.

Friday, November 29, 2019

6 Steps to Mastering the Theoretical Framework of a Dissertation

6 Steps to Mastering the Theoretical Framework of a Dissertation As the pivotal section of your dissertation, the theoretical framework will be the lens through which your readers should evaluate your research. Its also a necessary part of your writing and research processes from which every written section will be built.In their journal article titled Understanding, selecting, and integrating a theoretical framework in dissertation research: Creating the blueprint for your house, authors Cynthia Grant and Azadeh Osanloo write:The theoretical framework is one of the most important aspects in the research process, yet is often misunderstood by doctoral candidates as they prepare their dissertation research study. The importance of theory-driven thinking and acting is emphasized in relation to the selection of a topic, the development of research questions, the conceptualization of the literature review, the design approach, and the analysis plan for the dissertation study. Using a metaphor of the blueprint of a house, this article explains the appl ication of a theoretical framework in a dissertation.Administrative Issues JournalThey continue in their paper to discuss how architects and contractors understand that prior to building a house, there must be a blueprint created. This blueprint will then serve as a guide for everyone involved in the construction of the home, including those building the foundation, installing the plumbing and electrical systems, etc. They then state, We believe the blueprint is an appropriate analogy of the theoretical framework of the dissertation.As with drawing and creating any blueprint, it is often the most difficult part of the building process. Many potential conflicts must be considered and mitigated, and much thought must be put into how the foundation will support the rest of the home. Without proper consideration on the front end, the entire structure could be at risk.Your theoretical framework is the blueprint for your entire dissertation and will guide you during the process of writing it. Photo by Daniel McCullough on Unsplash.With this in mind, Im going to discuss six steps to mastering the theoretical framework section- the blueprint for your dissertation. If you follow these steps and complete the checklist included, your blueprint is guaranteed to be a solid one.Complete your review of literature firstIn order to identify the scope of your theoretical framework, youll need to address research that has already been completed by others, as well as gaps in the research. Understanding this, its clear why youll need to complete your review of literature before you can adequately write a theoretical framework for your dissertation or thesis.Simply put, before conducting any extensive research on a topic or hypothesis, you need to understand where the gaps are and how they can be filled. As will be mentioned in a later step, its important to note within your theoretical framework if you have closed any gaps in the literature through your research. Its also importan t to know the research that has laid a foundation for the current knowledge, including any theories, assumptions, or studies that have been done that you can draw on for your own. Without performing this necessary step, youre likely to produce research that is redundant, and therefore not likely to be published.Understand the purpose of a theoretical frameworkWhen you present a research problem, an important step in doing so is to provide context and background to that specific problem. This allows your reader to understand both the scope and the purpose of your research, while giving you a direction in your writing. Just as a blueprint for a home needs to provide needed context to all of the builders and professionals involved in the building process, so does the theoretical framework of your dissertation.So, in building your theoretical framework, there are several details that need to be considered and explained, including:The definition of any concepts or theories youre building on or exploring (this is especially important if it is a theory that is taken from another discipline or is relatively new).The context in which this concept has been explored in the past.The important literature that has already been published on the concept or theory, including citations.The context in which you plan to explore the concept or theory. You can briefly mention your intended methods used, along with methods that have been used in the past- but keep in mind that there will be a separate section of your dissertation to present these in detail.Any gaps that you hope to fill in the researchAny limitations encountered by past researchers and any that you encountered in your own exploration of the topic.Basically, your theoretical framework helps to give your reader a general understanding of the research problem, how it has already been explored, and where your research falls in the scope of it. In such, be sure to keep it written in present tense, since it is research th at is presently being done. When you refer to past research by others, you can do so in past tense, but anything related to your own research should be written in the present.Use your theoretical framework to justify your researchIn your literature review, youll focus on finding research that has been conducted that is pertinent to your own study. This could be literature that establishes theories connected with your research, or provides pertinent analytic models. You will then mention these theories or models in your own theoretical framework and justify why they are the basis of- or relevant to- your research.Basically, think of your theoretical framework as a quick, powerful way to justify to your reader why this research is important. If you are expanding upon past research by other scholars, your theoretical framework should mention the foundation theyve laid and why it is important to build on that, or how it needs to be applied to a more modern concept. If there are gaps in the research on certain topics or theories, and your research fills these gaps, mention that in your theoretical framework, as well. It is your opportunity to justify the work youve done in a scientific context- both to your dissertation committee and to any publications interested in publishing your work.Keep it within three to five pagesWhile there are usually no hard and fast rules related to the length of your theoretical framework, it is most common to keep it within three to five pages. This length should be enough to provide all of the relevant information to your reader without going into depth about the theories or assumptions mentioned. If you find yourself needing many more pages to write your theoretical framework, it is likely that youve failed to provide a succinct explanation for a theory, concept, or past study. Remember- youll have ample opportunity throughout the course of writing your dissertation to expand and expound on these concepts, past studies, methods, and hypotheses. Your theoretical framework is not the place for these details.If youve written an abstract, consider your theoretical framework to be somewhat of an extended abstract. It should offer a glimpse of the entirety of your research without going into a detailed explanation of the methods or background of it. In many cases, chiseling the theoretical framework down to the three to five-page length is a process of determining whether detail is needed in establishing understanding for your reader.Reducing your theoretical framework to three to five pages is a process of chiseling down the excess details that should be included in the separate sections of your dissertation. Photo by Mike Kenneally on UnsplashUse models and other graphicsSince your theoretical framework should clarify complicated theories or assumptions related to your research, its often a good idea to include models and other helpful graphics to achieve this aim. If space is an issue, most formats allow you to i nclude these illustrations or models in the appendix of your paper and refer to them within the main text.Use a checklist after completing your first draftYou should consider the following questions as you draft your theoretical framework and check them off as a checklist after completing your first draft:Have the main theories and models related to your research been presented and briefly explained? In other words, does it offer an explicit statement of assumptions and/or theories that allows the reader to make a critical evaluation of them?Have you correctly cited the main scientific articles on the subject?Does it tell the reader about current knowledge related to the assumptions/theories and any gaps in that knowledge?Does it offer information related to notable connections between concepts?Does it include a relevant theory that forms the basis of your hypotheses and methods?Does it answer the question of why your research is valid and important? In other words, does it provide scientific justification for your research?If your research fills a gap in the literature, does your theoretical framework state this explicitly?Does it include the constructs and variables (both independent and dependent) that are relevant to your study?Does it state assumptions and propositions that are relevant to your research (along with the guiding theories related to these)?Does it frame your entire research, giving it direction and a backbone to support your hypotheses?Are your research questions answered?Is it logical?Is it free of grammar, punctuation, spelling, and syntax errors?A final noteIn conclusion, I would like to leave you with a quote from Grant and Osanloo:The importance of utilizing a theoretical framework in a dissertation study cannot be stressed enough. The theoretical framework is the foundation from which all knowledge is constructed (metaphorically and literally) for a research study. It serves as the structure and support for the rationale for the study, the problem statement, the purpose, the significance, and the research questions. The theoretical framework provides a grounding base, or an anchor, for the literature review, and most importantly, the methods and analysis.Administrative Issues Journal

Monday, November 25, 2019

The Nation Takes Shape Essays - Midwestern United States

The Nation Takes Shape Essays - Midwestern United States The Nation Takes Shape The Nation Takes Shape by Marcus Cunliffe published by the University of Chicago Press 1789-1800 Bobby Earl Ms. C. Love February 12, 1998 The period of time from 1789 to 1839 was an age of growth for the United States of America; the United States grew bigger and better in general, it expanded into the West, and its commerce and industry also grew substantially. This is in part because of the great political leaders such as George Washington, Thomas Jefferson, and Andrew Jackson, but also in part of growing national pride and the yearning to become a successful nation. America grew larger and improved greatly in the first half century of its life. The territory of the United States tripled in size as America bought large amounts of property from other nations, and the number of the states in the Union doubled. The population doubled twice from around four million people to almost sixteen million people, and by the year 1840 rolled around. American exports also quadrupled in size to about $80 million dollars in profit. The national debt from earlier years was completely paid off in this time period; a feat that has not been accomplished since. An Army and Navy were established to protect the country, and judiciary, legislative, and executive departments of the government were formed with the ratification of the Constitution of the United States of America. Transportation became much easier in America by 1840. Approximately 2500 miles of canals and 3000 miles of railroads had been constructed. Harbors, lighthouses, and dry docks had also greatly incr eased in number to aid the seafarers. In the first fifty years of its history, almost all parts of America grew enormously, from schools to post offices to forts. America was a becoming a stronger nation in a world of giants. Another area of American growth was the West. As the Constitution was being signed, virtually no one lived on the western side of the Appalachian mountains. The Louisiana Purchase doubled the United States in size, however, and people soon started to expand into the empty space. At first, the thirteen original states argued over land boundaries from the colonial times. Eventually, they all ceded the controversial land to the United States government. The American government soon issued the Northwest Ordinance to deal with the land in the northwest. The ordinance divided up the territory into townships of thirty-six square mile sections. Each square mile would be sold at about $640. The ordinance also set the requirements the territory had to meet to be given a non-voting representative in Congress and to be eligible for statehood. The Northwest Ordinance also outlawed slavery in the Northwest Territory. There were other residents of this territory, however. Many Native Americans were pushed out after Mad Anthony Wayne defeated them at Fallen Timbers. Also, Jay's Treaty prevented the British from intervening in the Northwest Territory any longer. This eradication of non-Americans left room for many more people to move west and gave them a more secure feeling of safety. There were quite a few more reasons that people wanted to move out west. One of the reasons was because of the lack of farming land in the east. In the Northeast the soil was too rocky and poor to be able to sustain profitable farms. In the middle states, the soil was being eroded away; the tobacco plantations were ruining the soil in the South. Another reason was because the ideal of Manifest Destiny, the belief that the United States should reach from coast to coast, was becoming more popular. For these reasons and more, the population in the West grew rapidly, and the empty territories quickly became states. Another area in which America grew considerably was in commerce and industry. Before the Revolution, the colonies and Britain had established a relationship in which the colonies would export many raw products to Britain, and Britain would export many finished products to America. After the Revolution, Britain remained the United States' most valuable trading partner, but America also opened up to some new foreign markets, such as those in Latin America, the Mediterranean, and the Far East, areas economically controlled by major European powers. Between the years of 1793 to 1815, wars raged

Thursday, November 21, 2019

Experiment 8 formal report Lab Example | Topics and Well Written Essays - 1250 words

Experiment 8 formal - Lab Report Example Data analysis will involve determination of copper’s concentration using Beer-Lambert law. During the analysis, relevant graphs and calibration curves will feature in establishing the relationship between experimental variables. In addition, relevant statistical tests, especially the t-test well are used in detecting significant differences between absorbance by reference and sample solutions. Discussion of results will lead to eventual conclusion regarding the amount of copper metal in a penny. Technically, penny coins comprise of copper, zinc and metals in different proportions. In the past, copper metal was cheap; hence was used primarily in manufacture of coins. After 1980, copper metal became valuable and rare. Therefore, coin manufacturers used only copper coating in pennies and used primarily zinc in making the bulk part of the coins. With increasing value of copper, the metal’s composition in a coin keeps changing. The only way to determine the metal’s proportion today is to carry out quantitative analysis using reliable analysis methods like molecular spectroscopy. Concentration and hence the quantity of a metal species within a mixture is determined through molecular spectroscopy. This means that metals contained by a penny must be converted into molecular species in order to employ spectroscopic analysis. Fortunately, copper and zinc form molecular species with different colors. Copper form deep-blue ions while zinc form colorless species (Smith 45). The variation in ionic colors for the two penny components forms the basis of spectroscopic differentiation between copper and zinc. In this context, both copper and zinc must be converted into their ionic species with distinct colors before proceeding with subsequent steps of the experiment. This explains why the experiment’s procedure involved dissolution of a penny in nitric acid. Chemically, zinc is more reactive than copper.

Wednesday, November 20, 2019

Federal Bureau of Prisons Research Paper Example | Topics and Well Written Essays - 1750 words

Federal Bureau of Prisons - Research Paper Example Whatever the intended function of prison is, the reality is that they perform a role in our society. We have the need to feel safe from people who would do us harm. Many commit crimes at the state level, so are sentences to local jails or state prisons. Others, however, wrong the country as a whole, and not just a given segment of society. For this offenders, the federal government has set up an elaborate system of prisons across the country divided into six different regions. The purpose of the Federal Bureau of Prisons is to â€Å"Protect society by confining offenders in the controlled environments of prison and community-based facilities that are safe, humane, cost-efficient, and appropriately secure, and that provide work and other self-improvement opportunities to assist offenders in becoming law-abiding citizens† (Roberts, 1997, p. 53). The purpose of this paper is to explain the function of the federal prison and to examine the actually effectiveness of its various pro grams and policies. History and Policies Established in 1930, the Federal Bureau of Prisons has stated its policy to provide more progressive and humane care and treatment for Federal inmates sentenced to serve time (Roberts, 1997, p. 53). ... 53). As one can see, this is quite an elaborate system of institutions, and each is governed by a nationalized set of policies designed to keep everything running smoothly throughout the country. Currently, the federal prisoner system is designed to care for about 219,000 inmates. Policies dictate that each inmate who is incarcerated is done so in order to order to ensure public safety. At the same time, the facilities that the inmates are housed in are designed to be safe, humane, cost efficient, and secure to the level required by each individual offender. Security Levels Just as with state and local prisons and jails, there are various levels of security existent in the Federal Bureau of Prisons. The system is made of five distinct security levels. The goal in this division is to confine offending prisoners in a manner appropriate to their individual circumstance and crime committed. Each level has different features related to the number and presence of external patrols, towers, security barriers, or detection devices (Fliesher, 1998, p. 11). Each level of confinement will also typically have different types of housing within the institution, certain security features, and a different staff-to-inmate ration. It is also interesting to note that each institution in the federal system is designed to house a different security level as needed depending on the space available and the needs of the population (Fliesher, 1998, p. 11). The lowest level of security in the Federal Bureau of Prisons is minimum security. Prisons of this type are also known as Federal Prison Camps and typically have dormitory type housing, a low staff-to-inmate ration when compared to other

Monday, November 18, 2019

U.A.W. v. Johnson Control, Inc., 499 U.S. 187(1991) Essay

U.A.W. v. Johnson Control, Inc., 499 U.S. 187(1991) - Essay Example m that the respondent’s policy has created facial classification at the work place that is based on gender which discriminates against women on the basis of their gender (Becker 43). After some of the pregnant employees in a battery manufacturing became pregnant while maintaining blood lead levels, the company implemented a policy which barred all fertile women from the job. The affected employees filed a case in the district court claiming the policy constituted sex discrimination which violates the 1964 civil rights act. The court of appeal affirmed that despite the risk the company’s policy is discriminative. The holding of the court was that women should be given equal opportunities as men in the working place regardless of the risks since baring women from some positions is discrimination based on gender. Excluding fertile women or women with child bearing capacity from lead exposed job positions encourages facial classification that is based on gender and this this discriminates against the female employees with regard to their sex under 703 a of title VII The company’s lawyer argued that the safety of employees and their offspring should also be a major concern of the companies and the Johnson holding company was accepted to take the actions it took. He argued that the policy was not based on gender but the safety of the workers (Becker 44). In my opinion the company should only bar pregnant women from the jobs since the lead component is more hazardous to the foetus. There is evidence that the lead levels found in eight pregnant women was potentially harmful to the baby. The company barring all fertile women is sexually discriminative as by doing so it will be favouring the male

Saturday, November 16, 2019

Cyber Bullying Is Growing Rapidly Psychology Essay

Cyber Bullying Is Growing Rapidly Psychology Essay Although bullying has been around for centuries, it has only been in the past twenty years that researchers have tried systematically to measure bullying (Kowalski, Limber, Agatston, 2008). In 2001, the first study of bullying in the United States was conducted with more than 15,000 students in grades 6 through 10 (Kowalski, Limber, Agatston, 2008; Nansel, et al., 2001). Tanya Nansel and her fellow researchers found that, within a single school term, 17% of children and youth said they had been bullied sometimes or more often, and 19% had bullied others sometimes or more frequently and 6% said they had been bullied and had bullied others sometimes or more often. In 2005, David Finkelhor and his colleagues conducted telephone interviews with children and parents, and found that 25% had been teased or emotionally bullied during the previous year (Kowalski, Limber, Agatston, 2008; Finkelhor, Ormrod, Turner, Hamby, 2005). The researchers estimated that 13.7 million children and youth were physically bullied and 15.7 million were teased or emotionally bullied each year in the U.S.(Kowalski, Limber, Agatston, 2008). The massacre at Columbine High School in 1999 seems to have been pivotal in focusing attention on bullying in the United States. Although the specific motivations for this (or other school shootings) may never be fully understood, retrospective accounts in the popular press and in the research literature pointed to bullying as a contributing factor in many of these crimes (Kowalski, Limber, Agatston, 2008; Limber, 2006; Fein, et al., 2002). A search of the Lexis/Nexis database using the search terms bullying and schools demonstrates how much school attention to school bullying has changed in recent years within the United States. In 1998, the year prior to the Columbine shootings, school bullying was in the headlines of American newspapers, magazines, and other popular press periodicals 145 times. The following year, the number of articles on school bullying doubled, and, in 2001, shot to more than 750. There has also been an increase in attention to bullying among researchers since that time. In a search of the Psych Info database using bully or bullying as search terms, there were only five publications in 1990. By 2000, the number increased to 94. In 2004, there were nearly 250 such publications. Cyber bullying wasnt even an issue in the 1990s. However, with advances in technology, children are now exposed to a new form of bullying cyber bullying (Kowalski, Limber, Agatston, 2008). Cyber bullying occurs only between minors. If an adult is involved, the behavior is labeled cyber harassment or cyber stalking (Kowalski, Limber, Agatston, 2008). Much of the attention in the popular press and professional literature has focused on sexual predators that seek out their victims through online venues such as Facebook and Myspace. The same cannot be said of cyber bullying. Significantly less attention popular, academic, and/or legal has been devoted to the topic of cyber or electronic bullying. The reality, however, is that the majority of children are more likely to be targeted by a person who cyber bullies than by a stranger they have met on the Internet who is trying to arrange an offline meeting(Kowalski, Limber, Agatston, 2008). In 2005, it was estimated that 17 million adolescents aged 12 to 17 use the internet, and 74 percent of teens IM (Lisante, 2005; TEXAS STUDY, 2009). Today, 87% of U.S. teens use email and 93% use the internet (Jacobs, 2010). WHAT TYPES OF CB ARE OCCURING THE MOST? Although traditional bullying is still more common, cyber bullying is increasing rapidly. Cyber bullying may occur through phone calls, text messaging, email, picture and video clips, instant messaging, web sites, and chat rooms. The number of people who own a cell phone is on the rise. There are a number of ways that cell phones can be used in bullying. Cell phones are a popular device used to cyber bully because unlike computers, cell phones are typically left on when not in use. When someone is done using a computer, they generally shut it off. Cell phones, however, are left on all hours of the day. The fact that cell phones are portable allows the bully to make contact with the victim throughout the day. Cyber bullies may use text messaging to attack their victim or they may use digital photos. Many bullies will call and leave abusive messages for the victim also. Since most cell phones have a built in camera, it is easy for the bully to use photos as another form of bullying. Bu llies may capture their victims changing in a locker room or using the bathroom. They can then disseminate these photos to others to embarrass their victim. Another form of bullying is called happy slapping. Happy slapping typically occurs when embarrassing images of someone are caught on a camera or on a camera phone. Many times, the person is not aware that they are being recorded. In many instances, these recordings may be set up and planned out. In April 2008, the beating of a 16-year-old girl was videotaped by other female students. The incident sparked outrage after the bullies posted the video on MySpace and YouTube. The victim suffered a concussion, damage to her eye and ear, and numerous bruises. Eight girls faced charges of felony battery and false imprisonment for the attack on a fellow teen. This event sparked national outrage brought to light the importance of educating youth on teen bullying. Cyber bullying also occurs regularly in chat rooms. Most victims of cyber bul lying say abuse occurs in chat rooms, where people who are in the room send and receive messages, called chatting. People inside chat rooms generally use screen names, or nicknames, and all the screen names of people in the chat room are listed on each users screen. A person can read messages from others in the chat room, and type and send his or her message as a reply. What someone types instantly appears on the screen as part of the chat (Breguet, 2010). Another form of cyber bullying that can occur is by exclusion. If a person is intentionally left off of a buddy list, in order to have their feelings hurt, then they have been cyber bullied. These chat rooms not only exist on the computer, but in video gaming as well. It can be difficult for adolescents to separate their character from themselves. Bullies who cheat and gang up on other gamers are called griefers (Bailey, 2010). Like traditional bullying, minor forms of cyber bullying include being ignored, disrespected, picked on, or otherwise hassled. The more debasing forms involve the spreading of rumors about someone, stalking or physically threatening another person through some medium or method of electronic communications (Hinduja Patchin, 2010). More indirect forms of cyber bullying include disseminating denigrating materials or sensitive personal information or impersonating someone to cause harm (Willard, 2007). Add info on social networking WHICH ADOLESCENTS ARE MORE LIKELY TO BE VICTIMS OF CB? Five signs that indicate a student is being cyber bullied are as follows: Changes in mood or demeanor after being online Avoids talking about school, friends, or what they do online Has crying, anxiety, or depression episodes, especially after using the computer or cell phone Makes excuses not to go to school Withdraws from friends or usual activities (Tiano, 2008; Borgia Myers, 2010). The highest numbers of incidences of bullying occur at the middle school level. Bullying can start with children in elementary school. By the time students reach middle school, the bullying becomes more physical. Boys and girls typically bully in different ways. Boys usually push, shove, and hit. Girls on the other hand, usually start rumors or exclude girls from being a part of their social network of friends. A series of studies found that the chance of being a victim of cyber bullying increases as youngsters grow older (Kowalski and Limber, 2007; Patchin and Hinduja, 2006). Other studies found lower cyber bullying rates for students 15-18 years old than for students 12-15 years old (Slonje Smith, 2007). Still other studies found no relationship between age and being the victim of cyber bullying (Vandebosch Van Cleemput, 2009; Smith et al., 2006). Cyber bullying is occurring less frequently than traditional bullying and most cyber bullying is occurring outside of the school environment (Smith, Mahdavi, Carvalho, Fisher, Russell, Tippett, 2008). However, it is the responsibility of the school district to provide a learning environment that is in a safe environment. Studies show that 85% of high school students spend at least an hour a day on the internet. Many of the shows that teenagers are watching on television at night are reality shows. There is a lot of fighting and verbal confrontations that occur during these shows. It is believed that confrontations keep the audience entertained and wanting more. ARE F2F BULLIES GENERALLY CBs ALSO? Researchers who investigate online behavior recognized that people engage in activities online that they would not be as inclined to engage in if they were in the real world. Researchers use the term disinhibition to describe this phenomenon (Willard, 2007). There are several reasons why a bully may choose the internet to torment a victim. Cyber bullying can be done anonymously, with little effort, and the bullying can be carried out repeatedly and at a convenient time for the bully. One of the most important reasons a bully torments online is because there is a constant, captive audience to witness his or her handiwork and the victims humiliation (Breguet, 2010). Males are more likely to be traditional face to face bullies. Females, on the other hand, are more involved with cyber bullying. This could be due to the indirectness that cyber bullying plays a role in. Since females generally do not like confrontation, they are more like to participate in a form of bullying in which they do not have to face their victim. Cyber bullying allows the female students the opportunity to bully without confronting their victim. In accordance with the relationship between age and being a cyber bully, no clear tendencies could be discarded. Since cyber bullying can be anonymous, a bully can victimize someone much older or much younger than themselves. In 2006, Megan Meier committed suicide at the age of thirteen. Megan killed herself after receiving cruel messages on MySpace from who she believed was a 16-year-old boy named Josh Evans. Joshs identity was actually created by Lori Drew. Drew was the mother of a former friend of Megansà ¢Ã¢â€š ¬Ã‚ ¦..à ¢Ã¢â€š ¬Ã‚ ¦. Many individuals who bully have issues controlling their anger, come from violent homes or neighborhoods, have overly authoritarian parents, or may be acting out because of other problems at home (Goodstein, 2007). Some bullies may have poor social skills and trouble adapting to new or overwhelming situations (Goodstein, 2007). As a result of being bullied, many victims in turn begin to bully individuals who are younger or weaker than themselves. Many kids try to be funny as an attempt to be cool while at school. Making fun or ridiculing others is sometimes considered funny. So as an attempt to be cool, bullying may occur. Bullies are not always the friendless, mean loners many people assume them to be. Bullies actually can be quite popular. Many times, they are very connected to school life through athletics, academics, or other extracurricular activities. Bullies generally are strong, confident, and aggressive, much more so than their victims, who, by comparison, tend to be weak, timid, and nonassertive (Bolton Graeve, 20). Some cyber bullies are angry loners or misfits, sometimes seeking revenge for having been bullied themselves. Experts say it is common for online abusers to be popular students with plenty of self-esteem who are trying to strengthen their place in the social hierarchy. They do it by intimidating those they perceive to have less status (Billitteri, 2008). Its not really the schoolyard thug character. Its the in-crowd kids bullying those who dont rank high enough, says Nancy Willard, executive director of the Center for Safe and Responsible Internet Use (Billitteri, 2008). Mark Wei ss, education director of Operation Respect, says, I think the culture is angrier. He went on to say, The things on TV, the laugh tracks of situation comedies, its all about making fun of each other and putting each other down, and reality TV is all about humiliation(Billitteri, 2008). WHAT ARE THE EFFECTS FELT BY THE VICTIMS OF CB? Although cyber bullying is occurring most frequently at home and not at school, it affects students at school. Even when its off campus, the impact is coming to school in the form of young people who have been so tormented they are incapable of coming to school to study, which leads to dropouts ,fights, violent altercations and suicide, said Nancy Willard, a former attorney and former teacher of at-risk children (Billitteri, 2008). Patchin and Hinduja (2006) found that 42.5 percent of the cyber bully victims were frustrated, almost 40 percent felt angry, and about 27 percent felt sad (Vandebosch Van Cleemput, 2009). One teenager said, It makes me hurt both physically and mentally. It scares me and takes away all my confidence. It makes me feel sick and worthless (Hinduja Patchin #1). Victims who experience cyber bullying also reveal that they were afraid or embarrassed to go to school. In addition, research has revealed a link between cyber bullying and low self-esteem, family problems, academic problems, school violence, and delinquent behavior. Cyber bullied youth also report having suicidal thoughts, and there have been a number of examples in the United States where youth who were victimized ended up taking their own lives (Hinduja Patchin #1). Even though suicide rates have decreased 28.5 percent among young people in recent years, upward trends were identified in the 10- to 19-year-old age group (Hinduja Patchin #2 plus others). Youth who are bullied, or bully others, are at an elevated risk for suicidal thoughts, attempts, and completed suicides. The reality of these links has been str engthened through research showing how experience with peer harassment (most often as a target but also a perpetrator) contributes to depression, decreased self-worth, hopelessness, and loneliness-all of which are precursors to suicidal thoughts and behavior (Hinduja Patchin #2 plus others). In a research conducted by Hinduja Patchin (2010), cyber bullying victims reported that they were almost twice as likely to have attempted suicide compared to youth who had not experienced cyber bullying. Traditional bullying and victimization have also been linked to loneliness, peer rejection, low self-esteem, poor mental health, and other psychological and physiological ailments among youthful populations (Hinduja Patchin, 2010; Crick Bigbee, 1998; Forero, McLellan, Rissel et al., 1999; Hershberger DAugelli, 1995; Mills, Guctin, Lynch et al., 2004; Prinstein, Boegers,, Spirito, Little et al., 2000; Prinstein, Boegers, Vemberg, 2001; Rigby Slee, 1993; Salmon, James, Smith, 1998). After considering the extent research on bullying and suicidal ideation, it can be said with confidence that a strong relationship exists (Hinduja Pachin, 2010; Balry Winkel, 2003; Kim, Koh, Leventhal, 2005; Mills, Guerin, Lynch, et al., 2004; Roland, 2002; Seals Young, 2003). The research on cyber bullying flourished following the school shooting at Columbine High School. Research from the Secret Service and the United States Department of Education on thirty-seven school shootings, including Columbine, found that almost 75 percent of the shooters felt bullied, threatened, attacked, or injured by other. Several shooters also reported experiencing long-term and severe bullying and harassment from their peers (Goodstein, 2007). According to Goodstein (2007), victims of bullying usually miss more school, have higher dropout rates, and have problems concentrating on their schoolwork. They also tend to show higher levels of insecurity, anxiety, depression, loneliness, unhappiness, physical and mental symptoms and low self-esteem. The consequences of being cyber bullied quickly creep into the classroom where the students eventually face the damage to their psyches or their reputations(Borgia Myers, 2010). Children have always been encouraged to not tattle tell. Once these children are bullied, many withhold the experience they are going through as a result of what they have been taught. Parry Aftab, of wiredsafety.org, says 45,000 students-85 percent to 97 percent of her audiences-reported having been victims of cyber bullying in 2007. Yet, only 5 percent will tell a trusted parent or adult (Billitteri, 2008). Another reason many victims do not report that they have been bullied is because they worry that the problem will escalate. An 11-year old from Michigan said, She kept texting me so many mean things that I wanted to throw my phone against the wall. I told my mom and she called her. After that the mean girls texted me, wow you cant fight your own battles (Billitteri, 2008)! Although online comments have the potential to spread at a much faster rate than conversations in a school hallway, dealing with it could possibly be easier. Teens have the capability of ignoring the comments online by merely turning off the computer and not reading them. Since comments were made online, the victim is able to print the comments to turn them over to the local police unit. Victims can also report incidences to their ISP. School districts and parents need to make themselves responsible for educating youth on cyber bullying. Since most cyber bullying occurs away from school, parents may attempt to protect the bully by arguing that they have the freedom of speech to express their thoughts aloud. Conclusion: It is very important as parents to monitor childrens online activity. Parents should be aware of social networking sites that their children participate in. It is critical to educate children about the proper language that should be used online. Experts believe that cyber bullying is going to worsen because most bullies enjoy the idea that they have a large audience witnessing their attacks on the victims. As the price of computers continues to drop and as internet use gets faster, cheaper, and more far-reaching, it only makes experts believe that cyber bullying will continue to grow. Therefore, it is critical for parents to talk to their children about the impact of cyber bullying on youth. When kids are confronted about being a cyber bully, many of the kids respond that they didnt know that they were actually hurting the other person. Since many cyber bullies do not face their victims, it is difficult to witness the effects that the bullying is having on the victims.

Wednesday, November 13, 2019

Layout Design :: essays research papers

Deciding Layouts Deciding the layout is a very important step in Java GUI programming, just like solving an algorithm in normal programming. Layout decides how the components like labels, buttons, text fields etc are going to be displayed on a frame or window. Some GUI can be designed using single panel with a single simple layout. Some GUI need to be broken down into smaller panels which have to be added to an outer panel. Each smaller panel can have its own layout. The simplest layout is the flow layout. Flow layout produces output as a single row. So go for flow layout if you have only 3 or lesser components or if you want all the components in a single row. Next is grid layout. As long as you can determine the rows and columns, you can use this layout. It is possible to use grid layout for most of the applications which you want to develop with a single panel. You can always use filler labels to occupy the empty spaces. So grid layout works fine in such cases. But if you want to have a very neat GUI with very good layout, you need to go for more than 1 panel. In that case, grid, flow, and border are all used together. The development of a GUI depends on the type of problem. There are 2 types of GUI problems: 1.  Ã‚  Ã‚  Ã‚  Ã‚  Problems which just specify that you need to do certain things. In this case, the layout of GUI is totally in your hands. 2.  Ã‚  Ã‚  Ã‚  Ã‚  Problems where you are given a rough drawing on how GUI needs to look. Type 1: In case 1, you need to start with a paper and pencil. -  Ã‚  Ã‚  Ã‚  Ã‚  Read the problem and identify what needs to be displayed to the user -  Ã‚  Ã‚  Ã‚  Ã‚  Depending on that, draw a simple diagram on how you want your GUI to look -  Ã‚  Ã‚  Ã‚  Ã‚  Then start deciding on the layout For example, consider the problem below: Write a GUI java program that takes 2 numbers from the user, adds them, and displays the sum. Solution: 1.  Ã‚  Ã‚  Ã‚  Ã‚  For this, you need 2 text fields to read 2 inputs. 2 labels to tell what to enter in the text fields. 2.  Ã‚  Ã‚  Ã‚  Ã‚  1 button to initiate calculation. 3.  Ã‚  Ã‚  Ã‚  Ã‚  1 text field to display result, and 1 label to address the text field. 4.  Ã‚  Ã‚  Ã‚  Ã‚  The rough diagram will be 5.  Ã‚  Ã‚  Ã‚  Ã‚  For the above diagram, if you are going to use a single panel, then grid layout is the best choice. To decide the layout, dissect the diagram as shown below.

Monday, November 11, 2019

Big Brother Isn’t Watching You.

Big brother isn't watching you. Big brother isn't watching you is a commentary on the UK riots in 2011, written by the famous British actor, Russel Brand. Brand is known for his characteristic British accent, several popular movies, such as â€Å"Get Him to the Greek† and â€Å"Forgetting Sarah Marshall† but also the boyfriend of the famous singer, Katy Perry. He is also a comedian, which he mentions in the commentary. It can also be spotted several places in the text, where he is some how humorous and sarcastic.For an example where he wrote â€Å"I mean even David Cameron came home from his vacation† and â€Å"I’ve heard Theresa May and the Old Etonians whose hols have been curtailed (many would say they’re the real victims) saying the behavior is â€Å"unjustifiable† and â€Å"unacceptable†. Wow! Thanks guys! † He tells us that he no longer lives i England, but moved to Hollywood Hills, Los Angeles. He was usually not that fon d of really TV, until he started working for Big Brother. It got to him, and he described it as â€Å"bloody† interesting.It was also part of his job. Brand uses the famous quote â€Å"Big Brother is watching you† by George Orwell, where he depicted a dystopian surveillance society. This phenomenon is now known as a Big Brother society. He then rewrote it, by adding â€Å"isn't†. He is referring to the UK riots, and how no one is watching, and no one is doing anything about it. The rioters are from the underclass, and are not really a part of the society. The politicians and government are from the upper-class and do not ‘see' them, even when they are rioting.Frankly, they just ignore them, and this is bothering Brand. He can somehow relate to the young rioters. He himself was from the underclass in his youth (but sure isn't now), and also took part in some protests and riots. It irritates him that no one is doing anything about the riots. His background i s also reflected in his style of writing. Like I said, he is being sarcastic from time to time. But he is also fornicating. He uses the word â€Å"fucking† twice.He is good at reaching out to the reader and makes his point, while it is still interesting. It is also his job to make us like whatever he writes, says and does. Brand's primary way of argumentation is pathos. He is making us relate to the rioters too, and is some how successful. Roughly, one could also say that he uses ethos. I am referring to the part where he quotes a British first-world-war general â€Å"You cannot rouse the animal in man then expect it to be put aside at a moment's notice†.The fact that he is using quotes, and knows that it was said by a British first-world-war general. It makes the reader trust the facts he is stating. The rioters are the real victims. They should be looking at causes of the riots, which Brand claims is the government and society ignorance and carelessness towards the y ouths. In this context the phrase â€Å"Big Brother isn’t watching you† is suitable, because Brand believes just that –the government isn’t really watching the rioters.A a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a

Friday, November 8, 2019

The Arctic Essays - Arctic, Artic, Pollution, Lichen, Sea

The Arctic Essays - Arctic, Artic, Pollution, Lichen, Sea The Arctic The Artic Introduction. The Artic is a region at the upper most tip of the Northern Hemisphere. The Artic includes the area around Greenland, USSR, Canada and Alaska. Much of the Artic circle is permanently frozen ice. The Artic is a pristine environment, clean and void of human interference. However as humans move into these areas and begin to extract what ever they can be balance can be tipped, resulting in pollution and destruction of the environment. Climate. The Artic winters much longer than the Summer. In the winter the sun never rises and in the summer it never sets. The average temperature for the Artic is zero degrees of less. Industry and the Artic. There was once a time when the land of the Artic Circle was considered useless and only hospitable to those native to it. However once vast quantities of oil and fish had been found there was a rush of interest in the land. Fishing in the Artic has occurred for thousands of years but in recent years man has been fishing the Artic; in greater numbers and taking more fish. Professional fishermen are taking all kinds of fish as well as whales and seals. In some areas fishermen have become so efficient at their job that quotas have needed to be put on to limit or stop the capture of certain animals. There are many mineral deposits within the Artic Circle. In Russia: nickel, iron ore, apatite, diamonds, gold, tin, coal, mica, and tungsten. In Sweden: iron ore. In Greenland: lead, zinc, molybdenum and cryolite. Spitsbergen: coal. Canada: uranium, copper, nickel, lead, zinc, tungsten and iron ore. The digging out of minerals would inevitably disturb the natural habitat as well as the environment there would be a great cost to maintain the site. Industry that is designed to process various minerals have waste products that would be most unwelcome in the Artic. A good example of this is the pollution that has arisen as a result of the smelting of metals in the Artic. It is for this reason that there is very little industry in the Artic. However Russia, Canada, Greenland and Iceland have several small scale manufacturing plants. The largest industry in the Artic is oil. The rush began in 1968 when a large oil field was discovered, there was a great deal of protest but the development went ahead. Oil extracted from the felid makes its way to Port Valdez via a 1300 kilometre pipeline. Although steps were taken to limit the pipelines affect on the environment it still disrupts the migration of caribou. In 1989 the unthinkable happened and the super tanker Exxon Valdez ran aground spilling millions of gallons of crude oil into the Prince William Sound. The effects of the slick were devastating. Within a week workers counted 24000 dead sea birds and 1000 sea otters. The effects of the slick were felt throughout the food chain from photoplankton to bears. The Exxon company funded the clean up but there was no compensation for the hundreds of people that lost their job as a result of the slick. Pollution of the Artic A large threat to the Artic is transboundry pollution and bioaccumulation. These are both complex subjects but are easily explained. Transboundry pollution is the pollution of the Artic from other countries. The ocean currents and wind conditions result in large amounts of pollution being deposited in the Artic. In winter when the sun is low thick blankets of haze can be seen over the Artic. Bioaccumulation is the process where pollutants build up in the Artic because they cannot be broken down due to the extreme cold. Once harsh chemicals find their way into the food chain they stay there forever, trapped in the animals and sediments. A result of increased pollutants in the atmosphere is the occurrence of acid rain. Sulphur and Nitrogen dioxides drift from developed countries and when they mix with water in the atmosphere they can produce acid rain as strong as lemon juice. The acid snow melts in summer and spring producing an acid shock that can kill animals and plants alike. In 1986 the nuclear reactor in Chernoybl exploded sending a nuclear cloud into the atmosphere that among other places contaminated plants and animals in the Artic region. Particularly affected were lichens, lichens are a plant that makes up the majority of a reindeers' diet. When the reindeers ate the lichens they became radioactive and many thousands had to be shot. Tourism vs conservation. In the battle between tourism and conservation, tourism seems to always win. However in the Artic tourism has so far had little effect (compared to other human activity) on the

Wednesday, November 6, 2019

Essay Sample on the History of Computers Key Changes Along a Timeline

Essay Sample on the History of Computers Key Changes Along a Timeline The history of computers is short but very complicated. Computers have been through lot of changes throughout the past half-century. They also affect our society in many different ways today. The following paper describes how the computers have changed from 1970 to present. During 1970, Intel came out with a chip, which was the best selling semiconductor memory chip in the world. The chip was called Intel 1103 and it was first DRAM, dynamic Random Access Memory) chip. D.r. Robet H. Dennard developed it. His team and him had been working on it since 1966. The engineers needed to build a new type of chip for a calculator in 1971. So, they came out with a chip called Intel 4004. It was the first single chip general-purpose microprocessor built bye Intel. The chip was 4-bit and ran at a rate of 108 kHz and it also contained 2300 transistors. The chip dealt with up to 1 Kb of program memory and up to 4 Kb of data memory. In the early 70’s lot of new technology was being built. In 1973, IBM came out with the first hard disk drive. The hard disk used two 30 Mb platters. During the next decade, the hard disks were used in primary data storage, than in minicomputers and later in the early 80’s in personal computers. The first personal computer to use a hard disk was IBM PC/XT in 1983. In 1974, Gary Kildall developed CP/M (Control Program for Microcomputers). It was the first operating system to run on machines. CP/M became the permanent operation system for software development on small systems, but later the personal chose not to use CP/M. In 1975, MITS Altair was the first personal computer to get attention by a lot of people. It was made of Intel’s 8-bit 8080 processor. The MITS included 256 bytes of memory, toggle switches and an LED panel. Apple II was the beginning of the personal computers. Steve Jobs and Steve Wozniak developed the Apple II in 1977. It had a built in keyboard, graphics display and BASIC built in ROM. It was based on the MOS 6502 processor. Apple used MOS Techonology’s 6502 processor in the personal computers. It contained three 8-bit registers and an 8-bit stack pointer. It was one of the first personal computers that were useful to people and a new age of technology. In 1981, IBM came out with a PC. â€Å"The landmark announcement of the IBM PC stunned the computing world,† (Patterson 1). It was the first PC that surprised the world with its features and speed. The IBM PC came with a 64 Kb of RAM, a floppy drive and monochrome graphics, DOS, operating system based on CP/M. The PC was based on Intel’s 8088 processor. It was a 16-bit processor, which contained 8 registers and unique segmented 20-bit memory architecture capable of addressing 1 Mb of memory. It ran at a speed of 4.77 MHz. So the first IBM PC became pretty popular during the early 80’s. In 1982, a new computer came into the market with new technology and became very popular. â€Å"An estimated 22 million units were sold. That’s almost as many as all the Macintosh models put together, and it dwarfs IBM’s top-selling systems,† (Patterson 3). The Commodore had a 64 Kb of RAM and it was also the first personal computer with an audio synthesizer chip. In 1983, it came out with a portable version knows as the SX-64. It was the first color portable computer. It was based on the MOS 6510 and it also had fast color graphics. The Commodore was a cheap computer for the features it had and people all around the world bought it. Later in 1984, Apple came out with a new computer called the Macintosh. The Macintosh was sold for $2495. It had 128 Kb of RAM, it also had a 3.5† floppy disk drive, which held more data than the 5.25† disks. Motorola’s 68000 processor powered it. It was a 32-bit processor and it also contained 60,000 transistors and had 16 registers. This computer became popular during the 80’s but Commodore was still dominating during the time. During the mid 1980’s IBM came out with a new and better computer known as the IBM PC/AT. It had Intel’s fast 80286 processor that ran at 6 MHz, merged with 16-bit busses. The 80286 made the new PC/AT faster than the original PC. It came with a lot more ram 512 or 640 Kb and new floppy disks drives which could hold up to 1.2 Mb. In the late 80’s Apple came out with a new computer known as the Macintosh II. It was first color computer by Macintosh. The color was 8 bit deep and it was also available in 24-bit. The graphics of the Macintosh II inspired Adobe to make a photo editing software called Photoshop. The Macintosh II had a 14† color monitor. The screen resolution went up to 640 x 480 and it had RAM of 64 Mb. It had a Motorola 68020 processor with 6881 FPU. It was one of the expensive computers of the time; it costs were $5498 for a standard configuration, which included 1 Mb of RAM and a 40 Mb hard disk. The Macintosh II was not a popular computer, customers complained about the price being too high. After Steve Jobs left Apple he came up with his own computers knows as the NeXT, which was released in 1989. It had a Motorola 68040 processor; 8 Mb of RAM a built in DSP, digital signal processor and the first commercial magneto optical drive, which has 256 Mb capacity. The NeXT had some faults to it. The computer was sold for $10, 000 which was too high. Another fault in the computer was it used Objective C, a mix of C and Smalltalk instead of using C++. So it was so expensive for the consumers to by it and the use of wrong type of language. In 1993, Intel Pentium Processor began developing and went through the industry faster than any of the previous processors by Intel. In 1994 and 1995, standard configuration of an Pentium processor ran between 60 and 120 MHz, 4-16 Mb of RAM, about 200 Mb of disk space, 8-bit 640 x 480 Super VGA graphics, a 14† color monitor, a CD-ROM drive, and ran under Windows 3.1. The cost of it was from $1800 to $2500 depending on design. In 1994, Apple introduced a new computer known as the Power Macintosh. The new Power Macintosh 6100 had 60 MHz PowerPC 601 processor. It also included 8 Mb of RAM, 16-bit 640 x 480 graphics, 16-bit stereo, 250 Mb hard disk, a CD-ROM drive and a built in Ethernet. It also came with a 14† color monitor with built in speakers in the monitor. Its total cost of the machine was $2289. On August 24 1995, Microsoft came out with Windows 95. Which became very popular and it was affordable for many of the families. It had full networking support; it included tolls for accessing the Internet. The operating system was 32-bit, which helped in improving the performance of the computer. Windows 95 were being advertised everywhere. They were being advertised on TV, radio, newspaper, magazines, billboards and many other places. The PC industry became very popular when Windows 95 was releases because it was affordable and easy to use. In the late 1990’s, the computers became very fast with higher RAM. It was 700 MHz and about 64 MB of RAM. The hard drive space also went up a lot to 15-20 GB. Which was a big improvement from the previous computers. Today the computers are extremely fast. It has reached the speed of 3.0 GHz and hard drive space up to 120 GB on personal computers. They also come with a built in DVD/CD ROM and a CD burner. The prices for all the computers today are really cheap and most of the people can afford it. Almost everyone has a personal computer in their house or their business. Computers run most of the machines being run today. For example, the computers are controlling the touch free car washes, like when to stop a certain thing and when to start it. So the computers are dominating a lot of things these days. Therefore, computers have changed a lot during the past century. They went from 108 KHz to 3.0 GHz. That is a huge change during the past half century. Computers are going to get really advanced and really fast in the future. It is going to keep growing in the future. So the computers play a huge role today in our society all over the world.

Monday, November 4, 2019

International bussiness Assignment Example | Topics and Well Written Essays - 3000 words

International bussiness - Assignment Example Brazil has experienced massive socioeconomic transformation, and this can be dated back since the World War II. The country has seen growth from an economy that relied more on exportation of few primary products to the present day economy that is characterised by large and diversified industrial sector. The country has also transformed from a previously largely rural population to an increasingly urbanised state today. All these are clear illustrations that show the enormous strides that Brazil has taken towards its status among the fastest growing and emerging nations in the world. Brazil has an estimated population of about 200 million people which is a rapid growth from the 17.4 million in 1900. About 87 percent of the country’s population is urbanised compared to 30 percent in 1940. After going through several decades of industrialisation, Brazil presently produces more than 35 million tonnes of steel, 3 million vehicles, 66 million tonnes of corn and 60 million tonnes of cement among others annually. Other primary goods produced in the country include refrigerators and television sets. The country has a well-developed road network covering over 1.5 million kilometres well as a widespread supply of electricity (TWB 2014). The political system in Brazil involves the president being the supreme entity especially in matters concerning executing policies approved by the lower and upper houses. The Congress has a regulatory function towards decisions and actions taken by the executive. The two chambers (Chamber of Deputies and the Senate) have a role in creating legislation which are thereafter signed into law by the president. In matters of national economy, the Brazilian government has a pivotal role and influence in many aspects of the economy and its consequential growth. For example, the Government expenditures accounts for more than 40 percent of the country’s GDP. Technological advancements is an essential part in the economic

Saturday, November 2, 2019

Coloniaism, Development, Culture and Resistance Essay

Coloniaism, Development, Culture and Resistance - Essay Example The New World inhabitants had accumulated a lot of golden treasure throughout the eras, besides the first deluge of "novel" gold into Europe and Spain came because of the  conquistadores  Ã¢â‚¬ËœSpanish for "conqueror’ take hold of this accumulation (Cole, 2002)  . Through the takeover of Peru by Pizarro Francisco, novel gold started to be excavated; and, through the unearthing of the silver in Mexico, vast quantities of silver started to surface. The European voyagers started to search mainly for gold. Therefore, as silver and gold reached in Europe from the New World, the value of everything started to rise gradually. The perpetual increase of silver and gold in Europe caused what historians term as  the price revolution (Diffie, 1977) and (Armesto, 2006). This paper will discuss the economic advantages that Europeans gained from their conquests in the ‘New World’. Food The new-fangled plants, which were initiated from the New-World, provided adequate fo od supplies for the growing population in Europe. The Europeans began to plant corn and potatoes from the New World. Although it was hard to get accustomed to corn, some Europeans, for instance, the Italians finally became adjusted to corn; nevertheless, it was utilized mainly as food for geese, chicken as well as other fowl as well as for pigs. The potatoes introduction created a revolution of calories, while the reception of corn created a revolution of proteins (Cole, 2002) and (Armesto, 2006). As Europe’s land could now yield more foodstuffs, the value of foodstuffs began to decline. The land production capacity had kept up with the populace, as well as the common European could at the moment eat more. In turn, the Europeans, initiated corn into the Africans as well as sweet potatoes to the Chinese, where these novel foods also altered conditions dramatically (Donkin, 2003) and (Armesto, 2006). The French brought in  tomatoes that they termed as "apples of love," and ut ilized them for decorative purposes within their flower parks. They believed that they were toxic. In time, nevertheless, the poison-producing tomato capacities were kept out, in addition the tomato turned out to be one of the highly popular supplements to European food (Donkin, 2003) and (Armesto, 2006). There were numerous other food vegetables transported back to Europe -- mainly many selections of  squash,  pumpkins,  beans,  peppers  -- that started a welcome diversity, along with a wide variety of vitamins, to the European cuisine. The healthiness of the common European started to improve, as well as his weight, height, and potency increased. While As this transpired, his endurance to illness grew (Cook, 1998) and (Armesto, 2006). Drugs A lot of awareness is directed to the dreadful death toll amongst the native populaces of the New-World instigated through the European's initiation of novel diseases that were incurable (Cook, 1998). It should as well be observed tha t majority of Europeans arriving to the New-World died in a year, generally from some illness, as well as that the demise toll amid Europeans within the central of Africa was very huge that it stayed largely uncultivated by them up to the 19th era (Dunton, 1896) and (Armesto, 2006). The Europeans were hasty to utilize native medicines for their illnesses, and the cinchona tree’