Wednesday, July 31, 2019

Business Systems Hoosier Burger Essay

Improving Hoosier Burger Bob and Thelma Mellankamp wanted to open their own business. They came across Myrtle’s Family Restaurant and saw a sign that said it was for sale. Bob and Thelma bought the restaurant and their own restaurant was brought to life Hoosier Burger Restaurant. The idea was one that everyone dreams of owning their own business but do not understand all the behind the scenes projects that make a business successful. Yes, they have been in business for over 30 years but even they understand that their dream needs some improvement to continue in the market they are in. Bob and Thelma have discussed the idea of a computer system but do not know where to start so Bob wants to bring in a consultant to address some of their weak areas and make suggestions to improve Hoosier Burger. They inform the consultant on how business is ran. This restaurant is behind the curve when it comes to technology. They still do paper trail on every aspect of the restaurant from deliveries, inventories, and p oint of sale (Valacich, George, & Hoffer, 2009). Even though paper was what many companies started out with, it is no longer an approved way to do business. Paper allows too many human errors to come into play where as an electronic record keeping system eliminates a majority of these errors but as with any data†¦you get out of it what you put into it. All this means that if you put inaccurate data into the system then the data you get from the system will also be inaccurate. Hoosier Burger has learned this lesson oh too well. Especially, since they did not order enough vanilla ice cream to cover their own special so they had to run to the grocery store to try to get enough for the sales they were doing on the special (Valacich et al., 2009). Bob and Thelma agreed that it would be  valuable to purchase an information system to assist them in the areas of inventory management, marketing, customer service, food preparation, and point of sale (Valacich et al.). Now that it has been decided on what needs to be addressed with thi s new information system. The systems development life cycle (SDLC) begins (Valacich et al., 2009). The four main steps of this process are (1) planning and selection, (2) analysis, (3) design, and (4) implementation and operation. The first phase is to plan the system out and then select the appropriate system for job. This situation a good point of sale system would give this company the system they need for daily operations and growth. A good POS covers all aspects of the restaurant from the dining area to the kitchen and even the storage areas. With any system, you have subsystems that are called components. Components by themselves do not make a system but when put together they make a complete system. In the case of Hoosier Burger one of the components of the system would be an inventory log or database. This subsystem would track usages and deliveries to ensure that stocks are maintain at the properly level for daily operation of the business. The project development team that Hoosier Burger selected w as based on the weaknesses of the organization. The focus of the new system will be on ways to improve inventory management, customer service, and management reporting. Any one of these weaknesses could cripple the organization. The team needs to get as much information as possible to ensure that they are building the correct system for this organization. I would use the interview process to get as much information from the staff as possible and I would use questionnaire to customer input. Also, I would gather as many reports and logs that I could for supporting documentation but with the current processes. This type of information may not be readily available or available at all. After gathering this information, the process of developing a system to correct their weaknesses begins. You would also want to find out if the company has any upgrades planned so that you could incorporate that into the system. In this case, they want to expand to delivery services and a drive through operation. These expansions do not require a lot of upgrades to the building so these will go into effect immediately to increase revenue for the company. The diagram figure 1 shows the flow of information for the new system. Fig 1. As you can see from figure, the information system that need is robust in nature but simple. The system analyst now needs to break down the different entities the company needs to store information about. These entities have particular characteristics that require information to be stored. There are rules used when attempting to place an identifier for each entity. The diagram will show the changes and specify the component’s needed for each relationship. In the text, an entity is a person, object, place, concept, or event in the user environment of which an organization wants to store data(Valacich, George, & Hoffer, 2009). Person entities are usually your employees but can be your customer. Place entities are basically the location i.e. states, regions, countries. Object entities include the machines you use, buildings your work out of, products you produce, and vehicles. Event entities can be considered sales, renewals, registrations. Concept entities include courses, accounts, or work centers. Hoosier Burger needs the ability to store information about their individual entities. The main entity is the customer that frequents the restaurant on a regular basis. They also need to store information about what products the customer is purchasing. Hoosier Burger also needs the ability to store information about the company itself and place entities which are the businesses that order meals from the company. We will now discuss attributes. Attributes according to the text are named properties or characteristics of entities that are of interest to the organization(Valacich et al., 2009). The following attributes should be used for the customer: customer name, customer address, customer phone number, customer’s number of orders, and customer specific orders. These attributes can also be assigned to the business entity by switching out customer with business. Attributes can also be assigned to the end product such as ingredients, price, and amount sold. Identifying the entities require assigning unique identifying  characteristics for the entity type. For example when dealing the with customer entity, you would use an identifier that is easy to use i.e. Customer ID, Customer Name, Customer Address, and Customer Phone. The key when dealing with identifying items is making it user friendly. Once all of these have been put into place, the system analyst now needs to build three working solutions to this company’s weaknesses. The three solutions as discussed in the text are low, medium, and high level. The difference in the three levels usually equates to cost but it also includes how much effort the user has to put into the system and the type of technology used. Time is money and if your employees are having to spend more time with the system than the customer then Hoosier Burger will lose money. All of these factors come into play when developing a system for an organization. The key to success of Hoosier Burger and the project development team is communication and cooperation. The more time these two entities communicate with each the easier it will be for the project team to address the needs of the customer and customer addresses the needs of the project team. It is a two way street. In the end, the job of the system analyst is to develop a system that addresses the wants and needs of the customer while maintaining within the budget. You do not want to sell the customer a â€Å"Corvette† when a â€Å"Camaro† would have done what is needed. Reference Valacich, J. S., George, J. F., & Hoffer, J. A. (2009). Essentials of Systems Analysis and Design (4th ed.). Upper Saddle River, NJ: Prentice Hall.

Trade Issues Between Developed and Developing Nations

Trade Problems 1 Trade Issues between Developed and Developing Nations Friday, January 22, 2010 Trade Problems 2 There are trade problems that exist for a less developed nation when trading with a more developed nation. These trade problems can prevent the less developed nations from maximizing possible gains from international trade. Some of these problems are temporary and resolved in time, while others are more stubborn and unable to be resolved. I will discuss the type of issues developing nations come across when trading with developed nations. Developing countries participating in trade lack an organized and strong monetary policy. Developing nations have problems forecasting money demand. Central banks have problems keeping records for managing monetary policy because the banks are not independent of the government. Some developing countries adopt policies such as dollarization, which allows for financial stability and lower inflation. Inventory problems in developing nations are another issue. In developing countries, inventory may be agricultural products instead of industrial products. Most of the inventory problems have to do with the food security and livelihood of the people. Developing nations have to stabilize food prices and production. They also have to balance the domestic and imported supply of agricultural products. In Mexico, pollution has increased since NAFTA was signed into law and trade between the U. S. and Mexico began. Despite its governments initial attention to Trade Problems 3 environmental issues associated with economic growth, the government did not follow through on its intentions to take care of the environment. In 1994, â€Å"real spending on environmental protection†¦declined 45%† (Gallagher, 2004). Further, inspections fell by â€Å"45% over the same period† (Gallagher, 2004). Ten years later, in 2004, there is nothing to suggest that pollution has decreased. If Mexico does not act on protecting its environment, further â€Å"environmental degradation† will continue. With Mexico’s comparative advantage of â€Å"an abundance of unskilled labor†, most firms will stay close to their â€Å"production markets† and pay the costs of environmental regulation, which are small, compared to relocating their businesses elsewhere (Gallagher, 2004). Knowing implementing regulations and enforcing them will not jeopardize â€Å"direct foreign investment† is one of the most important reasons why Mexico can and should reduce pollution and other â€Å"environmental degradation† within its borders (Gallagher, 2004). Trade Problems 4 References Bigman, D, (1986, February). The Journal of the Operational Research Society, Research on Inventory Problems in Developing Countries. Retrieved Friday, January 22, 2010 from http://www. jstor. org/pss/2582717 Gallagher, K (2004, September). Free Trade and the Environment: Mexico, NAFTA, and Beyond. Retrieved Friday, January 22, 2010 from http://ase. tufts. edu/gdae/Pubs/rp/NAFTAEnviroKGAmerProgSep04. pdf Wikipedia, (2010, January). Monetary Policy, Developing Countries. Retrieved Friday, January 22, 2010 from http://en. wikipedia. org/wiki/Monetary_policy

Tuesday, July 30, 2019

Resource Based View Essay

The mid-eighties witnessed the emergence of a growing body of work collectively labelled the resource and capability-based view of the firm (RBV). In reality, Resource Competence View (RCV) first adopted an â€Å"economic† orientation. Pioneer studies (Wernerfelt, 1984) , Barney, 1986, 1991, Dierickx and Cool, 1989, Peteraf, 1993) focused on the type of resources and competencies that could offer to its owner a sustainable competitive advantage. Therefore, resources and competencies approach first appeared as a theory of competitive advantage or a theory of â€Å"performance of the firm† (Argyres & Zenger, 2007). It is only recently, in the last 20 years that organizations have started using the resource based view approach on strategy. Nowadays, they view it as the most important key development in international business research and strategic management, an approach that gives a coherent vision based on a firm’s capabilities to help determine the strategic reso urces necessary for the firm’s survival and growth within a particular market place. As Hitt et al (2001) stated, â€Å"the resource based model assumes that each organization is a collection of unique resources and capabilities that provides the basis for its strategy and that is the primary source of return.†. It suggests that in order for a firm to sustain competitive advantage, it must not only have resources and capabilities but also have a firm control over it and they must meet certain basic criteria such as being: valuable, rare, inimitable and non substitutable such that it is impossible to be copied or replicated (VRIN). Although a resource based view strategy sounds like the better way to go, others have wondered if this approach is at all necessary or bring any more insight than the traditional understandings into a successful strategy to survive and thrive into a competitive market, strategy that will allow the firm to have a good competitive advantage. In this review, we aim to elucidate the concepts behind the resource based view strategy and its use by managers. Furthermore, we aim to elaborate on its advantages but also disadvantages moving on to a critical analysis of this emerging approach to strategy and competitive advantage from the point of view of well known authors such as M. Porter (1980,1985) who believes that external factors mainly contribute to a firm’s competitive advantage and Jay Barney (1991)  who criticizes the narrow approach of a resource based view on competitive advantage, mainly the homogeneity it gives to firms resources. RESOURCE BASED VIEW : A CRITIQUE The RBV has emerged after the industrial work of Michael Porter and Rick Perry , who stated that companies must achieve a competitive advantage based on external factors. In fact, the RBV suggests that differences in profitability between firms in the same sector are much more important than inter sector profitability differences which was its founding idea. The resource-based view (RBV) has become one of the most influential and cited theories in the history of management theorizing. It aspires to explain the internal sources of a firm’s sustained competitive advantage (SCA). Its central proposition is that if a firm is to achieve a state of SCA, it must acquire and control valuable, rare, inimitable, and non substitutable (VRIN) resources and capabilities, plus have the organization (O) in a place that can absorb and apply them (Barney, 1991a, 1994, 2002). This proposition is shared by several related analyses: core competences (Hamel & Prahalad, 1994), dynamic capabilities (Helfat & Peteraf, 2003; Teece, Pisano, & Shuen, 1997), and the knowledge-based view (Grant, 1996b). Given its elegant simplicity and its immediate face validity, the RBV’s core message is appealing, easily grasped, and easily taught. 1 FUNCTIONAL ASPECTS OF THE RESOURCE BASED VIEW :Models based on resources and skills, Resource Based View and Competence Based View The resources and competences are expressed through certain knowledge (know-how , know-machine ,distribute knowledge) Resources are defines as assets owned or controlled permanently by the firm to develop and implement its strategy. There are six types: Financial Resources : CAF, debt ratio, volume TR ; Human Resources : number of employees, qualification, experience,intelligence ; Physical resources : production sites and their geographical location, land,stocks ; Organizational Resources : information systems, ISO standards,  procedures,coordination mechanisms ; Technological resources : know-how, patents ; Reputational Resources : brand, reputation ; The approach based on the resources considers that the company more than the industry, constitutes the relevant level of analysis to explain the performance (Barney, 1991; Rumelt, 1984; Wernerfelt, 1984). The organization is rehabilitated as an actor ; the firms are able to accumulate resources and competences which are transformed into advantage on the competitors if they are rare, creative of value, non-substitutable and difficult to imitate (Barney, 1991; Dierickx and Cool, 1989) see figure 1. 5 tests to assess the strategic value of competencies: Figure 1. Barney J.B. (1991), Firm resources and sustained competitive advantage, Journal of Management, vol. 17, pp.99-120 The firm is not designed any more like a wallet of products or markets, but like a wallet of resources. It is not the customer requirements who determines the strategy, but the resources and competencies which the company possess : the competing advantage is to be sought in-house (See Table 1). Competencies indicate the organizational capacity to deploy the resources in the form of combination to achieve a goal, which implies the idea of a training by combining several resources. 2 A CRITIQUE OF THE RESOURCE BASED VIEW APPROACH The Resource based view approach has been subject to several critiques ,some of which suggest that it is a very limited model , very hard to apply and its variables cannot be clarified. All of these critiques could be faced with more explanations of the (RBV)’s variables,boundaries,and applicability. On the other hand, some critiques are threatening the (RBV) model, these critiques are concerned with the limitations of the defining two concepts of the (RBV) model which are : resources and value which entail some problems and affecting the explanations of a firm’s competitive advantage. These critiques could be categorized as follow : Studies argue that (VRIN) criteria is not essential to the understanding of SCA as (Kraaijenbrink et al) (2010) mention (Foss and Knudsin) (2003) arguing that it’s mainly uncertainty is one of the basics to achieve SCA , Furthermore, stating that other conditions simply additional . These comments suggest ‘ fundamental disagreement about the nature of markets , individuals , and resources and the roles these play in generating SCA (Kraaijenbrink et al, 2010). Individual’s, entrepreneurs, and manager’s judgement and models are not sufficiently recognized by the (RBV) to the critique which argues that the (RBV) limits the entrepreneurial and managerial skills. This critique outlines the importance of a firm’s environment whilst arguing that (RBV) is mostly focused inward and dismisses the external environment which is important for assessing the main strength and weaknesses of an organization , which essentially leads to achieving competitive advantage ; it also leads to the issue of value creation , and environmental assessment , internally and externally , are essential to value creation and strategic positioning. Connor (2002) argues that the (RBV) is limited to large firms (with significant market power) , furthermore, SME’s cannot be sometimes assessed by their resources when it comes to SCA resulting in their fallout of the (RBV) . Finally , adding that (RBV) applicability can , in most cases, relate to firms pursuing SCA. 1 PORTER’S FIVE FORCES (P5F) AND RBV On one hand, the RBV model supports the idea that a firm can sustain competitive advantage by having highly superior resources and these  resources are represented in the VRIN criteria . In other words, sustaining a competitive advantage depends on the ability to integrate a group of extreme resources to provide the firm with its leading position . According to Barney (1991,1994,2002) â€Å"RBV central proposition is that a firm is to achieve a state of SCA , it must acquire and control valuable, rare, inimitable,and non-substitutable (VRIN) resources and capabilities , plus have the organization (O) in place that can absorb and apply them† , which would lead the firm to earn a massive surplus. On the other hand, Micheal Porter believes that for a firm to achieve a sustainable competitive advantage it has to focus on its external environments, have a strategic positioning in its industry or intended industry and this strategic positioning is guided by five industry-level for ces namely; Entry barriers, Buyers bargaining power, Suppliers bargaining power, Threats of substitutes and Rivalry among existing industry. He specifies that finding a strategic fit within an industry gives a firm an edge over its rivals and can lead to a sustainable competitive advantage. A company can outperform rivals only if it can establish a difference that it can preserve (Porter, 2000) and how can you establish this difference? By deliberately choosing a different set of activities to deliver a unique mix of value e.g. Southwest Airlines, IKEA. However, It is clearly noticed that one of the big differences between both models (Resource based view and Porter’s five forces) is that they differ in the approach used. The RBV focus only on the firm’s resources but the P5F model is based on the industry itself. Another similarity between both views are the description of resources in the RBV that it’s inimitable matching the concept of threat of new entrants in P5F . Also the threat of substitute in the P5F model sounds similar to the attributive of resources that it is non-substitutable in the RBV. Both models put the concept of earning superior profits as an objective of any firm, similarly both agree that the way to achieve that surplus is by sustaining competitive advantage , but when it comes to how to sustain this competitive advantage they differ ; P5F SCA by gaining a high profit on the long-term , contrarily the RBV considers SCA by preventing rivals or competitors to acquire the same advantage . At some point, both RBV and P5F may look contradictory , in reality both complement each other when integrated . 2 JAY BARNEY AND RBV According to Barney,Mcwilliams & Turk (1989) it is stated that a sustained competitive advantage has been defined as to be an advantage obtained as a result of a firm’s strategy not being implemented by other firms as well but that cannot be replicated but point out the fact that it does not refer to â€Å"how long† that advantage is in fact sustained. Porter (1985) and Rumelt (1984) said that the basis for sustaining a competitive advantage in the market is to understand its sources. Porter mostly believes that focusing solely on external factors (opportunities, threats of new intrants,etc†¦) gives a firm better chances of reaching a sustained competitive advantage. For Barney (1991), the basis to sustaining a competitve advantage is by formulating a strategy that is based on internal strenghts but acquired through responding to external factors such that there is synergy between internal and external factors and thus heterogeinity and immobility to the firmâ€⠄¢s resources (Barney & Hoskisson, 1989). He argues that a firm simply cannot rely on the even distribution of its resources (same strategic capabilities, human and organizational capital (Barney,1991)) throughout the organization (focus that gives homogeinity and mobility of resources) to achieve a sustained competitive advantage as any other firm with the same resources can have the same competitive advantage in the market. Also, efficiency and effectiveness can be improved to the same extend and therefore the competitive advantage cannot be described as â€Å"sustained† (Barney,1991). However, it can be argued that an homogenous and mobile set of resources can also lead a sustained competitive advantage on a â€Å"first come, first served† basis where the firm that has access to distribution channels, develop good will customers and a positive reputation first gains a sustained competitive advantage as they would have established themselves before other firms had a chance to do so. Barney (1986) also highlights the concept of â€Å"Strategic Factor Market.† He explained that according to the strategy, strategic factor market in which the company must draw differ. For example, for an innovation strategy, the factor to consider may be the competence in research and development. He added that if the strategic factor market is not perfect, it will not be possible for a firm to extract superior economic performance. Barney is therefore concerned with allowing  the firm to distinguish themselves from others, and it sets up the theory of competitive advantage â€Å"sustainable†. This type of benefit resulting resources respecting the criterion called â€Å"VRIN† (resources must be: valuable, rare, difficult to imitate and imperfectly substitutable to provide the firm a sustainable competitive advantage). 3 ISSUES FOR PRACTICING MANAGERS IN ADOPTING THE RBV APPROACH Having looked at the critique of the RBV one can undoubtedly say that practicing managers may encounter some issues in adopting this approach. The RBV is a very complex approach. Thus to attain or maintain a competitive advantage managers must often and extensively simplify (Russo & Schoemake, 1989). Managers are often faced with the challenges of identifying, developing, protecting and deploying of firm’s resources and capabilities such that they can gain a sustainable competitive advantage over rivals. What are the criteria for identifying? Often times they ask what resources or capabilities do we have that rivals do not have or cannot immediately imitate and how can we achieve a sustainable competitive advantage with it. They run the risk of retaliation from rival firms which can render their competitive advantage static or useless as it is sometimes impossible for them to know the level or worth of their rivals resources or capabilities. What capabilities to develop, what resources to deploy are issues which can result to intra organizational conflicts among various departments in the firm. In adopting the RBV approach managers are likely to face a considerable uncertainty and ambiguity arising from shifts in buyers’ preference or taste, social values, economic and political trends, recent/ upcoming technologies, rivalry in the industry (competitive actions) etc†¦ (strategic management Journal Vol 14,1993). CONCLUSION REFERENCES Barney, J.B. 1991. Firm resources and sustained competitive advantage, journal of management 17:99-120. Barney, J.B. McWilliams,A. , Turk,T. 1989. On the relevance of the concept of entry barriers in the theory of competitive strategy. Paper presented at the annual meeting of the strategic managemt society, San Francisco. Lieberman,M.B, & Montgomery, D.B. 1998. First mover advantages, Strategic management journal, 9:41-58. Porter,M. 1980. Competitive strategy. New York. Free Press. Porter, M. 1985. Competitive advantage. New York. Free Press. Porter,M. 2000. What is Strategy? Harvard Business Review. Rumelt,R. 1984. Towards a strategic theory of the firm. In R. Lamb (Ed.), Competitive strategic management: 556-570. Englewoods Cliffs, NJ : Prentice-Hall. Wernerfelt, B. 1984. A resource based view of the firm. Strategic management Journal. 5:171-180.

Monday, July 29, 2019

Downloading Music Off the Internet Essay Example | Topics and Well Written Essays - 750 words

Downloading Music Off the Internet - Essay Example From this paper it is clear that  the Internet has become the means of generally the entire population to access information anywhere in the world without leaving the comfort of their seats. As the Internet has â€Å"exploded into an awesome resource of information ... it allows for the transfer of mass amounts of information between users ... with the mere click of a mouse†.This study highlights that  attention should be focused on the legalities or illegalities of Internet music downloading. Internet users, especially students, stand in their grounds that purchasing CDs are â€Å"too expensive† and merely a marketing deception by recording companies where the music lover can only find a couple of good songs in the entire album. There have been download reductions after the series of lawsuits filed by RIAA to peer-to-peer networks, but it is undeniable that there are still numerous options for those seeking files, music files especially, in the digital world. Other legal steps taken like the Digital Millennium Copyright Act of 1998 presented by Congress have been criticized as not fully effective to eradicate this illegal act. Government, schools and media have all debated regarding this matter, and it seems that there is still no clear-cut boundaries as to which is morally acceptable or what is to be considered stealing in a gigantic digital galaxy.  The Internet, being extensive and diverse, cannot be fully controlled by both legal offices or supplier of goods as technological advancements continue to rise.

Sunday, July 28, 2019

Who do they say you are Essay Example | Topics and Well Written Essays - 1000 words

Who do they say you are - Essay Example All of us dream of becoming something great in future. We all have our own resolutions, and we all have something to achieve. It is a common misapprehension that dreams are hard to achieve. A lot of people give up on their dreams even before trying. I used to have the same assumption when I was a child. But, now I feel the exact opposite. We should remember that each and every thing is possible as long as we believe. It is important to understand that dreams should always be kept alive. Transforming our dreams into realities is solely dependent on us. We are the ones in control of our dreams, our lives and we are the ones who can turn our dreams into a fabulous reality. What is required is faith and determination. A person can overcome all hurdles in life if he believes in himself, has faith and is determined and dedicated. I believe there is a difference in dreams and goals. A dream is a fantasy; it’s a flight out of imagination. A fantasy, on the other hand, is accompanied by a plan on how you intend to achieve what you dreamt of. A person with a dream would state, â€Å"Someday, I will be a topper in my field of work.† A person with a goal would instead state â€Å"Someday, I will be a topper in my field of work. I will achieve this by perseverance, and by being dedicated and determined in my efforts consistently. â€Å" There are some dreams, or rather goals, which are very close to my heart. Learning English language and being good at expressing me in English is one. I have promised myself to work relentlessly to achieve this. Another goal is to complete my studies thereby gaining wisdom. I want to prove myself in my field of work. A life is spent worthwhile if we spend it trying to reach our hopes. This makes us a better human being. But, the dream which holds the most importance for me is to join medical mission trips to poor countries in the world once I graduate form nursing. Previously, when I

Saturday, July 27, 2019

Postal rule Essay Example | Topics and Well Written Essays - 750 words

Postal rule - Essay Example Its main effect is that the danger of acceptance being lost or delivered late by post is completely placed on the offered. Thus, if the offered is unwilling to accept the risk involved, he can acquire the actual receipt before binding legally. (Cook, 2008) Acceptance and offer analysis is an age-old approach of contract law, which is used in order to determine whether there is an agreement between two individuals or parties. A number of things can be offered, like a fax, newspaper, letter, email and also conduct as long as it conveys the idea of the offered given in the contract. An invitation to treat is not considered as an offer as it only indicates that a person is willing to discuss a contract. If the person the offer has been made to rejects it, the offer is destroyed, as it cannot be received in the future. Like in the case of Hyde v. Wrench, in reply to an offer for selling an estate at a definite price, the plaintiff responded with a lower price. Thus, the offer was then refused and when the plaintiff wanted to buy the estate at the former price, they could not as no contract was signed with the initial offer and hence it did not exist. (Undy, 1996) In revocation of an offer, the offered can revoke the offer even before it has been accepted, but this revocation must be conveyed to the person offered to. If a certain offer has been made to the whole world, like in Carlill's case, the revocation must be in the same form as the offer. Acceptance is the final expression of agreement to the terms of the offer. There are several rules of acceptance. An acceptance must be conveyed; as before making an acceptance the offer can be withdrawn. Only the person the offer has been offered to can accept the offer. The latter, is not responsible if some other person accepts the offer without his knowledge. If any method of acceptance, like email or post, is specified in the offer, then only those methods can be used which are as effective as the one given. Lastly, like in the Felthouse v. Bindley case, silence cannot be taken as acceptance. The offer is rejected or terminated in case the offered dies. In such case if the offer is still accepted, it remains valid. However, if the person the offer has been made to dies, then the offer becomes invalid. (Hedley, 2006) In recent times, among the easiest of legal questions asked in the field of contract law is linked with the advances in computer technology and is whether the mailbox rule should be applicable to the most modern and very quickly becoming the most accepted mode of communication - electronic mail or simply email. Today we live in the silicon age and this age has given us the world of the cyberspace. It has been debated over and over again whether postal rule should be applied to email. Both post and email are almost same. An email does not directly reach its destination. Thus, the sender does not have any control over the message. It reaches its destination taking incremental steps just like post. Thus, none of the parties can be blamed for a delay. Therefore, we can see that postal rule can be applied to email. (Lasensky, 2005) In conclusion, it should be stated that the judges in Brinkibon also noticed that this mode of communica

Friday, July 26, 2019

Human Trafficking Assignment Example | Topics and Well Written Essays - 1500 words

Human Trafficking - Assignment Example Under the federal rule, coerced work is a harsh outline of trafficking people. Most victims of human trafficking are taken for labor purposes. For example, some could be recruited to run errands in construction sites. Others, especially children could be taken for home servitude, sexual use or labor. Human trafficking for sexual purpose is common and most children, close to 70% are trafficked for sexual exploitation (Gozdziak & Bump, 2008, 6). The stern types of trafficking individuals are distinct. One, sex trafficking: in this case a profitable sex act is induced by power, coercion and fraud in which the individual is pressurized to perform such act. The other form human trafficking is through the recruitment, transportation, provision, or getting the person for work via the use of fraud or pressure with the aim of subjecting him to involuntary servitude. In addition, a person is also subjected to peonage or slavery (Armaline et al. 2013). However, human trafficking can also happen in work circumstances such as home servitude, immigrant farming and labor in a person-like plant. Whether an action falls in the description of trafficking is based on the kind of labor for the victim and the use of force and coercion to get or retain the work. The exception is that the human trafficking covers the utilization of small children for profitable sexual actions even when there is no fraud or force (Armaline et al. 2013). Human trafficking also involves individuals who are detained against their will to pay off arrears. A victim’s original accord to tour or do the work does not permit the boss later limit the individual’s liberty. In addition, the agreement should not also let the employer restrict the worker’s liberty by use of threats or force to get refunds. In the United States, the full measurements of the challenge of human trafficking are hard to gauge. However, it is clear that human trafficking is a key basis

Thursday, July 25, 2019

Mental Health - Self Harm Research Paper Example | Topics and Well Written Essays - 2250 words

Mental Health - Self Harm - Research Paper Example This research study adopts an ‘interpretivism’ epistemology because the qualitative approach is more investigative (Goldkuhl, 2012, p. 138-140). This is because understanding the suitability of medical practices and tools qualitatively requires the use of distinctive opinions and thoughts than it is in using quantitative methodology. Besides, the study focuses on answering epistemic questions mainly approaching practice as knowledge as well as understanding the nature and validity of the knowledge generated through practice as is to be gotten from practitioners. Qualitative literature will also be very useful in this epistemological approach in studying the subject outlined (Carter and Little, 2007, 1317). Nevertheless, this epistemology has prolonged data collection, which means that more time would be consumed and the processes would be complex. This study is focused in studying the topic within the US particularly within the medical school health care facilities. This is partly because the facilities are research facilities in nature and thus they are expected to facilitate the effectiveness of the research through factual data as well as willingness to collaborate with the researcher for the success of the study. Focusing on studying the phenomena in US is also informed by the ever-rising cases of mental health and such cases of health harm as consumption of poisonous substances and inflicting the body with pain from scratches and hitting on rough surfaces (Gardner, 2008, p. 31-32.). The population targeted in this study is that of persons within medical school heath hospitals, those that have had at least three years of experience with the mentally ill within the particular hospitals. Three hospitals are to be selected for the collection of data and the sampling tactic to be employed in choosing is based on geographical location. Urban-based medical school facility will have priority over rural based facility for ease of convenience in accessibility.

Computer forensic Essay Example | Topics and Well Written Essays - 4500 words

Computer forensic - Essay Example Evidence derived from computer is been used in court for almost 30 years. Initially, judges accepted the evidence as no different from forms of evidence they were been already seeing. As computer technology advanced, the accepted similalities to traditional evidential material became Ambiguities (Olsson, 2004). 2. What is computer Forensic Computer forensic is a simple application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of Computer crime or misuse, including but not to theft of trade secrets, thefts of or destruction of Intellectual property and fraud. In other words, computer forensics is application of the scientific method to digital media in order to establish information for judicial review. This process usually involves computer system to determine whether they are or were been used for illegal or Unauthorized activities (Wikipedia, 2006). Mostly, computer forensics experts investigate data storage devices, either fixed like hard disks or removable like compact disc and solid-state devices. The work of a computer forensics expert is to identify sources of documentary or other digital evidence, preserve the evidence, analyze the evidence, and present the finding. Computer forensics is been done in a fashion that adheres to the standard of evidence that is admissible in a court of law. 3. Scope of Computer Forensic: The scope of computer forensics covers a wide field, which continues to grow as computer Technology proliferates its way into every aspect of modern life. The base computer forensics is recovering data from floppy disks, hard drives, and removable drive cartridges. This also includes searching... The history of computer forensic starts with the first time a system administration had to figure out how and what a hacker had done to gain unauthorized access to explore the system. In the beginning, the classic hacker breaking into computer system was more interested in how things work than actually being malicious.As computer evolved out of academic to business and government, there was more data and resource at risk. Hackers incursions became an issue handled through legal channels. While deciding which internal or external parties should handle each aspect of forensics, organization should consider factors such as personnel and equipment costs for collecting data, the time needed internal or external teams to respond to incidents, and data sensitivity and privacy issues. (United States Department of Justice, 2001) IT professionals throughout the organization, especially incident handlers and the first responder to incidents, should understand their roles and responsibilities fo r forensics. They should be given training and education on forensic, related to the company’s procedures, and they should be prepared to corporate with and assist others when the problems occur for which they were been trained (Nelson, Amelia, & Steuart, 2004). Incident handlers performing forensic tasks should have a broad knowledge of forensic principles, guidelines, procedures, tools, and techniques, as well as anti-forensic tools and techniques that could conceal or destroy data.

Wednesday, July 24, 2019

Factors That Influence and Shape Organizational Behavior Research Proposal

Factors That Influence and Shape Organizational Behavior - Research Proposal Example They include the personality of the founder, the ethics of the organization, employment relationships, organizational structure, and national culture. These are the specific features that describe the culture of an organization. They include their values, vision and philosophy, goals, customer relations, quality of service, and interrelationships amongst the stakeholders. Organizational behavior is basically a culture that characterizes the nature of interaction and operations within and organization. If exploited appropriately, this culture can give the organization a competitive edge. However, it is worth noting that the development of a particular culture is influenced by several factors, which also vary from one organization the next. This book outlines how social systems emanate in organizations and further explain the positive and negative effects of such social systems. The book concludes with reviews on how organizations can successfully employ social systems to employee’s performance. Proper knowledge of an organizational behavior is vital for the process of establishing healthy relationships through aspects such as social objectives and organizational objectives.

Tuesday, July 23, 2019

Khmer Rouge Essay Example | Topics and Well Written Essays - 1250 words

Khmer Rouge - Essay Example   Ã‚  Ã‚   The Khmer Rouge or Red Khmer - a communist party - governed in Cambodia from 1975 to 1979. However, they remained active even after the fall of their regime by engaging in guerrilla fighting against the new government. In other words, they turned into a terrorist group. Although they do not seem to be active right now - they were dropped from the list of foreign terrorist organizations of the Department of State because they "ceased to exist as a viable terrorist organization" (Cronin, 2003) - the time when they were active is too close and, therefore, they cannot be ignored.   Ã‚  Ã‚   Moreover, bearing in mind the genocide that the Khmer Rouge under the leadership of Pol Pot carried out in Cambodia, we should assume that the potential threat from this group implies threat for the lives of many people.   Ã‚     The Khmer Rouge are the perpetrators of the frightful genocide in Cambodia from 1970s. Although the Pol Pot regime (1975-1979) with the killing fields and the horrors of mass destruction is now a thing of the past, the Khmer Rouge seem to never have changed: "There is little sign that the ideology, leadership or social regulations of the Khmer Rouge have change significantly since their bloody reign from 1975 to 1979." (PoKempner, 1995) This conclusion is based on a report by Human Rights Watch, based itself on observations from 1994 to 1995, almost 20 years after the end of the Pol Pot regime.   Ã‚     Such evidence shows that a group with a history like that of the Khmer Rouges has little potential for change. Therefore, we should expect that their disregard for human life has remained the same over the years and any anti terrorist strategy should be developed with regard to that fact.   Ã‚  Ã‚   It is important to identify the specific military tactics of the Khmer Rouge so that we can be prepared for specific responses. Here are a few of the distinguishing characteristics of Khmer Rouge

Monday, July 22, 2019

Learning Team Industry Averages and Financial Ratios Essay Example for Free

Learning Team Industry Averages and Financial Ratios Essay Watch the Industry Averages and Financial Ratios video and use the industry classification from the financial services website to locate the companys SIC code on the U.S. Department of Labors website. Find the industry ratios for the company using the Dun   Bradstreet ® Key Business Ratios link in the Week 2 Electronic Reserve Readings. If your companys SIC code does not appear in the dropdown menu, choose another company. Assume the inventory ratio is based on a traditional inventory system, but globalized markets and the supply chain make it critical to adopt lean principles to create a more efficient system. Calculate the 14 ratios (show your calculations) for the company using the two most recent annual financial statements found on the financial information website you used earlier. Be careful not to use quarterly information, and include ratios for both years. Note. You can access a downloadable Ratio Guide PDF by clicking the Help Guide link in the upper-right of the Dun Bradstreet ® Key Business Ratios window. Compare the ratios for the company you selected with the appropriate industry ratios including profitability, solvency, and efficiency ratios shown on the Dun Bradstreet ® report. Write a 350-word response about how the company you selected performed compared with the industry. Instructor Notes: Also upload the following: Formula and calculations of your companys financial ratios for most recent two years (Excel) Dun Bradstreet financial ratios for your companys SIC code (exported to Excel) (Please delete the text in yellow-highlight above) Industry Averages and Financial Ratios Paper The purpose of this analysis is for our team to analyze how Amazon.com Inc. performed compared with the industry based on financial ratios. In Attachment 1, our team provides the industry ratios for the company using the Dun Bradstreet Key Business Ratios. In Attachment 2, we provide the Balance Sheet and Income Statement information for the company’s most recent two years. In Attachment 3, our team calculates the company’s 14 financial ratios. In Attachment 4, we compare the financial ratios with appropriate industry ratios including profitability, solvency, and efficiency ratios. Analysis of Company’s Financial Ratios Compared to Industry’s Financial Ratios Xxxx Provide an analysis of the selected company’s 14 financial ratios compared to the industry’s financial ratios. Compare the most recent two years from DB industry average to the same two years from your calculated financial ratios. Use the â€Å"Median† from the DB industry average Remember to select financial ratios related to profitability, solvency, and  efficiency ratios. Note: the analysis includes interpreting the importance of the company’s vs. the industry’s financial ratios. 3 points out of 3 possible points (please do not delete these lines with point scoring) Conclusion References [Insert references here.] Attachment 1 Industry’s ratios from Dun Bradstreet ® Key Business Ratios Solvency Ratios Solvency ratios measure the financial soundness of a business and how well a company can satisfy its short- and long-term obligations. DB uses six key financial business ratios to measure a company’s solvency: †¢ Quick Ratio, also called â€Å"acid test† or â€Å"liquid† ratio, considers only cash, marketable securities and accounts receivable because they are considered to be the most liquids forms of current assets. A Quick Ratio less that 1.0 implies â€Å"dependency† on inventory and other current assets to liquidate short-term debt. Cash + Accounts Receivable à · Current Liabilities †¢ Current Ratio is a comparison of current assets to current liabilities, commonly used as a measure of short-run solvency, i.e., the immediate ability of a business to pay its current debts as they come due. Potential creditors use this ratio to measure a company’s liquidity or ability to pay off short-term debts. Current Assets à · Cur rent Liabilities †¢ Current Liabilities to Net Worth Ratio indicates the amount due creditors within a year as a percentage of the owners or stockholders investment. The smaller the net worth and the larger the liabilities, the less security for creditors. Normally a business starts to have trouble when this relationship exceeds 80%. Current Liabilities à · Net Worth †¢ Current Liabilities to Inventory Ratio shows, as a percentage, the reliance on available inventory for payment of debt (how much a company relies on funds from disposal of unsold inventories to meet its current debt). Current Liabilities à · Inventory †¢ Total Liabilities to New Worth Ratio shows how all of a company’s debt relates to the equity of the owners or stockholders.  The higher this ratio, the less protection there is for the creditors of the business. Total Liabilities à · Net Worth †¢ Fixed Assets to Newt Worth Ratio shows the percentage of assts centered in fixed assets compared to total equity. Generally the higher this percentage is over 75%, the more vulnerable a business becomes to unexpected hazards and climate changes. Fixed Assets à · Net Worth Efficiency Ratios Efficiency ratios measure the quality of a business’ receivables and how efficiently it uses and controls its assets, how effectively the firm is paying suppliers and whether the business is overtrading or undertrading on its equity. DB uses five key financial business ratios to measure a company’s efficiency: †¢ Collection Period Ratio is helpful in analyzing the collectability of accounts receivable or how fast a business can increase its cash supply. Accounts Receivable à · Sales x 365 Days †¢ Sales to Inventory Ratio provides a yardstick for comparing stock-to-sales ratios of a business with others in the same industry. A high ratio may indicate that sales are being lost because of low inventory and/or customers are buying elsewhere. A low ratio may indicate that inventories are obsolete or stagnant. Annual Net Sale à · Inventory †¢ Assets to Sales Ratio shows how efficiently a business is usingits assets to generate revenue. A high ratio may indicate the business is not aggressive or that its assts are not fully used. A low ratio may indicate a company is selling more than can safely fulfilled by its assets. Total Assets à · Net Sales †¢ Sales to Net Working Capital Ratio shows the number of times working capital turns over annually in relation to net sales. A high turnover rate may indicate that the business relies heavily on credit. Sales à · Net Working Capital †¢ Accounts Payable to Sales Ratio shows how a company pays its suppliers in relation to the sales volume being transacted. A low percentage may indicate a healthy ratio. A high percentage may indicate that the business may be using suppliers to help finance its operation. Accounts Payable à · Net Sales Profitability Ratios Profitability ratios measure how well a company is performing by analyzing how profit was earned relative to sales, total assets and net worth. DB uses three key financial business ratios to measure a company’s efficiency: †¢ Return on Sales (Profit Margin) Ratio measures the profits after taxes on the year’s sales. The higher the ratio, the better prepared the business is to handle downtrends brought on by adverse conditions. Net Profit After  Taxes à · Net Sales †¢ Return on Assets (ROA) Ratio shows the after tax earnings of assets and is an indicator of how profitable a company is. Return on assets ratio is the key indicator of the profitability of a company. It matches net profits after taxes with the assets used to earn such profits. A high percentage rated indicates the company is well run and has a healthy return on assets. Net Profit After Taxes à · Total Assets †¢ Return on Net Worth Ratio measure the ability of a company’s management to realize an adequate return on the capital invested by the owners in the company. Net Profit After Taxes à · Net Worth Median Median is the value from the midpoint that falls halfway between the Upper and Lower Quartiles. Industry Quartiles Industry Quartiles are static values taken directly from the KBR database tables. The value from the midpoint that falls halfway to the top of the list is selected as the Upper Quartile. The value that is halfway between the median and the bottom of the list is selected as the Lower Quartile.

Sunday, July 21, 2019

Introduction to Gene Therapy Research

Introduction to Gene Therapy Research Gene therapy is a type of treatment that occurs at the molecular level in which defective genes are replaced by normal genes in an attempt to correct genetic disorders. The development of gene therapy which started in the early 1990s has brought hope for thousands of people with life threatening genetic disorders. Disorders that were once thought incurable are now being cured due to advanced research in gene therapy. Gene therapy allows for the treatment of numerous disorders and even genetic diseases like cancer and neurodegenerative diseases. An example, a type of Lebers congenital amaurosis (LCA), an inherited eye disease, can only be cured using gene therapy. (ASGCT, 2000) LCA is an inherited degenerative eye disease that targets the retinal area typically causing congenital blindness in early infancy that usually lasts an entire lifespan. The retinas purpose is to receive light, convert it into neural signals, and send those neural signals to the brain for visual recognition (Healthline Medical Team, 2015). Since LCA targets the retinal area, patients with this disorder are completely unresponsive to light and cannot see. Occurring in around 2 to 3 per 100,000 newborns, LCA is not only very rare but also one of the leading causes in early child blindness. LCA most commonly has an autosomal recessive pattern of inheritance meaning that both copies of the allele in each cell from both parents have mutations. In this case, both parents of an individual with an autosomal recessive pattern of inheritance carry one copy of the mutated allele without showing any signs and symptoms of the actual condition. So there is only a 25% chance that the child will hav e the disease, showing how rare LCA really is. There are 14-17 known genes which all have different functions and are all equally necessary for vision that have the possibility of carrying mutations responsible for LCA. Mutations in the CEP290, CRB1, GUCY2D, and RPE65 genes are the most common causes while mutations in the other genes are rare. So far LCA is only treatable with gene therapy if the mutation occurs to the RPE65 gene, whose role is to produce a type of vitamin A needed to keep light-sensing photoreceptor cells fully functional. Otherwise the disease is untreatable and gets worse as a child gets older to a point of complete blindness with no hope of ever being able to see again. (Manning, 2016), (AAPOS, 2014), (National Eye Institute, 2017)Using gene therapy, experts are able to replace the mutated RPE65 gene with a healthy RPE65 gene restoring its original function. This is done by retinal injection, a method in which modified viruses carrying a normal copy of the huma n RPE65 gene are injected beneath the retina. Restoring the genes original function gives the retina the special kind of Vitamin A it needs and allows it to absorb light in order for visual recognition. This process was mastered through a series of trials done by scientists. Initially tested on animals such as dogs, the procedure restored vision for blind dogs. Then after years of research and dedication, the process began being tested on humans after being deemed successful on animals. In 2007, the first successful human clinical trial treating Leber congenital amaurosis was reported at the University of Pennsylvania, USA. Although, the process hasnt been 100 percent successful, it has worked repeatedly and has been proven to be efficient. (Fighting Blindness, 2016)In conclusion, gene therapy is a work in progress. So far gene therapy has been developed to treat numerous disorders and diseases but research is being done to increase this number. LCA is an example where gene therapy has shown great success. Although, it can only be used to treat one type of LCA causing gene mutation, scientists are continuously working on ways to treat other mutations and also increase the success rate. As technology improves daily, gene therapy will be the staple of the 21st century medicine saving millions of lives. Citations/References: American society of gene cell therapy (2000) Available at: http://www.asgct.org/about_gene_therapy/diseases.php (Accessed: 12 January 2017). LCA Gene Therapy trial (2016) Available at: http://www.rpfightingblindness.org.uk/index.php?tln=researchpageid=17 (Accessed: 12 January 2017). Media, 2017 H. (2015) Available at:http://www.healthline.com/human-body-maps/retina (Accessed: 12 January 2017).Reference, G.H. (2017) Leber congenital amaurosis. Available at: https://ghr.nlm.nih.gov/condition/leber-congenital-amaurosis#inheritance (Accessed: 12 January 2017). Reserved, A.A.R. (2014) Lebers congenital Amaurosis AAPOS. Available at: https://www.aapos.org/terms/conditions/66 (Accessed: 12 January 2017). The Gene Therapy journey: From bench to bedside (2016) Available at: https://nei.nih.gov/lca/blindness (Accessed: 12 January 2017).

Demand and Supply in Microeconomics

Demand and Supply in Microeconomics Introduction Economics is a study of how to use limited resource to satisfy unlimited people wants. Demand and supply is the two main concept of the modern economic. Demand is what people want and supply is how many goods available for people want. In free market the price of good is determined by the numbers of consumers and how many products available for them. As the result of that, when consumers understand the law of demand and supply they will have ability to decide when they can buy a product with low price and the suppliers can set the right price of this product and decide how many product they will make. In this case study we will evaluate the theory of demand and supply. We also give an example of demand and supply in food market in Hanoi in storm season. Theory Demand and supply might be one of the basic concepts of economics. It is the core of market economy. Demand is the price or quantity of a product or service desired by consumers. The demand relationship refers to the relationship between the price and quantity demanded, which are the price and quantity people willing to pay for. Supply is the amount of products a market produces. The supply relationship represents the relation between the price and quantity supplied, which are the price and quantity suppliers willing to produce. Therefore, price is the main concern for demand and supply to consider increased or deducted, and so demand and supply vary according to the price. According to the law of demand and supply, the higher of a products price the more suppliers will produce and the less people will buy. Because of that, the market price is changes. ( Investopedia news and articles, copyright 2010 ) In such a case, the quantity supplied is greater than the quantity demanded and there is a surplus of the good on the market. From the graph we see that if the unit price is $3 (assuming relative pricing in dollars), the quantities supplied and demanded would be: Quantity Supplied = 42 units Quantity Demanded = 26 units Therefore there would be a surplus of 42 26 = 16 units. The sellers then would lower their price in order to sell the surplus. Suppose the sellers lowered their prices below the equilibrium point. In this case, the quantity demanded would increase beyond what was supplied, and there would be a shortage. If the price is held at $2, the quantity supplied then would be: Quantity Supplied = 28 units Quantity Demanded = 38 units Therefore, there would be a shortage of 38 28 = 10 units. The sellers then would increase their prices to make more profit. The equilibrium point must be the point at which quantity supplied and quantity demanded are in balance, which is where the supply and demand curves cross. From the graph above, one sees that this is at a price of approximately $2.40 and a quantity of 34 units. (NetMBA.com) In general, if the price of a product is at low level, more people want to buy it and the demand will increase. As the result, there will be a shortage. The supplier now will be willing to produce more because people still want to use that product. So the supply increases. It will keep increasing to a point where customers demand and the quantity of that product is equal. Thus, there is a tendency toward an equilibrium point where quantity demanded equals quantity supplied. On the other hand, if the price of a product is at high level, less and less people want to buy it and so the demand decreases. In the end, there will be a surplus. The supplier now will drop down the price in order to attract more customers. This price keeps going down until they sell all out of the surplus. So, the price is moving backward to an equilibrium point where price demanded equals price supplied. So, how a firm know when to produce more or less? As in THE TIMES 100 article states that An important aspect of marketing is knowing what the demand is for your products. All companies engage in marketing activities to find out what the demand for their different products will be. For example, Coca-Cola will want to investigate market trends in the carbonated drinks sector, while a bank will want to find out about the demand for financial services. Armed with this information they are able to make appropriate pricing decisions based on what other suppliers are doing, as well as on the demand from consumers in the market. Some main factors causing the change in demand: Economic factors: When a country economy is good and people have more money in their pockets. They likely want to consume more and thus the demand will increase Social factors: As the social trend changes, people might have less time for taking care of their houses. Therefore, they will need to buy more washing machines and hire employees to do all the cleaning and cooking services. So, there will be more opportunity for firms making washing machine and higher demand for cleaning service. The quantity and the price of competitive goods: the higher the price of a competitive good, the higher will be the demand for this good as customers change from competitive goods. An example for this is that, if the price of i-phone mobile phone goes up, the demand of other smart phones will increase. Some main factors causing the change in supply: Wants: it is simply the demand for a particular product. As the demand rises, the supplies will rise also. The number of suppliers: If new companies join the market, usually the supply increases Natural and unpredictable events: If earthquakes, floods and fire occur, the output likely to drop. Wars, which affect the supply of imported raw materials, the breakdown of machinery, may happen anytime. (John Sloman (1998), and The Times 100, Copyright  © the Times Newspapers) Demand and Supply in Macroeconomics and Microeconomics: Macroeconomics is the study of the whole economic activities which include inflation, recession and unemploymentà ¢Ã¢â€š ¬Ã‚ ¦ Therefore, it concerns with the total demand and total supply. If the total demand is high compared to the total supply, inflation and balance of trade deficits will occur Inflation: is the increase of the price level in the whole economy. If there is a rise in demand, suppliers likely react by setting up high prices. After all, if the demand is still high, they can sell as good as before and make a lot of profits. Inflation will happen when all suppliers just keep their prices at high level. The balance of trade deficits happens when import is greater than export. When the aggregate demand rises, people will have a tendency to buy more foreign goods, more imported cars, wines, electronic equipments will be consumed. If the inflation is also high, the domestic goods are even harder to compare with foreign goods. As the result, our goods cannot be consumed not only by our country but also foreign countries. If the total demand is low compared to the total supply, unemployment and recession will occur Recession: is the economic situation when business activities are declined. As the result, fewer and fewer people are willing to spend money. Thus, firms will have a lot of surplus goods. They likely to buy less from the manufacturers, which will decrease the production in return. Unemployment will happen if manufacturers do not need to produce anymore. Microeconomics is the study about the individual parts of economy, individual firms. It studies about the demand and supply of specific products and services such as cars, clothes, food, electricians. We cannot make as many goods as want because the lack of resources. There are some choices must be made in our society: What should be produced? We dont have enough resources to produce as many goods as we want. Therefore, we have to decide how many cars, how many buildings, how many hospitalsà ¢Ã¢â€š ¬Ã‚ ¦ should be produced? How should things be produced? If there is more than one way to produce thing, we have to decide which is the best. Who will use our products? This is the problem of income. We have to decide what the wage of particular job such as: doctor, engineer, farmerà ¢Ã¢â€š ¬Ã‚ ¦ Because if they have more money, they likely to consume more (John Sloman, 1998) Case study In October of 2008, Ha Noi was flooded by heavy rains. Because the drains did not work effectively as it was supposed to be. People in Ha Noi had a terrible experience because of the scarcity of the food. Learning from that experience, people in Ha Noi today usually store food when a storm is announced coming. As the matter of fact, in the evening of July 17th in 2010, the news forecasted that a storm might be coming. However, in the next day, the weather turned normally again. Because of the worry about the scarcity of food, people in Ha Noi already rushed to the super market and bought as many foods as they can. The change of demand and supply made a lot of supermarket out of stock, also the price of the food was doubled the supposed price. At some supermarket, people had to struggle, pushed each other just to fill up their fridge. As a result, they had to eat frozen food for months while low price fresh food is selling everywhere. At this point, the market had to suffer the decrease of food demand because people already had food in their fridge. In this case, when a demand surprisingly increase the quantity supply cannot afford to satisfy all the needs instead of that is the increasing of the price. When the demand drops down, the quantity supply stays the same but the price has to fall to attract more customers. Conclusion Nowadays, the real world economy is too complex that even in some cases the law of demand and supply cannot be applied. The market today is changing ceaselessly; many individual speculations are getting even more and more uncertainly. Therefore, people shouldnt rush in deciding to buy anything. In my opinion, stock and real estate markets are really risky for those who only follow the market tendency meaning to say the majority of people and dont have enough knowledge of how the economy works. Furthermore, the government should be flexible with the policy to keep the market price at a suitable level so that both customers and suppliers can adapt with, and also avoid inflation and unemployment.

Saturday, July 20, 2019

Criminology Psychological Theories Essay -- Social Psychology, Introve

Social Psychology is a field that attempts understated how thoughts, behavior and feelings are influenced by the implied presence, actual or imagined presence of others. Social influence involves the exercise of social power by a person or a group to change the altitudes or behaviour of others in a particular direction. Social power refers t o the â€Å"force available to the influencer to motivate change† (Allport, 1985). Young people are more prone to social influence due to need for conformity with their peers. This makes many teenagers in United Kingdom to indulge in criminal and deviant behaviours, which is closely associated with drug use and gang crimes. We can therefore argue that some emotional, psychological and biological characteristics make youths to indulge in gang crimes. It is hard to differentiate drug abuse and violence in United Kingdom or a cross the world at large. Adolescence drug use scares adults. The spectres of addiction, psychosis, alienation and rebellion provoke dramatic responses: legislations enact and create control agencies; social scientists conduct studies; and all these efforts are documented, evaluated and modified. In all these activities, however, the perspective of adolescents is neglected. They too, are concerned about dangers and are influenced by these controls, but their concerns are of different sorts. They are the ones who choose which drugs, if any, to try, who decide which use patterns to settle on; who experience the effects of drug use is a part of the adolescent’s social world. In fact they sometimes report the uses, meaning and consequences of drug use. It is therefore challenging to attempt to prevent or intervene in such a use are based on assumptions about the meaning of drugs ... ...sychology ( Vol. 1, 3rd.,pp1-46. New York: Random House. Bandura , A. (1977). Sociol Theory. New York. Universal Press. Block Herbert & Arthur Nienehoffer, the gang: a study in adolescent behaviour. New York. Universal press. Decker Scott (1996) Collective and Normative Features of Gang Violence. Washington : National Institute of Justice. Eysenck. H (1964). Crime and personality. London: Routledge & Kegan Paul. Howell James (1997) Youth Gang Drug Trafficking and Homicide: Policy and Program Implications Juvenile Justice Journal 4: 4-5 Kohlberg ,l. (1969). Stage of Moral Development and Action: New York. Winston Publishers. Lange J. Crime as a Destiny. London. Allen & Urwin. Marshalls lance & David Crook (1999). The childhood experience of a psychopath: A retrospective study of familial and societal factors. Journal of personality disorders, 13,211-225.

Friday, July 19, 2019

The Three Part Assertion Method :: essays research papers

The Three Part Assertion Method There is a guy two doors down from me, here in the dorm - a nice guy, a bit odd, overly friendly, and oh-so open. His favorite thing to do is prop his door open, play on his computer, and crank the music. I generally like all kinds of music, and I have been known to play it loud from time to time. Well, this guy truly likes all kinds of music, and plays it as loud as his speakers can handle it. It's a good thing he has small speakers. So, here's me, working on my computer, trying to concentrate, meanwhile this dude is down there playing some weird ethnic music, followed by the Star Wars theme song, with a mix of hippie music tossed in, in no certain order. It's a classic scenario. Over and over in my mind I envision myself going down there, screaming at him, telling him my mind, and slamming his door. That would feel great. I haven't done this yet, and probably won't. While reading the Bolton chapter, this scenario replayed itself over and over in my mind. Here is my revised strategy, which might just be used if the guy bothers me again. "When you leave your door open, I can hear your music in my room which makes if difficult for me to get school work done. I love music too, and certainly don't want you to not enjoy it, but please don't force others to 'enjoy' it with you. I noticed that when your door is closed, I can no longer hear it in my room and there is no problem. Thanks! So, what exactly are playing there? I have this great game.." The first sentence of this quote uses Bolton's tactic. The feeling part, hostility and frustration, of it is implied. The last part implies that I intend to remain friendly and hold no grudges. To be consistent with the project objectives, I will briefly explain a real situation in which I could have used the three part assertion method. Five years ago, at the age of 19, I worked at a local Western Sizzlin in Harrisburg as a waiter. I was one of the best servers there and made out well in tips. There were two parts to each customer experience that determined my tip, and this is basically true for every restaurant: my personal service, and the food. I had my side down cold. The cooks, not a chance. One morning, things were busy and the cooks were especially bad.

Thursday, July 18, 2019

powmac The Power of Religion and Fate in Macbeth Essay -- Macbeth essa

The Power of Religion and Fate in Macbeth      Ã‚  Ã‚   Macbeth presents a religious view of man's existence and destiny. Shakespeare, however, did not write a religious or theological tract. He explored the meaning of human life in those terms which art uses in order to project our deepest thoughts and feelings; in broad, popular religious symbols and myths, whose meaning is as profound as it is easily recognized.    The unparalleled religious crisis, through which Europe was passing at the time of Shakespeare writing Macbeth, the first decade of the seventeenth century, shook the traditional religious heritage to its foundations. Placed between an Everyman and a Pilgrim's Progress Macbeth did not have the simple clarity of either; the former was written before the phase of violent disintegration and the latter when more settled ideas had begun to consolidate themselves. We do not see the fluency of construction in Macbeth as we see in Everyman or Pilgrim's Progress. But the religious, Christian view is intensely there to determine the nature of imagery and the significance of characters. The human problem that is the basic idea of Macbeth is the relation between evil in human nature called "sin" and the everlasting scheme of things presided over by a Deity whose justice, wisdom and benevolence could be doubted temporarily but never rejected. More abstractly, the problem was that of h uman responsibility and free will, human freedom, in a world ruled by divine necessity.       Macbeth begins with a set of supernatural figures. Witches have been always associated with darkness, night and crime. Saul, in Samuel (1), visits the Witch of Endor in order to know his destiny. Saul himself had taken seve... ...moil in Act I shows the process of perversion of reason and corruption of will. He knows the good but will not and cannot do it and there is no intercessory power for him to turn to for aid His incapacity to pray in the soliloquy in Act I, the intervention by his wife (instead of by a good angel) just when he decides not to proceed further, the promptness with which the fantasy of the deed forms itself in his mind after he hears the prophecy-all these testify that Macbeth is a reprobate predestined to damnation.          Works Cited:    Macbeth. New York: Arden Edition (New Series)    Bindoff,S.T. Sr Tudor England, Pelican Books.1959    Dyer, T. Folklore of Shakespeare. Griffith & Farren:London,1883 (First Edition)    Elliott,G.R. Dramatic Providence in Shakespeare. Princeton University Press, 1958 (out-of-print Title)

An Essay About Lalo Guerrero

He had recorded about 700 songs. He was invited by three presidents, including former president, Carter, Bush, Sr. and Clinton, to the White House.   His songs have remained in the hearts of every Chicano, for his songs have appeared in almost all of the Latin music genres yet to be known, including folk songs and children songs.   He was born on the Christmas Eve of 1916 (Original Chicano Productions, 2007). HE was named as Eduardo Guerrero Jr. Early Career Early in his career, as most Mexican have experienced in his time, he and his music was rejected by his fellow Mexican and was labeled as â€Å"pocho†. His career started on 1939 as a member of the group Los Carlistas that was under the production of Vocalion Records. This man was born in Tucson Arizona and has not even finished High School. Through his perseverance and his faith to his music he is now the well-known â€Å"father of Chicano Music†, Mr. Lalo Guerrero. Born in a family who has just got enough income, Lalo has pushed his way to being the musician, writer, composer and performer that he is through hardship. He performed on movies such as His Kind of Woman and Boots and Saddles.   Later on he has toured throughout the Southwest with his orchestra which played and performed at Los Angeles. Lalo Guerrero’s Legacy When his single, â€Å"Pancho Lopez†, became a national hit, he purchased his own club and has his orchestra perform there every night. For about 60 years, Lalo Guerrero has captured the hearts and mind of the Chicanos with his heart warming music and his captivating performances. He continually performs for 60 years in the United States of America, Mexico and even to France. At the age of 80 he still manages to sing and record songs, as a matter of fact, his last album, which is â€Å"Chavez Ravine† was actually recorded when he was already 86. It is quite amazing that at such golden age the father of Chicano music had greatly helped advance the Chicano music to a new level of audience. According to Lalo Guerrero himself in an interview made by John Rogers Associated Press on December of 2005, â€Å"the bilingual parody hit, ‘Pancho Lopez’ have started his success†.   It was actually drafted from the famous novelty song, â€Å"The Ballad of Davy Crockett†, which was used in the 1955 Walt Disney production, Lalo Guerrero using its melody have invented a parody that stars a Mexican character that originated from the small state Chihuahua (John Rogers Associated Press, 2004). It was rewritten in English to captivate an ever more large audience which have loved and cherished Lalo Guerrero’s other hit parodies, such as, the ever famous â€Å"Pancho Claus† along with â€Å"Tacos for Two†, â€Å"There’s No Tortillas† and â€Å"Elvis Perez†, to name a few. Luis Valdez has acclaimed his movie entitled â€Å"Zoot Suit† to LAlo Guerrero’s Pachuco hit â€Å"Marijuana Boogie†. He was considered as the father of Chicano Music, not only because of his contribution to Chicano Music itself but also since â€Å"he has done the music way before it was even considered as a genre† (John Rogers Associated Press, 2004). His concept revolves on merging the traditional Mexican music with the genre’s that were in the mainstream. His dream and his passion are to perform in a large crowd and make people happy thru the means of his music. He has brought the Chicano Music the recognition that it needs, through his efforts to make the Chicano music known and enjoyable. The Achievements and What He has Become Late in his life he has received several medals and recognitions, including the National Medal of the Arts that was given to him by President Bill Clinton himself. Lalo Guerrero was a face of a happy man, a man who has completed his life (Guerrero, 2007). In Aristotle’s word, he was a man who has lived a good life. He has achieved greatness and he was satisfied with whatever it is that he has accomplished. He himself remark that he have lived a â€Å"great life† and he is proud of living the life he had the way he did. LAlo Guerrero, again in an interviewed made by John Rogers Associated Press, states that â€Å"everything that has happened in his singing career was never planned†. He further clarifies that at first he has been writing songs just about anything and everything that pops to his mind. The musicians and performers that have influenced his music, includes, Frank Sinatra, Elvis Presley, The Beatles and Chuck Berry (John Rogers Associated Press, 2004). He himself has influence a lot of other singers and performers. Comedian Cheech Marin admired him for the way that Lalo Guerrero have combine â€Å"street-humor and music†, she regarded his works as a â€Å"Chicano Art†. Other musicians which recognized his influence are Linda Ronstadt and Culture Clash (John Rogers Associated Press, 2004). Lalo Guerrero’s Memory Lalo Guerrero died on March 17, 2005, peacefully, contented and fulfilled. He has lived eighty eight golden years sixty years of which was dedicated to music and performance. He was one of the great artists who not only became great singers but has also become great achievers. He did not only create songs but have created a new music. It is a music that is considered distinctly as Chicano music, a music that stays in the hearts of those who have lived to hear them. It is the music that would repeatedly remind the different generations of Lalo Guerrero. When our generation and the generation that would come after ours talks about Chicano Music or even just mention the term, Lalo Guerrero would come to mind. He has become the trade mark of Chicano music and even of the Chicano’s itself. Lalo, have dedicated his life to the enrichment and proliferation of Chicano music. References Guerrero, M. (2007). Lalo Guerrero: The Father of Chicano Music. http://markguerrero.net/8.php John Rogers Associated Press. (December 25, 2004). Father Of Chicano Music Still Rocks. Desert News. Find Articles. Com. Retrieved on October 27, 2007. Retrieved from the World Wide Web: http://findarticles.com/p/articles/mi_qn4188/is_20041225/ai_n11495118. Original Chicano Productions. (2007). Lalo Guerrero: The Original Chicano. Retrieved on October 27, 2007. Retrieved from the World Wide Web

Wednesday, July 17, 2019

Meteors Case Study Essay

meteoroidoidites ar shake murder n rolls from infinite, which land on mankind, attracted by her gravity. The injection leadings that you tick aside at iniquity, atomic number 18 real burning meteoroids that cutpurse on orb from bulgeer nigh spot This is the first of numerous interesting facts that argon going to fol misfortunate. why do meteorites aeri play latitude? For the same evidence why boththing make ups on universe Gravity. Very hardly a(prenominal)er bath escape it meteoroidites arrest their declination in extincter spot. They be relatively micro pieces of disseminate and debris, usu completelyy go forth buns in the wake of a maket. Meteorites, that ar huge in coat, cast down their origin in outperform, as maven- baff animated-emitting diodes.They atomic number 18 left oer pieces of look from fixation of the solar constitution, which could non clump to lineher to take a leak a major planet comparable our demesne . t sum upher is a dense whack of much(prenominal) angulars bulgeside the range of the planet vitiate, cal take the unity-shaped Belt. angulates argon huge in size and their lengths stand number to kilometers one and only(a) epoch in a bit, subtle pieces of rock or pitter-patter, come into range of solid g ropes gravitational haul up and f altogether on acres as stroke stars. An star-shaped dislodged from its trajectory and go on primer coat is similarly cal take a meteorite. However, an star-shaped organism huge in size, springs a cataclysmic detonation on man on bushel.OriginMeteor and Meteorite facts be inter turnable terms and we shall see why they ar so. When these rocks and pieces of dispel argon drift in lay, they be called Meteoroids. When they make a blazing accounting compliance into landed estates ambience, they ar called Meteors. Finally, if they survive the burning entry into solid grounds zephyr and fall on ball, they ar cal led Meteorites. So a meteorite could bugger off from comet debris called meteoroids or big object glasss called asteroids Here argon whatsoever prefatorial facts whatever meteorites, meteors and meteoroids. Comets leave tons of dust and debris in their drop back as they travel a large long demesneal cavitys rotary the cheer. When public, turn revolving more or less the Sun, passes through and through any(prenominal) patches of this comet debris, it put ins the reasons atmosphere do meteor lavishs. Meteor squanders be menstruumic regularts. One potbelly see thousands of meteors or shooting stars, as they be called, during much(prenominal) a waste.The al intimately popular meteor showers be Perseids (which peak well-nigh sumptuous 12) and Leonids (which peak or so 17 November). During these showers, you trick observe a shooting star at the rate of 1 meteor per minute on an average. A falling meteor female genitals travel at secureness of as much as 44 miles per second One of the facts is that they deal some of the archa frostingst rocks in the solar establishment among them. They could be older than the man and find from the terminus when Sun was functioning E real day, rough 4 billion meteoroids fall on demesne Majority of them atomic number 18 rattling tiny and on that pointfore do not cause much harm.If a meteorite is disc everywhere melodic theme falling and vulcanized from the off nut rink staff of fall, its called a fall meteorite. If a meteorite is not observed date falling, precisely open up from any location, its called a find. Till cc6, at that place grant been somewhat 1,050 spectatored falls while there ar nighly 30,000 documented Finds. Falling meteors which be long in size, so-and-so acquire an in 10se electromagnetic pulse, which temporarily take a while radio communication in the kingdom of fall With a properly designed radio antenna, you flowerpot actually run a bad-tempered meteorites falling as radio noise.Types and radicalHere are some facts s brightnessly their flakes and composition, that you should know most. Recovered meteorites are householdify into three primary(prenominal) categories which are Chondrites (Make to the highest degree 86% of all recovered meteorites), Achondrites (8%) and urge meteorites (6 %). The name Chondrites comes from features called Chrondules, which are melted silicate significants from their past. Chondrites are active 4.55 billion eld old and are the types of rocks from which our own planet institute Certain chondrite meteorites fallen from outmost space contain traces of amino acids and organic matter, bolstering the opening that life whitethorn take up been ingrained on Earth This is one of the compressed to astounding facts. Achronidtes are relatively younger meteorites of the igneous rock type and are pieces of asteroids, the Moon and Mars Iron meteorites are sedate of exhort- nic kel alloys and silicate textiles. They are a standardized vista to be pieces of asteroids E genuinely one of these meteor facts are intriguing. Earth has been pounded by the pertain of many meteorites, ranging from the in truth(prenominal) tiny to spacious meteorites.The meteorites impact craters that are tack unneurotic on earth are probeimony to this. It is m for the furthermost of our facts. One gigantic meteorite impact occurred one jillion million millions of grades ago on Earth which brought on the extinction of dinosaurs One interrogative directence that whitethorn come to your mind is, Where do meteorites fall?. They could fall anywhere on Earth. Meteors sustain been found all over the world. The recent findings fuddle been broadly speaking in Africa and accessible parts of Antarctica. If you could find one, you are bound to be rich as private collectors and museums pay millions of dollars for them The reason is that they are genuinely rare and are do u p of minerals, which are never found on Earth So mention smell You may never know, when one tycoon pop out of the alternate, qualification you rich. So its actually profitable to know some meteor facts. Originating in the out space, an object lay downes Earth and jerk offs a posterior in the list of meteorites. in that location digest been many instances of extraterrestrial bodies impacting the Earths scratch while some subscribe only passed through the Earths atmosphere to begin with they were destroyed.Meteorites scram been arousing interest of the masses as there is an element of mystery that surrounds them. Where do they jump? What makes some of them enter the Earths atmosphere? How dangerous can they get? place research and astronomy pass on revealed some interesting in defining almost some of these questions and researched tho or so on the antithetic types of meteorites. intimately of the meteorites disintegrate forwards arrival Earth while some r each( prenominal) the planets surface. Huge meteorites orchestrate craters on Earth while the half(prenominal)-size ones involve slight danger. Meteorites containing itsy-bitsy round particles are know as chondrites and form about 86% of those falling on Earth. Those similar in surfaceance to small igneous rocks are called achondrites and opined as be the bitternessal material of asteroids. Meteorites originating from the core of asteroids are cognize as iron meteorites and form about 5% of the meteorites, which fall.History has recorded a number of instances of meteorites impacting the Earth. ALH 84001 It was found in the Allan Hills, Antarctica in December 1984. Meteorite hunters of the United States working on ASMNET project notice this meteorite. When notice, its mass was 1.93 kilograms and its rock was reportedly one of the oldest forms. This meteorite was vatic to digest come from Mars. posterior it was believed to make up of some traces of the life on Mars and this do ALH 84001 to a with child(p)er extent famous than ever. Hoba This meteorite lies on the advance Hoba West in Namibia and has never been move elsewhere because of its unlessionally greater mass. With a mass of about 60 tons, it is the enceintest meteorite know to mankind. It is tabloid in shape and cool of metal. It is believed to squander landed on Earth about 80,000 years ago. In 1955, it was stated as a national deposit and has since then been attracting visitors from some(prenominal)(predicate) parts of the world.Tunguska issuance The Tunguska explosion took place in June 1908 dependable Tunguska River, now a part of Russia. intimately probably, the air burst of a long meteorite ca apply this explosion. The vitality emitted from this explosion was about meter times greater than that of the bomb boom out of Hiroshima. harmonise to the eyewitnesses of this explosion, the event started with a nictate of bright blue light and a sound originating from east and moving northward. Later the sound was accompanied by gust waves that bust windows miles onward. This was one of the famous disintegrating meteorites that confront in the list of worlds most famous meteorites.Willamette Meteorite This is an iron-nickel meteorite that was observe in the United States near Oregon. It is the largest of the meteorites found in the United Sates as in desire manner the 6th largest in the world. Probably the meteorite had landed in the piece, which is now cognise as Canada. This meteorite calculation about 15.5 tons is one of the precise large meteorites of the world. Orgueil This meteorite fell in France in 1864 and is a relatively older meteorite.The fall of this meteorite consisted of small tilts that covered a grand vault of heaven. This is one of those eight meteorites that belong to the CL chondrite group. A striking feature of this type of meteorite it that its composition is similar to that of the Sun. This meteorite is one of th e most researched ones. For purposes of deeper airfield of the composition of this meteorite, it was rub into pieces. Currently, it lives in the form of pieces kept in dissimilar museums in europium and the United States. These were some of the famous meteorites of the world. They beget eternally been a subject of interest for researchers around the world. Meteor showersA meteor shower is a aeriform event wherein it is observed that a group of meteors radiate from anyone point in the sky. This phenomenon is in addition known as Meteor Storm or Meteor outpouring. The meteors that are present in the showers are actually cosmic debris that enter the Earth atmosphere at really advance(a) speed and vaporize very quickly payable to friction loss behind a streak of light which is known as the meteor shower. An determine meteor shower is usually an one-year affair as the Earth go out encounter the same meteors at round the same time and same speed any year.CausesMeteor showers are a result of inter bodily function that takes place in the midst of the planet Earth and a comet. Comets consist of ice and rocks ( lots termed shitey ice balls) that bailiwick around the lie desire planets. any time the comet gets rigorous to the temperateness, some of the ice present in the comet melts which reachs a large centre of debris. This debris moves extraneous from the comet and becomes a part of its piece of tail which is visible part of the comet.The solid parts of the tail are the meteoroids and they spread out along the entire landing field of the comet which is termed as a meteoroid menses. As the Earth cathode-ray oscilloscopes around the solarise, its path may cross the meteoroid decant and a meteor shower follows. When the meteoroid stream is accompanimently dense, then we get to witness the meteor storm and having witnessed one myself, I can guarantee that the sight is truly spectacular.People Behind the C at at onceptIt is believe d that Irish stargazer George Johnstone Clooney collaborating with the British astronomer Arthur Matthew dyers mignonette Downing and Adolf Berberich belonging to the Royal astronomical Computation Institute in Berlin, Germany offered the very first idea of the meteoroid stream in the 1890. They were able to calculate as to how the meteoroids once freed from the comet would travel at low speeds when compared to the comet itself would start drifting by and by terminate one theatre.This printing was attri thoed to simple orbital wherein the materials drift laterally a federal agency from the comet as some particles make a wider orbit when compared to refreshing(prenominal)wise particles. The gravitational pull of the Earths atmosphere would decide where the dust trails would pass the Earths atmosphere. It is a fair possibility that some years, the dust particles can completely miss the Earths orbit.Major Meteor ShowersIf you unavoidableness to watch meteor showers then the beat out time of the year is the night of January 3. The shower has been named Quadrantids and this particular shower can parent over a close to cxl meteors per hour. The source of this shower is not a comet exactly a minor planet, 2003 EH1 which suffered a catastrophic breakup in 1490. However, the showers are very faint and the peak hours last only for a few hours. Hence, you transgress clear to be in a good spot and at an standard point to watch the shower in all its glory and the best place to watch this particular shower is from the Union Hemisphere. But people in southern Hemisphere need not be disappointed.As a matter of fact, they get to witness a meteor shower termed Eta Aquarids which consists of debris from the famous Halleys Comet. This shower peaks on the night of May 5 and the rate of meteors is about 30 per hour. The meteor shower Geminids is considered to be the best yearly shower. It peaks around the night of December 13 and the rate of meteor is around 70 per hour. The source of this shower is also a minor planet, 3200 Phaethon. It is best visible from the Federal Hemisphere and it is believed that ascribable to the extreme icy conditions, the air tends to be more truthful and this is the reason as to why this particular shower is spectacular.Sporadic Meteor ShowersWhen the meteoroids conflict with each early(a) and can become a part of the sporadic meteors tooshieground. They form isolated meteors and are not a part of any shower.AsteroidsAsteroids are considered to be remnants of an early broken planet of the solar carcass. Asteroids have no fixed shape and are too small to be spherical in shape. They are ellipsoids ( dickens dimensional figure), dumbbell or ir incessantly shaped. As they have different shapes, they also spay in their size. The first asteroid cere, get word in January 1801 by Italian astronomer Giuseppe Piazzi, is the largest known asteroid and is 940 km in diameter. Some of the smallest asteroids are and 6 meters in diameter. The mass of all the asteroids added together, is believed to lesser than the mass of the Moon. just now 200,000 asteroids have been observe so far, but billion more undiscovered asteroids still exit in our solar scheme.Asteroid Belt just about asteroids lie in the asteroid belt amongst Mars and Jupiter, however there are more belts in the solar musical arrangement, namely the ones beyond Neptunes orbit. The belt itself has interesting origination theories. about astronomers believe that the belt is a broken planet, while some say that the belt is primal material that never coalesced into a planet because of Jupiters gravitational pull. The asteroid belt lies among the orbits of Mars and Jupiter and contains more than 200 asteroids larger than 100 km in diameter, and more than 750,000 asteroids with diameters larger than 1 km. Most asteroids are found in this belt because of the gravitational interaction surrounded by the solar arranging and the ce lestial bodies in it.As opposed to the fiction make popular by various depictions of the asteroid belt, it is not at all dense. The land is so large that asteroids are hundreds of thousands of kilometers external from their side by side(predicate) neighbor. The asteroids are so small and far out-of-door from each separate that they appear as faint stars, and except for Ceres, are not bright teeming to be seen without some telescopic aid. Only the asteroid Vesta, on rare do of an extremely clear apart(p) sky can become visible to the rude(a) eye.What are Asteroids Composed Of?Asteroids are make of different minerals and meats. This depends on the planet they broke away from in a encounter, as well as the chemical reactions they might have see while orbiting in the solar transcription. The asteroids close-hauled to the Sun are mostly carbonaceous and the ones further away are composed of silicate rock. The metallic asteroids are do of 70-80% iron and the remaining i s nickel with many other metals much(prenominal)(prenominal) as iridium mixed in. Some are also made of half silicate and half metallic. The asteroid Ceres is composed of a rocky core covered by an icy mantle, whereas Vesta has a nickel-iron core, basaltic crust and a covering of magnesium iron silicate (olivine mantle). Asteroids composition has been classified as the pursuance(a) C class asteroids They are found in the Earths outmost belt and are darker and more carbonaceous than the ones found in the S class.D class asteroids They are also known as Trojan asteroids of Jupiter and are dark and carbonaceous in composition. S class asteroids They are found in the Earths inner belt, impendent to Mars and are composed of mostly stone and iron. V class asteroids They are a far-out group of asteroids that follow a path between the orbits of Jupiter and Uranus, and are made of igneous, eruptive materials. A near-Earth asteroid collided with the Earth about 65 million years ago, whi ch triggered environmental neuters, leading to the extinction of the dinosaurs. This asteroid produced a huge circular opinion called the Chicxulub Basin and is centered in Mexicos Yucatan Peninsula, a major tourist attraction.though the chances of asteroid collision with the Earth is very rare, they do come very close to our planet due to collisions and gravitational tugs on the extremely elliptical Suns orbit. Most asteroids burn up in the atmosphere and never reach the Earth. NASA projects, such as the Lincoln unspoilt-Earth Asteroid seek (LINEAR) and the Near Earth Asteroid introduce (NEAT) main objectives are to detect and arrest asteroids or other celestial bodies coming close to the Earth before they cause untold rail at to our planet.Asteroids are small celestial bodies composed of rock and metal, that twine around the Sun. Their size can shift some asteroids are large and roughly spherical in shape, due to which they appear wish miniature planets while the oth ers are small and irregularly shaped. The matter of these celestial bodies also differs. The asteroid Vesta, is believed to have a nickel-iron core, olivine mantle and basaltic crust, while the asteroid 10 Hygiea is composed of carbonaceous chondrite. Most of the small asteroids are piles of debris held together by gravity. Some asteroids supposedly have traces of amino-acids and other organic compounds, and it is off-key that the impact of asteroids on the Earth could have initiated life on the planet by seeding it with the necessary chemical substances. Although, it is believed that the asteroids may have effected life on the Earth, they are capable of having catastrophic effect on the planet as well.Asteroids with a diameter of 5 to 10 meters, and button match to 15 kilotons of TNT, enter into the Earths atmosphere approximately once every year while, those with a diameter of over 50 meters enter the Earths atmosphere approximately once in a thousand years. Their impact can be devastating if they hit the Earth, but they disintegrate in the pep pill atmosphere and most of the particles are vaporized, thus exposition them harmless. In the distant past, our planet has experienced a massive climate change and large-scale extinction of animal and plant species, ascribed to the impact of some large asteroids on the planet. The exogenesis theory suggests that origin of life on the Earth moldiness have been triggered by the impact of some asteroid, carrying organic chemicals necessitate to initiate life form. The Cretaceous-Tertiary extinction event, which led to the end of dinosaurs and the Permian-Triassic extinction event that led to the end of the Permian achievement finishing off 90% of the species on the planet, are believed to be the result of an asteroid impact on the Earth.The craters on the solid bodies in the solar arranging, which were attributed to volcanic activities till 1960s, were actually organise due to the impact of celestial bodies. Researchers have determined that in the last 600 million years, 60 objects with a diameter of vanadium km or more, have laid low(p) the Earth. Even the smallest of these object possessed energy of ten million megatons of TNT, and would have make a crater, approximately 95 km in diameter, on the surface of our planet. The Rio Cuarto craters in Argentina are believed to have organize due to the impact of asteroids that struck this area around 10,000 years ago. In 1490, ten thousand people reportedly addled their lives due to a acclaim of stones from the sky. This hail of stones is assumed to be result of the rot of a large asteroid, after it entered the Earths atmosphere. In 1908, a mid-air explosion of an asteroid destroyed 80 million trees, inwardly an area of 830 miles, near the Podkamennaya Tunguska River, in Siberia.In many cases, the sighting of a foreign body, such as an asteroid or a meteoroids is reported as a fireball in the sky. Millions of asteroids leave behind pa ss by the Earth in the years to come. Though, they are unknown now, they are detectable as they come closer to the planet. The Lincoln Near-Earth Asteroid Research (LINEAR) and the Near Earth Asteroid Tracking (NEAT) are projects initiated by NASA to detect asteroids or other such foreign bodies coming close to the Earth. The need of the hour is to develop an hold back system in space, to destroy or deflect foreign objects heading towards our planet, before they prove catastrophic.Asteroids are celestial bodies consisting of rocks and metals. They are mainly concentrated in the region known as the asteroid belt which lies between the orbits of Mars and Jupiter. Asteroids can be as big as Ceres, which is close to 1000 kilometers in diameter, or can be just a few feet in diameter. Whatever the size, asteroids are incomplete big enough to be called planets nor are they as small as comets. They are classified as minor planets that embarrass the Kuiper Belt Objects.DiscoveryOn January 1, 1801, Giuseppe Piazzi discovered the first asteroid which he initially feeling to be a comet. He named this asteroid Ceres, after the Sicilian Goddess of grain. Ceres is also the largest asteroid to have been discovered so far. Soon, other large asteroids kindred Pallas, Juno and Vista were discovered. By the end of the nineteenth century, several hundred asteroids were discovered.Formation of AsteroidsIt was once believed that asteroids were make by the explosion of a planet orbiting between Mars and Jupiter. However, correspond to present day astronomers, asteroids are debris left behind by the free Bang that could not come together to form a tenth planet because of the effect of Jupiters gravitational pull.Asteroid HitsAsteroids have been hitting the Earth since millions of years. However, due to the friction with Earths atmosphere most of the asteroids get burnt. The asteroids that enter the Earth s atmosphere are called meteors while the ones that get burnt and appear as shooting stars are called meteorites. harmonize to the ogre Impact Theory, the Moon was created when Theia, an asteroid of the size of Mars, collided with the Earth in the early geezerhood of the solar system. However, some consider Theia to be more of a planetoid than an asteroid. The largest crater caused by an asteroid hit is the Chicxulub crater in Mexico that is 180 km in diameter. The asteroid that formed the crater had a diameter of 10 km. This collision is supposed to be prudent for the extinction of a large number of flora and wight including the dinosaur. However, the evidence of the largest asteroid hit is in the Vredefort crater in South Africa that is ccc km in diameter.Impacts of Asteroid HitsThe damage that an asteroids impact can cause depends mainly upon its mass and velocity, as these are the twain factors that determine the energy that is released when an asteroid hits the Earth. opus some asteroids are capable of sending thermal waves that can incinerat e most flora and puppet within a few hundred kilometers, some larger asteroids can create huge impacts causing magma to cover areas as big as continents. The worst effect of an asteroid hit is the blocking out of sunlight for months together due to formation of dust obscures and soot in the upper atmosphere. This would hamper the green plants ability to prepare sustenance through the process of photosynthesis and the food chain would be disrupted.Near-Earth AsteroidsNear-Earth asteroids are those that have moved closer to the Earths orbit as they have been knocked out of the asteroid belt due to collision with other asteroids or comets, or due to the gravitational embraces of Jupiter. They are classified into the following three groups The Amors These are near-Earth asteroids that cross the orbit of Mars but do not go out of the Earths orbit. The Apollos The orbits of these near-Earth asteroids cross the Earths orbit but have an orbital period of greater than one year.The Atens These near-Earth asteroids have orbits that cross the Earths orbit but have an orbital period of less than one year. Asteroids are currently being monitored for their probability of colliding with the Earth. Such studies have predicted that asteroids may hit the Earth on February 1, 2019 and walk 16, 2880. The probability of the 2880 collision is as high as 1 in 300. A number of projects in the field of astronomy, like Spacewatch, Near-Earth Asteroid Tracking and Catalina Sky lot are being carried out to detect any threat of such catastrophes.CometsA comet is a small body in space. It was matter of great interest to astronomers like Sir Edmond Halley. Many decades later, comets still remain a challenging mystery for the field of astronomy. Space research institutes around the world have reported the earth of 3628 comets that are known and studied. Annually, an average of one comet is sighted by the naked eye from the surface of the Earth. According to the definitions given by th e various space research organizations, a comet can be defined as a space body that travels in an elliptical orbit around the sun. Most of the comets travel in elliptical orbits. When the comet comes in the vicinity of the star it is orbiting around, its comma-like tail gets illume. A majority of comets are visible only through telescopes and other aids. at that place are however, some comets which are also visible to the naked eye.What is a Comet Made Up of?A comet is mainly made up of ice, dust and different forms of gases. The nature of the parts differs from comet to comet. The central part of a comet that looks like a ball is termed as the cell karyon. The nucleus is principally made up of ice and frozen(p) gases. The frozen components also include many other compounds like ammonia, methane and carbon dioxide. Rocks are another component of the nucleus. Due to such composition, the nucleus of the comet often resembles a huge ball of dirt and snow. It is also believed by some astronomers, that the nucleus of a comet is rather fragile because several comets have split into parts without any developable reason except wide velocity.The huge elliptical orbit takes the comet in the range of heat of the star around which it is orbiting. When the comet enters the inner parts of the solar system, the frozen content of the nucleus starts melting. The gases and water within the nucleus vaporize as a result of radiation from the star and the solar wind. The immense velocity of the comet and the solar wind, jabbing the vaporized matter away from the nucleus. This gives the comet its distinct tail and the comma-like appearance. The high amount of heat and the ions (charged particles that are formed due to the heat of the sun) cause the tail of the comet to glow.How are Comets Formed?According to their formation or birth, the comets can be classified into both types. The first type is go around-term comets which originate in the Kuiper belt as space bodies b eyond the orbit of Pluto. The gravitational pull of the planets in the solar system, causes the origin of short term comets. These comets enter the solar system and take the form of active and importunate comets. Long term comets originate as traveling bodies in the Oort cloud (located around 50,000 light years away from the sun). The gravitational attraction of the planets in the solar system and other gravitational forces cause these comets to form elliptical orbits.Death of a CometThe contract of comets has revealed that they have a fragile structure. Sometimes, comets split into parts due to sheer velocity. The entry and exit of comets in the solar system in course of its orbit, reduces the amount of matter (ice and frozen gases) in it. Due to this decrease in matter, the comets break-up and disperse into clouds. A asleep(predicate) comet is nothing but an asteroid or a similar form of a space body. Sometimes the comets also scare in other planets when their orbits cross ea ch other. The most famous example of such a comet is the Shoemaker Levy 9, that crashed into Jupiter. For astronomers who have spent their lives shooting comets, it a very heart-breaking moment to gaze at a dying comet.The Halleys Comet is said to be one of the most splendid comets. some other very beautiful comet is the ram-Bopp, that was discovered in the year 1995, on 23rd July. It was predicted by astronomers that the Halleys Comet would be sighted in the November of 1835. Mark coupling, the famous writer, was born just two weeks after the sighting. He genuine a very special appetency towards the Halleys Comet. In his biography he comments,I came in with the Halleys Comet, and depend to go with it. The Almighty has said no doubt, Now here are two unaccountable freaks they came in together they must go out together. Halleys Comet was nigh sighted on 20th April, 1910. bracing ended the journey of his life the very following day. The journey of any comet is hence like t hat of Mark Twain. It is remarkably long, fast, undismayed as it streaks across the dark sky.Haleys cometHistorical SpottingsBritish scientist, Edmond Halley who observed the comet in 1682, was the first person to establish its half-hourly reappearance after every 75-76 years. He studied the comet and quite accurately predicted that it had prior appeared in 1531 and in 1607. It was named Halley in his prise and was observed again in 1758 as stated by him. It was last seen in February 1986. However, this was not the first time the comet was in focus. The first sighting recorded, was way back in 240 BC, by the Chinese and was mentioned in a chronicle, Records of the Great Historian. The comet also finds a mention in a Babylonian clay inscription of 164 BC. It has forever been a subject of great interest, since it was believed to have an influence on the contemporary events. Armenian king Tigranes II, had its image printed on the coins issued in his regime after it was sighted in 87 BC. Therefore, even though the rejoinder of the comet was an unknown fact, people were fascinated by its appearance.The bright star that appeared in the night sky in 12 BC, simultaneous with the birth of Jesus, is widely believed to be the Halleys comet. Giotto Di Bondone, the famous Italian painter, who lived before the metempsychosis era, painted it in his work The sentience of Bethlehem in the Nativity, in 1305. He had seen the comet appear in 1301 and was impressed by the spectacle. In the middle(a) ages, the appearance of a comet was considered to be a warning sign of a forthcoming danger.The most famous ensuant of spotting a comet during this period, was in 1066, before the Battle of Hastings. King Harold who had lost the battle, was believed to have seen the comet due to which he was cursed. In fact, the Bayeux tapis in Normandy, France, signifies the Norman victory in this battle with an image of King Harold looking at the comet in the sky. In 1456, pontiff Calixt us III had condemned its appearance considering it to be an mephistophelean omen. Three years prior to this, Europe was defeated by the Ottoman Empire. gentleman beings beings have always blamed celestial phenomena, whenever they have not been able to explain the causes of certain unfavorable events.Historically, the charge of a comet in the night sky was ordinarily cited as the reason behind exhausting situations that were beyond the reasoning of common man. A French physician, Ambroise, had described the pitiful conditions of middle ages, when a comet was seen just before the spread of a big epidemic. According to him, some people were scared to death while others fell sick on eyesight the comet. It was believed to be some evil form leaving behind a trail of blood, believed to be a sign of misery. late SpottingsIn the 16th and the 17th century, scientists conditioned to calculate the speed and distance at which comets travel around the Sun. Once, Edmond Halley had establish ed the year of its reappearance, Halleys comet became a matter of great interest. Although, he didnt live to see his prediction coming true, his observation had a significant impact on the way society perceived comets. The sighting of a comet, especially Halleys comet became less of a concern and more of a queerness among people. Once people realized that comets are orbiting bodies just like planets, they became less apprehensive on the arrival of a comet in the Earths visibility zone. The change in the attitude of the people was seen in the depiction of the comet in the contemporary pictures. Halleys comet was a subject of scientific test and was depicted as a beautiful heavenly body in the sky. noted American writer Mark Twain was born in 1835, the year when Halleys comet had appeared.He predicted in 1909 that since he had come with the comet he forget go out with it. Sure enough, he passed away a year after the comet reappeared in 1910. In the 1900s, it had appeared twice on ce in 1910 and then in 1986. Further studies gave us a deep insight into the structure, composition and orbital journey of many different comets. Halleys comet has one of the shortest orbital paths. It is classified as a short period comet, i.e. comets having an orbit period of 200 years or less.Once upon a time, it belonged to the long period class, but due to the gravitational force of planets, its orbit shortened over a period of time. Today, it is known that comets like Hale Bopp which appeared in 1997, will reappear after 4200 years Thus, Halleys comet is the most oftentimes spotted one. Recently, it was seen in February 1986. During this visit, it was subjected to its biggest scrutiny ever. quintuple ballistic capsules from The European Space Agency, Japan and the USSR were launched to learning its surface.Structure and Composition of Halleys CometHalleys comet is a big mass of ice and dust, having an elliptical orbit and shaped like a peanut. It has a highly prolonged orb it, taking it very close to the Sun. It flings off far in the outer solar system, similar to a slingshot motion. The composition is mainly of water, sodium monoxide, methane, ammonia, hydrocarbons, iron and sodium. Its closest distance from the Sun was found to be just 0.6 AU (astronomical unit) and the farthest distance was calculated to be 35 AU, roughly the same distance as that of Pluto. It orbits the Sun in a retrograde or in the direction opposite to that of the planets revolution. The speed with respect to the Earth is quite high, since it is highly eccentric and inclined.The day time is relatively more on its surface and its level best temperature rises up to 77 degrees celsius. Due to its large size and a well-defined and regular orbit, it was easy for the probe missions photograph it near and study its surface. The mass of the comet is 1.71015 kilograms and the size of the nucleus has been estimated to be 15 km 7 km 7 km. Winds blowing near its surface are so strong th at 1 gram particle of dust which hit the Giotto space probe, briefly destabilized it. Halleys comet will next appear in 2062. Comets have always been a fascination for human beings and will continue to mesmerize generations to come, as we discover more interesting facts about these spectacular fireballs, the comets.Comet lullinComet Lulin was discovered on July 11, 2007, by the duo of Ye Quanzhi and Lin Chi-Sheng. A non-periodic comet, Lulin appears to be dark-green in color. This green color is attributed to the presence of gases such as cyanogen and diatomic carbon, which produce a green glow when illuminated by sunlight in the nothingness of the space. Officially designated as C/2007 N3 (Lulin), it is also known as the Comet of Cooperation in china and Taiwan, as the two individuals involved in its discovery, were from these two countries. This comet was first photographed by Chinese astronomer Lin Chi-Sheng on July 11, 2007, while he was working on the Lulin Sky contemplate Project (LUSS) at the Lulin observatory in Nantou, Taiwan. The Lulin Sky Survey Project aims to bring out the numerous small objects in the solar system, particularly those that pose possible hazards to our planet. Lin used a 16-inch telescope to photograph this comet, which was initially assumed to be an asteroid.A few days later, Ye Quanzhi, a 19-year old learner of meteorology from Sun Yat-Sen University, China, recognized this comet while going through Lins photographs. Its precondition of being a comet was confirmed after the presence of coma, the nebulous envelope around the nucleus of the comet, was noticed. Both, Lin and Quanzhi were accredited with the discovery of this new comet. As it was first noticed from the Lulin Observatory, it was named as Comet Lulin. Comet Lulin was seen in the Libra constellation from January to borderland 2009. In January, it was getting brighter and could be seen just before dawn while in February, the brightness reached its peak. Eventual ly, in March, it started to fade as it went farther away from the Earth. While it was access the Earth, it had a typical tail pointing away from the Sun, as well as an anti-tail which was straightaway pointing towards the sun. Although, it was assumed that this anti-tail was observed only in photographs, some observers reported that it was visible even from a telescope in February 2009.According to Brian Marsden, an astronomer at Smithsonian Astrophysical Observatory, Massachusetts, this comets closest orgasm to the sun was on January 10, 2009 when it reached a distance of 113 million miles from the sun. He noticed that the comet was moving in a retrograde orbit that is near-parabolic. On February 24, Comet Lulin came the closest to the Earth, at a distance of 0.41 AU or 38 million miles to be precise. On February 4, 2009, a team of Italian astronomers, under the leadership of Ernesto Guido, witnessed a contrasted phenomenon taking place in comet Lulin. While photographing the c omet with a remotely controlled telescope in forward-looking Mexico, they saw that its tail of a sudden disconnected. Ernesto attributed this odd phenomenon to magnetic disturbance of the solar wind hitting the comet. Earlier, this had been observed with Comet Encke too, when lei mass ejection occurred, due to such magnetic storms.Photographs interpreted by NASAs Swift Gamma-ray Explorer satellite in ultra-violet and X-rays show that Lulin is shedding 800 gallons of water every second. Observations by NASA also revealed that the surface material of the comet was burning away due to suns heat. This sighting of Comet Lulin was a once-in-a-lifetime luck for the whole world, as there is no possibility of this comet returning to the inner solar system, at least not for the next thousand years. Human kind has always looked to the heavens in awe and wonder, and sometimes in fear. Perhaps no other astronomical phenomenon except a check solar eclipse has historically elicited as much fe ar as comets. When the specter of fear is removed, however, they emerge as strikingly beautiful objects in the sky. It was once believed that if earth passed through a tail of a comet, its inhabitants would die this theory has been discredited.Comets are messengers from a time long past. Most are chunks of grubby ice, locked away in the Oort cloud for billions of years. (Oort cloud It is the source for long period comets, with orbital periods of greater than two hundred years.) Comets are familiar to more or less everyone as striking star like objects with long tails stretching across a wide band of the sky. The most famous comet, Halleys comet makes its return to the skies every seventy-five years. The word comet is derived from a Grecian word meaning long haired Comets were greatly feared before the twentieth century as bad omens. Since then, they have been identified and cataloged as objects that come from deep space. Most of them plight orbits that carry them far outside th e solar system. Many of them make only a single mount to the sun and never return again, while others exist in electrostatic, but highly elliptical orbits that provide them to return after an extended period of time, such as the Halleys comet.In 1986, the European space probe Giotto passed about 600 kilometers from the Comet Halley as it made its close approach to the sun. The probe verified existing theories that comets are made up of ices covered by black dust or soil. The spacecraft confirmed a theory that had been advanced prior to the reconnaissance that described comets as dirty snowballs. Using data taken by the spacecraft, scientists determined that the dust is composed of carbon, hydrogen, oxygen, and nitrogen. Other metals have also been discovered in comets, such as iron, calcium, nickel, potassium, tomentum and silicon. Halleys comet was one of the darkest objects ever seen in the solar system it was basically apartment black. Comets are composed of a concoction of ices and dust. As a comet approaches the sun, it absorbs the suns energy and warms up. The main body of the comet is called the nucleus. As the nucleus warms, the ice beneath the comets soil evaporates.Because the comet has no atmosphere, the evaporated substance (also called a volatile) escapes into the vacuum of space as a gaseous envelope that surrounds the comet called coma. As the coma grows, it forms a plume of vapor that carries away some of the comets surface as well. This mixture of evaporated volatile particles and dust is carried away from the comet by solar wind, is ionized by high-energy particles, and creates the spectacular tail of the comet. The comets tail, glowing in the solar wind, can stream behind the comet for millions of kilometers. The nucleus of the comet consists of mostly volatile ices and dust. The ice is nearly all water ice, but there is also evidence of ices composed of carbon dioxide and methane. more than elementary compounds of nitrogen, oxygen, an d carbon monoxide may exist as volatile ices.Comets are typically small bodies (comparatively). Halleys comet is a potato shaped object, 14 by 17 kilometers. The largest known comet is Chiron, which is estimated to be approximately 200 kilometers in diameter. Comets are thought to have formed as the solar system evolved. The material of which comets are composed was constructed by accretion at the outer frame in of the disk of material that ultimately became the sun and planets. Because the comet material was fashioned at the outer edge of the solar system, the sun did not evaporate the volatiles in the cometary material.At the same time, the giant planets of the solar system formed at what would become the outer orbits of the solar system. These massive planets encountered the newly formed comets, and the ones that were not engulfed by the giant planets were, over the first billion years, catapulted into interstellar space by the planets massive gravitational fields. not all come ts met that fate, however. Some were gently nudged into stable orbits closer to the sun. Others were flung into the inner solar system and impacted the inner planets.Relevance The study of comets involves detailed knowledge of its composition of the outer regions of the solar system and the space between the last planet and 100,000 astronomical units onwards. cometic study also seeks to understand convoluted gravitational interactions between bodies unaffectionate by wide distances and even gravitational interactions between tiny comets, their behavior when approaching the sun, and something of the establishment and evolution of the early solar system. New comets approaching the sun for the first time have been held in deep barricade in the Oort cloud and are thought to be composed of primordial material of the newly forming solar system. They have been laced up in the Oort cloud for billions of years at temperatures slightly above irresponsible zero. As they approach the sun, their internal gases begin to steam away. A detailed study of an approaching comet may tell cosmologists about the composition of the early solar systems. Comets and their approach have also hinted at the existence of the elusive browned dwarf, thought to be one of the most common bodies of interstellar space.Because they are so dim, they are all but invisible from Earth. On the other hand, because brown dwarfs are thought to be so plentiful, the study of comets and their orbits may give the first real clues to the formers reality and abundance. In the early eighties the existence of the galactic tidal action was merely speculation. Since then, careful study of cometary orbits and approaches has favorable supported the theory of galactic tides. In the close approach of Halleys comet by an unmanned spacecraft in 1986, a wealth of information was recovered on the shape, behavior, and composition of comets. The existence of the Oort cloud and the concept gravitational interactions b y notch objects in space have led to the theory of periodic comet showers. Such comet showers, separated by periods of tens of millions of years, may be responsible for the mass extinction on Earth.There is a wide speculation that Earth was struck by one or more comets 70 million years ago, which wiped out the dinosaurs. Some scientists have speculated that this extinction was the result of a shower of comets from the Oort cloud, sent on their close approach to the sun by a passing star or brown dwarf through the Oort cloud. Comets have been used to judge vast distances, evaluate the composition of the solar system as it was being born, and even test the idea that the gravity of the entire galax can make a discrepancy to the smallest objects in space.Comets have been used as yardsticks to evaluate what may be the most type of star in the galaxy-the brown dwarf-which ironically is one that may never be seen. They have also been called dirty snowballs. Halleys comet was so black tha t it was the darkest object ever seen in space. Yet, from these dirty specks of ice, cosmologists have witnessed some of the most spectacular light shows. Ultimately comets may also arrest clues to some of the most fundamental secrets about the solar system and planets. From these tiny messengers, cosmologists may unlock and examine pristine elements from creation itself.