Friday, May 29, 2020

What is Linguistics - Intro to Branches of Linguistics

[image source] Many students start college with no idea what linguistics is, and it’s possible they won’t even brush past it throughout their entire college career. Today, I’ll demystify and explain exactly what linguistics is and hopefully encourage you to at least take an introductory class! When I tell people that I'm doing a PhD in linguistics, there are three main responses that I hear: 1) So how many languages do you speak? 2) Ooh, you must be a grammar Nazi! 3) What is that exactly? To reply to responses 1 and 2: What linguistics is not: Linguistics is not about learning as many languages as you can; there are many linguists who can only speak one or two languages. There isn't a requirement to learn multiple languages. However, it is true that many (though not all) of us linguists become interested in linguistics because we like learning languages and decide to take an introduction to linguistics course to find out what it's about. Linguistics is also not about prescribing what grammar is â€Å"correct†. Rather, we describe language and its flexibility. If someone is a native speaker of a language, their grammar cannot be â€Å"wrong†. So Southern English, standard American English, African American Vernacular English, London English, Cockney English, etc. are all legitimate grammars with their own regular rules. Now that that’s out of the way, let’s reply to response 3! So what is linguistics? To put it simply, linguistics is the scientific study of language. Linguistics aims to understand how the language faculty of the mind works and to describe how language itself works. Linguists observe patterns within a language and across languages to try to understand what principles drive our brains’ comprehension and production of language. There's a quote by Lynne Murphy that "asking a linguist how many languages s/he speaks is like asking a doctor how many diseases s/he has had". As linguists, languages (and language) are our objects of study. We learn to look at languages as data and recognize their patterns, just as doctors learn to recognize signs and symptoms of diseases. Whether they have had the disease before or not is irrelevant. Many people come to linguistics from other areas: math, computer science, philosophy, anthropology, psychology, and cognitive science, just to name a few popular related fields.Linguistics spans a large number of subfields, each dealing with a different part of the language faculty. Phonetics - the study of the acoustics and sounds of languages A phonetician might, for example, look at how stress manifests in a language. In English, the stressed word in a normal sentence is louder and higher pitched: â€Å"ANna likes bananas.† If we ask a question though, it’s pronounced with a lower pitch: â€Å"ANna likes bananas?† Phonology - the study of sound systems and how they pattern For example, in English, there are many examples of t's in the middle of words that sound quite different from t's at the beginning or end of words. Listen to the t's in "toted" and you’ll hear that they don’t sound the same. The first t is pronounced with a puff of air (put your hand in front of your mouth to check this) but the second is not and it sounds like the d in â€Å"coded.† This sound is called a tap because your tongue taps the roof of your mouth briefly and it is very similar to the tapped r sound in languages like Spanish or Japanese (this leads to misperceptions of the English middle t as an r for speakers of these languages). Syntax - the study of sentence structure English and many western European languages have a phenomenon called â€Å"wh-movement.† wh-words are the question words who, which, what, where, when, why, and how. Think about the sentence â€Å"I eat an apple† as a possible response to the question â€Å"What do you eat?† The word what corresponds to apple, but it shows up at the beginning of the sentence. In many languages, though, the wh-word corresponds to the same position as the word it refers to. For example, in Chinese you would say â€Å"I eat apple† in response to â€Å"You eat what?† We say then that in languages like English, wh-movement has occurred and the structure is: â€Å"What do you eat what?† A lot of other properties of a language are predicted by whether it has wh-movement or not, but we’ll have to leave those to another time! Semantics - the study of meaning and formalizing it into a logical form English and many western European languages have a phenomenon called â€Å"wh-movement.† wh-words are the question words who, which, what, where, when, why, and how. Think about the sentence â€Å"I eat an apple† as a possible response to the question â€Å"What do you eat?† The word what corresponds to apple, but it shows up at the beginning of the sentence. In many languages, though, the wh-word corresponds to the same position (called in-situ) as the word it refers to. For example, in Chinese you would say â€Å"I eat apple† in response to â€Å"You eat what?† We say then that in languages like English, wh-movement has occurred and the structure is: In English, the wh-word moves to the front of the sentence (why â€Å"do† appears in questions is another issue that I don’t have room to tackle here). A lot of other properties of a language are predicted by whether it has wh-movement or not, but we’ll have to leave those to another time Psycholinguistics - the study of how language manifests in the brain Psycholinguists carry out experiments to observe the reaction of the brain’s different areas to different stimuli, and they’ll try to relate the findings to the more abstract linguistic theories. An example is tracking people’s eye movements when they read the sentence â€Å"The old man the boat.† This is known as a garden path sentence, because readers are led down a â€Å"false path.† The reader does a double take once s/he reaches â€Å"the†, having expected a verb to appear. The second time around, the reader realizes that â€Å"man† is a verb and then parses the sentence correctly. These garden path sentences provide insight into how sentence parsing occurs in the brain. Sociolinguistics - the study of the intersection of language with society Sociolinguists might look at attitudes toward different linguistic features and its relation to class, race, sex, etc. For example, one of the fathers of sociolinguistics, William Labov, carried out an experiment in New York City in which he visited three department stores--a low end one (S. Klein), a mid-end one (Macy’s), and a high-end one (Saks Fifth Avenue)--and inquired where a department was in order to prompt the answer â€Å"fourth floor.† The higher end the store, the more likely the â€Å"r† was pronounced, and when asked to repeat, it was only Saks Fifth Avenue and Macy’s where the â€Å"r† became much more likely to be pronounced the second time around. The study also had implications for the ability in different communities to code switch to a prestige dialect. Computational linguistics - the study of applying computer science to linguistics Computational linguists might use programming to model linguistic structure or change or for practical applications, such as Natural Language Processing, which has implications both for figuring out and modeling how language acquisition works as well as for translation software. Historical linguistics - the study of how languages change across time Historical linguists may work in language specific areas, carrying out what is called reconstruction. Just as evolutionary biologists compare features of related organisms to reconstruct their common ancestor, historical linguists do the same with related languages, under the important fact that languages change regularly. As a simple example, f’s at the beginning of English words correspond to p’s at the beginning of Latin words if neither is borrowed from another language (father : pater, fish : pisces, pellis : felt, pes : foot). Using reconstructions, historical linguists will try to trace migration patterns and make inferences about the prehistoric culture, triangulating with results by geneticists, anthropologists, and archaeologists. Historical linguists might also look at what patterns exist in language change and seek to explain why these patterns exist. Applied linguistics - the study of applying linguistics to real-life situations An applied linguistic will likely work in fields such as such as language education, translation, or language policy. For example, an applied linguist may also carry out research in first and second language acquisition in order to figure out effective and efficient ways to teach language in school settings. There are various other fields of linguistics but there’s only so much room in this post! As for what you can do with a linguistics degree? Plenty! But, that deserves a post all for itself! Interested in learning more about Linguistics from Tyler? Feel free to ask him a question by writing in the comments section below. For private tutoring in Linguistics, English, or any of our subjects, contact Cambridge Coachingto get a recommendation for a tutor. ;

Tuesday, May 26, 2020

How You Can Use Expository Essay Samples PDF

How You Can Use Expository Essay Samples PDFIf you want to become an essay writer, you may want to look into purchasing some good expository essay samples PDF. You do not have to search the entire world for it. There are lots of online resources that you can access, and these are some of the best resources that you will need in order to prepare for the world of essay writing. This is something that many students that attend college are doing, and you can too if you decide to get into the field of writing.It is also important to remember that you need to do a lot of reading as well as a lot of practice before you will be able to write an essay. You need to read so much and so many different things so that you will know what works and what does not work. This is important if you want to do well at your college essay exam.I have been known to go through several different books on paper and study the papers that are already sitting on my desk. That has helped me tremendously in my studie s. It also helps when I go to school to go through this material and use what I am reading to help me along. Doing this will make sure that you have everything that you need for the essay that you need to write.You also need to think about your own experience with writing, because it is a skill that you will need to learn and one that will definitely take time to learn. Some people find it easier than others. You might even have one friend who is great at writing and the other one who is not. If you do not have any experience with writing, then you will want to make sure that you get the best that you can in order to be successful.Reading as well as writing together will allow you to develop a bond of trust with one another. This is something that is very important in the process of learning to write as well as to read. It will allow you to get along with one another so that you can become the best essay writer that you can be.You will want to study English composition in college in order to be successful at this. A lot of people are doing this and they are really enjoying it and enjoying themselves in the process.When you do go into the world of paper, there are a lot of resources available that you can use to get through the tasks of writing your paper. You will want to use them, but do not just jump in head first without doing enough research into the area of paper writing.

Tuesday, May 19, 2020

Essay on DBQ declaration of independence - 665 Words

Declaration of Independence In the mist of 1776-1877, did the United States carry out all the goals that were stated in the Declaration of Independence and the Constitution? The Declaration of Independence and Constitution had many different goals and ideas in mind for the United States at the time. The United States partially realized the some of the values stated in the Constitution and Declaration of Independence, but also did accomplish some the goals mentioned in the documents. The principles in the Declaration of Independence were applied to some, and the major goals in the Constitution were not wholly realized. Some of the goals that were partially realized were equality and women’s rights, some might say that these†¦show more content†¦For example in the letter Abigail Adams wrote to John Adam she stated that â€Å"I desire you would remember the ladies and be more generous to them then your ancestors.† (Doc B). This document explains how Abigail Adams wrote a letter to the President, her husband john Adams explaining her view on how women should have rights. It’s important because they had an idea that the women should have rights to get an education so that they can educate the children (men) to become better citizens. From the Declaration of Seneca falls women’s rights convention Elizabeth Cady Stanton was quoted saying â€Å"The history of mankind is a history of repeated injuries and usurpations on the part of man toward women.†(Doc J). This means that the ideas of equality, liberty, and inalienable rights were battling in American civilization with common laws and religious traditions of the agreement of husband and wife. It is important because this goal was not realized until after this time. Women wanted rights as same as everyone else. In the court case Dred Scott v. Sanford the US Supreme Court chief justice Roger Taney was quoted saying â€Å"[blacks] had no rights which the white man was bound to respect; and the Negro might justly and lawfully be reduced to slavery.† (Doc L). This quotes means that even though blacks had no rights, the whites should still have respect for them, they are people too. It’s important because it’s another goal that the declarationShow MoreRelatedThe Declaration of Independence and the Struggle for Equality DBQ1000 Words   |  4 Pagesâ€Å"The Declaration of Independence and the Struggle for Equality DBQ† â€Å"In what way and to what extent does the Declaration of Independence serve as a benchmark for the actions of disenfranchised or otherwise oppressed citizens of the United States of America?† The Declaration of Independence, since July 4th, 1776, has continued to always become a guideline to protect those who are oppressed. â€Å"We hold these Truths to be self-evident, â€Å"that all Men are created equal,† that they are endowed by theirRead MoreMath Essay843 Words   |  4 PagesInformation on the DBQ The required DBQ differs from the standard essays in its emphasis on your ability to analyze and synthesize historical data and assess verbal, quantitative, or pictorial materials as historical evidence. Like the standard essays, however, the DBQ is judged on its thesis and argument. Although confined to no single format, the documents are unlikely to be the familiar classics (such as the Emancipation Proclamation or the Declaration of Independence), but their authorsRead MoreWhich Ideal of the Declaration of Independence Is the Most Important?699 Words   |  3 PagesDBQ Our American government became independent from Great Britain, on July 4, 1776. There was a committee of five people who wrote the Declaration of Independence. The Declaration has a structure of an introduction, a statement of ideals about government, a long list of grievances against the British, and a Declaration of Independence from Great Britain. Yet the four ideals; consent of governed, Equality, Unalienable Rights, and the right to alter or abolish, are the foundation of our governmentRead MorePhilippine Annexation Dbq : A Primary Cause Of World War I Essay829 Words   |  4 PagesNovember 2016 Philippine Annexation DBQ Scholars typically cite imperialism as a primary cause of World War I, and though controversial, America was no stranger to the practice. In 1898, the United States won the Spanish American War, resulting in the Paris Treaty. America gained several formerly Spanish colonies from their victory, and through the Treaty of Paris, they annexed the Philippines. Filipino insurgents, who had fought for the Philippines independence, rebelled against the annexation.Read MoreCauses of the Revolutionary War DBQ1077 Words   |  5 Pagesï » ¿Ryan Hsin 10/17/14 US History Period 2 Causes of the Revolutionary War DBQ A great things started somewhere. For a powerful, free, and role model country like the United States of America started somewhere. The journey of our storied revolution and transformation to one of the world’s premier powers have its roots derived from Great Britain. Unjust colonial rules implanted by the King of England acted as the catalyst for revolution amongst the colonies. Once a happy family, key events triggeredRead MoreDbq: the Enlightenment Essay1184 Words   |  5 Pages October 11, 2012 DBQ: The Enlightenment The Enlightenment known by many as the Age of Reason was a turning point in history. Man people believe that without the Enlightenment, many of the laws, and rules would exist. For example the United States Declaration of Independence and the Constitution were greatly influenced by the Enlightenment. For example, John Locke, an Enlightenment thinker highly influenced the Declaration of Independence by stating that the natural rights ofRead MoreEssay on Development of the American Identity Between 1750 and 1776919 Words   |  4 PagesKeum Yong (Andrew) Lee DBQ – Score 8/9 (95) In what ways and to what extent did the â€Å"American identity† develop between 1750 and 1776? Though the American colonists had not achieved a true, uniform sense of identity or unity by 1776, on the eve of Revolution, the progress towards unity and the inchoate idea of an â€Å"American† between 1750 and 1776 is inevitable in both existence and significance. Previous to the French and Indian War, America as a whole had been, more or less, loyal mercantile-basedRead MoreDBQ 23 Decolonization and Revolution964 Words   |  4 Pages DBQ 23: Decolonization and Revolution From 1945 and beyond, leaders have selected different paths to affect change. Some encouraged independence through violence, peaceful actions, diplomacy, and the commitment of their struggling nation. Others sparked revolutions by appealing to the peoples’ needs. Through policy, and sometimes uniting a people, trailblazers changed the face and structure of their nation. A column from a journalist during the time period would help to see a broader perspectiveRead More AP HISTORY-Jacksonian Democracy Essay676 Words   |  3 PagesDBQ: Jacksonian Democracy Jacksonian democracy was created during the antebellum America. The Jackson democrats made an attempt to grant power to the lower classes while decreasing the influence of the rich and potent. The Jacksonian democrats viewed themselves as saviors of the common people and ruled by the means of a powerful executive branch who attempted to destroy aristocracy in America. In reality, they were typically very wealthy, they disregarded the capability of the federal governmentRead MoreMiddle East Dbq Essay1026 Words   |  5 Pages Modern Middle East DBQ Edmund Burke once said â€Å"Those who dont know history are destined to repeat it.† Unfortunately, it seems that many people who have impacted the world have had a bad history teacher, as history continues to repeat itself to this day. One of the most prime examples of this is seen in the Middle East; where the Palestinian people are fighting against the Israelis over territory in which they both believe belongs to them. It has been a dispute which has resulted in loss of homes

Saturday, May 16, 2020

The Effects Of Emotional Intelligence On Teaching And...

Whether your title is professor, instructor, lecturer, adjunct or other, your responsibility to your students is to teach. Your students look to you for the wisdom you have gained from your research, your educational background or your practical experience and your overall intelligence. However, being an effective instructor does not solely depend on your intellectual quotient (IQ); it also depends on how well you can use your emotional intelligence (EI). From my experience teaching in higher education, I have observed that not every student learns through the same methods, is motivated in the same manner, or acts in the same way in a classroom (live or online). So, it seems apparent that recognizing differences in teaching and learning†¦show more content†¦Do not get frustrated if some students are not learning the material as quickly as you expect. A major part of emotional intelligence is showing empathy. Try to put yourself in your student s shoes and remember what it wa s like when you were learning a new concept and how it made you feel. If you can try a different teaching technique or a different way of explaining a concept, this could alleviate some of the stress of learning. 2) Manage your emotions while taking responsibility. There will be situations that frustrate you, but not only should you obviously learn to hold back visible anger, you should also take responsibility for your emotions without placing blame on your students. Focus on using I instead of You when making a statement. For example, instead of saying, You are not working hard enough to understand this concept, say, I am confused about what is making this concept difficult to understand. Let s try together to understand what is not making sense. Avoiding putting the students on the defensive may help open their minds to learning. 3) Be honest and own up to your mistakes. If a student asks you a question and you do not know the answer, honesty can be the best policy. Tell the student that you will do some research and get back to them regarding the correct answer. Also, if you make a mistake, apologize and correct yourself and then move forward. By setting a good example of honesty in the classroom, you will hopefully be encouragingShow MoreRelatedMusic Education And Emotional Intelligence1607 Words   |  7 Pagesmusical growth the emotional demands require guidance by a teacher and self-exploration from the participant. Once success in this area becomes apparent, musical benefits emerge and the journey the individual undertook also helps shape their emotional intelligence. By answering the question of how music education affects an individual’s emotional knowledge of music and themselves, it will become possible to see the benefits of teaching music students with an emphasize on emotional learning. T he first taskRead MoreAn Individual s Level Of Emotional Intelligence1524 Words   |  7 PagesAn individual’s level of emotional intelligence can have an impact on their performance as a teacher? There is a great deal of individuals that boast the intellectual intelligence to become teacher’s, but an alarming number of them are failing to sustain the emotional strength required to maintain excellence in their careers. Nobody can deny that teaching is a highly stressful, demanding and challenging profession, but how much of this stress and fatigue can be relieved by teachers managing theirRead MoreWhat Factors Play Into Students Academic Success?1363 Words   |  6 Pagessetting their own learning goals. They only need the correct push and back ground to develop and flesh out their own thoughts. I began to think, what factors play into students academic success and how can we as educators help students in achieving their academic goals? What factors are at play that hinders students from reaching these academic goals and how can we as educators assist in alleviating these factors and foster growth in students to overcome. Chris Emdin’s Co-teaching model in Hip HopRead MoreTransformational Leadership : Leadership And Leadership887 Words   |  4 PagesAlso, contingencies, such as relationships, structures, and power impacts the leaders’ ability to facilitate accomplishment of goals. Cavazotte, Moreno, and Hickmann (2012) spoke about the importance of leader intelligence, personality and emotional intelligence. Each investigates the effects and the approach to leadership. Whether a leader is a transformational leader, selective approach is transpired in order to become an important leader. A set of characteristics is essential for an individual toRead MoreEssay on My Personal Perspective of Coaching1659 Words   |  7 PagesPersonal coaching as defined by Biswas – Diener (2009) is a professional relationship in which coaches work with clients to facilitate experiential learning and improve functioning and performance, of in the context of working toward specific goals. Some core a ssumptions that people have an innate capacity to grow and develop a focus on mutually agreed upon goals, and an understanding that the relationship is relatively equal and collaborative as stated by the author (2009). Some techniques thatRead MoreAnalysis Of Howard Gardners Theory Of Multiple Intelligences In The Classroom908 Words   |  4 PagesWe all learn knowledge and use our educations in a variety of ways. One flaw found in the educational system is that it doesnt always recognize different learning styles and instead teaches students using limited methods. According to Gardners theory, this is a problem that needs to be fixed. He details seven different types of intelligence to show the various ways human beings learn. Howard Gardner says that we are all able to know the world through language, logical-mathematical analysis,Read MoreNew Styles of Instruction Essay1304 Words   |  6 PagesiPod Touch can be integrated to customize the learning experience for all (Banister, 2010). Laptop computers are also being used more in the classroom. Educators are not merely using laptops as a means to plan and deliver instruction, rather as tools for authentic learning where students use the computers during lessons (Kemker, Barron Harmes, 2007). There are several web-based programs, such as Education City, Study Island, and Compass Learning, to promote achievement in diverse disciplinesRead MoreWorking with Students who have Learning Disabilities Essay examples1481 Words   |  6 PagesWorking with Students who have Learning Disabilities Over the past 10 years, there has been a dramatic increase in the number of students who have been diagnosed with learning disabilities. I need to be aware of how to help those students who have learning disabilities and teach to the best of my ability. I also need to be supportive and understand not every student learns in the same way which is why it is important for me to be flexible in my own style of instruction. I need to be knowledgeableRead MoreIntroduction. What Is God’S Way In A Classroom?Reflecting1717 Words   |  7 Pagespositive learning environment that is productive and incorporates both nurturing and Biblical teachings. Proverbs 22:6 â€Å"Train up a child in the way he should go: and when he is old, he will not depart from it.† Children are so innocent and open-minded and they love to learn. They are human sponges and will soak up anything that is in their surroundings. It is paramount that a child is nurtured with guidance of the Biblical teaching s. An effective teacher should incorporate biblical teachings in theRead MoreEssay on Effects of Teaching According to Student Learning Style2495 Words   |  10 PagesLiterature Review: The Effectiveness of Teaching According to Student Learning Styles In the Classroom Jenna Scifo Liberty University Abstract In the last 20-30 years, learning styles has been a heavily debated topic in the field of education. Many teachers and schools have adopted the learning style approach into their classrooms. The idea of teaching students according to their preferred learning style is attracting to many, yet some believe it is another generalized theory that has

Friday, May 15, 2020

Dubois Surname Meaning and Origin

The ancient French surname duBois derived from the Old French bois meaning wood and was a French topographical name given to a man who lived or worked in the woods, or who worked as a woodcutter. Similar in origin to the WOOD surname in England and America. DUBOIS is the 8th most popular surname in France. Surname Origin:  French Alternate Surname Spellings:  BOIS, DUBOS, DUBOST, DUBOISE, DEBOSE, DUBAIS, DUBAISE, DESBOIS, BOST, DUBOICE, DUBOYS, DUBOSC, DUBUSK Where Do People With the DUBOIS Surname Live? WorldNames PublicProfiler identifies the largest population of individuals with the DuBois surname in France followed, as you might expect, by Belgium and Switzerland, and then Canada. Within France, the surname is most prevalent in the northern regions of Nord-Pas-de-Calais and Picardie, followed by the Wallonie region of Belgium. The name in France is also fairly common throughout the central part of the country, from Paris stretching north, east and west. Data from Forebears agrees, ranking DuBois as the 4th most common surname in France and 17th in Belgium. It is also prevalent in French territories and collectives such as New Caledonia and French Polynesia, as well as countries which formerly belonged to France, such as The Ivory Coast. The Dubose surname variant is most commonly found in the United States. Famous People With the Surname DUBOIS Allison DuBois - American psychic/mediumW.E.B. duBois - African-American writer, historian and socialistAntoine DuBois - French surgeonCharles Frà ©dà ©ric Dubois - Belgian naturalistLouis DuBois -  Huguenot colonist in New NetherlandShirley Graham Du Bois - American writer, composer and civil rights activist Genealogy Resources for the Surname DUBOIS Common French Surnames Their MeaningsUncover the meaning of your French last name with this free guide to French surnames meanings and origins. DuBose-DuBois DNA ProjectOver 100 group members belong to this Y-DNA surname project, working together to combine DNA testing with traditional genealogy research to sort out DuBose and DuBois ancestral lines. Includes individuals with DuBoise, DuBoice, DuBoys, DuBosc, DuBusk and similar surname variants.   Dubois Family Crest - Its Not What You ThinkContrary to what you may hear, there is no such thing as a Dubois family crest or coat of arms for the Dubois surname.  Coats of arms are granted to individuals, not families, and may rightfully be used only by the uninterrupted male-line descendants of the person to whom the coat of arms was originally granted.   DuBois Family Genealogy ForumSearch this popular genealogy forum for the Dubois surname to find others who might be researching your ancestors, or post your own Dubois query. FamilySearchAccess over 1.7 million free historical records and lineage-linked family trees posted for the Collins surname and its variations on this free genealogy website hosted by the Church of Jesus Christ of Latter-day Saints. DUBOIS Surname Family Mailing ListsRootsWeb hosts several free mailing lists for researchers of the Dubois surname.  You can also browse or search the list archives to explore previous postings for the Dubois surname. The DuBois Genealogy and Family Tree PageBrowse family trees and links to genealogical and historical records for individuals with the last name Dubois from the website of Genealogy Today. References Cottle, Basil. Penguin Dictionary of Surnames. Baltimore: Penguin Books, 1967.Menk, Lars. A Dictionary of German Jewish Surnames. Bergenfield, NJ: Avotaynu, 2005.Beider, Alexander. A Dictionary of Jewish Surnames from Galicia.  Bergenfield, NJ:  Avotaynu, 2004.Hanks, Patrick and Flavia Hodges. A Dictionary of Surnames. New York: Oxford University Press, 1989.Hanks, Patrick. Dictionary of American Family Names. New York: Oxford University Press, 2003.Hoffman, William F. Polish Surnames: Origins and Meanings.  Chicago:  Polish Genealogical Society, 1993.Rymut, Kazimierz. Nazwiska Polakow.  Wroclaw: Zaklad Narodowy im. Ossolinskich - Wydawnictwo, 1991.Smith, Elsdon C. American Surnames. Baltimore: Genealogical Publishing Company, 1997.

Wednesday, May 6, 2020

Theories On The Causation Of Homosexuality - 3098 Words

Running head: CAUSATION OF HOMOSEXUALITY 1 Theories on the Causation of Homosexuality Luke Thomas The University of Alabama CAUSATION OF HOMOSEXUALITY 2 Abstract There are two main schools of thought regarding the causation of homosexuality. The first, which is examined in this research, is biological cause. Three main categories of thought exist under biological theory: hormone theory, brain theory, and genetic theory. Each category contains convincing evidence as to why its respective variations should be attributed to provoking homosexuality. Hormone theory maintains that abnormal levels of testosterone expose—whether too great or too little—is responsible for masculinizing or feminizing the fetus and thus altering its†¦show more content†¦The study of its causation, however, has been greatly expanded only within past two centuries. Many theories have been formulated to attempt to explain what causes sexual variance, and in particular, homosexuality. These theories can be grouped into two main categories: nature and nurture. The theories which fall under the nature category maintain that homosexual behavior results from biological, innate differences between homosexuals and heterosexuals. The nurture theories, in contrast, state that homosexual tendencies form as a result of one’s sociological environment, and that homosexuality is an acquired trait. Recent research, however, indicates a stronger assumption towards biological causes of homosexuality and leads one to question the validity of the nurture theories in influencing homosexual behavior. Nature Theories Theories crediting homosexual behavior to natural, biological factors take many different routes. The three main subcategories of biological theories include hormone theory, brain theory, and genetic theory. Although neither the nature nor the nurture theories are entirely conclusive, recent research suggests more of a correlation between biological theories on the causation of homosexuality as opposed to sociological theories. Hormone Theory Several studies have been conducted in an attempt to prove the

God On Trial The Controversy Behind The Existence Of God

The film God on Trial explores the controversy behind the existence of God and his goodness, in terms of the Jewish people and the Holocaust. One argument that is presented is that God cannot exist because he allowed the suffering of the Jews, despite the covenant that they shared; and if God did exist, then he could not possibly be good for the same reason. The other side of the trial that is presented is that God does exist, suffering is merely a test, and through faith the Jews and the Torah will prevail as shown in history. In actuality, this argument can be summed up in one sentence: God cannot be both all powerful and just. If God were all powerful then He would be able to put an end to suffering, and because he does not, He is not†¦show more content†¦God may have delivered them from evil, but He was also the creator of said evil and the one who placed the Jewish people in the center of it. God was the one who created their famines, placed them in the hands of the Eg yptians when he should’ve been aware of their intentions, and subjected them to numerous genocides like the Holocaust and pogroms. If they were His people, why must they constantly suffer under His watch? Another example of this is the fact that not only did the Jewish people suffer at the hand of God, those around them had to suffer as well. This is similar to the wasp that Jacques mentions in the film; it lays its eggs inside a caterpillar and then eats its way out, which kills the caterpillar. Sometimes in nature, in order for one to survive, another must die. In his article â€Å"The Bible and the Legitimation of Violence,† Collins says, that the book of Deuteronomy â€Å"repeatedly tells the Israelites to be compassionate to slaves and aliens, and to remember that they were slaves in the land of Egypt.† Therefore, God’s inclination towards violence does not make sense. God wanted all of humanity to be good and preach goodness, despite whatever hardsh ips they had faced. In His eyes, everyone was deserving of love and no one should be forced to have faith in Him. The reason for this was quite simple, if one has to be forced by threat of violence to believe and trust in a higher power, then they are not being faithful for their own sake but only out of fear. GodShow MoreRelatedThe Myth Of Evil By Phillip Cole1384 Words   |  6 PagesEvil has been a topic that has always been discussed with some amount of controversy—especially in the religious aspect. People who have the Judeo-Christian-Islamic perspective wrestle with the notion of how there can be an omniscient, omnipotent, and perfect God who allows such atrocities to happen in the world. It is also difficult to understand how God also allows natural evils — like hurricanes or cancer— to ruin people’s lives and harm people in any way. However, the discussion of evil expandsRead More Creationism vs. Evolution Essays1663 Words   |  7 PagesCreatio nism vs. Evolution This paper will focus on the huge controversy between Creationism and Evolution. I will provide two opposing viewpoints on this subject. First, the discussion will focus on the question of why many people believe that God created the universe and all living things. On the other end of the spectrum, scientific information will be presented that substantiates the evidence against the existence of God. This creationism counter-argument known as evolution has itsRead MoreReconciliation Between Victims And Perpetrators1640 Words   |  7 PagesThroughout the course of human history, violence has been a reoccurring theme in the conquest for power in countries across the planet. Understanding the ideology behind some of this violence have puzzled historians and psychologists for centuries; furthermore, the presence of reconciliation between the victims and perpetrators after some of these horrific acts of terror is even more astonishing. This form of reconciliation was a significant factor during South Africa’s Truth and ReconciliationRead MoreThe Presence Of Reconciliation Between Victims And Perpetrators1647 Words   |  7 PagesThe Presence of Reconciliation Through Violent Acts Throughout the course of human history, violence has been a reoccurring theme in the conquest for power in countries across the planet. Understanding the ideology behind some of this violence have puzzled historians and psychologists for centuries; furthermore, the presence of reconciliation between the victims and perpetrators after some of these horrific acts of terror is even more astonishing. This form of reconciliation was a significantRead MoreJohn Calvin And The Doctrine Of Providence2135 Words   |  9 PagesCalvin accepted that God was responsible for suffering however refused to believe that God was also guilty of it. Calvin composed the doctrine of Providence, this referred to God’s interaction in all that occurs during our lives; â€Å"everything is subject to God and ruled by his will and that when the world has done what it may, nothing happens than what God decrees† . This innovative concept sparked instant controversy as it potentially challenged ma ny standing ideologies of existence and religious understanding;Read MoreTypes Of Depression : Major Depression2516 Words   |  11 Pagesdifferent struggles and trials in our life that can bring us to the very end of our wit. There are good and bad days, but nonetheless, there will always be a struggle at some point in a persons life. Whether it be a struggle that was in the past and is still dwelling deep inside, or a struggle that is continuous, and almost effortlessly holding onto our very souls. As that struggle holds on, there is always a sense of â€Å"is this all worth it?† Many people question their existence, why they are the wayRead MoreThe Big Bang Theory, The Theory of Evolution, and the Bible Essay2843 Words   |  12 Pagesprovides background and analysis into the subject of science versus religion and analyzes how significant discoveries (namely the Big Bang Theory and the Theory of Evolution) have swayed generations of people into attempting to understa nd the science behind the universe’s, as well as our own, origin. It is not an explanation as to why one side is correct over the other, but simply an explanation of the trending upward of the demographic of those who prefer to believe scientific hypotheses over BiblicalRead MoreEvolution vs. Intelligent Design Essay3619 Words   |  15 PagesThe Evolution of the Creation Controversy in Twentieth Century America The fact of evolution is the backbone of biology, and biology is thus in the peculiar position of being a science founded on an improved theory, is it then a science or faith? Charles Darwin The empirical detectability of intelligent causes renders intelligent design a fully scientific theory. William Dembski Introduction Questions on the origin of life and of the universe must have permeated human thought sinceRead MoreThe Battle For Equal Rights Among Women Essay1428 Words   |  6 Pagesaffairs. The 1995 PBS documentary, â€Å"One Woman, One Vote† successfully established an informative timeline, using letters, film reels, photographs and a variety of voices, to recreate the events during this strenuous fight for equality. In a 72 year existence of the Declaration of Independence and woman having no right over their children, their own bodies and absolutely no political foothold; woman ceased to exist legally for far too long. Half of the citizens in America were keeping the other half fromRead MoreThe Classical Version Of Skepticism1218 Words   |  5 PagesBCE) was one of the first religious skeptics. He questioned the existence of the various gods the people in his society believed in and the religious authority. He was seen as an anti-religious enemy of the state that was poisoning the younger generations’ minds, which led to his arrest, trial, and ultimately his death. However, Socrates was only skeptical of religious beliefs and practices because he was unsure of the truth behind it and not because he was anti-religious. And throughout his life

Financial Management in Microsoft Corporation - 1648 Words

Financial Management in Microsoft Corporation Microsoft Corporation Brief Company Profile Microsoft is a multinational IT company. It was primarily established in 1974. Later in years, the company developed further computer and software interest, leading to the establishment of its MS-DOS and Microsoft Windows interest. Its headquarters are based in the United States, specifically at Redmond, Washington D.C. Similarly, it diversified to involve with other industries, such as video game, electrical and digital industries. Recently, the company has accomplished acquisition prospects with communication companies such as Skype. The company has exercised monopolistic functional operations (Geisst, 2006, pg 179). Consequently, it has a less competitive environment, leading to anti-competitive schemes. It mainly deals with production of exotic software and operating systems. It has the general public as its central target clienteles. The MS- Office software is used in all vital fields of life, from homes in conducting home business, schools in teaching stud ents various computer-related subjects and topics as well as in professional and administrative entities of work (Hildebrand, 2007, pg 4). It also deals with the production and equal distribution of internet services. The corporation undertakes its operation through motivational mission and vision statement. In conjunction with organizational values in the corporation, the mission and vision statement enable the firm toShow MoreRelatedMicrosoft And Apple Inc. Financial Analysis Essay1012 Words   |  5 Pages Financial Ratios Name of student Name of institution â€Æ' Microsoft and Apple Inc. Financial Analysis The financial analysis expressed in this paper shows a comparison of two large firms in the communication and technology industry. Microsoft and Apple Inc. both deal in telecommunication gadgets and accessories within the United States and around the world. The paper focuses on the financial comparison of the two companies for two fiscal years of the year 2014 and 2015. A close analysisRead MoreMicrosoft Corporation Case Study1025 Words   |  5 PagesAbstract Microsoft Corporation is a firm that has a global presence. It has created products that are used throughout the world, including Windows and Office suite that provide a rich framework for businesses across the world. Nonetheless, stiff competition from new entrants and existing rivals has put the organization at a disadvantage as it continues to lose its grip on the market. A recent corporate restructuring saved the company massive resources, but its change management process remained questionableRead MoreStrategic Initiative Paper.1324 Words   |  6 Pageshead: MICROSOFT STRATEGIC INTIATIVE 1 MICROSOFT STRATEGIC INTIATIVE ï ¿ ½ PAGE * MERGEFORMAT ï ¿ ½7ï ¿ ½ Microsoft Corporation - Strategic Initiative Paper Ruby Lee, Edward Abaunza, Brian Hammock University of Phoenix Finance for Business FIN 370 Grace Reyes August 29, 2010 ï ¿ ½ ï ¿ ½ Microsoft Corporation - Strategic Initiative Paper Over the past few years the economy in the United States has taken a downturn. It has been so bad, that some businesses were not able to survive. However, Microsoft CorporationRead MoreFinancial Analysis Of Microsoft Corporation971 Words   |  4 PagesFinancial Analysis of Microsoft Corporation The student learner was to pick a publicly traded company and perform a financial analysis based on the company’s financial statements. The student learner chose Microsoft Corporation. The student learner will obtain, analyze, and determine Microsoft’s financial well-being. Microsoft has better return on assets, but they can improve in other areas. Microsoft can increase profit margin, asset management and based on Microsoft s assets, and capital theyRead MoreEssay about Kudler Accounting System809 Words   |  4 PagesKudler Accounting System Dynamics ERP by Microsoft Corp. is the best choice for Kudler Fine Foods as they need a new accounting system in order to operate at full capacity the key features, technology, costs, and benefits in which they have to ensure growing success within Kudler Fine Foods depends on upgraded accounting technology to stay ahead of their competitors. The key features for this product, the core technology, overall benefits, and the low costs compared to the competition is the keyRead MoreInternal and External Factors of Management1396 Words   |  6 Pagestop 500 largest companies in the United States (Time Warner Co., 2008). Being ranked no. 44 in 2008, Microsoft has increased its revenues 15.4% since 2006 because of its continued efforts to release latest technology (Time Warner Co., 2008). To understand how Microsoft continues to lead in profits, sales and technology, the consumer must realize internal and external factors influence how Microsoft performs and operates. In depth, Microsof t’s planning functions are influenced by the consumer’s needRead MoreCase Study : Ford Corporation, And Nike Corporation Essay859 Words   |  4 Pagescompanies that I selected for this project were Microsoft Corporation, Ford Corporation, and Nike Corporation. Their company symbol which is exhibited by the National Association of Securities Dealers Automated Quotations (NASD) and New York Stock Exchange (NYSE) for Microsoft is MSFT, for Ford is (F) and Nike is NKE. Financial Results of Investment The companies that I selected for this project were Microsoft Corporation, Ford Corporation, and Nike Corporation. Their company symbol which is exhibited byRead MoreStrategy And Organizational Structure Of Microsoft1021 Words   |  5 Pages. Management structure and nature. 3.1. Strategy and Organisational structure of Microsoft: â€Å"One Microsoft one Strategy â€Å"-Reorganisation Microsoft underwent organisational restructuring in the 2013 shifting its executive around different roles. Previously the company was divided into eight product and services division. The concept of restructuring was to aim at â€Å"One Microsoft† objective to mitigate the issue of sub orientation. The new structure was built around functions to avoid duplication ofRead MoreMicrosofts Management Planning Essay1231 Words   |  5 PagesMicrosoft’s Management Planning Paper Within this paper Microsoft’s organization will be assessed with the planning functions of management. Along with a brief analysis of Microsoft’s history and the impact that legal issues, ethics and corporate social responsibility have on the planning functions of management. It will also analyze the factors that influence the Microsoft’s strategic, operational, and contingency planning. The Microsoft corporation is one of the most prevalent and powerfulRead MoreMicrosofts International Financial Management: An Analysis1234 Words   |  5 PagesMicrosoft Microsoft is one of the largest technology companies in the world. They are selling numerous products ranging from software, web browsers, services, hardware, accessories and game consoles (such as: the X Box 360). The overall scope of their business has become so large, that they are the target of regulators, who believe that they are stifling competition and innovation. This is a sign of how the firm has established a large international presence around the globe. (Microsoft, 2013)

Internet Technologies And Communication Protocols Sample Solution

Question: 1.1 Critically evaluate different internet technologies and communication protocols 1.2 Critically compare different internet services and internetworking servers 1.3 Discuss network management concerns and make recommendations to sustain network security, reliability and performance 2.1 Critically analyse different internet server technologies and their performance 2.2 Explain the hardware and software components of an internet server 3.1 Produce a system specification to meet a given requirement 3.2 Evaluate the suitability of internet server components 3.3 Build and configure an internet server including services to meet a given requirement 3.4 Critically review and test an internet server 4.1 Install and manage websites and services to meet a given requirement 4.2 Implement secure network access to meet a given requirement 4.3 Monitor and troubleshoot an internet server and services 4.4 Critically evaluate the performance of an internet server Answer: Internet technologies and related communication protocols. Also, compare different Internet services and internetworking servers as well as their related security TCP/IP is a also called stream protocol, connection which is created between the server and client. Any of the data transfer between the two points which will guarantee to land, thus is the so-called protocol which is lossless. Since TCP protocol is known as short form, which is connected in the two of the endpoints, it is known as peer-to-peer of the protocol. Domain Name System(DNS) is thehierarchicaland the distributed system for the computers, any resource which will be connected to Internetor to theprivate network. Numericalof the IP addresseswill be needed for purpose of the services which are computer and devices are worldwide Dynamic Host Configuration Protocol(DHCP) is the standardized protocol of the network which will be used on the networks ofInternet Protocol(IP) for dynamically which will be distributing the configuration of network parameters. (Vangie, 2013) The Simple Network Management Protocol(SNMP) is used to manage the protocol of Internet-standard for managing the devices on IPnetworks. Devices which are naturally support SNMP for example routers, The Routing and Remote AccessService (RRAS) is the Microsoft API and used for software of server for access of routing and remote able to give service of the capabilities of operating system, which will function as the networkrouter. Telnetis used for the network protocolon the networks of local area, this give the bidirectional interactive of the text-oriented announcement facility using the connection of virtualterminal. Internet Corporation for the Assigned Names and Numbers(ICANN) which is responsible for coordination of the methodology and maintenance of several databases for the unique identifiers which are related to namespaces of Internet. Asupernetwork, orsupernet, is Internet Protocolwhich is created on combination of the two or more networks with the commonClassless Routing of Inter-Domain. The process which is involved in forming a supernet is also supernetting, Electronic mail,is the technique of exchanging the messages which are digital from an person to one or more person Electronic commerce, in another also called E-commerceorecommerce, mean to sell products or services from the computer networks, such as the Internet Instant messaging(IM) is the kind ofthe online chatwhich offers instantly text thetransmission over theInternet, where a message works in the similar way over the local area network. Certificate servershave keys which contain encryption algorithmsthat help us to secure communication for the user. TheWorld Wide Web(WWW,W3) -It has as well usually become recognized simply as Web. Individual manuscript pages on internet which are known as web pagesand will be accessed with application of software running on user's computer, commonly known asweb browser. File Transfer Protocol(FTP) is used for transferring the file from one host to another. Database serveris thecomputer programwhich will givesdatabaseservices on other computerDatabase management systemsregularly give database server the functionality, and someof the DBMS reply completely on clientserver model for the database access. Microsoft Commerce Serveris the product ofMicrosoftfor constructionof e-commerce systems Microsoft .NETtechnology. This is thelist of the mail servers:agents of mail transfer,agents of mail delivery, and some othercomputer softwarewhich givee-mail insideInternetmessage handling services(MHS). In the networks computer, theproxy server is server which will acts as the intermediary for the requests from seeking the clients resources from otherservers. Adirectory serviceis the system which will stores and will organizes, and which gives access to data on the directory of the computer operating systems. In the software engineering, the directory is the map between values and names. Ethernet hub,active hub,network hub,repeater hub,multiport repeaterorhubare device for the connecting multiple devices ofEthernetwhich will bring together which will act as the segment singlenetwork. It consist of the multipleports of input/output(I/O), in with thesignaltaken at input of anyportwhich will appears at output of every port apart from the original incoming. Anetwork switch is acomputer networking devicethat connects devices together on acomputer network, by getting the packet switchingto receive, process and forward data to the destination device..[2 Routingis the process to use to get paths in the network then .afterward function described as simplyforwarding. Routing is performed for many kinds of networks, which include thetelephone network(circuit switching),electronic data networks Network securityconsists of provisions andpoliciestaken by a network administratorto stop and unauthorizedaccess, to the, network- resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Firewallis used in system of network securitywhich controls the network of outgoing and incoming traffic based on the set of applied rule.Firewalls will exist both as the software solution and as the hardware appliance. SI and TCP/IP Reference Models The architecture of TCP/IP is the functionally which is equivalent to OSI reference model. Both models which will contain the transport, application, and the network/Internet layer for systems The model of TCP/IP does consist of the session layer or the presentation layer. Models consist of the layer which is lower that always connects with upper layers to network of actual physical. OSI reference model, the layer which is lower is known as the physical layer. TCP/IP , the layer which is lower was known as layer of host-to-network. Sub layer is known as medium access control (MAC) sub layer along with the Layer 1 to give connectivity over wireless link. Virtually all features of wireless equipment which will appraise operate at physical, data link, and layers of network of OSI and TCP/IP reference models. Peer Protocols Protocols of Peer run across on Internet which give communication only between processes of same-layer. One example of communication process of same-layer is the Hypertext Transfer Protocol (HTTP). HTTP browser obtains the information from the peer web server which will run on application layer on another network. Application Layer Protocols and Functions The layer of application is where end user programs will run like, Telnet, Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP), and HTTP live examples of protocols of application layer. Wireless equipment will works on same network software of management which will operates at application layer level. Transport Layer Protocols and Functions The transport layer's job is to provide the reliable interactions from application to applications despite of lower-layer communications link and protocols. The transport layer will send data from application layer and will pass it to network layer. Distinctive transport layer protocols are the TCP and the User Datagram Protocol (UDP). Network Layer Protocols and Functions Network layer protocol is IP which utilizes routing protocols such the Routing Information Protocol (RIP) and the Border Gateway Protocol (BGP). Data Link Layer Protocols and Functions The data link layer has a logical link control (LLC) sub layer and MAC sub layer. The layer of data link will work and will performs a variety of range functions, which will include segmenting bit stream into the frames, handling of error, control of flow, and the access control. Physical Layer Protocols and Functions Physical layer of transports store the data from the data link layer and send wirelessly to distant network. (Charles, 2005) internet server is a processes to requests using HTTP,which is used to send information on World Wide Web. [1] The server components are in IIS7 are the blocks which request the processing combine the application pools, different modules, handler mappings, and ISAPI filters. This section includes: Application Pools Modules Handler Mappings ISAPI Filters Application Pools An application pool are used to groups applications together separating them from applications in other application pools for the another process boundaries In IIS7, application pools on two modes which are: Classic mode and integrated mode. The pool of application mode will affects Web server processes of requests which comes from managed code However, another if managed application runs is running on the application pool with like ISAPI mode, then requests of Web server route for managed the code to the Aspnet_isapi.dll, Web server, is the important part for the webapplicaiton we need to configuration settings to problem in the server contact we need to follow certain precautions in order to secure server . The categories behind rationale are as follows: Updates and Patches Threats to security are created by the vulnerabilities which are extensively published and will be well know to everybody when the new vulnerability will be discovered, code are the exploit and it will be posted on boards of Internet bulletin. Services The services are major vulnerability points of the attackers who will take capabilities and privileges of the service to right to use local Web server or other servers of downstream. Protocols Please avoid this protocols that are inherently which is insecure, take suitable measures to give secure communication and authentication. Directories and Files Secure all directories and files with restricted permissions of NTFS that only permit access to important user accounts and Windows services. Use auditing of Windows to permit you to notice when unauthorized or suspicious activity the occurs. Ports The services which run on server for specific ports so they provide respond to all the incoming requests. With all the ports on your server which will ensure that an insecure and inactive service is not working. Auditing and Logging Auditing is a tools for which identifying intruders attacks in progress, and evidence of attacks that have occurred. Virtual and Sites Directories Virtual and Sites directories are straight exposed to Internet. Even though the configuration of secure firewall and defensive ISAPI filters the defence in the depth strategy which is recommended. Script Mappings Remove all the script mappings from the server that include all the unnecessary files ISAPI Filters remove all the ISAPi filter this harm the security setting of the server. IIS Metabase IIS metabase used to maintain the IIS configuration Machine.config File of Machine.config save all the configuration settings of machine-level used in the application of .NET Framework as well asp.net security Implement the following Installation technologies Website and active directory Open IIS Manager. For information about opening Open Connectionspane, -click Sitesnode , and then clickAdd Web Site. Add the Web Site name for the Web site in Web site name In Physical pathbox, type physical path of folder of Web site's and then browse button (...) to navigate file system Default IP addressbox is set toAll Unassigned. Virtual directory: Openthe Internet Information Services (IIS) Manager: If Windows Server 2012 or Windows Server 2012 R2 will be used then: Clickthe Server Manager, then theTools, and Internet Information Services (IIS) Manager. On taskbar, clickStart, point Administrative Tools, and then onInternet Information Services (IIS) Manager. In Actionspane, just useView Virtual Directories, and then Add Virtual Directory... Create Ftp: click the IIS Manager then click on theSitesnode in tree. set a folder at "%SystemDrive%inetpubftproot" give the permissions to allow anonymous access: Ans 4 . Configure your Web Server including the following technologies/services IIS itself provides an FTP service, which allow users to work as remote computer systems used to copy files to and from the server in network In IIS6.0, FTP service will allow to isolate the users at site level, the feature called asFTP user isolation, which will help administrators commercialize and secure their Internet sites. Because of easy availability and broad adoption of the FTP SMTP: The SMTP service in IIS processes for sending messages using SMTP , which used a TCP/IP protocol it help to send and receive messages from one computer another computer network. Ans 5. Manage World Wide Web server security. Web servers have different security considerations from those of standard Microsoft Windows servers. You have two levels of security: Windows security:At level of operating system, we will create the user accounts, and configure admission permissions for the directories and files, and set the policies. IIS securityAt level of the Internet Information Services (IIS), you will set permissions of content, controls of authentication, and privileges of operator. Before setting permissions of IIS security, you will use security settings of operating system to do following tasks: Manage and Create accounts for groups and users Configure permissions of access for folders and files create User and Group Accounts IIS User and Group Essentials Group and User accounts will be set on local computer level or on the domain level. As the Local accounts which will precise to the individual computer, you will specifically or grant the permissions. Local accounts use IIS servers which are not part of the domain or you will want to limit the access to the specific computer. Use domain accounts when servers are part of the Windows domain and users wants to be able to admission resources throughout domain. Local System all IIS and Indexing Service users log on using the local system account. Logon Accounts of Indexing Service and Managing IIS Indexing Service and IIS are used by account of local system to log on to server. Using account of local system which will allow services to run the system processes and it will perform the system-level tasks. Figure 5-1: Use the Log On tab to configure the service logon account. Generally user account is by default is local user account Managing the Internet Guest Account the user account to use for anonymous access. Normally, anonymous access is at the site level, and all files and directories within site use this settings. You can change this behaviour for individual files and directories as necessary. user account is managed. Either you manage the password of IIS manages In the Internet Information Services -click the icon of the computer you want to work with, and then select Properties. This show a Properties dialog box. The Username field specifies the account used anonymous access to the resource. you want to use Windows security level you perform all other account management tasks, including :Enabling or disabling accounts Unlocking the account after it has been locked out. Managing the Web Application Account At the IIS security level, we use Component Services snap-in to specify the account used by out-of-process applications .use MMCin the Open field This opens the Microsoft Management Console (MMC) Click on Component Services, and then on Add. Close Add Standalone Snap-In dialog box by just clicking Close, and then OK. Expand node for computer and then expand COM+ Applications node. Right-click on IIS Out-Of-Process Pooled Applications, select the Properties, and then on the Identity tab. (Kale, 1991) In Password and Confirm Password fields, type password for account.. To maintain and manage the health of a Web server. When you will ensure the server's health, you will perform numerous functions either independently or all once. You will also decide whether to notify the problems, or to contain the problems which are automatically corrected.Server healthchecks will be performed for the entirevirtual serverat one time. You will be the administrator of virtual server, or have Manage Server Health will always right to run the server health check. Verify continuation of Web sites. This will check and verifies whether subwebs on theroot webwhich willexist in file structure. It will looks through file of services.cnf in root web which will find the subwebs should survive, and then verify the file system which will see if they do. If the directory or subweb does not survive, and this will identify that will fix the problem, the file of services.cnf will be updated to reproduce fact that subweb does not survive or that folder is not the subweb. This process will be repeated for each subweb of root web. Check roles of the configuration. Check that user setting of role will be enforced. This will check detects and repairs probable problems with the roles, including following: the user record has invalid format, Reapply the file system security. This option looks at the user and roles permissions you have created for your Web site, and then applies those settings to the file system. Tighten security. This will check guarantee that all necessary Web site directories and files will be present, and that users with proper permissions have access to them Check access of anonymous. This help to Check Server Health you use thecheckoperation. owsadm.exe o check Thecheckoperation runs the server health check; RepairDB Synchronize the databaseoption in HTML Administration pages) ValidateServicesCnf(corresponds toVerify existence of webs CheckRolesConfig(corresponds toCheck roles TightenSecurity(corresponds toTighten securityoption in HTML Administration pages) owsadm.exe o setproperty pn RepairDB pv fix -p 80 References: 1. Vangie Beal, 2012, DHCP Dynamic Host Configuration Protocol, https://www.webopedia.com/TERM/D/DHCP.html 2. C. Kale, 1991, A TCP/IP Tutorial, https://tools.ietf.org/html/rfc1180 3. Vangie Beal, 2013, TCP/IP, https://www.webopedia.com/TERM/T/TCP_IP.html 4. Justin Ellingwood, 2014, An Introduction to SNMP, https://www.digitalocean.com/community/tutorials/an-introduction-to-snmp-simple-network-management-protocol 5. Microsoft, 2003, What is SNMP, https://technet.microsoft.com/en-us/library/cc776379(v=ws.10).aspx 6. Charles M. Kozierok, 2005, The TCP/IP Guide, https://www.tcpipguide.com/free/t_TransportLayerLayer4.html

Tuesday, May 5, 2020

Sustainable Built Environment

Question: Discuss about theSustainable Built Environment. Answer: Introduction The University of South Australia (UniSA) proposes the development of new learning center for providing learning space to the students for both formal as well as informal learning activities. The focal point of the development is provision of a green campus for providing the students a civic green and sustainable environment for learning as well as recreational activities. The Development Assessment Commission and Adelaide City Council developed the proposal for the new building for last 18 months. The site for the proposed development is located at 217-243 Hindley Street and is outlined by Philip Street at the South (www.unisa.edu.au 2016). There are certain criteria for the sustainable built environment and the guidelines of the appropriate practice must comply with the proposed development plan to be considered as a sustainable building. The first criterion is Natural sources that focus on minimization of disruption and maintenance of ecological balance. The proposed plan is assessed for compliance with the practices. The decisions made by United Nations Conference on Environment and Development are monitored for implementation by United Nations Commission on Sustainable Development (Dahl 2014). The planning approvals of the proposed building are reviewed and accordingly the issues are addressed using Jeffrey Smart building which comes under Adelaide CBD building. The Selected Appropriate Set of Best Practice Criteria for Sustainable Built Environments is Criteria 1 of Natural Resources. Criterion 1- Natural resources According to criterion 1, the buildings should be made nature friendly. It also emphasizes on minimization of ecological disruption (Newman and Jennings 2012). Water management: the entire water cycle should me managed in order to maintain within the prescribed range of extraction levels and in consistent with the sustainable issues. Land use management: urban footprint should be minimized Energy sources: they should be used efficiently and the effects of green house gases must be reduced Materials of the building: the type, content and nature of the materials used for the building must be suitable for the given locality. Waste products management: the waste substances from the building materials and other sources must be minimized and a proper recycling procedure must be adopted (Townsend et al. 2015). Jeffrey Smart Building has proper water cycle management scheme to maintain the levels of water extraction within the sustainable limits. The rainwater tank will be located in the lawn area, storm water collection at the deciduous tree base for biofiltration that helps in watering the nearby vegetations (www.wilsonarchitects.com.au 2016). The overall land use requirements are found complying with the standards as evident from the assessment. The deviation of the plan will impart no negative impact on the adjoining buildings or the environment. The measures for efficient use of energy sources comply with the prescribed requirements as the solar energy system has been installed such that it meets 70% of the energy needs. Appropriate materials for the building are proposed to be used that includes precast concrete, clear and tinted glazing, grey zinc and grey metal, which is considered appropriate for the locality. The waste management system is appropriate and have proper recycling scheme for minimizing and reducing the waste substances. It has proper waste storage system along with private waste collection. Bligh office tower is situated at central part of Sydney. Ingenhoven Architects designed it. It has a Green star standard. It is a 30-story building. It complies with the set standards of category one (www.archdaily.com 2016). The water management is planned well and has a recycling system of its own. It has a filtration system, which has the capacity of recycling the wastewater produced from the building. Hence it has a well developed waste collection system as well. The energy system of the the building is such that the cooling, heating and power generation combination is used, called Tri-generation. Vacuum tube solar collector achieves the onsite electricity (Hewitt 2012). The building is made of glass materials mainly that enhance its appearance and the central atrium is of good height making the entire place exposed to daylight. This allows natural ventilation to the building and makes it hold a natural environment. It has a parking space with showers that imparts to its eco friendly nature making it a sustainable construction (Ingenhoven, Reute and Dieckmann 2014). Using the Adelaide CBD Building Selected, the Review of the Planning Approvals Process and Addressing the Issues are Done land use (zoning): The building site lies within the zone of Mixed land use zone. It also comes under policy area 19- west end policy area. Mixed use zone accommodates a combination of several activities like shops, banks, hotels, warehouse, educational institutes, residential complex as well as commercial area. The policy 19 has a set of requirements in context of the land use. It should consist of industries, various service centers, retails, showrooms, educational, cultural, clinical along with cultural and a diverse range of activities that add to the environmental development. In the west end area, artistic activities and accommodation for students are encouraged to supplement the various educational facilities. It also includes shops, cafes, shops and hotels providing various activities that create interest in the frontal side of the street that contribute to the environmental and sustainable development (Thom et al. 2016). character areas: The desired character requirements as per the policy are met by the proposed building plans. According to the policy of West end and land use, it requires transformation of a low scale township into a medium scale building and replacing the poor environmental amenities by effective using the land. The proposed building plans meet the requirements as it eliminates 106 car-parking areas and transform the area by constructing high quality building that improves the amenity of the location. The building site does not include any such heritage area but its proposed office is a heritage building used for legal studies. The development control has two principles regarding the heritage site. The development should be such that it does not affect the cultural heritage of the site and the ethnicity is maintained well. The other norm says that the balcony or other areas should maintain a consistency with the neighborhood building and the scale of the street should also be equal ly consistent with the street. setbacks: The ground level of the building to the frontal part of the street should be in such a proportion that the setback level prevails at zero or rather no such level exist. It also includes set back at the upper levels of the podium. The continuity can be maintained with the street frontal part by the facade line continuation of the street. The set back should be incorporated such that it follows the regular pattern of the other prevailing buildings of the locality that would help in meeting the desired criteria (Rauscher and Momtaz 2015). scale: As per the development control principles the development would be of such scale and height that it is reflected to the street which it fronts. It should be consistent in terms of parapet lines, height and floor levels of the other buildings of the zone. It should be consistent with the display patterns of the frontal side with other neighborhood buildings and huge unbroken facades must be avoided. The university building proposed plan complies with the above mentioned criteria (Hartill 2012). built form: The building is proposed to be built with a height of 35.5 meters, it is planned such that its height is 33 meters in the Hindley street area and at the eastern side of the front area is tapered down to 26.1 meters. As per the guidelines, the ideal height should be 28 meters in height at the most and the lower limit is 17 meters. However, there are certain exceptions according to which a building exceeding the prescribed limit is not contemplated in view of the development that it adds to the locality and besides contribute to the sustainability aspect (Dovey 2014). water: The water management is planned such that the sustainability is maintained. The rainwater is used for harvesting and a storage reserve of 50litres capacity is proposed which is located below the lawn area for flushing water to maintain hygiene the toilets. It will also be used for the purpose of water testing for protection from fire. The storm water will be channeled from the courtyard to the base of the tree for bio filtration and the filtered water to be used for irrigation and nutrition of the nearby vegetation. In this way the water management plan meets the requirement and water is proposed to be reused in this manner to retain sustainability (Furlong et al. 2016). wastes: The waste management scheme proposed by the building plan is in accordance with the development policy. The policy suggests that the development should be such that the waste products are managed properly, proper deposition of the waste matters, waste bins, recycling of storm water, waste water or grey water and dedicated area will be made so that the wastes do not add to the environmental contamination. The waste bins will be frequently emptied into the waste collecting vehicle and a waste management contractor will be consulted for ensuring proper waste management procedure. will be Moreover, the wastes from the construction site, building materials and others are also considered to be deposited in a separate area for minimizing pollution and maintaining the ecological system (Zaman 2014). energy (including passive and embodied): According to councils provision for energy efficiency, the development should be such that they ensure sustainability for long period and are compatible with the environmental backdrop. It encourages utilization of alternative sources of energy and promotes minimization of the renewable sources use. The building attempts to adopt the energy efficiency initiatives to achieve five star rating necessary for sustainable buildings and constructions. Hence, the designs for efficient energy usage will be provided in the display and the residents will be provided with proper education and knowledge for efficient use of energy resources. There will be monitoring system for checking the energy consumptions of the building. Mechanical plants are proposed to be used for reducing the green house gases effect. Air conditioner with low energy will be installed. The magnetic bearing compression system will be used for chilling and providing high performance o utput. Solar system for hot water will be designed to meet 70% of the hot water requirements. The faade systems used will be designed such that they improve 20-25% of the energy efficiencies are attained. T5 lights, low switched areas and other such systems will be incorporated along with day light compensation checks to ensure that the energy sources are utilized appropriately (Nair 2014). biophilic/biomimicry systems: Biophilia is defined as love and affinity towards the living system. The planning of the building complies with the biophilic system. It has a natural surroundings, trees and greeneries are proposed to be maintained. The courtyard will have abiofiltration system for irrigating the adjacent agriculture. It emphasizes on maintaining the greenery and contribute to ecological balance. This will help in conservation of the energy and other non-renewable sources. The solar system for hot water supply has been proposed This would act as an alternative to non- renewable resources. The control principle 170 statesthat the development with high buildings should be designed such that they are energy efficientand should not have any impact on climatic conditions like wind, temperature, daylight and sunlight. The building is planned to have 4 levels of well shielded upstream facilities. Hence, theplanned site complies in context of the biophilic system (Newman 2014). developer contributions: The developers contribution in the building site are also in compliance with the guidelines. The building site is planned and proposed in consistent with the norms and the development control principles to attain the green star scoring and add to the sustainable development of the locality. builders responsibilities: The builders contributions comply with pre set standards. The materials, waste disposal, energy management, recycling of water and other natural sources are taken into account in accordance with the building plans. conditions of development control: The development control principle 36 includes the public notification for the developments that take place. The category 1 involve all development except the one which exceeds the pre set limit, the development that is in close proximity of a residential zone and the development which are not complying with the set guidelines by the concerned authority. The category 2 includes the development which exceeds the prescribed limit. The subject site complies with the category 1 development control which implies no public notification, nut it exceeds the prescribed height. As a result it comes under category 2 and requires public notification. It requires notification of the residents and the owners (Chhetri 2013). Conclusion The proposed building is consistent with the Adelaide development plan guidelines both qualitatively and quantitatively in respect to land use, appearance, heritage, car parking, crime prevention, and wind impact, contamination of the site, noise and waste product management. The development plan varies with the guidelines in context to the proposed height of the building. However, the proposed plan with the deviation from the prescribed measure is considered if it does not have any off site impact that harms the green and sustainability criteria and comply with the desired character as laid by the development control guidelines. Moreover, there is no overshadowing of the daylight to the buildings in neighborhoods (Nelson 2016). Hence, the desired requirements are maintained reasonably in this context. According to the other policy areas guidelines of height that comes under Mixed-use zone, the height of the building should be 40 meters to be regarded as a medium scale development. The proposed building has a height lower than that but still reasonably comply with the desired characters of height a medium scale development in the context of CBD as per the requirements of the Policy area 19. Hence, it can be concluded that the planning system in South Australia is capable of providing sustainable development. References: Chhetri, P., Han, J.H., Chandra, S. and Corcoran, J., 2013. Mapping urban residential density patterns: Compact city model in Melbourne, Australia.City, Culture and Society,4(2) Dahl, A.L., 2014. Agenda 21.Global Environmental Change. Dovey, K., 2014.Framing places: mediating power in built form. Routledge. Furlong, C., De Silva, S., Guthrie, L. and Considine, R., 2016. Developing a water infrastructure planning framework for the complex modern planning environment.Utilities Policy,38. Hartill, B.W., Cryer, M., Lyle, J.M., Rees, E.B., Ryan, K.L., Steffe, A.S., Taylor, S.M., West, L. and Wise, B.S., 2012. Scale-and context-dependent selection of recreational harvest estimation methods: the Australasian experience.North American Journal of Fisheries Management,32(1) Hewitt, J.D., 2012. The design of special steelwork at no. 1 Bligh Street, Sydney. InAustralasian Structural Engineering Conference 2012: The past, present and future of Structural Engineering(p. 474). Engineers Australia. Ingenhoven, C., Reuter, M. and Dieckmann, B., 2014. From green buildings to sustainable urban design.Low Carbon Cities: Transforming Urban Systems Nair, S., George, B., Malano, H.M., Arora, M. and Nawarathna, B., 2014. Waterenergygreenhouse gas nexus of urban water systems: Review of concepts, state-of-art and methods.Resources, Conservation and Recycling,89 Nelson, A. ed., 2016.Steering Sustainability in an Urbanising World: Policy, Practice and Performance. Routledge. Newman, P. and Jennings, I., 2012.Cities as sustainable ecosystems: principles and practices. Island Press. Newman, P., 2014. Biophilic urbanism: a case study on Singapore.Australian Planner,51(1). Rauscher, R. and Momtaz, S., 2015.Sustainable Neighbourhoods in Australia: City of Sydney Urban Planning. Springer. Thom, J.K., Coutts, A.M., Broadbent, A.M. and Tapper, N.J., 2016. The influence of increasing tree cover on mean radiant temperature across a mixed development suburb in Adelaide, Australia.Urban Forestry Urban Greening. Townsend, T.G., Powell, J., Jain, P., Xu, Q., Tolaymat, T. and Reinhart, D., 2015.Sustainable Practices for Landfill Design and Operation. Springer. www.archdaily.com, 2016. Available at: https://www.archdaily.com/169173/1-bligh-office-tower-ingenhoven-architects [Accessed 27 Sep. 2016] www.unisa.edu.au 2016. Available at: https://www.unisa.edu.au/campus-facilities/maps-tours/jeffrey-smart-building [Accessed 27 Sep. 2016]. www.wilsonarchitects.com.au, 2016. Available at: https://www.wilsonarchitects.com.au/unisajefferysmartbuilding [Accessed 27 Sep. 2016] Zaman, A.U., 2014. Measuring waste management performance using the Zero Waste Index: the case of Adelaide, Australia.Journal of Cleaner Production,66.

Service Level Agreement and Maintenance Strategy

Question: Task 1 Develop a Service Level Agreement (SLA) for an ISP Investigate alternative ISPs with a view to replacing the ADSL Modem to address Ubendem Tools needs. Take into consideration that Great Southern might be willing to upgrade the ADSL Modem and/or plan to keep Ubendem Tools business. Compare at least two other ISPs. Produce a comparison table for at least two ISPs listing the type of Internet service they provide (gigabyte allowance, speed, cost, shaping, duration, penalties, etc) Ensure that you also compare ADSL modems Make a recommendation to which ISP Ubendem Tools should use (remain with Great Southern or change to one of the other ISPs) You are free to make what assumptions about the business that you feel are necessary including what Great Southerns data plan might be. Perhaps the NBN has already been completed at Ubendem Tool's location? You should state what these assumptions are. Task 2 Develop Maintenance Strategy for Ubendem Tools Oswald is happy with the solution (and the ensuing SLA) you have proposed for resolving the problem with the loss of Internet connection however it has highlighted a potential high risk area should the connection fail for an extended period of time. He wants you to develop a maintenance strategy for Ubendem Tools that will mitigate the chances of this happening. He has also asked you to include other IT aspects of the businesss needs and not just focus on having a reliable Internet connection. Develop a maintenance strategy that addresses the issues identified in the scenario. You should describe the type of maintenance strategy or strategies you are recommending and why. You need to develop maintenance strategies that address the following issues: consistency of Internet connectivity keeping software up to date continuity of information technology services (software hardware) Answers: Scenario Ubendem Tools is currently running their business using the minimum information technology resources that caters their requirement of inventory management, preparing marketing materials, printing customer invoices etc. They have recently started using MYOB accounting systems. Due to increasing problems with their internet connectivity, they have contracted an IT consultant. Business Requirements There are a number of business requirements for the information technology infrastructure of Ubendem Tools. There is a number of users who are accessing the ADSL+ modem for accessing the Internet. It is degrading the performance of the network and the bandwidth is dropping down or the connection is lost. There is a lot of colour printing but most of those are not necessary. Hence the business needs a suitable solution. There is a concern for frequent update messages from Microsoft. The company is more interested in moving to cloud based Office 365 solution. Task 1 Current ADSL modem based broadband used by the organisation is not able to provide satisfactory service to the organisation. One identified reason behind that is over use of the bandwidth by more users. Thus the company needs to reduce the number of users or upgrade their broadband connectivity and modem. NBN is also rolling out in the metropolitan areas of Sydney. So another alternative plan for the organisation may be adapting NBN for their business. In the following part, Optus and Telstra have been selected to replace the current ISP of the organisation. The summary of ADSL2+ modem based broadband connection available to the locality and the same from the NBN, have been summarised as, Criteria Optus Telstra Gigabyte Allowance 50 GB per month 10GB per month Speed With ADSL2+, maximum download speed is 20Mbps. With ADSL2+, maximum download speed is 20Mbps. Cost $70 per month or almost $1680. $1,920.00 Duration 24 months 24 months Hardware Provided In some plans it provides free WiFi modem. Other than that it a compatible telephone handset and modem are needed. These will cost extra. Compatible gateways can be purchased at extra cost. Penalties Maximum cancellation fees is $300 at the time of leaving a 24 month contract and if the customer re-contracts then it will cost $100 maximum depending on the period of discontinuation. 65% of remaining total monthly charges of the selected plan. Comparison with ADSL modem Netgear N600, Netgear DGN 2200, Netgear DG 834 are supported by Optus. The Suitable one is Netgear N600. The features of ADSL2+ modem in comparison to ADSL modem are, Provides speed up to 300Mbps. Secure with WPA/WPA2 PSK, Push N connect and WEP technologies. WPS supports a quicker and secure network connection through Wi Fi. Contains NETGEAR Genie dashboard. Provide more coverage than ADSL modems. There are four fast Ethernet (10/100) ports. There are built in DSL modem, ADSL+ and router. It helps in creating secure gateways. Provides easy internet connection sharing. Comes with shared storage ReadySHARE. Also provides access to external USB device. Set up is easier. Provides more secure guest networking connections. Automatic QoS and jitter free connection. Supports parental control. Can stream voice, online gaming, music etc. in addition to other internet applications. From the list of selected modem any one can be selected. A selection is, NetComm NB6 ADSL2+ Modem Router. Some important fearures compared to ADSL are, Faster internet access. Supports USB or Ethernet connections Built in firewall Supports VPN pass-through Supports ADSL, ADSL2 and ADSL2+ UPnP QoS ensured Easy configuration and interface. NBN Broadband Speed From 12 Mbps to 100 Mbps. 25Mbps Cost $80 per month $100 per month Data Allowance 50 GB per month 50 GB per month Duration 24 months 24 months Hardware Provided Utility box, antenna, connection box from NBN Co. and Optus Wi Fi modem. NBN Premises Connection Device, NBN Fibre Wall Outlet (NBN FWO), NBN Network Termination Device, NBN Power Supply Unit (NBN PSU). Penalties Maximum cancellation fees is $300 at the time of leaving a 24 month contract and if the customer re-contracts then it will cost $100 maximum depending on the period of discontinuation. 65% of remaining total monthly charges of the selected plan. (Telstra , 2015), (Optus, 2015) NBN is available from the vendors Optus and Telstra for the metropolitan Sydney area. The details of the plans have been summarised in the above table. After considering cost, durations, terms, maximum data allowance, it seems that NBN offers better service than the ADSL2+ based broadband services in general. Thus NBN is recommended over the ADSL2+ modem based broadband services. Based on the business requirements of Ubendem Tools, NBN broadband from Optus is recommended. It provide more bandwidth and speed at the same price and terms as Telstra. For adopting NBN broadband services, the company needs to replace their old modem to a suitable one that is capable of working with NBN broadband. For using NBN service they no longer need their existing ADSL modem. Rather they will have different set of equipment (hardware) as given above. Task 2 The maintenance of information technology resources at Ubendem Tools is mainly focused on the following factors. Consistent internet connectivity Software updates Continuity of ICT services Use of printing The maintenance strategy includes the following details: The internet connectivity should not be shared by more than the number of users allowed to share it. Otherwise there will be degradation in the performance of the network connectivity. The organisation can share bandwidth for domestic use and for business use. Instead of printing colour documents the company can use a low cost printer. It will help them make savings from their printing work, OR the default printer can be setup to print black and white documents only, and changed to colour only if required. The company is already using MYOB accounting systems. Microsoft is providing support for Windows 8.1 only. Thus it needs to move to the OS from their existing Windows 7 based environment. Windows 8.1 provides touch screen support and can be easily used from hand held devices like tablets, smartphones etc, thus the business needs move to the new operating system. To be free from the update issues, the company can use auto update option on for their system. The system will be automatically updated whenever it will get some updates. It will not notify the users. But there is a drawback, because every single update will be automatically installed while the company may not need those. A better approach is to hire some IT professional for managing timely updates. Conclusion In this report, there is a brief discussion about the scenario of the company. How they are working and what problems being faced by them. Based on that information the business requirements have been identified. For those business requirements a service level agreement and a maintenance strategy have been developed. In the SLA, two other ISPs than the current ISP of the company has been considered. The ADSL modem based broadband services offered by those ISPs have been compared, the NBN broadband services offered by those two companies have been also compared. From the results of the comparison, NBN from Optus has been recommended for the company. The maintenance strategy has also been outlined for the organisation. References Choudrie, J., Middleton, C. (2013). Management of Broadband Technology and Innovation. Routledge. Freire, M. (2007). Encyclopedia of Internet Technologies and Applications . IGI Global. Miller, M. (2013). Wireless Networking Absolute Beginner's Guide. Que Publishing. NBNCo. (2015). Connect to a better future. Retrieved from NBNCo: https://www.nbnco.com.au/ Optus. (2015). ADSL2+ Plans. Retrieved from Optus: https://www.optus.com.au/business/broadband-internet/office/dsl-phone-bundles Telstra . (2015). Telstra Business Broadband ADSL 10GB Plan. Retrieved from Telstra : https://www.telstra.com.au/content/dam/tcom/personal/help/pdf/cis-business/broadband-ethernet-dsl/business-critical-information-summary-adsl-10gb.pdf