Thursday, October 31, 2019

The Travels of a T-Shirt - Government Subsidies Essay

The Travels of a T-Shirt - Government Subsidies - Essay Example In agreement with government subsidies, this form of government intervention reduces the cost of production and encourages the producers to increase output. Government intervention/producer subsidies are of various forms. An example is state subsidies. State subsidies are financed from general taxation or by borrowing (Schuster, 2006). Government subsidies cause various productive firm’s supply curve to shift to the right. The amount spent on subsidy by the government is equivalent to the subsidy per unit multiplied by total output (Day & Schoemaker, 2005). A direct subsidy commonly offered by a government to supplement consumer’s demands has the effect of boosting demand. This results in an outward shift of demand. Examples of subsidies include an input subsidy, bails, fiscal assistance (loans and grants), government grants to cover losses made by business and a guaranteed on the factor cost of a product. Subsidies make sense in various demand and supply situations of the economy. The travels of T-shirt in Global Economy represents some of the scenarios in which subsidies may play a crucial role in the examination of market forces, power and politics of world trade (Rivoli, 2015). The overall international trade topic is a very crucial topic to discuss in the abstract though when this topic is focused on a single product, it is easy to be dealt with (World Bank Group, 2011). Subsidies in the international trade in most cases dwell with specific products. Only in extreme cases in the world economy do subsidies deal with conglomerate products. Through the story of travels of T-shirt, globalization advocacy is portrayed critically as the major issue behind international trade and individual country’s economy development (Prono, 2006). The competitive economic markets and increased living standards at the expense of the maximum and minimum wage bills among different

Tuesday, October 29, 2019

Interview Questions Essay Example | Topics and Well Written Essays - 500 words

Interview Questions - Essay Example These highlight the differences, however there are similarities as well, as both micro-level and macro-level analysis involve understanding how the activities of specific entities creates somewhat of a trickle-down effect on all aspects from either an individual level or wide-scale business/government/finance activities. Opportunity costs can best be defined as the largest-valued decision that is relinquished after a decision has already been determined. Opportunity costs are different for each individual or organization and they represent what has been missed in order to fulfill a different objective. For example, a student who decides they must take a full-time class load at a local university would have several opportunity costs: They would lose time with friends in order to study hard or they would miss out on working at their fathers business in order to receive a higher education. This is an important economic model as it indicates scarcity and further aids in decision-making to assist in determining what the best course of action is once a decision has been made. Suppose that more companies receive permission to drill for oil in Alaska and U.S.-controlled waters. In addition, assume that the popularity of SUVs declines in favor of smaller, more fuel efficient automobiles. What will be the result on the market (supply, demand, price, and quantity) for oil in the U.S.? How does this move the supply and demand curve? The demand for oil would be considerably less, as more fuel efficient automobiles represents less consumer need for gasoline. At the same time, with companies digging in Alaska (and other areas), the supply of oil would also continue to increase. When this happens, when demand decreases and supply increases, likely the most significant impact would be a temporary lowered price for oil, at least until the demand for it grew. Assume that before the dig in Alaska gasoline was $3.50 per gallon. Afterward,

Sunday, October 27, 2019

Home Alarm System: An analysis

Home Alarm System: An analysis Home burglaries and property trespassing is a common event; more than forty per one thousand households get robbed yearly. With the introduction of home alarm systems the rates of burglaries have dropped significantly for the past thirty years. Therefore, throughout the semester, we have been working on building a functional home alarm system using PIC microcontroller, a keypad, an LCD display and a magnetic sensor. Household burglary is defined as an illicit entry or attempted entry of a residence which usually involves theft. The illegal entry may be by force, such as breaking a window or slashing a screen, or may be without force by entering through an unlocked door or an open window. As long as the person entering has no legal right to be present in the structure a burglary has occurred. Furthermore, burglary is not only the entry of the house by itself; illegal entry of a garage or any other structure on the premises also represents household burglary. [12] Figure1.Home Burglary Statistics (2008-2011).Washington Post [Photograph].Retrieved from http://homesecurity.net/home-burglary-statistic/ The most common targets are residential houses. Those of them without security systems installed are about three times as likely to be broken into as homes with security systems installed. Moreover, the first place that the robber will search is usually the master bedroom because most people keep their valuables there. The preferred items to be stolen are cash, jewelry, electronic equipment, silver, guns and other items easy to put on the market. [8] Statistics showed that every 14.6 seconds, a burglary takes place in the United States and most of them occur between 10 am and 3 pm. Burglars spend an average of 8 to 12 minutes in your household. The residence owner can take the following safety measures such as: burglars search for homes that appear to be vacant; robbers want to waste no more than sixty seconds breaking into a home. [8] Points of Entry of Burglars: Figure2 .Burglary Facts and Statistics (2008). [Photograph]. Retrieved from http://www.articlesbase.com/home-and-family-articles/burglary-facts-and-statistics-338161.html One survey in Pennsylvania showed that: 81 percent of residential intrusions occur through the first floor. 34 percent of burglars entered through the front door; 23 percent through a first-floor window; 22 percent through the back door; 9 percent through the garage; 4 percent entered through a basement; 4 percent through an unlocked entrance; 2 percent through a storage area; 2 percent entered anywhere on the second floor. [2] Definition of a Home Alarm System: A home alarm system is used as a defensive device to monitor all unwelcome events such as intrusion, glass breaking and mainly to avoid theft. It is also used to alert a user of a possible danger. It focuses on all of the accessible entry points of the house, so that the alarm will sound as soon as the intruder enters. Advantages: The most important advantage of the home alarm system is the security it offers from theft of costly things such as the jewelry, the television set, your pc, cell phones, and etcà ¢Ã¢â€š ¬Ã‚ ¦ causing massive financial problems. In addition, a home alarm system is necessary not just for the material possessions in your home but also increases protection on the family. Furthermore, a burglar may want to break the door of your house while barging in. You also might have to cope with broken windows, smashed furniture and other general damage. Making up for this damage will be expensive not just time wise but also requires great deal of effort since burglars these days are interested in expensive items. They search for important identifications such as your bank statements, passports, and credit cards, essentially whatever they get their hands on. The misuse of these documents will disturb your economic balance. [13] Therefore, it is recommended to install a home alarm system at your pl ace. Disadvantages: One of the main disadvantages and is mainly caused by a malfunction is the generation of a false alarm where it can be triggered accidentally and thus cause unnecessary inconvenience. Moreover, having children might cause a lock of the system by improper insertion of the password. Also, if you failed to insert the password in time, the alarm may be triggered. Some burglars are highly experienced and have the knowledge to disable the alarm, the phone lines, and the electricity leaving you helpless in a critical situation. How Does a Home Alarm System Operate? Sensors are the most vital part of the system; they act like the eyes and ears of a home alarm system by monitoring break in points and interior areas. The typical sensors, which are usually two magnets, are generally installed on doors and windows such that one magnet is connected to the door or window and the other is connected to the door or window frame. When the door or window is opened, one magnet is removed from the surrounding area of the other and the sensor registers that the door has been opened. More advanced home alarm systems may also contain vibration sensors to detect when glass has been broken by measuring the vibrations caused by the breakage. Also, many systems use motion sensors that compute the proximity of a rooms walls by producing infrared beams and measuring the time required for them to bounce back; if a beam comes back sooner than expected, it likely bounced off of a person and the sensor registers motion. [4] When the alarm system is installed, each sensor is registered with the control panel either through wires or wirelessly. The control panel also interfaces with keypads and other input devices used by the home owner to control the system. The control center keeps track of the status of the sensors and reports activity through LCD displays and other output devices. Moreover, when activity takes places, such as the opening of a window, the sensors report the activity to the control center and the center registers that a disturbance has occurred. In managed alarm systems, the control panel also checks the sensors to verify that they are still operational; if a sensor fails to reply, the center alerts the home owner of an out of order sensor. If the home owner activates the alarm system and the control center registers activity in the home, a signal is sent by the control to a buzzer, flashing lights or any other audiovisual alarm element. Types of Alarm Systems: Home burglar alarms normally include the following: Window and door sensors Motion detectors Main control panel Centrally located keypad Exterior security signs Hard-wired or wireless construction These systems are often centrally monitored by a security provider that alerts authorities of break-ins. Some of the more common systems that are included in many homes: Smoke alarm systems include smoke detectors, possibly strobe lights and hearing impaired features for seniors and hearing impaired home owners. Fire alarms include a series of smoke detectors, heat detectors and possibly an in-home sprinkler. One ignored aspect of your home security is your homes built in systems, such as heating and cooling and plumbing. Critical System Alarms include: Cooling and heating alarms have detection and monitoring devices that transmit information about your heating and cooling system often directly to a monitoring company. Flood and water alarm systems monitor your plumbing system where even small leaks can go unnoticed and result in thousands of dollars in repairs. [5] Types of Alarm Sensors: Alarm Sensors are essential elements of your home security system. A wide variety of security alarm sensors and detectors are available for use. It is obvious what most sensors do, so we will only describe the main ones used in a basic system. Contact Sensors: Most burglaries involve doors, either on entry or while leaving the house. So protecting all doors is a must. (Example: magnetic circuit breakers).Door contacts may be hardwired or wireless; hardwired contacts are usually buried in the doorframe, which is less obvious than wireless and are preferable. Window Contacts: Can be hardwired or wireless. Motion Sensors: Its the most essential and common form of protection. Passive infrared sensors: Detect motion by sensing a sudden change in heat. Dual-Tech motion detectors use two different technologies in the same unit: passive infrared and microwave. These devices are designed to avoid false alarms since both technologies must detect motion before setting off the alarm. Photoelectric Sensors: These sensors project a beam of light across a hall or doorway to detect motion and are triggered when a person passing through interrupts the beam. Glass Break Detectors: Usually mounted near windows to detect the specific high frequency sound of glass being shattered. They are usually installed on a wall opposite or adjacent to the protected glass and are effective within about 15 to 25. Smoke and Heat Detectors: Detect smoke and heat. [1] Chapter II: Our Home Alarm System Our Home Alarm System: Our projects main concern was to build a Home Alarm System using a PIC microcontroller. We started off our project by coding the Keypad, then LCD and the final touch was the sensor. We also added two types of buzzers: one to sound the alarm and the other as a key tone buzzer. The final result turned out to be the following: Figure3. Our Home Alarm System Materials Used: Cost: PIC16F877A 7$ 4X4 Keypad 2$ JHD 162A LCD 6$ 6V Alarm Buzzer 0.5$ Key tone Buzzer 0.5$ 4 MEGA Crystal Oscillator 5$ 3 Flashing LEDs 0.1$ 9 Resistors (10Kà ¢Ã¢â‚¬Å¾Ã‚ ¦, 470 à ¢Ã¢â‚¬Å¾Ã‚ ¦, 1Kà ¢Ã¢â‚¬Å¾Ã‚ ¦) 0.1$ 18 Pico Capacitors 1$ Magnetic Sensor 2$ Input Voltage Wires 0.1$ Breadboard 3$ Total Cost: 27.3$ Process of Building: First of all the PIC: PIC is a family of Harvard architecture microcontrollers. The name PIC refers to Peripheral Interface Controller. They are popular with both professional developers and hobbyists alike due to their low cost, wide availability and large user base. The PIC has an overall of 40 pins. These pins include input/output ports such as PORTA, PORTB, PORTC, PORTD, PORTE and two Vdd ports for input voltage. The PIC architecture is characterized by its multiple attributes: Separate code and data spaces (Harvard architecture). A small number of fixed length instructions. Most instructions are single cycle execution, with one delay cycle on branches and skips. All RAM locations function as registers as both source and destination of math and other functions. A hardware stack for storing return addresses. Data space mapped CPU, port, and peripheral registers. The program counter is also mapped into the data space and writable. There is no distinction between memory space and register space because the RAM serves the job of both memory and registers, and it is usually just referred to as the register file. The keypad: This device is used to enter the password selected by the user and to arm or disarm the alarm by selecting the various profiles installed in the system. As you can see from our projects picture we used a 4 x 4 keypad, as instructed by Dr. Ayoubi we started off our project by working on the keypad and testing it on Proteus and on the PIC itself. The design of a 4 x 4 keypad can be approached by either adopting the serial or the parallel concept. The serial concept is tedious in terms of software effort, complex in circuitry and slow in response. However, it requires few interface lines. Meanwhile, the parallel concept on the other hand is less complex in circuitry, less software intensive and faster in response. Its concept also requires more interface lines, that is, 8 plus an interrupt line for a 4 by 4 keypad. [10] Our design for a functional keypad was the usage of an alternation of ports between inputs and outputs which is done by using the TRIS function. We started off by setting the first four ports of PORTB as the inputs and the latter four ports as the outputs. This is done by moving the binary literal 11110000 to the working registers and having the latter four ports pulled down by 10kà ¢Ã¢â‚¬Å¾Ã‚ ¦ resistors. The first four ports are connected to the columns meanwhile the last four are connected to the rows. Moreover, as a justification for this reasoning is the fact that it is required to scan the columns for the pressed key and then scan the rows and the results will be decoded in a decoder telling us which button of the keypad was pressed. The main functionality of the keypad as mentioned earlier is to set the code. The alarm can be armed and disarmed with a standard four digit user code in our case. The master code is a step above a regular user code. It is used to unlock the system, as well as programming or erasing a regular user code. Theoretically it can also be used to bypass some sensors. The default password set during the design, which is also the installation code, is 1234. Most alarm companies use the same installer code for all of their installations, and the vast majority will never give their installer code to a customer, for obvious reasons. LCD (Liquid Crystal Display): An LCD is a thin, flat electronic visual display that uses the light modulating properties of liquid crystals (LCs). They are used in a wide range of applications, including computer monitors, television, instrument panels, etc. They are common in consumer devices such as clocks, watches, calculators, and telephones. Liquid crystal displays (LCDs) offer several advantages over traditional cathode ray tube displays that make them ideal for several applications. Of course, LCDs are flat, and they use only a fraction of the power required by CRTs. They are easier to read and more pleasant to work with for long periods of time than most ordinary video monitors. It also has few disadvantages, such as limited view angle, brightness, and contrast, not to mention high manufacturing cost. As research continues, these limitations are slowly becoming less significant. [6] [11] [14] In our design, we used a 1k resistor to set the contrast at the LCD display. Sensor Used: The sensor used is the typical magnetic switch circuit breaker as shown in the figure below: Figure4. How Burglar Alarms Work. Retrieved from http://home.howstuffworks.com/home-improvement/household-safety/security/burglar-alarm1.html A magnetic sensor is used to detect any changes as well as disturbances in a certain magnetic fields. In addition, when the magnets are separated it means we have an open circuit and when it is closed it acts like a short circuit. When the door is closed, the magnet pulls the metal switch close so the circuit is complete. Then, the current powers the relays electromagnet, so the buzzer circuit stays open. When you move the magnet by opening the door, the spring snaps the switch back into the open position. This cuts off the current and closes the relay, sounding the alarm. [7] Functionality of our system As soon as we connect the 5V power source the alarm greets us with a welcome message displayed on the LCD then asks us to provide the password. Once entered correctly the green LED flashes accepting the code. If the password entered was incorrect the red LED flashes and the system gives you two further chances to enter the correct password. If both remaining attempts failed the system will lock. The only way to unlock the system is by clicking the star key (*) for more than five seconds. This feature should be kept a secret between the user and the company otherwise anyone who knows it can unlock the system and keep trying to hack into it. The keypad should be installed next to the entry door because it is programmed with a time lag, to permit you to exit when leaving, and enter on arriving home, without activating the alarm. We have set a profile that gives you 20 seconds before leaving the house and the alarm starting. By clicking the (A) button on the keypad the counter starts giving you the amount of time to leave the house. If the magnets of the magnetic switch get separated, by the opening of a door or a window (depending on where it is installed), the internal invisible counter gives the user 15 seconds or 3 trials to set the password correctly or the alarm will go off. The alarm will remain firing until the password is set correctly. Furthermore, the option of changing the password is also available. In order to do so insert an incorrect password and the red LED flashes. While it is blinking click on the star button and wait until the yellow LED blinks and the LCD displays INSERT ADMIN PASS. In our system the administrator password is 5678. After inserting the correct administrator password the system will ask you to insert the new password then once again for confirmation. The administrator password however cannot be changed unless we change it in the code and download it again on the chip. Chapter III: Algorithm Design Block Diagrams: Figure5. Block Diagram showing how the system functions Figure6. Block Diagram showing how the keypad functions Proteus: Figure7. Our Design on Proteus Chapter IV: Conclusion References Conclusion: As we have seen in the graph Burglary rates figure7, the alarm system is becoming a must in modern day life in order to protect our valuables and the ones we care about. As we can see from the graph below, the rate of burglary is declining in 1981 that is when technology started evolving greatly and as we can see with time crime kept on decreasing. Figure7.Key Facts at a Glance (2011).Retrieved from http://bjs.ojp.usdoj.gov/content/glance/burg.cfm Figure8.Certified Security Systems (2010). Retrieved from http://certifiedsecuritysystems.com/crime-statistics.aspx In flow chart figure8, alarms are moderately effective (57%), 40% very effective, and 3% not effective as owners say. Alarm owners are very satisfied with price and value of security systems such that 74% excellent and good, 22% just okay, and 4% Poor and Terrible. In conclusion, comparing our cost to the prices on the market we can see that systems cost from 30$ to 200$ depending on the number of sensors, the ground it covers and its specifications. Therefore, we recommend each house owner to buy an alarm system because it is not very expensive and might save you the trouble and the inconvenience and the financial losses caused by a robbery. REFERENCE LIST [1] Alarm SensorsAre Essential and Primary Elements of Your Home Security System (n.d.). Retrieved January 19, 2011 from http://www.home-security-action.co.uk/alarm-sensors.html [2] Burglary Facts and Statistics (2008).Retrieved January 19, 2011, from http://www.articlesbase.com/home-and-family-articles/burglary-facts-and-statistics-338161.html [3] Certified Security Systems (2010). Retrieved January 20, 2011 from http://certifiedsecuritysystems.com/crime-statistics.aspx [4]Evans, K. (n.d.). How Does a Home Alarm System Operate? Retrieved January 18, 2011 from http://www.ehow.com/how-does_4568395_home-alarm-system-operate.html [5] From Burglar Alarms to Fire Alarms (2008-2011). Retrieved January 19, 2011 from http://homesecurity.net/security-alarms/ [6] Gowan, M. (2000). How it Works: LCD Monitors. Retrieved January 20, 2011 from http://www.pcworld.com/article/15112/how_it_works_lcd_monitors.html [7] Harris, T. (n.d.). How Burglar Alarms Work. Retrieved January 20, 2011 from http://home.howstuffworks.com/home-improvement/household-safety/security/burglar-alarm1.html [8] Home Burglary Statistics (2008-2011).Washington Post. Retrieved January, 19, 2011, http://homesecurity.net/home-burglary-statistic/ [9] How Hard Wired Home Alarm Systems Its Add On Components Work! (n.d.). Retrieved January 20, 2011 from http://www.top-home-security-info.com/home-alarm-systems.html [10] Interrupt Driven 44 Keypad (n.d.). Retrieved January 19, 2011 from http://priorartdatabase.com/IPCOM/000005778 [11] Introduction to Liquid Crystal Displays (n.d.). Retrieved January 19, 2011 from http://plc.cwru.edu/tutorial/enhanced/files/lcd/intro.htm [12] Key Facts at a Glance (2011).Retrieved January 19, 2011, from http://bjs.ojp.usdoj.gov/content/glance/burg.cfm [13] Krejcik, R. (2010). Advantages of a Home Alarm System. Retrieved January20, 2011 from http://www.realestateproarticles.com/Art/30563/271/Advantages-of-a-home- alarm-system.html [14] LCD (2011). Retrieved January 20, 2011 from http://www.webopedia.com/TERM/L/LCD.html

Friday, October 25, 2019

The Intervention of the Judicial System in Violence Against Women Essay

The Intervention of the Judicial System in Violence Against Women Women in this country have been a part of violence for an enormous amount of time. This violence includes pornography, rape, and even domestic violence. The United States judicial system has intervened into the so-called private sphere and eradicated women in society, providing precedent and even updating statutes as well as other types of legislation. Without intervention women may still have no rights as human beings and the victims of much worse violence. Not to say that the violence that comes about is not extremely painful and an obscene amount of torture for women, but without our judicial system to minimize some of these violent acts would be in total chausses. Throughout these acts of violence women are treated as animals, beaten, slaughtered, and killed eventually. For some, this may seem unthinkable and unrealistic but pornography, rape, and domestic violence does just this. These women who sell their bodies through porn usually-not all- have unusual childhood backgrounds. These backgrounds include, molestation, rape, incest, are penetrated with objects as children, sold for child porn by their parent or parents, being tortured through every moment of their lives. When these women grow up into adults what kind of life are they expected to have? A loving family, a college education, and a respectable profession? Or no education, broken family, and for them to fall into the same profession their parents taught them? These women don?t understand that parents are supposed to love their children unconditionally. What else should we expect from women who all of their lives they have been treated as inhumane. Rape, also a sexually violent act that women enco... ... most popular remedy for battered women. This remedy always involves the state or state vs. someone and proves beyond a reasonable doubt. The second remedy is Civil law where the burden of proof is the highest. This involves private individuals, or an individual and some branch of government. The continuing of violence is dangerous to women especially the first 72 hours after she leaves. Statute 16-25-20 states if there is an injury a police officer must arrest but if only fear is involved police have discretion. Self-defense is another aspect of domestic violence. What if she decides, no more beatings and kills him. Has he drove her to insanity or should she control her anger and just leave after so many times of asking him to stop? What if she does control her anger and he kills her for leaving? These are questions that must be addressed in helping battered women.

Thursday, October 24, 2019

Whales in Captivity

Killer Whales Deserve Freedom Kimberly Hall COM 155 November 27, 2011 Mara Galvez Killer Whales Deserve Freedom Orcas are complex social creatures deserving freedom and respect, not captivity in theme parks under the guise of public education and entertainment. Aquarium staffs say captive whales are priceless educational tools. However, people can educate their children by bringing them to the wild instead of bringing the wild to them at the expense of the Orcas health and well-being. The price of a family admission ticket is what continues to drive this cruel spectacle,† according to Michael O' Sullivan, the Executive Director of The Humane Society of Canada (Whales in Captivity, 2010, Para. 3). Orcas suffer in many ways in captivity, and are subject to many stressful situations they would never encounter in the wild. Captivity changes not only their mental state but also their physical appearance. One of the most salient physical effects of captivity is dorsal fin disfigurati on.In the captive population, almost every male has a flopped dorsal fin, and most females have at least some bend to their dorsal. In the wild, male dorsal fins can exceed heights of six feet straight up. The best theory is that the dorsal fin flops from the force of gravity. Dorsal fins are made of cartilage, not bone. Orcas are one of the fastest mammals in the sea; they can reach speeds up to 30 miles per hour. Orcas can dive underwater to depths of close to 200 feet. When diving, the animal’s heart rate slows from 60 beats per minute to 30 beats per minute.Meanwhile, oxygen-carrying blood diverts away from the extremities, and then navigates toward the heart, lungs, and brain, where there is more oxygen needed. These biological changes permit the animal to conserve oxygen while submerged for longer periods of time (About Orcas – Physical Characteristics, 2005). In the wild Orcas have support from the water, keeping their dorsal erect. In captivity, Orcas are at th e surface constantly for feeding, training, and petting purposes, and swim only in circles so there is very little dorsal support, thus causing the dorsal to flop [ (Bohn, 2011) ].Orcas in captivity suffer from more than just physical imperfections. Dosed with drugs to help the killer whales deal with stress, they suffer terribly in marine parks. Animals and humans share the same immune system. Just as stress reduces our immune system, it does the same to the killer whale. Therefore, stress has been an indirect cause of death in captive killer whales. Killer whales in captivity experiencing stress tend to beat their head against the walls of their tanks until it bleeds. At least three captive whales have killed themselves with this repetitive motion brought on by stress.Have you ever heard of this happening in the wild? Not only does it not happen, an Orca in the wild would never bring bodily harm upon itself. Denial of their right to live in their true habitat where they belong cau ses the killer whales much stress, frustration, anxiety, and sadly aggression. In the wild Orcas, do not attack humans as they have in marine parks. As Barry (2010, Para, 12) explained, â€Å"Isolation among marine animals is highly stressful, which leads to abnormal behavior. † Marine parks such as Sea World have what they call petting pods, where the children can pet and feed the Orcas.Orcas are given tranquilizers to help them deal with the stress and anxiety of human contact. People might not be so eager to pet these wild mammals if they knew everything the Orca had to go through just so they could pet them for a minute or two. (Smith, 2010) Along with the stress of living in a marine park, Orcas suffer extreme stress being away from their family members. In the wild Orcas travel with their family (pods) that range anywhere from five to 25 family members (Orcas). Orcas families are very close knit. They mostly travel in pods that include their parents, grandparents, child ren, etc.Taking the Orca away from their family causes them much stress, anxiety, and depression. In the wild, their offspring stay with them and travel with them. Orcas, related by blood, remain together for the duration of their lives. In captivity, the aquarium staff removes their offspring (calves) from them at a very young age. For Orcas, known to be the one mammal that is closest to the human race as far as family, feelings, and social behaviors, it would be equivalent to a human being removed from their family to never see them again, to never speak to them again. Smith, 2010) In the wild, Orcas have constant communication with their pods (family). To communicate with their pods (family) in the wild Orcas use echolocation. Mandell (2010) describes echolocation as, â€Å"The process of moving air between the sinuses in their heads to make high-pitched sound (p. 2). The vibrations travel underwater until they encounter objects and then rebound back creating audible tones the w hales use for navigation. Their sound waves go so far that they never come back to the Orca who sent it. What comes back is the voice (sound waves) of another Orca (family member).In captivity, these high-pitched sounds can only travel to the wall of the tank and bounce back. Thus, causing the sound (the Orcas own voice) to bounce back and forth repeatedly which in time can drive a killer whale insane. It would be equivalent to keeping a human in a room, in solitary, who is constantly hearing voices. Being isolated in a small tank (approximately the size of two Orcas), splashing spectators with your tail, and doing tricks several times a day for years would make any species go crazy. I agree that watching magnificent Orcas performing tricks with a human trainer is not educational.Unfortunately, watching one snap and kill a trainer is educational, but only if the lesson changes the minds and actions of its captors. Orcas are complex social creatures deserving of freedom and respect. There are currently 42 killer whales in captivity worldwide. Out of the 194 killer whales in captivity since 1964, two-thirds died within 10 years, and less than 30 survived longer than 20 years in captivity [ (Mandell, 2010) ]. To keep them in captivity disguised under education and entertainment is nothing more than cruel and unusual treatment.They suffer physically, socially and mentally. Captivity is more detrimental to the welfare of the Orca than the wild could ever be. Watching Orcas in their natural habitat is far more educational than watching them perform tricks in a marine park. [ (Santich, 2010) ] OR [ (Orlando, 2011) ] YOU DECIDE References About Orcas – Physical Characteristics. (2005). Retrieved December 7, 2011, from orca-zone: http://www. orca-zone. com/aboutorcas/index. html Barry, J. (2010, August 26). Killer is prized, feared, stressed: Life won't change much for Tilikum, the orca that drowned a trainer at Seaworld.St Petersburg Times . St Petersburg, FL, United States. Retrieved from http://search. proquest. com. ezproxy. apollolibrary. com/docview/264384772/1338068E48F8B67489/1? accountid=35812 Bohn, G. (2011, November 28). Killer whales and captivity; What threat, if any, does life in the aquarium bubble pose to the health of these giant sea mammals. The Edmonton Journal . Edmonton, Alta, Canada. Retrieved from http://search. proquest. com. ezproxy. apollolibrary. com/docview/251763683/133805C5287EFA914D/1? accountid=35812 Mandell, M. (2010, June 29).Short history on killer whales. Bergen County, N. J, United States. Retrieved from http://search. proquest. com/docview/365980652? accountid=35812 Orlando, S. W. Orca Collapsed Dorsal Fin. (picture). Captive orcas. Sea World Orlando, Orlando. Retrieved from http://pediaview. com/openpedia/Captive_orcas Santich, K. Free Willy? Conservationists say this is how orcas should live — in the wild. SeaWorld tragedy — a reminder of why orcas should swim free? Whale and Dolphin Co nservation Society. (picture) Retrieved from http://blogs. orlandosentinel. om/changetheworld/2010/02/a-tragic-reminder-of-why-killer-whales-should-not-live-at-marine-parks. html/orcinus_orca_5 Smith, J. (2010, June 11). Captive Killer Whales. The Ecologist . United Kingdom. Retrieved from http://search. proquest. com. ezproxy. apollolibrary. com/docview/234920905/1338063BFFA6E62ABF8/1? accountid=35812 Whales in Captivity – Spectacularly Cruel – says Humane Society of Canada. (2010, July 1). The Canada Newswire . Ottawa, British Columbia, Canada. Retrieved from http://search. proquest. com. ezproxy. apollolibrary. com/docview/455947023/133806FC22464623DC8/6? accountid=35812

Wednesday, October 23, 2019

Describe Place

Kelas Reguler Pagi dan Sore Mata Kuliah : Bahasa Inggris I Dosen : Restu Arini, S. Pd. Prodi : Semua Prodi Hari/Tanggal : Senin, 19 Nopember 2012 (Reg Sore) Selasa, 20 Nopember 2012 (Reg Pagi) Sifat : Take-Home Test Read the instruction carefully You are going to make video on your oral performance for Mid Test Project. The videos are based on the four topics we have discussed in classroom meeting (see the explanation in the box). The video can be made by using any recording media such as hand phone, handy cam, camera, etc which then should be compiled in one CD.You have got about 3 to 10 minutes to present each topic. Label your CD with your name, student number, and major. You are to submit the CD on the exam date. Read the explanation below of how you make t his project: Topic 1 : Introducing Yourself You must introduce yourself by mentioning the following things in your video; Introduce Your Name/Surname; describe Your Education Background; describe Your Competency; Describe Your Prospective Career; Describe Your Hobby, Your family, things you are doing and etc. You are allowed to add more information in order to make your vide o more interesting.Please go to these links to get better idea about how to deal with this topic: http://www. youtube. com/watch? v=CZCfTX oRzg&feature=autoplay&list=PLA7C7BF7961EB4606&playnext=2 http://www. youtube. com/watch? v=jiUdDxGlxvI http://www. youtube. com/watch? v=etIpPH5CEdA&feature=related Topic 2 : Description of People Read a biography book about famous people/group of people of any kind of professions (the person you are chosen might be an athlete, a musician, a comedian, a politician or even activists). The book can be written in English or in Bahasa Indonesia.An article taken from internet is not acceptable. Having finished reading the book you must make a description about him/her/them, in the following ways: ? The physical appearance ? The quality of the person using P-M-I Chart (see tool #1) Plus = you are about telling the quality of the person from the positive or good side. Minus = you are to discuss the person’s bad points. Interesting = you are to reveal the things or personality which made this person interesting, in other word his/her charisma or charm. Use the P-M-I Chart as a guideline to make your summary on the biography book you read.In the video, you do not have to show me the P-M-I Chart. You will be scored based on certain requirement (see Scoring Rubric #1) Please go to these links to get better idea about how to deal with this topic: http://www. youtube. com/watch? v=vVeojbg_JgI Arini. MidProject. English1. 2012 1 http://www. youtube. com/watch? v=tMMmJqh4qek http://www. youtube. com/watch? v=sqt_IbqJOLg http://www. youtube. com/watch? v=GrqEANtMqYo Topic 3 : Description of Object Choose an object of the following category: Furniture /Kitchen tools / Electronic Stuff s/ Vehicles / Office Equipments/Music InstrumentsMake a description on the object you choose. Give as detail information as possible. Go to these link to have clear idea about this topic: http://www. youtube. com/watch? v=H1mAtWACONM http://www. youtube. com/watch? v=kiyNYWGL-yg Topic 4 : Description of Place Choose two places to describe. The first is your hometown or place where you were born or place where you grew up. The second will be the place you are eager to visit. Here you may describe a specific place related to your dream or ambition. For example; you have a plan to continue study after finishing your bachelor degree.MidProject. English1. 2012 2 Scoring Rubric #1 (for description of people) 4 (standard of excellence) ? Develop detailed and convincing observation for each of three categories Identifies own conclusion and provides convincing and detailed rationale for choice ? Information is accurate, detailed, well, organized and presented with clarity 3 ( Exceed ? Develops convincing observation for each of the three categories acceptable ? Identifies own conclusion and provides detailed rationale for choice standard) ? Information is accurate and organized 2 ( meets ? Develop basic observation for each of the three categories acceptable ? Identifies own conclusion and provide rationale for choice standard) ? Information is accurate 1 ( needs improved ?Observation are incomplete and /or incorrect to meet acceptable ? Identifies own conclusion but does not explain rationale standard) ? Information is inaccurate, vague or missing Scoring Rubric #2 (for description of object and places) 4 (standard of excellence) ? Identifies multiple convincing and insightful examples of what a specific trait looks like/sound like/feels like ? Uses precise and detailed vocabulary to support description of examples 3 ( Exceed acceptable standard) ? Identifies multiple convincing examples of what a specific trait looks like/sound like/feels like Uses detailed vocabulary to support description of examples 2 ( meets acceptable standard) ? Identifies appropriate examples of what a specific trait looks like/sound like/feels like ? Uses appropriate vocabulary to support description of examples 1 ( needs improved to meet acceptable standard) ? Identifies examples of what a specific trait looks like/sound like/feels like that are erroneous or inappropriate ? Uses vocabulary that is vague and /or is incorrect Good Luck Arini. MidProject. English1. 2012 3