Monday, September 30, 2019

A Review of Literature on Juvenile Delinquency Essay

Article: Depression and delinquency covariation in an accelerated longitudinal sample of adolescents. The most common co-occurring mental health disorder for juveniles is depression and delinquent behaviors. Juvenile depression symptoms were used to predict patterns of age related changes in delinquency. Juveniles especially females who display depressive symptoms are at greater risk of developing and or partaking in delinquent behaviors. Approximately 76% of cases brought to the juvenile courts in the United States of America are adjudicated delinquent. In the United State of America approximately 1,660,700 juveniles are adjudicated delinquent in 2004. Between 40 and 60 percent of juveniles are maltreated. 5-10% of juveniles that have been diagnoses with depression have been found to be six times more likely to commit a delinquent act. 63% of the juveniles have experienced maltreatment in some way. ADHD has not been proven to cause juvenile delinquency. Juveniles that are delinquent have been found to have some type of childhood depression. These juveniles have serious mental help issues. Article: Predicting juvenile delinquency: The nexus of childhood maltreatment, depression and bipolar disorder There is a connection between juveniles with mental health disorders and delinquent behavior. A juvenile diagnosed with depression or bipolar is more likely to commit delinquent behavior. Professional adults who notice symptoms of depression, bipolar, and maltreatment in juveniles and then work with them in some cases can prevent the delinquent behavior. Top two main issues with juveniles are behavior and depression. Female have a higher increase with chances symptoms between the ages of 11-15. As aging happens males tend to have an increase of delinquency and females an increase of depression. Depression is a risk factor for juveniles that can increase delinquent behavior. Delinquent adolescents with mental health problems can suffer from the two most common issues depression and delinquent behavior/conduct. Genetic factors therefore account for approximately 35% of the relation between depressive and delinquency symptoms, but do not inform the temporal ordering of symptom presentation or the potential for using symptoms of one syndrome to predict future symptoms of the other. Specifically, males have the higher rate of reported delinquent behavior in comparison to females. Depression play a huge role in the possible purpose of juveniles becoming delinquent, when the juvenile(s) began to act disruptive on a routine then an evaluation and intervention should be considered. Article: Disentangling the relationship between child maltreatment and violent delinquency Physical abuse of children and or juveniles does not have an effect on whether or not the juvenile will display violent delinquency. Juveniles who have suffered from maltreatment or more likely to participate in violent delinquency. Females who have suffered from maltreatment are just as likely or more likely to participate in delinquent behavior then males. Signs of aggression before age 8-10 has shown higher rate of adult antisocial behavior. Sings of aggression between ages 5-7 is a prediction of frequent drug users. Over the years aggression is believed to stable. Ethnicity can play a role in the aggressiveness of juveniles/adults. Males have aggressive behavior which puts them a high risk for behavior problems, drug use, and delinquent behavior if not addressed. It is reported that there is a higher rate of males using substance from a two parent home, and a lower rate of males coming from a single-parent home. Article: Recidivism in subgroups of serious juvenile offenders: There are four different subgroups of juveniles that were looked at: Property offenders, sex offenders, serious violent offenders, and violent property offenders. Violent property offenders had the highest number of risk factors Recidivism of juveniles was looked at differently due to the low amount of recidivism there is in individuals who commit these crimes. Approximately 2.3 juveniles that are arrested are under the age of 18. 30-50% of juvenile offenders has a recorded disability and is at a higher chance of special education disability. Special education disability / socioeconomic status / criminality in family / and foster care are higher chance of being chronic  offenders in juveniles. Arrest before 14 years are less likely to become adult offenders later in life. The experience of being in a foster care increases the change of delinquency than a juvenile with no family felony. If the juvenile has a family history of criminal behavior the possibly is high that the juvenile will also carry the same behavior. Juvenile that is an offender tends to have more of a special education disability in comparison to someone who is not an offender. It is believed that socioeconomic status could be related to the juvenile offending. Juvenile Delinquency A number of juveniles displaying delinquent behaviors is incredibly high. As of 2001 the amount of individuals under the age of 18 arrested for violent crimes was approximately 2.3 million (Alltucker, Bullis, Close, & Yovanoff, 2006). What role does the environment play in the later juvenile delinquency, and can delinquency be prevented? This paper explores that question using three different themes. First, the various types of abuse and the effect on delinquency are discussed. Second, the link between depression and delinquency is examined. Finally, the importance of recognizing and preventing juvenile delinquency is addressed. Child Abuse and Subsequent Juvenile Delinquency In the United States there are approximately one million children per year are reportedly victims of child abuse. While there is a connection between physical abuse and later violent acts, the article by Yun, Ball, & Lim (2011), contends that sexual abuse and emotional neglect are more significant in predicting future violent and criminal behavior than physical abuse alone. Alltucker, et., al (2006) agree that sexual, physical, and emotional abuse all contribute to some form of delinquent behaviors in juveniles. The article by Mallet, Stoddard Dare, & Seck (2009) indicates that between 40 and 60 percent of sentenced delinquents have been abused or neglected in some form. However, victims of sexual abuse are not likely to become delinquent. It is clear from the literature that maltreatment of children in general has a negative effect on their development, but there is inconsistency in the research as to which form of abuse plays the most important role in delinquency. Depression and Delinquency Due to research increasing public awareness, symptoms of depression and other mental health issues are being noticed at a younger age. Young people displaying symptoms of depression are likely to experience academic problems as well as substance abuse issues. These are a few behaviors considered as delinquent. Depressed adolescents may express their frustrations through behaving aggressively and breaking the rules in their home environment. Consequently these behaviors cause conflict with parents or guardians and can eventually lead to involvement in delinquent acts. (Kofler, et al., 2011). Mallet, et al (2006) reported between 40 and 70 percent of incarcerated juvenile offenders suffered from emotional and behavioral problems prior to arrest. In fact, compared to general offenders, 46 percent of juvenile offenders are reported as having shown signs of depression or other emotional difficulties (Alltucker, et al., 2006). Symptoms of depression and delinquency covary and diagnoses co-occur often enough that it cannot be contributed to chance. Over 30 percent of young people meeting the criteria for depressive disorder also meet criteria for a conduct disorder. In addition, over 50 percent of adolescents diagnosed with conduct disorder also exhibit the symptoms that meet criteria for depression (Kofler, et al., 2006). Identifying and Preventing Delinquency Being able to recognize who is at risk of delinquent behavior is the first step towards prevention. Identifying risk factors in children is imperative in preventing juveniles from becoming involved in the criminal justice system. Also, it enables practitioners and therapists to notice which children are most at risk and what type of measures are necessary in preventing delinquency (Mallet, et al., 2006). Intervening before the juvenile reaches the age of adulthood and becomes a chronic criminal is a major goal in place to protect the rest of society. One of the predictors of being a lifetime offender is what age the juvenile is upon his or her first arrest. In 2001, the amount of people arrested for violent crimes were under the age of 18 (Alltucker, et al., 2006). A review of an article by O’Donnell, Hawkins, & Abbott (1995) states there can be an early onset of aggression in children between the ages of 8-10. Aggression at this age puts the child at higher risk of severe juv enile delinquency and also  antisocial behavior in adulthood. Conclusion Upon reviewing the literature it is apparent that abuse, neglect, and mental health problems all play a role in juveniles becoming delinquent. Current research on this pressing and difficult issue is only a small portion of a vast range of theories about delinquency. Delinquency in juveniles is a dynamic, multifaceted problem with numerous potentially causal factors. References Alltucker, K. W., Bullis, M., Close, D., & Yovanoff, P. (2006). Different pathways to juvenile delinquency: Characteristics of early and late starters in a sample of previously incarcerated youth. Journal of Child and Family Studies, 15(4), 479-492. Kofler, M. J., McCart, M. R., Zajac, K., Ruggiero, K. J., Saunders, B. E., & Kilpatrick, D. G. (2011). Depression and delinquency covariation in an accelerated longitudinal sample of adolescents. Journal of Consulting and Clinical Psychology, 79(4), 458-469. Mallet, C. A., Stoddard Dare, P., & Seck, M. M. (2009). Predicting juvenile delinquency: The nexus of childhood maltreatment, depression and bipolar disorder. Criminal Behavior and Mental Health, 22(2), 235-246. Yun, I., Ball, J. D., & Lim, H. (2011). Disentangling the relationship between child maltreatment and violent delinquency: Using a nationally representative sample. Journal of Interpersonal Violence, 26(1), 88-110.

Heineken Company Essay

It’s true that Heineken, the brand that bear with it the name of its mother company, is the most popular beer today-upholding supremacy for a period spinning over a century now. In 1964, Gerard Adrian Heineken bought a brewing company called De Hooiberg thereby changing its name to Heineken, after his own name. In addition to Heineken, which account for 20% of the total sales, Heineken has 170 beer brands including Star, Ochota, Murphy, Moretti, Zywiec, Cruzcampo, Tiger, and Amstel. In the advent of civilization and industrial revolution in the world, Heineken Company experienced expansive growth in terms of products, beer brands as well as venturing into other community development activities such as sponsoring sporting events. Meanwhile, the company expanded to become global brewer with tentacles extending to every corner of the world with such branches in Western Europe, Asia Pacific, Middle East, and Africa. Their key market areas today include, but not limited to, Germany, Spain, France and Italy. Whilst the size and modus operandi of Heineken Company apparently demonstrate some kind of a monopolistic structure in the market, it is very clear that its market structure is perfect competition. Situational analysis of how Heineken has come to grow immensely over time clearly shows that Heineken Company has strictly prevailed through the waves of perfect competition only to emerge as a winner in the long run. In the present world of extreme competitive environment, Heineken Company has been denied a chance of enjoying monopolistic competition. It is a common understanding that in monopolistic competition, there is only one supplier of a particular product in the available market thereby establishing its own stringent market rules with the consumers on the receiving end. The gains and pains of such a market structure culminate into a scenario where the seller grows to a greater extent at the expense of the suffering consumers. The major weakness of Heineken was the stiff competition that they faced among other national brands in the same market. Whereas Heineken established licensing agreements with the local brewing companies which allowed them to maintain some influence in the market, such an influence remained to be very insignificant. Other breweries controlled their marketing efforts and prices thereby resulting in a real problem for Heineken in marketing its brands. Heineken’s marketing ambitions to global levels has specifically been restricted by increased globalization because other breweries have taken advantage of time and established their market bases leaving little or rather no room for any other competitor no matter how big they are. Even in some markets Heineken’s brands are only seen as drinks appropriate for classified occasions and not common drinks for daily consumption by every Tom, Harry and Dick. Consequently, their marketing objectives to become a universal beer supplier have met significant barriers thereby causing them to rely on perpetual review of marketing policies and strategies. A number of marketing strategies are clearly manifested in the way Heineken Company achieved their enormous expansion since its foundation in the nineteenth century. To start with, the extent to which innovation is applied in all the aspects of their product including packaging leaves successful marketing as the only option for the already gigantic seller. Also, they understand their consumers’ needs at various occasions, their taste, and their dislike. The marketing strategies which are carved on basis of innovation ideas generated from the understanding they have of their consumers, allows them to spread highly fine-tuned policies across the entire supply chain of their brands- right from the raw materials to the end product. Whereas economic extremists may term this as brand narcissism, its cause and effects are justified without a query to the marketing team, vividly manifested by the fact that they have sustained themselves in the market for a long duration of time. The best example is shown by the fact that Heineken has used unique yeast for a long time in their fermentation thus giving every other of their brand a special taste to the consumer. Their quality is excellent and there is no debate about that. There was a gain on the mutual fund portfolio of Heineken Company over the period of approximately one year from April, 2009 to April, 2010. In addition, whilst there was a decrease in consumption of their local beer between 2008 and 2009, there was significant increase in imported brands in the same time period. Their average decrease in beer consumption was 7 percent in that time period. It is rational to assert that Heineken has enjoyed success in beer market over a tremendously long time period. In the meantime, they have had to strengthen their marketing efforts through applying such strategies as ensuring unique taste and quality of the product, price control as well as increasing their coverage (Heineken International, 2005). However the current stiff competition in the market has kept them at an extreme edge leading to a situation where they have to look for better strategies to maintain themselves in the market.

Saturday, September 28, 2019

Case Study, Amazon: From Book Seller to Service Provider Essay

Niklas Zennstrom stated: â€Å"When we look at investing, we always think about ‘how defensible is this, how likely is it that somebody is going to copy this. ‘ E-commerce tends to be something easy to copy because it’s execution. † Amazon is the world’s largest online retailer since the company opened in the garage of Jeff Bezos’, and its yearly are over 10 billion dollars. Many companies subsequently have copied Amazon and now compete for e-commerce profits; therefore companies like Google and Microsoft become an issue for Amazon. This has instigated Amazon to develop products for other e-commerce businesses, and now Amazon offers business- to -business e-commerce. This paper will discuss whether Amazon is moving away from its core competency of a leading online retailer, and if this is a wise strategy. A brief description of the Amazon database, how Amazon uses each component, and what data management issues may be encountered by Amazon, the relationship between data, information, and how Amazon tackles each will be included in this paper. To survive the invasion of companies like Google, Amazon has resolved to supply a series of computing, storage and other services that make its infrastructure available to businesses and people to assist them administer the technological and logistical parts of their company. Amazon only uses 10 percent of its processing capability, and offering these additional services will not impair other segments of the online retailer. This is a move away from its core expertise; however, this is a shrewd decision on the part of the Amazon Company. This strategy allows the company to boost earnings by using resources already on hand. This is similar to a landlord deciding to rent out the empty apartment as a storage unit, because it was not used by a family. The space was already there the landlord just found a new use for the vacant space. The Amazon database is made up of the Simple Storage Service (S3), the Elastic Compute Cloud (EC2), and the Mechanical Turk. These services programs are an attempt by Amazon to be a principal competitor in the next development of the Internet. The Simple Storage Service allows businesses to warehouse data and applications on Amazon disk drives at 15 cents per gigabyte per month. For 10 cents an hour Amazon offers processing power on the Elastic Compute Cloud which is the same as one rudimentary server. The Mechanical Turk is the most complex of the three Amazon database components, and is commission based. Rainer, Turban wrote in the: Introduction to Information Systems: Supporting and Transforming Business, 2nd Edition, that the: â€Å"Mechanical Turk service combines processing power with networks of real people who are paid to do the kind of work that machines cannot do well, such as recognizing inappropriate content in images or transcribing audio. Companies post pieces of work onto the Mechanical Turk and pay people online, for which Amazon receives a 10 percent commission. † The data management issue that might be encountered by Amazon is how much space they can rent out before it takes away space and time from the online retailer system. A second issue would be what Amazon must do when Google and Microsoft start to copy and develop similar products at a lower price. Amazon concentrate on declining sales by increasing its productivity to ensure investors will see the profit growth they expected form the online retailer. Amazon decided to offer services that no other online retailer provided and this is how they tackled all their current issues. Amazon is helping thousands of companies store and debug their data information, therefore all three programs can be used together by a client to store e-mails after they check them for malware, and see what keywords draw prospective consumers to their sites. I think Amazon will succeed goal to revolutionize retailing as long as they understand how to adapt quickly in business.

Friday, September 27, 2019

Relationship Analysis Essay Example | Topics and Well Written Essays - 1500 words

Relationship Analysis - Essay Example When Harry Met Sally When Harry Met Sally is a film directed by Rob Reiner in 1989, and was written by Nora Ephron. It is listed as one of the top American comedy films of all time and is also considered one of the most romantic movies of all time. Ephron gained an Oscar nomination for this movie. The film also gained a lot of Golden Glove nominations, primarily with Best Director, Best Screenplay, Best Actor and Best Actress. The film follows the story of two people, Harry Burns and Sally Albright. The story is set within a twelve year span, starting in 1977 to 1989, from Chicago to New York. The movie chronicles their relationship: from the point that they do not like each other to the point that they got married. They first met in Chicago, where Harry hitched a ride with Sally on the way to New York. It should be noted that Harry’s girlfriend is Sally’s friend and that’s how they knew each other. They did not go along with each other because of their different opinions regarding relationships between men and women. The film’s theme about relationships is revealed here: Men and women can’t be friends because the sex part always gets in the way (Harry) and Women and men can be friends (Sally). They part ways as soon as they reached New York. The relationship is not romantic, not even friendly. Five years after that encounter, they saw each other at an airport and even share the same plane. Both are in romantic relationships: Sally was with Harry’s friend and Harry is engaged to a woman named Helen. This surprises Sally. Harry suggests that they become friends but further elaborates on this previous rule (but with an exception now because they are both in respective romantic relationships), making Sally reject his â€Å"friendly offer†. After five years, they meet again in a New York bookstore. Harry is now divorced and Sally is now single after breaking up with Harry’s friend, Joe. They have coffee togeth er and they have talked about their previous relationships. At this point, they decided to become friends. They spend more time with each other (platonically), have dinners together, have late night phone calls and have dates with other people. Their dating experiences with other people continue to show each other’s differing beliefs on dating. One New Year’s Party, Harry and Sally danced, and they found themselves getting attracted to each other. They denied their feelings and they set each other up with their respective friends. By some twist of fate, their best friends hit it off and got engaged. One night, Sally calls Harry because her ex is getting married. Harry goes to Sally’s house and comforts her. They had sex unexpectedly, leading to awkwardness the next day. This leads to their friendship’s cooling off, until they have an argument at their best friends’ (the one they set up for each other) wedding, promptly severing their friendship. Ha rry then tries to patch things up with Sally, to no avail. Fast forward to another New Year’s Party with Sally and she felt alone because there was no Harry to be with her, unlike the last New Year’s Party. As she leaves the party, Harry appears and they make up their mistakes and realize that they do indeed love each other. They kiss. The last scene shows that they were being interviewed about their marriage.

Thursday, September 26, 2019

Northeast Utilities to buy NSTAR for $4.17 bln Thesis Proposal

Northeast Utilities to buy NSTAR for $4.17 bln - Thesis Proposal Example Therefore, such deals were called to exchange 1.312 common shares in the Northeast Utilities in every NSTAR share. In the Northeast it is expected that the shareholders deal with adding the earnings to the first whole year towards the completion of the dividends as per share. This could have also raised about 20 percent of the closest deal. On the other hand, ahead of the finishing point, Northeast Utilities could work as the six regulated gas and electric utilities in Massachusetts, Connecticut and New Hampshire with nearly 3.5 million electric and gas customers. For other reasons, both companies had focused mainly on the transmission as well as proper distributions of power and gas to other regions such as the Northeast that own more than 1,000 megawatts of power generation. The NSTAR stockholders receiving 1.312 and the Northeast shares where they own each share, created a deal that was expected to close in 2011 and Northeast Utilities claims that there should be additional company earnings in year 1 just after closing. The combined efforts in the Northeast Utilities and NSTAR could have created a better relationship with the New England based companies. While ensuring that there are regional benefits in the locally controlled, the energy company during those years that came had a better investment. While calculating the results, find that we computed the most necessary variables, as other additional calculations require that there is a standardized performance that is obtained using the statistical analysis. The applied data describes the steps that also arise as the labels of the variables. Therefore, computing the additional statistics is the significant step that demonstrates example of the results. Some of the functions used to compute the additional statistics defines the new variables and the corresponding results in every statistical test. The target price for the returns reflects on the resulting combination between the

Japanese Artists Essay Example | Topics and Well Written Essays - 1000 words

Japanese Artists - Essay Example Japanese – American artists have created their distinct identity in this regard. In the present essay, we will focus on two such renowned Japanese – American artists: Sueo Serisawa and Chiura Obata. Sueo Serisawa Short biography: Born in Yokohama (Japan) in the year 1910, Serisawa’s father was an artist. The family migrated to USA and settled in Los Angeles during 1918. Serisawa was inspired by his father as an artist. As he grew up, he got involved in California Art and adopted American Impressionism as his working style. Serisawa excelled in creating portraits, still lifes, and landscape scenes. Unfortunately, the date of his first art exhibition coincided with the date of Japanese attack on Pearl Harbor. After the incident of Pearl Harbor, Serisawa was fearful of forced internment by the US Government since he was a Japanese emigrant. From 1941 to 1947, his life was uncertain since he moved to New York to avoid internment while political tensions loomed all ar ound. However, after the War, Serisawa established himself as a painting instructor. He successfully worked at Laguna Beach School of Art, Scripps College, and Kahn Art Institute. He continued painting and teaching till his death in 2004. Critique and research: The art critics have highly appreciated Serisawa’s works and he has always been regarded as a talented artist in the sphere of impressionism and modernism. According to Susan Landauer, Donald D. Keyes, and Jean Stern, Serisawa was a significant figure among the California Impressionists and he considerably contributed in American arts along with other prominent artists like Mabel Alvarez, Boris Deutsch, etc. Serisawa’s modernist approach was well matured as early as the 1940s. However, both political and personal histories interfered with his artistic career and thought. In the later years of his life, according to Alissa J. Anderson, Serisawa’s works were deeply influenced by oriental culture, Zen philos ophy, and Japanese calligraphy. Moreover, considerable political influence too can be noted on some of his important works. For example, Serisawa’s Nine O’clock News is a masterpiece that shows a political statement about war using certain symbols and impressionist expressions (Landauer, Susan, William H. Gredts, and Patricia Trenton, 76). Serisawa and the California school influenced each other for a considerable period of time. Serisawa’s father himself was a Japanese artist, so he exhibited an oriental touch in his artworks. The difficult time of internment of the Japanese Americans by the US Government compelled Serisawa to leave Los Angeles, where he had grown up and learned the vital early lessons of art. However, later Serisawa admitted that those difficult days had rather helped him to mature as an artist. Analyzing Serisawa’s artworks, it ca be finally said that he has been a versatile artist, who excelled in making portraits, landscape scenes, a nd still lifes, along with complicated impressionist and modernist abstracts. Chiura Obata Short biography: Chiura Obata was born in 1885 in Japan. He migrated to USA in 1903. Initially, he worked as a commercial director and illustrator. He worked for the San Francisco based Japanese newspapers the Japanese American and The New World. He also worked as a commercial designer with Iwata Dry Goods Co. and Toyo Kisen Kaisha Steamship Co. In 1921, he became the

Wednesday, September 25, 2019

Enterprise Architecture Essay Example | Topics and Well Written Essays - 2500 words - 3

Enterprise Architecture - Essay Example The article provides a brief overview of the TOGAF framework, in simple and comprehensive terms. The author offers an architecture development methodology, based on TOGAF and comprising four steps: tailoring TOGAF to suit enterprise needs; defining the scope of work; overseeing development; and managing post-implementation aspects. Banerjee claims that the TOGAF architecture is not the ultimate solution but merely a starting point in the development of effective enterprise solutions. The article can be extremely useful in the study of various enterprise architecture frameworks. In this article, the TOGAF framework is the central object of analysis. The researchers assert that the main rules and principles of rule-driven systems are too old to be effective. Nonetheless, they have the potential to provide better insight into the rational structure of enterprise architecture frameworks. Bommel et al (2006) use the rules of the TOGAF network to analyze two examples and conclude that, eve n if certain formulations lead to redundancy, they should not be discarded, not to distort the EA picture. Designing enterprise architecture models is not an easy task. Compatibility of various frameworks presents another issue. In this article, the authors discuss and evaluate the TOGAF architecture framework and its relation to architecture development method. The results show how TOGAF can complement EA management and provide the basis for resolving EA related concerns. Carraro and Chong provide a detailed description of the Software as a Service model of enterprise architecture. The benefits and considerations for embracing SaaS are discussed. The article sheds light on how SaaS affects information technologies and how to become a SaaS provider. The article is an excellent source of information about SaaS and become the starting point in the analysis of SaaS applications and frameworks.

Tuesday, September 24, 2019

Technical Writing Essay Example | Topics and Well Written Essays - 1000 words - 2

Technical Writing - Essay Example A fire lane is where you should not park. This definition is very poor and inadequate in educating people about safety and driving rules. This is because it can make the intended audience to define all places or spaces where parking is not allowed as a fire lane. This is wrong considering the fact that there are many other places in which parking is not allowed yet they do not qualify to be called fire lane for example pedestrian paths. The definition should indicate where fire lanes are located and their functions. A fire lane refers to a marked lane in a parking space or parking lot that is closer to a structure or building whose function is to allow access of safety equipment to the structure/building or escape route in case of emergency. A crime is a violation of the law. The degree of accuracy of this definition is low and insufficient in explaining what a crime is. This is because not all violations of the law can be regarded as crimes. An example is a breach of contract. This applies to individuals involved and it only qualifies to be called an offence or a wrong. An act can only qualify to be called a crime if it is a wrong against the public. This means it has to be within the parameters of the natural laws of the land. A crime can therefore be defined as a breach of laws or rules for which some authority can prescribe a conviction. Sterilization is the process of sterilizing. This definition is such a poor one and it is very inefficient in explaining what sterilizing means. It is just like saying, â€Å"John is John†, â€Å"a car is a car† instead of explaining who John is, or what a car is. Therefore, the second part of the definition should explain what sterilization actually entails. In this case, it is more scholarly to say that sterilization refers to the removal or killing of all disease-causing organisms from a surface. Activity 11.3 The intended audiences for the explanation of the term consumer are students who are undertaking b usiness studies and the purpose of the definition is to help them understand the position of a consumer in a chain of production and their role in an economy. The term consumer refers to any household or individual that utilizes the goods and/or services produced within an economy. The audience for which the definition of the term depreciation is intended for are senior high school students undertaking business studies and the definition will help them to understand why some assets that have been used are normally sold at a price lower than its initial buying price. By definition, depreciation refers to the decline in the fair value of an asset. The explanation of the term management is intended for students undertaking studies on business administration and this definition will enable them visualize their roles and functions as future managers of various organizations. According to Gomez-Mejia (2008), management refers to the organization and coordination of people and activities o f an organization in accordance to certain policies in order to achieve the organization’s desired goals and objectives. The explanation of the term software is intended for is high school students who are undertaking computer studies and the definition will enable them to understand what enables a computer to perform its various functions and applications. By definition, software refers to a group of computer programs (sequence of instructions) and

Monday, September 23, 2019

Ethical dilemma Essay Example | Topics and Well Written Essays - 750 words

Ethical dilemma - Essay Example However, a nurse’s past experiences, values, and beliefs may influence this solution. In addition, one ethical dilemma can be solved in a variety of ways. In this paper, I will give a case of an ethical dilemma in nursing, and discuss how this can be resolved using the 2009 Ethical Decision-making algorithm by Catalano. Ethical issues vary and may involve legal issues, pro-life issues, deception versus truth telling, quantity versus quality of life, control versus freedom, among others. A nurse will react differently to each of these ethical dilemmas (Lipe & Beasley, 2003). My case of ethical dilemma is a pro-life versus pro-choice situation, experienced some time ago by a friend who is a practicing nurse. This involved a fifty-year old woman in the ICU. She had been in the ICU for over one year, and shows no probability of getting better; instead, she gets worse each day. The patient wants her life to be terminated to save her the pain. However, her family does not agree with her wish, and advise the nurses to keep her. She undergoes multiple painful surgeries for her sustenance. The hospital knows that if they prolonged her life, it will be of low quality and full of pain. They however cannot perform anesthesia on her as the family threatened to sue the hospital if they took that step. On the other hand, the patient is bitter that her wish of ending her life has not been granted. This is a perfect example of an ethical dilemma. All the parties involved express different wishes and interests. The patient wants her life terminated to escape the pain; her family wants the nurse to prolong her life, while the nurse wants to save her patient much pain by performing mercy killing. Each party faces obstacles in fulfilling their desires. The patient’s family is the main obstacle as they threaten the nurse with suing if she terminates the patient’s life. Now, the nurse is to come up with a decision that will be neutral on side of the patient as we ll as that of her family. If the nurse prolongs the patient’s life, she will be prolonging her suffering, thus causing her harm. On the other hand, if the nurse complies with her patient’s wish, she may get in trouble with the patient’s family, and so cause a strained relationship, which sounds unethical. Catalino’s ethical decision-making algorithm would have come in handy in directing the nurse to the most appropriate decision (Denier et al., 2010). According to Catalino’s ethical decision-making algorithm, decision-making starts with assessment. This involves determining the party that will be most affected by the decision. Enough facts, including the potential risks of the patient, are gathered to arrive at this. The second step is to collect, analyze and interpret data. Here, the nurse makes use of the information they have to determine possible outcomes. Thirdly, the dilemma is identified and stated. In this case, the identified dilemma is to grant the patient her wish or to listen to her family (Deshpande, 2009). Next is to decide if the nurse can resolve the dilemma or not. If no, the nurse should not take any action, if yes, the possible solutions to the dilemma should be stated. Acceptable and unacceptable consequences are then identified. If the consequences are acceptable, an ethical decision can be taken, if they are unacceptable, no action is to be taken. If ethical decision is

Sunday, September 22, 2019

Gender Roles in the United States Essay Example for Free

Gender Roles in the United States Essay 1. Briefly discuss the history of ethnic relations in the United States. The ethnic history of the United States was long rooted during the colonial period. The first settlements in the United States were the Spanish outposts in the towns of Florida and California and a French outpost in Louisiana. English colonizers declared the United States’ independence in 1776 due to their yearning for freedom from their own country (Doane). â€Å"The class, racial, ethnic, and gender relationships of the contemporary nation have their roots in the colonial period† (Doane). Because of the failure to force Native American settlers to work on the fields, the British settlers resorted in importing African slaves to work on cotton plantations located at the South, while the Whites chose to reside on the North to further hone their emerging industries (Doane). The ethnic relations of the United States during the early years are characterized by the major issue of racism and discrimination based on skin color. During the colonial times, the poor whites and the indentured servants served as bridges for the slaves and the landlords. The poor whites tried to identify themselves with the rich landowning whites and propagated the idea of white racial identity rather than the class identity (Doane). This action in turn reinforced the racial discrimination in the country. The status, skin color and position in the labor market characterized the relationships among racial and ethnic groups. Some of the Blacks migrated northward to work on industrial jobs but disparity continued as they were paid less than the whites on comparable jobs. The Blacks also received less social benefits than the Whites reinforcing discrimination (Doane). 2. Describe the process of gender role socialization. Give examples of how females and males are trained to fulfill the expectations of their gender roles. There is a tendency for the society to mandate societal rules and determine what is right and acceptable to the people. This process is referred to as gender role socialization, wherein social institutions control the society’s expectations on â€Å"dress code, language, personality, leisure activities and aspirations for each sex† (Padavic and Reskin 53). Through this process, people learn their gender identity. The society associates well established values, attitudes, behavior, choices and performance that are appropriate for gender categories such as men and women. People are able to absorb the specific roles that the society is trying to inculcate to the members of a particular sex (Senior 25). Learning our gender roles is important in the aspect of socialization and our interaction with other people. Childhood experiences of socialization prepare the people in their gender and social roles in such a way that adult members of the society are expecting them to behave (Senior 25). Even as children, people have been trained to behave and act according to their biological sexual orientation. And as such, parents reinforce gender role socialization on their child-rearing methods. They give toy guns and robots to their male children and dolls and kitchen utensils to their female children. People may be unconsciously aware but through this method, social roles are being inculcated within the consciousness of children in the society as they become adults. Toy guns for male children depict that males should be aggressive and courageous. Boys are also more exposed to high-tech toys like PSP and Gameboy reflecting their advantage in the technological field of industry. Female children or girls, on the other hand, are encouraged to play with dolls and kitchen utensils to prepare them to their future social roles which are in charged of the household, homemaker and as domestic provider. It also encouraged the attitudes of women to become caring and nurturing. 3. Discuss the evidence, which points to either gender roles being biological or cultural in origin. Base on this evidence, what conclusions can be drawn about the origins of gender roles. Discuss some of the most important sources of gender inequalities in our society. How can these inequalities be alleviated? One of the speculated causes of the significant difference in the attitudes and social characteristics between men and women is their biological structure. It was said that genes and other biological components play a big role in influencing these social characteristics. There are biological explanations provided in an attempt to examine aggressiveness in males. It was already known that the inherent presence of Y gene in the 23rd chromosome makes males susceptible to physical disarray. However, there is no strong evidence explaining the role of genetics in the aggressiveness of individuals, particularly the males. Several indicators of violence have been found to be more evident in males than in females (Englander 122). Research further reveals the role of androgens in the prevalence of violence. Androgens are male sex hormones that are abundant in males. These hormones were indirectly linked to criminal violence and also to traditional behavior. Studies show that women with congenital adrenal hyperplasia, a medical condition in which androgens are secreted in the uterus of females, have an inclination to male tastes and preferences. Although there is no concrete evidence of the relationship between androgens and violence, it was suspected to be the reason behind men’s more aggressive behavior (Englander 123). Another biological factor that is thought to be responsible behind the violent attitude of men is the enzyme monoamine oxidase (MAO). Behavioral patterns are related to the level of MOA presence in the blood. Men are found to have lower levels of MAO than women. Lower MAO levels are associated with aggressiveness and the sudden burst of anger and frustrations, especially impulsiveness (Englander 123). Another essential factor that was believed to be responsible for the development of aggression in men and the nurturing attitude of women is the social construction or the difference in how each was reared and molded by culture and society. A person’s social environment is accountable for the values inculcated in his or her personality. His or her socially-constructed identity is viewed to be inherent with his biological sex. Difference in gender has a widespread effect in the society, which was supported by documented knowledge in socio-biology and evolutionary psychology. This collection of knowledge states that men and women are irrevocably different in bodily configurations (Taylor Spencer 41). Such disparities in gender can be alleviated through programs that will breach the inequality in gender such as having equal opportunity on the workplace. We could also start hastening changes through campaign programs that will call for equality between genders. Works Cited Doane, Molly. 2007. â€Å"Culture of United States of America†. Advameg, Inc. 11 November 2008 http://www. everyculture. com/To-Z/United-States-of-America. html. Englander, Elizabeth Kandel. Understanding Violence. New Jersey: Lawrence Erlbaum Associates, Inc. , 2007. Padavic, Irene and Barabara F. Reskin. Women and Men at Work, 2nd edition. Thousand Oaks, California: Pine Forge Press, 2002. Senior, Olive. Working Miracles. London: James Currey Ltd. , 1991. Taylor, Gary and Steve Spencer. Social Identities: Multidisciplinary Approaches. New York: Routledge, 2004.

Saturday, September 21, 2019

Crystal Field Theory Versus Valence Bond Theory Engineering Essay

Crystal Field Theory Versus Valence Bond Theory Engineering Essay Crystal field theory is a model that describes the electronic structure of transition metal compounds, all of which can be considered coordination complexes. CFT successfully accounts for some magnetic properties, colours, hydration enthalpies, and spinel structures of transition metal complexes, but it does not attempt to describe bonding. CFT was developed by physicists Hans Bethe and John Hasbrouck van VlecK in the 1930s. CFT was subsequently combined with molecular orbital theory to form the more realistic and complex ligand field theory (LFT), which delivers insight into the process of chemical bonding in transition metal complexes. In the ionic CFT, it is assumed that the ions are simple point charges. When applied to alkali metal ions containing a symmetric sphere of charge, calculations of energies are generally quite successful. The approach taken uses classical potential energy equations that take into account the attractive and repulsive interactions between charged particles (that is, Coulombs Law interactions). Electrostatic Potential is proportional to q1 * q2/r where q1 and q2 are the charges of the interacting ions and r is the distance separating them. This leads to the correct prediction that large cations of low charge, such as K+ and Na+, should form few coordination compounds. For transition metal cations that contain varying numbers of d electrons in orbitals that are NOT spherically symmetric, however, the situation is quite different. The shape and occupation of these d-orbitals then becomes important in an accurate description of the bond energy and properties of the transition metal compound According to CFT, the interaction between a transition metal and ligands arises from the attraction between the positively charged metal cation and negative charge on the non-bonding electrons of the ligand. The theory is developed by considering energy changes of the five degenerate d-orbitals upon being surrounded by an array of point charges consisting of the ligands. As a ligand approaches the metal ion, the electrons from the ligand will be closer to some of the d-orbitals and farther away from others causing a loss of degeneracy. The electrons in the d-orbitals and those in the ligand repel each other due to repulsion between like charges. Thus the d-electrons closer to the ligands will have a higher energy than those further away which results in the d-orbitals splitting in energy. This splitting is affected by the following factors:- 1. The nature of the metal ion. 2. The metals oxidation state. A higher oxidation state leads to a larger splitting. 3. The arrangement of the ligands around the metal ion. 4. The nature of the ligands surrounding the metal ion. The stronger the effect of the ligands then the greater the difference between the high and low energy 3d groups. The most common type of complex is octahedral; here six ligands form an octahedron around the metal ion. In octahedral symmetry the d-orbitals split into two sets with an energy difference, Άoct (the crystal-field splitting parameter) where the dxy, dxz and dyz orbitals will be lower in energy than the dz2 and dx2-y2, which will have higher energy, because the former group are farther from the ligands than the latter and therefore experience less repulsion. The three lower-energy orbitals are collectively referred to as t2g, and the two higher-energy orbitals as eg. (These labels are based on the theory of molecular symmetry). Typical orbital energy diagrams are given below in the section High-spin and low-spin. Tetrahedral complexes are the second most common type; here four ligands form a tetrahedron around the metal ion. In a tetrahedral crystal field splitting the d-orbitals again split into two groups, with an energy difference of Άtet where the lower energy orbitals will be dz2 and dx2-y2, and the higher energy orbitals will be dxy, dxz and dyz opposite to the octahedral case. Furthermore, since the ligand electrons in tetrahedral symmetry are not oriented directly towards the d-orbitals, the energy splitting will be lower than in the octahedral case. Square planar and other complex geometries can also be described by CFT. The size of the gap Ά between the two or more sets of orbitals depends on several factors, including the ligands and geometry of the complex. Some ligands always produce a small value of Ά, while others always give a large splitting. The reasons behind this can be explained by ligand field theory. The spectrochemical series is an empirically-derived list of ligands ordered by the size of the splitting Ά that they produce (small Ά to large Ά; see also this table): Ià ¢Ã‹â€ Ã¢â‚¬â„¢ The oxidation state of the metal also contributes to the size of Ά between the high and low energy levels. As the oxidation state increases for a given metal, the magnitude of Ά increases. A V3+ complex will have a larger Ά than a V2+ complex for a given set of ligands, as the difference in charge density allows the ligands to be closer to a V3+ ion than to a V2+ ion. The smaller distance between the ligand and the metal ion results in a larger Ά, because the ligand and metal electrons are closer together and therefore repel more. High-spin and low-spin [Fe(NO2)6]3à ¢Ã‹â€ Ã¢â‚¬â„¢ crystal field diagram Ligands which cause a large splitting Ά of the d- orbitals are referred to as strong-field ligands, such as CNà ¢Ã‹â€ Ã¢â‚¬â„¢ and CO from the spectrochemical series. In complexes with these ligands, it is unfavourable to put electrons into the high energy orbitals. Therefore, the lower energy orbitals are completely filled before population of the upper sets starts according to the Aufbau principle. Complexes such as this are called low spin. For example, NO2à ¢Ã‹â€ Ã¢â‚¬â„¢ is a strong-field ligand and produces a large Ά. The octahedral ion [Fe(NO2)6]3à ¢Ã‹â€ Ã¢â‚¬â„¢, which has 5 d-electrons, would have the octahedral splitting diagram shown at right with all five electrons in the t2g level. [FeBr6]3à ¢Ã‹â€ Ã¢â‚¬â„¢ crystal field diagram Conversely, ligands (like Ià ¢Ã‹â€ Ã¢â‚¬â„¢ and Brà ¢Ã‹â€ Ã¢â‚¬â„¢) which cause a small splitting Ά of the d-orbitals are referred to as weak-field ligands. In this case, it is easier to put electrons into the higher energy set of orbitals than it is to put two into the same low-energy orbital, because two electrons in the same orbital repel each other. So, one electron is put into each of the five d-orbitals before any pairing occurs in accord with Hunds rule and high spin complexes are formed. For example, Brà ¢Ã‹â€ Ã¢â‚¬â„¢ is a weak-field ligand and produces a small Άoct. So, the ion [FeBr6]3à ¢Ã‹â€ Ã¢â‚¬â„¢, again with five d-electrons, would have an octahedral splitting diagram where all five orbitals are singly occupied. In order for low spin splitting to occur, the energy cost of placing an electron into an already singly occupied orbital must be less than the cost of placing the additional electron into an eg orbital at an energy cost of Ά. As noted above, eg refers to the dz2 and dx2-y2 which are higher in energy than the t2g in octahedral complexes. If the energy required to pair two electrons is greater than the energy cost of placing an electron in an eg, Ά, high spin splitting occurs. The crystal field splitting energy for tetrahedral metal complexes (four ligands) is referred to as Άtet, and is roughly equal to 4/9Άoct (for the same metal and same ligands). Therefore, the energy required to pair two electrons is typically higher than the energy required for placing electrons in the higher energy orbitals. Thus, tetrahedral complexes are usually high-spin. The use of these splitting diagrams can aid in the prediction of the magnetic properties of coordination compounds. A compound that has unpaired electrons in its splitting diagram will be paramagnetic and will be attracted by magnetic fields, while a compound that lacks unpaired electrons in its splitting diagram will be diamagnetic and will be weakly repelled by a magnetic field. Crystal field stabilization energy The crystal field stabilization energy (CFSE) is the stability that results from placing a transition metal ion in the crystal field generated by a set of ligands. It arises due to the fact that when the d-orbitals are split in a ligand field (as described above), some of them become lower in energy than before with respect to a spherical field known as the barycenter in which all five d-orbitals are degenerate. For example, in an octahedral case, the t2g set becomes lower in energy than the orbitals in the barycenter. As a result of this, if there are any electrons occupying these orbitals, the metal ion is more stable in the ligand field relative to the barycenter by an amount known as the CFSE. Conversely, the eg orbitals (in the octahedral case) are higher in energy than in the barycenter, so putting electrons in these reduces the amount of CFSE. Octahedral crystal field stabilization energyIf the splitting of the d-orbitals in an octahedral field is Άoct, the three t2g orbitals are stabilized relative to the barycenter by 2/5 Άoct, and the eg orbitals are destabilized by 3/5 Άoct. As examples, consider the two d5 configurations shown further up the page. The low-spin (top) example has five electrons in the t2g orbitals, so the total CFSE is 5 x 2/5 Άoct = 2Άoct. In the high-spin (lower) example, the CFSE is (3 x 2/5 Άoct) (2 x 3/5 Άoct) = 0 in this case, the stabilization generated by the electrons in the lower orbitals is canceled out by the destabilizing effect of the electrons in the upper orbitals. Crystal Field stabilization is applicable to transition-metal complexes of all geometries. Indeed, the reason that many d8 complexes are square-planar is the very large amount of crystal field stabilization that this geometry produces with this number of electrons. Explaining the colours of transition metal complexes The bright colours exhibited by many coordination compounds can be explained by Crystal Field Theory. If the d-orbitals of such a complex have been split into two sets as described above, when the molecule absorbs a photon of visible light one or more electrons may momentarily jump from the lower energy d-orbitals to the higher energy ones to transiently create an excited state atom. The difference in energy between the atom in the ground state and in the excited state is equal to the energy of the absorbed photon, and related inversely to the wavelength of the light. Because only certain wavelengths (ÃŽÂ ») of light are absorbed those matching exactly the energy difference the compounds appears the appropriate complementary colour. As explained above, because different ligands generate crystal fields of different strengths, different colours can be seen. For a given metal ion, weaker field ligands create a complex with a smaller Ά, which will absorb light of longer ÃŽÂ » and thus lower frequency ÃŽÂ ½. Conversely, stronger field ligands create a larger Ά, absorb light of shorter ÃŽÂ », and thus higher ÃŽÂ ½. It is, though, rarely the case that the energy of the photon absorbed corresponds exactly to the size of the gap Ά; there are other things (such as electron-electron repulsion and Jahn-Teller effects) that also affect the energy difference between the ground and excited states Crystal field splitting diagrams Crystal field splitting diagrams Octahedral Pentagonal bipyramidal Square antiprismatic Square planar Square pyramidal Tetrahedral Trigonal bipyramidal LIMITATIONS(CFT):- CFT ignores the attractive forces the d-electrons of the metal ion and neuclear charge on the ligand atom. Therefore all the properties are dependent upon the ligand orbitals and their interaction with metal orbitals are not explained. In CFT model partial covalency of metal -ligand bond is not taken into consideration According to CFT metal-ligand bonding is purely electrostatic. In CFT only d-electrons of the metal ion are considered .the other metal orbitals such as s,Px,Py,Pz are taken into considerations. In CFT à Ã¢â€š ¬-orbitals of ligand are not considered The theory cant explain the relative strength of the ligands i.e. it cannot explain that why water is stronger than OH according to spectrochemical series . It does not explain the charge transfer spectra on the intensities of the absorption bands. VALENCE BOND THEORY(VBT) In chemistry, valence bond theory is one of two basic theories, along with molecular orbital theory, that developed to use the methods of quantum mechanics to explain chemical bonding. It focuses on how the atomic orbitals of the dissociated atoms combine on molecular formation to give individual chemical bonds. In contrast, molecular orbital theory has orbitals that cover the whole molecule According to this theory a covalent bond is formed between the two atoms by the overlap of half filled valence atomic orbitals of each atom containing one unpaired electron. A valence bond structure is similar to a Lewis structure, but where a single Lewis structure cannot be written, several valence bond structures are used. Each of these VB structures represents a specific Lewis structure. This combination of valence bond structures is the main point of resonance theory. Valence bond theory considers that the overlapping atomic orbitals of the participating atoms form a chemical bond. Because of the overlapping, it is most probable that electrons should be in the bond region. Valence bond theory views bonds as weakly coupled orbitals (small overlap). Valence bond theory is typically easier to employ in ground state molecules. v The overlapping atomic orbitals can differ. The two types of overlapping orbitals are sigma and pi. Sigma bonds occur when the orbitals of two shared electrons overlap head-to-head. Pi bonds occur when two orbitals overlap when they are parallel. For example, a bond between two s-orbital electrons is a sigma bond, because two spheres are always coaxial. In terms of bond order, single bonds have one sigma bond, double bonds consist of one sigma bond and one pi bond, and triple bonds contain one sigma bond and two pi bonds. However, the atomic orbitals for bonding may be hybrids. Often, the bonding atomic orbitals have a character of several possible types of orbitals. The methods to get an atomic orbital with the proper character for the bonding is called hybridization VB THEORY IN TODAYS DATE:- Valence bond theory now complements Molecular Orbital Theory (MO theory), which does not adhere to the VB idea that electron pairs are localized between two specific atoms in a molecule but that they are distributed in sets of molecular orbitals which can extend over the entire molecule. MO theory can predict magnetic properties in a straightforward manner, while valence bond theory gives similar results but is more complicated. Valence bond theory views aromatic properties of molecules as due to resonance between Kekule, Dewar and possibly ionic structures, while molecular orbital theory views it as delocalization of the à Ã¢â€š ¬-electrons. The underlying mathematics are also more complicated limiting VB treatment to relatively small molecules. On the other hand, VB theory provides a much more accurate picture of the reorganization of electronic charge that takes place when bonds are broken and formed during the course of a chemical reaction. In particular, valence bond theory co rrectly predicts the dissociation of homonuclear diatomic molecules into separate atoms, while simple molecular orbital theory predicts dissociation into a mixture of atoms and ions. More recently, several groups have developed what is often called modern valence bond theory. This replaces the overlapping atomic orbitals by overlapping valence bond orbitals that are expanded over a large number of basis functions, either centered each on one atom to give a classical valence bond picture, or centered on all atoms in the molecule. The resulting energies are more competitive with energies from calculations where electron correlation is introduced based on a Hartree-Fock reference wavefunction. Applications of VB theory An important aspect of the VB theory is the condition of maximum overlap which leads to the formation of the strongest possible bonds. This theory is used to explain the covalent bond formation in many molecules. For Example in the case of F2 molecule the F F bond is formed by the overlap of pz orbitals of the two F atoms each containing an unpaired electron. Since the nature of the overlapping orbitals are different in H2 and F2 molecules, the bond strength and bond lengths differ between H 2 and F2 molecules. In a HF molecule the covalent bond is formed by the overlap of 1s orbital of H and 2pz orbital of F each containing an unpaired electron. Mutual sharing of electrons between H and F results in a covalent bond between HF COMPARISON OF CFT AND VBT Some of the properties of complexes which could not be explained on the basis of valence bond theory are satisfactorily explained by crystal field theory.CFT is thus definitely an improvement over vbt these are the following merits of cft over vbt will prove that statement: CFT predicts a gradual change in magnetic properties of complexes rather than the abrupt change predicted by VBT . In some complexes ,when Ά is very close to P, simple temperature changes may affect the magnetic properties of complexes .Thus the CFT provides theoretical basis for understanding and predicting the variations of magnetic moments with temperature as well as detailed magnetic properties of complexes ,this is just in contrast of VBT which can not predict or explain magnetic behaviour beyond the level of specifying the number of unpaired electrons. Though the assumptions inherent in VBT and CFT are vastly different , the main difference lies in their description of the orbitals not occupied in the low spin states .VBT forbids their use as they are involved in forming hybrid orbitals, while they are involved in forming hybrid orbitals, while CFT strongly discourages their use as they are repelled by the ligands. According to VBT, the bond between the metal and the ligand is covalent,,while according to CFT it is purely ionic. The bond is now considered to have both ionic and covalent charachter .Unlike valence bond theory CFT provides a framework for the ready interpretation of such phenomenon as tretagonal distortions. CFT provides satisfactory explanation for the colour of transition metal complexes , i.e. spectral properties ofcomplexes, i.e. spectral properties of complexes. CFT can semiquantitatevily explain certain thermodynamic and kinetic properties. CFT makes possible a clear understanding of stereochemical properties of complexes. REFRENCES J. H. Van Vleck, Theory of the Variations in Paramagnetic Anisotropy Among Different Salts of the Iron Group, Phys. Rev. 41, 208 215 (1932)[1] Zumdahl, Steven S. Chemical Principles Fifth Edition. Boston: Houghton Mifflin Company, 2005. 550-551,957-964. 3) Silberberg, Martin S. Chemistry: The Molecular Nature of Matter and Change, Fourth Edition. New York: McGraw Hill Company, 2006. 1028 -1034. 4 )D. F. Shriver and P. W. Atkins Inorganic Chemistry 3rd edition, Oxford University Press, 2001. Pages: 227-236. 5) http://wwwchem.uwimona.edu.jm:1104/courses/CFT.html Murrel, J. N.; S. F. Tedder (1985). The Chemical Bond. John Wiley Sons. ISBN 0-471-90759-6 6) I. Hargittai, When Resonance Made Waves, The Chemical Intelligencer 1, 34 (1995)) 7) Shaik, Sason S.; Phillipe C. Hiberty (2008). A Chemists Guide to Valence Bond Theory. New Jersey: Wiley-Interscience. 8)text book of cordination chemistry by dr.R.K. sharma pg 61,62 9)engineering chemistry by A.K.pahari,B.S.chauhan.

Friday, September 20, 2019

Advantages of Binary System

Advantages of Binary System The binary number system, base two, uses only two symbols, 0 and 1. Two is the smallest whole number that can be used as the base of a number system. For many years, mathematicians saw base two as a primitive system and overlooked the potential of the binary system as a tool for developing computer science and many electrical devices. Base two has several other names, including the binary positional numeration system and the dyadic system. Many civilizations have used the binary system in some form, including inhabitants of Australia, Polynesia, South America, and Africa. Ancient Egyptian arithmetic depended on the binary system. Records of Chinese mathematics trace the binary system back to the fifth century and possibly earlier. The Chinese were probably the first to appreciate the simplicity of noting integers as sums of powers of 2, with each coefficient being 0 or 1. For example, the number 10 would be written as 1010: 10= 1 x 23 + 0 x 22 + 1 x 21 + 0 x 20 Users of the binary system face something of a trade-off. The two-digit system has a basic purity that makes it suitable for solving problems of modern technology. However, the process of writing out binary numbers and using them in mathematical computation is long and cumbersome, making it impractical to use binary numbers for everyday calculations. There are no shortcuts for converting a number from the commonly used denary scale (base ten) to the binary scale. Over the years, several prominent mathematicians have recognized the potential of the binary system. Francis Bacon (1561-1626) invented a bilateral alphabet code, a binary system that used the symbols A and B rather than 0 and 1. In his philosophical work, The Advancement of Learning, Bacon used his binary system to develop ciphers and codes. These studies laid the foundation for what was to become word processing in the late twentieth century. The American Standard Code for Information Interchange (ASCII), adopted in 1966, accomplishes the same purpose as Bacons alphabet code. Bacons discoveries were all the more remarkable because at the time Bacon was writing, Europeans had no information about the Chinese work on binary systems. A German mathematician, Gottfried Wilhelm von Leibniz (1646-1716), learned of the binary system from Jesuit missionaries who had lived in China. Leibniz was quick to recognize the advantages of the binary system over the denary system, but he is also well known for his attempts to transfer binary thinking to theology. He speculated that the creation of the universe may have been based on a binary scale, where God, represented by the number 1, created the Universe out of nothing, represented by 0. This widely quoted analogy rests on an error, in that it is not strictly correct to equate nothing with zero. The English mathematician and logician George Boole (1815-1864) developed a system of Boolean logic that could be used to analyze any statement that could be broken down into binary form (for example, true/false, yes/no, male/female). Booles work was ignored by mathematicians for 50 years, until a graduate student at the Massachusetts Institute of Technology realized that Boolean algebra could be applied to problems of electronic circuits. Boolean logic is one of the building blocks of computer science, and computer users apply binary principles every time they conduct an electronic search. The binary system works well for computers because the mechanical and electronic relays recognize only two states of operation, such as on/off or closed/open. Operational characters 1 and 0 stand for 1 = on = closed circuit = true 0 = off = open circuit = false. The telegraph system, which relies on binary code, demonstrates the ease with which binary numbers can be translated into electrical impulses. The binary system works well with electronic machines and can also aid in encrypting messages. Calculating machines using base two convert decimal numbers to binary form, then take the process back again, from binary to decimal. The binary system, once dismissed as primitive, is thus central to the development of computer science and many forms of electronics. Many important tools of communication, including the typewriter, cathode ray tube, telegraph, and transistor, could not have been developed without the work of Bacon and Boole. Contemporary applications of binary numerals include statistical investigations and probability studies. Mathematicians and everyday citizens use the binary system to explain strategy, prove mathematical theorems, and solve puzzles. Basic Concepts behind the Binary System To understand binary numbers, begin by remembering basic school math. When we were first taught about numbers, we learnt that, in the decimal system, things are categorised into columns: H | T | O 1 | 9 | 3 such that H is the hundreds column, T is the tens column, and O is the ones column. So the number 193 is 1-hundreds plus 9-tens plus 3-ones. Afterwards we learnt that the ones column meant 10^0, the tens column meant 10^1, the hundreds column 10^2 and so on, such that 10^2|10^1|10^0 1 | 9 | 3 The number 193 is really {(1*10^2) + (9*10^1) + (3*10^0)}. We know that the decimal system uses the digits 0-9 to represent numbers. If we wished to put a larger number in column 10^n (e.g., 10), we would have to multiply 10*10^n, which would give 10 ^ (n+1), and be carried a column to the left. For example, if we put ten in the 10^0 column, it is impossible, so we put a 1 in the 10^1 column, and a 0 in the 10^0 column, therefore using two columns. Twelve would be 12*10^0, or 10^0(10+2), or 10^1+2*10^0, which also uses an additional column to the left (12). The binary system works under the exact same principles as the decimal system, only it operates in base 2 rather than base 10. In other words, instead of columns being 10^2|10^1|10^0 They are, 2^2|2^1|2^0 Instead of using the digits 0-9, we only use 0-1 (again, if we used anything larger it would be like multiplying 2*2^n and getting 2^n+1, which would not fit in the 2^n column. Therefore, it would shift you one column to the left. For example, 3 in binary cannot be put into one column. The first column we fill is the right-most column, which is 2^0, or 1. Since 3>1, we need to use an extra column to the left, and indicate it as 11 in binary (1*2^1) + (1*2^0). Binary Addition Consider the addition of decimal numbers: 23 +48 ___ We begin by adding 3+8=11. Since 11 is greater than 10, a one is put into the 10s column (carried), and a 1 is recorded in the ones column of the sum. Next, add {(2+4) +1} (the one is from the carry) = 7, which is put in the 10s column of the sum. Thus, the answer is 71. Binary addition works on the same principle, but the numerals are different. Begin with one-bit binary addition: 0 0 1 +0 +1 +0 ___ ___ ___ 0 1 1 1+1 carries us into the next column. In decimal form, 1+1=2. In binary, any digit higher than 1 puts us a column to the left (as would 10 in decimal notation). The decimal number 2 is written in binary notation as 10 (1*2^1)+(0*2^0). Record the 0 in the ones column, and carry the 1 to the twos column to get an answer of 10. In our vertical notation, 1 +1 ___ 10 The process is the same for multiple-bit binary numbers: 1010 +1111 ______ Step one: Column 2^0: 0+1=1. Record the 1.   Temporary Result: 1; Carry: 0 Step two: Column 2^1: 1+1=10.   Record the 0 carry the 1. Temporary Result: 01; Carry: 1 Step three: Column 2^2: 1+0=1 Add 1 from carry: 1+1=10.   Record the 0, carry the 1. Temporary Result: 001; Carry: 1 Step four: Column 2^3: 1+1=10. Add 1 from carry: 10+1=11. Record the 11.   Final result: 11001 Alternately: 11 (carry) 1010 +1111 ______ 11001 Always remember 0+0=0 1+0=1 1+1=10 Try a few examples of binary addition: 111 101 111 +110 +111 +111 ______ _____ _____ 1101 1100 1110 Binary Multiplication Multiplication in the binary system works the same way as in the decimal system: 1*1=1 1*0=0 0*1=0 101 * 11 ____ 101 1010 _____ 1111 Note that multiplying by two is extremely easy. To multiply by two, just add a 0 on the end. Binary Division Follow the same rules as in decimal division. For the sake of simplicity, throw away the remainder. For Example: 111011/11 10011 r 10 _______ 11)111011 -11 ______ 101 -11 ______ 101 11 ______ 10 Decimal to Binary Converting from decimal to binary notation is slightly more difficult conceptually, but can easily be done once you know how through the use of algorithms. Begin by thinking of a few examples. We can easily see that the number 3= 2+1. and that this is equivalent to (1*2^1)+(1*2^0). This translates into putting a 1 in the 2^1 column and a 1 in the 2^0 column, to get 11. Almost as intuitive is the number 5: it is obviously 4+1, which is the same as saying [(2*2) +1], or 2^2+1. This can also be written as [(1*2^2)+(1*2^0)]. Looking at this in columns, 2^2 | 2^1 | 2^0 1 0 1 or 101. What were doing here is finding the largest power of two within the number (2^2=4 is the largest power of 2 in 5), subtracting that from the number (5-4=1), and finding the largest power of 2 in the remainder (2^0=1 is the largest power of 2 in 1). Then we just put this into columns. This process continues until we have a remainder of 0. Lets take a look at how it works. We know that: 2^0=1 2^1=2 2^2=4 2^3=8 2^4=16 2^5=32 2^6=64 2^7=128 and so on. To convert the decimal number 75 to binary, we would find the largest power of 2 less than 75, which is 64. Thus, we would put a 1 in the 2^6 column, and subtract 64 from 75, giving us 11. The largest power of 2 in 11 is 8, or 2^3. Put 1 in the 2^3 column, and 0 in 2^4 and 2^5. Subtract 8 from 11 to get 3. Put 1 in the 2^1 column, 0 in 2^2, and subtract 2 from 3. Were left with 1, which goes in 2^0, and we subtract one to get zero. Thus, our number is 1001011. Making this algorithm a bit more formal gives us: Let D=number we wish to convert from decimal to binary Repeat until D=0 a. Find the largest power of two in D. Let this equal P. b. Put a 1 in binary column P. c. Subtract P from D. Put zeros in all columns which dont have ones. This algorithm is a bit awkward. Particularly step 3, filling in the zeros. Therefore, we should rewrite it such that we ascertain the value of each column individually, putting in 0s and 1s as we go: Let D= the number we wish to convert from decimal to binary Find P, such that 2^P is the largest power of two smaller than D. Repeat until P If 2^P put 1 into column P subtract 2^P from D Else put 0 into column P End if Subtract 1 from P Now that we have an algorithm, we can use it to convert numbers from decimal to binary relatively painlessly. Lets try the number D=55. Our first step is to find P. We know that 2^4=16, 2^5=32, and 2^6=64. Therefore, P=5. 2^5 Subtracting 55-32 leaves us with 23. Subtracting 1 from P gives us 4. Following step 3 again, 2^4 Next, subtract 16 from 23, to get 7. Subtract 1 from P gives us 3. 2^3>7, so we put a 0 in the 2^3 column:  110 Next, subtract 1 from P, which gives us 2. 2^2 Subtract 4 from 7 to get 3. Subtract 1 from P to get 1. 2^1 Subtract 2 from 3 to get 1. Subtract 1 from P to get 0. 2^0 Subtract 1 from 1 to get 0. Subtract 1 from P to get -1. P is now less than zero, so we stop. Another algorithm for converting decimal to binary However, this is not the only approach possible. We can start at the right, rather than the left. All binary numbers are in the form a[n]*2^n + a[n-1]*2^(n-1)++a[1]*2^1 + a[0]*2^0 where each a[i] is either a 1 or a 0 (the only possible digits for the binary system). The only way a number can be odd is if it has a 1 in the 2^0 column, because all powers of two greater than 0 are even numbers (2, 4, 8, 16). This gives us the rightmost digit as a starting point. Now we need to do the remaining digits. One idea is to shift them. It is also easy to see that multiplying and dividing by 2 shifts everything by one column: two in binary is 10, or (1*2^1). Dividing (1*2^1) by 2 gives us (1*2^0), or just a 1 in binary. Similarly, multiplying by 2 shifts in the other direction: (1*2^1)*2=(1*2^2) or 10 in binary. Therefore {a[n]*2^n + a[n-1]*2^(n-1) + + a[1]*2^1 + a[0]*2^0}/2 is equal to a[n]*2^(n-1) + a[n-1]*2^(n-2) + + a[1]2^0 Lets look at how this can help us convert from decimal to binary. Take the number 163. We know that since it is odd, there must be a 1 in the 2^0 column (a[0]=1). We also know that it equals 162+1. If we put the 1 in the 2^0 column, we have 162 left, and have to decide how to translate the remaining digits. Twos column: Dividing 162 by 2 gives 81. The number 81 in binary would also have a 1 in the 2^0 column. Since we divided the number by two, we took out one power of two. Similarly, the statement a[n-1]*2^(n-1) + a[n-2]*2^(n-2) + + a[1]*2^0 has a power of two removed. Our new 2^0 column now contains a1. We learned earlier that there is a 1 in the 2^0 column if the number is odd. Since 81 is odd, a[1]=1. Practically, we can simply keep a running total, which now stands at 11 (a[1]=1 and a[0]=1). Also note that a1 is essentially multiplied again by two just by putting it in front of a[0], so it is automatically fit into the correct column. Fours column: Now we can subtract 1 from 81 to see what remainder we still must place (80). Dividing 80 by 2 gives 40. Therefore, there must be a 0 in the 4s column, (because what we are actually placing is a 2^0 column, and the number is not odd). Eights column: We can divide by two again to get 20. This is even, so we put a 0 in the 8s column. Our running total now stands at a[3]=0, a[2]=0, a[1]=1, and a[0]=1. Negation in the Binary System Signed Magnitude Ones Complement Twos Complement Excess 2^(m-1) These techniques work well for non-negative integers, but how do we indicate negative numbers in the binary system? Before we investigate negative numbers, we note that the computer uses a fixed number of bits or binary digits. An 8-bit number is 8 digits long. For this section, we will work with 8 bits. Signed Magnitude: The simplest way to indicate negation is signed magnitude. In signed magnitude, the left-most bit is not actually part of the number, but is just the equivalent of a +/- sign. 0 indicates that the number is positive, 1 indicates negative. In 8 bits, 00001100 would be 12 (break this down into (1*2^3) + (1*2^2) ). To indicate -12, we would simply put a 1 rather than a 0 as the first bit: 10001100. Ones Complement: In ones complement, positive numbers are represented as usual in regular binary. However, negative numbers are represented differently. To negate a number, replace all zeros with ones, and ones with zeros flip the bits. Thus, 12 would be 00001100, and -12 would be 11110011. As in signed magnitude, the leftmost bit indicates the sign (1 is negative, 0 is positive). To compute the value of a negative number, flip the bits and translate as before. Twos Complement: Begin with the number in ones complement. Add 1 if the number is negative. Twelve would be represented as 00001100, and -12 as 11110100. To verify this, lets subtract 1 from 11110100, to get 11110011. If we flip the bits, we get 00001100, or 12 in decimal. In this notation, m indicates the total number of bits. For us (working with 8 bits), it would be excess 2^7. To represent a number (positive or negative) in excess 2^7, begin by taking the number in regular binary representation. Then add 2^7 (=128) to that number. For example, 7 would be 128 + 7=135, or 2^7+2^2+2^1+2^0, and, in binary, 10000111. We would represent -7 as 128-7=121, and, in binary, 01111001. Note: Unless you know which representation has been used, you cannot figure out the value of a number. A number in excess 2 ^ (m-1) is the same as that number in twos complement with the leftmost bit flipped. To see the advantages and disadvantages of each method, lets try working with them. Using the regular algorithm for binary addition, add (5+12), (-5+12), (-12+-5), and (12+-12) in each system. Then convert back to decimal numbers. APPLICATIONS OF BINARY NUMBER SYSTEM The binary number system, also called the  base-2  number system, is a method of representing numbers that counts by using combinations of only two numerals: zero (0) and one (1). Computers use the binary number system to manipulate and store all of their data including numbers, words, videos, graphics, and music. The term bit, the smallest unit of digital technology, stands for Binary digit. A byte is a group of eight bits. A kilobyte is 1,024 bytes or 8,192 bits. Using binary numbers, 1 + 1 = 10 because 2 does not exist in this system. A different number system, the commonly used decimal or  base-10  number system, counts by using 10 digits (0,1,2,3,4,5,6,7,8,9) so 1 + 1 = 2 and 7 + 7 = 14. Another number system used by computer programmers is hexadecimal system,  base-16  , which uses 16 symbols (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F), so 1 + 1 = 2 and 7 + 7 = E. Base-10 and base-16 number systems are more compact than the binary system. Programmers use the hexadecimal number system as a convenient, more compact way to represent binary numbers because it is very easy to convert from binary to hexadecimal and vice versa. It is more difficult to convert from binary to decimal and from decimal to binary. The advantage of the binary system is its simplicity. A computing device can be created out of anything that has a series of switches, each of which can alternate between an on position and an off position. These switches can be electronic, biological, or mechanical, as long as they can be moved on command from one position to the other. Most computers have electronic switches. When a switch is on it represents the value of one, and when the switch is off it represents the value of zero. Digital devices perform mathematical operations by turning binary switches on and off. The faster the computer can turn the switches on and off, the faster it can perform its calculations. Binary Decimal Hexadecimal Number Number Number System System System 0 0 0 1 1 1 10 2 2 11 3 3 100 4 4 101 5 5 110 6 6 111 7 7 1000 8 8 1001 9 9 1010 10 A 1011 11 B 1100 12 C 1101 13 D 1110 14 E 1111 15 F 10000 16 10 Positional Notation Each numeral in a binary number takes a value that depends on its position in the number. This is called positional notation. It is a concept that also applies to decimal numbers. For example, the decimal number 123 represents the decimal value 100 + 20 + 3. The number one represents hundreds, the number two represents tens, and the number three represents units. A mathematical formula for generating the number 123 can be created by multiplying the number in the hundreds column (1) by 100, or 102; multiplying the number in the tens column (2) by 10, or 101; multiplying the number in the units column (3) by 1, or 100; and then adding the products together. The formula is: 1  ÃƒÆ'-  102  + 2  ÃƒÆ'-  101  + 3  ÃƒÆ'-  100  = 123. This shows that each value is multiplied by the base (10) raised to increasing powers. The value of the power starts at zero and is incremented by one at each new position in the formula. This concept of positional notation also applies to binary numbers with the difference being that the base is 2. For example, to find the decimal value of the binary number 1101, the formula is 1  ÃƒÆ'-  23  + 1  ÃƒÆ'-  22  + 0  ÃƒÆ'-  21  + 1  ÃƒÆ'-  20  = 13. Binary Operations Binary numbers can be manipulated with the same familiar operations used to calculate decimal numbers, but using only zeros and ones. To add two numbers, there are only four rules to remember: Therefore, to solve the following addition problem, start in the rightmost column and add 1 + 1 = 10; write down the 0 and carry the 1. Working with each column to the left, continue adding until the problem is solved. To convert a binary number to a decimal number, each digit is multiplied by a power of two. The products are then added together. For example, to translate the binary number 11010 to decimal, the formula would be as follows: To convert a binary number to a hexadecimal number, separate the binary number into groups of four starting from the right and then translate each group into its hexadecimal equivalent. Zeros may be added to the left of the binary number to complete a group of four. For example, to translate the number 11010 to hexadecimal, the formula would be as follows: Binary Number System A Binary Number is made up of only 0s and 1s. http://www.mathsisfun.com/images/binary-number.gif This is 1ÃÆ'-8 + 1ÃÆ'-4 + 0ÃÆ'-2 + 1 + 1ÃÆ'-(1/2) + 0ÃÆ'-(1/4) + 1ÃÆ'-(1/8) (= 13.625 in Decimal) Similar to the  Decimal System, numbers can be placed to the left or right of the point, to indicate values greater than one or less than one. For Binary Numbers: 2 Different Values Because you can only have 0s or 1s, this is how you count using Binary: Decimal: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Binary: 0 1 10 11 100 101 110 111 1000 1001 1010 1011 1100 1101 1110 1111 Binary is as easy as 1, 10, 11. Here are some more equivalent values: Decimal: 20 25 30 40 50 100 200 500 Binary: 10100 11001 11110 101000 110010 1100100 11001000 111110100    How to Show that a Number is Binary To show that a number is a  binary  number, follow it with a little 2 like this:  1012 This way people wont think it is the decimal number 101 (one hundred and one). Examples: Example 1: What is 11112  in Decimal? The 1 on the left is in the 2ÃÆ'-2ÃÆ'-2 position, so that means 1ÃÆ'-2ÃÆ'-2ÃÆ'-2 (=8) The next 1 is in the 2ÃÆ'-2 position, so that means 1ÃÆ'-2ÃÆ'-2 (=4) The next 1 is in the 2 position, so that means 1ÃÆ'-2 (=2) The last 1 is in the units position, so that means 1 Answer: 1111 = 8+4+2+1 = 15 in Decimal Example 2: What is 10012  in Decimal? The 1 on the left is in the 2ÃÆ'-2ÃÆ'-2 position, so that means 1ÃÆ'-2ÃÆ'-2ÃÆ'-2 (=8) The 0 is in the 2ÃÆ'-2 position, so that means 0ÃÆ'-2ÃÆ'-2 (=0) The next 0 is in the 2 position, so that means 0ÃÆ'-2 (=0) The last 1 is in the units position, so that means 1 Answer: 1001 = 8+0+0+1 = 9 in Decimal Example 3: What is 1.12  in Decimal? The 1 on the left side is in the units position, so that means 1. The 1 on the right side is in the halves position, so that means 1ÃÆ'-(1/2) So, 1.1 is 1 and 1 half = 1.5 in Decimal Example 4: What is 10.112  in Decimal? The 1 is in the 2 position, so that means 1ÃÆ'-2 (=2) The 0 is in the units position, so that means 0 The 1 on the right of the point is in the halves position, so that means 1ÃÆ'-(1/2) The last 1 on the right side is in the quarters position, so that means 1ÃÆ'-(1/4) So, 10.11 is 2+0+1/2+1/4 = 2.75 in Decimal

Thursday, September 19, 2019

The House on Mango Street Essay -- Character Analysis, Esperanza

When I grow up, I want to be a black gum tree. Black gum trees are known for their internal strength. Instead of dwelling on outward beauty, they spend more time focusing on their inner growth and developing their core. Only after they have achieved this goal can they produce beautiful fruits that draw animals near to them. Any surfaces that the berries touch are stained as to say, â€Å"I was here and made a permanent difference.† After they have utilized their outward influences, they use their internal scars and hollow places to protect the animals surrounding around it. If human lives were to reflect the concepts of the black gum tree, governments, individuals, and communities would be radically transformed. While this is a beautiful image, communities will never fully reach this aspiration. Sandra Cisneros shows the positive and negative effect of community on human growth in The House on Mango Street when Esperanza subconsciously reads the four skinny trees as a stand-in for herself. The layer of concrete surrounding the roots of the trees is a metaphor for the barrier between Esperanza’s success and her community. These four skinny trees are located in the middle of an impoverished city that is plagued with crime, prostitution, and sense of hopelessness. Because all of these cycles are nearly impenetrable, they are a metaphor for the concrete that lay on top of their roots. This slab will forever sit on top of the downward facing roots separating them from the vertical growth that is above them. Ironically, the roots under the concrete support the same slab that is hindering their growth. Without the support of the individuals living on Mango Street, the layer of socially formed concrete would crumble into dust; however, becau... ...Cisneros 110). Her internal strength is strong enough to let her grow beyond the constraints of her community, but she will never reach her full potential until she returns to change the roots that made her that way. Esperanza then chooses to develop the core of her personality despite living in the middle of tangled roots, which ultimately leads to her escape. When I grow up, I want to be Esperanza. I want to think critically, exhort change, find beautiful elements in ordinary texts, and affect my fallen community with the fruits of my internal strength. If Esperanza had not chosen to use both the positive and negative effects of her community as inspiration, she would have entrapped herself and failed to influence the hurting society around her. Instead, she chooses to act like the trees and build her internal strength so that she may reach others effectively.

Wednesday, September 18, 2019

HIPAA Act of 1996 :: Health, Health Information

â€Å"The Health Insurance Portability and Accountability Act (HIPAA) of 1996 made it illegal to gain access to personal medical information for any reasons other than health care delivery, operations, and reimbursements† (Shi & Singh, 2008, p. 166). â€Å"HIPAA legislation mandated strict controls on the transfer of personally identifiable health data between two entities, provisions for disclosure of protected information, and criminal penalties for violation† (Clayton 2001). â€Å"HIPAA also has privacy requirements that govern disclosure of patient protected health information (PHI) placed in the medical record by physicians, nurses, and other health care providers† (Buck, 2011). Always remember conversations about a patient’s health care or treatment is a violation of HIPAA. â€Å"All PHI is included in the privacy requirements for example: the patient’s past, present or future physical or mental health or condition; the provision of health ca re to the individual, or the past, present, or future payment for the provision of health care to the individual, and that identifies the individual or for which there is a reasonable basis to believe it can be used to identify the individual† (Buck, 2011). Other identifiable health information would be the patient’s name, address, birth date and Social Security Number (Keomouangchanh, 2011). (Word count 197) There has been some ethical issues surrounding the development and use of technology, that would consist of some advancements, such as â€Å"when in vitro fertilization is applied in medical practice and leads to the production of spare embryos, the moral question is what to do with these embryos† (Shi & Singh, 2008, p. 182). As for ethical dilemmas that comes into play with â€Å"gene mapping of humans, genetic cloning, stem cell research, and others areas of growing interest to scientist† (Shi & Singh, 2008, p. 182). â€Å"Life support technology raises serious ethical issues, especially in medical decisions regarding continuation or cessation of mechanical support, particularly when a patient exists in a permanent vegetative state† (Shi & Singh, 2008, p. 182). Health care budgets are limited throughout this world, making it hard for advancements yet even harder to develop the advancements with restraints. Which brings us back to the â€Å"social, ethical, and legal constraints, public and private insurers face the problem deciding whether or not to cover novel treatments† 188. Similarly what was mentioned before the decisions about â€Å"new reproductive techniques such as intracytoplasmic sperm injection in vitro fertilization (ICSIIVF), new molecular genetics predictive tests for hereditary breast cancer, and the newer drugs such as sildenafil (Viagra) for sexual dysfunction† (Giacomini, 2005).

Tuesday, September 17, 2019

Short Story Essay

The characters In the science fiction genre are too small minded to see the big picture. These characters are unable to evaluate the consequences of their actions. The characters are also resistant to the warnings of others. As a result, their ignorance may not only have jeopardized their own life and freedom, but may also have Jeopardized the lives and freedom of others. Characters in the science fiction genre are unable to evaluate the consequences of their actions and as a result jeopardize their own lives and freedom or the lives and freedom of others.To begin, in the short story â€Å"Men are Different† by Alan Bloch, the Robot is unable to see that treating the man as he would a fellow robot could result in the mans death, and ultimately the end of mankind. In the story the Robot decides that the man needs to be fixed and attempts to see what Is wrong with him: â€Å"†¦ His thermostat circuits were shot†¦ I turned him off without any trouble† (Bloch 1). The robot archeologist Is here studying the last man In the system. When the man begins complaining of the heat the Robot assumes he can fix him by opening him up as he loud do to another Robot.This shows that the Robot is unable to evaluate the consequences that may occur if he tries to fix this man. He is unable to see that he does not have the knowledge to fix a human and ultimately ends up killing the man, and ending mankind as a whole. Next, in the story â€Å"Random Sample† by T. P Caravan, the little girl could not see that by being mean and aggressive towards the aliens she could be putting her life, and the lives of others in Jeopardy. The little girl is telling the psychologist about her encounter with the aliens when she explains, â€Å"Anyway, hey paid a lot of attention to him, so I went over and punched him a couple of times.I'm afraid we broke up the insides of their spaceship a little† (Caravan 2). Here, the little girl Is telling the doctor about how s he Interacted with the aliens. She starts explaining what happened and It Is shown that she was very mean and aggressive towards them. By misbehaving and hurting the aliens and their spaceship, it proves that the little girl was unable to evaluate the consequences that would follow her actions. Ultimately, by acting this way towards the aliens she gave them a bad impression of humans which made them return to earth and kill off the human race. Lastly, in the story â€Å"Before Eden† by Arthur C.Clark, the scientists were unable to think about the consequences to Venus and its life forms if they buried their waste on the planet. After Hutchins and Garfield burry their waste and leave, the carpet plant comes back and discovers the garbage they left behind: â€Å"As the carpet crawled back to the lake, it carried contagion to all Its world. Even as the Morning Star set Its course for her distant home, Venus was dying† (Clark 6). When Hutchins and Garfield bury their garba ge on Venus, they do not think about how It could affect the planet. The carpet ends up coming back, finding the garbage and then eating It.The concentrated food, chemicals and nicotine from cigarette butts end up infecting the their garbage on the planet, they ultimately killed off all of the life on Venus. In conclusion, these characters in the science fiction genre were unable to evaluate the consequences of their actions and in all cases either put their own lives and freedom r the lives and freedom of others in Jeopardy. The characters in the non-fiction genre are resistant to the warnings of others and as a result, put their own lives and freedom or the lives and freedom of others in harms way.To start, in the story â€Å"The Weapon† by Frederick Brown, the doctor does not listen to the warning of Mr†¦ Maenad about his creation of the weapon. When Mr†¦ Maenad comes to Dry. Graham's house he expresses his concern about what Dry. Graham is creating: â€Å"Dry. Graham, you are the man who's scientific work is more likely than that of NY other man to end the human race's chance for survival† (Brown 1). As soon as Mr†¦ Maenad enters the doctors home, he warns him of how dangerous the weapon he is creating will be to mankind. Dry. Graham is resistant to his warning and claims that he is only advancing science.Ultimately, Dry. Graham ignores the warning and creates a weapon that could destroy mankind. It is only when Mr†¦ Maenad gives a gun to his mentally ill son, that he realizes how destructive the weapon really is if put in the wrong hands. Next, in the story â€Å"A Sound of Thunder† by Ray Bradbury, the hereafter Sickles does not listen to Travis' warning about leaving the Path and how it could change the future. When Sickles asks why they cannot leave the Path, Travis explains, â€Å"Step on one mouse and you leave your print, like a Grand Canyon, across Eternity.Queen Elizabeth might never be born†¦ There m ight never be a United States at all. So be careful. Stay on the Path. Never step off† (Bradbury 7). Here, Travis is explaining to Sickles why it is important to never leave the Path. While Travis is explaining this, Sickles questions him and does not believe that what Travis is saying sakes any sense. Sickles ignores the warning and later on in the story when he is running back to the time machine, he steps off the Path and changes the future.Ultimately, he puts peoples lives and freedom in danger by ignoring the warning and changing the future. Lastly, in the story â€Å"The Murderer† by Ray Bradbury, Mr†¦ Brock does not listen to the warning the psychiatrist gives him about damaging technology and as a result Jeopardizes his own freedom. When the psychiatrist is speaking to Mr†¦ Brock, he asks him if he's aware that the technology he is damaging is not his and says, Mimi don't want any further help from the Office of Mental Health? You're ready to take the consequences? (Bradbury 4). The psychiatrist is here explaining that because the technology he destroys is not his, if he does not take help from the Office of Mental Health he will be punished. Mr†¦ Brock ignores the warning and says it is only the beginning. By ignoring the warning, Mr†¦ Brock puts his own freedom in jeopardy and therefore has to remain in prison. The characters in the non fiction genre were too resistant to the warnings of others, and as a result put their own lives ND freedom or the lives and freedom of others in Jeopardy.In the science fiction genre, characters put their lives and freedom or the lives and freedom of others in Jeopardy. Characters in this genre cannot evaluate the consequences of their actions. The characters are also resistant to the warnings of small minded and blinded by what they want. The characters go by their own agenda rather than considering the greater good. They do not look at the bigger picture which results in their own de ath and loss of freedom, or the death and loss of freedom of others.