Tuesday, November 26, 2019

FTP

FTP Definition FTP or File Transfer protocol refers to rules or protocols that are used to transfer files from one computer to another. The files are transferred from a remote computer to another computer connected to a web server or internet. The transfer of the files happens through the aid of transmission Control Protocol/internet protocol (TCP/IP).Advertising We will write a custom research paper sample on FTP specifically for you for only $16.05 $11/page Learn More TCP is a set of communication rules that breaks data into packets in a bid to transfer each packet through its own root. These data packets emerge to form a complete file at the receiving computer. Therefore, file transfer protocols are able to send files through the aid of TCP. FTP qualifies to be the most efficient and fastest method of transferring data or files compared to others like the Hypertext transmission protocol (HTTP). There are various aims of the file transfer protocol including el evating document allotment such as computer programs and information, boosting inherent or circuitous use of computers at their distant areas, protecting users for any probable fluctuations, and heightening a consistent and proficient conveyance of documents between two distant areas. Overview FTP has revolutionalised thus enhancing the transfer of files from one remote computer to another or others that are in separate locations. FTP has enabled the transfer of larger files and software from the internet. With FTP, one can download and copy files to the remote computer. They can be transferred to a distant shared folder, which channels them from the central processor to another over the internet. FTP functions with the aid of a transmission control protocol that enables transfer of files to the other computer. The users of this protocol may authenticate or gain access to the files through established sign protocols including usernames and passwords (Entwistle, 2011, p. 192). Howeve r, there is also the possibility for the users to connect to the FTP anonymously in the case where the server configuration allows.Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Security of files transmitted through this platform is not efficient. However, FIPS serves to secure files that are transmitted through the platform. For efficient application of FTP, one has to meet a number of issues. One of them is to ensure that the FTP runs on faster networks, which have an approximate of a single frame of 200Kbps or multiple frames of 2 Mbps. The sending computer should be connected to a Daemon or FTP server to allow transfer of information. There is also the need to put in place sufficient measures to ensure that there is security when sending the files on the server. The files should be scanned before sending and or downloading them from the receiving computer to guara ntee security of the information. There are viruses or malfunctions that may be a threat to the files and even to the computer. Therefore, care should be ensured to the later. FTP nowadays comes in various programs that can be used to transfer files. Examples of these programs include WSFTP LE and CuteFTP. Some of these programs are free downloads while others are bought from authorised dealers. History of FTP The far the FTP protocol has reached has its roots in the early 1970s when the Request For Comments (RFC) 14 standards were published in 1971. This development proceeded with the transmission control protocol and internet protocol that were developed in early 1980. These early standards provided a description of the basic command of the rules, which was an insight on how communication of devises in the internet occurred. During this time of development, the network control protocol, which later came to be the transmission control protocol was used to convey network traffic.Adv ertising We will write a custom research paper sample on FTP specifically for you for only $16.05 $11/page Learn More During this tie, the internet was not able to relay information back since Arpanet was small. Hence, few development computers were available. Any development went on as new standards arose thus overtaking the former versions of the FTP (Brian, 2010, p. 419). For instance, the publication of RFC 172 happened in June 1971. Other standards referred to as RFC 265 came in to being in November 1971 (Yosef Brian, 2010, p. 419). However, a major transformation was evident in July 1972 following the publishing of the RC 354. These standards contained the overall communication model that is currently in use by the modern transmission control protocol. Furthermore, more features of the protocol were evident in these standards. The standards have kept on improving with more user-friendly application being invented. This has seen the emergence of the m odem FTP protocol used to transfer large files effectively as opposed to the earlier FTP protocol. It is also evident that security has also been improved through the application of password, username, encryptions, and many other security measures. Features FTP has many features that have enabled it transfer files besides ensuring security of the systems. One of the features of FTP is that they have ports that help in communication. For instance, port 21 helps the client computer to communicate/send files and data from one computer to the other. This, otherwise called the control connection, is always open during the duration that transferring of a computer happens. It also has a port 20 also referred to as data connection. This port can be â€Å"opened by an active mode to its negotiated client or through a passive mode using an arbitrary port, which is linked to the negotiated server port† (Kurose Ross, 2010, p. 5: Harvey, 2009, p. 24). FTP has an application layer on whic h it operates. This layer is used to transfer files using the transmission control protocol or the internet protocol. For this to be achieved, the FTP server needs to run continuously besides waiting the incoming files sent by various remote computers on the internet.Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More FTP server is another feature of the file transfers. The server acts as the transmission medium. It stores information or data awaiting relay to the other host computer. Therefore, without these servers the FTP cannot run function smoothly. FTP also has features that allow download and transfer of multimedia files such as video files, images, game demos, software, patches, and music. It also has features that are able to integrate the hypertext media language editor that enables the user to edit files on the host’s web without having to download them. Due to the advancement of technology, more features have been added to the file transfer protocol to improve its capabilities to send and receive information on the internet. Social media has contributed significantly towards the improvement of the FTP protocol such as FTP client podcast manager. This feature is used to update podcasts RSS to allow for automatic downloads of preference. More features have improved the requiremen ts and the needs of back office users. Other FTPs have features such as event triggers used to update users on new issues that have happened. This happens automatically the moment a user opens the client computer served with a server. A good example is the updates on viruses or any information concerning a threat to the computer or alert message to scan the client computer for any viruses. Others have back up features that allow data or information to be stored on a server in an event of power outage or a virus attack that shuts the system abruptly. FTP also has sophisticated features that cater for larger businesses that use the websites for multiple purposes. Therefore, such FTPs require a heavy security to protect the system from outsiders. They also have to meet the requirements set by the regulatory bodies. Therefore, they should know who receives the message, in what amounts, and the internal protocols that can be blocked. They also have features that enable reporting and audi ting module that keeps records of all users that log into the system to ensure security and privacy. Development Over the years, other forms of file transfers have been invented. However, the file transfer protocol is still the fastest method of data and information transfer in relation to the hypertext transfer protocol. The file transfer protocol has undergone a number of changes since the first standards were developed in 1971. Early developers categorised the FTP networks into two namely direct and indirect networks. In the direct network, the user of a remote computer is able to download and upload files with a mindset that there is no network (Sheu et al., 2010, p. 285). The user interface creates an illusion of no network between the host user and the sender computer. On the other hand, indirect network allows users to get and use resources from the host computer, which they can then transfer back to the host computer. The two methods serve as the backbone on the networking a pplications for the transmission control protocol with telnet being used for direct access and FTP in the indirect network. The development of FTP began in 1971 with the publication of RFC 114. These FTPs contained standards that described the communication aspects of the protocol, which was the first communication model that could be used with TCPs of commands used in the FTP include ABOR, meaning/or standing for abortion of active file transfer; ACCT, meaning account information; DELE, meaning to delete a file; HELP, meaning help; Lang, meaning language negotiation; XSEN, meaning send to terminal; and STOU, meaning to store a file in a unique way among many other commands. The list is endless. These commands explain why the process of developing new File Transfer protocol is tedious and involving. Expectation The expectation of the FTP is still high among its users due to the advancement of technology and the evolution of a more sophisticated technology. One of the types of FTP is the FTP voyager, which has continuously experienced new changes. For instance, the latest version of the FTP voyager 15.2.0.19 that was released on November 2011 has been upgraded to include more features that can enable improved services (FTP Voyager, 2012, Para. 2). One of the areas that were upgraded or fixed includes the correction of servers that had problems that led to the closure of data channels that caused delays in the file transfers and directory listings. SFTP bugs were also corrected especially the symbolic links that were not earlier corrected. However, users still have higher expectations in the FTP. For example, they yearn to have a FTP experience where files will be encrypted. They also wish to see any security threats associated with transfer of file using the FTP managed or contained. Conclusion FTP is one of the networks that have brought changes in the way users send and receive their files across the world. FTP has made it easier and convenient for users to e xchange and share their messages. Companies have benefited from this platform. Even though the development of FTP went through various challenges, it has recorded a significant success. FTP has various advantages that have assisted positively in making it easier for people to share their information. Even though, it has a number of advantages, there are some challenges associated with the network. One of the challenges is security threat and poor back up system. However, efforts are underway to make it more convenient, efficient, and reliable. The future of FTP seems bright, as more initiative is underway to achieve people’s expectations. Reference List Brian, D. (2010). The leader in FTP and file sharing: The Advantages and  Disadvantages of FTP Clients. London: Longman Publishers. Clark, M. (2003). Data Networks IP and the Internet. 1st ed. West Sussex, England: John Wiley Sons Ltd. Dean, T. (2010). Network Guide to Networks. New York: Delmar. Entwistle, A. (2011). Trans ferring image data files between computers. Proceedings of  The Royal Microscopical Society, 36(3), 189-197. FedBisOpps (USA). (2012). Network traffic Analyser and packet / Protocol generator; Combine Solicitation. New York: Word Press. Forouzan, B. (2000). TCP/IP: Protocol Suite. 1st ed. New Delhi, India: Tata McGraw- Hill Publishing Company Limited. FTP Voyager. (2012). FTP Voyager Release Notes. Retrieved from https://www.serv-u.com/free-tools/ftp-voyager-ftp-client-for-windows Harvey, R. (2009). Website Hosting: Advanced features of FTP File transfer protocol.  Web. Kurose, J., Ross, K. (2010). Computer Networking. Boston, MA: Pearson Education, Inc. Lovell, M., Selover, D. (1994). Software Reviews. Economic Journal, 104(424), 713-726. Lynch, C., Brownrigg, E. (1986). The Telecommunications Landscape: 1986.  Library Journal, 111(16), 40-47. Matthews, J. (2005). Computer Networking: Internet Protocols in Action. Danvers, MA: John Wiley Sons Inc. Moore, C. (2001). WebDAV protocol comes of age. InfoWorld, 23(42), 37-69. Sheu, P. et al. (2010). Semantic Web Services. Semantic Computing, 1(1), 285-299. Yosef, S., Brian, J. (2010). Computer networks and distributed systems. Microelectronics Reliability, 28(3), 419-467.

Friday, November 22, 2019

Mosquitoes - Family Culicidae

Mosquitoes - Family Culicidae Who hasnt had an encounter with a mosquito? From the backwoods to our backyards, mosquitoes seem determined to make us miserable. Besides disliking their painful bites, mosquitoes concern us as vectors of diseases, from West Nile virus to malaria. Description: Its easy to recognize a mosquito when it lands on your arm and bites you. Most people dont take a close look at this insect, tending instead to slap it the moment it bites. Members of the family Culicidae do exhibit common characteristics if you can bear to spend a moment examining them. Mosquitoes belong to the suborder Nematocera – true flies with long antennae. Mosquito antennae have 6 or more segments. The males antennae are quite plumose, providing lots of surface area for detecting female mates. Female antennae are short-haired. Mosquito wings have scales along the veins and the margins. The mouthparts – a long proboscis – allow the adult mosquito to drink nectar, and in the case of the female, blood. Classification: Kingdom - AnimaliaPhylum - ArthropodaClass – InsectaOrder – DipteraFamily - Culicidae Diet: Larvae feed on organic matter in the water, including algae, protozoans, decaying debris, and even other mosquito larvae. Adult mosquitoes of both sexes feed on nectar from flowers. Only females require a bloodmeal in order to produce eggs. The female mosquito may feed on the blood of birds, reptiles, amphibians, or mammals (including humans). Life Cycle: Mosquitoes undergo complete metamorphosis with four stages. The female mosquito lays her eggs on the surface of fresh or standing water; some species lay eggs on damp soil prone to inundation. Larvae hatch and live in the water, most using a siphon to breathe at the surface. Within one to two weeks, the larvae pupate. Pupae cannot feed but can be active while floating on the waters surface. Adults emerge, usually in just a few days, and sit on the surface until they are dry and ready to fly. Adult females live two weeks to two months; adult males may only live a week. Special Adaptations and Defenses: Male mosquitoes use their plumose antennae to sense the species-specific buzzing of females. The mosquito produces its buzz by fluttering its wings up to 250 times per second. Females seek bloodmeal hosts by detecting carbon dioxide and octanol produced in breath and sweat. When a female mosquito senses CO2 in the air, she flies upwind until she finds the source. Mosquitoes dont require blood to live but need the proteins in a bloodmeal to develop their eggs. Range and Distribution: Mosquitoes of the family Culicidae live worldwide, except in Antarctica, but require habitat with standing or slow moving fresh water for young to develop. Sources: Diptera: Culicidae. (Accessed May 13, 2008).Family Culicidae - Mosquitoes - BugGuide.Net. (Accessed May 13, 2008).Mosquito - Wikipedia, the free encyclopedia. (Accessed May 13, 2008).

Thursday, November 21, 2019

Obesity in American Children Research Paper Example | Topics and Well Written Essays - 2500 words

Obesity in American Children - Research Paper Example 1140). Available evidence in indicates that statistics of childhood and teenage-hood obesity have more than tripled since 1980 and the prevalence does not appear to be showing any significant downward momentum (Wojcicki and Heyman 1457). Almost a third of 2 year-old children are currently overweight or obese with an increased likelihood exposure to cardiovascular disease and diabetes, of hospitalization and a subsequent diagnosis with a mental, bone and joint disorders than non-obese children (Thompson and Wolf 189). Worse still, the causative effects of obesity not only harms millions of Americans healthwise, but concurrently bulges out annual health care costs with little results—more than one quarter of America’s health care budget is devoted to obesity related health issues (Finkelstein and Fiebelkorn 223). The above notwithstanding, the problem stands with worse consequences for a society regarded as a front-runner in nearly every sphere of influence, technology in clusive; overweight children adolescents graduate to adulthood with all the health complications that accompany obesity. What is this obesity anyway? Are there chances of saving a generation whose lives apparently hangs on the pendulum? This paper investigates the impact that obesity on American Children—a disease now considered of epidemic proportions, with regard to its prevalence rates, the contributing factors, the health complications and the possible routes for preventive measures. Across section of epidemiological studies define obesity based on body mass index (BMI). It thus refers to a chronic, complex condition characterized by an excess amount body fat/adipose tissue relative to lean body mass with a resultant effect of â€Å"caloric imbalance†Ã¢â‚¬â€too little calories used in relation to the amount consumed (Daniels, et al 1999). Noteworthy, the amount of body fat consumed and those for subsequent usage are affected by various genetic makeup, behavioral i nteractions as well as environmental factors. More generally, while the causes of obesity may genetically linked, many of them the causes are behaviorally and environmentally conditioned and are remediable with correct child upbringing. The World Health Organization (W.H.O.), The Centers for Disease Control (CDC, Surgeon General, The National Institute of Health (N.I.H.) among other healthcare monitoring organizations, all now recognizes obesity as a major health issue that is in its prime levels of concern in the United States. Even though statistical increases in obesity have been somewhat similar in the industrialized world, the United States’ levels ranks among the highest the world over. The country has witnessed the estimates steadily increase from 13 percentage points in 1962 towards 19.4, 24.5, 26.6, 33.8 percentage points in 1997, 2004, 2007 and 2008 respectively (National Center for Health Statistics par 11-14). Overall, the prevalence has increased by a whopping 33 percent in the last decade alone with an ever burgeoning research evidence indicative of a direct relation between an increased in the mortality rate and the exacerbative effects of obesity (Fontaine, et al. 190). As insinuated above, the root cause of obesity can be tracked to

Tuesday, November 19, 2019

Americ's History Essay Example | Topics and Well Written Essays - 750 words

Americ's History - Essay Example Thus, the people became less empowered while the central government became more controlling and powerful. By design, when the Constitution was ratified, the states were empowered. However, over time a gradual drift toward a dominant national government has become evident. Two distinct political positions began to evolve from the colonists. Most Americans considered citizen "virtue" fundamental to any successful republican government. Because political power no longer rested with the central, all-powerful authority of the king, individuals in a republic needed to sacrifice their personal self-interest to the public good. The collective good of the people mattered more than the private rights and interests of individuals. Yet, not all Patriots agreed with this viewpoint defining republicanism. Some favored a republic ruled by a group of talented and educated elite. Republicanism for them meant an end to hereditary aristocracy, but not an end to all social hierarchy. These more conservative republicans feared that the fervor for liberty would overwhelm the stability of the social order. They watched with great concern as the lower-class in society - the poor farmers, tenants, and laboring classes in towns and cities seemed to embrace a kind of republica nism with a level playing field. Thus, two groups of people formed different political ideologies. The first weak national government, the Articl... They were eager to persuade their fellow citizens to amend the Articles of Confederation in favor of a muscular central government. But the poorer states' rights people played down the talk of anarchy from Shays rebellion. Many were debtors who feared that a powerful federal government would force them to pay their creditors. Yet, both groups agreed, the Confederation needed some strengthening. Instead of revising the Articles, the well-off delegates to the Constitutional Convention created a charter for a whole new government. In a series of compromises, the convention produced a plan that provided for a vigorous central government, a strong executive, and protection for property, while still upholding republican principles and states' rights. The American people were somewhat astonished, so well had the secrets of the convention been concealed. The public had expected the old Articles of Confederation to be patched up; now it was handed a startling new document in which, many thought, the precious jewel of state sovereignty was swallowed up. One of the hottest debates of American history forthwith erupted. The antifederalists, who opposed the stronger federal government, were arrayed against the federalists, who obviously favored it. Some of the leaders of the antifederalist camp included prominent revolutionaries like Samuel Adams, Patrick Henry, and Richard Henry Lee. Their followers consisted primarily, though not exclusively, of states' rights devotees, backcountry dwellers, and one-horse farmers - in general, the poorest classes. Large numbers of antifederalists saw in the Constitution a plot by the upper crust to steal power back from the common

Saturday, November 16, 2019

Communication and the internet Essay Example for Free

Communication and the internet Essay Many people would say that the internet is the most important invention ever. The internet has changed the way many people live. Decades ago, no one would know that the internet even existed whereas nowadays every home has access to it. One of the main reasons internet was introduced was for communicating. There are many different forms of communication online today that people in the past wouldn’t have thought possible. Many people will say advancement in communications is a blessing because it allows for us to connect with families and friends from afar, enables us to express ourselves in many ways, provides a medium for meeting new people with similar interests, and increases our productivity. The internet has transformed all forms of communication since the beginning of its existence.. The internet was first used by the U.S military for communications purposes. The internet, from the communication point of view, has brought on new developments and techniques to keep in touch not only for individuals, but for businesses as well. An example of how the internet has impacted communication would be an example of doctors now communicating through live video feeds via the internet with patients or other doctors to diagnose patients or to even guide and advise surgeons through complicated procedures. Email (electronic mail) was one of the biggest breakthroughs in communication when the internet was introduced. With email, it became possible to send messages and letters across the world in a matter of seconds to the recipients address. As technology improved, it became possible to ‘attach documents, photographs and even sound clips or songs to emails which made mail by post redundant.

Thursday, November 14, 2019

Proclaim Your Freedom of Speech †Burn a Flag! -- Argumentative Persua

Proclaim Your Freedom of Speech – Burn a Flag!      Ã‚  Ã‚   "This flag, which we honor and under which we serve, is the emblem of our unity, our power, our thought and purpose as a nation. It has no other character than that which we give it from generation to generation. The choices are ours" (quoted in Smith 87). This statement by Woodrow Wilson summarizes the debate over a proposed amendment to outlaw burning of the American flag. Is this symbol of our nation too powerful to be defiled in our collective mind, or is its manifestation of values the reason for us to outlaw its desecration? We see many constitutional and non-constitutional reasons both for and against passing the amendment; an analysis of the Constitution is vital to forming a valid opinion on this issue.    In the past, the Supreme Court has ruled that burning the flag is a form of free speech which may not be limited by the government. One of the earliest decisions on this issue was in Street v. New York (1969). After hearing about the murder of civil rights leader James Meredith, Sidney Street, a decorated veteran of World War II, burned a flag he had been displaying at his home (Cohen 185), telling bystanders that "if they let that happen to Meredith, we don't need an American flag" (Cohen 185). He was arrested, tried before a jury, and convicted under the state's statute prohibiting both the desecration of the flag and publicly speaking contemptuous words about it. Street's attorney appealed to the Supreme Court, which ruled the sentence unconstitutional. The Court's opinion was based mainly upon Mr. Street's words; it stated that his declarations were a form of protest which is protected by the First Amendment and that he did not provoke retaliation fro... ...mocracy. Boston, MA: Allyn and Bacon, 1998.    4. "H.J.RES.5." Online. Thomas . October 29, 2000.    5. "H.J.RES.33." Online. Thomas . October 29, 2000.    6. O'Brien, Tim. "The Great Divide: Flag Burning Decision Split the Court." ABC News OnLine. 1999. October 11, 2000.    7. "S.931." Online. Thomas . October 29, 2000.    8. Smith, Whitney. The Flag Book of the United States. New York: William Morrow and Company, 1970.    9. U.S. Supreme Court. "Street v. New York." 21 April 1969. FindLaw. Online. . October 29, 2000.    10. Webb, Sandi. "A Grand Old Flag? Does the U.S. really need to Prohibit Flag Burning?" Online. September 1995. Libertarian Party News . September 30, 2000.    11. Williams, Armstrong. "The Flag Burning Amendment." New York Amsterdam News: 8.28. October 1999. EbscoHost . October 29, 2000.

Monday, November 11, 2019

Practical Business Analysis Essay

1. Re-do all problems in Practice Problem Set 1. 2. Dollar Car Rental Co. was originally named Dollar a Day Car Rental because they charged $1.00 per day to rent a car, plus a charge per mile driven. Many customers complained that the odometers on Dollar’s cars recorded more miles than were actually driven. To evaluate these complaints you take a random sample of 6 Dollar’s cars, drive them on a carefully measured 100-mile course, and record the miles driven as registered by the odometers. The results are 100, 105, 109, 102, 107, and 101, with the sample standard deviation around 3.578. a. Using these sample results, construct a 95% confidence interval for the population mean miles recorded by all Dollar cars for a 100-mile trip. b. As a legal consultant hired by the group of the customers who complained about the odometers, do you have enough evidence to support your clients’ claim? State your hypotheses (H0 vs. Ha), rejection region and both statistical and sub stantive conclusions. 3. The grades on the final examination given in a large organic chemistry class are normally distributed with a mean of 72 and a standard deviation of 8. The instructor of this class wants to assign an â€Å"A† grade to the top 10% of the scores, a â€Å"B† grade to the next 10% of the scores, a â€Å"C† grade to the next 10% of the scores, a â€Å"D† grade to the next 10% of the scores, and an â€Å"F† grade to all scores below the 60th percentile of this distribution. For each possible letter grade, find the lowest acceptable score within the established range. 4. The weekly demand for General Motors car sales follows a normal distribution with a mean of 40,000 cars and a standard deviation of 12,000 cars. a. There is a 5% chance that GM will sell more than what number of cars during the next week? b. What is the probability that GM will sell between 20 and 23 thousand cars during the next week? 5. A department store is interested in the average balance that is carried on its store’s credit card. A sample of 40 accounts reveals an average balance of $1,250 and a standard deviation of $350. a. Find a 95% confidence interval for the mean account balance on this store’s credit card. b. What sample size would be needed to ensure that we could estimate the true mean account balance and have only 5 chances in 100 of being off by more than $100? 6. A marketing research consultant hired by Coca-Cola is interested in determining the proportion of customers who favor Coke over other soft drinks. A random sample of 400 consumers was selected from the market under investigation and showed that 53% favored Coca-Cola over other brands. a. Compute a 95% confidence interval for the true proportion of people who favor Coke. Do the results of this poll convince you that a majority of people favor Coke? b. Suppose 2,000 (not 400) people were polled and 53% favored Coke. Would you now be convinced that a majority of people favor Coke? 7. BatCo (The Battery Company) produces your typical consumer battery. The company claims that their batteries last at least 100 hours, on average. Your experience with the BatCo battery has been somewhat different, so you decide to conduct a test to see if the companies claim is true. You believe that the mean life is actually less than the 100 hours BatCo claims. You decide to collect data on the average battery life (in hours) of a random sample and the information related to the hypothesis test is presented below. Use this information to answer the following questions. a. You believe that the mean life is actually less than 100 hours, should you conduct a one-tailed or a two-tailed hypothesis test? State your alternative hypothesis. b. If you use a 5% significance level, would you conclude that the mean life of the batteries is typically more than 100 hours? State the rejection region and calculate the test statistic. c. If you were to use a 1% significance level in this case, would you conclude that the mean life of the batteries is typically more than 100 hours? Explain your answer. 8. Q-Mart is interested in comparing customer who used it own charge card with those who use other types of credit cards. Q-Mart would like to know if customers who use the Q-Mart card spend more money per visit, on average, than customers who use some other type of credit card. They have collected information on a random sample of 38 charge customers and the data is presented below. On average, the person using a Q-Mart card spends $192.81 per visit and customers using another type of card spend $104.47 per visit. Use the information below to answer the following questions. a. Given the information above, what is [pic] and [pic] for this comparison? Also, does this represent a one-tailed or a two-tailed test? Explain your answer. b. Using a 1% level of significance, is there sufficient evidence for Q-Mart to conclude that customers who use the Q-Mart card charge, on average, more than those who use another charge card? Explain your answer. 9. Suppose that you were asked to test H0: ÃŽ ¼ = 10 versus Ha: ÃŽ ¼ > 10 at the [pic] = 0.05 significance level and with a sample of size n = 10. Furthermore, suppose that you observed values of the sample mean and sample standard deviation and concluded that H0 be rejected. Is it true that you might fail to reject H0 if you were to observe the same values of the sample mean and standard deviation from a sample with n > 10? Why or why not? 10. Stock-market analysts are keenly interested in determining what factors influence the price of a stock. After some examination, a statistician hypothesized that a stock price (Y in $) would be affected by its quarterly dividends (X1 in $), its price/earnings ratio (X2), and the interest rate of treasury bills (X3 in %). The values of the relevant variables were observed for a period of 40 quarters. When the data were run on STATGRAPHICS PLUS, the accompanying printout was created.

Saturday, November 9, 2019

Children and Advertising Essay

Children are the most vulnerable to advertising. They are the most susceptible because their minds are immature and are unable to distinguish good advertising versus bad advertising. Television commercials have a huge impact on how it affects children. Commercials are the biggest form of advertisement geared toward children. â€Å"Children between the ages of two and eleven view well over 20,000 television commercials yearly, and that breaks down to 150 to 200 hours† (MediaFamily, 1998). Television advertisements geared towards children have the biggest market by far. â€Å"The advertising market in 1997 showed that children under twelve years of age spent well over twenty-four million dollars of their own money on products they saw on television† (Kanner & Kasser, 2000). Kanner and Kasser go on to say that advertisers have even hired psychologists as consultants to help the advertisers come up with fine-tuned commercials that attract children (2000). In 1999, a group of psychologists wrote to the American Psychological Association asking them to restrict the use of psychological research by advertisers to help sell their products to children. This letter also called for, â€Å"an ongoing campaign to probe, review and confront the use of psychological research in advertising and marketing to children† (Hays 1999). â€Å"Some child advertisers boldly admit that the commercials they use exploit children and create conflicts within the family† (Kanner & Kasser, 2000). Kanner and Kasser also say that, advertisers work very hard to increase their products â€Å"nag factor†. This term often refers to how often children pressure their parents to buy the item they saw advertised on television (2000). The effects on advertising to children can be very noticeable. There have been numerous studies done that document that â€Å"children under eight years old are  unable to understand the intent of advertisements developmentally, therefore  they accept the advertising claims as true† (Shelov, S., et. al., 1995). â€Å"The American Academy of Pediatrics continues to say that children under the age of eight cannot distinguish commercial advertisements from regular television programming. In addition, advertisers have become sneaky about the way they convey their product† (Shelov, S., et. al., 1995). For example, when the announcer says, â€Å"some assembly required† for a toy, it is at the end of the commercial and the announcer speaks very quickly. Sometimes, the disclaimers are written in small print and shown at the end of the commercial, and are not understood by most young children. Excessive television viewing often times causes higher obesity rates among children. Children often see foods that are high in fat and calories advertised on television and end up consuming too much of these foods. The American Academy of Pediatrics says that the bombardment of advertising for food and toys to children may result in the increased number of conflicts between parents and children. The American Academy of Pediatrics believes that, â€Å"advertising directed toward children is inherently deceptive and exploits children under eight years of age† (Shelov, S., et. al., 1995). Cigarette advertisements seen in magazines or billboards are an area that is in need of change. â€Å"In 1988, teenagers alone spent well over $1.26 billions on cigarettes and smokeless tobacco† (Shelov, S., et. al., 1995). This number has rose significantly since 1988, and continues to rise rapidly. Although there is an advertisement ban of cigarettes on television, logos and billboards are prominent in televised sports. This makes television advertising of cigarettes very prominent. There were two studies down in the early 1990s on cigarette advertisements. This study looked at how familiar children were with the Old Joe Camel logo on Camel cigarettes. â€Å"These studied revealed that nearly one third of three-year-old children, and almost all of the children over the age of six could identify the Joe Camel logo. By the age of six,  the Joe Camel logo was as familiar to children as Mickey Mouse† (Shelov, S., et. al., 1995). The advertising campaign for Camel cigare ttes was more  effective among children and adolescents than it was among adults. â€Å"In 2000, a study showed that on average, eighty-two percent of children in the United States see the numerous magazine advertisements for cigarettes† (Siegel, 2001). Alcohol advertisements on television are another touchy area. â€Å"American children view nearly 2000 beer and wine commercials every year on television and these ads specifically target young people by showing the â€Å"advantages† of drinking† (Shelov, S., et. al., 1995). There is a public health interest in trying to protect children from alcohol and cigarette advertisements. â€Å"The American Academy of Pediatrics recommends banning all tobacco and alcohol advertisements in the media, but some researchers believe that counter-advertising advertisements are more effective† (Shelov, S. et. al, 1995). Recently though, there have been counter-advertising campaigns aimed reducing the number of young people who smoke. In 2001, the â€Å"I Decide† campaign started airing on television. â€Å"This anti-smoking campaign, sponsored by the Illinois Department of Public Health, is the current anti-smoking campaign in Illinois. The â€Å"I Decide† advertisement aired on local ABC, CBS, NBC, FOX, and the WB networks in Winnebago, Macon, Champaign, Tazewell, Sangamon, Peoria, and McLean counties. I Decide advertisements also run on the following cable networks, ESPN, MTV, BET, Comedy Central, and TBS† (Illinois Department of Health, 2002). Alcohol and cigarette advertisements are still around and promote the wrong message to children. The effects on advertising to children can be very evident. There are laws and organizations out there to help protect children from advertisers. Advertising is a powerful tool in American culture today; it exists solely to sell  products and services. Advertising to children has not always been legal. ‘In 1750 BC, the Code of Hammurabi made it a crime to sell anything to a child without obtaining consent† (Shelov, S. et. al, 1995). Things in the advertising industry have changed significantly since then. In 1978, Michael Pertschuk, the chairman of the Federal Trade Commission, tried to restrict television advertisements aimed at children under thirteen. Due to a  ferocious lobbying campaign, his proposal did not pass (Kanner & Kasser, 2000). In the last fifteen years or so, there have been a few laws passed about advertising to children on television. â€Å"The Children’s Television Act of 1990 mandated that all broadcasters must show either educational or instructional children’s programming in order to renew their broadcasting license. This act also limits commercial time to ten and a half minutes per hour on weekends, and twelve minutes per hour on weekdays† (Shelov, S. et. al, 1995). Shelov and others continue on to say that, the main problem with this law is that television stations can cite public service announcements to fulfill the Children’s Television Act. They also said that this Act also established the Children’s Television Endowment Fund, which encourages the development of new educational programming for children (1995). There is currently an organization called the Children’s Advertising Review Unit (CARU) that is part of the Council of Better Business Bureaus. CARU reviews advertising and any promotional materials directed at children in the media (Council of Better Business Bureau, 2000). The Council of the Better Business Bureau continues on to say that CARU’s main duties are to review and evaluate child-directed advertisements in all forms of media, and to review the online privacy practices if they affect children. â€Å"If the advertisements are inconsistent or misleading with CARU’s Self-Regulatory Guidelines for Children’s Advertising, they seek change through the voluntary cooperation of advertisers† (2000). They work closely with advertisers to promote educational messages to children that are consistent with the  Children’s Television Act of 1990. The CARU’s Self-Regulatory Guidelines for Children’s Advertising gives criteria for evaluating advertising that is child-directed. There continues to be many more organizations out there that help protect children from advertisements. Until advertisers stop targeting children, there will always be a need for organizations that help protect children from advertisemen ts. It seems to me that the best ways to protect children from what adults fear will harm them- alcohol, drugs or advertising, is to set an example by our own behavior. We can talk with them  and encourage them to talk about the subject. The effects of media are minimized when parents talk to children about them. Whether we like it or not media education begins at home. The Internet is also another medium where children are at risk. Numerous web sites feature advertising to children. † In fact, many web sites are set up exclusively for children, such as, Nickelodeon’s and Disney’s. A growing number of web sites are now eliciting personal information. Some even use incentives and gifts to get e-mail addresses or other personal info† (DeFalco 1996). There is a very important law that helps protect children on the Internet. In April 2000, the Children’s Online Privacy Protection Act of 1998 (COPPA) took effect. â€Å"This Act says that if any personable identifiable information about a child under thirteen years of age is collected online, a privacy notice must be posted† (Federal Trade Commission, 2000). â€Å"Website operators must also get parental consent before collecting, using, or disclosing any personally identifiable information. In addition, this Act allows parents to review any personal identifiable information collected from their children. When the parents review their child’s personal information, they have the right to revoke their consent and ask that the information they collected about  their child is deleted from that website† (Federal Trade Commission, 2000). The Federal Trade Commission also says that site operators are required to list any third parties that the website operator gives information to, about a child. If the list of third parities changes, the website operator must have parental consent again (2000). The Center for Media Education (CME) is an organization that is dedicated to protecting children online by visiting websites to make sure that the COPPA rules are being enforced. CME is a national nonprofit organization, which dedicates itself to creating quality electronic media culture for children  and youth, for their families, and for the community. Their research focuses on the potential for children and youth in this rapidly evolving digital media age. â€Å"Over the years, CME has been the leading force in expanding both children’s educational television programming and fostering television and Internet safeguard for children and teens† (Center for Media Education, 2001). The Internet is an area that is growing rapidly, and is one area where children are the most vulnerable to advertising. Advertising to children also has many positive benefits, for both the marketers’ pocket and for the development of the child. â€Å"Kids are little human beings that need to grow up and learn valuable lessons, that throughout their lives they are going to want things that they can not have† (Fletcher and Phillips 1998). Also, in the media demanding society that we live in, learning how to decipher the truth of advertising messages is critical. Likewise, advertisers argue that parents still have ultimate control over household purchasing decisions. This presents an opportunity for children to learn to respect authority, which is another step critical to a child’s development. Additionally, advertising money helps pay for educational opportunities. â€Å"Without  advertising there would be a lot less toys and a lot less children’s programming such as Nickelodeon and the Cartoon Network† (Fletcher and Phillips 1998). Marketers are also using their advertising dollars to benefit education in other ways. â€Å"Cadbury, Pentax, C&A and Coca-Cola are advertising in textbooks and other learning materials such as wall charts† (Marshall, 1997). Due to under-funded school budgets, money may have not been otherwise available to pay for these supplementary educational materials. Advertising to children definitely has both positive and negative benefits that help and hinder the development of the child. Regardless of the effects  that marketers have on our youth, advertisements will continue. Mainly in part due to the high amount of dollars involved. New areas of the ethical debate will also continue to grow. Some of these new issues are the controversies that are arising from the exponential growth of the Internet and of global marketing. Both governmental agencies and parents need to be aware of this continuing debate as these new issues arise. Also, awareness needs to be developed on how these new issues affect children based on existing psychological research so that parents and the government can react in the best approach possible. The boundaries in media and advertising are rapidly changing. Young people will benefit more by learning to make intelligent media (and consumer) decisions than by attempts to limit their exposure to information that they will inevitably be exposed to regardless of the regulatory climate. Works Cited Center for Media Education. (2001). About the center for media education (CME). Retrieved March 20, 2002, from Http://www.cme.org. Council of Better Business Bureau. (2000). About the Children’s Advertising Review Unit (CARU). Retrieved January 30, 2002, from Http://www.caru.org/carusubpgs/aboutcarupg.asp. Federal Trade Commission. (2000). How to protect kids’ privacy online. Retrieved January 31, 2002, from Http://www.ftc.gov/bcp/conline/pubs/online/kidsprivacy.htm. Fletcher, Winston and Phillips, Richard. (1998, May 29). â€Å"A children’s character for advertising; analysis of advertising which targets children.† Campaign, page 28. Hays, C.L. (1999, October 31). Group says ads manipulate children with psychology. New York Times, p. C6. Illinois Department of Health (2002). I decide. Retrieved March 20, 2002, from Http://www.idecide4me.com/html/campaign/schedule.asp. Kanner, A.D., & Kasser, T. (2000). Stuffing our kids: Should psychologists help advertisers manipulate children? Retrieved January 30, 2002, from http://www.commercialalert.org/ Marshall, Caroline. (1997, September) â€Å"Protect the parents; exploiting parents and children via advertising.† Management Today, Page 92. Mediafamily (1998). Children’s advertising and gender roles. Retrieved January 31, 2002, from Http://www.mediaandthefamily.org/research/fact/childgen.shtml. Mediascope (2000). Children, health, and advertising. Retrieved January 31, 2002, from Http://www.mediascope.org/pubs/ibriefs/cha.htm. Shelov, S., Bar-on, M., Beard, L., Hogan, M., Holroyd, J.H., Prentice, B., Sherry, S.N., & V. Strasburger. (1995). Children, adolescents, and advertising. American Academy of Pediatrics, 95(2), 295-297. Siegel, M. (2001). Tobacco ads still aimed at kids, experts advise stronger protection. Ca, 51(6), 324-326.

Thursday, November 7, 2019

Squalicorax - Facts and Figures

Squalicorax - Facts and Figures Name: Squalicorax (Greek for crow shark); pronounces SKWA-lih-CORE-ax Habitat: Oceans worldwide Historical Period: Middle-Late Cretaceous (105-65 million years ago) Size and Weight: About 15 feet long and 500-1,000 pounds Diet: Marine animals and dinosaurs Distinguishing Characteristics: Moderate size; sharp, triangular teeth About Squalicorax As with many prehistoric sharks, Squalicorax is known today almost exclusively by its fossilized teeth, which tend to endure much better in the fossil record than its easily degraded cartilaginous skeleton. But those teethlarge, sharp and triangulartell an amazing story: the 15-foot-long, up-to- 1,000-pound Squalicorax had a worldwide distribution during the middle to late Cretaceous period, and this shark seems to have preyed indiscriminately on just about every kind of marine animal, as well as any terrestrial creatures unlucky enough to fall into the water. Evidence has been adduced of Squalicorax attacking (if not actually eating) the fierce mosasaurs of the late Cretaceous period, as well as turtles and giant-sized prehistoric fish. The most amazing recent discovery is of the foot bone of an unidentified hadrosaur (duck-billed dinosaur) bearing the unmistakable imprint of a Squalicorax tooth. This would be the first direct evidence of a Mesozoic shark preying on dinosaurs, though other genera of the time undoubtedly feasted on duckbills, tyrannosaurs and raptors that accidentally fell into the water, or whose bodies were washed into the sea after they succumbed to disease or starvation. Because this prehistoric shark had such a wide distribution, there are numerous species of Squalicorax, some of which are in better standing than others. The most well-known, S. falcatus, is based on fossil specimens recovered from Kansas, Wyoming and South Dakota (80 million or so years ago, much of North America was covered by the Western Interior Sea). The largest identified species, S. pristodontus, has been recovered as far afield as North America, western Europe, Africa, and Madagascar, while the earliest known species, S. volgensis, was discovered alongside Russias Volga River (among other places).

Tuesday, November 5, 2019

Chemistry Lab Safety Contract

Chemistry Lab Safety Contract This is a chemistry lab safety contract that you can print or assign for students and parents to read. Chemistry lab involves chemicals, flames, and other hazards. Education is important, but safety is the top priority. I will behave responsibly in the chemistry lab. Pranks, running around, pushing others, distracting others and horseplay may result in accidents in the lab.I will perform only the experiments authorized by my instructor. It can be dangerous to make up your own experiments. Also, performing additional experiments may take resources away from other students.I will not eat food or drink beverages in the lab.I will dress appropriately for chemistry lab. Tie back long hair so it cant fall into flames or chemicals, wear closed-toe shoes (no sandals or flip-flops), and avoid dangling jewelry or clothing that could pose a hazard.I will learn where the lab safety equipment is located and how to use it.I will notify my instructor immediately if I am injured in the lab or splashed by a chemical, even if no injury is apparent. Student: I have reviewed these safety rules and will abide by them. I agree to abide by the instructions given to me by my lab instructor. Student Signature: Date: Parent or Guardian: have reviewed these safety rules and agree to support my child and the teacher in creating and maintaining a safe lab environment. Parent or Guardian Signature: Date:

Saturday, November 2, 2019

Micromanaging Coca-Cola Corporation Essay Example | Topics and Well Written Essays - 3250 words

Micromanaging Coca-Cola Corporation - Essay Example Coca-Cola makes, and promotes nonalcoholic products around the world. It primarily provides glistening but still refreshments. The company’s dazzling drinks consist of nonalcoholic drinking products along with carbonation, for example vigor beverages, and carbonated water and distinctive flavored water. Its products include nonalcoholic drinks with no carbonation, which include noncarbonated water, flavorful water and improved water, noncarbonated vigor products, and juice refreshments, ready made teas and coffees, as well as drinks of sports activities. The Company also provides flavoring compounds, sweeteners, powders with regard to filtered liquid items, refreshment elements, as well as syrups. It sells its nonalcoholic drinks principally within Coca-Cola, Fanta, Sprite, Diet Coke, and some other simple brand names. The organization advertises it’s carried out refreshment items mainly to marketers; as well as drink focuses as well as syrups to bottling as well as can ning staff, vendors, wholesalers, as well as suppliers. At present Coca-Cola areas of operations extended a long way outside of Georgia and also the United States. The firm has grown as amongst the world’s virtually all incomparable companies. The Coca-Cola brand name is probably one of the five best icons on the globe. Presently, Cola contains approximately 400 products of different brands in more than 200 countries. (http://www.thecoca-colacompany.com). In 2010, the company’s total net operating revenue equaled $35. 119 billion while its total assets were $72.721billion (http://www.yahoo.finance.com). Almost 139, 600 employees are working at global level in its different areas of operations (10-K, 2010). Mission and Vision Statements The mission of Coca Cola is perfectly for the refreshment of the community is not merely for our bodies but also for one's heart together with mood together with style additionally. Furthermore, it desires to really encourage confidence together with the help belonging to the behavior together with