be a simple prairie farmer, but that does not mean that he is rude. The father acts very formally when inviting the narrator inside his house. He stands as the narrator comes in, which is a sign of respect; he even brings out coffee for the narrator. The reader continues to learn about the relationship Nick’s father has with his son, and certain other people. The father explains how he exploded at a teacher for â€Å"letting Satan in† and for teaching Nick science at school. This act shows how the father deals with other people. The father goes on to elaborate on how he dealt with Nick as a child. â€Å"I grab him by the arm and I shake him and I beat him like he was the devilOAnd he made me madder and madder because he doesn’t cry or shout or nothing. † â€Å"I would of killed him right there for sure. † The reader now knows how he handles his son. Nick and his father are both static, round characters. They do not change at the end of the story, but they have many traits. Nick’s father proves he does not change by saying to the narrator â€Å"Satan has taken over all the world. † Then he suddenly rousled himself and hits the table with his ? st crying passionately, â€Å"But not me! Not me! † The characters act consistently throughout the story. â€Å"The Broken Globe† is a deeply driven character story. Both main characters are well developed. In some cases, the apple falls very far from the tree.

Saturday, October 26, 2019

Computer Security And The Threat Of Hacking Computer Science Essay

Computer Security And The Threat Of Hacking Computer Science Essay Computer security is a safety operating system that is an important feature to install on a computer. It ensures safety and protection from unknown users and threats. If a safety operating system is weak, unknown users, or hackers, are able to break into the database and install harmful viruses, as well as steal personal information. Computer security and hacking can have both disadvantages and advantages. Computer security has evolved from early on to being a key component to own. Hacking, as well as computer security, has developed into a more harmful and dangerous activity. Currently, security programs have been developed to stop hacking and viruses from encroach onto a users computer. Computer security and hacking have had impact on society today, globally and locally. Users use computer security to their benefit when keeping personal information stored on their database. Hacking can destroy a users identity, or possibly their reputation. Businesses and organizations have benefit ed from security, by its protection of information and protection from outside harm. Hacking can be used as a good way to check a computers sustainability to dangers through networks and the internet. Computer security and hacking are two important issues discussed and recognized today. Computer Security is an important element of safety precaution when using a computer. These operating systems run on computers to ensure the safety of personal and financial information, along with protection. Computer security can be a very useful component to acquire [1]. If an unknown user tries to access a computer database, computer security will ensure that that user will not be let in [2]. Besides keeping unknown users out of others computer databases, computer security also provides protection from harmful threats and viruses. Once these viruses find their way onto a users computer, information and control access can be stolen [3]. There are significant advantages and disadvantages of having a strong computer system, one advantage being protection from viruses and other harmful attacks [4]. Hacking has found its way into the world of computers. Hacking can be destructive, harmful, and can have some bad impact on peoples lives. If a computer system is not protected by a security operating system, hackers can find their way into that database easily. Once in, hackers can obtain personal, financial, and important information [5]. This can cause ruin in a users business and personal life, and much more. While being branded a bad thing, hacking can help many as well. Some hackers are able to test the reliability of a computers security system, to find weak spots in the barrier [6]. Like computer security, hacking can have both costs, but benefits too [2]. The purpose of this report is to allow computer users to gain insight on the aspects of computer security and the ethical issue of hacking. Computer security can allow users to feel comfortable knowing their personal information is being kept hidden. But even with a high-level computer security system, one is still vulnerable to a hacking intrusion. A computer users private information, such as social security, credit card numbers, passwords, email addresses, and other information is at risk to being taken. There are a number of objectives covered in this report. First, computer security is used to keep personal, financial, and other private information kept confidential. Second, computer security blocks viruses and attackers from encroaching on ones computer. Third, even with this security, one is still susceptible to a hacking attack. And lastly, hacking can be easily hurtful, but could in some cases be just as helpful for users. The main contents of this report include computer security, and the issue of hacking. Computer security is described as a protection technique for personal information, and for blocking unwanted threats from the internet. Hacking is described as being a harmful way to obtain information from other users databases. Viruses and threats are each described in order for other users to know the differences between them all. Also in this report are ways to check a computers security and ways to keep it protected from harm too. 2 Background 2.1Computer security is an operating system used on computer databases to protect and provide safety to users. Besides preventing unauthorized access, computer security provides protection for personal, financial, and classified information [1]. One type of this security system requires a validation of a username and password provided by the user, in order to gain access into the computer database [2, pg.267]. Besides validating who the user is, it also confirms that the user is not trying to attempt an unlawful operation [2, pg.31]. As shown in Figure 1, computer security requires a key, or username and password, in order to access the database. Many businesses and organizations have benefited greatly from this operating system, because it allows their private information to stay confidential and secret [1]. http://comtrec.com/wp-content/uploads/2010/05/Computer-Internet-Security.jpg Figure 1 Picture representing the security operating system, with the binary representation inside a computer. Computer security had begun physically in the 1950-60s. Computer systems then were guarded by security officers, to stop the attempt of gaining unauthorized access. Later on in the 60s and 70s, access could be granted over telephone lines, which caused a change in the way computers were externally guarded [2, 266-7]. By the 90s, companies sprang up to provide a more modern way of securing computer systems. Secure Sockets Layer (SSL) was developed by Netscape Communications, (which was an early web browser) to get secure transfer of info when buying online. By 1999, the Transport Layer Security (TLS) had been developed, and was very similar to the Secure Sockets Layer, but with a few important improvements [2, 350-1]. Hacking can be defined as the encroachment of ones personal or business computer system by an outside source [7]. Hackers, or the outside sources encroaching on the personal computer, can have many motives to these intrusions. Some hackers have admitted to only wanting to enjoy the challenge of overcoming a security system [8]. Other hackers have admitted to wanting private or financial information for their own personal gain [7]. There are different ways a computer can be hacked into. These ways include: through downloads, internet-based programs, and through fraud emails. Through these, hackers can plant viruses and attacks which make it possible to overcome a security system [3]. A hacker has had many definitions from early on. In the Middle Ages, a hacker was in the business of creating tools known as hoes. Later on into the 17th Century, a hacker had become a strong worker that handled a hoe. Today, a hacker has nothing to do with an actual tool, but is capable of being a strong worker, when it comes to intruding upon anothers computer system [2, pgs.657-8]. The earliest form of hacking was known as phreaking. This involved hacking using telephone lines [9, pgs.12- 13]. 2.2There are a number of advantages and disadvantages when it comes to computer security. Some advantages include: greater storage space, resource and file sharing, an increase in cost efficiency, and security of private information. Some disadvantages include: the expensive cost, it could have a number of weak spots, and some security issues [4]. Hacking has some important costs and benefits when it comes into play. Some costs include: the owner loses control over his or her information, harmful viruses and threats on users computers, and loss of data either being intentional or unintentional by hacker. An important benefit is ethical hacking, because users can determine where the weak spots in their system are [2, pg.659]. 2.3 There are some theories to deciding whether hacking can be good or bad. In some ways, it can be dangerous, hurtful, and devastating. Many can lose their personal information, such as social security, credit card numbers, emails, addresses, and much more, and can be left with nothing. In some ways, hacking could be a good thing. This is true because many hire ethical hackers to test their computers security strength to find weak areas in their systems. It is an undecided theory, because hacking can be labeled good and bad, and each argument can be supported [2, 659]. 2.4 A class for viruses, threats, worms, Trojans, spyware, and other forms of attacks is known as malware. [7]. A small portion of software that can enter a users computer secretly and in other easy ways is known as a virus. Trojans are similar to a virus, but different in the fact that once installed, it allows the Trojan horses creator the ability to see everything on the users computer. Spyware is capable of being installed within a users database with or without the user having knowledge of it [3]. These types of threats and attacks are hidden within programs that come as fake emails, internet-programs, and downloads. Figure 2 below demonstrates all the different types of harmful threats that can be uploaded onto your computer by hackers. http://www.dreamstime.com/computer-and-network-security-hand-thumb4123007.jpg Figure 2 This is a collection of all the different types of viruses and threats that can be harmful for a users computer. 3 Computer Security and Hacking 3.1Society has been impacted by computer security in a number of ways. Computer security ensures users that their personal, financial, and other information will be kept secret from the eyes of others. It impacts businesses and organizations by keeping their confidential data safe from view and harm and helping them in staying successful [1]. It allows users to share files and resources, an increased amount of storage space, and an increase in cost efficiency [4]. As well as protecting information, computer security has impacted users and their computers from nasty viruses, threats, and malware as well [3]. Computer security is an important piece of technology that has impacted society since its beginning. Hacking is impacting society today in many ways. Hacking impacts users by taking their personal information, and could possibly display it over the internet [7]. It is causing an increase in cost for companies and organizations to fix their computer systems after a security breach, and to obtain better security. There has been recent documentation dealing with an increased amount of threats found in web sites that can easily be uploaded onto databases. [10]. Hacking impacts businesses and organizations if these do not have a strong security system. Hacking can have a number of impacts on society, especially taking personal information from other users [5]. 3.2 Computer security involves another component, called a firewall. This component, software or hardware, is made to block unwanted threats and viruses from a users computer. A firewall is used to prevent the intrusion of hackers, viruses, and many other threats from gaining access and information onto a computer [11]. An example of a strong firewall that provides protection and dependability is the Cisco PIX Firewall [10]. A well-known security system used by many is called Symantec. Symantec had originated in 1982. It has become the worlds largest software company, with business internationally, and with over 17,000 workers. Symantec ensures security of the computer, its infrastructure, and all the components within it. Symantec has a research lab where new technologies are developed to ensure even more security [12]. Norton AntiVirus is Symantecs current security program. Norton provides safe networking, protection online, and a scanner to check for viruses and threats. Norton is a very trusting program, because it ensures safety for users and for their computers. Figure 4 is a picture of the program Norton AntiVirus. Figure 5 represents the Norton program at work. This main screen alerts the user if their system is not secure, and what types of protection the user would like to be on or off. [12] http://www.amitbhawani.com/blog/wp-content/uploads/2010/06/Norton360-Box-Package.png http://www.windows7hacker.com/wp-content/uploads/blog/DownloadNortonAntivirus2010BetaonWindows_E88F/NewNortonAntiVirus.png Figure 3 Picture of the Norton Figure 4 This figure represents the Norton AntiVirus program AntiVirus main screen 3.3 Even though hacking is labeled as dangerous, some have found hacking to be a blessing. Some computer users hire ethical hackers, which are those who imitate an actual attack onto a users computer system, in order to test that computers security system and its blocking power. While imitating this attack, ethical hackers are also looking for weaknesses within the system, and what could be stolen in a real hacking attack [6]. Another way to check a networks security is by sending a vulnerability scanner over the computer. Like ethical hacking, a vulnerability scanner will check for weaknesses in the security, and will increase the security as well. Besides scanning for weaknesses in the security wall, users should consistently be checking their computers for any type of threats or attacks. If these threats or attacks are not resolved, all types of malware could corrupt the database [10]. 4 Conclusion Computer Security is described as being a protection mechanism for computer databases. This mechanism can come in different shapes, styles, and forms [1]. One of the types of computer security is a validation code. The user of the computer must provide his/her own username and password to access the database [2]. Another type is AntiVirus security, such as Norton AntiVirus by Symantec. This program will provide protection from harmful threats and viruses, and hackers as well [12]. Computer security has provided many with comfort knowing that their private and financial information will be kept safe from other eyes on their computers. Big companies and organizations have benefited from computer security, because with it they have a comforting feeling that their important information will be kept safe [1]. Hacking is a dangerous and unfortunate activity that occurs on vulnerable computers [7]. Hackers find their way into other users systems, and depending on what they want, credit card numbers, social security, or anything of the like, they are likely to succeed in getting [5]. Hackers can plant harmful viruses and threats into a users system with or without that user knowing [7]. It can be a very upsetting and unlucky event to happen, because users are susceptible to having their personal information stolen or revealed to the public [2, pg.659]. But in the light of things, hacking could be a good thing for some users. Ethical hacking can be a useful method for checking a computers security barrier. It finds the weak spots that a computer hacker, virus or threat could enter the database through [6]. There are ways to improve computer security and to keep hackers and viruses out of computer systems. Ethical hacking could be a method used to find the vulnerable areas in the security, which would inform the user that better security is needed [6]. Similar to ethical hacking, a vulnerability scanner runs over the system scanning for weak spots, and improves security too [10]. Certain antiviral programs could be purchased and installed to increase security. Such programs as Norton AntiVirus will alert the user of any threats, scans the system, and will keep a computer safe [12]. There are conclusions Ive drawn from researching computer security and hacking. First, computer security is a very important component to have on a computer. Businesses and companies have impacted from it, because they are able to keep valuable information stored on their computers. Without it, users should not be on the internet or network at all. Hacking can be a very uncomforting and hurtful activity to users and their computers. Users can have their private and financial information taken from them, as well as being made public. There are many types of viruses and threats that can harm users computers, especially the ones thought to be low risk. The reason I drew these conclusions is because they are important things to know and understand. If one is naÃÆ'Â ¯ve to the risks of the internet and hackers, their computers, as well as themselves are in peril. There are some issues that I would like to address in future studies. I would like address the issue of weak spots in a computers security. I would like to see this security to not have these weak spots, and to fix them before using them on computers. Second, I want users to realize how dangerous it is to not have a computer security operating system, before they find it is too late. I would like to see programs such as Facebook and MySpace not allow users to put as much information as they allow now. Because of this displaying of information, many are susceptible to danger. I would like these issues to be addressed in future studies.

Friday, October 25, 2019

Essay example --

There are over 160,000 fast food restaurant in America, according to statistic brain. Fast food is food that is prepared and served quickly, typically in a store or a restaurant with precook or preheated ingredients, then served to the customer in a carryout packaging. Everyone should think twice before consuming fast food, it’s unhealthy and bad for you. Even if it’s easy and cheap, the food isn’t prepared or taken care of properly, plus the health risk prevail over the five minutes of gratification. The global influences of the fast food industry are the causes of today’s health problems. Everywhere you go, it doesn’t matter what country you’re in there are fast food restaurants. â€Å"Fast food is now served at stadiums, airports, zoos, high schools, elementary schools, and universities, on cruise ships, trains, and airplanes, at K-marts, Walmart’s, gas stations, and even at hospital cafeterias.†(Schlosser) Fast food com panies advertise their product with flashy commercials and catchy slogans to make the public aware of their product by stating that the product is healthy and nutritious, but they don’t display how animals are kept and the chemicals that are placed into making the food. These animals compromise of calorie filled, unhealthy, chemically conditioned substances. â€Å"Over the last three decades, fast food has infiltrated every nook and canny of American society. An industry that began with a handful of modest hot dog and hamburger stands in southern California has spread to every corner of the nation, selling a board range of foods wherever paying customers may be found.†(Schlosser) The fast food industry is one of the fastest growing ones in the United States, contributing to the rise in obesity as well as in other di... ...n your food. Fast food has become part of a lifestyle, some may say tradition, and future generations wouldn’t know what life was like before fast food or without it. With the fast bound lives no one has time to sit and have a home cooked meal with family, kids don’t sit around the table and talk with their families, and of course not everyone is too busy and have better things to do. Apart from consuming fast food, fast food chains are disparaged for worker exploitation, many workers have gone on strike throughout the years, enquiring better pay and better treatment. Flashing a light on the life a fast food worker, greater percentage of fast food workers earn minimum wage than in any other American industry. The focus is on mass production rather than individual gratitude and progression. Having said all that, it comes down to one thing, you are what you eat!

Wednesday, October 23, 2019

A group II metal hydroxide Essay

To find the identity of X(OH)2 (a group II metal hydroxide) by determining it’s solubility from a titration with 0.05 mol dm-3 HCL Theory:1. Titrations are the reaction between an acid solution with an alkali. In this reaction (called neutralization), the acid donates a proton (H+) to the alkali (base). When the two solutions are combined, the products made are salt and water. For example: 2HCl(aq) + X(OH)2 (aq) XCl2 (aq) + 2H2O (l) This shows the one of the products i.e. salt being XCl2 and water. So titration therefore helps to find the concentration for a solution of unknown concentration. This involves the controlled addition of a standard solution of known. Indicators are used to determine, at what stage has the solution reached the ‘equivalence point'(inflextion point). This means at which, does the number of moles base added equals the number of moles of acid present. i.e. pH 7 Titration of a strong Acid with a Strong Base: As shown in the graph, the pH goes up slowly from the start of the tiration to near the equivalence point. i.e (the beginning of the graph). At the equivalence point moles of acid equal mole of base, and the solution contains only water and salt from the cation of the base and the anion of the acid. i.e. the vertical part of the curve in the graph. At that point, a tiny amount of alkali casuses a sudden, big change in pH. i.e. neutralised. Also shown in the graph are methyl orange and phenolpthalein. These two are both indicators that are often used for acid-base titrations. They each change colour at different pH ranges. For a strong acid to strong alkali titration, either one of those indicators can be used. However for a strong acid/weak alkali only methyl orange will be used due to pH changing rapidly across the range for methyl orange. That is from low to high pH i.e. red to yellow respectively pH (3.3 to 4.4), but not for phenolpthalein. Weak acid/strong alkali, phenolpthalein is used, the pH changes rapidly in an alkali range. From high to low pH, that is from pink to colourless pH(10-8.3) respectively but not for methyl orange. However for a weak acid/ weak alkali titrations there’s no sharp pH change, so neither can work. Therefore in this investigation, the titration will be between a 0.05 mol dm-3 of HCl with X(OH)2, using phenolphthalein. Dependant Variable: Is the volume of HCl to achieve a colour change that is from pink to colourless. The Controlled variables : 1. the same source of HCl 2. same concentration of HCl 3. Same source of X(OH)2 4. Same volume of X(OH)2 5. Same equipment, method, room temperature Controlled Variables How to control How to monitor 1. Same source of HCl Using the same batch of HCl or from the same brand will control this. If the concentration was not to be same throughout, then this will cause different ratios of the components of the solution, that might cause different volume of HCl to be obtained for the neutralization to occur. 2. Same concentration of HCl This will be controlled by using the same batch of HCl and from the same source i.e. the same brand. By using the same batch ensures that the reactant concentration is the same. If another batch were to be used causes the concentration to differ. This causes the HCl obtained to be different. 3.Same source of X(OH)2 Using the same batch of X(OH)2 or from the same brand will control this. If the concentration was not to be same throughout, then this will cause different ratios of the components of the solution that might cause different volume of HCl to be obtained for the neutralization to occur. 4. Same volume of X(OH)2 This will be controlled by using the same batch of X(OH)2 and from the same source i.e. the same brand. By using the same batch ensures that the reactant concentration is the same. If another batch were to be used causes the concentration to differ. This causes the HCl obtained to be different. 5. Same equipment, method, room temperature The method would be kept the same and the same set of equipment and brand will need to be used throughout. The room temperature will be kept throughout at 180C by using a water bath. If different equipment or brands were used then there would be a lot of anomalies in the experiment causing a huge amount of inaccuracy of measurement particularly. Results: Raw data results were collected by using 25.00 cm3 of X(OH)2 with phenolphthalein and the volume of HCl was obtained by the solution going from pink to colourless. The volume of HCl found in 50.0cm3 burette à ¯Ã‚ ¿Ã‚ ½ 0.05 cm3 Trial 1 Trial 2 Trial 3 Trial 4 Average 19.600 19.800 19.600 19.700 19.675 Qualitative results that occurred during the experiment: * Conical flask swirling not even between the trials * Difficult to judge ‘colourless’ solution change – subjective end point * Ability to measure 25cm3 * Filling of burette accurately with HCl – 0 point in right spot * Residual distilled water or solutions remain in conical flask i.e. diluted/interfered with subsequent solutions of X(OH)2 Average = trials (1+2+3+4)/4 Therefore: (19.6 + 19.8 + 19.6 + 19.7)/4 = 98.5/4 = 19.675 Due to the equation being 2HCl(aq) + X(OH)2 (aq) XCl2 (aq) + 2H2O (l) Therefore the ratio is 2:1 of 2 HCl : 1 X(OH)2 So using the equations mentioned above: Moles of acid is the number of moles= concentration X volume i.e. the volume will be used from the average Therefore: =0.05mol/dm3 x 19.675 cm3 =19.6 cm3 / 1000 = 0.0196 dm3 =0.05mol/dm3x0.0196 dm3 = 0.00098 moles So Moles of alkali in 25.000 cm3 Moles of HCl / 25.000 cm3 due to the ratio being 2:1, therefore 0.00098/2= 0.00049 moles of HCl So now the ratio is 1:1 so 0.00049 moles of X(OH)2 Moles of alkali in 100 cm3 It is assumed that there are four lots of 25 cm3 = 4 x 0.00049 = 0.00196 moles The next series of results will be used to calculate solubility of each compound by their mass in 100 cm3 The total Mr has been calculated in the table below for each compound. This was done by : Mr of X + ((O + H) X 2). Each element Mr for the following elements (OH)2 Total Mr Be 9.010 (16.00 +1.01) X 2 = 34.020 43.030 Mg 24.310 (16.00 +1.01) X 2 = 34.020 58.330 Ca 40.080 (16.00 +1.01) X 2 = 34.020 74.100 Sr 87.620 (16.00 +1.01) X 2 = 34.020 121.640 Ba 137.340 (16.00 +1.01) X 2 = 34.020 171.360 To obtain the solubility’s of metal II hydroxides is moles X Mr of the compound Therefore this table shows the calculation for the solubility’s for each of the different compounds Each element Total Mr Moles of X(OH)2 Solubiltity given as g/100 cm3 Literature values of the compounds given as g/100 cm3 Be(OH)2 43.03 0.00196 0.0843 0.000 Mg(OH)2 58.33 0.00196 0.114 0.001 Ca(OH)2 74.10 0.00196 0.0145 0.170 Sr(OH)2 121.64 0.00196 0.0238 0.770 Ba(OH)2 171.36 0.00196 0.335 3.700 Uncertainties: The uncertainty in measurement: Uncertainty due to pipette of 25.000 cm3 : Volume of X(OH)2 = à ¯Ã‚ ¿Ã‚ ½ 0.100 cm3 Percentage uncertainty = (0.1/25) X 100 = 0.400% Uncertainty due to Burrette of 50.000 cm3: Assumed due to measured volume of 19.675 cm3 and the uncertainty due to the smallest unit of measurement being 0.1 cm3 Therefore 0.1/2= à ¯Ã‚ ¿Ã‚ ½ 0.050 cm3 Percentage uncertainty = (0.05 /19.675) X 100 = 0.254% Therefore total uncertainty = 0.400% + 0.254% = 0.654% Conclusion and Evaluation: X(OH)2 is most likely to be Ca(OH)2 as the calculated solubility is closest to the literature value given of Ca(OH)2. The solubility for Ca(OH)2 0.145 g/100 cm3 and the literature value is 0.170 g/100 cm3. This shows that the difference is only 0.025 cm3. However the comparison between Be(OH)2 of the calculated solubility is 0.0843 g/100 cm3 and of it’s literature value 0.000 g/100 cm3 . Shows that there is a greater difference. Showing that it cannot be X(OH)2 solution. This is also shown for Mg(OH)2 as the difference between the calculated solubility and the literature value is 0.113 g/100 cm3, showing that it still has a greater difference than Calcium hydroxide does. The difference between Sr(OH)2 and it’s literature value is 0.532g/100 cm3. However the difference between the calculated solubility of Barium hydroxide and the literature value is 3.365 g/100 cm3 showing there is a great difference so it cannot be Barium hydroxide. The percentage error of Ca(OH)2 = [(0.170 – 0.145)/0.170] X 100 = (0.025/0.170) X 100 = 14.705% Throughout the experiment there were systematic errors and random errors that were met. Uncertainties/limitations Error Type of error Quantity of error Explanation for error Improvements Measurement in burette Systematic error +/- 0.05cm3 Equipment limitation, this is because the line where each of the reading might not be precise. Different manufacturer should be used with multiple trials in order to increase the accuracy of the calculated value to the literature value. Measurement in pipette Systematic error +/-0.1cm3 Equipment limitation, this is because due to the pipette only holding 25 cm3 of volume. The line could have been where the actual reading might not be Causing the result to not be precise. Different manufacturer should be used with multiple trials in order to increase the accuracy of the calculated value to the literature value. Point of colour change Random error Not quantifiable Human observation – subjective measurement. This is because even though a white tile is used, it is unclear as to what point has the solution gone colourless. Use alternative indicator for several different trials, use pH meter to assess neutralization point. Therefore there will be a more precise point as to when the solution becomes green. Temperature fluctuations Random error Not quantifiable There can be a change of measurements of equipment due to variation in expansion and contraction of materials. Due to the temperatures not being constant from the fan, windows or from the air conditioner. Controlled lab environment of the temperature by using a water bath at 180C with no air conditioner, fans working. To ensure no fluctuations occur. Fluctuations in humidity of room Random error Not quantifiable Change solution concentrations due to differences in evaporation rate in the surrounding air. Controlled lab environment Calibration error in burette Systematic error Not quantifiable 0 line incorrectly marked Divisions on burette inaccurate Use different manufacturer’s equipment for other trials Calibration error in pipette Systematic error Not quantifiable 25cm3 line incorrectly marked. Because it is unclear as to where the true meniscus lies. Causing the values measured out to be not precise. Also due to there being only one line causes a further decrease in the precision of the results. Use different manufacturer’s equipment for other trials to ensure that the accuracy increases. Another improvement that will be done, if the experiment were to be repeated is that due to the inaccuracy of the conical flask being swirled. If the conical flask is being swirled unevenly there is a chance of inaccurate results of when the colourless solution occurs. Therefore a stirring rod should be used to increase the accuracy of the swirls of the reaction in the conical flask. Another limitation that arouse in this experiment that would be improved if the experiment were to be done again is that after the neutralization reaction had occurred, there would still be some residue of the distilled water used to rinse out the equipment. This can be improved by increase the number of repeats of rinse. This would ensure that more of the diluted solution would have been removed. Also the trials can also increase, to 10 repeats so that there is more variance so that the accuracy increases. Another improvement might be, to use different indicator, for example methyl orange. Due to the colour change would be from red to yellow would make it easier for the pH 7 to be more easily recognized against a white tile then it was with phenolphthalein. Cited Sources: 1. http://www.vigoschools.org/~mmc3/c1%20lecture/Chemistry%201-2/Lecture%20Notes/Unit%205%20-%20Acids%20and%20Titration/L3%20-%20Acid-Base%20Reactions%20and%20Titration.pdf

Tuesday, October 22, 2019

Definition and Examples of Colonial Lag in Language

Definition and Examples of Colonial Lag in Language In linguistics, colonial lag is the hypothesis that colonial varieties of a language  (such as American English) change less than the variety spoken in the mother country (British English). This hypothesis has been vigorously challenged ever since the term  colonial lag  was coined by  linguist Albert Marckwardt in his book  American English  (1958). For example, in an article in  The Cambridge History of the English Language,  Volume 6  (2001), Michael Montgomery concludes that in regard to American English, [t]he evidence cited for colonial lag is selective, often ambiguous or tendentious, and far from indicating that American English in any of its varieties is more archaic than innovative. Examples and Observations These post-colonial survivors of  earlier phases of mother-country culture, taken in conjunction with the retention of earlier linguistic features, have made what I should like to call a colonial lag. I mean to suggest by this term nothing more than that in a transplanted civilization, such as ours undeniably is, certain features which it possesses remain static over a period of time. Transplanting usually results in a time lag before the organism, be it a geranium or a brook trout, becomes adapted to its new environment. There is no reason why the same principle should not apply to a people, their language, and their culture. (Albert H. Marckwardt, American English. Oxford University Press,  1958) Colonial Lag in American English There was for a long time a popular belief that languages separated from their home countries, like a bud nipped from its stem, ceased to develop. This phenomenon was called colonial lag, and there were manyincluding, notably, Noah Websterwho argued in particular for its applicability to American English. But though the colonial languages in the New World might have been isolated from their homelands, these languages were not unaffected by their trip to the New World. Colonial lag is, as linguist David Crystal says, a considerable oversimplification. Language, even in isolation, continues to change. (Elizabeth Little,  Trip of the Tongue: Cross-Country Travels in Search of Americas Languages. Bloomsbury, 2012)With ongoing language changes, it is often argued that colonies follow the linguistic developments of the mother country with some delay because of the geographical distance. This conservatism is called colonial lag. In the case of American English it is witnessed, for instanc e, in changes that took place in the modal auxiliaries can and may. Can gained ground in uses previously associated with may earlier and more rapidly in England than in the American colonies (Kytà ¶ 1991).Colonial lag is not, however, in evidence with all linguistic changes. In the case of third-person singular present-tense suffixes, for instance, no such tendency can be observed. (Terttu Nevalainen, An Introduction to Early Modern English. Oxford University Press, 2006) Colonial Lag in New Zealand English Because of the fragmentation of transplanted speech communities, the children of colonial founding populations may lack well-defined peer groups and the models they provide; in such an event, the influence of the dialects of the parents generation would be stronger than in more typical linguistic situations. This is especially true of more isolated settlers children. As a result, the dialect that develops in such situations largely reflects the speech of the previous generation, thus lagging behind.[P]arental origin is often an important predictor of aspects of individuals speech. This provides some support for the notion of colonial lag. (Elizabeth Gordon, New Zealand English: Its Origins and Evolution. Cambridge University Press, 2004)[T]here are a number of grammatical features in the New Zealand archive which can be described as archaic in that we assume that they were more typical of mid-nineteenth-century English than of later periods. One reservation, however, is that a number of grammatical changes which have affected English in the British Isles in the last 200 years have started in the south of England and spread out from there, arriving later in the English north and southwestand then in Scotland and Ireland, if at allwith some considerable time lag. There are a number of conservative features on the ONZE tapes [Origins of  New Zealand  English project] which may therefore be either archaic, or English regional, or Scottish, or Irish, or all four. One such is the use of for-to infinitives, as in They had for to gather the crops. (Peter Trudgill,  New-Dialect Formation: The Inevitability of Colonial Englishes. Oxford University Press, 2004)

Monday, October 21, 2019

The Tasks of Technical Writing

The Tasks of Technical Writing The Tasks of Technical Writing The Tasks of Technical Writing By Mark Nichol If you’ve ever read an instruction manual, you know what technical writing is, though it comes in many other forms. The three basic categories of technical writing are: end-user documentation, which helps consumers build, operate, and/or repair tools, devices, software, and hardware. technical documentation, which includes repair manuals, maintenance guides, and engineering specifications; white papers, research papers, or journal articles; reference guides; and annual reports. marketing copy, such as advertisements, brochures, catalogs, press releases, and home page content. Technical writing is accomplished according to various considerations: Format: Will it be published in print, or online? Will the writer submit raw text to be formatted later, or is the writer responsible for its presentation as well? Source: Will the writer obtain information from one or more people with pertinent knowledge (often referred to as subject-matter experts), from provided print or online resources, from materials the writer will have to identify and locate, or from a combination of sources? Audience: What is the technical ability of the readership? Are readers laypeople, people familiar with but not proficient in the topic, or experts? The expected format determines whether the writer is expected to be an information designer as well, the source(s) determine whether the writer needs interviewing and/or research skills as well as writing skills, and the audience determines whether and to what extent the writer must define or revise technical terms and/or simplify descriptions and explanations. Technical writers must of course have an aptitude for explaining sometimes complicated procedures in clear language. It is also helpful for them to know principles of instructional design and be able to produce and present visual and audio materials to augment or replace written content. In addition, technical writers are often called on to create more than one version of a document to accommodate users with various levels of expertise. But the most important proficiencies for technical writers are problem solving and troubleshooting, because those who create documentation are in the best position to note and respond to obstacles and inconsistencies in its production; like any writer or editor, the technical writer is the reader’s representative, examining documentation from the user’s point of view and ensuring that it anticipates any questions or concerns they may have. The range of professional disciplines in which technical writing is conducted is diverse. Documentation is required in the following areas: computer software and hardware tools and appliances machines and vehicles toys and sports equipment finance and banking science and medicine politics and social policy law and law enforcement Similar job titles include technical editor, information architect, and user-interface designer; people in these roles perform related functions but help refine and format the work of technical writers or produce documentation independently. Considering the array of tasks and the spectrum of subject matter involved in technical communications, if you have a knack for explaining and for organizing and presenting information, you’re likely to find a professional niche that’s right for you. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Business Writing category, check our popular posts, or choose a related post below:How to Format a UK Business LetterDawned vs. DonnedPresent Participle as Adjective

Sunday, October 20, 2019

The Essence Of Power Gandhi v Hitler essays

The Essence Of Power Gandhi v Hitler essays In the late 1800s and the early 1900s the people of northern Europe, southern Africa and Asia were in despair. They had no leaders. They were defenseless. India had been taken over by the British Empire and now the 315 million Indians were under the rule of the 100 thousand British soldiers there. In Germany there were six different political groups; nobody knew what to do. These countries were in shock, they need a change, but more importantly, they needed a leader. Mohandas K. Gandhi was a law student, born and raised in India, but schooled in England. Early on in his career he returned to his birthplace and attempted to practice law there, but he was very unsuccessful. A few years later he moved to South Africa, and again attempted to set up a law practice there. But South Africa was now in British control and the Indian lawyer was subjected to a lot of racial prejudice. Almost immediately he was abused because of his heritage and his law practice went down the drain. Gandhi began to notice the awful discriminations that all Indians suffered from. In 1894 he began a movement that would shape the way that Indians are viewed even today. He began to take charge; he began to lead his people. Adolf Hitler was born in Braunau, Austria in 1889, about the time that Gandhi was realizing his mission in life. Like Mohandas K. Gandhi, Hitler was very smart as a child. Being the son of a public servant, he was able to attend the best schools and was able to partake in any extra-curricular activities he desired. All his father wanted was for his son to follow in his footsteps and attain the rank of public servant or even better, but the boy was very stubborn and when his father refused to let him chase a career as an artist, he decided to stop doing his work, and his grades began to fall drastically. When his father died he quit school and for the next few years lived off his familys money. He did nothi...

Saturday, October 19, 2019

Hypertext and information design Essay Example | Topics and Well Written Essays - 750 words

Hypertext and information design - Essay Example far as hypermedia is concerned, hypermedia can be described as the documents that have the ability information associated to several media, due to which, the information is allowed to be linked by the help of associations. Hypermedia files can be called as multimedia files with hypertext links (Farkas 2004a). Hypermedia has various layers of information. Hypertext is a useful approach as there are many merits attached to it. Hypertext facilitates us with nodes, links and navigation due to which, we do not face the problem of being lost. We can revert to our position if we go wrong with the help of links and navigations (Conklin 1987). The nodes are small chunks of information. The information that is widespread is divided into nodes and those nodes are linked through links and to go from one link to another, navigations are employed. The hypertext documents can exist into two categories: static and dynamic. Static documents cannot be changed but only be read and viewed while dynamic documents can be changed according to the users’ needs. Due to hypertext, the users are helped with user interface due to which, they have a friendly view for information retrieval. Information design is a not an easy task and the designers and developers are required to arrange the nodes of information in a sequential and logical manner (Farkas 2004a). In hypertext, the user uses the tools due to which, he/she is facilitated with an efficient way to deal with information. Information design is facilitated because of hypertexts. Hypertext theory and concepts are useful to the theory and practice of information design. The information that is designed with the help of hypertext is in non-linear format (Conklin 1987). Also information that is designed is in dynamic style as well in static. The static hypertext documents show information design in a format that does not allow the user to input his/her requirements or criteria in the web page. The dynamic hypertext documents show

Friday, October 18, 2019

Recent Trends In the Historiography of Soviet Russia since 2004 Research Paper

Recent Trends In the Historiography of Soviet Russia since 2004 - Research Paper Example This led to the acceptance of the more extensive anti-soviet traditional western account by a majority of the Russian scholars2. Andrei Sakharov indicates that, currently, the russian historical science is vibrant, dynamic and discussive, and is closely associated with global historiography3. These claims seem to be echoed by Kritika in whose pages several informative articles that have, in the recent past, been published to map the evolving ideological constellation of russian histological publications. Mironov argues that, the wall between historical research done in the cities and that done in provinces is diminishing, and so is the wall between Western and Russian historiograhy. Consequently, a community of Russianists is coming into being. In a brief review of the demographics and communication pathway of these lines of thought, Benedict Anderson writes extensively of the school â€Å"pilgrimages,† which encompass the pathways in education that were pursued by â€Å"nati ves† and â€Å"creoles† during the colonial period that gave rise to the notion of a nation in sites4. It is arguable that Russia has become a colony of the west. However, this is optimised by Minorov’s assertion of a progressively more integrated community. In terms of demographics, there are some advancements in the Russian information systems. However, in the post –Soviet era, the prone networks including the science academies and their branches have been eroded and remained only shells. A majority, in the academies, have taken refuge in tertiary institutions, in which they partake in multiple teaching workloads, as a means of survival. Many individuals, in the academic world, are too busy with multi-tasking thus cannot find time to write academic materials. It is evident that many academic institutions are staffed with scientists of a retiring age. Moreover, not many young people find jobs in the academic field to be alluring. Consequently, many scient ists are reported to be leaving for better jobs abroad. Another crucial topic is the mode of teaching of history in learning institutions. A critical examination indicates that a social history can have a significant effect, basing on its approach and debates as presented to the lay community, in schools through textbooks and may corrupt the public memory5. Catherine Marridale notes a significant lack of interest for historological studies, majorly among the younger generation and continual widening of the gap between lay and scholarly lines of specialization. She, at the same time, argues on the persistence of a discursive field in which Russian tropes maintain dominance. For schools and textbooks, during the perestroika era, there was a great interest in history. This is accompanied by a sharp decline, as people are immersed in a struggle to survive and deal with the woes resulting from drastic impoverishment. However, Prime Minister Mikhail Kasianov rekindled the public interest in 2001, on the mode of teaching of history, through his concern about the quality of the Russian history books6. As a result, the government indulged in a competition aimed at finding the top three text books to be used in schools. Consequently, the new standardized school

Oceans and climate change Essay Example | Topics and Well Written Essays - 1000 words

Oceans and climate change - Essay Example However, these changes are not taking place uniformly. In fact, the poles have already experienced the greatest warming, and are expected to continue to warm more intensely as compared to other areas. This has resulted to loss of ice in the arctic regions. Consequently, this has resulted to increase of ocean volume and thus affecting the entire planet. The ocean has experienced an increase in temperatures due to climate change and this has affected the already existing conditions of the living things negatively. On the other hand, El Nià ±o and La Nina have contributed to changes in the oceans. The ocean is an essential aspect of understanding how climate change is affecting the planet. This is due to frequent fluctuation of the climate from cold to warm weather. This paper seeks to focus on the effects of climate changes and how this will affects or has affected the oceans and the people. Firstly, it is essential to note that about 71% of the land surface is covered with the oceans (New England Aquarium 1). These include Atlantic, Pacific, Indian, Arctic and Southern oceans. An ocean acts as the planet largest heat absorber (New England Aquarium 1). This means that as the ocean absorb, store and deliver large quantities of heat, the ocean buffer the climate of the planet (New England Aquarium 1). This means the change in the ocean has irreversible outcomes in future. The first impact of climate change on the ocean is the increase in the oceans levels. This is due to warming of water that in turn results to increased water volume. This is commonly known as thermal expansion. This expansion and warm temperature have resulted to sea rise due to extra water generated from the melting glaciers. Moreover, increased melting has been reported at the ice caps in Greenland and west Antarctica (New England Aquarium 1). This is projected to change one to two feet by 2100 (New England Aquarium 1). The

Find Me product Assignment Example | Topics and Well Written Essays - 750 words

Find Me product - Assignment Example Here you can spend a lot of energy on the nerves of the fact that you have spent a lot of time searching and have not found yet. So, you want quickly and without stress to find lost things. So you want quickly and without straining to find lost things. Perfect for you would be a situation where at any given time you can find out the location of valuable things for you. And it would be good to use for this purpose a minimum of resources. Probably, your life would be easier if these wishes were carried out. Time and nerves you spend to search for another loss would not be stolen from your urgent sessions. In the morning you can without unnecessary upheaval for you to find everything you need (even socks), to have a quiet breakfast and go to work. If your pet has run away again somewhere in an unknown direction, you would not have to anxiously look for it at the vicinity of your home. And the solution that will facilitate your life really does exist. Based on GPS technology, there was developed a new device Find Me. Attach it to the important things for you, always be able to keep track of its location. The design of the device is primarily aimed at convenience and safety when using it. It easily attaches securely to any surface and can be easily removed. Because of its tiny and minimalist appearance it will not hinder you to use those things to which it is attached. After a phone call we can get distracted and forget where we put the phone. And when we need it again, we wonder where it could be put. Great, when we have the opportunity to call our phone to find the loss by the ring sound. But if our phone on silent or if the battery is low, we do not find the phone by the sound. In this case, we can come to the aid of Find Me. Location phone attached thereto Find Me can be found by any of the device with a built-in

Thursday, October 17, 2019

Genetic testing for overall population health Assignment

Genetic testing for overall population health - Assignment Example On the downside, genetic testing could further complicate people’s lives in regards to their health status. It is likely that genetic tests will lead to the realization of genetic conditions that leave patients worried over their health. Such an observation negates the prospects of genetic testing. On the same note, genetic conditions and/or disorders that previously received no serious attention, or those that are not necessarily threatening, could now become the new focus of healthcare practitioners. This could translate to increased costs of healthcare, medical research, and development. Moreover, an ethical concern in this matter relates to possible interference with an individual’s natural and biological genome. For a nurse, it is important to create awareness and promote legal and ethical practices as far as genetic testing is concerned. In essence, nursing plays an important role in promoting overall population health (DeNisco & Barker, 2013). In this respect, a nurse with advanced knowledge is a key driver of the prospects of genetic testing. The idea is to ensure that nurses work under mutual grounds with their patients to ensure proper genetic testing and improved population

Discussion Topic -Forum for Current Events Article

Discussion Topic -Forum for Current Events - Article Example â€Å"Facebook itself had also voiced its displeasure, noting that it explicitly bans fake profiles on its site,† (BBC News). By any standard, this case constitutes a security breach since the complainant did not consent to the creation of a fake Facebook page. In as far as security planning and risk assessment are concerned, it can be noted that the US Justice Department erred by creating a fake Facebook account thought they had a noble intention for doing that. Drug peddling is a serious crime but this should not be taken as a leeway to breach the security concerns of other people. In such a case, it is imperative for the responsible authorities to properly plan their strategies they would use in carrying out investigations relating to this case without posing a security risk to the third party involved. In order to avoid the scenario highlighted above, it is important to carryout risk assessment of the course of action likely to be taken in order to avoid complications with regards to security

Wednesday, October 16, 2019

Find Me product Assignment Example | Topics and Well Written Essays - 750 words

Find Me product - Assignment Example Here you can spend a lot of energy on the nerves of the fact that you have spent a lot of time searching and have not found yet. So, you want quickly and without stress to find lost things. So you want quickly and without straining to find lost things. Perfect for you would be a situation where at any given time you can find out the location of valuable things for you. And it would be good to use for this purpose a minimum of resources. Probably, your life would be easier if these wishes were carried out. Time and nerves you spend to search for another loss would not be stolen from your urgent sessions. In the morning you can without unnecessary upheaval for you to find everything you need (even socks), to have a quiet breakfast and go to work. If your pet has run away again somewhere in an unknown direction, you would not have to anxiously look for it at the vicinity of your home. And the solution that will facilitate your life really does exist. Based on GPS technology, there was developed a new device Find Me. Attach it to the important things for you, always be able to keep track of its location. The design of the device is primarily aimed at convenience and safety when using it. It easily attaches securely to any surface and can be easily removed. Because of its tiny and minimalist appearance it will not hinder you to use those things to which it is attached. After a phone call we can get distracted and forget where we put the phone. And when we need it again, we wonder where it could be put. Great, when we have the opportunity to call our phone to find the loss by the ring sound. But if our phone on silent or if the battery is low, we do not find the phone by the sound. In this case, we can come to the aid of Find Me. Location phone attached thereto Find Me can be found by any of the device with a built-in

Tuesday, October 15, 2019

Discussion Topic -Forum for Current Events Article

Discussion Topic -Forum for Current Events - Article Example â€Å"Facebook itself had also voiced its displeasure, noting that it explicitly bans fake profiles on its site,† (BBC News). By any standard, this case constitutes a security breach since the complainant did not consent to the creation of a fake Facebook page. In as far as security planning and risk assessment are concerned, it can be noted that the US Justice Department erred by creating a fake Facebook account thought they had a noble intention for doing that. Drug peddling is a serious crime but this should not be taken as a leeway to breach the security concerns of other people. In such a case, it is imperative for the responsible authorities to properly plan their strategies they would use in carrying out investigations relating to this case without posing a security risk to the third party involved. In order to avoid the scenario highlighted above, it is important to carryout risk assessment of the course of action likely to be taken in order to avoid complications with regards to security

Plasma Television And LCD Television Essay Example for Free

Plasma Television And LCD Television Essay Introduction Television technology has continued to evolve to be what it is today since the late 1930s when it was first commercially available. Today the television set has become a very basic household commodity in institutions and homes as source of entertainment and news. The T.V. today has evolved from the Cathode Ray Tube (CRT) to such advanced technology like the Plasma and LCD televisions that have taken the world by storm. But what’s the difference between these two latest models? Outwardly the models are almost alike, they are thin and flat. However, they differ in the technology behind them though they deliver almost similar results. (Robert Silva) The technology behind the Plasma television is based on the fluorescent light lamb and the display consists of cells. A narrow gap separates the two glass panels within each cell, where neon-xenon gas is injected and sealed in plasma form in the process of manufacturing. The LCD television on the hand uses a different technology of manufacture. LCD panels that are made of two layers of transparent material are â€Å"polarized† and bound together. (Robert Silva)   A special polymer is coated in one of the layers that hold the various liquid crystals. To create an image, current is passed through each individual crystal, these allows the crystals to pass or block light forming an image. Because the crystals by nature do not produce their own light, external lights like a fluorescent bulb are required to illuminate the created images for visibility. (Robert Silva) LCD television is more expensive than the Plasma television, however most consumers or users are never interested in the technicalities thus do not understand the difference, all they look for is a stylish set to suit their homes. (Robert Silva) REFERENCE Robert Silva: What are the Differences Between an LCD TV and a Plasma TV? Retrieved on 17th March 2008, from http://hometheater.about.com/od/lcdtvfaqs/f/lcdfaq2.htm

Monday, October 14, 2019

Media Representation of Violent Crimes | Race

Media Representation of Violent Crimes | Race The thesis of the paper is, the media representation of violent crimes by African Americans. It has indeed been proven that the media portrays a very negative image on violent crimes as perpetrated by black Americans and this to a large extent ÂÂ  impacts on the law, regulations, and public perceptions on the violent crimes. For instance, a violent crime such as rape has been painted as a grim reality that all of us need to be aware. This has had the effect of even influencing the way law makers perceive rape. It has eventually led to stringent laws being developed to deal with the crime by the blacks. The most notable law in the US history was the one restricting the way in which the sex offender moves through the sex offenders restrictions Act. This paper will succinctly focus on the various media perceptions about the violent crimes and especially the way the media represents violent crimes thus influencing the public perception of the same. The result of the media representation of violent crime by black Americans has been more strict measures being taken that is aimed at curbing the propagation of such crime. Previously as noted, such crimes were often silent and thus the public did not know much about the violent crimes. However, due to the media representation of such violent crimes, crimes such as assault, wife battery have now become more pronounced more than ever. It has therefore become clearly known that the violent crimes are treated with more weight as a result of increased knowledge by the public especially of the violent crimes (Lind, 2004). The media has often been faulted for propagating violence in many forms. The violence that is portrayed by the media actually encourages the vice to continue instead of helping to educate the public in order to avert future problems. It was revealed that most of the news that sells in the media and attracts much attention is news pertaining to violent crimes by the black Americans. We would often turn the volume of our television or radio sets up in order to listen to some shoot out news in which a gangster or police officer was killed or more so to listen to testimonies by witnesses in a rape or robbery case. The body of this paper shall consider the impacts of the media representation on violent crimes by the black Americans. Indeed, criminology theories are often contemporary theories and not standalone theories as perceived by most scholars (Croteau Hoynes, 2000). The theories help to explain the rationale behind what most criminology researchers put forth. In this paper, we shall explain how the media representation of violent crimes impacts on the law and generally on the US regulations in light of the classical criminology theory. Several researchers have explored the media representation of various phenomena, with very few suggesting that the media rarely imparts positive impact on the law and public perceptions on violent crimes. Furthermore, it is imperative to note that the media indeed influences different aspects of the law by painting a stern picture of the violent crimes through emphasizing on the consequences of such crimes and the reality in terms of victims that are left after the perpetration of such violent crime. We shall first begin by looking at the positive impact that the media has on its representation of violent crimes to the society at large. Firstly, it is important to note that most of the violent crimes go against the societal values and core beliefs. This has indeed made the media to point out the reality behind such violent crimes. It is often common to see the media emphasizing on the effects of such violent crimes such as rape. Sometimes, the media even uses real victims to succinctly convey the message. This has left several impacts as insinuated by several researchers. A lot of research has been done to determine the spate of media influence on the violent crimes to the society. Critics suggest that the media has made the publics perception about violent crimes by the black Americans to change. This has observably changed for the worse. Consequently, research has shown that violent crimes could be effectively be dealt with at a higher level by the law enforcement agencies. What is most important is the awareness by the general public. The media therefore plays a pertinent role in fostering this. Maguire, Morgan and Reiner (2007) reveal that the picture painted by the media on violent crimes by black Americans such as rape has made the law makers to realize how serious the violent crime can affect the society. In particular, law makers have become more aware of the factors that actually lead to the propagation of violent crimes so that they may effectively pass laws that will ensure that the activities that lead to the violent crime or at least contribute to the violent crime are kept in check. For instance, rape in the media was portrayed as emanating from the activities of idle boys and the youth who apparently did not have anything to do. This in turn made the law makers to seek ways of preoccupying the youth in a more constructive manner. Therefore, the youth development projects were formed to take care of the needs of the youth. Apparently, the youth in California were found to be engaged in various activities (Greer, 2003). Some of these activities were not so construc tive as such. Therefore, the law makers formulated laws that effectively ensured that the youth were well occupied. This therefore meant that the youth could be engaged in educational as well as community activities. Consequently, the media representation of the violent crimes made it easier for the public to perceive violent crime as an emerging crime that was previously hidden under the pillow. This therefore apparently enabled crimes such as assault and domestic violence to emerge and become topical issue in the media as well as in the public forum. The result of this therefore was that the public became more aware of the effects of violent crime, specifically, domestic violence and assault as well as rape. Thus, the media has been extremely successful in exposing such crimes to the public knowledge. The public has responded by being more vigil in terms of fighting the crime through community oriented initiatives. The media in conjunction with the police bring to the attention of the public certain crimes that they would have otherwise been ignorant of. The media continues to be ardent in exposing criminal activities and syndicates. The most recent syndicate to be exposed was that of track it which apparently fleeced unsuspecting citizen of millions of dollars. Apparently some of the renowned black Americans were connected to this syndicate which was accused of defrauding the public of their innocently earned money. This way, the media ensures that unscrupulous business entities are busted and their licenses ceased. Lind (2004) suggests that the spate of crime by the Black American is on the rise and if nothing is done to address the root cause, then it is likely that this could escalate beyond repair. The society at large subsequently instigated steps that were meant to curb the growing trends in the violent crimes. The trends of such violent crimes can thus be monitored and steps taken by the law makers and the public to mitigate it. This has therefore had the positive effect of reducing the incidences of violent crime within the society setting. Stenson and Sullivan (2001) insinuate that the media alert on violent crime has helped the public to specifically improve their response to such crimes thus reducing the occurrences of such crimes. In particular, the public has become more receptive in helping the police to monitor such kinds of crime through the community oriented policing modules. In her book, Lind (2004) reveals that the media indeed portrays race as a contributory factor towards the violence as seen in most of the scenes of violence. The black Americans are particularly faulted for being boisterous in terms of their propensity to propagate violent crimes. In the United States, nearly half of those individuals who are incarcerated are black Americans. This indicates a worrying trend that must be mitigated. The media also revealed that the state of Texas had been coarsely affected by the increase in the number of inmates who had been incarcerated by the federal government. The federal government on the other hand has the relevant statistics necessary to formulate the necessary measures aimed at averting the vice of violent crimes. Media is the mouthpiece of the society. The society has come to believe the media in most of the aspects pertaining to the society in general. Therefore, it is the onus of the media to ensure that they consistently inform the public of the various happening and to subsequently effectively warn the public of a growing trend. The public is therefore receptive of such happenings that will affect its perceptions as propagated by the media. More often, the media simply According to Davies, Francis and Greer (2007), crime occurs where the benefits outweigh the costs. This is the definition of the classical theory of criminology. The classical theory of criminology therefore goes ahead to state that when people are after self interest, with the lack of presence of punishment that is tangible or even intangible, crime occurs. Therefore what this means is that the violent crime occurs as a result of lack of knowledge by the general public. This also means that the media serves as an important vessel in mitigating crime by the blacks through effectively monitoring crime prevalence. Media has been very successful due to its ability to reach multitudes of people at the same time thus ensuring that information is conveyed to masses. The law makers also serve to formulate laws that ensure violent crime by black Americans is kept in check (Miller, 2003). This could not be possible without the contribution of the media in highlighting the areas of violent cri me that the law makers need to focus on. Moreover, this will have a ripple effect in ensuring that the violent crime does not continue and is effectively put under check. The classical theory also states that crime, and violent crime for that matter is a free will and upon an individuals choice. The people who propagate crime are therefore people of sane mind, body and spirit. Therefore, what this means is that violent crime by the black Americans has indeed been a matter of choice. According to Muncie and Wilson (2004) issues regarding choice can only be eliminated through publicity and increasing awareness. This as earlier mentioned can best be done by the media. The media has for ages painted a grim picture of violent crime and been against it in totality. This has therefore meant that the violent crime incidences have been shunned by the society in general and thus led to a decline in cases involving violent crime. On the other hand, the media has negative impact in terms of the image that it paints in relation to the violent crime on the society as well as the impacts that it has had on the laws and regulations. Greer (2003) notes that the media has overblown the issue of violent crime beyond proportion thus making it difficult for the determination of the true magnitude of the violent crime and the extent to which it should be shunned The consequences of this have been thorough in terms of influencing the way law makers perceive violent crime. It is also true according to the classical theory of criminology that the violent crime by black Americans is the brain child of a society that lacks direction. This is indeed a wakeup call for the law makers and the relevant administrators to take up the challenge and rise up to the occasion as pertains to ensuring that the perpetrators of violent crime are dealt with. Maguire, Morgan and Reiner (2007) concur by suggesting further that the law makers have accorded strict punishment to some of the violent crimes such as assault thus putting the perpetrators who may have acted under self defense to thorough capital punishment. Similarly, the law makers have been very mean in terms of passing amendments meant to reduce the punishment accorded to the perpetrators. Critics suggest that the best form of punishment that would be suitable for the perpetrators of violent crimes would be serving several years behind bars and then community service for a couple of years (Davies, Francis Greer, 2007). The media representation of violent crime by blacks Americans has therefore left very stern action taken by the law makers. Furthermore, the public at large have been left with a very bad perception. Greer (2003) suggests that the public now view most of the violent crimes by the black Americans as gross. This has made the public to take very stern action while dealing with the perpetrators of such violent crime such as rape. The public has therefore become autonomous in terms of judging a person suspected to have perpetrated the violent crime and subsequently played the part of the court or judicial system. This has made the public to take law into their own hands and set ablaze or even brutally killed the perpetrators. The classical theory of criminology further supports the fact that violent crime is caused by an individuals volition. This volition should be turned for the good of the individual through encouraging good behavior within the community and thus effectively rehabilitating a violent crimes perpetrator. Stenson and Sullivan (2001) suggest that the media has effectively denied the perpetrators of violent crime the chance to change and be part of the society. This theory further supports a no-crime environment through solving crime from its roots. Therefore, the law enforcement agencies will have a very smooth ride due to the implementation of these theories. The other important negative impact of the media representation of violent crime by the black Americans has been that individual especially the teenagers who are apparently below the age of majority have been exposed to violence at a tender age. The media has therefore succeeded in changing the perception of such age groups of violent crimes since they view this as a normal happening and therefore they grow up knowing that violent crime by the black Americans is part of the society. Muncie and Wilson (2004) suggests that it is usually very difficult to change such perception. In fact, the teenagers perception of violent crimes by the black Americans is so grim such that some of them even aspire to perform the same acts that the media condemns. Too much exposure to violent scenes is not good for the development of the teenagers. Recently, there has been a huge outcry on how the media portrays violent crimes by the black Americans without discretion to the populace. It is important to note that the populace consists of diverse ages. It is ethically wrong at least according to Greer (2003) from the media to show violent crimes to the youth. It can therefore be concluded that the classical theory is indeed the most effective in explaining the media representation of violent crime by the black Americans and advancing the ways that we can deal with such perception and representation to develop more positive laws and regulation as pertains to curbing the incidences of violent crimes. Therefore, the media has been more beneficial more than detrimental to the general public through the various sensitization programs that it advocates for in totality. Crime rates by the black Americans have been effectively reduced due to the proactive nature of the media towards informing the public and the police together with other law enforcement agencies of the impending violent crimes and their consequences.

Sunday, October 13, 2019

Scandle in the church :: essays research papers

Headlines were captured in February by the tragic reports that as many as seventy priests in the Archdiocese of Boston, Massachusetts, allegedly have abused young people whom they were consecrated to serve. In the wake this news, allegations of sexual abuse by Catholic priests have sprung up nationwide. It is a huge scandal, one that many people who dislike the Catholic Church because of its moral teachings are using to claim that the Church is hypocritical and that they were right all along. Many people have come up to priests like myself to talk about it. I imagine many others have wanted to but have refrained out of respect or from not wanting to bring up bad news. We need to tackle the issue head-on. We cannot pretend it doesn't exist, and I would like to discuss what our response as faithful Catholics should be to this terrible situation. The Judas syndrome The first thing we need to do is to understand this scandal from the perspective of our faith in the Lord. Before he chose his first disciples, Jesus went up the mountain to pray all night (Luke 6:12). He had many followers at the time. He talked to his Father in prayer about whom he should choose to be his twelve apostles-the twelve whom he would form intimately, the twelve whom he would send out to preach the good news in his name. He gave them power to cast out demons. He gave them power to cure the sick. They watched him work countless miracles. They themselves worked countless others in his name. Yet one of them tuned out to be a traitor. One who had followed the Lord-who had seen him walk on water and raise people from the dead and forgive sinners, one whose feet the Lord had washed-betrayed him. The gospels tells us that Judas allowed Satan to enter into him and then sold the Lord for thirty pieces of silver, handing him over by faking a gesture of love. "Judas," Jesus said to him in the garden of Gethsemane, "would you betray the Son of Man with a kiss?" (Luke 24:48). Jesus didn't choose Judas to betray him. But Judas was always free, and he used his freedom to allow Satan to enter into him, and by his betrayal Jesus was crucified and executed. But God foresaw this evil and used to accomplish the ultimate good: the redemption of the world.

Saturday, October 12, 2019

Japanese Identity Essay -- Japan Culture History Essays

Japanese Identity Throughout its history, Japan has striven to define its national identity not by its own means, but by those predefined by foreign, and most recently, Western powers. Despite legends of the island archipelago being created by the sun goddess Amaterasu, Japan seems to have consistently maintained a indecisive self-image with respect to its neighbors. In the past, China had represented the pinnacle of culture and technology and had tremendously influenced other surrounding countries in Asia and in the world. Indeed, Japan owes its written language to imported and adapted Chinese characters. Without question, China remained for a long time the most influential force upon Japan. However, island nation maintained a rather precarious self-identity: How could a country like Japan, which was supposedly created by the gods and therefore a divine nation, consider itself the apex of the world, given China’s tremendous influence and power? Could Japan truly consider itself the greatest l and in the world if China, or Chugoku in Japanese, literally meant â€Å"the central country?† For this reason, Japan never truly accepted a position of â€Å"belonging† to Asia. That is, despite a considerable amount of imported culture, Japan was still somehow inherently different from other Asian countries. So, if Japan does not â€Å"belong† to Asia, does it belong to some other amorphous collection of nations, namely Europe or the West? Certainly in the modern post-WWII era Japan has seen phenomenal economic growth, even to the point of threatening the US as the primary global economic power during the height of the â€Å"bubble economy.† Some credit this success to the changes implemented during the US occupation. Undoubtedly without US assistan... ...th can be seen walking around in some of the most bizarre looking clothing. I once saw a young girl wearing a swan dress not unlike the one worn by Bjork. I have seen some of the worst â€Å"fashion faux-pas,† with severely conflicting colors, completely mismatching styles of the top, bottom, and shoes, makeup seemingly done by a five-year-old. As one might like to hope that these styles were mistakenly created by the individual, it is clear that they are intended, whether for shock value or for personal satisfaction. It seems as though in places such as Harajuku, the more â€Å"unique,† the better. While Miyake seemed to have far reaching consequences for Japanese identity on the international level, Kawakubo’s constant questioning of societal norms helped foster individual deviations, thereby creating a new identity which, ironically enough, is not limited to or by itself.

Friday, October 11, 2019

Mainframe computer Essay

Hardware and Software Components BUS 210 July 8, 2011 Brian Wirpsa Axia College Material Appendix E Hardware/Software Components In your own words, describe the following hardware/software components Legacy systems| The legacy systems are the IT system as a whole for a company. The legacy system is computers, hardware, and software needed to run an IT system. | Mainframe computers| Mainframe computers were the hub of a company’s IT system information. They were large, used mostly for number crunching, and only accessible by company managers. Later, although they remained expensive minicomputers were made that were used for word processing, and more readily available for other function departments to use. | Microprocessors| Microprocessors are the software components that help to make the personal computer possible. Microprocessors are essentially the brains inside of a pc. | PCs| PC’s or personal computers are much smaller than mainframe computers and made for individual use. They were computers that use software that any individual can use and within a business held a connection to the company’s mainframe. Network computers| Network computers act as the middleman in the communication between the pc and a company’s mainframe. This group of pc’s connection to the mainframe server called a â€Å"land area network† acts as a landline for the network of computers located in the same building. | World Wide Web and Internet| The world wide web is a connection worldwide to any and every computer in the world. The world wide web allowed information to be transferred to and from anywhere in the world via the internet. With wires, cables, Ethernet wires, and routers is how The internet was able to transfer information. | Wired and wireless broadband technology| Wired broadband technology is the use of the internet through wires that transmit data at a slow speed. Like a tunnel, wired internet technology must move slowly through the small space provided by the wiring. Wireless technology uses no wiring, therefore that tunnel is now wide open with more space and room for data to transfer at a higher rate of speed. PC software PC software is the brains that operate the computer. PC software is what is used to connect all functions of a computer together to work such as the hardware components and the software itself. | Networking software| Networking software is the second brain for a computer that allows it to connect to a company’s servers and company pc’s. | Computer security software | Computer security software is the protective shield or skull for a computer that prevents outsiders from entering a computer system and taking vital information.

Thursday, October 10, 2019

Elementary English In Overcrowded Classes Education Essay

Learning Elementary English in Overcrowded Classes for True Beginners at Universidad Autonoma de Santo Domingo ( UASD ) . Santana, Isaias, 2010: The proposal, NOVA Southeastern University, Fischler School of Education and Human Services. Learning/Overcrowded Classes/Large Classes/ True Beginners/ False Beginners/Educational Research. The intent of this survey will be to find if there are differences in larning simple English for true novices in overcrowded categories, and if the application of 5 pedagogycal learning tecniques will better the learning acquisition procedure. This research will compare 2 set of groups of overcrowded schoolrooms ( experimental and traditional ) utilizing 5 learning tecniques with 2 groups of ideal categories in which the 5 learning techniques will be applied to see if there are a important difference in the learning procedure of true novices in overcrowded categories. Findingss will be based on standardised achievement trial of the method Standard that these pupils use in simple English categories at UASD. Table of Contentss Chapter 1: Introduction aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ 4 Nature of the job aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦.4 Background and significance of the job aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦aˆÂ ¦aˆÂ ¦.5 Purpose of the survey aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦6 Research inquiries aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..6 Null hypothesis aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦7 Hypothesis aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..7 Definitions of termsaˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦7 Chapter 2: Reappraisal of the literature aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦.12 Surveies based on overcrowded categories aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦10 Negative effects of overcrowded classesaˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦10 Techniques to learn overcrowded categories aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..14 Chapter 3: MethodologyaˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ . 17 Participants aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦ 17 Instruments aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦ 17 Procedures aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦ . 17 Restrictions of the studyaˆÂ ¦aˆÂ ¦.aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦aˆÂ ¦.19 Anticipated results aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦aˆÂ ¦.19 Timeline aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦..aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ . 19 Evaluation program aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦19 Implementation matrix aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ †¦ .21 Mentions Chapter 1: Introduction Learning to pass on in English is of a great importance for the pupils of the modern linguistic communication calling at Universidad Autonoma de Santo Domingo ( UASD ) . However, the sum of pupils enrolled in the university is over 160, 000 which makes most of the classs to be overcrowded. This state of affairs goes to detriment of the acquisition procedure, specifically, in the simple degrees in which the pupils should hold on the footing to get the hang the linguistic communication. For that ground, it is required to look into the effects of overcrowded categories in the acquisition procedure to acquire feasible solutions to the teaching-learning procedure of the English linguistic communication in order to place learning techniques that help to better the proficiency of the pupils in simple English categories. Nature of the job Universidad Autonoma de Santo Domingo ( UASD ) is the public university of the Dominican Republic which has faced a encouragement in the registration of pupils every twelvemonth due to the fact that going a unmarried man or acquiring a unmarried man grade is the demand to acquire a nice occupation chance in the state. Therefore, pupils in the Dominican Republic at the minute of analyzing at the university degree have two ways. One is traveling to a private university, and the other 1 is traveling to the populace university which has a figure of features, such as prestigiousness, tradition, low tuition, and subdivisions around the state among other elements. These features make UASD really attractive for most Black friars at the minute of taking a university. As a consequence, the figure of pupils has increased over160, 000. This sum of pupils has been maintained from 2007 to 2009 harmonizing to the statistic office of the university. For this ground, the professors of the Languages D epartment have to work with categories from 30 to over 50 pupils. This fact has made the instruction procedure hard to manage, so this state of affairs is damaging for the teaching-learning procedure in the simple English degrees in which true novices struggle to hold on the minimal cognition of the English linguistic communication in order to go through the degree, but non to larn the linguistic communication decently. Therefore, the intent of this research will be to find the troubles in larning simple English in overcrowded categories for true novices at UASD ( Santo Domingo ) in order to implement learning techniques to better the acquisition procedure. Background and significance of the job UASD is the public university of the Dominican Republic which in 1966 changed its doctrine to an unfastened and critical university for the multitudes ( Cuello et al. , 2007 ) . This doctrine and the demand of acquiring a grade made the enrolment rate triple the sum of pupils from 1995 to 2004 ( Brea, 2004 ) . In the last three old ages, the university maintained the figure of pupils over 160,000 from the twelvemonth 2007 to 2009 harmonizing to the statistic office of this university. Universidad Autonoma de Santo Domingo Planning University Office Old ages 2007-1 2008-1 2009-1 Entire 166, 228 166, 603 166, 818 These Numberss represent the sum of the pupils in the first semesters of these old ages. As a consequence, the categories in the university have to be arranged over 50 pupils per subdivision harmonizing to the assignment plan of this university. The Languages Department is non the exclusion to this tendency of overcrowded categories ; so the simple English categories are allowed to be overcrowded which hampers the teaching-learning procedure of pupils. Harmonizing to Slavin ( 1989 ) showed that advantages of a decreased category size are more evident when the figure of pupils in the category was fewer than 20, ideally between 15 to 19. Therefore, this research will show that English Learners who are true novices at UASD ( Santo Domingo ) face troubles in larning English decently to use learning techniques to better the acquisition procedure. This research will be carried out with the Elementary English degrees of the modern linguistic communication calling at UASD, and the consequences will assist to understand the acquisition procedure that true novices face analyzing in overcrowded categories. Furthermore, this research will give possible solutions or penetrations to the Dominican Republic and other topographic points around the universe where the conditions are similar in order to better the teaching-learning procedure. Purpose of the survey The intent of this survey will be to find if there are differences in larning simple English for true novices in overcrowded categories, and if the application of 5 pedagogycal learning tecniques will better the learning acquisition procedure. Therefore, this survey will compare true novices in overcrowded traditional schoolrooms with true novices in overcroweded schoolrooms in which a set of predetermine learning techniques will be applied. These consequences will be compared with true novices in an ideal schoolrooms in which the same set of predetermine set of learning techniques will be applied to understad if the application of predetermine pedagogycal techniques will hold an impact in the teaching-learning procedure of true novices in overcrowded categories. Research inquiries 1. Is there a important difference in tonss between true novices in traditional overcrowded categories and true novices in overcrowded categories in which 5 pedagogical instruction techniques are applied? 2. How do true novices who are in traditional overcrowded categories score in comparing with pupils in ideal categories in which 5 pedagogical instruction teachniques are applied? 3. Is there a important difference in tonss between true novices in overcroweded categories in which 5 pedagogical instruction techniques are applied and true novices in ideal categories in which 5 pedagogical instruction techniques are applied? Null hypothesis There will be no important differences between the tonss of true novices in the intervention groups ( overcrowded and ideal categories ) and true novices of the control of the control groups ( traditional overcrowded categories ) after the intercession. Hypothesis There will be important differences between the tonss of true novices in the control groups ( traditional overcrowded categories ) and true novices in the intervention groups ( overcrowded and ideal categories ) after the intercession. Definitions of footings In this thesis will be used footings that need to be explained in order to avoid any uncertainties in the reading of this research. The followerss are: Learning. Though the old ages, many bookmans have given different definitions of the construct depending on their school of idea. In this research will be reviewed the most outstanding definitions in order to follow the definition of the construct that will be used throughout the research. The followerss definitions are: Harmonizing to Hoy and Miskel ( 2005 ) , the modern behavioural attack to larning merged from the scholarship of Skinner and his Followings. The behavioural attack defines larning as a changed in behavior brought approximately by experience with virtually no concern for the mental or internal procedures of think ( Hoy and Miskel, 2005, p41 ) . Therefore, in this school of idea can be perceived that larning alterations the behaviour of the pupils. Hoy and Miskel ( 2005 ) points out that the cognitive attack perceives larning as an active mental procedure of thought, acquisition, retrieving, making and job resolution. Therefore, this attack defines larning as an internal mental activity that can be observed straight through apprehension, retrieving and utilizing new information logically. The societal constructivist attack perceives larning as a procedure in which the pupils have to be actively involved to detect rules, constructs and facts for themselves, Hence, the importance of promoting guessing and intuitive thought in scholars ( Brown et al. 1989 ; Ackerman 1996 ) . Furthermore, other pedagogues in the constructivist field agree that people get intending thru the interactions among them and with the environment around them. For that ground, they believe that cognition is a merchandise built by human existences thru societal and cultural interaction ( Ernest 1991 ; Prawat and Floden 1994 ) In the constructive field, McMahon ( 1997 ) besides states that larning is a societal procedure. Besides, he says that larning non merely is developed in our heads, nor is it a inactive act of our behaviour formed by external forces. He extrongly believes that meaningful acquisition appears when human existences are involved in societal activities. Another point of position in the same dogma is stated by Vygotsky ( 1978 ) in which he besides highlighted the convergence of the societal and practical elements in acquisition by stating that the most important minute in the class of rational development occurs when address and practical activity, two antecedently wholly independent lines of development, converge. Therefore, through practical activity a kid constructs intending on an intrapersonal degree, while speech connects this significance with the interpersonal word shared by the kid and her/his civilization. The term acquisition can be viewed or defined depending on the point of position that is adopted for its reading. Other bookmans that have given a definition to this construct are: Woolfok ( 1999 ) , and Hoy and Miskel ( 2005 ) expresses that larning occurs when experience produces a comparatively lasting alteration in the person ‘s cognition or behaviour, alteration that can be deliberated or non, to acquire better or worse. Another definition is given by Brown ( 2000 ) who perceives this construct in a complex manner impossible to be summarized in a simple definition. Therefore, he shows each one of larning ‘s features, such as acquisition or acquiring, keeping of information or accomplishments, cognitive organisation, memory, witting focal point on and moving upon, comparatively lasting but capable to forgetting, reinforced pattern, and a alteration in behaviour. In this research, acquisition is understood to be a complex construct. However, the definition that will be taken along the probe is the one given by Hoy and Miskel ( 2005 ) in which they perceive that larning happens when experience produces a stable alteration in person ‘s cognition or behaviour. Overcrowded categories. This term is besides referred as big categories. For that ground, it will be defined utilizing the facts given in some articles: In an article online Paulsen ( 2006 ) shows the determination in which The Vancouver Secondary Teachers ‘ Association provinces that a schoolroom with more than 30 pupils is overcrowded. Therefore, it exceeds new provincial bounds. Another article in which the term overcrowded categories is used to show that a category with more than 25 is Overcrowded categories haltering Kerry childs ( 2008 ) in which a Killarney Town Council member, Sean O'Grady told: There is no maximal size for categories in Ireland but it should be reduced, as a affair of utmost urgency, to the European norm which is 25 per category and 15 per category where there is chronic disadvantage. In this research, it will be assumed that an ideal category is composed of less than 20 pupils as it was stated by Slavin ( 1989 ) . Therefore, it will be assumed that an overcrowded category is composed by more than 24 pupils in a schoolroom. False Beginners. There are many definitions of false novices which can give an thought of the construct. One of them is the definition given by Macmillan English Dictionary â€Å" false novices have some apprehension of the rudimentss of English, but they can non utilize it really good. They may give the feeling that they know small or nil of the linguistic communication † . Another bookman who gives a definition of this construct is Helgesen ( 1987 ) in which he states that false novices understand the footing of the linguistic communication and can be involved in activites which need some truth of the linguistic communication. However, they have limited accomplishments in the linguistic communication when they are involved in activites that need eloquence of the linguistic communication to be developed. Harmonizing to Richards, et Al. ( 1985 ) , false novices are pupils who have had some sort of direction in the linguistic communication, but they have developed limited linguistic communication proficiency. For that, ground, they have been classified at the get downing degree. False novice pupils can be compared with true novice pupils, as true novices do non hold any cognition of the linguistic communication to be studied. The term has besides been studied in Japan due to the large sum of pupils that they receive each term. Harmonizing to Peaty ( 1987 ) , false novices are those pupils that enter a university in Japan usually with a background of six old ages of school English based on the survey of grammar and interlingual rendition of sentences. However, the true novices have ne'er learned or have wholly forgotten. For that ground, this writer explains that false novice pupils in Japan knows a batch of English, so they can utilize this cognition to develop litsening and speech production accomplishments which were neglected at school. True novices The term true novice is defined in the MacMillan Dictionary as pupils who know perfectly nil about English and hold had small or no contact with the linguistic communication. Therefore, for this probe a true novice is the pupil that has non been exposed to the linguistic communication earlier. Chapter 2: Reappraisal of the Literature This research will analyse the effects of overcrowded categories in simple English degrees in the learning procedure of true novices. The subject of overcrowded categories is non new and it has appeared many articles around the universe which denounce the damaging effects in the teaching-learning procedure. However, a few surveies have been dedicated to analyse overcrowded categories. This reappraisal of the literature will be presented in two parts. The first portion will demo the surveies and articles based on overcrowded categories, and the 2nd portion will show techniques to learn overcrowded categories. Surveies on overcrowded categories Research has shown that the advantages of a decreased category size are more evident when the figure of pupils in the category was fewer than 20, ideally from 15 to 19. In a 1989 Slavin survey, categories of fewer than 20 pupils were compared to well larger categories, and pupils in both groups were comparable in demographics and educational ability. Therefore, Slavin ( 1989 ) found that decreased category size had a little positive consequence on pupils that did non prevail after their decreased category experience. Another research is the Tennessee ‘s Project STAR ( Student-Teacher Achievement Ratio ) spent four old ages looking at kindergarten, first- , second- , and third-grade schoolrooms, which began in 1985. STAR compared categories of 13 to 17 pupils with categories of 22 to 26 pupils. Participating instructors did non have any professional preparation on learning reduced-size categories, and were indiscriminately assigned to the categories. The survey included 79 schools, more than 300 schoolrooms and 7,000 pupils. The consequences of the experiment showed that pupils in the smaller categories outperformed those in the larger categories on both standardized and curriculum-based trials. This was true for white and minority pupils in smaller categories and for smaller category pupils from inner-city, urban, suburban, and rural schools. These consequences have besides been supported by Hanushek ( 1994 ) . In the United States, in 1999 Vice President Al Gore criticized the pattern of â€Å" crowding all pupils into overcrowded, factory manner high schools † and Education Secretary Richard Riley suggested cut downing school size to turn to issues of pupil disaffection. Riley told the National Press Club that the state needs to â€Å" make little, supportive acquisition environments that give pupils a sense of connexion. That ‘s difficult to make when we are constructing high schools the size of shopping promenades. Size affairs. † ( Gore and Riley cited in Mitchell, 2000, p.12 ) . Furthermore, Winerip ( 2003 ) in an article for the New York Times states that public schools opened in New York studies of widespread schoolroom overcrowding. Another article with denounces about this subject is written by Rezonable ( 2007 ) in which he mentions that the California State University is confronting jobs with overcrowded English categories for freshers every bit good as in Chicago where Chicago Public Schools have ordered all 595 of its schools to convey category sizes under control and the Chicago Teachers Union has vowed to look into herding ailments Dell ‘ Angela ( 2005 ) . The same state of affairs is stated in Ireland in an article of The Kingdom ( 2008 ) in Which Killarney Town Council member, Sean O'Grady, show that 20.5 per cent Kerry pupils learn in categories of 30 or more, in blunt contrast to European norm of merely 25 per category in countries of chronic dis-advantage. O'Grady has called for politicians in the county to take stock of where they stand in relation to category size and the status of the adjustment of the schoolroom. Furthermore, another article from Vancouver denounces troubles of larning in overcrowded categories. This article written by Paulsen ( 2006 ) shows that a survey finds 30,000 Vancouver pupils are in overcrowded categories. Negative effects of overcrowded categories There are many bookmans who have spoken about the negative effects of overcrowded categories on pupils ‘ academic public presentation, such as Snow ( 2000 ) in the McGill Tribune in which he expresses that harmonizing to his learning experience, in big, particularly overcrowded categories, pupils do non make every bit good as those in little categories. He besides states that pupils learn more in little categories and Markss tend to be better. However, in big categories, the lone thing a instructor can make is to talk. The instructor can non hold much treatment with pupils. Another article that mentions the negative consequence of overcrowded categories in California is The Crisis ( 2008 ) . This article states that pupils in overcrowded schools pay less attending, achieve less, and experience more force. Furthermore, Konare ( 1994 ) in the English Teaching Forum states that the first job concerns the existent engagement of all the pupils in the reading activities set by the instructor. What happens all excessively frequently in big ( overcrowded ) categories, when the replies to comprehension undertakings are given orally, is that the activity is dominated by a little minority of the best pupils. Most of the category does non even hold adequate clip to complete reading, allow entirely to explicate their replies, before the quick, bright, or pushful few are beckoning their weaponries about and coercing the gait of the lesson, forcing the instructor to name on them to reply. Furthermore, Konare ( 1994 ) states that the defeat of the weaker pupils causes them to choose out of more and more reading activities cognizing that they will non hold clip to finish them and most probably will non be asked to reply. Therefore, the spread between the few best pupils and the soundless bulk widens s teadily, even though the instructor is puting the right kind of undertakings to develop all the pupils in the reading procedure. The instructor may be cognizant that many pupils are non take parting, but the instructor may experience it is their mistake because of their degree. In add-on to the troubles mentioned above, Hughes ( 2006 ) in an article for the English Teaching Forum states that a well-known and relentless job with learning English as a Foreign Language ( EFL ) in overcrowded categories is the deficiency of resources, and that such conditions are an mundane world for many instructors around the universe. However, he found the challenges in Indonesia to be about overpowering. Finally, UNC Charlotte Faculty Center for Teaching ( 2000 ) lists the types of challenges to learn a big ( overcrowded ) category. These challenges are the followerss: 1. Paperwork which means that instructors have to look into assigments, grade tests, fix lesson programs, fix their categories, etc. 2. Deal with distractions in the schoolroom, such as pupils ‘ speaking, acquiring late, and go forthing early. 3. Learn pupils ‘ names in order to take attending, actuate them to take part in category, motivate pupils to make assigments on clip, 4. Lack of flexibleness in category activities at the minute of altering activities, making group work and actuating critical thought and composing accomplishments. 5. Divers pupils ‘ degrees and background. On the other manus, pupils in overcrowded categories besides experience of import challenges in their acquisition, particularly if they are new to the college experience. These include: 1. Trouble to understand wheather information is relevant. 2. Doubtful at the minute of inquiring inquiries and in some instances demoing deficiency of cognition. 3. Uncomfortable to be smart in forepart of schoolmates ( the swot expletive ) . 4. Trouble to pull off clip to analyze and miss of accomplishments necessary for success. 5. The usage of namelessness to dispute authorization and to force boundaries. Techniques to learn overcrowded categories Harmonizing to Duppenthaler ( 2000 ) overcrowded categories are non needfully something to fear. However, instructors face a figure of challenges, such as identifying pupils among several overcrowded categories at the same clip, supervising pupils ‘ single advancement, placing pupils ‘ single linguistic communication strengths and failings, being able to react to the pupils as persons, with involvements outside the schoolroom. Duppenthaler ( 2000 ) presents a manner to work out these challenges of big categories. Therefore, he has created exposure axial rotation cards which are a fluctuation on the standard axial rotation book, and they are really effectual in placing, monitoring, recording, and reacting to pupils. Therefore, they make larning and learning more effectual and more gratifying. UNC Charlotte Faculty Center for Teaching ( 2000 ) describes some options to utilize Technology in a assortment of ways in big or overcrowded categories. These options are the followerss: 1. To utilize power point or a similar plan to do presentations in category. This allows teacher to show lineations, and lists of cardinal constructs. 2. To utilize Excel or a similar plan to pull off category lists. 3. To fix a set up a category newsgroup or an electronic mail list ( through listserv ) , Students can inquire inquiries and acquire aid from other pupils. 4. To make a class web site that contains pattern jobs, replies to try test inquiries or prep, a glossary of footings, etc. 5. To make a searchable trial bank of inquiries ( utilizing FileMaker Pro, for illustration ) . This is particularly utile when you have to give multiple versions of the same inquiries. 6. To widen your office hours through electronic mail. 7. To give quizzes or trials. Chapter 3: Research Methodology Participants UASD is the public university of the Dominican Republic, and the figure of pupils from 2007 to 2009 is over 166,000 harmonizing to the statistics office of the university. This sum of pupils has made that most of the subdivisions in this university are overcrowded. Therefore, the linguistic communications section is non the exclusion to this tendency, so most of the subdivisions of Elementary English 1 have increased to 50 or more pupils per subdivision which hampers the learning learning procedure of these pupils. Another of import feature to this research is that the pupils in these English subdivisions are Dominicans, and many of them have small or no cognition of the English linguistic communication Instruments The information will be collected through a pre-test to find the degree of the pupils. This pre-test will demo whether the pupils are true or false novices whereas a post-test will be used to find the pupils ‘ degree at the terminal of the procedure which will demo whether there are troubles or non for the pupils who study under these conditions. These trials will be prepared by the research worker following the plan of the university for simple English 1. Procedures To find the effects of larning English in overcrowded categories, it will be prepared a quasi-experimental survey in which will be selected three groups composed of two subdivisions each. These groups will be called Group A, Group B, Group C. The first group or Group A will be composed of two subdivisions of overcrowded categories which will be taught in a traditional manner, and it will be given a pre-test to find the true and false novices. Finally, the post-test will bespeak how the true novices learn under this status. The 2nd group or Group B will be two subdivisions of overcrowded categories in which will be used the intervention or techniques to learn overcrowded categories. These two subdivisions will be given a pre-test to find the true and false novices, and a post-test to obtain the consequences of how the true novices learn under these techniques. The 3rd group or Group C will be two subdivisions of ideal categories composed from 15 to 20 pupils in which will be used the learning techniques chosen for Group B. These subdivisions will be given a pre-test to find which pupils are false and true novices. Finally, these subdivisions will have a post-test which will demo how the true novices learn under these learning techniques. Furthermore, all the groups will be observed and the research worker will non upset them while working, for their professors will give the pupils the pre-test and station trial, and the pupils will comprehend those tests as portion of the learning acquisition procedure. Another point for this research is that the techniques used in the experimental groups ( A and B ) will be chosen and explained by the research worker to the professors. Some of the techniques to be used are: A web log page in the cyberspace which allows the pupils to pattern the English linguistic communication. Radio and Cadmiums to work the lessons. Electronic mail to direct their prep to pattern short composing at the pupils ‘ degree. Movies for the pupils to place words and constructions at the pupils ‘ degree. Cooperative group work activities in category. Restrictions Some of the restraints that can be encountered are that the pupils at the minute of taking the pre-test are nervous and their mark will be different in footings of their cognition or that some of them miss the pre-test. Another issue can be that some of the pupils do non cognize how to utilize the cyberspace. Anticipated Results This research will demo the effects of larning simple English in overcrowded categories which will assist educational establishments and pedagogues in the Dominican Republic and around the universe in which the English linguistic communication is taught in similar conditions to form the simple English degrees to relieve the teaching-learning procedure of true novices. Timeline The construct paper will be presented every bit shortly as NOVA ‘s registration missive will be received that should be in August 2009. Thus, after the credence of the construct paper, the proposal will be submitted three month subsequently to the commission. For that ground, the proposal will be presented in January 2010. Once the proposal will be accepted which is hoped to be in September 2010. The applied thesis will be finished in May 2011. Evaluation program This research will be a quasi-experimental survey in which will be selected three groups composed of two subdivisions each. First, the professors will hold an debut workshop in which they will go acquainted with the intervention to be applied. In all the groups will be given a pre-test to find the pupils ‘ degree ( either true or false novices ) , and the professors of these groups will be in charge of giving the test to the pupils. After that, these informations will be analysed by the research worker. Then, the execution of the plan will be observed and notes will be taken during the execution face that will last 14 hebdomads. Furthermore, during the intercession, the professors will hold three workshops in which will be discussed subjects related to the techniques to be applied, possible alterations to the plan, and the professors ‘ perceptual experiences. Finally, the consequences will be collected with a station trial ; these informations will be analysed by the rese arch worker to finish successfully the applied thesis. Execution Matrix Time Terminal Aims Procedure Aims Activities Actor Evaluation First hebdomad 1st Workshop to the professors Learn and discourse the different techniques to be used The research worker Use a pre and station study to happen out the professors ‘ perceptual experience First hebdomadDetermine the pupils ‘ degree ( true novices or false novices )Give the stuff to the professorThe professora pre-test First hebdomadDetermine the pupils ‘ degree ( true novices or false novicesQuantify and sort the informationsThe research workerUse statistical methods- computing machine -programs-etc 1st -13th hebdomadExecution of the planUse of web log page in the cyberspace which allows the pupils to pattern the English linguistic communication. Radio and Cadmiums to work the lessons. Electronic mail to direct their prep to pattern short composing at the pupils ‘ degree. Movies for the pupils to place words and constructions at the pupils ‘ degree. Cooperative group work activities The professor 1st to 13th hebdomad Determine the effects of larning simple English in overcrowded categories Determine the true novices ‘ public presentation in simple English degrees in overcrowded categoriesExecution of the planTravel to the schoolroomsThe research workerTake notes 4th hebdomad2nd workshop to the ProfessorsDiscus about The professors ‘ experience and their thoughts about new techniquesThe research workerUse questionnaires to happen out the professors ‘ perceptual experiences 9th hebdomad3rd workshop to the ProfessorsDiscus about The professors ‘ experienceThe research workerTake notes about professors ‘ perceptual experiences 13th hebdomad4th workshop to the ProfessorsDiscus about The professors ‘ experience and hereafters programs utilizing the techniques implementedThe research workerTake notes about instructors ‘ perceptual experiences 14th hebdomadDetermine the consequencesGive the station trial to the pupilsThe professorPost trial 14th hebdomad Determine the effects of larning simple English in overcrowded categories Determine the true novices ‘ public presentation in simple English degrees in overcrowded categories Determine the consequences and the informations will be contrasted among the groups Quantify and sort the informationsThe research workerUse statistical methods- computing machine -programs- etc