Wednesday, November 27, 2019

Maintain energy during a long shift

Maintain energy during a long shift Is your typical workday more like a marathon than a short sprint? If you have a job with long work shifts- longer than the usual 9 to 5 workday- you’re not alone. A wide range of jobs, from nursing to truck driving and firefighting and many more, require workers to put in longer than average workdays. That’s a long time to have to be alert and at the top of your game. But fear not- there are ways to maintain your energy during a long shift. Make the most of the following strategies for staying sharp and keeping your edge in the face of a long day of work.Plan out your diet, exercise, and sleep.You need to prepare for a long shift well before the shift even starts. This includes getting a minimum of eight hours of restful sleep (keep those phones and other devices far out of grabbing range while in bed). Go to bed too late, or worse- lay in bed for hours on your phone, tablet, or laptop before closing your eyes- and you’ll surely be struggling to get through a lon g work shift the following day. The National Safety Council recently put out a study on fatigue in the workplace  that found that 43% of people don’t get enough sleep. Are you one of them?Maintaining a regular balanced diet is also a powerful way to keep your energy levels high and consistent- this includes what you eat when you’re off duty as well as on the job. Make sure that your diet includes plenty of high-quality protein and vegetables, and try to keep processed foods, refined carbs, and sugar to a minimum. Why is this so important? A diet high in protein helps your body maintain a consistent and reliable level of energy throughout the day. A diet high in sugar and refined carbs (think white bread, pastries, candy, and sugary sodas) will cause your blood sugar and energy levels to peak and plummet as the day drags on- like a rollercoaster. Ask yourself: Would you do your best work on a flat, even surface or on a rollercoaster?There are times when it’s ea sier than others to make healthy eating choices. Hunting for a work snack to give yourself some fuel during a long shift can be especially tricky. You may have a vending machine full of candy close by or a work kitchen full of sugary treats, but resist- and prepare! Be sure to pack some healthy snacks (fruits, nuts, and veggies are a better choice) and you’ll be setting yourself up for a solid energy boost that’ll get you through the workday.Many people have the wrong idea about exercise- they think it’s an energy drainer, and that working out will only make you tired when you’re through. However, the opposite is true! A fit and active lifestyle that includes plenty of exercise on a regular basis will help kick your metabolism into overdrive and boost your energy levels- perfect for getting through those long work shifts. Start small- try taking regular long walks and building upon your exercise routine a little at a time.Prep your workspace.A comfortable yet functional workspace designed to keep your energy levels consistently high will help you get through long work shifts. If you work at a desk, try to avoid a too-cushy office chair that makes you want to take a nap every time you sit down, and keep the energy-draining work distractions on your desk to a minimum. If you’re on your feet most of the time, be sure to wear comfortable shoes and make time to take regular seat breaks when feasible.The key here is balance- you want to create a balanced mix of comfort and functionality where you’re not sitting idly the entire time or on your feet for 12 hours straight. Also, flexibility is important- keep what works and change what doesn’t. Trial and error is an excellent tool to learn and plan, and a well-thought-out work area will help you stay energized during a long shift.Keep your brain alert and think positively.A healthy and alert brain will help keep you upbeat and energized throughout a long work shift. Keep your brain actively engaged in whatever work tasks you’re responsible for. Maintaining a checklist of action items that you need to take care of during your work shift can really help you stay focused, and as you check completed items off your list you’ll get a boost of positive vibes knowing that you’re taking care of business!When you feel yourself slipping, take a break. Strategic work breaks, even if it’s just for a few minutes to take a deep breath, stretch, and clear your head, can make a world of difference when you’re facing a long work shift. Don’t just push forward- this will have a negative effect on your overall energy level and mood.Never forget the power of positivity when you’re on a long work shift. Positive thoughts lead to positive actions- and positive work results! Actively thinking good thoughts, creating a positive mantra that you can repeat to yourself, and keeping items that elicit positive feelings or memorie s in your workspace (like photos or souvenirs of trips you’ve taken) are excellent ways to keep yourself upbeat and lively while you work.It can be a real struggle to get through a long work shift and stay alert and at the top of your game- add in all the other things going on in your life that eat away at your time and energy and you may be facing an uphill battle. However, if you employ the strategies mentioned here you’ll start to see positive changes before long, and soon that uphill climb of a long work shift will seem like little more than an easy-to-manage step!

Saturday, November 23, 2019

Obesity and Adolescent Development essays

Obesity and Adolescent Development essays In recent studies of obesity in adolescents and young adults, it seems that researchers had discovered many effects beyond the purely physical that make overweight an unhealthy thing. In fact, the psychosocial effects are quite devastating as well, but they are not caused directly by the state of being heavy; they are caused more often by the individual's perceptions, what he or she believes about the overweight status that causes the harm. There is no firm conclusion yet as to whether a single factor or multiple factors cause the obesity that in turn contributes to the poor self-image. Some researchers believe that the overweight condition itself caused by a self-fulfilling prophecy allied to the overweight condition. There is only one thing that has become accepted as certain, a truism coined by Alfred Adler and quoted by Hoover and Whitehead, 2000: Numerous children grow up in the constant dread of being laughed at. Ridicule of children is well nigh criminal. It retains its effect on the soul of the child, and is transferred into the habits and actions of his adulthood. Alfred Adler on feelings of inferiority, p. 71 (1932) Current research shows that, in fact, obesity is the number one cause of children being ridiculed. Being overweight is one of the five most common reasons that boys and girls identified for being bullied, according to Hoover and Whitehead. (2000) And, says Munson, for obese adolescents who are teased and bullied, obesity is often associated with psychological and behavioral symptoms, although she adds that whether pediatric obesity should thus be labeled a psychiatric disorder is debatable and insufficient work has been done in that area to make a call one way or the other. Between Adler's stringent belief that being laughed at causes distress to the soul of a human being, and Munson's...

Thursday, November 21, 2019

Thermodynamics Assignment Example | Topics and Well Written Essays - 500 words

Thermodynamics - Assignment Example The idea of making a bag that would keep the pizza hot for as long as it remains in it is built on the possibility of creating an isolated system. Once an isolated system is created, the first law guarantees that the energy (heat is a form of energy) will remain constant inside the system, which means whatever is in the bag will have a constant temperature, since temperature is a measure of heat. Another way to phrase the first law of thermodynamics is: "energy can neither be created nor destroyed," given that the isolated system is one that does not allow energy nor matter to cross its boundary it is easy to see how an isolated system can keep its temperature constant. Another way to put it is that energy's ability to do work always decreases. In terms of heat, work is done by heat's transition, and so for the energy's ability to do work to decrease (i.e. for entropy to increase) the systems would reach their maximum entropy when they have the same temperature, which would mean that they will no longer be able to exchange heat between them and therefore would not be able to do work. As isolated systems, the pizza bag's entropy increases, however the pizza bag and the surroundings together have an entropy that does not increase, this does not violate the second law of thermodynamics since it states that only entropy of an isolated system can increas

Wednesday, November 20, 2019

Wxy Article Example | Topics and Well Written Essays - 250 words

Wxy - Article Example The partly poor rents land and diversify their sources of income by working on low-wage jobs. The plainly poor have lowest paying jobs and are landless. The poorest of the poor are destitute, they have few assets and they are shackles (Norton). Beggars in Bangladesh are example of the poorest of the poor. Most percentage of the world’s rice is produced through irrigation farming but the remainder of the rice is grown in fragile rain-fed uplands, flood prone areas and rain-fed lowlands. 90 percent of world’s rice consumption and production is accounted by Asia. More than half of poor in Asia obtain 50 percent of their calories from the rice which is grown in fragile environments. Farmers in these fragile environments face submergence and drought, poor soils and diseases and numerous insects. Biotechnology research of rice is currently underway to address quality and quantity constraints in both fragile and favorable ecosystems for existing varieties of self

Sunday, November 17, 2019

William Kozol Essay Example for Free

William Kozol Essay In the article â€Å"Still Separate, Still Unequal† written by Jonathan Kozol, Kozol expose and expresses his concern of unequal treatment in the schools according to whether they are in an urban or suburban area. Using a series of reasoning and logic techniques, he then proves his argument that because of the segregation in schools, minorities are not receiving the same education and opportunities as predominantly white schools. Kozol uses statistic, one on one interviews with students and personal reflections to bring insight to the reader, and why he is asking for a change for equal opportunity. Right away Kozol uses statistic from city to city to grasp the readers attention. With doing so, he is showing the reader how â€Å"real life† this issue is. He uses statistics such as â€Å"In Chicago 87% of public-school enrolment was black or Hispanic; less than 10% was white. In Washington D.C., 94% black or Hispanic; to less than 5% white. In New York City, nearly three quarters of the students were black or Hispanic.† (41) to give the viewers an idea of how isolated the schools in the urban areas are. One teacher even stated how of all the years she’s been teaching she has only seen one or two Caucasian kids in her class. Throughout the article, Kozol goes on to compare the type of education that is being given in the urban schools to those of suburban. Also how they portray many of the schools to be diverse but in all reality there is no such thing. By the statistic given in the beginning of the article, that is merely enough proof to show there is no diversity in the schools today; which brings us to the main point of the article of schools being separate. Before we can even focus on the part of education, it seems as if the students were more focused on the appearance of their institutions. If an institution looks and feels great, then the students would be more encouraged to learn. Students should never have to bring forth asking questions like why don’t they have a garden, nice parks to play in, or why aren’t they using their gym for extracurricular but more so to just line up. In their minds, they should be entitled to these opportunities. Why? Because they see the schools in the suburban areas have these things, all the things that they don’t. Moving deeper along the issues that this article expose, he quotes an essayist and novelist by the name Marina Warner, and she states, â€Å"There are expensive children and there are cheap children.†(45) This simply opens up the argument that in order for your child to have a good education you must have a lot of money, and to have a lot of money you must fall somewhere between middle and upper class. Education is supposed to help us better our lives and enhance our ways of living. Therefore, educational opportunities should be equal for all no matter the age, race, or social status. Kozol uses his first hand experience with visiting schools and talking to teachers and students on how they feel about their education. Using quotes from the kids and the teachers, Kozol is helping us use our emotion to feel and understand where they are coming from. With him showing his sympathy and concern towards the issue, that same feeling began to overpower his audience. He even refers to court cases that eventually led minorities to experience education period (Brown vs. Board of Education and Plessy vs. Fergueson). Pathos and ethos are some of the persuasive techniques he uses heavily as the high school students who express to him â€Å"of the limited number of bathrooms that are working in the school, â€Å"only one or two are open and unlocked for the girls to use†. Long lines of girls are â€Å"waiting to use the bathrooms†, which are generally â€Å"unclean† and â€Å"lack basic supplies†, including toilet paper.†(51) There is enough to visualize that those are unlawful conditions that will raise a red flag with the readers. A lot of imagery and repetition is used by Kozol. More so repetition because everyone from a range of grade school to high school is raising the same concerns they have within the school system. From the type of education, to how it is being taught and also the appearance of the institution; which most feel that the appearance plays a big part in students being motivated. It seems Kozol chose his techniques very closely for the matter that his argument can come off much as a bunch of personal opinions. The breakdown of using statistic in the opening of the article played a major part of gaining the readers trust. From that point on, it would be trusted that anything that is stated is nothing but facts. Whether it’s from firsthand experience or acknowledged through third party. It’s pretty obvious that Kozol would like for something to be done about the issue so he targeted people who are educated and who would be willing to step in and help make a change. Works Cited Kozol, Jonathan. Still Separate, Still Unequal. Harpers Magazine (2005): 41-54.

Friday, November 15, 2019

My Personal Philosophy of Education Essay -- Philosophy of Teaching St

Philosophy of Education We are living in a moment of deep historical mutation in which traditional meanings are dissolving. This makes it necessary to re-think the certainties in which the Essentialist thinks. Bringing us back to the basics of life with core curriculum. My philosophy beliefs on education are based on Essentialism and Progressivism. Essentialism is grounded in a conservative philosophy that accepts the social, political, and economic structure of American society. While Progressivism has a respect for individuality, it is believed that people learn better through active interplay with others. Learning is increased when we engage in activities that have meaning in our lives. I have learned through the years that young children seem to be more vulnerable to learning through music, rhyming and dancing. I feel that it gives them a better grasp on the information, than just reading about the issues at hand. However, students still need to learn the essentials of academics. There are subsequently countless reasons to become an educator. Above all is to make a difference in at least one child’s life. Being an educator would allow me to go the extra mile so that I may shape, mold, and build character in the children. These are just a few of the reasons I would love to become an educator. The classroom will be filled with all the necessary items to make it an all- around great place of learning. The room will be filled with pastel colors to help the children stay focused and calm. It will include a weather board, days of the week and a sign language alphabet book. There will also be wall borders such as a number line, an alphabet line, a color line and the helpers of the day. There will be ... ...o do their best at all times, to stay on target and get help when needed so that they will not be left behind. As a teacher you must be a continuous learner. You can fulfill this by going to many lectures, night classes, in-service trainings, experience and from your mentor. Also, it is amazing how much you can learn from the students. They can assist the teacher with techniques, styles, discipline, and motivation in a classroom. The future professional developmental plans would be to improve individual skills, qualify for salary increases, and meet certification requirements. With completion of just these few things a teacher could get rewarded with personal and professional growth, job security, and career advancement. As an adult learner time needs to be set aside for learning. Adults need time to experience and digest new ideas and ways of working.

Tuesday, November 12, 2019

Multi-layered security Plan Essay

Hardware and software are key pieces of any organization’s infrastructure. Components in each domain of the seven domains of the IT infrastructure may connect to a network or to the internet, and can be vulnerable to malicious attacks. Malicious attacks on hardware and software can also lead to more widespread problems. These problems can include loss of critical data or theft of financial information or intellectual property. Unprotected IT and network infrastructure assets can offer attackers and cybercriminals the widest opening to access sensitive resources. The ease of access makes assets that are connected to the internet the most common first point of attack. That means those assets should be you first line of defense. Technical failure and human error are the most common causes of unintentional downtime. Malicious attacks can occur and cause downtime in all seven domains of an IT infrastructure, but you are more likely to see them in the User, Workstation, LAN, and WAN domains. Opportunity cost is the amount of money a company losses due to downtime. The downtime can be either intentional or unintentional. Some organizations refer to opportunity cost as true downtime cost. It usually measures the loss of productivity experienced by an organization due to downtime. One of the most important things that information security professionals try to protect is their organization’s reputation and brand image. Companies that suffer from security breaches and malicious attacks that expose any assets are likely to face serious negative consequences in the public eye. In the popular usage and in the media, the term hacker often describes someone who breaks into a computer system without authorization. In most cases that means the hacker tries to take control of a remote computer through a network, or software cracking. The media and the general public also use the word hacker to describe anyone accused of using technology for terrorism, vandalism, credit card fraud, identity theft, intellectual property theft, or one of many other forms of crime. Protecting an organization’s computing resources requires that you have some idea what tools your enemy will be using. Knowing how attackers work makes it possible to defend against their attacks. Many organizations use the same tools that attackers use to help identify weaknesses they need to address and it is better to do so before an attacker does. Computer criminals and malicious individuals use a number of hardware and software tools to help carry out attacks. These tools and techniques include: Vulnerability scanners, Port scanners, Sniffers, War dialers, and Key loggers. As with most technology requirements, it is impossible to cover all of your organizational needs with a single machine or program. By the same token, haphazardly bolting together a number of unrelated solutions leaves cracks that only get bigger as time goes on. What’s required is a multi-layered, company-wide approach in which integrated products complement and reinforce each other. In multilayered Network intrusion detection Systems (NIDS) is the first level of protection against remote intruders. NIDS monitor all the communications that come in to and stop those that look suspicious. This prevents hackers from overloading your server with Denial of Server (DOS) attacks and scanning your ports for vulnerabilities. Next comes the firewall which only legitimate communications (e.g. email, password certified remote users) are permitted to go through the firewall. This prevents unauthorized users from logging into or using your network. Then comes Email Scanning, while an email is technically an authorized form of communication, it may contain objectionable content (pornography, confidential information, overly large files, etc.). This software scans the contents of the email and rejects those that violate your company policies. Internet Security similar to email, a web site is technically an authorized form of communication. However only certain web sites and downloads are appropriate for the workplace. This software uses internal criteria to limit the sites that can be visited, and scans what is downloaded. After that comes Server Level Virus Scanning which is a strong anti-virus program with updated signature files checks for viruses on every file that is saved to the server and protects against them. This is particularly important for email servers, such as those running MS Exchange. Workstation Virus Scanning: Not every file is saved on the server. Files from a number of sources – including those from infected floppy disks or downloaded off the internet – are put directly on the local workstation, which therefore requires its own Anti-Virus software. Update Communication Software: From time to time, prospective intruders and virus writers find vulnerabilities in popular types of communication software, such as Microsoft Outlook. When those holes are discovered software fixes or â€Å"patches† are made to close the vulnerabilities. It is therefore necessary to be diligent about being aware of these updates and applying them to the software. THE BEST DEFENSE: – Attentive Employees and Corporate Policies: We can implement many effective technological solutions, but the most essential piece of a secure business is a company of people who understand the various dangers and the role they play in preventing them. One regularly quoted statistic is that 80% of security breaches come from inside the company. Strong security requires strong corporate policies, clear management dedication, and good employee education about risks. 1) General This MLS plan will give a brief overview of the security strategies that will be implemented at each level of the IT infrastructure. 2) User Domain a. The usage of security awareness training to instruct employees of Richman Investments security policies b. Auditing of user activity 3) Workstation Domain a. The usage of antivirus and anti-malware programs on each user computer b. Strict access privileges to corporate data c. Deactivation of media ports 4) LAN Domain a. Utilizing network switches b. WPA 2 encryption to wireless access points c. Securing server rooms from unauthorized access 5) LAN to WAN Domain a. Closing off unused ports via a firewall to reduce the chance of unwanted network access b. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent c. Run all networking hardware with up to date security patches, and operating systems 6) WAN Domain a. Enforce encryption, and VPN tunneling for remote connections b. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks c. Enforce anti-virus scanning of email attachments i. Isolate found malicious software (virus, Trojans, etc.) when found d. Deployment of redundant internet connections to maximize availability 7) Remote Access Domain a. Establish strict user password policies, as well as lockout policies to defend against brute force attacks b. Require the use of authorization tokens, have a real-time lockout procedure if token is lost, or stolen c. Encrypt the hard drives of company computers, laptops and mobile device to prevent the loss of sensitive data

Sunday, November 10, 2019

Deborah Tannen’s Theory Essay

In contemporary society biological factors are no longer the sole components that distinguish men and women. Rather anything from clothing or hairstyles to make-up or accessories can indicate specific messages about an individual. According to Deborah Tannen, women are more frequently considered marked beings in our society while men have fewer clothing or style options and are therefore free to remain unmarked. Although Tannen argues that it is possible for men to remain purely â€Å"unmarked† her assertions do not hold up well in a changing world. Because the term â€Å"marked† is a social construction, it is not possible to remain completely unmarked, as styles and trends repeatedly change with different ages, generations, and geographic locations. In her study Tannen reveals that among four women and eight men present during a business meeting the women had several more features to observe compared to one another. However, Tannen’s conclusions seem partially invalid for her findings are based on only one particular event. In a business-like environment, it is more likely to find conservatively dressed men with less notable markings than women. Even though women may not only be identified based on their apparent style but also how they choose to present themselves. (i.e. Baggy clothes vs. tight clothes, make-up vs. no makeup). In general, Tannen’s findings appear questionable mainly because her approach when defining a â€Å"marked† individual seems limiting. For example, Tannen would call a man wearing a shirt a marked individual. However, it is quite common for men in Scotland to wear skirts. Without ever considering these geographic differences, Tannen makes bold assumptions based on her own biases. When speculating a specific sub-culture such as the generational â€Å"rave†/dance culture, Tannen’s argument holds no validity. Clearly both men and women in this culture wear similar styles of clothing and accessories that are in essence, uni-sex. While piercings and jewelry might â€Å"mark† a man in society such stylistic choices are considered quite common and acceptable among â€Å"ravers†. Similarly women who wear baggy clothes and baseball caps are not â€Å"marked† as less feminine than those who wear tighter clothes and make-up within this sub-culture are. According to Tannen, â€Å"each of the women at the conference had to make decisions about hair, clothing, make-up and accessories and each decision carried meaning†¦. men can choose style that are marked but they don’t have to, and in this group none did.† (231-2). Although Tannen makes the distinction between the style of men and women at a business conference, she fails to mention that their age and field of work influences what should be â€Å"marked vs. unmarked† and what styles appear appropriate vs. inappropriately. Clearly, Tannen states that all four women are marked yet some are considered more severely marked and judged than others are. Specifically, the women with the long, blond, hair, dressed in tight clothing and heels were more severely marked in Tannen’s eyes. However, Tannen never mentions that in another profession, such as the entertainment or fashion industry, the women style might be considerable less marked than an individual dressed more simple and conservatively. In conclusion, the assumptions that Tannen makes in her article infer that men in society can remain unmarked. Although men are objectified and sexualized less than women this does not mean that they are not in the public eye. Tannen’s view on today’s â€Å"marked† society is based truly on her opinion. She omits geographical, generational and age differences when making her conclusion.

Friday, November 8, 2019

Potato extract essays

Potato extract essays From the results we have, our group has concluded that the entire hypothesis were correct. When there is less of the potato extract, the reaction time is slower. When there is more of the potato extract, the reaction time is faster. We also concluded that when the amount of the enzyme is changed then the reaction rate is faster. Most of the hypothesis that I thought of was correct. The Lab was pretty fun. At the same time it was really challenging. My partner did not do anything. I figured out without the graphs or class averages you could not be positive of what happened The materials we used to do our lab are the following, a 400ml beaker of distilled water, two 10ml graduated cylinders, and two 25ml graduated cylinders, two 50ml graduated cylinders, two 100ml beakers, one pair of scissors and a stopwatch. The first procedure of the experiment was make five different percentages of solution of potato extract, which were, 0%, 25%, 50%, 75% and 100%. The next thing we did was cut ou t fifteen penny sized filter paper disks for the three trials for each percent of solution. Next, we placed a filter paper disk into each percent of solution; we repeated this three times to get three trials. After placing a filter paper disk into the solution, we placed the disk on a paper towel to remove any excess liquid, and then transferred the filter paper disk to the bottom of the beaker with the hydrogen peroxide. We then timed how long the filter paper took to rise to the top of the beaker. After timing all the trials for all the solution percents, we put the times on a chart and made their averages. My Lab is about the function of enzymes. Enzymes are catalysts; they speed up chemical reactions without being used in the reaction. A lot of Enzymes have protein in them. In living things, enzymes speed up chemical reactions, which allow lining things to carry out many different chemical feats. We are working with the enzyme: potato extract. Our hypot...

Tuesday, November 5, 2019

How I Funded My Mission, Wrote My Book and Made Bulk Book Sales with Grants

How I Funded My Mission, Wrote My Book and Made Bulk Book Sales with Grants I started with a heart centered mission and a newly published book, How to Raise Respectful Parents: Better Communication with Teens and Parents. Like all new authors, I was proud of it, but I soon learned writing and publishing a book are only half the journey. I had to market, and I wanted to market it to those who needed my message the most. Grant writing is my day job. I knew funds were available for the kind of materials and workshops I wanted to offer. Often authors think that they can only apply for grants directly to fund themselves as writers to write their book. While that is possible; it’s rare and highly competitive. I sought a large entity/business with which my mission aligned with theirs: the school district. I offered to write grants for school programs for FREE. Yes, for FREE! In exchange for this service, I requested that I be allowed to write my workshops and books into the grant budget. School programs hurt for time and dollars. Since there was no expenditure of time and effort on the part of their personnel, they agreed. First Grant to Write the Book I interviewed the parent engagement coordinator and learned about the unique aspects of her program. I suggested that I use my expertise to better train her parent educators. I was delighted when she said, â€Å"yes.† I wrote a small grant to a local private family foundation and they funded us. I was hired under the grant to conduct training for the school district’s parent educators. The development of those training materials became the basis of my first book. In effect, I wrote the first draft of my book with grant funds while providing a needed service to the school partner. Second Grant with Surprise Bulk Book Sales The second grant funding for my mission came through an existing afterschool program grant. Because of the positive relationships built during the first grant funded opportunity, I negotiated the opportunity to provide a series of teen and parent communication workshops funded through their afterschool grant. I shared that I was willing to donate 10 copies of my book for the workshop. The project coordinator liked the book and decided to purchase more copies. She ordered enough for each family in the workshop a total of 50 books! Just like that, I made my first bulk book sale. Ripple Effects Since my initial success, I’ve helped two author friends find grant funding for their heart- centered missions. I interviewed them and wrote grant proposals for each. One friend funded bulk book sales with her grant template and the other friend funded her one woman show with writing workshop materials with a grant proposal. As a result, I have been asked to write a book about grant writing for authors. The Quick Start Guide to Grant Writing will be released in 2018.

Sunday, November 3, 2019

List a phobia and explain the systematic desensitization of a phobia Essay

List a phobia and explain the systematic desensitization of a phobia - Essay Example ty disorders, and consists of teaching those who suffer from it coping strategies, establishing a hierarchy of stimuli that cause the phobic fear and then progressively and gradually exposing them to the thing they fear (Wikipedia, n.d; Rainey, 1997). When people suffer from irrational fear such as height, they tend to avoid the thing they fear. Since theyre avoiding it, their anxiety level reduces and the reduction of the fear is reinforced by negative reinforcements. Instead of this, the systematic desensitization first teaches how to reduce the levels of anxiety and fear by cognitive strategies that help control the fear rather than letting it build up inside until it becomes unbearable. These strategies can be meditation, thinking happy thoughts, concentrating on breathing and more. Having been taught how to relax and reduce their anxiety, the phobic person will be exposed to the object of his fear gradually, by first being able to talk about it, then seeing a picture illustrating the situation or thing he fear, then experiencing something similar, and finally by experiencing it. One common fear is the fear of flying. Many people think it is extremely dangerous to fly airplanes since it is high in the air and the plane can crash. These people view the experience of flying as terrifying and something which they can never do, seeing as how it completely paralyzes them. Accordingly with the systematic desensitization, the therapist will first teach the patient different ways to relax, like the ones previously mentioned. Relaxation is very important when discussing this fear, because unlike other fears from animals or other objects, flying a plane can last hours, and in this case, it is crucial to be able to fully relax. Then, having established the stimuli which cause the phobic episodes, the therapist will start with the least anxiety-provoking stimulus and gradually move on to the next one, until all of the items listed on the anxiety hierarchy have been

Friday, November 1, 2019

Project Statistics Example | Topics and Well Written Essays - 1250 words - 1

Statistics Project Example The base cost is inclusive of all cost that are associated with making the machine operational and they include purchase cost, set up cost, installation cost, tax, shipping and freight among others. The residual value is the value the firm expects to sell the asset after its useful life and is also referred to as scrap value. The estimated useful life is the period the asset is expected to be used by the firm (Kimmel and Jerry, 35). a) Assets tend to loss value faster in their first year of operation hence the net book value of the asset in the initial years may not be a true reflection of its market value. If the asset is used as collateral for a loan, the bank may value it differently and hence there will be a variance in value assigned. Depreciation of the asset will be based on usage of the asset or the units being produced per period. Therefore, in the year where the asset will be used extensively, the depreciation allocation will be higher and will be low when production is low. The depreciated value is calculated based on the expected total amount of units it can produce in proportion to the cost basis less residual value. No depreciation is charged the year, which the asset is not in use. This will provide the depreciation of the asset per unit produced. The expected units multiply this for each period to find the amount of depreciation to charge that year and less from the current net book value to find the end year book value of the asset (Kimmel and Jerry, 36). It is an accelerated depreciation method where the majority of the depreciation is allocated in the first years of the asset useful life. It is most appropriate for charging depreciation to asset that loss value fast during their first years and when the company want to shift profit recognition to the future. The depreciation is calculated by multiplying the rate of straight-line depreciation by two and then this is multiplied by the net book value