Tuesday, January 28, 2020

Interpreting The History Of Volcanoes And Volcanic Rocks Essay Example for Free

Interpreting The History Of Volcanoes And Volcanic Rocks Essay Drawing from the diagram, the volcanic history is as outlined below and other relevant details are also supplied. 1.0 Sequential summary of volcanic history the area a. Andersite porphyry: this is the oldest. Andersite indicates magma of intermediate composition. Its silica content is midway between felsic rocks (having high silica content) and mafic rocks (having low silica content). Its formation is a two-step process where slow cooling occurs at the initial stage within the crust forming large crystals as a result. However, the remaining magma moves further out and, as a result, cools to form a fine grained texture within which the earlier formed large crystals are embedded. This indicates a slow eruption. b. Turf grading into braccia: these are pyroclastic rocks formed by violent eruption of highly viscous magma. The tuff is finer than breccia but the two are of the same occurrence of formation. The magma forces its way out shattering the surrounding plastic rocks into ashes and block fragments. These consolidate to form tuff and breccia respectively and are likely to be felsic since high viscousity indicates a high silica content c. Dacite porphyry: this is of similar composition and formation style as andersite porphyry though it has higher silica content than andersite. d. Pumice Breccia: pumice is fine textured, filled with porous holes containing gases that were trapped within the forming magma at the onset of eruption. The gases later escapes to form a light, porous glassy rock. The breccia was likely to have resulted from the shattering of the rocks as the magma erupts out. Pumice is light colured which indicates a felsic composition (felsic rocks are lightly coloured than mafic rocks) e. Polymictic breccia: this indicates a mixture of breccia of varying silica content which indicates the onset of the formation of an interrupting basaltic formation which is to follow after. However, the mode of formation is still violent. f. Basalt with rough blacky top: this is a fine grained mafic rock. The rough top indicates that the forming magma was gently erupted and the viscosity low enough to cause the included gas to just escape leaving the bubble spaces at the top. g. Andersite: this has been seen as of intermediate silica composition. The absence of porphyritic material may indicate a less quiet eruption. h. Obsidian with pumice streak: the youngest rock; obsidian resembles pumice but without the bubble holes. The presence of pumice streak indicates violent eruption since some of the gases were trapped as a result of the violence. It is felsic. 2.0 Since the last eruption is about 19 years earlier (the age of the youngest layer), the volcano is still active. The earthquakes and the likes are likely pointers to another volcanic eruption. So evacuation is imminent. 3.0 This is an example of a composite or cinder-cone volcano. The seldom occurrence of pyroclastic materials and rocks of intermediate composition suggests this. These, in addition to the fact that the rocks are from highly viscous magma, also suggests that the volcano is located at a volcanic arc.

Monday, January 20, 2020

The Power of Stretching :: Sports Running Stretch Exercise Essays

The Power of Stretching "The money and the fame are irrelevant really. I'm just a hamstring away from oblivion; you've got to look at it like that." ---- Steve Jones Running is the oldest and most popular sports in the world. Most runners feel that running is fairly simple, when in reality it is very complex. Running is one of the only sports that gives the whole body a work out. Leg strength and cardiovascular endurance play huge roles in the success of a runner, but they are not the only things that measure ones running ability. Upper body strength and back support are also important in running. Since athlete's's bodies are made up entirely of muscle, they must exercise often in order to take care of themselves and prevent injuries. Muscles are like any other thing in the world, the more you use them the stronger they get. Running long distances is strenuous on the muscles and if they are over worked and under cared for they can be damaged. Running causes the muscles that are active to become strong and less flexible, whereas the opposing muscles that are relatively under used become weaker. When muscles are being used they expand and contract often. If the muscles were not used in a while they usually get sore from the work out. Since muscles are the most important part of being athletic, proper care should go into maintaining them. Stretching before and after runs is a perfect way to care for your muscles. WHAT IS STRETCHING? The three main reason why stretching is so beneficial to a runners body is: it reduces the risk of injury, prevents muscle soreness after exercise, and it improves athletic performance. What is actually happening to the body during a stretch is very complex. Each muscle contains stretch receptors which attach themselves to the working part of the muscle called, muscle fibers. The stretch receptors measure the degree of the stretch, sending a message through the spinal cord to the nerves that control the contraction of the muscle where the receptors are. As the runner stretches more intensely the receptors begin to send out pulses harder and more rapidly. These pulses exceed a certain frequency, and the stretched muscle contracts and shortens, preventing overstretching. STRETCHING INJURIES Unfortunately, stretching is not done willingly by runners. Even though it would only take an extra five to ten minutes on top of the one or two hour run, most runners choose to skip stretching.

Sunday, January 12, 2020

How can leaders motivate staff in order to improve efficiency and job satisfaction Essay

In this essay I shall define – motivate, job satisfaction, productivity and leaders. I shall then give a brief history of motivational theories and then discuss McClelland’s Motivational Needs Theory; to explain some methods of how staff can be motivated by analysing the 3 main factors in his theory and explain how these factors can motivate staff and to see if motivation does lead to improved productivity, I shall then analyse this theory and thoughts of other theorists to see if motivation also leads to job satisfaction and conclude the results of my research. Motivate – The Oxford University Press (2014) states motivate is to â€Å"provide (someone) with a reason for doing something: he was primarily motivated by the desire for profit† 2014, 2014, February 26th, Oxford University Press, http://www. oxforddictionaries. com/definition/english/motivate? q=motivate What is Job Satisfaction? Job Satisfaction is when a person/employee is happy or content in their job. What is Productivity? Productivity is a term used to describe a state, quality or fact of being able to generate, create or improve goods and services. For example at the Chocolate Factory the Work Productivity was increased and 10% more chocolate bars were produced than last year. Or the Council’s Productivity increased after a restructure and they managed to provide more services to customers. What is a Leader? A Leader is someone who leads other people; this could be a manager, director, team leader, politician or anyone who leads people, usually staff or one or more people. Motivational Theories There have been many management theorists throughout the years from 1908 (Henry Ford) to 1990 (Dr Stephen Covey) and other theorists/theories onwards from 1990. David McClelland’s Motivational Needs Theory in 1961 identified that there were 3 types of needs for motivation: †¢The Need for Achievement (Goals, Deadlines etc. ) McClelland believed that the Need for Achievement would motivate staff; for example leaders setting goals, targets or deadlines for staff to achieve can motivate their staff to meet these deadlines (or goals) therefore enabling leaders to increase productivity and performance of staff by setting, planning and/or varying these deadlines, goals or targets. Without any goals or deadlines there is no need for the staff to achieve a certain amount of productivity such as producing/finishing a specific amount of work. Therefore I agree with McClelland that there is a motivational need for achievement to motivate staff and this can lead to improved productivity and performance. Many large companies such as Halfolds and MacDonald’s believe that Achievement motivates staff and they have reward systems in place to motivate their staff. By achieving a good performance or a certain level of productivity they can earn rewards, if a worker meets the requirements they may get praise or a reward from their leader there also may be an incentive for the staff member to achieve their/these targets of which motivates them to work harder therefore increasing productivity by McClelland’s motivational need for Achievement. But also when a staff member meets their work goals, targets or deadlines this may improve job satisfaction as they would know they have done well and their standard of work is sufficient to meet their goals even if there is no incentive, but an incentive for the staff to meet goals can help motivate staff further to meet their goals. †¢The Need for Power (Authority) Staff having authority or power McClelland believed would motivate staff, I believe this is because it gives the staff member a sense of importance by having authority and by would undertaking extra responsibilities that people with authority would usually undertake such as managing staff, it also enables them to motivate staff who they have authority over and therefore they can improve performance and productivity by successfully managing their staff as well as improving their job satisfaction, possibly by making changes. The Need for Affiliation (Good/Friendly Working Relationships/Being a part of a team, group, organisation etc. ) Affiliation/s in McClelland’s theory refers to staff being closely affiliated (or associated) which can refer to family, social, business or working relationships. This Affiliation is a state of being associated or affiliated, for example a staff member may be affiliated with a team or organisation and staff being in a team (therefore having affiliation with a team) McClelland believed staff may be more motivated by affiliation as they are associated with other staff who may most likely be working towards a similar outcome to themselves and as a part of a team they may wish to be or become a team player and motivate themselves and other team members. For instance I have affiliation with the University of West London Business Studies Course and as a student I am affiliated and effectively a part of a group of students, I am motivated to help other students as they wish to achieve the same outcome as me (a degree) and as I have affiliation with this group I am therefore self-motivated to achieve the same standard of work as my group or excel them and therefore I agree that there is a need for Affiliation and I believe this motivates me and my performance and productivity is improved as a direct result of Affiliation. McClelland believed that the majority of people have or show a combination of these 3 types of needs and some favour specific needs or a combination of these needs. Matching the correct needs to the person can strongly improve their work productivity, performance and behaviour but can increasing motivation therefore lead to an improvement in job satisfaction? McClelland does specify in his theory that motivation can improve performance and work productivity, but he does not specify that it can lead to improved job satisfaction but from analysing his theory above you can see that 2 Motivational needs factors in his theory (the need for authority and the need for achievement) can lead to improved job satisfaction, this is backed up by the fact that McClelland’s motivational theory shows that motivation can lead to improved performance of staff and there is a direct link between improved performance and improved job satisfaction. The 3rd factor â€Å"The Need for Affiliation† through personal experience at university and working as a part of team at various work places, I believe can also improve performance and job satisfaction). Naylor, Pritchard, & Ilgen; 1980; Vroom, 1964 state that; â€Å"expectancy-based theories of motivation generally stipulate that satisfaction follows from the rewards produced by performance. † Lawler and Porter (1967) who were â€Å"expectancy theorists themselves argued that performance would lead to job satisfaction through the provision of intrinsic and extrinsic rewards. As these authors noted, briefly stated, good performance may lead to rewards, which in turn lead to satisfaction. † The Job Satisfaction-Job Performance Relationship: A Qualitative and Quantitative Review 2001, 376-379, American Psychological Association, Inc, 3 I can conclude that leaders can motivate there staff using motivational theories such as McClelland’s Motivational Needs Theory in order to improve productivity and job satisfaction. I have also came up with my own theory based on McClelland’s Motivational Needs theory and the work of Naylor, Pritchard, & Ilgen; 1980; Vroom, 1964, Lawler and Porter (1967). Josh Albright’s (2014) Motivational Flow Theory I agree with McClelland’s theory; which I have discovered to some extent also agrees with other theorists (such as Naylor, Pritchard, Ilgen, Vroom, Lawler and Porter) that motivation leads to improved performance (productivity) and job satisfaction, In order to increase job satisfaction and productivity you must increase motivation. The diagram I drew below shows that the more motivation is increased or â€Å"poured into staff† the more job satisfaction and productivity will thereby be increased.

Saturday, January 4, 2020

Detecting And Protecting Against Inside Threats - 1683 Words

Felipe Affonso Kaustubh M. Phaltankar April 18, 2016 Detecting and protecting against inside threats Introduction Each day our world and our lives depend more on information systems, systems that can guarantee that our informations are secure and available just for our own purpose. Lots of companies work just if critical information which is stored on their databases. It is the responsibility of these companies to guarantee with their costumers that this data is secure. Lots of those companies are concerned about their databases and try to improve their security however. According to last year s Internet Security Report from Symantec, almost no company, whether large or small, is immune to cyber attacks. Five of every six large companies (2500+ employees) were targeted with spear-phishing attacks in 2014, a 40 percent increase over the previous year[1]. Normally, companies are aware of theses attacks and are trying to invest more and more in security. It’s important to point out that attacks are not just from the outside; breaches and even data leakage can be accomplished by inside employ ees. So, it’s really important to protect against inside and outside attacks. High-tech businesses rely primarily on two opposing information values: the dissemination of information for innovation success and the protection of information to retain competitive advantage[2]. These companies know that just physical security isn’t enough anymore, it’s necessary to implement differentShow MoreRelatedIntegrative Network Design Project Part 3 Essay1147 Words   |  5 Pages Integrative Network Design Project part 3 Student Name Course 27 October 2014 Professor Identify hardware and also software needed to secure your choice of networks against all form of electronic threats. A network that assists a workstation to link up with the other is called a Networking hardware. Whenever a business uses both routers and even firewall, the organization is guaranteed protection of both wireless and cabled networks which are used in the organization. Network hardwareRead MoreAviation Security And Airport Management1150 Words   |  5 Pagesedges or points capable of injuring people) and weapons that have potential to be used in an attack on the aircraft are prevented from being taken onboard.† (What You Cannot Take On Board | Security | Prepare | Sydney Airport, 2016) To protect against the threat of liquid explosives, quantity limits rules for Liquid, Aerosol and Gels passengers may take onboard were introduced and apply to all passengers arriving on international flights who are transiting in Australia and travelling on the domesticRead MoreMilitary Policy Essay969 Words   |  4 Pagesimpact upon the mission, support and future of US Military Policy. When looking at the role of the DOD and  its ongoing actions  in regard to: 1.)  the  continued War in Afghanistan 2.)  the recent  War against ISIS in Iraq and Syria 3.) on and off  actions of  Kim Jong-un of North Korea and recent threats against Guam and the US West Coast 4.) nuclear development concerns with Iran- what can you see about the broad role that the DOD has upon foreign affairs in general?  Do you see the possible rise of anotherRead MoreTaking a Look at Information Warfare1781 Words   |  7 PagesINTRODUCTION Over the last decades, information warfare has become a societal issue. Research shows that information warfare does not exclude to military, and have penetrated into commercial word. This issue, is a threat for organization and their assets. (Knapp,Boulton, 2006) Information is a valuable asset for businesses and organizations. Advances in information technology facilities the storing, transferring, and modifying of data. Organizations use information technologies such as the InternetRead MoreRisks Of Risk Management Programs963 Words   |  4 Pagesfacilities. The following mentioned phases are very much essential for the risk management program. †¢ MALPRACTICE CLAIMS Australia is the country, which has the most imperative rate of remedial as seen by World Health Organization. The malpractice cases against doctors and hospitals in Australia reached a crisis stage before three decades. The price of protection in the business market turned out to be high to the point out that numerous medical facilities which were set up on its own by certain individualsRead MoreUsing Wire Shark Website ( Network Forensics ) Essay1331 Words   |  6 Pagesof assault. Case study on sniffer attack: †¢ How sniffer works. †¢ How do they Sniff. †¢ Types of sniffer. †¢ Policy and solution of case study on sniffer attack. †¢ How to use secure Ethernet technology. †¢ Implement email. †¢ Detecting sniffers. †¢ Protecting from sniffers. †¢ Protecting from FOSS systems. †¢ Responding to sniffer related incidents †¢ Conclusion. How Sniffers works using Wire shark: References: wire shark website(network forensics.) To comprehend the risk that sniffers show first requiresRead MoreSwot Analysis : Counterintelligence ( Ci )1554 Words   |  7 PagesCounterintelligence (CI) involves actions aimed at protecting the United States against foreign intelligence operations and espionage from penetration and disruption by hostile nations or their intelligence services (Lowenthal, 2014). Three main components of Counterintelligence include collection, defensive and offensive. The collection is the ability to gather intelligence information about rivalry capabilities against own nation; defensive part of CI involves measures to prevent and thwart otherRead MoreU.s. Counterintelligence And Covert Operations1526 Words   |  7 PagesCovert Operations Counterintelligence (CI) involves actions aimed at protecting the United States against foreign intelligence operations and espionage from penetration and disruption by hostile nations or their intelligence services (Lowenthal, 2014). Three main components of Counterintelligence include collection, defensive and offensive. Collection is ability to gather intelligence information about rivalry capabilities against own nation; defensive part of CI involve measures to prevent and thwartingRead MoreThe Security Measures Protect The Digital Infrastructure1476 Words   |  6 Pagesdata centers for its operations, any kind of vulnerabilities in such system might provide an opportunity for exploitation to someone with an inappropriate intention. The constant threat of digital breach and exploitation gave birth to the field of Cyber Security, which is the field of technology dedicated to protecting computer devices and information systems from unintended or unauthorized access to the softwa re, hardware or the information they hold. It also involves preventing disruption or misdirectionRead MoreChild Abuse Prevention And Treatment Act1017 Words   |  5 Pages sexual or emotional abuse, and by parents and friends. Is the problem with the Child Abuse Prevention and Treatment Act that was passed to protect all children from abuse not been enforced? The way the world deals with the violence against children inside and outside of the home is a big problem. So many children today are being abused, neglected, and killed under our watch and protection. Does the place they live, the school district, the color of their skin or the parent’s history contribute