Saturday, November 30, 2019

Today, we are more concerned with our environment Essay Example For Students

Today, we are more concerned with our environment Essay than ever before. Similarly, it is my belief that we are more knowledgeable about our earths environment than did previous generations. I do not believe it would be an understatement to say that the planet earth is in serious jeopardyfrom the shrinking rain forests, to the polluting of the oceans and land, to the ozone layer problem. Nevertheless, for purposes of this discussion, it is my intent to focus on pesticides as one particularly rampant source of environmental problems. I particularly favor this subject, because I know that we as Americans can do much to prevent the deleterious impact which pesticides are having upon our environment. This is not some abstract notion that many people have regarding the ozone layer. For example, in ones own backyard or garden, there is much one can do in this respect. We will write a custom essay on Today, we are more concerned with our environment specifically for you for only $16.38 $13.9/page Order now Opposition by environmentalists to pesticide use in general and to certain groups of compounds in particular has grown in recent years, based on the contention that pesticides present a threat to the environment and to health. First aroused by the book Silent Spring (1952) by Rachel Carson, the anti-pesticide movement has had a substantial influence both in the U.S. Congress and in several state legislatures. As a result, severely restrictive legislation has banned the use of many pesticides and restricted use of several others. Also, costly and complicated legislation requirements have been imposed on new compounds. Pesticide legislation has significantly hampered research and development in the field. The average cost and lead-time needed to recover, research and market a new pesticide has increased from $2 million dollars and four years in the 1950s to nearly $20 million dollars and ten years in the 1970s. In recent years, more new pesticides have been banned than have had continued effective use, and there has been a reduction in the number of chemistry companies producing pesticides since the restrictions took effect. Environmentalists, scientists, and workers in the pesticide industry have also contented that some pesticide compounds are hazardous to human health. Workers in factories that produce some of these compounds have, in the process of bringing legal suits against some manufacturers, received financial compensation for illnesses allegedly caused by exposure to these chemicals. Agricultural workers have also brought suits, claiming that they have suffered physical damage as a result of pesticide exposure. Some pesticide chemicals recently DBCP, which effects the production of sperm have had their manufacturing severely restricted. Long range potential dangers of pesticides in the body are also beginning to concern experts. In 1989, controversy arose over safe pesticide levels for children. While the Environmental Protection Agency (EPA) claimed that the U. S. food supplies were safe, the National Resource Defense Council (NRDC) produced a study claiming that the safety standards used by the EPA were based on adult diet and physiologies. Some other problems have been attracting public attention. Certain pesticides are lethal to bees, and it is estimated that heavy pesticide use, especially in areas that depend on bees to pollinate crops, have caused substantial reduction in local hive populations. Finally, it has been suggested that the build up of non-degradable pesticides in the soil and in food chain may be more hazardous, in the long run, than these immediate problems. At this point, however, even the claims made against DDT which was banned in the United States because of its supposed deleterious effects and its bioconcentration in the food chain are still denied by many experts. (Baker, pp. 11-13) Frankly, I am more concerned about the solutions than I am with the causes. .ub13969dcb08333dc19205a7d8daa6e09 , .ub13969dcb08333dc19205a7d8daa6e09 .postImageUrl , .ub13969dcb08333dc19205a7d8daa6e09 .centered-text-area { min-height: 80px; position: relative; } .ub13969dcb08333dc19205a7d8daa6e09 , .ub13969dcb08333dc19205a7d8daa6e09:hover , .ub13969dcb08333dc19205a7d8daa6e09:visited , .ub13969dcb08333dc19205a7d8daa6e09:active { border:0!important; } .ub13969dcb08333dc19205a7d8daa6e09 .clearfix:after { content: ""; display: table; clear: both; } .ub13969dcb08333dc19205a7d8daa6e09 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub13969dcb08333dc19205a7d8daa6e09:active , .ub13969dcb08333dc19205a7d8daa6e09:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub13969dcb08333dc19205a7d8daa6e09 .centered-text-area { width: 100%; position: relative ; } .ub13969dcb08333dc19205a7d8daa6e09 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub13969dcb08333dc19205a7d8daa6e09 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub13969dcb08333dc19205a7d8daa6e09 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub13969dcb08333dc19205a7d8daa6e09:hover .ctaButton { background-color: #34495E!important; } .ub13969dcb08333dc19205a7d8daa6e09 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub13969dcb08333dc19205a7d8daa6e09 .ub13969dcb08333dc19205a7d8daa6e09-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub13969dcb08333dc19205a7d8daa6e09:after { content: ""; display: block; clear: both; } READ: International Business Essay Clearly exposure to limits of pesticides in food, and in particular, produce, needs to be given further attention. It was not so long ago when President Clinton and Al Gore first took office, and they both voiced their commitment to the environment. Unfortunately, fruits and vegetables, especially throughout the United States and in particular, California, are exposed to heavy concentrations of pesticides, which inevitably ends up in the food chain, and as well things which people themselves ingest. It seems as if every where you look, there they are: stirring about in your kitchen, hanging in the hallway, and

Tuesday, November 26, 2019

The feasibility of wind energy from strategic management perspective in Russia The WritePass Journal

The feasibility of wind energy from strategic management perspective in Russia 1. INTRODUCTION The feasibility of wind energy from strategic management perspective in Russia ; BAREC, 1998). 2. INTRODUCTION TO THE STUDY This study shall be undertaken by critically evaluating how these assessments are currently implemented in practice.   The effectiveness of these shall then be assessed by comparing them to practices adopted by other countries (see as an example: Bell, Gray Haggett, 2005; Bergmann, Hanley Wright, 2006; Van der Horst Toke, 2010).   This could help to identify some opportunities, which may be utilised in Russia, to improve the undertaking of feasibility studies. 4. PROBLEM STATEMENT In Russia, feasibility studies are conducted to establish if wind turbine projects are viable (as an example see; POWER, 2013; BAREC, 1998).   However, a variety of practices have been adopted to undertake these to date (Devine†Wright, 2005).   This research seeks to ascertain if these practices could be improved, by establishing how these assessments have been undertaken in other countries. 5. RESEARCH AIMS AND OBJECTIVES In conjunction with the problem statement above, the following aims have been formulated: To use available and relevant data, to investigate how socio-economic assessments are managed by using various management strategies (during the feasibility investigation phase of wind farm developments). To use available and relevant data, to investigate how socio-economic assessments are implemented by using various management strategies (during the feasibility investigation phase of wind farm developments). To use the findings from the above two aims make recommendations for how practices may be improved in Russia. Additionally, the following objectives have been developed: To evaluate how socio-economic assessments are strategically managed and implemented (during the feasibility phases of wind farm projects in Russia and other countries). To evaluate if these assessments may be improved in Russia. 6. PROPOSAL STRUCTURE The proposed outline of the dissertation is described in the next section. 7.LITERATURE REVIEW To date, studies have been undertaken into the development of wind farms (see as an example: Bell, Gray Haggett, 2005; Bergmann, Hanley Wright, 2006; Van der Horst Toke, 2010).   The majority of these have been focused on developments in Europe or the United States of America.   There are a few case studies, which are pertinent to these types projects in Russia (as an example see; POWER, 2013; BAREC, 1998).   Mainly, these case studies show that a variety of techniques are used to seek to ascertain if these developments are feasible.   To ensure that this is the case a number of assessments are undertaken (see as an example: Bell, Gray Haggett, 2005; Bergmann, Hanley Wright, 2006).   This helps to ensure that each aspect of the development and its impacts are fully considered.   One assessment, which is important, seeks to evaluate the socio -economic impacts of wind farm developments (Wolsink, 2007).   It is the management and implementation of these in Russia, wh ich this study seeks to explore. This shall be achieved by examining the literature from Europe or the United States of America (see as an example: Bell, Gray Haggett, 2005; Bergmann, Hanley Wright, 2006; Van der Horst Toke, 2010) and comparing this to the Russian case studies (as an example see; POWER, 2013; BAREC, 1998).   This will enable the researcher to understand how these are undertaken in a number of countries and how practices may be improved in Russia. 7.3 LITERATURE REVIEW SUMMARY The findings from this review shall be detailed in a summary and the research questions shall be outlined. 7.4. RESEARCH QUESTIONS Provisionally, the following research questions have been developed. How have socio-economic assessments been strategically managed (during the feasibility studies of wind farms in different countries)? How have the socio-economic assessments been implemented (during the feasibility phases of wind farm developments in Russia and other countries)? To date, what lessons have been learnt from one and two, and how may these be applied in Russia? 7.5 METHODOLOGY Due to the nature of this study, the research shall be based on an extensive review of the literature and case studies.   Once all of these have been examined and collated a number of recommendations shall be made.   Ã‚  Ã‚  Ã‚  Ã‚   7.6 RESEARCH PHILOSOPHY The research philosophy, which has been adopted for this study is positivism.   This will allow the investigation to be a critical and objective base method (Sundars, 2003). 7.7 RESEARCH APPROACH The research approach, which has chosen for this study is qualitative in nature, as it will be based on a literature review (Sundars, 2003). This will allow the research to explore the problem, which was outlined above, to see if any improvements may be made. 7.8 RESEARCH STRATEGY The research strategy, which has been chosen for this study is a literature review (Sundars, 2003). 7.9 DATA COLLECTION The literature review shall be conducted by searching websites electronic journals, case studies and relevant books.   Once a number of relevant sources have been identified these shall be used to collect information to investigate the research problem. 7.10 DATA ANALYSIS All analyses shall be based on the literature, which is identified during the data collection phase of this study (Sundars, 2003). 7.11 ACCESS Access to this literature shall be established through searching library resources, electronic journals and websites. 7.12 RELIABILITY, VALIDITY, AND GENERALISABILITY The reliability and validity of this research shall be ensured by only using sources of information, which are deemed to be suitable for this study.   The generalizability of the findings from this study shall be limited as it will be based on secondary sources and the study findings will only be valid whilst these sources of information remain current (Sundars, 2003). 7.11 ETHICAL ISSUES There are no ethical issues which need to be considered whilst this research is being conducted. 7.12 RESEARCH LIMITATIONS As this research is based on secondary sources, the data, which is available, may limit the findings from this and as already stated as the study is based on the current situation in Russia, its findings may only be valid for a limited time. 8 CONCLUSION In conclusion, this study shall be undertaken by seeking to identify and critically evaluate a number of secondary sources.   This will enable the strategic management and implementation of socio –economic analyses to be critically evaluated. The effectiveness of these in Russia shall then be assessed by comparing them to practices adopted by other countries.   Then a number of recommendations may be made where this is appropriate. 9 TIME CHART Tasks Task Lead Start End Duration (Days) Dissertation Researcher 7/06/13 7/15/13 10 Write Up Results 7/06/13 7/20/13 15 Write up analysis 7/21/13 8/01/13 12 Write Recommendations 1/08/13 13/08/2013 10 Draw Conclusions 13/08/2013 18/08/2013 5 REFERENCES BAREC (1998) Conditions for the development of Wind Power in the Baltic Sea Region.   Available from basrec.net/files/basrecdocs/Projects/BASREC-wind%201_enabling%20studies_120424.pdf (Accessed 03/07/2013) Bell, D., Gray, T., Haggett, C. (2005).   The social gap’ in wind farm siting decisions: explanations and policy responses.   Environmental politics, 14(4), 460-477. Bergmann, A., Hanley, N., Wright, R. (2006).   Valuing the attributes of renewable energy investments.   Energy Policy, 34(9), 1004-1014. Devine†Wright, P. (2005).   Beyond NIMBYism: towards an integrated framework for understanding public perceptions of wind energy.   Wind energy, 8(2), 125-139. POWER (2013) Perspectives of Offshore Wind Development.   Available from corpi.ku.lt/power/ (Accessed 03/07/2013). Saunders, M. (2003) Research Methods for Business Students.   South Africa: Pearson Education. Van der Horst, D. (2007).   NIMBY or not?   Exploring the relevance of location and the politics of voiced opinions in renewable energy siting controversies.   Energy policy, 35(5), 2705-2714. Van der Horst, D., Toke, D. (2010).   Exploring the landscape of wind farm developments: local area characteristics and planning process outcomes in rural England.   Land Use Policy, 27(2), 214-221. Wolsink, M. (2007).   Planning of renewables schemes: Deliberative and fair decision-making on landscape issues instead of reproachful accusations of non-cooperation.   Energy policy, 35(5), 2692-2704.

Friday, November 22, 2019

20 Words That Contain mn

20 Words That Contain mn 20 Words That Contain â€Å"mn† 20 Words That Contain â€Å"mn† By Mark Nichol While looking stuff up, I became curious about how many words include the unusual pairing of m and n, and I discovered more than I had expected. Many more than twenty exist, but I’ve listed only that number (along with their definitions), choosing to exclude several categories of words. (See below for details.) Words ultimately derive from Latin by way of an earlier form of English or French unless otherwise indicated. 1. alumnus: a former student of a particular school (from a Latin root word meaning â€Å"to nourish†) 2. amnesia: loss of memory, a gap in memory, or, informally, selective memory (from a Greek word meaning â€Å"forgetfulness†) 3. amnesty: pardon or freedom for a group of people (related to amnesia) 4. amnion: a membrane around an embryo or fetus (best known in the adjectival form amniotic) (from the Greek word for â€Å"lamb†) 5. autumn: the season also known as fall, or a late stage of life or existence 6. calumny: slander 7. chimney: the part of a building that includes one or more flues for discharging smoke, or a similar-looking rock formation 8. column: a long vertical building support, a similar-looking structure, a vertical arrangement of text, a statistical category, or a long row of marching people 9. condemn: convict, doom, or sentence, or declare something wrong (the root word is related to damn) 10. contemn: treat with contempt 11. damn: condemn, or send to hell, or used as an oath or an intensifier 12. gymnast: an athlete who competes in exercise routines on a floor mat or on specialized equipment (from Greek) 13. hymn: a religious song (ultimately from Greek) 14. insomnia: inability to sleep 15. limn: describe, delineate, draw, or paint 16. mnemonic: relating to memory, or intended to assist in memory (from Greek) 17. omnibus: a large passenger vehicle (the full word from which bus is derived), or an anthology 18. remnant: a part left over from a whole 19. solemn: sad and or serious, or sincere 20. somnolent: sleepy, or causing one to feel sleepy (related to insomnia) I’ve excluded the following categories of words: variations and inflectional endings, the dozen other words beginning with the prefix omni-, the nine words that end with m followed by the suffix -ness (such as calmness), obsolete words, proper names like the Native American place name Tuolumne, and obscure, little-used terms like simnel (referring to a crisp bread or a fruitcake) that no one but a serious Scrabble competitor would know. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:When to Capitalize Animal and Plant NamesStory Writing 101Neither... or?

Thursday, November 21, 2019

Marketing in The Third World Article Example | Topics and Well Written Essays - 1250 words

Marketing in The Third World - Article Example When the discussion centers its focus on the marketing tangents within the third world nations, one finds that the booming economies of the developing countries brings to light the core issues of marketing, public relations, direct access to customers and other marketing outlets on a consistent level. This is because marketing has attained quite a significant role within the domains of the local businesses which are existent within these nations. With the changing global scenario and the technological thresholds coming to the fore, marketing has attained quite an important place within the whole area without any shadow of a doubt. Also new products which were just a norm within the developed nations have come to the front within the third world countries and thus marketing has had a pertinent role to play within the developing economies. Marketing within the third world has come out as a challenge for the different multinational companies because these organizations have seen pretty different perspectives both from the state as well as from the people, who are the direct beneficiaries of these multinational organizations. The marketing so done is indeed to benefit these people alone but at times consumer rights movements for one reason or the other have marred the whole infrastructure and indeed the business operations within the local domains for the multinationals. Thus the third world has posed quite a few headaches for the top companies when it comes to making the decision towards the third world countries or stick within the realms of the already developed nations. The consumer reaction could change any moment but then again this is pretty different to what these multinationals could expect in the developed countries where there are proper protests and demonstrations, all of which are lodged in a civilized mann er. The riots that usually take place within the third world countries due to branded products and the like are unheard of within the developed countries and thus this aspect has gained quite a lot of weight in the related discussions. Another significant consideration for marketing within the third world is of the ethical norms and the lack thereof. The ethical procedures that are implemented and made use of within the developed nations at times become a laughing stock within the third world nations due to the fact that their people are not properly educated and they have had less exposure at the hands of the multinational organizations. This is a serious pointer within the subject of marketing within the third world countries because seriously unethical and immoral marketing and advertising messages would become a usual norm within such locales and this would hamper their growth in a proper and adequate way. The society has a direct bearing on the way the marketing aspects are treated within any third world nation and thus the role of the marketing regimes becomes all the more pertinent in such situations. They have to play a parent role in devising strategies that could spark trouble and unrest within the third world nations as well as create controversies for the mere pleasure attached with their existence. Since labor is cheap within the third

Tuesday, November 19, 2019

Strategic information system Essay Example | Topics and Well Written Essays - 3000 words

Strategic information system - Essay Example This study mainly focused on a business related company. An information system comprises of transaction processing systems, management information systems, systems for decision-making support as well as strategic information systems. The information itself consists of the processed data which is coded to the person using. A system refers to a set of elements that are designed to operate together so as to provide a common purpose Ramesh et al 1997). In information systems, the basic element is data which basically refers to raw, unevaluated details, figures, symbols, events and other resourceful facts concerning the origination’s needs. Hence data is converted by the processor which is mainly computers into meaningful information that is useful to the user who in turn uses it in making decisions. Good information should be relevant, be timely, accurate, cost-effective, reliable, usable, exhaustive, and have aggregation level. Information is only important if it is directed to i mprove decision making activities. It can also be important if it is able to reaffirm the previous decision. ... The data collected during the knowledge stage are then used by statistical methodologies and other models to forecast possible results for every alternative. Each alternative can also be studied in ensuring technological, behavioral, and economic viability. In making of the choice, the decision maker must choose the best alternative which is suitable contributing to achieving the goals of the organization. The choices made can in turn reviewed during implementation and monitoring so that the manager to can make necessary faults. Therefore, information is very critical in the four stages of decision making which only is made more effective by systems, Simon (1977). Strategic importance of information in organization through use of systems They are useful in supporting business processes and operations. Information systems help the manager in their daily routine operations so that they function properly and effectively. For instance accounts, payrolls, employee benefits data protection and so on. In particular, the managers are able to conduct their daily activities wit a lot of ease, timely, accurately by use of software. Secondly, IS are essential in decision-making processes for employees and managers. This is simply input of data, processing the finally generating information. Therefore, managers are able to use the information processed for finding various solutions to the organization. For instance, information systems are able to analyze existing historical data about the rate of flow of customers and make necessary improvements if the turn up is very low. They also provide support in making decisions critically for competitive advantages. Information systems can provide information concerning the type

Saturday, November 16, 2019

Quiz 3 Questions and Answers Essay Example for Free

Quiz 3 Questions and Answers Essay 1. You are installing a network card in a computer that has several devices configured. There is a printer on LPT 1, a mouse on COM 1, a modem on COM 2, and a SCSI host adapter occupying IRQ 10. The computer also has a sound card using IRQ 5. If your network card supports IRQs 3 through 5 and 9 through 11, which of the following IRQs could you set it for in this computer? IRQ7 IRQ3 IRQ10 None of these IRQ4 IRQ5 2. A 100BaseVG network is build on a ______ topology with all computers attached to a hub ring mesh all of these star bus 3. Your network is experiencing heavy traffic and signal attenuation due to long cable distances between computers. Required Result: Correct the signal attenuation problem. Optional Desired Results: Reduce the broadcast traffic that is present on your network. Filter the network traffic to reduce the number of frames transferred across the network. Proposed Solution: Install repeaters between distant segments. Install routers and configure them to filter broadcast traffic. Which results does the proposed solution produce? The proposed solution produces the required result but does not produce any of the optional desired results.. The proposed solution produces the  required result and produces only one of the optional desired results.. The proposed solution does not produce the required result. The proposed solution produces the required result and produces both of the optional desired results. None of these 4. In a Token Ring frame the ______ field indicates whether the frame is a token frame or a data frame. none of these Access Control error checking priority media type 5. Cables attach the individual clients and serves to the MSAU that works like other ____________ hubs switch active passive bridge none of these 6. A token is a special type of ____________ that circulates around a cable ring data transmission frame or packet electrical signals none of these serial signals 7. Managing data on a network depends on traffic control. The set of rules that governs how network traffic is controlled is called: Channels Layers Interface Drivers. Access Methods. 8. You are considering starting a training company that provides on-site classroom instruction to various businesses. Your service will include a temporary networked classroom environment. Assuming that the facilities do not have pre-installed wiring and that the classroom will use 10 or less computers, which topology would require the least equipment and be the easiest to set up and tear down. [Choose the best answer] Star. All of these Ring. Mesh Bus. 9. With the demand-priority access method, the ____________ manage network access by doing round-robin searches for requests to send from all nodes. none of these users routers gateways hubs 10. CSMA/CD is known as a ____________ access method because computers on the network compete for an opportunity to send data poling parallel contention sequential priority 11. Ethernet can use several communication ____________ including TCP/IP protocols data paths channels applications media 12. Typically, the hub of a 10BaseT network serves as a multiport ________. 13. The 100BaseTX topology runs on UTP Category ________ data-grade cable 5 1 2 4 3 14. Because single-segment 10Base2 Ethernet limits would be too confining for a large business, ____________ can be used to join Ethernet segments and extend the network to a total length of 925 meters (about 3035 feet). none of these 4 repeaters 5 repeaters 2 repeaters 3 repeaters 5-4-3 rule The thinnet 5-4-3 rule: 5 segments, 4 repeaters, and 3 populated segments 15. Wi-Fi Wireless networks use _________ access method. Demand priority Token Bus CSMA/CA CSMA/CD Token Ring 16. Access methods prevent ____________ access to the media. preemptive None of these slow random simultaneous 17. A standard ethernet network can combine as many as ____________ cable segments connected by four repeaters, but only three segments can have stations attached. 6 none of these 3 4 5 18. A 10Base5 topology is also referred to as ____________. standard ethernet 802.3 Thicknet all of these 19. Token passing is deterministic, meaning that a computer cannot force its way onto the network as it can in a ______ environment CSMA/CD Polling Demand priority CSMA/CA Switching 20. Which type of network media-access method do IBM LANs with Multistation Access Units employ? CSMA/CA. CSMA/CD Beaconing Token passing. None of these 21. The trailer of a packet contains the destination address False True 22. In the IBM implementation of Token Ring, a star-wired ring, the actual physical ring of cable is in the ________. MSAU all of these none of these hub Repeater 23. When using the CSMA/CA access method, a computer waits until the network is quiet and then transmits its data. If two computers transmit at the same time, the data will collide and have to be re-sent. If two data packets collide, both will be destroyed. False. True 24. Ethernet relies on the ____________ access method to regulate traffic on the main cable segment CSMA/CA CSMA/CD all of these Token Ring Demand Priority 25. MSAUs were designed to sense when a ________ fails and to disconnect from it. Hub Cable NIC Network Computer CPU 26. Which access method is used, when each computer communicates only with a hub. The hub then controls the flow of data a. CSMA/CD b. CSMA/CA. c. Token Bus. d. Token Ring e. Demand priority c only a only both c and d e only b only d only 27. With data masses divided into _______, individual transmissions occur more frequently so that every computer on the network has more opportunities to transmit and receive data. bits messages frames or packets files bytes 28. In a packet, the header usually contains an error-checking component called a CRC True False 29. Which access methods is used, when each computer must wait to receive a token before it can transmit data. Only one computer at a time can use the token. a. CSMA/CD b. CSMA/CA. c. Token Bus. d. Token Ring e. Demand priority both c and d c only e only d only both a and b 30. A Token Ring network is an implementation of IEEE standard ____________. 802.4 802.2 802.11 802.5 802.3 31. Which of the following network access methods sends a signal indicating its intent to transmit data on the wire? [Choose the best answer] CSMA/CD Token passing. Beaconing CSMA/CA. None of these 32. If you must configure a network for three mission-critical servers and want to provide a highly fault-tolerant cabling scheme, which topology would you implement? [Choose the best answer] Star. Bus. Mesh None of these Ring. 33. With the token-passing access method, only one computer at a time can use the token; therefore, there are no _______. broadcastings contentions collisions all of these collisions and contentions 34. A packet (frame) components are grouped into sections: _________. CRC data header all of these trailer 35. When an IBM Token Ring network is full, adding another ____________ can enlarge the network MSAU all of these repeater Hub 36. With CSMA/CD, if there is data on the cable, no other computer may ____________ until the data has reached its destination and the cable is clear again transmit and receive none of these receive transmit 37. With more traffic on a CSMA/CD network, ____________ tend to increase, slowing the network down broadcasting all of these transmissions collisions unicasting 38. Fast Ethernet is another name for the ____________ topology 100BaseX all of these 100BaseFX 100BaseT4 100BaseT 39. The 10BaseT topology is an Ethernet network that uses _________ cable to connect stations Coaxial UTP and STP STP UTP Fiber 40. Packets (Frames) may contain session-control codes, such as error correction, that indicate the need for a ______. unicast recall stop transmission retransmission broadcast 41. Your network is experiencing heavy traffic and signal attenuation due to long cable distances between computers. Required Result: Correct the signal attenuation problem. Optional Desired Results: Reduce the broadcast traffic that is present on your network. Filter the network traffic to reduce the number of frames transferred across the network. P roposed Solution: Install repeaters between distant segments. Which results does the proposed solution produce? The proposed solution produces the required result and produces both of the optional desired results. None of these The proposed solution does not produce the required result. The proposed solution produces the required result but does not produce any of the optional desired results.. The proposed solution produces the required result and produces only one of the optional desired results. Check with Prof 42. Which of the following is most likely the problem if the operating system is unable to detect the network card? (Choose the best answer) Wrong frame type is set on the network card Wrong IRQ is set on the network card Wrong IRQ is set on the IDE controller card Wrong protocol is bound to the network adapter 43. Wireless networks use _______ topology mesh all of these star bus ring 44. In the demand-priority access method, transmissions are not ____________ to all other computers on the network multicast routed unicast all of these broadcast 45. When a frame returns to its sending computer, that computer ____________ the frame and puts a new token back on the ring. copies writes reads removes none of these 46. Every network interface card sees all packets sent on its segment, but it interrupts the computer only if the packet address matches its individual address True False 47. Typically, Ethernet is a baseband architecture that uses a _________topology all of these star mesh bus ring 48. The maximum length of a 10BaseT segment is ____________ meters 138 1000 500 250 100

Thursday, November 14, 2019

The Role of Women in America Essay -- Womens Studies

The Role of Women in America In her essay, â€Å"Housewives and Homework: The Lacemakers of Narsapur,† Chandra Talpade Mohanty focused on how men sold products that women produced and profited from women’s work. The essay basically pointed out how work can be defined according to sexual identity. It made me wonder if American women are still perceived by men in society as being housewives even though some of us are doctors, lawyers, teachers etc. Is the work that women do seen as what Mohanty pointed out in her essay as â€Å"leisure time activities†? I think that to some extent men believe that women’s sole purpose on Earth is to be their wives/partners and to be good mothers to their children. Even though we â€Å"leisurely,† as Mohanty so plainly categorized our work according to men in India, go out to our different careers or occupations everyday, we are not truly seen as providers or given credit for being part providers for the family. Some men may feel that we pu t forth more of an effort in being a woman who cleans the house, cooks, and takes care of the children. Maybe our â€Å"le...

Monday, November 11, 2019

Clothing and Fashion

Every person nurtures an innate desire of looking good and feel ‘accepted’ in the socio-economic circle. The word fashion instantaneously brings to mind a flash of colour with a dash of glamour. Women are taking to fashion in a big way, and are experimenting with different looks, styles, and textures. Fashion plays an increasingly important role in an indivi ­dual’s life because it is considered as a means of self-expression. The garments and accessories that man or women wear, help them to identify with a group of others-whether it is a lifestyle, profession, a religion, or an attitude.Thus, the term ‘fashion’ has become synonymous with the overall growth of the country as well. Several factors contribute to the evolution of fashion as a whole. It is a widely accepted fact that the rich and the famous, and the political figures and royalty have always moved the seasonal trends of fashion. The advertising media also contributes equally to update us about the daily style checks. Fashion in India, a land rich in culture and tradition, has evolved through the centuries. This country, rich in culture represents a kaleidoscope of changing trends and traditions.Here, clothes perform different functions depending on the occasion. Be it festivals, parties, profession, or just a matter of reflecting attitude †¦ fashion is simply ‘in’. Right from women who sport a dash of vermilion in the parting of their hair, to professionals on the go who wield the ladle and the laptop with equal ease, fashion forms an integral 92 Top School Essays part of their lives. Today, fashion does not necessarily mean glamour, or the urge to follow the current trends. It is more a way of life, a reflection of inner beauty, where the intellect shines through, complete with comfort quotient.Fashion not only highlights the social history and the needs of person but also the overall cultural aesthetic of the various periods. The evolution of fas hion dates back to several hundred years and as our attitude and culture change, fashion comes along with it. In India, the fashion scenario was different in different political periods. During the British rule in India, the fashion trend within high society was strongly influenced by the British fashion style and western clothes became a status symbol in India.Again during 1930s, emergence of different ideologies like communism, socialism and fascism imparted a more feminine and conservative touch to the women’s fashion. However, the period also witnessed the predominance of body hugging dresses with dark shades. The foundation of the Indian cinema also proved to be the strongest influence on revolutionising the fashion scene in those days. 1940s was a decade marked by the second World War and the ensuing independence of India. Hence, the period portrayed relatively simple yet functional women’s clothing.During 1950s, the advent of art colleges and schools led to popu larity of narrow waist and balloon skirts with bouncing patterns. Also, the adoption of khadi by Mahatma Gandhi made khadi garments a rage among women. In the 1960s, the sweeping changes in fashion and lifestyle resulted in highly versatile fashion trends. In 1970s, the traditional materials were exported in bulk to other nations. Thus, excess of export materials were sold within the country itself, which resulted in popularity of international fashion in India. During 1980s and 90s, the advent of television and other advertising means gave a new edge to the Indian fashion scene.Influenced by ideas of several foreign designers, new design and pattern were introduced into garments. During these periods, power dressing and corporate look were the style statement. The revival of ethnicity was also witnessed in these decades. Fashion trends keep changing and most fashion divas and models are the one to make them. The youth is a major follower of fashion trends. Fashion trends also get i nfluenced from Bollywood as well as Hollywood. Metros like Mumbai and Delhi witness the quick changes in fashion especially in college going crowds.India has a rich and varied textile heritage, where each region of India has its own unique native costume and traditional attire. While traditional clothes are still worn in most of rural India, urban India is changing rapidly, with international fashion trends reflected by the young and glamorous, in the cosmopolitan metros of India. Fashion in India is a vibrant scene, a nascent industry and a colourful and glamorous world where designers and models start new trends every day. While previously a master weaver was recognised for his skill, today a fashion designer is celebrated for his or her creativity.Young urban Indians can choose from the best of East and West as Indian fashion designers are inspired by both Indian and western styles. This fusion of fashion can be seen Fashion in India is also beginning to make its mark on the inte rnational scene, as accessories such as bindis (red dots worn on the forehead), mehendi (designs made by applying henna to the palms of the hands and other parts of the body) and bangles, have gained international popularity, after being worn by fashion icons, like the pop singers Madonna and Gwen Stefani.In India, fashion has become a growing industry with international events such as the India Fashion Week and annual shows by fashion designers in the major cities of India. The victories of a number of Indian beauty queens in International events such as the Miss World and Miss Universe contests have also made Indian models recognised worldwide. Fashion designers such as Ritu Kumar, Ritu Beri, Rohit Bal, Rina Dhaka, Muzaffar Ah, Satya Paul, Abraham and Thakore, Tarun Tahiliani, JJ Valaya and Manish Malhotra are some of the well- known fashion designers in India.In India, fashion covers a whole range of clothing from ornate clothes designed for wedding ceremonies to pret lines, spor ts wear and casual wear. Traditional Indian techniques of embroidery such as chikhan, crewel and zardosi, and traditional weaves and fabrics have been used by Indian designers to create Indo-western clothing in a fusion of the best of East and West. Traditional costumes in India vary widely depending on the climate and natural fibres grown in a region.In the cold northern state of Jammu and Kashmir, people wear a thick loose shirt called a phiran to keep them warm. In the tropical warmth of south India, men wear a sarong like garment called the mundu, while women drape 5 metres of cloth around their bodies in the graceful folds of the saree. Sarees are woven in silk, cotton and artificial fibres. Kanjivaram, Mysore, Paithani, Pochampalli, Jamdani, Balucheri, Benarasi, Sambalpuri, Bandhini are some varieties of beautiful sarees from different regions of India.In the dry regions of Rajasthan and Gujarat men wrap and twist a length of cloth in the form of a dhoti around their lower lim bs and a shirt-like kurta above. Colourful turbans complete the picture. In the northeastern regions the tribal communities such as Khasis, Nagas, Mizos, Manipuris and Arunachalis wear colourful woven sarong-like clothing and woven shawls that represent the identity of each tribal group. In urban India the salwar kameez and the churidar kameez, are commonly work by women and the saree is worn on formal occasions.Men wear kurtas and pajamas, or a sherwani for formal wear. Men commonly wear western wear such as shirts and trousers across India. The young and the young at heart wear Jeans, T-shirts, capris, Bermudas and various kinds of casual clothing, which are the trendsetters of fashion in India. Comparing the past and the present, fashion for people in India has changed over the decades. Not only India, but also the whole world has witnessed changes in fashion statements for both men and women

Saturday, November 9, 2019

A wide range of technologies Essay

In this report I will describe a wide range of technologies used by John Smith. John was involved in a car accident 5 years ago where he lost the use of his legs and also injured his spinal cord. He has used a wheel chair ever since. He works as a lecturer at imperial university where he teaches science. This has been deeply traumatic towards his physical, social and working aspects of his life. I am going to find out what technologies he uses to get by in life and to decrease the hardships he faces with his disabilities and also to find out how he uses these technologies for his personal, social and working aspects of his life. John is known by all his colleagues and is very popular in his work place. He also goes out with friends in his workplace on social gatherings like clubs but this doesn’t often happen because of the trouble he has coping with his disability. Technology 1 – Work Related One technology that John uses for work is his eyegaze. An eyegaze is a communication and control system for people with complex disabilities it’s a response interface that tracks the eye allowing hands free computer operation. By looking at certain control keys a person can do almost anything e.g. turn his house light’s on and off, open certain doors in his house and use the internet. The eyegaze is an excellent system used by many disabled people. John has an eyegaze computer system attached to his wheelchair. At his university he can monitor his students and use the interactive white board in his classroom to show his students pictures or set them question for class work. His eyegaze can also connect to his printer wirelessly so that he can print out question that he has set his class for homework or revision sheets for their test. Advantages Advantages of an eyegaze are that it allows people with complex disabilities like spinal cord paralysis to surf the net and do day-to-day tasks that would normally have been impossible in their current state of wellbeing. The eyegaze allows them to do their work and play games that they would normally have been unable to do due to the fact that they would not have been able to reach the keyboard with their disability. The eyegaze allows them to surf the net, keep in touch with others around the world and have video conferences. Disadvantages The eyegaze has many disadvantages is that it’s harder to use then a normal keyboard as it track you’re eye if you make the slightest twitch it will follow and go onto what you looked at. It is very difficult to use as it will follow every move you eye make and the slightest twitch could change the page or delete the sentence you were on. It could also turn off the lights when you want them on or shut a door you want open. Eyegazes are also very expensive and if they break down it take along time to replace because only a small minority of business produce the technology also the technology needs to shipped from other countries and that takes a lot of time. How the technology meets the Needs of the adult in a work related environment: To John his eyegaze is a great comfort as he needs to mark his class’s work and as he is disabled it would take along time with normal pen and paper so his students send it to him by email. He uses a special program which allows him by using his voice to mark their work and send it back to them on by one. His eyegaze allows him to do this without putting a great strain on his back whereas using a keyboard and mouse would have put a great strain on his spinal cord and caused him a great deal of pain. His eyegaze is very useful to him in work related situations as it allows him to go throw his work and lecture note quickly without any strain or pain on his back. WHAT WOULD HE DO WITHOUT THIS PIECE OF TECHNOLOGY Without his eyegaze John wouldn’t be able to monitor his students in class or set them work by email. Also he would have to use a normal mouse and keyboard to monitor his constant stream of emails which he receives from students, his colleagues and his doctors and this would have been a constant strain on his back and would have put him in a lot of pain. He would also be unable to automatically turn on lights or open doors as his eyegaze is connected wirelessly to his house and allows him to control his environment. Technology 2 – Socially Related One technology that John uses in his personal life is his electronic wheelchair which allows him to move around anywhere without the hassle of pushing the wheels. His electronic wheelchair has a portable eyegaze computer connected to his electrical wheelchair allowing him to take his work with him on the go. He uses his electrical wheelchair in a number of personally related activities. Thanks to his electrical wheelchair he can move anywhere around his house and area without straining his back by having to manually push the wheels. Advantages Electrical wheelchairs have many advantages including because they’re battery powered there is no hassle of moving it instead you push the control stick forward and the wheels move of their own accord. This is excellent as John has spinal paralysis which means that he cannot use his back and if he had a manual wheelchair then someone else would have to push him around and John has told me that â€Å"I don’t like having people wait on me as I had difficulty coping with the realism that I cannot use my back or legs anymore†. Disadvantages An electrical wheelchair has many disadvantages like: it is dependant on batteries therefore it will not work if it has no charge. Another disadvantage is that it cannot be folded and be put into the boot of a car. It is also very heavy and it can be quite a nuisance when going up the university stairs as he needs his students help as the ramps are on the other side of campus and it would take him an hour to get from his car to the back to his lecture hall. His wheelchair is also very expensive and if it breaks down it will take along time to repair. How the technology meets the Needs of the adult in a socially related environment: For John his electric wheelchair is one the best pieces of technology he can use as it is fast and reliable and allows him to go everywhere without the hassle and strain of a normal manual wheelchair. It is also a great relief as his back is often in pain and thanks to the wheelchairs special cushions he can lie back and have the special in-built massagers take his backs pain away. WHAT WOULD HE DO WITHOUT THIS PIECE OF TECHNOLOGY Without his wheelchair John would be unable to move around as efficiently as with his electric one. Also it would have put increased constant strain on his spinal cord and put him in a great deal of pain. He would be unable to take his work with him on the go as there would be no battery to connect the wires to. Without his electric wheelchair it would take him longer to go shopping or go anywhere else. Technology 3 – Personally Related Another piece of technology that John uses is his single fingered keyboard. The single fingered key board is a special type of keyboard which follows a new style of keyboard allowing the disabled person to be able to type on his/her computer without putting a lot of stress on themselves. Another definition for a single fingered keyboard is: The Maltron Single-handed keyboard is curved, with a single recess. It comes in left-handed and right-handed versions and is divided into four major blocks of keys: * 1 block for the fingers * 1 block for the thumb * 1 flat panel of keys to the side * 1 row of function keys along the top The keyboard has â€Å"push-on push-off† functions for the shift, control, and alt keys. The blocks for the fingers and thumb are mirror images of one another in the left-handed and right-handed versions (whereas the flat block and function key row are identical in both). Advantages There are a lot of advantages of a single-fingered keyboard like the fact that it doesn’t put a lot of strain on the individual using the keyboard. Another advantage is that the special shape and layout takes into account of the letters used in modern day typing. This is done to make the layout more efficient than a normal QWERTY keyboard and can save strain and unnecessary movement between keys. The user of this type of keyboard will find input than is ideal so it’s recommended that the user used a predictive word processor such as TEXTHELP or prototype to speed up entry and avoid frustration. Disadvantages Some disadvantages of using a single fingered keyboard is the fact that it’s very slow and takes long time to process a sentence you wrote and even longer for a paragraph. Also because of it’s design you’re hand may be to small to reach the buttons or too big and you may press the wrong button meaning that you would have to wait until the entire word or letter or sentence appeared before being able to change it. Needs of the adult in a personally related environment: John enjoys writing papers and articles for various scientific magazines. Thanks to his keyboard and software that increases the speed of appearance of words he can write fast without straining his back or being frustrated at the slowness of his keyboard. This piece of technology allows him to type fast as he is a fast single fingered typer and the keyboard allows him to do this without the fear of him injuring his back further. Without this technology John feels that he cannot have the same hands on affect to his work like so many of his colleagues. WHAT WOULD HE DO WITHOUT THIS PIECE OF TECHNOLOGY Without his technology John would have to use a Braille keyboard which in affect would have been more comfortable to use thanks to the special polymer which allows the user to type with his hands on the surface of the table but this would have injured John further as he cannot strain his back as that may prolong his recovery further. CONCLUSION In conclusion I feel that the technologies available to disabled people have been enhanced exponentionally as more people these day’s are concerned about the welfare of the disabled. This means that there is more awareness now than there was several years ago. The technology in our decade has also been enhanced therefore the development of newer, more practical technologies are easier to produce. The technologies in John’s life mean that he can now appreciate life and enjoy experiences like a normal, healthy person. However there is still room for improvement in the technologies in our life today. In the future we should expect life to become much better for the disabled as there has been much more research into how our body works so their may be development in flexible devices for the disabled.

Thursday, November 7, 2019

How to Get a Letter of Recommendation After Graduation

How to Get a Letter of Recommendation After Graduation Letters of recommendation can be hard to obtain if youve been out of college for a while. Many applicants use professional contacts, college alumni, and even long-lost professors to fulfill this important requirement. Using Professional Contacts Graduate school typically is a way for a student to get in-depth experience on a topic of interest and often relates to the current job the applicant holds. As such, a professional contact can be a practical candidate for writing a recommendation letter. Ask your supervisor to support your application to graduate school, and the letter can directly address your workplace skills and how you can contribute to the field in the future, especially once you complete your studies. If youre not able to use your supervisor, you might reach out to a mentor or a colleague in the same position as you to complete the letter of recommendation. In any case, the colleague needs to write about knowledge of the applicant in a professional context, discussing relevant skills such as reasoning, problem-solving, communication, time management, and so on. College Alumni If youre not able to use a professional contact, consider asking a graduate of the school to write on your behalf. A LinkedIn profile can be a helpful resource for finding connections who went to the college in question. Assuming this individual knows you well, you can simply reach out and ask. Provide some details on the program youre applying to, achievements youve had in your career, and your goals coming out of the program. This can help the letter be more personal. If you dont know the person that well, ask to meet for coffee and to get to know each other better. This can be a risky move because the alum might not be comfortable writing on your behalf if youre not close. However, you can ask to still meet to get more information on the program and the college. You may wish to share your resume before the meeting and give some background on why youre interested in the program, and your career goals. Be prepared to ask questions, learn about their experiences, and share your own qualifications. Then you can ind out if the alum she would be willing to write on your behalf. If youre applying to graduate school well into the future, you might consider reaching out to someone from the school to be a mentor. Then youll have time to develop a working relationship and youll be more likely to get a recommendation when the times comes. Plus, you might learn something from your new mentor along the way. Former Professors Although many students fear that their professors from years ago will not remember, theres a good chance that they will, and it never hurts to reach out and ask for a small favor in the long and difficult process of getting a professional career.   Regardless of whether they remember the particular students winning personality or personal details of their lives, professors keep records of grades that will help them evaluate whether they can write a helpful letter on the students behalf. Professors are used to hearing from former students years after graduation, so although it may seem like a long shot, it may not be as difficult as some might think. Even if the professor has left the institution, applicants can contact the department and request contact information like an email address or simply run an internet search on the professors name. Many students opt to connect with professors on social media, particularly LinkedIn, which allows you to reach out to past contacts and stay connected over the years. A student contacting a former professor should mention what classes were taken, when, what grades were earned, and anything that might help the professor remember that particular student. Applicants should be sure to give the professor enough information to write a good letter, including CVs, copies of papers the student has written for classes, and the usual materials. Other Options Another alternative is to enroll in  a graduate course or continuing education course (as a nonmatriculated, or non-degree-seeking student) before applying to a full program. If you perform well, youll be able to ask the professor to write on your behalf to apply to the full graduate program. This approach can also help demonstrate your ability to succeed in the program.

Tuesday, November 5, 2019

Auebach Enterprises Essay Example for Free

Auebach Enterprises Essay These are not presented in scholarly discussion, but are simply the solutions. Student papers are expected to be written in scholarly discussion following APA formatting guidelines incorporating solutions and supported with scholarly research. Auerbach Enterprises manufactures air conditioners for automobiles and trucks manufactured throughout North America. The company designs its products with flexibility to accommodate many makes and models of automobiles and trucks. The company’s two main products are MaxiFlow and Alaska. MaxiFlow uses a few complex fabricated parts, but these have been found easy to assemble and test. On the other hand, Alaska uses many standard parts but has a complex assembly and testing process. MaxiFlow requires direct materials costs which total $135 per unit, while Alaska’s direct materials requirements total $110 per unit. Direct labor costs per unit are $75 for MaxiFlow and $95 for Alaska. Auerbach Enterprises uses machine hours as the cost driver to assign overhead costs to the air conditioners. The company has used a company-wide predetermined overhead rate in past years, but the new controller, Bennie Leon, is considering the use of departmental overhead rates beginning with the next year. The following planning information is available for the next year for each the four manufacturing departments within the company: Overhead Machine Costs Hours Radiator parts fabrication†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. $ 80,000 10,000 Radiator assembly, weld, and test†¦. 100,000 20,000 Compressor parts fabrication†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 120,000 5,000 Compressor assembly and test†¦Ã¢â‚¬ ¦.. 180,000 45,000 Total $480,000 80,000 Normally, the air conditioners are produced in batch sizes of 20 at a time. A production batch of 20 units requires the following number of hours in each department: MaxiFlow Alaska Radiator parts fabrication†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 16 Radiator assembly, weld, and test†¦Ã¢â‚¬ ¦. 30 74 Compressor parts fabrication†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 32 8 Compressor assembly and test†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 26 66 Total 116 164 Required: 1. Compute the departmental overhead rates using machine hours as the cost driver. 2. Compute a company-wide overhead rate using machine hours as the cost driver. 3. Compute the overhead costs per batch of MaxiFlow and Alaska assuming: (a) The company-wide rate. (b) The departmental rates. 4. Compute the total costs per unit of MaxiFlow and Alaska assuming: (a) The company-wide rate.  (b) The departmental rates. 5. Is one product affected more than the other by use of departmental rates rather than a company-wide rate? Why or why not? Auebach Enterprises. (2016, Apr 21).

Saturday, November 2, 2019

FOUNDATIONS FOR RESEARCH Essay Example | Topics and Well Written Essays - 1500 words

FOUNDATIONS FOR RESEARCH - Essay Example To amend this gap in knowledge about mood disorders in adolescents, it has been claimed that theoretical perspectives should develop from adolescents’ understanding and experiences (Griez 2005: 47). If not, the theorising process will continue to be removed from the perspectives of individuals who have really experienced mood disorders (Wolfe & Mash 2008: 83). The objective of the aforementioned study was to generate a theoretical perspective that essentially represented the perceptions of adolescents who had experienced mood disorders. Lewis (1995:372) investigated, employing qualitative methods, how participants personally experienced mood disorders, how they reached and perceived the label of mood disorder, and how they understood their experiences. In addition, Karp (1996: 91), in Speaking of Sadness, explained the identity-changing process that participants experienced as they eventually viewed themselves as depressed and carried on theorising about their own selves and h ow they acquired their mood disorders. In this paper, a thorough discussion on the different features of the grounded theory method will be provided by presenting an original research article, Meadus’s (2007) study, which contains the grounded theory method. The Application of Grounded Theory in Mood Disorder Research The grounded theory method, according to Straus & Corbin (1990), the goal of which is to form a theory that is closely related to the reality of the adolescents studied was used in the study of Meadus (2007). Through the grounded theory method, theory arises from evaluating the actual statements given by the participants, and is hence genuinely ‘grounded’ in them (Strauss & Corbin 1990: 17). However, the problem in using an inductive research method for mood disorder research, according to Griez (2005: 72), is that it inevitably results in analyses that go beyond the statements given by the participants. Stiles (1993) suggests that participants give relevant information to the researcher, but that the researcher should analyse that data to form a reflective theory. Meanwhile, reflexivity obliges the researcher to thoroughly think about the research process, which involves probing how strongly the interpretations of the researcher fit with the perspectives of the participants (Rennie, Phillips, & Quartaro 1988: 143). The grounded theory method was employed in the study of Meadus (2007) because it allowed a methodical analysis that enabled the creation of a theoretical perspective that was strongly connected to, otherwise ideally representative of, the explanations of the participants. According to Merriam (2009: 30), data analysis in grounded theory is performed using the constant-comparative method in which bits and pieces of data are compared in terms of their similarities and differences. Merriam (2009: 31-32) furthers that part of the data analysis is the identification of a core category. The core category is the central c oncept where all data revolves around and this is used to develop the substantive theory. Emphasis is given on the importance of identifying categories, hypotheses, and theories from the patterns seen among the relationships formed from the data gathered. To better understand the features of a grounded theory, the research of