Monday, December 30, 2019

Black Cherry, An Important North American Tree

The black  cherry or Prunus serotina is a species in the subgenus Padus with beautiful flower  clusters, each separate flower attached by short equal stalks and called  racemes. All cherries in the landscape or forest share this floral design and often used as  specimens in yards and parks. All true cherries are deciduous trees and shed their leaves before winter dormancy. Prunus serotina,  also commonly called wild black cherry, rum cherry, or mountain black cherry, is a woody plant species belonging to the genus Prunus. This cherry is native to eastern North America from southern Quebec and Ontario south to Texas and central Florida, with disjunct populations in Arizona and New Mexico, and in the mountains of Mexico and Guatemala. This North American native tree usually grows to  60 but can grow as tall as 145 feet on exceptional sites. The bark of young trees are smooth but become fissured and scaly as the trees trunk enlarges with age. The leaves are alternate in rank, simple in shape, and narrowly oval, 4 inches long with finely toothed margins. Leaf texture is glabrous (smooth) and commonly with reddish hairs along the midrib beneath and near the base (see leaf anatomy). The Cherrys Beautiful Flowers and Fruit The flowers inflorescence (meaning  the complete flower head of a plant including stems, stalks, bracts, and flowers)  is very attractive. This  flower head is five inches long at the end of leafy twigs of the Spring season, with numerous 1/3 white flowers with five petals. The fruits are berry-like, about 3/4 in diameter, and turn black purple when ripe. The actual seed in the berry is a single, black, ovoid stone. The common name black cherry is derived  from the black color of the ripe fruits.   Dark Side of a Black Cherry The leaves, twigs, bark  and seeds of black cherry produce  a chemical called cyanogenic glycoside.  Hydrogen cyanide is released when the living parts of plant material are chewed and eaten and are toxic to both human and animal. It has a very repulsive taste and that taste is one of the identifying factors of the tree. Most poisoning comes from livestock eating wilted leaves, which contain more of the toxin than fresh leaves but with a diminishing of the bad taste. Interestingly enough, white-tailed deer browse seedlings and saplings without harm. The inner bark has highly concentrated forms of the chemical but was actually used ethnobotanically in much of the Appalachian states as a cough remedy, tonic, and sedative. The glycoside seems to reduce spasms in the smooth muscles lining bronchioles. Still, very large amounts of black cherry pose the theoretical risk of causing cyanide poisoning.   Ã‚   Dormant Identification of Black Cherry The tree has narrow corky and light, horizontal lenticels. Lenticels in black cherry are one of many vertically raised pores in the stem of a woody plant that allows gas exchange between the atmosphere and the internal tissues  on the bark of a young tree. The cherry bark breaks into thin dark plates and raised edges on older wood are described as burnt cornflakes. You can safely taste the twig that has what has been described as a bitter almond taste. The cherry bark is dark grey but can be both smooth and scaly with reddish-brown inner bark. The Most Common North American Hardwood List ash:  Genus  Fraxinus  basswood:  Genus  Tilia  birch:  Genus  Betula  black cherry:  Genus  Prunus  black walnut/butternut:  Genus  Juglans  cottonwood:  Genus  Populus  elm: Genus  Ulmus  hackberry:  Genus  Celtis  hickory:  Genus  Carya  holly:  Genus  IIex  locust: Genus  Robinia  and  Gleditsia  magnolia:  Genus  Magnolia  maple:  Genus  Acer  oak:  Genus  Quercus  poplar:  Genus  Populus  red alder:  Genus  Alnus  royal paulownia:  Genus  Paulownia  sassafras:  Genus  Sassafras  sweetgum:  Genus  Liquidambar  sycamore:  Genus  Platanus  tupelo: Genus  Nyssa  willow:Genus  Salix  yellow-poplar:  Genus  Liriodendron

Sunday, December 22, 2019

Critique And New Directions For Theory - 1317 Words

Critique and new directions for theory Raewyn Connell’s concepts and theory have found wide use in areas such as education studies, criminology, the study of media representations of men and in organization studies (Connell and Messerschmidt 2005). With such a broad applicability, it also attracted a great deal of criticism. In their review of the concepts and of the critique, Connell and Messerschmidt sort the existing objections in five categories of critique, which I will present in the following section (ibid., 836-845). The first main argument is that the underlying concept of masculinity is flawed, that it creates a static typology and essentializes the character of men. The authors reject this critique and assert that ‘masculinity is not a fixed entity embedded in the body or personality traits of individuals’ (Connell and Messerschmidt 2005, 836). Moreover, they deem the conflating of ‘hegemonic masculinity’ with a certain type of men or confining it to certain â€Å"manly† characteristics as an inadequate use of the concept. As Levy argues, ‘hegemonic masculinity’ is an ideal-type, ‘the currently accepted male ideal within a particular culture at a particular time’ (2007, 254). In his research of the recent academic appropriation of ‘hegemonic masculinity’, Messerschmidt found out that 18% of the 128 articles using it as a core concept ‘equated hegemonic masculinity with certain â€Å"masculine† character traits (2012, 61). He exemplified with a study that tried to showShow MoreRelatedForeign Policy And The Current Syrian Conflict993 Words   |  4 PagesIn the study of International Relations there exists a number of different theories, each in which try to explain the role of America in foreign policy and world politics. This essay will work to explain the purpose of theories in foreign policy and the limits they have when they are applied to particular policies. President Barack Obama, for example, has come under sustained criticism regarding his foreign policy. Many have wondered whether Obama is a â€Å"realist† or â€Å"idealist† with his policy decisionsRead MoreAndragogy: The Cornerstone of Adult Education Essay743 Words   |  3 Pagesquestion was proposed and the research into the subject began so forth theories and findings began to come as well. Tests were ran much like testing older adults vs. younger adults and the result of this particular test was that in fact younger adults did learn better than the elder. This test came to be insufficient due to the older adults not attaining the same type of education as the younger adults. The gap in age difference and new material learned deemed the test irrelevant. The intelligence testsRead MoreIntermediate Macroeconomic Theory : Robert E. Lucas Essay1207 Words   |  5 PagesLatiefah Stewart Professor Kahhat Intermediate Macroeconomic Theory 10/19/2016 Robert E. Lucas Robert E. Lucas was in Yakima, Washington, in 1937. He attended Seattle Public Schools, and graduated from Roosevelt High School in 1955. He was great at math and science. Growing up it was almost expected of Lucas to attend the University of Washington in Seattle, and become an engineer. This however wasn’t what happened. MIT didn’t grant him the scholarship he needed in order toRead MoreAnalysis of International Communication and Globalization by Ali Mohammadi1028 Words   |  5 Pages We all seem to partake –somehow- in a new streak of research where the concept of globalisation takes form of some sort of mantra, rendering previously valid questions irrelevant and imposing new paradigm shifts in a variety of disciplines. In the field of International communication, the process of globalisation is not only about the emergence of huge transnational corporations. It also implies changes in communication policies and their impact on cultural autonomy and identity not only in weakerRead MoreEssay about RoyCritique1322 Words   |  6 Pagesï » ¿ A Critique of Sister Callista Roy’s Adaptation Model Ashley Taylor Maryville University Roy’s Adaptation Model (RAM) is one of the most commonly used theories in nursing research and education for today’s modern nursing. It focuses on a person’s adaptation to his/her environment and guides nursing interventions in order to promote healthy adaptation. I chose the adaptation model because her model closely resembles my thoughts on nursing. The holistic approach and value on adaptation thatRead MoreDisruptive Technology: Positive or Negative790 Words   |  3 PagesCatching the wave†. New technologies will replace aging and obsolete technologies. The intersection of product life cycles for products at varying stages of their development is not a disruption. The development of new products and new markets cannot be disruptive; it is the unfolding of normal business and economic cycles. The staged release of new products in the IT industry is a carefully crafted strategy by industry players to maintain revenue streams. The acceptance of new technologies carriesRead MoreCritique Of - Applying Ethical Theories: Interpreting and Responding to Student Plagiarism, Journal of Business Ethics1310 Words   |  6 Pages Manchester Metropolitan University Business School Research Methods Assessment 1: Critical Writing (15%) Granitz, N. and D. Loewy (2007), Applying Ethical Theories: Interpreting and Responding to Student Plagiarism, Journal of Business Ethics, vol. 72, pp 293-306. Summary Plagiarism in todays â€Å"copy and paste generation† is an unremitting, complex issue that is not yet fully understood. The paper responds to this proposition with a thesis that understanding the ethical reasoning providedRead MoreCritique of Jean Watsons Theory1312 Words   |  6 PagesTheory Critique of the Human Caring Theory Adele Wolf Maryville University NUR 600 October 03, 2012 Theory Critique of the Human Caring Theory The Theory of Human Caring was written by Jean Watson. This model consists of ten carative factors to assist nurses with caring for their patients. Dr. Watson calls this a transpersonal relationship. Watson defines transpersonal care ‘as the capacity of one human being to receive another human being’s expression of feelings and to experience thoseRead MoreThe Discipline Of American Studies Essay1676 Words   |  7 PagesAmerican society, culture, and related attitudes and behavior. An interdisciplinary approach focusing both on the retelling of queer narratives in Latinx literature and heteronormative ideology directly links to disciplinary foundations of literary theory, social identity, and cultural conditions demonstrated both in the fields English and American Studies. One specific area of disciplinary focus has been identity emergence and its connection to dominant ideology. Attention to identity emergence inRead MoreThe Theory Of Knowledge And Power1131 Words à ‚  |  5 PagesINTRODUCTION Post-Foucauldian theory of knowledge and power, knowledge has been used as a synonym for power. In 21st century they are considered as two sides of the same coin. Power gives an individual the ability to make others obey in a social relationship irrespective of the basis. As per Foucault power is not only brutal physical force rather an invisible form of network that operates. At times, the operator has no knowledge of this invisible power which controls others. Similarly, knowledge

Saturday, December 14, 2019

I Don; T Know Free Essays

Unit Eight Project Danielle Cripe Kaplan University Unit 8 Project Questions: Part I 1. Under HIPAA, are you legally allowed to view this patient’s medical information? Why or why not? All personal and confidential information should be limited to the bare amount of health care professionals. Only to carry out medical treatment (MLAE). We will write a custom essay sample on I Don; T Know or any similar topic only for you Order Now 2. In this case, how would you be able to correct your error and provide the missing documents to the patient while still protecting patient confidentiality under HIPAA? You should contact the patient inform them you still have the documents, and ask if they ould like to come to get them (MLAE). 3. Besides a HIPAA Patient Release of Information form, list 4 other items that are found in the medical record. A privacy notice, acknowledgment that the privacy notice was received, a trading partner agreement, and an agreement reached with a healthcare professional business associates (MLAE). 4. Legally, does the patient or the physician/healthcare facility own the medical record? Why? The healthcare facility, but the patient can access them any time as long as the physician feels it will cause no harm to the patient (MLAE). 5. List 3 ways patient confidentiality is maintained in the reception/waiting area of a medical office. Not discussing patient information in the lobby. Making sure computer screens are out of patients sight. Also making sure patients files are not left open (MLAE). 6. A breach of confidentiality can result in what consequences for a health care professional? This could result in possible termination, or possible civil action being taken (MLAE). 7. From the list of Interpersonal Ethics (found in Chapter 1 of the Fremgen text), please describe how any of those traits were demonstrated in your actions in this case scenario? Respect by looking to make sure you could access his information (MLAE). Unit 8 Project Questions: Part II 1. Would the action taken in this second scenario be within your scope of practice for your chosen field? Why or why not? No only physicians should be giving out prescriptions, and they should have never even looked in the file. They should have just taken a message for the doctor (MLAE). 2. What determines your scope of practice for your chosen career? What you study, and what the office you are working in tells you to do (MLAE). 3. Would Respondeat Superior apply in this case scenario? Why or why not? I would not think so, because this person was not acting within their scope of Employment (MLAE). 4. Would the Good Samaritan Law apply in this case scenario? Why or why not? No because this was not any emergency situation (MLAE). 5. What role does the Food and Drug Administration (FDA) play in regards to prescription medication? The FDA is responsible for protecting and promoting public health through the regulation and supervision of food safety, tobacco products, dietary supplements, prescription and ver-the-counter pharmaceutical drugs (medications), vaccines, biopharmaceuticals, blood transfusions, medical devices, electromagnetic radiation emitting devices (ERED), and veterinary products (MLAE). 6. What role does the Drug Enforcement Agency (DEA) play in regards to prescription medication and a physician’s ability to prescribe narcotics? Physicians must have a DEA license to write prescriptions, and i t must be for the state they are practicing in (MLAE). References Bonnie F Fremgen, Ph. D. (2009). MEDICAL LAW AND ETHICS. New Jersey : Pearson Education Inc. How to cite I Don; T Know, Essay examples

Thursday, December 5, 2019

The Impact of It in the PAS Company-Free-Samples for Students

Questions: 1.Discuss how each department uses Information technology, what hardware equipment are required including the network devices. Explain the function of each device 2.Specify the Operating Systems and application software required for data Communication between the clients and servers for each department. Justify your answer. 3.Explain the function of each layer of the Internet Model. 4.Use the Internet model with the support of diagrams to explain how the messages are moved between the layers when an Employee sent an email form a PC at the Market department to the Manager at the Sale Department. 5.Discuss the kind of Networks used for PAS. Justify your answer. 6.Propose with justification the type of application architectures that would appear to be the most beneficial to the Human Resources Department. Answers: 1.Introduction The aim of this project is to discuss the impact and the structure of the information technology system at the PAS Company. PAS is an Australian company which was established in 1990 in the service of delivering packages overnight. With the increment in the business volume and growth PAS developed different branches in Canberra, Melbourne, Brisbane and Perth. The Sydney office is mainly responsible for the data processing. For communication among different offices and for data analysis Information technology is required and should be designed in an advanced way. This report explains about the impact of the IT system, hardware and software specifications, and network details used at PAS. Several types of PAS networks are given with details in this report. Internet layers are also discussed with the idea behind sending emails among different internet layers. This report also proposes an architecture model about the human resource department of PAS. 2.Impact of Information Technology at PAS Information technology is an important tool to analyze data and maintaining records of an organization. As PAS has a service of delivering to people, PAS needs a responsive website that can connect with people faster and in a better way (Baihaqi Sohal, 2013). IT can help to make a well structured network system that can help the company to connect with people as well as to communicate among the employees of the organization. The organization has many departments and to make a good communication among them proper networking is required. Information technology also helps the organization by utilizing cloud computing, big data analysis methods to analyze data and completing tasks in more efficient way. More advanced architecture helps to make the working environment more fluent and advanced (Chudk et al., 2013). Therefore Information technology has a huge impact on the PAS Company for bringing automation, protection to information in the organization and to provide more customer satisf action. 3.Hardware specifications and functions For making the information technology system more efficient in the organization need of advance computer system is required. The company wants to implement a centralized database for billing and it consists of an Apple computer of model no. I Mac MK442HN/A. It has a LED screen of 21.5 inches for better display (Jahns Lee, 2014). It consists of 8GB RAM, Intel Core i5 processor with 2.8GHz processing speed. It has a 1TB Hard disk memory and the hardware is of Mac platform. The processor functions for analyzing the data in a better speed and with accuracy. The memory is enough to make the database of the billing section of the company and also to store several files (Jia et al., 2014). The other computers used in the company also use Intel based processor with more or less same features as mentioned. Networking is an important part of the computing system to make the connections among the computers. Main networking device switch are used in the computing system are Network hub, Network switch, Modem, Network router, Bridge, Repeater. Network hub is used to connect different network hosts and to transfer data (Kasemsap, 2015). Network switch is also used as the layer of a LAN and it is more specific in case of transferring the data to a particular port. A modem is used to modulate and demodulate the data to convert from digital to analog form for transmitting through the wires. In this organization D-Link Modems, hubs and switches are used. 4.Software specifications for the clients and servers The apple computer consists of the IOS operating system and the other Intel based computers have windows 10 as the operating system. The main centralized billing system requires different application software like Microsoft Excel, PowerPoint, word, and outlook. Other applications like Calculators, Paint, Adobe reader, Calendars are used also. Google chrome, Firefox and Microsoft edge are used as the browsing software. Microsoft email and Gmail are used as the application to handle the mails (Min et al., 2014). Cortana is special application software that is only available in case of windows 10. In case of IOS platform Siri is used as special application for voice communication. In case of IOS platform Safari is used as the internet browser and there are G-maps, spotlight, i-Tunes, i-Books for using media files and transfer them through internet. 5.Internet model layer Internet layer is a collection of several protocols, methods and specifications for working in the Internet protocol suite that is used to transfer data from the host to destination host through different boundaries. Internet layers are mainly used to select the gateway for transmitting the outgoing data packets. It also captures the data packet using appropriate transport protocol and links. Internet model layers also detect the errors and diagnose it (Nakayama, 2014). In PAS Internet layers like IPV4, ICMP are used mainly. IP refers to the internet protocol and ICMP refers to the Internet Control Message Protocol. The Internet Protocol Security or IPSec is also used to provide the security through IP communications by authenticating and encrypting the data packets which are transported through the internet layers. Internet layers are the fundamental elements of the communication among different departments in this organization Figure 1: Different layers of Internet model (Source: Zhou, Zheng Wu, 2015). 6.Movement process of email between different layers of the Internet model All the departments and specially the Human resource department of the PAS need a very reliable communication system to transfer the e-mails. In case of sending the emails, it can be considered as data packet that is to be transmitted from the host computer to the receiver or target computer. Now there are different Internet layers used to transfer the information. First the email is sent to the Application layer or HTTP (Patterson Hennessy, 2017). Then it is sent to the Transport later (TCP). Then the Network layer or Internet Protocol layer transfer the data packet from the Transfer layer to the Data Link layer. Ethernet is used as the data transfer channel between the Data link layers of the host system and the receiver system. Again the previous process is done in the reversed order. Thus the data packet is transferred to the target computer through Network, Transport and Application layers respectively. 7.Types of PAS networks There are various types of networks used in PAS. Networking lines are important for transmitting the data from the host to the target computer. Different network lines which are used in the PAS are Twisted Pair, Fiber Optic cables, Coaxial cables (Stanley et al., 2016). 8.Application architecture proposal for the human resources department In this section the architecture of the Internet protocol system is proposed. The internet layer must contain the IPV4 protocol to transfer data more secured in fast way. The transaction of the data depends upon the framework designed in the architecture of the system. The architecture contains Application, Presentation, Session, Transport, Network, Data link and Physical layers as the basis of the transmission model (Zhou, Zheng Wu, 2015). Advanced algorithms are also used to make the transmission line more responsive. The information transmitted through the network system must be encrypted to maintain the security of the organization. Figure 2: Architecture of the network model (Source: Stanley et al., 2016). Conclusion From the above discussion it is concluded that the PAS Company is becoming more dependent on the Information technology system. For communicating the departments and keeping the records of the information applications of the computing system is needed with proper network devices and software. Different hardware and software features are discussed with specifications. The network system is also discussed with an architecture proposed with the networking system. Recommendations It is recommended to set the computing system as mentioned in the report with the given specifications. The network system should be also designed in the structured as mentioned. It is important to encrypt the information to increase the security of the organization. References Baihaqi, I., Sohal, A. S. (2013). The impact of information sharing in supply chains on organisational performance: an empirical study.Production Planning Control,24(8-9), 743-758. Chudk, J., David, G., Kotov, V. E., Mirenkov, N. N., Ondas, J., Plander, I., Valkovskii, V. A. (2013).Algorithms, software and hardware of parallel computers. Springer Science Business Media. Jahns, J., Lee, S. H. (2014).Optical Computing Hardware: Optical Computing. Academic press. Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., ... Darrell, T. (2014, November). Caffe: Convolutional architecture for fast feature embedding. InProceedings of the 22nd ACM international conference on Multimedia(pp. 675-678). ACM. Kasemsap, K. (2015). The role of information system within enterprise architecture and their impact on business performance.Technology, innovation, and enterprise transformation, 262-284. Min, B., Do Yi, S., Lee, K. M., Goh, K. I. (2014). Network robustness of multiplex networks with interlayer degree correlations.Physical Review E,89(4), 042811. Nakayama, W. (2014). Heat in computers: applied heat transfer in information technology.Journal of Heat Transfer,136(1), 013001. Nakayama, W. (2014). Heat in computers: applied heat transfer in information technology.Journal of Heat Transfer,136(1), 013001. Patterson, D. A., Hennessy, J. L. (2017).Computer Organization and Design RISC-V Edition: The Hardware Software Interface. Morgan kaufmann. Stanley, N., Shai, S., Taylor, D., Mucha, P. J. (2016). Clustering network layers with the strata multilayer stochastic block model.IEEE transactions on network science and engineering,3(2), 95-105. Zhou, Y., Zheng, X., Wu, W. (2015). Effect of local information within network layers on the evolution of cooperation in duplex public goods games.Chaos, Solitons Fractals,78, 47-60.