Android Is One Of The Best Computer Science Essay

Android is one of the best Mobile runing system in the present market. Approximately, most of the people are now utilizing the humanoid enable smart Mobile phones. In our day-to-day life, we on a regular basis use the electronic mail applications, bank applications, and societal web applications. The information we use in these applications are really sensitive, personal and of import excessively. Due to the promotion of the nomadic operating system engineering, some malicious applications can derive entree over the user ‘s sensitive, private and societal information.

This type of applications can derive the control of the device itself. One biggest job is that these modern devices will hold uninterrupted cyberspace connectivity through the Wi-Fi or nomadic informations services. Most of the applications in the market are vulnerable such that they can easy impact Trojans and viruses, which indirectly android nomadic security. And besides, there are some malicious applications which straight attack on the nomadic file system. Therefore it is the compulsory to take safeguard and to supply the best security for these nomadic devices and procuring the devices.

Security should be provided even when the device lost or stolen or damaged. This paper provides a brief penetration of security breaches in humanoid operating system degree and android applications degree. It besides provides a successful phenomenon to get the better of these security breaches.

Introduction

In recent old ages the Mobile runing system engineering is progressing on the other manus it is acquiring easy focused for most of the assorted malicious onslaughts.

Harmonizing to latest security studies, the opportunity of assailing nomadic operating system is going more through malicious feats and executed onslaughts in 2011.This development can be lead to two of import factors: the overpowering user response to the humanoid operating system and the promotion of android phone engineering. The range of nomadic device market is openly noticeable from the studies issued by the ITU [ 3 ] that explains the strength of the nomadic phone users in the universe. Therefore android Mobile phone engineering has been invariably bettering over the last decennary and the restraints for both hardware and runing systems have limited onslaughts. Therefore, android nomadic operating system proves to be turning point in malicious feats for devices by supplying the high terminal characteristics and unfastened beginning functionalities. From this we can detect that the portion of the market among the smart phone in the US can excel 50 % of the entire nomadic devices market portion by the terminal of 2011 [ 6 ] . This represents that the platform of the nomadic devices is acquiring weaker, so that malicious can be attacked easy.

In add-on to these criterions, now a twenty-four hours ‘s android smart phones are used like personal computing machines. So the onslaughts applicable to our computing machines can be indirectly attack the android smart phones besides in assorted ways. So, the criterion menaces for computing machines are besides application to the nomadic platforms. Most of the applications we use in the android devices are developed by 3rd party suppliers, so there is a opportunity for invasion of assorted malwares and other security issues can lift. The chief purpose of the aggressors is intrude the information instead than utilizing functionalities provided by the android devices.

In this paper i present assorted security menace theoretical accounts for the humanoid Mobile platforms. These theoretical accounts emphasis on the three key jobs in android device security: ends of aggressors, onslaught vectors and nomadic malware. This menace theoretical accounts explains assorted involvements and ends of the aggressors which in bend leads to place the types of onslaughts and country of the onslaught. Finally, the theoretical account considers menace types applicable to mobile platforms if the presented onslaught vectors are successfully utilised. This paper is besides includes the best patterns to cut down the security issues in android devices.

Android Security Threat Models

This subdivision of the paper present the overview of the challenges faced by nomadic devices while the protecting the user private informations. This security theoretical accounts is divided in to three types: onslaught ends, onslaught vectors and nomadic malware, based on the analysis of aggressor ‘s ends and involvements.

A. Attack Goals

The first two ends described here are less harmful, while the latter is harmful. Most of the onslaughts are type of onslaughts which perform the operations without the user sensing. The usage of such onslaughts is to disrupt the operation of the nomadic phone to the possible extent and devising activities which are utile to the aggressor. On the other manus, harmful onslaughts are concentrated at upseting the normal operation of the nomadic device.

1 ) Collecting User ‘s Sensitive Data

By and large, the android devices are now being used for the informations storage and hub of the personal informations. So they became primary mark for the interrupting user ‘s privateness. The chief septic country will be the confidentiality and unity of the stored informations. A success effort to onslaught can do the aggressor to read the SMS, MMS messages, electronic mail messages, name logs, and in conclusion reach inside informations. Furthermore, the aggressor can do an effort to direct the sham SMS, direct electronic mails and accessing information to personal inside informations, contacts and calendar events. Personal information located in devices memory or on SD card, like paperss, exposures etc. can besides be intruded.

 

Technology in Fashion Merchandising and Management

Customer research and profile is a crucial part of every business organization as it helps to find effective solutions to the existing problems. It is essential for business to know customer pain points and address them for seamless shopping experience. Generation Y, the millennials also the tech savvy generation is the most upcoming generation who will have huge amount of money to shop in the future. Fashion industry is ever changing so it is essential for brands to have adequate information in order to find a practical solution to keep up to date in the market.

The three Generation Y people- The Hairstylist, The Techie and The intellectual girl have preference offline shopping which also eradicated their customer pain points. They are also food lover and love to experience new food and it helps them socialize with people. They also prefer shopping as an investment rather than impulse buying and like to shop from sustainable and eco friendly brands. They love to spend time with family and friends and are always checking social media to stay updated with their friends social life.

They also prefer to share stories rather than posts on social media.

The Generation selected for the paper is Generation Y also known as the millennials are born from the early 80s through to the turn of the Millennium, this is a cohort which largely came of age at the outset of a global financial crisis, but also amid a vast acceleration in digital technology (BBC, 2017).

Generation Y are the ones who have been exposed the most to the social media and have the benefit of both digital teenage and non digital childhood.

They have withstand the huge technological advancement and are hence tech savvy and ahead of the game in terms of technology. They usually love to be connected on social media with their friends and family and also shop a lot through social media.

Meet Natasha, 25 years old, the hairstylist who works in a salon named Yo-C salon which is located near Union Square park, Manhattan. Natasha is also freelancing as the salon job doesn’t pay sufficient for her to survive and in order to have extra income she works as a freelance hair stylist for shoots. She is a social media addict and loves to create good content for her blog and puts a lot of effort on maintaining her Instagram feed as she also gets new contacts and work through her instagram.

Since she is a hairstylist she loves to be up to date with all the fashion makeup and hair trends.

She likes to spend her time buying clothes from trendy online stores like Asos and also stores like shein.

Natasha’s parents are from Singapore and she lives with her grandparents in Queens. Since she is studying in New York, it is not feasible for her to spend money on shopping so she is constantly looking for good deals and stores which provide fashionable stuff at a reasonable rate.

Natasha likes to hang out with her friends but usually works even on weekends. She is a fresher in the field and hence looking forward for more experience. She is currently looking for a new job in a salon in New York. Her favourite brands to shop are Zara, H&M, Bershka and Forever 21. She shops designers during thanksgiving sale like Kate Spade, Coach, Michael Kors. Since she likes to shop offline, generally tries searching products through instagram and facebook.

Biggest customer pain point is searching products online and not finding it in the store and also finding the products she likes. Shopping habits of her would be more like an impulse buyer but also uses the products as investments as she repeatedly creates looks for instagrams. She loves spending time with the family. Huge Food lover but also goes to gym and works out often and tries to follow a specific diet. She loves culture and festival like christmas, chinese new year and thanksgiving.

Navish is 31 and he is senior consultant at Microsoft for the past 4 years. He has an apartment in Times Square in Ritz Plaza. Navish loves to travel often nad has visited 39 countries so far and is also a photographer. His 1 bedroom apartment also has a studio which he uses for fashion photoshoots as it is his passion and has a balcony overlooking the views of Times Square. Navish is also very active on social media showcasing his photography work. Navish plans on buying a house in New York as he wants to invest his money.

Navish prefers to shop offline and would prefer buying from stores, since he wants to try the clothes for fit and quality. He usually shops high end brands and loves wearing fashionable clothes. The stores he shops from are Sando Paris, Helmut Lang, Polo Ralph and All Saints. He is not an impulsive buyer and hence buys clothes as an investment. The biggest pain point for him is value for money of the clothes he buys, since lot of them are too expensive clothes. He also loves to cook and runs in central park during summers. He often visits India once a year to visit his family and friends. He loves to listen to Kygo music and attends various music concerts.

Joy who is 29 years old, is a lawyer with 3 masters degree who is from Harvard and Oxford. She lives in Brooklyn and her parents live in Boston. During her free time, she likes to dance. She is a trained Bharatanatyam dancer. She is a huge Bollywood fan and without any doubt and also a part of dance groups like BFunk (Bollywood Funk) since she is a dancer and has recently shot a video for them. She also wants to pursue acting and hence works as a freelancer as this gives her a lot of time to write book which she is currently onto and takes up different projects.

Joy has a very calm soul. She is very understanding and down to earth. She often visits her parents and spends time with family and friends.

Her biggest customer pain point is returns specially returns in online shopping. She shops for classic styles and invests in good quality and fit clothes. She shops offline most of the time and her favorite brands are Rent the Runway which she has an unlimited membership, Express, & other stories, Forever 21, white house black market, banana republic and Zara.

Joy uses social media to stay updated with the latest news from her friends and usually posts lot of dance videos on social media. Joy also does not usually cook and often eats outside as she doesnt know how to cook.

It is seen that all three people like to shop offline in order to have good fit and good quality fabrics for their clothes. They have very different personalities but like to avail interactive shopping experience. They all have one thing in common which is love for food and usually spends a lot of money on food. Brands should offer in store cafes as this would help Generation Y have an more satisfied experience while shopping.

Brands should also offer omni channel retail which will help customers buy online and pickup in store hassle free and would eliminate customer pain points like product discovery, waiting for online shipping and waiting in ques for payment and trial. It is also seen that usually 2 out 3 people buy clothes that are long lasting and have classic styles. They also are more considerate about brands being sustainable and eco friendly.

The shopping budget of the three remains moderate price with around 50$ – 100$ being the average price and for the guy average price being 400-500$. They all have a social life and love to hang out with friends on weekends and also post pictures on social media with varied consistency. Usually seen that people like to upload more stories of what they are currently doing rather than uploading pics which is like old school and main stream for them. Brands should thus put more emphasis on this and promote and share people’s stories with videos as that is more realistic than pictures.

BBC (2017, August 28). BBC. Meet the Millennials: Who are Generation Y. Retrieved from:

Bryn Farnsworth, P. (2016, april 26). Imotions. Retrieved from Imotions -blog:

 

Cash advance no faxing : quick easy cash without any obligation

There are expenses for which you are never prepared. To deal with these kind of circumstances, what you do need is funds, which must be made available to you at a short notice. Given the circumstances and your desperate need to avail the cash , it would seem logical to acquire the provision of .

As far as these loans are concerned, the main idea is to let you avail the funds at a short notice, without letting you waste much of your precious time.

In most cases, while availing loans, you have to arrange documents and other paperwork. This certainly takes up a lot of time. Moreover faxing the document does not always ensure that it will reach the lender.

Instead, with these loans, the entire transaction takes place. You will be required to mention the details such as your employment status, the monthly income that you draw, bank account number, age and address, which just takes only a few minutes. After the verification, the loan amount is then deposited in to your bank account, within a short span of time.

Based upon your need and requirement, through the provision of these loans, you can source funds anywhere in the range of ?100-?1500. this amount sourced can be used to deal with all your short term needs and demands.

Besides, while attaining the loans, you are never required to involve any collateral, which then lets you avail the funds, without undertaking much of a risk. Moreover, applicants with CCJs, IVA, arrears, defaults and so forth too can attain these loans.

This of course can be attributed to the tendency of the lenders, who do sanction the funds without looking in to the credit profile.

Prior to the approval of the loans, you must make a proper research. By doing so, you will be in a position to acquire the funds against viable terms and conditions.

do provide you the leverage with which you can resolve all your sudden or unforeseen monetary needs.

Parker Carmel is a senior author in payday loans no faxing where visitors can get useful information and apply for any type of loans online. For further information about payday loans, no faxing payday loans, payday loans no faxing, cash advance no faxing and payday loans no documents visit

 

The Importance of Emotions in Learning

As human beings, we are constantly exposed to significant knowledge that requires an in depth understanding. When a child grows up, understanding the ways of the world is a must however, at a young age not everything can be explained fully. Therefore, we are taught using explanations. Instinctively, emotions play a role in our understanding of knowledge and therefore explanations can vary. Giving a good answer to a ‘Why?’ question is not just a philosophical abstraction. An explanation has cognitive, real-world functions.

The question might have an easier answer if each branch of knowledge tied together and all people had similar values and levels of intelligence. Since this is not the case, explanations try to avoid being overwhelming by complexity and instead answer the question with a generalization. These brings the question whether good explanations have to be true.

Any explanation that appeals to the age and understanding of a person is always a good explanation. The Black Death, also known as the Great Plague, the Black Plague, or simply the Plague, was one of the most devastating pandemics in human history, resulting in the deaths of an estimated 75 to 200 million people in Eurasia and peaking in Europe from 1347 to 1351.

In the 1300s, the epidemic known as Black Death devastated the European region (Shapka, 2013). While the plague killed thousands of people, it made a severe scars and bubonic pus filled sores. The descriptions of what the plague did to the human body is highly graphic. Due to this, explaining it to children was not be advised.

Therefore, during the great plague, the rhyme “Ring around the

Rosie was created. The lyrics of this rhyme subtly yet effectively describe the cycle of what happens to someone when they have been hit with the plague (Appendix 1). The nursery rhyme is sung by most children today however most not being aware of its true meaning and that the song actually has very morbid roots. While this explanation speaks truth to a certain degree, the nature of its explanation does not clearly convey the true severity of the disease. While the explanation is true, the explanation is used to mask the dark truth of the plague by making it into a children’s rhyme. An explanation that is true may not convey every aspect of the truth depending on the person’s maturity and understanding. Explanations can be broken down into two main types: nomothetic and idiographic. Nomothetic is an explanation that establishes general laws and generalizations, while an idiographic explanation focuses on the individual suggesting that everyone is unique and therefore should be given an individual explanation. One type is not better than the other however, they could be more effective depending on who needs an explanation (Nichols, 2011). A common way of knowing, technology, is used in school almost everyday. When learning about computer science at a high school level, we are usually taught about technology, especially about functions of a computer, in a metaphorical sense.

By linking the WOK or technology and the AOKs, it becomes clear we are taught in a way to simplify and enhance our understanding. For example, we are taught that data in a computer is transferred by a bus and the components in the computer are living and can decide where each packet of data goes. As we continue to learn the subject, we learn about logic gates and truth tables which make it clear how the packets are really controlled. While we learn more and more about different aspects of computer technology, our understanding of the explanation we originally learned becomes more and more clear over time. This means that the explanation is originally unclear and unrealistic, but as more relevant personal knowledge is gained, the explanation seems to become better. This is clearly an idiographic explantation as it links directly to an individuals personal understanding. Explanations are good when they are appropriate for someones age and understanding however, can be developed over time as the person changes. This way of explaining is similar to learning about our home planet, Earth. At first it is really hard to accept that Earth is a sphere. Then we learn that the small yellow warm ball in the sky is not that small, but instead extremely large and very far away. It is also not orbiting earth but instead the earth is orbiting it. Later on in your learning journey, you learn that this is false. The earth does not orbit the sun. They orbit a common point. Even later, you learn that even that is false. Because it is only our description. Only a question of where you put the origin in of your reference frame. This approach to explaining our solar system is not true, however, it is good since the person would have at least a close understanding of how the Earth orbits (Siegel, 2018).

While we believe we know the truth by understanding explanations, we do not have the audacity to claim to know what is completely “true”. All that we can hope for is that we have come closer to the “truth”. As mentioned, it was once believed that the the sun revolved around the earth. Now we know that the earth revolves around the sun. But, we recently learned that there are many suns in a galaxy with planets revolving around them and, there are hundreds of galaxies revolving around a “black hole” (Siegel, 2018). So, we can only hope that our explanations are getting closer to the truth. The most advanced “scientific” explanations of our physical reality seem to be harmful to humanity. The interpretations of scientists have been that there is no purpose for humans in the universe and that the universe is meaningless. Does every explanation have to be completely true and accurate to be considered the best explanation? Every situation in our real lives can be broken down into steps. For example, to say that “I came home and ate dinner” can be brought down to several different branches of explanation such as “I cam home, took off my shoes, changed my clothes, and ate dinner”. We can continue this process all the way down to where there are only two options for everything decision. This is the mathematical side to explanations. Boolean algebra is an explanation in the form of 0s and 1s (Berry, 2017). By bringing down a situation to a binary representation gives the most accurate explanation of the situation. While all explanations appeal to a different factor based on who is it who is being explained, the only true explanation is the one which is the most accurate.

This means that the best explanations are not those which are explained with the most detailed words but instead those which are represented using mathematical diagrams and tables. Using boolean algebra is a nomothetic explanation and therefore establishes general laws and generalizations. However, most mathematical explanations are most likely not clear to any who is not well educated in the math field. This brings to question, are explanations good based on how well they are understood, or the accuracy of the explanation itself? Gaining knowledge all comes down to interpreting the truth. Explanations are essentially the “middle man” which makes the truth clear depending on the reader, filtering out any knowledge that does not fit the persons understanding. However, a good explanation does not necessarily have to be true but a true explanation is always good. If we think logically, a true explanation is always based on facts not opinions and it is far from being biased. So, it can’t be challenged because opinions are attacked, facts are not attacked. So, a true explanation is undebatable and so it is good. In conclusion, gaining knowledge by discovering the truth is very important however, depending on a persons understanding and values, an explanation would have to be modified. This means that the different “versions” of an explanation may not be effective for everyone. While a good explanation may not necessarily be true, it most likely appeals to the readers emotions and maturity of the topic. Due to this difference in perspectives between the general public and scientists, scientists believe that there may be a “psychological” dimension to humans which must also be considered before they expose the immensity of the truth upon them as an explanation’s only interpretation.

 

An Inside Active Directory Computer Science Essay

Suppose that an unusual state of affairs occurs in which you were required to manually configure NetBIOS name declaration utilizing a LMHOSTS file merely. Assume this is the lone manner you could implement NetBIOS name declaration. Describe the stairss that you would travel to in order to: make the file, modify the file to include the name declaration information and shop the file on the machine. What stairss would be necessary to guarantee that each computing machine communicates with each other efficaciously utilizing NetBIOS? What are some jobs that may originate? A

Answer: First, with the usage of LMHOSTS file, the jobs that occur are breakdown to turn up a distant computing machine can happen as one or other undermentioned mistakes are at that place in LMHOSTS file:

This files do n’t incorporate a entree for remote waiter

All LMHOSTS names are automatically changed to uppercase, the NETBIOS name in LMHOSTS file is incorrect spelled.

IP reference for NETBIOS name is non valid in LMHOSTS file.

All the clip LMHOSTS file is losing when required passenger car return at terminal.

The necessary stairss to guarantee that each computing machine communicates with each other efficaciously utilizing NetBIOS are, there are many ways one of them is shown below

Start Device Manager.

ClickA View, and so clickA Show concealed devices.

In the right window glass of Device Manager, clickA Non-Plug and Play Drivers.

Double-clickA AFD Networking Support Environment.

UnderA Device use, select theA Use this device to enableA cheque box, and so snap OK.

Other manner is an application that uses the NetBIOS interface API for web communicating can be run on some protocol stack that supports a NetBIOS interface. NETBIOS is protocol which provides maps at session and conveyance such as dependable connection-oriented session informations transportation, web name enrollment and confirmation and undependable connectionless datagram informations transportation. NetBIOS over TCP/IP transfer the NetBIOS protocol over the TCP or UDP.

Making the LMHOSTS File: by configuring a system to utilize LMHOSTS file. We must do primary LMHOST file on each system, name file LMHOSTS and salvage in % systemroot % System32DriversEtc directory. We can make a file even by text editor.

2. Suppose your web utilises a WINS waiter. Besides, assume you are the web decision maker and were called in to trouble-shoot a job in which the WINS server itself could non be accessed utilizing NetBIOS name declaration. Assume all other machines are working and pass oning decently with the WINS waiter in order to decide NetBIOS names. Describe what you view to be the most likely cause of this web ‘s problem.A

Answer: The most likely job grounds are

they can non turn up the cause of extra name mistake messages: For this brand certain the WINS database for the name. If we find a inactive record, take from the database of the chief WINS waiter for client where the transcript name was noticed. ca n’t put the ground for Network way non found mistake messages on a WINS client: for this brand certain the WINS database for the name. If the name is non at that place in the database, look into whether the system uses B-node name declaration. If yes, add a inactive function for it in the WINS database, WINS backup neglecting on a regular basis: For this guarantee that the path for the WINS backup directory is on a local disc on the WINS waiter. WINS ca n’t back up its database files to a distant thrust. The WINS waiter buzzword pull or force the reproductions to another WINS waiter: do certain every waiter is right configured to draw or force, if server are placed across the routers, verify that job is non loss of web connectivity or the path failure on in-between nexus.

3. There are 13 root waiters that control the overall DNS search procedure for the full Internet. If these 13 waiters were to go unavailable, much of the Internet would be unaccessible. Resources would hold to be accessed via IP reference, non by host name. However, hackers one time managed to assail 11 of the 13 root waiters, ensuing in debauched public presentation. Surprisingly, Internet users did non detect any difference. Can you explicate in inside informations why? A

Answer: the ground why the cyberspace user can non detect any difference because whatever they perform they do behind the system that is they hide and execute the activities where the normal user can non cognize what is go oning at the dorsum. What they do is they change their IP reference every clip and they perform their act. These fast ones are non large thing.

A A fast one to do an allowed user to make an action that disobeys system security or else that presents off information to an interloper. There are many ways to be secure on the Internet though. There are many ways to conceal your IP reference for any web site. If we know a few about the Internet we can utilize this truly website that “ Spoofs ” a different IP reference hence concealing your echt 1. Frequently a hacker changes their IP reference several times an hr merely to do certain any hint they might go forth buttocks is every bit difficult as possible to track.

4. Discuss in inside informations how would you manually force Windows XP clients to update their Dynamic DNS information? A

Answer: A DNS client computing machine running WindowsA XP uses the subsequent processs to execute a DNS dynamic update:

a ) .The client queries its configured DNS waiter to happen the Start of Authority ( SOA ) resource file for the DNS zone of the DNS name that is being updated.

B ) .The DNS client ‘s configured DNS waiter performs the criterion name declaration procedure and sends the SOA file, which have the IP reference of the primary name waiter for the queried DNS zone.

degree Celsius ) .The client sends a dynamic update petition to the primary name waiter for the zone of the DNS name that is being updated.

This petition includes a list of necessities that should be fulfilled before the update can be completed. Resource record set exists, name is non in usage, name is in usage and resort record set does non be are the types of necessities

The chief name server decides whether the necessities have been satisfied. If it is fulfilled the chief DNS waiter does the petition update or else it fails.

Or else, the chief DNS waiter responds to the client, bespeaking the update done. if the DNS dynamic update is non done, the DNS client saves the event in the system event log.

hypertext transfer protocol: //technet.microsoft.com/en-us/library/bb727009.aspx # EGAA

hypertext transfer protocol: //technet.microsoft.com/en-us/library/cc784052 ( WS.10 ) .aspx ( we )

5. If you were pull offing the web for a big administration, would the DNS information be in one physical location or many? Explain in inside informations your decision.A

Answer: if I am pull offing a web for the big administration, I will take to turn up in many physical locations because foremost it will useful for backup and easy to split the information into separate parts. So it will be utile when we search we can happen easy. The chief ground is in DNS record each file holds different information about the service, IP reference, sphere and host name.Different queries request information contained in specific DNS record types So it will be easy to to happen out when required for a peculiar service. It besides helpful for DNS records are created on a DNS waiter to decide quires if it is on different locations.

In recursive search a DNS question i.e. determined during other DNS waiter waiting requested information is located. Storing information in Active Directory presents the automatic backup of zone information ; enhance security and multi maestro reproduction.

6. You attempted to optimize security scenes for DNS and forgot to document the original scenes, thereby rendering your waiter inoperable. How would you repair this job? A

Locate the booklet in which you last saved the losing file.

Search for files with the.wbk file name extension.

If you locate any files that have the name “ Backup of ” followed by the name of the losing file, follow these stairss, the stairss are different for different MS word. The below one is for MS 2002 or 2003

Start Word.

On FileA bill of fare, clickA Open.

Point to the pointer in theA Files of typeA box, clickA All Files * . * , select the file, and so clickA Open.

If there is no.wbk file in the original booklet, search the computing machine for any.wbk files. To make this, follow these stairss, there are different stairss for different Windows

ClickA Start, point toA Search, and so clickA For Files or Folders.

In theA Search for files or booklets namedA box, typeA *.WBK.

In theA Look inA box, point to the pointer, so clickA My Computer.

ClickA Search.

Measure 1: usage undertaking director

a ) . Press alt command delete and choice undertaking director

B ) . On procedure check select the winword.exe so click terminal procedure. Repeat this and unclutter all winword.exe

degree Celsius ) . Now near undertaking director and start word.

Now if the papers finds Auto Recover file, on left side of proctor losing papers is listed. If this happen selects the papers and chink saves as on file bill of fare. Now save it as.doc

Measure 2: hunt manually, for this there is different stairss for different version of word.

For word 2010: chink on recent on file bill of fare now click Recover Unsaved Documents.

Measure 3: hunt for.asd files, hunt these files with the aid of hunt options on start memu. Once we find the.asd papers.

Open word 2010. Snap on file bill of fare, so open

In the type of files click All Files

Click on.asd file and so open.

After that save the papers.

7. Suppose you are the decision maker of a slow broad country web. As your web is really slow, it is perfectly indispensable that WAN traffic be reduced to the minimal sum necessary. Because of this, you have already decided non to hive away Active Directory-integrated zones and secondary zones. You need some sort of local DNS but you besides need reduced web traffic. What is likely your best staying option? Describe this option and how it is set up on the network.A

Since intranet browse can make most of web traffic, some step to optimise this traffic is good.

Use little web site pages: As a common ordinance, a HTML design limitations page scrolling.

Restrict the volume of artworks. Just use the general artworks during the intranet.

Degree of security required with our site. This security requires excess confirmation leting unknown links stops the hallmark traffic from go oning on web.

Educate clients to heighten the client ‘s local cache. in the yesteryear downloaded files do n’t hold to be downloaded yet once more.

Instruct traffic related with the confirmation of trusted relation by adding the suited users to a planetary group or to a local group or local resource.

And besides cut down DNS recursive traffic by

Not configuring recursion. It restricts the few sums of ask for names DNS can provide, but it need all host names be included to every DNS waiter, it is administrative burden.

Designating DNS waiter. Make certain that DNS server resolve the names for peculiar client is selected DNS waiter. It decreases recursive search and its related traffic.

Turning the TTL of cached entries via DNS Manager. It give inside informations how to set up for all records in a zone, for an entity file, or for WINS file.

8. A fellow web decision maker wants you to implement “ hapless adult male ‘s burden reconciliation ” for her web waiter. Briefly describe what is a “ hapless adult male ‘s burden reconciliation ” and how can this be done? A

Answer: It is all about the undertaking of having incoming petitions to be a load balance. It is really easy manner to do certain that incoming petitions are sent to the best host processing. Through it is non the well-designed attack, nevertheless its about surely the fewest lines of codification. That is the ground it is called as “ hapless adult male ‘s burden balancer ” . In other words, we run daemon that collects the burden criterions for the exchangeable machines in the bunchs. The devil writes down little list seeable to a CGI book to take an entrance URL besides forwards the invoker to same URL on the least-loaded machine, randomly airting the petition in proportion to the current burden norm. Therefore, from the welcome page of the application, all the go forthing links are sent throughout this redirect book and knock.

There are few topographic points where we need to equilibrating they are at:

IP degree: we can make BGP flim-flam which involve in stating the waiter IPs to many locations, utilizing burden equilibrating hardware. But this is non possible because it requires tonss of money and infra construction and ain IP allotments.

DNS waiters: Some DNS waiters are dependable for irc.blitzed.org answer petition from users when effort to bond our systems. These waiters have entree to call server IP that user is utilizing.

IRC server degree: These waiters see the existent IP of the user, so some manner they connect user to better waiters. Unfortunately here is no clasp up within the IRC client protocol for making this. The numeric is used to state to other waiter, nevertheless it involves in withdrawal from the IRC and reconnects to other waiter.

The DNS is the best for burden reconciliation.

9. What are the common errors that are made when decision makers set up DNS on web that contains a individual Windows Server 2003 sphere accountant? Please spread out on your

Answer: The general errors made when decision makers set up the DNS web that contains a individual Windows waiter 2003 sphere accountant are

“ . ” zone exists under forward search zones: This scene assigned Windows Server 2003 DNS waiter to be a root waiter which is normally deleted. If we do n’t cancel this scene, we ca n’t finish external name declaration to the root waiters on the Internet.

Further systems on the local country web do n’t indicate to Windows Server 2003 DNS waiter for DNS.

The sphere accountant is non point to itself for DNS declaration on all web interfaces.

10. Your administrative user history is a member of the Enterprise Admins and Schema Admins groups in your company ‘s Active Directory forest. The forest consists of a individual sphere named bcdtrain.com that is running in Windows 2000 native manner. Your company late acquired a new subordinate. To back up this subordinate, you plan to make a new sphere tree in the wood that will incorporate a tree root sphere named meddev.com and a kid sphere named research.meddev.com.A

The Domain Name System ( DNS ) waiter service is installed on two of the sphere accountants for bcdtrain.com. The DNS zone for bcdtrain.com is configured as an Active Directory-integrated zone. You create a new zone named meddev.com on one of these DNS waiters, and you accept the default scenes for the zone.A

The sphere accountants for the new spheres will be computing machines that are running Windows Server 2003. You run the Adprep public-service corporation with the forestprep option from the Windows Server 2003 installing CD-ROM to update the wood ‘s scheme to back up the new domains.A

What extra measure must you execute to guarantee that you can make the kid sphere in the new sphere tree?

Answer: To make kid sphere in the new sphere tree these are the undermentioned stairss:

Open the Active Directory Installation Wizard.

On Domain Controller Type, connectA Domain accountant for a new sphere, after that clickA Next.

On Create New DomainA web page, clickA Child sphere in an bing new sphere tree, so clickA Next.

On Network CredentialsA page, login user name, watchword, and user sphere of the client history for this operation, and so snap Next.A

On Child Domain InstallationA page, confirm the parent sphere and come in new kid sphere name, so clickA Next.

On NetBIOS Domain NameA page, confirm the NetBIOS name, so clickA Next.

On theA Database and Log filesA page, choice browse for the location where to put in the database and log files, so clickA Next.

On Shared System VolumeA page, choice browse for the location where to put in the Sysvol file, so click Next.

On DNS Registration DiagnosticsA page, confirm the DNS constellation scenes are right, so clickA Next.

On PermissionsA page, select anyone of them: A

Permissions compatible merely with Windows ServerA 2003 runing systems

OnA Directory Services Restore Mode Administrator PasswordA page, confirm the watchword which we want to give to this waiter ‘s Administrator history that is used when the computing machine is started in Directory Services Restore Mode, so clickA Next.

Evaluate SummaryA page, so clickA NextA to get down the installing.

Restart the computing machine.

 

Multicultural Britain

1) Source B is not a reliable source when investigating the extent of discrimination black immigrants faced in trying to find work in 1956. The aim of the interview was to expose the ‘colour bar’ at British Railways, the company would not be willing to let the public know of any discrimination as they had already made a policy on a ‘no colour bar’, it could also effect business. The interview was taken in 1956, after The British Nationality Act in 1948 confirmed the right of Commonwealth citizens to come and settle in Britain, therefore meaning they also had the right to jobs.

The interviewees are both significant workers for British Railways, so they should be clear on the matter of how the company should treat discrimination. However they both seem to have different reasons on why the men were turned away, they also seem unsure about what they are saying (‘Er, well, erm’) showing they are not confident in what they are saying. Which leads us to question if both men are telling the truth or not.

Mr Geary contradicts what he is saying; he goes from claiming there is no prejudice, to explaining why coloured men are not employed by the company. This shows how unreliable what he is saying is.

2) Source A may possibly be useful for a historian investigating the difficulties facing black immigrants looking for accommodation in the 1950’s. Miller explains the difficulty of finding somewhere to stay, however he only states how awkward it was to find accommodation when searching on ‘the board’, there is no evidence of how he was treated when he either visited a place or telephoned the landlord inquiring about a room.

The source was quoted by an immigrant in 1949, so it was first hand and had not been passed on by different people. Source C supports what Miller is claiming with examples of notices, which makes the source more reliable. Source A does not say why it was quoted apart from it was published in a book 49 years later. From the source we can see that the black immigrants were limited to where they could stay and there was a lot of racism throughout landlords.

Source C could be useful to a historian. The signs reading, ‘no coloureds etc’, support the idea of the ‘colour bar’. We can ensure it is reliable because it is a photograph and does not look in anyway set up. It does not reveal why it was taken. This source also supports the fact that only 15 out of 1000 white people would let a room to someone black. There was no law stating that landlords could not discriminate in this way. The immigrants in the photographs are looking at boards full of advertisements, nevertheless we are only given examples of two of them – we are unaware of any others, which could not be as discriminative as the two shown. There are only two immigrants in this photograph indicating there may not be a big problem to get housing, as was claimed at the time (because of the bombing during the war there was a housing shortage).

Source D would not be useful to a historian investigating the difficulties in getting accommodation in the 1950’s. It does not say anything about there being any sort of problem with the immigrants finding housing, only about the high rent being charged once they had found a place. The source was written by Robert Pearce in 1996, showing it may not be accurate seeing as it was published 50 years later.

3) I do not agree with the statement, ‘in the period 1949-1959 Black immigrants faced only discrimination and prejudice from whites.’ This is because there is evidence (including from sources) that show not all white people were racist at that time. Although source B is stating that black immigrants are not always welcome at certain work places because of their skin colour, this is the only source that agrees with the statement first made. When we look at source E, we can see that it is a white person that reassures the black immigrant, and that gave him, ‘comfort and hope’, also source D – although it is saying how landlords are able to discriminate freely, there are some that provided rooms to black immigrants.

Source F supports my idea; it is saying that ‘it was acts of kindness by individual white people that kept many black people from going when life in Britain seemed particularly bleak.’ This account reveals that there were white people that wanted to help black immigrants settle in Britain and not go out of their way to make them feel unwelcome in any way. It is said that racial discrimination affected all areas of their lives, including finding work and accommodation – this is true, however the black immigrants must have been able to find somewhere to live and work, or they could not have afforded to live in Britain, and we have no evidence of mass numbers of immigrants living on the streets. Although they often did end up with low-status jobs it shows some people were willing to employ and pay them. Self-help groups were also set up to offer advice on accommodation and employment rights – which show that there were white people willing to help, disagreeing with the statement first made.

So overall, when we have looked at all the sources provided and used other statements quoted we can see that, ‘In the period 1949-1959 Black immigrants faced only discrimination and prejudice form whites’, is not entirely true. I did not think sources A, C and G were useful towards the question first asked; they did not contain sufficient information.

 

Being a Champion For Jesus Christ

Prayer: Lord thank you for this moment to share your word. Let those present be receptive and responsive to what you have to say. Forgive us of our sins and our transgressions ..Do not count them against us use us in spite of us. Lord you receive all the glory..We honor you and magnify your name. In Jesus name we pray and ask it all Amen !!!

Hebrews 12: 1 Therefore we also, since we are surrounded by so great a cloud of witnesses, let us lay aside every weight, and the sin which so easily ensnares us, and let us run with endurance the race that is set before us, 2 looking unto Jesus, the author and finisher of our faith, who for the joy that was set before Him endured the cross, despising the shame, and has sat down at the right hand of the throne of God.

3 – For consider Him who endured such hostility from sinners against Himself, lest you become weary and discouraged in your souls.

Last week many of us witnessed Serena Williams compete in the finals at Wimbledon in the United Kingdom. Although she was not the winner she is still “a winner”….But how can that be she lost the match! Well ten months prior to Wimbledon she had a baby. The delivery lead to life threatening complications. She was diagnosed with a pulmonary embolism…where a blood clot could potentially get in here lungs and cause death. She was bed ridden for six weeks….

. What a wonderful God of grace and mercy we serve. A God who can take us from near death, bed ridden to center court in the championship match of the oldest and most prestigious tournament in the world. For all He has done, for all he is doing and all that he will do in your life…Why would you not want to be a “Champion For Christ”…..When He loves us and shows it by what he does in our lives!

You might say well the way things are going for me right now I sure do not feel the love….Things are pretty tough and nothing seems to be going right for me….In fact, everything seems to be going wrong! But, I have come to tell you today…..Just like Serena you are a “Champion”

TRANSITION Champions for Christ still deal with their past, face everyday problems, and work toward solutions, they stay the course. The difference is they do it through the power of Christ and not their own power. We may not always be the winner but we can always be a winner!

Don’t you ever give in, give out or give up on what God has given you…..No matter what the obstacle you must keep moving forward and press on for the prize!

In order to strengthen you today I would like to share four quick points to help you focus on being a Champion for Christ!

Committed means bound or obligated to a person or thing, through a pledge or assurance, devoted to the cause that has been under taken. There is a poster of an individual climbing a mountain trail. The individual has stopped and is looking back down the trail. The caption reads “When God calls don’t turn around to see who is following.” If you are going to be a champion in any situation in life you have got to be committed and not concerned with the past…where you have been and what mistakes may have been made!

When was the decision to follow Christ made in your life?

If it has, are you being tempted to look back to old ways?

There is no need to look back because if anyone is in Christ, they are a new creation; old things have passed away; behold, all things have become new…..We have been crucified with Christ; it is no longer about our lives but Christ who lives in us; and the life which we now live in the flesh..We live by faith in the Son of God, who loved us and gave Himself for us!

We see this in our text in verse 1 we are surrounded by so great a cloud of witnesses…(It is an illustration, not a revelation). The Heroes of Faith in Chapter 11 witness to us by their lives of Faith and endurance..The great cloud is not comprised of spectators but rather is made up of those heroes of the faith whose life encourages us to live the way they did.

(Abel- Offered a more acceptable sacrifice)

(Enoch – Close Fellowship with God)

(Noah, Abraham, Isaac, Jacob, Moses, Daniel and others)

Abraham is saying to you and me, “Move out by faith.”…Moses is saying to you and me, “Move out by faith” and Daniel is saying to you and me, “Move out by Faith”

The Christian life is a race – win or lose – and it is the only race where everybody can win. Paul wrote, Do you not know that those who run in a race all run, but one receives the prize? Run in such a way that you may obtain it. And everyone who competes for the prize is temperate in all things, Now they do it to obtain a perishable crown, but we for an imperishable crown. We are to run with certainty making every action count. There must not be no wasted time or energy…It is about our faith and love for Christ…In that faith works through love.

The Heroes of Faith witness to us by how they lived…..Those who achieved success lived by faith. And those who suffered what the world would call a miserable defeat, also ran by faith. So, today their lives witness to us, and encourage us to run by faith and to live by faith.

Once we decide to live for Christ there is no need to look back to old ways. We are to run with endurance the race that is set before us. A runner in the race does not look behind him to see what the other runners are doing. He sets his eyes on the finish line and runs toward the finish line.

You are creating confusion in your body. Your body is moving forward but your mind is moving backward.

This is why we must lay aside every weight, and sin which so easily ensnares us, and run setting our eyes on Jesus….We must be committed…When coming to Christ we cannot stay close to that which previously held us captive. Its like the little girl who fell out of bed one night. When she began to cry, her mother rushed in and said, “Honey, how come you fell out of bed? The girl replied, I think I stayed too close to the place where I got in”….This is the problem of the Christian today. We stumble and falter and fail because we are staying too close to the place where we got in..the old life, the old sins and the same old people. We need to go on and run our race….and stay committed….Keep our eyes on prize !!!

God has saved us from sin. He has brought us into the heavens, actually into the holy place, and He has made us to sit in heavenly places. To be a champion means you go beyond getting saved and giving your testimony…You maintain a serious relationship with God and you study His word, which is essential to grow in Christ…A true champion nails down their commitment to Christ and does not look back. *I am talking about being a champion for Christ. Secondly along with being committed!

“Looking unto Jesus” “author and finisher of our faith”

He is the author, or pioneer, of our faith in the sense that He has provided us with the only perfect example of what the life of faith is like. He is also the finisher of our faith. He not only began the race but finished it triumphantly. For Him the race course stretched from heaven to Bethlehem, then on to Gethsemane and Calvary, then out of the tomb and back to heaven. At no time did he falter or “turn back”…He kept His eyes fixed on the coming glory when all the redeemed would be gathered with Him eternally. This enabled Him to think nothing of the shame and to endure suffering and death. Today, he is seated at the right hand of the throne of God.

If we are going to do it under the power of Christ ….As with any power source we need to be connected to it! If we are to win the race, the most important thing is to keep our eyes on Christ as the goal…We must press toward the goal not counting that we have apprehended; but forgetting those things which are behind us and reaching forward to those things which are ahead!

We must press toward the goal for the prize of the upward call of God in Christ Jesus. He who has already run this race of faith and conquered for us! He is the author and finisher of our faith. He is the Alpha and Omega, the beginning and the end. What He starts, He finishes; He can see us through to victory.

A Champion for Christ should be ever looking and listening to Jesus to help us run to finish well. Why, because faith comes from hearing, and hearing through the word of God. His word helps us to connect with Him and see how much He loves us….He strengthens us with His might through His Spirit, that Christ may dwell in our hearts through faith; that we, being rooted and grounded in love.

Illustration: There was a woman whose boyfriend had given her a book. After he gave her the book, she had laid the book aside and had never bothered to read it. Sometime later a guest evangelist was staying in her home. He saw the book, and picked it up one night. As he read it, he noticed that certain phrases and lines in the book had been underlined. He inquired as to who had read the book and was told about it being the young man’s gift to the young lady. He then realized that the young man who had given it to the young lady had intentionally underlined those phrases and lines for her to read. They represented how he felt about her. When the Evangelist pointed out to her that certain phrases had been underlined: “I love you” “I will never leave nor forsake you.” He explained to her what had been done by the young man. When she understood that he intended to use the book to communicate to her how much he loved her she ran outside and eagerly began reading the book.

“The word of God is like a lion in a cage. Don’t spend your time defending it; just let the lion out of the cage.” David Robinson, NBA All Star, San Antonio Spurs

“For consider Him who endured such hostility from sinners against Himself”

Our Lord went through many trials while on earth. What was it that helped take Him through to victory? The answer is right here in our text…”It was the joy…The joy that was set before Him.” (v2). This was His goal – the joy of presenting His church before the Father in Heaven one day…He who is able to keep us from falling and to present us faultless before the presence of His glory with exceeding joy! His battle against sin took Him to the cross and cost Him His life….He gave His life a ransom for many! He is the supreme example of a willingness to suffer in obedience to God…Therefore we are to “Consider Him”…Look Unto Him and count on Him for encouragement and strength when the race gets difficult. We need to get our eyes off of ourselves, other people, and circumstances and get our eyes on Christ alone!

The word of God tells us that we may be made in large measure partakers of His joy!

Why would we not want to partake in the joy of Christ….How could we not count on one who took on our sin and then forgave us….He bore our sin and our shame.

Being unwilling to forgive someone is making an application for God’s job. He says “Vengenance is mine I will repay says the Lord.” Unforgiveness is like concrete. The longer it sets, the harder it gets. Don’t allow your heart to become hard and your soul to become bitter. Let it go! Let God take care of it. “But they don’t deserve it!” So then, did you deserve what God has done for you.

Illus–Can you imagine a running back going into a game dragging a concrete block behind him. That is exactly the way some people are choosing to live in the game of life. They will not allow the Lord to free them from the excess baggage.

“has sat down at the right hand of the throne of God.”

Jesus finished well. He is now seated at the Father’s right hand. He intercedes for us from where he is seated. We can count on Him to see us through.

Proverbs 24:16 For a righteous man may fall seven times

And rise again, But the wicked shall fall by calamity.

Remind yourself daily that God is in control. No matter how bad the situation is, it will end. No matter how good things may be going, it won’t last. Trust Him. You can count on Him! Do not become weary and discouraged….

Illus– There is a young man who went on a drunken rampage and vandalized a high school …when he was caught he was sentenced to five years in a youth center, a prison one step below the state penitentiary. He sat in a small cell with nothing more than a metal cot, sink and a toilet; he realized what a mistake he had made. He began to weep ..More important he began to pray to God…God I need help…I am defeated without you. That was the turning point for him. He joined a prison Bible study and began taking college courses. He was released after 14 months…After further study he finished his degree and became a science teacher….Years later he was selected Teacher of the Year and accepted his award from the President of the United States! With these words he summarizes the lesson he had learned…”I bowed my head and tasted victory”….

Listen Champions! You can count on Christ to see you to victory! So, prepare to or continue running your race…..

Today Commit, connect and count on…the one who picked up His cross·going to Calvary where he hung bled and died·..You do know that he died ·Yes he did . He died and was buried but early on Sunday Morning He got up with all power in his hands!

CONCLUSION Are you being a Champion For Jesus Christ…If not I invite you today…..I challenge you today to be a champion for Jesus Christ. Invite people to salvation. Invite people who have stumbled to get up again. Invite people who are tired to be renewed.

 

THE DEVELOPMENT OF BIOCONCRETE: A SELF HEALING CONCRETE

In partial fulfillment of the requirements for CHM031: Chemistry for Engineers

In the world we live in, buildings and infrastructures are common in our sight. These structures provide our basic needs like shelters, it also connects us to the place we wanted to go. So, these structures were made to be strong, durable and should last longer. Concrete is one of the materials that make our shelters safe for us. Through the years, started at around 7000 BC, concrete was already available and being used by early civilizations.

Concrete was used in making a famous structure from ancient times like the Pyramid of Giza, Eddystone lighthouse, The Parthenon, etc.

Concrete as defined by the Concrete technology, it is a mixed material used in construction which is made of cement, fine aggregates or sand, and coarse aggregates or the gravel which hardens in a period when mixed with water. The earliest discovery of concrete was dated about 7000 BC.

It was reported that the concrete was made from a lime concrete that was made from burnt limestone to produce quicklime. These materials harden when mixed with stone and water which acts as their concrete. Ancient Roman discovered stronger concrete than previously discovered. This was made out of volcanic ash containing silica and alumina which, when mixed with lime, creates a stronger form of cement which they named pozzolanic cement. Its name was derived from the place Pozzuoli where they discovered the said ashes. With the fall of the Roman empire, the Concrete lost in civilization.

The rebirth of concrete started when John Smeaton discovered soft limestones containing soft clay materials which result in hydraulic cement. This cement contains pozzolan which came from Italy. The hydraulic cement was used to construct John Smeaton’s famous Eddystone Lighthouse. In the early 1800s, natural cement was manufactured in Rosendale, New York. This result to a cement called Hydraulic cement which was patented by Joseph Aspdin which named because it was believed that it resembles Portland stone – high-quality limestone that can be found an isle in Portland.

At the year 1845, Portland cement was manufactured by I.C Johnsons of White and sons, Swanscombe, England. Generally, Portland cement was based on the Hydraulic cement that was patented by Aspdin. But this cement improved the properties made in the previous hydraulic cement. By the year 1860s, Portland Cement was imported to the United States and by the 1870’s it was properly produced in the United States. Portland cement became known for durability and it only hardens for several hours. But this Portland cement is weak in tension, and it is very susceptible to damage because of its porosity which is caused by frost and salts. These disadvantages were developed and made up new types of cement until it reaches the cement we know today.

Concrete is widely used in the world, every building, roads, canals, ports, and bridges were mainly made of concrete. According to an article by the World Business Council for Sustainable Development, concrete is used twice more than the number of all other building materials used in the construction like woods, steels, plastics, and aluminum. Thus, it makes it the second most consumed substance in the world which is next to water (Concrete Helper,2012). Concrete is being manufactured at around 25 billion tons each year throughout the world or it is equivalent to over 3.8 tons each person a year (World Business Council for Sustainable Development,2009).

As defined previously, concrete is a mixture of cement, aggregates, and water. So, in producing concrete, we use Portland cement to act as a paste to our mixture so that the aggregates named as sand and rocks harden. Cement is not naturally available like other resources like water. To produce cement, we need limestones, shells, chalk, clay, slate, blast furnace slag, silica sand, and iron ore. There 2 ways to manufacture cement, the most common Dry method, and the wet method. Raw materials like limestones, clay, and other materials were being quarried down. After it was obtained, the rocks are crushed into a different stage. The first stage crushes the rocks, not over 6 inches big, then the second one crushes the rocks into 3 inches or smaller sizes. The rocks that were crushed is mixed with other ingredients like iron ore, or fly ash and ground, and put inside a cement kiln which will be heated up at the temperature of 2,700 degrees Fahrenheit. This method uses Dry method if Wet method was used the rocks were being crushed with water before being put inside the kiln. As it travels around the kiln, some elements get rid of in the form of gases. After the process inside the kiln, a Clinker will be produced. Clinker, a grey ball which is about the size of a marble, is the result of the materials mixed inside the kiln. This clinker will be cooled and will be ground after to become powder. Then it is ready to be distributed to construction as we named it cement. (Portland Cement Association,2018)

Traditionally, Portland cement was used in making concrete. In making Portland cement, chemical reactions are present. As we are all knowledgeable Portland cement mainly came from limestones which are mostly composed of calcium carbonate ( CaCO3 ) which starts by producing Calcium Oxide (CaO) or the quick lime. In the process of making cement, there is about 5% of carbon dioxide (CO2)) released in the atmosphere every year. Thus it will be led to the Chemical equation. CaCO3?CaO+CO2.

Since Silicon oxides and Aluminum will be mixed with quick lime (CaO), in the mixing of cement to make the concrete these materials will be hydrated or mixed with water in order to make concrete harden.

In determining the chemical reaction occurred in producing concrete, we add variable x to the chemical equation which represents different values or materials added to the mixed concrete which doesn’t affect its basic chemical reaction. So we will have three representation of chemical reactions when hydration occurs to the production of concrete. And these are:

3 CaO? Al2O3+6H2O?Ca3Al2(OH)122CaO?SiO2+xH2O ? Ca2SiO4?xH2O3CaO+SiO2+x+1H2O?Ca2SiO4?xH2O+Ca(OH)2The reaction involved in producing cement is at a very slow rate. That’s why engineers included curing time of the concrete in their time schedule of the project they are into because these concretes do not fully harden at short span of time. It needs some time for it to be fully cured and gets hard as we wanted.

One of the most common and problem regarding concrete is having cracks (Ozinga,2016). When concrete starts to crack, its structure begins to degrade. By this problem, The microbiologist Hendrik Jonkers developed a self-healing concrete or the Bioconcrete. Bio concrete and the traditional concrete has the same method of manufacturing, the only difference is the healing agent that is added to the mixture of Bioconcrete. This Healing agent is a harmless bacterium which became active when water will react on it. One of the challenges in the study was finding the exact bacteria that could live in places like concrete and can live in a very long time. Concrete is a rock-like material which is very dry which some bacteria cannot live with that environment. Jonkers used the bacteria known as Bacillus Genus which can grow in alkaline conditions like the concrete, it also produces pores that allows them to live for years with the absence of food and oxygen. The bacteria remain dormant for years in the concrete without food or oxygen until water will enter a crack and activate them. Jonkers and his team added the nutrient Calcium lactate in the mixture that could act like a food to the bacteria for it to produce limestones that could heal the cracks in the concrete.

During the mixing, for the bacteria to survive, Jonker and his team set the bacteria and calcium lactate in a biodegradable capsule which will be added to the wet mixture of concrete. When cracks will appear on the concrete and the water will enter those cracks, it can activate the bacteria. The bacteria will begin to grow, multiply and consume the lactates provided for them. With this, they produce limestones or calcite to seal up the cracks.

The basic concept of the Bioconcrete is the concrete that can self-heal. This alone has the major advancement to the traditional concrete because it doesn’t require a human to repair it which lessens the effort needed for repairs. Aside from that, with its ability to self-heal, it reduces the amount spent on repairing the structure. According to a research conducted by (Jones, Kisslinger & Yatsenko,2019), only 1% of the total cost of concrete is spent in the actual concreting process and the 99% is spent in repairs and maintenance of it. In addition, it also increases the durability of the concrete because according to (Winktor and Jonkers,2011) as cited in the study of (Ponraj et al.,2015), when a crack appears on the surface of the structure, the bacteria repairs it directly thus it prevents the steel reinforcement and the concrete itself to corrode and making the structure collapse.

Furthermore, according to (Ponraj et al.,2015) Bio concrete has an 18% improvement in compressive strength. Which shows that the Bioconcrete increases the strength of the concrete. It was shown in the study of (Ponraj et al., 2015) that at 28 days of observance, a 25% increase was evident in the compressive strength of the concrete when bacteria were added. Chemical reaction

The current and future uses of bio-concrete

As a part of the testing and studying of bio-concrete, it was tested and used in different environments with different temperatures. One of the current use of bio-concrete is being as the protective layer of a parking garage in Apeldoorn, Netherlands. The bio concrete was used there as a top layer of the garage floors with a dimension of 12,000 square meters to prevent water from leaking through the garage floors and destroying its structural aspects.

Furthermore, another use of Bioconcrete was making the irrigation canals in Ecuador. One of the problems they face is that the concrete in their irrigation was not reinforced with steels so the concrete began to crack in only a short period and allowing the water to escape onto the walls. As their, solution, they used Bioconcrete that was reinforced with abaca fibers to increase its tensile strength.

Lastly, For the future of Bioconcrete, it can replace the traditional concrete we use today. This means that it will be used in buildings, bridges, roads, tunnels, ports, etc. because all of the structures are very hard to maintain and it is very costly to repair.

Concrete Helper. (2011, October 28). Concrete facts. Retrieved from

The Future of Things. (2012, November 2). BioConcrete – Self Healing Concrete. Retrieved from

Ponraj, M., Talaiekhozani, A., Zin, R., Ismail, M., Abd Majid, M., Keyvanfar, A., & Kamyab, H. (2015, May 27). Bioconcrete strength, durability, permeability, recycling, and effects on human health: A review. Retrieved from

Portland cement organization. (2018). How Cement Is Made. Retrieved from

Stewart, A. (2016, March 7). The ‘living concrete’ that can heal itself. Retrieved from BIBLIOGRAPHY Brown, L. S., & Holme, T. A. (2011). Chemistry for Engineering students (2nd ed.). United States of America: Mary Finch.

Development, W. B. (2009, July). World Business Council for Sustainable Development. Retrieved September 06, 2019, from

Jones, E., Kisslinger, J., & Yatsenko, Y. (2019, March 08). University of Pittsburgh, Swanson School of Engineering. Retrieved September 6, 2019, from

Princeton. (n.d.). Princeton.edu. Retrieved september 07, 2019, from

 

Why Are Dogs Called ‘Man’s Best Friend’?

The common phrase “A dog is man’s best friend.” might be true, but dogs are not the only animal friend whose companionship people enjoy. Cats also share a great connection with people as well. Cats are better than dogs better they are cleaner, they are quiet, and also they cost less for vet bills and necessities. The first reason why cats are the superior pet over dogs is that cats cost less to take care of for annual and medical costs.

The annual cost for felines is around $450 which is largely different from the $660 annual cost for canines. Cats aren’t better simply because they need lower annual and medical fees, but also because cats don’t require the maximum amount of upkeep as dogs do. Part of the maintenance of a cat is to refill his or her food and water dishes once every 24 hours. Owners that have indoor cats have an easier time cleaning out the pet’s litter box and are only required to clean for just one or two days also.

Cats also love to sleep and what’s better than a cat sleeping? No mess! Unlike cats, dogs love to bark and run around which can be a hassle to handle. Cats are often a touch easier to potty train making them encounter as being cleaner than dogs. Cats more often than a dog, as cats will sit and groom themselves for hours at a time.

Also, people might say cats are cleaner because I have always found cats or kittens a lot easier to potty train.

Show them a box of litter and they will use it. Dogs can take a way longer time to train and it is often tons messier if they’re not learning properly and are messing up the house and you are constantly cleaning it up all the time. Dogs like to get messy and play, which causes an enormous mess once they enter the house. Cats are all about personal hygiene! They groom themselves plenty and daily. You don’t have to bathe a cat unless something unexpected happens and your cat needs help in washing themself. In contrast, take a dog for a get into winter and you’re likely to possess a serious bathing session on your hands immediately on return to home. I’ve seen dogs covered in mud and it’s not a great feeling when you’re washing them. Most dogs love stuff that smells bad. From trash to mud, to poop and they really like to play in it.

As a result, dogs need a proper routine for bathing and grooming, which may get very expensive if you’re taking your dog to the groomer. Cats are basically self-cleaning machines. They use their tongue to lick and comb through their fur and dig out dirt with their teeth. They clean themselves with their paws with saliva and use them to clean out their faces and unreachable places. When people come home from a long day of work all they want to do is relax, take a nap, and watch TV. For example, let’s say a person comes home from a tiring day of work and needs to relax. They finally get comfortable when their dog hears a sound outside or sees another dog and starts barking uncontrollably but cats keep any feelings and urge to themselves.

Cats are much quieter pets than dogs especially during times after you want to sleep or relax. They don’t disturb you when you’re trying to concentrate. When cats see something dangerous or odd, they run away. Unlike dogs, they bark at things that are new. Cats only take action when it’s necessary to and that they don’t charge at people as much as dogs do whenever they are approaching something new and strange. Cats are very good at meeting new people and making friends. Cats aren’t afraid of people, but dogs bark loudly and try to battle new people they encounter.

 

Apple has created a new feature where you can utilize your face

Apple has created a new feature where you can utilize your face to open your phone. Might sound insane, however, companies like Apple and Samsung have designed some extremely extraordinary highlights for smart phones. To start with, gadgets began off with pass lock. From that point forward, they began utilizing unique fingerprint scanners. Also, presently at last, they’ve begun to utilize facial acknowledgment.

Apple has come out with something amazing in the market and individuals have been going insane over it.

The iPhone X, Apple’s 10-year commemoration blessing to every one of us. The iPhone X begins off at $999.00 without tax and that makes it the costliest phone in the market. With the all-new 5.8 Super Retina display which blasts out lively hues. It is said that it is full screen with no home button either. The iPhone X was the first ever smart phone to ever have an OLED screen with a differentiation proportion of 1,000,000 to 1. The phone is additionally water and residue safe and the front and back is all glass.

That as well as remotely chargeable. Another incredible element is the Animoji, where the emoticon imitates your facial development because of the True Depth camera that breaks down 50 diverse muscle developments in your face. The majority of that sounds extraordinary and everything except the best part about the phone is the new A11 Bionic chip. With a neural motor accomplishing up to 600 billion tasks for every second. That is the sharpest and the most dominant chip at any point, worked inside a phone.

Augmented reality is an improved vision of reality where PC creates pictures over a client’s view. What’s more, truly, the iPhone X has that highlight. With the stature of 5.65 inches, the width of 2.79 inches, profundity of 0.30 inch, and weight of 6.14 ounces. The screen is 5.8 inch (diagonal) and the 2346-by-1125-pixel resolution at 458 ppi. It can likewise record a video at 4k goals. The telephone also has no earphone jack, which many individuals were frustrated at.

The iPhone X comes in two different colors. It comes in space grey and silver. There are two storage choices which comprise of 64 GB and 128 GB. The 128 GB cost is $1149.00. With a buy of an iPhone X, it will accompany Ear Pods with a lightning connector, lightning USB cable, 5W USB power adapter, and lightning to 3.5 mm earphone jack connector.

Apple has been making extraordinary smart phones for such a long time and they keep concocting incredible thoughts. Nobody would have felt that this was conceivable on a basic cell phone. You can call, text, surf the web, and so on across the board convenient gadget. Advanced mobile phones have made our lives simple and straightforward. Innovation is truly having a major effect in individuals’ lives. I’m a major fanatic of Apple and their devices. Like the MacBook Air, the iPad Pro, and particularly iPhones. I cherish iPhones a ton and I am dependably in the know regarding their devices. Yet, the iPhone X is costly. I generally hold up until the point when the value drops.

The resales of iPhones are likewise incredible. Contrasted with Androids, iPhones value it in every case high and the demands for them are high as well. Let us say you purchase an iPhone and need to sell it, you can in any case make nearly the value you paid for it. The motivation behind why the value drops is on the grounds that new highlights come out which make individuals need to dependably get the new things out. So, the interest for the old iPhones will go down. For instance, when the iPhone 6s previously came out, it was $649.00. Presently it dropped right down to $299.99.

The thing about me is that I typically get the new phone out. When the iPhone 6 came out, I got it the following day. I didn’t get the 6s on the grounds that there was no distinction other than the 3D Touch. At that point came the iPhone 7 which I got the day after it came out. Despite the fact that the iPhone 8 and iPhone X turned out that year, the sales for iPhone 8 were moderate. The motivation behind why is on the grounds that everybody was truly energized for the iPhone X. If you somehow happened to contrast the iPhone X with the iPhone 8 or the iPhone 8 plus, it’s night and day distinction. The iPhone X has way better highlights. With all these extraordinary highlights in iPhones and cool thoughts, what can be superior to the iPhone X?

Apple has made considerable progress with respect to their iPhones. They have dependably been redesigning. I remember the first ever iPhone. Everybody said it was the first ever advanced mobile phone. From then on, different companies have likewise begun to make advanced mobile phones. Like Samsung, LG, HTC, Windows, and so on. In any case, each one of those have the android programming. Apple is unique to the point that no other organization has their software. They have their own. It is known as the iOS. It represents iPhone Operating System. Alongside that, Apple has their very own music application called iTunes. It enables you to spare your music and you can likewise purchase music from the iTunes store. Each smart phone has an application store though. Apple’s application store is known as the App store. You can download such huge numbers of sorts of uses. You can play diversions to composing articles on your phone.

Taking everything into account, iPhones are extraordinary, and they are over each cell phone. They have been doing really well in the course of recent years. I would take an iPhone over some other phone quickly. I began off with an iPod Touch 4. From that point I went on to an iPhone 5. What’s more, from that point I went on to an iPhone 6. After that I went to an iPhone 7. I got the iPhone 8 plus first. It’s practically like the X, but with better specifications.