Using Free Antivirus Programs: Pros and Cons

Introduction

In the 21st century, it is almost impossible to imagine life without a personal computer. It made life so much easier  you can have all your personal information stored in one place at arms length. But together with this, arises the problem of malicious software aimed at stealing data or making your computer work worse.

Importance of Using Antivirus Programs

Even if you are a careful and smart user, installing an antivirus program on your computer is important for some reasons:

  1. It can prevent you from infecting your PC with a virus. You should keep in mind that you can get infected by simply going online and visiting a compromised website; you do not download a malware program for a purpose (Hoffman, 2013, para. 6). One more way to protect you from being infected is by blocking suspicious websites or at least warning you that the website may contain scumware.
  2. It is a good way to reduce the amount of spam.
  3. It can protect you from identity theft and spyware. Some viruses can steal your data including not only passwords or personal information but also financial data such as credit card or bank account numbers (Drew, 2013, para. 6-7). It also blocks phishing websites while you are browsing the Internet.

Main Features of Avast Free Antivirus

To guarantee a high level of protection of your data and computer, you do not necessarily have to spend much money. Today, there are a lot of free antivirus programs that are not worse than paid software. One of such programs is, for example, Avast Free Antivirus. Once you launch it, you are surprised with a nice interface  clean, clear and configurable (Williams, 2015, para. 14). What is also nice about Avast is that it scans your computer not only for malware programs but also system for unnecessary files and applications, network settings to identify security problems and analyzes the general performance of your computer (Rubenking, 2014, para. 5). This software is also really good at blocking malicious websites thus it provides reliable protection from downloading malware, but it is not as good at detecting and blocking phishing URLs.

Main Features of Panda Free Antivirus

One more good example of free antivirus software is Panda Free Antivirus. First of all, it is an app with a simple and intuitive interface that can be of great importance to first-time users. Panda, in the same way as Avast, is good at blocking malicious websites but has some troubles with detecting phishing URLs. What is nice about this antivirus is that it scans every flash drive you plugin and uses what is called USB Vaccination (Rubenking, 2015, para. 21) preventing malware detected on a flash drive from automatic launching. One more great feature is that it shows all active processes and defines whether they are dangerous or not and blocks the most malicious of them. Both Avast and Panda are very good in detecting and deleting malware.

Conclusion

So, you should always remember that it is of great importance to keep your computer and personal data safe by installing an antivirus program. Even free software can be useful and not worse than the paid ones.

References

About Avast. (2015). Web.

Drew, J. (2011). The Benefits of Having Anti-Virus Protection. Web.

Hoffman, C. (2013). HTG Explains: Why You Need an Antivirus on Windows, No Matter How Careful You Are. Web.

Panda: Company Profile. (2015). Web.

Rubenking, N. J. (2014). Avast Free Antivirus 2015. Web.

Rubenking, N. J. (2015). Panda Free Antivirus 2016. Web.

Williams, M. (2014). Best Free Antivirus Software 2015. Web.

Basic Models of Accident Causation

Accident prevention is an important part of the process for any industry. By now, a great number of theories and models have been developed to explain the causes and prevent accidents from happening in the future. There is still a debate, however, on how effectively can those theories be used in practice. While some believe that it is possible to establish the root cause of an accident, and, therefore, prevent it from happening again, others argue that the nature of an accident is too complex and that there are too many variables to consider.

There are different analysis techniques that can be used to create accident causation models and theories. Technological advances and ubiquitous implementation of technology also lead to an ever-increasing amount of theories, as the nature of accident causation mechanisms becomes more and more complex (Larouzee and Guarnieri, 2015). Sequential techniques present an accident as a result of a chain of events that was triggered by a root cause. The implication of the sequential technique is that establishing the root cause of the accident will help prevent it from reoccurring. One of the most known examples of this technique is the Domino Theory, developed by Herbert Heinrich in 1931, which serves as a basis for many of the following theories (Griffin, Young & Stanton, 2015, p.31). However, some critics of the sequential technique consider it to be too simplistic and find that it does not account for organizational influences.

Epidemiological techniques are based on the idea that accidents are a result of a combination of both active and latent factors. The latent factors can exist in a system undetected for a long time, as they create conditions for an accident to occur, but do not trigger it directly. The best example of the epidemiological technique is the Swiss Cheese Model, created by James Reason in the early 1990s. According to Li and Thimbleby (2014), the Swiss Cheese Model visualises incidents as the result of the accumulation of multiple failures in defences (represented as the holes in slices of cheese) (p. 116). This kind of technique accounts for more factors and provides a better understanding of the nature of an accident. Despite that, some people argue that because of the increasing technological advances and more complex socio-technical systems this technique has become obsolete.

A more holistic approach is represented by the systemic techniques. It diverges from the cause-effect view of an accident and rather describes losses as the unexpected behaviour of a system resulting from uncontrolled relationships between its constituent parts, as noted by Underwood and Waterson (2013, p. 4). While the systemic techniques seem to allow for a deeper understanding of the nature of an accident, other techniques can be used depending on the type of system in which an accident occurs. However, the possibilities of all those techniques are still limited. For example, according to Shappell and Wiegmann (2012), humans have played a progressively more important causal role in both civilian and military aviation accidents as aircraft equipment has become more reliable (p. 11). It shows that the human factor might just be too unpredictable, and, unlike technology, have less room for improvement.

The Domino Theory, however, is still relevant in many cases. A lot of disasters or potential disasters can be viewed as a chain of events, directly triggered by the first event. Things like wars and revolutions can often be analyzed using the theory.

Understanding the cause of an accident is an important step in preventing it and is a big part of safety management. Different theories and models exist to help achieve that; they can be used independently or as a combination. None of them, however, can always guarantee a successful result.

References

Griffin, T. G., Young, M. S., & Stanton, N. A. (2015). Human factors models for aviation accident analysis and prevention. United Kingdom, London: Ashgate Publishing.

Larouzee, J., & Guarnieri, F. (2015). From theory to practice: itinerary of Reasons Swiss Cheese Model. CRC Press, Safety and Reliability of Complex Engineered Systems, 1(2), 817-824.

Li, Y., & Thimbleby, H. (2014). Hot cheese: A processed swiss cheese model. The Journal of the Royal College of Physicians of Edinburgh, 44(2), 116-121.

Shappell, S. A., & Wiegmann, D. A. (2012). A human error approach to aviation accident analysis: The human factors analysis and classification system. United Kingdom, London: Ashgate Publishing.

Underwood, P., & Waterson, P. (2013). Accident analysis models and methods: guidance for safety professionals. United Kingdom, Loughborough: Loughborough University.

Non-Contact Driver Drowsiness Detect System

Introduction

The Non-contact Driver Drowsiness Detect System is a product which can be embedded within the structure of a car to measure the level of drowsiness of a driver. The sensing gadget basically checks for important physiological signals, such as electrocardiography, electroenceophalography, rate of breathing, and blinking of the eye with an objective of recognizing drowsiness and give warning to a driver (Dinges, 2001).

Feasibility Study

Desirability

There is a need for the Non-contact Driver Drowsiness Detect System within the marketplace currently. Accidents that occur on the roads result from fatigue. Moreover, there have been suggestions to use the detection system, but none has been produced for selling purposes. The knowledge that it has not been produced for selling is enough to reason why the product should enter into the market to serve a need among many car owners. The market has a lot of potential clients who will not waste time thinking about buying the product. The clients that will definitely be interested in having this product include commuter service companies, individual car owners, and long distance transport companies, among many other groups.

The idea of the detection system makes sense since it will assist to reduce the number of accidents that result from drowsiness. Research suggests that most of the drivers who cause accidents because of sleep-related issues are young drivers who are below the age of 25 as well as long-distance drivers (Federal Highway Administration, 1998). There is a need for these groups to have detection systems placed within their vehicles to avert any dangers. The excitement likely to occur as a result of the production of this detector system cannot be measured. Many drivers will be happy that there is a system that will solve a problem that they probably face on a daily basis.

The product idea also responds to a very important environmental trend. It will assist drivers in leading healthier lives. For instance, when the detection system sends a signal that a driver is fatigued and drowsy, the healthier choice would be to stop driving and have another driver take control of the vehicle. This means that when a person is tired, he/she should take a rest immediately. This eventually ensures that accidents do not occur on the roads as a result of drowsiness. There is a serious problem that will be eradicated with the use of the Non-contact Driver Detection System. People will not have to lose their lives anymore because a tired driver was keen on reaching the vehicles destination. Companies will be obliged to invest in the detection systems as well as employ two drivers per vehicle to replace each other when fatigue sets in (Sun, 2011).

The entry of the product into the marketplace is well timed and will fill a market gap. Although the detection systems have been studied and even tested, they have not been produced for selling yet. Therefore, the business stands to enjoy the first mover advantage in the market. This may be used in future as a competitive strategy aimed at introducing a monopoly within the marketplace. It is the perfect timing to venture into the business as there is a definite need for the detection systems. There are no flaws within the product design that could cause any problems.

Concept Testing

Summary

The Non-contact Driver Detect System is a product designed to sense the drowsiness levels of drivers and send alerts immediately. Its features include a fragile sensor electronics model and bioelectrical signals which measure electrocardiography, breathing, and blinking of the eye. The range of target markets for this product is wide. Commuter services companies, long distance travel companies, schools, and individuals are among the consumers who will benefit once the product is rolled out into the market. This product solves the need to increase driver attentiveness, while on the steering wheel. The value added is that any time a driver shows signs of drowsiness, an alert system will warn him and he will remain awake. The problem solved through the use of this product is that accidents will no longer occur because of a driver falling asleep.

This product will be positioned within the target markets. All auto spare shops in the country will have the system in their stores. Whenever any client needs to purchase the product, finding it will be easy. Pricing will be done relative to the cost of production. Therefore, for each product, the price will be scaled appropriately to ensure that there is a return on investment made. The management team is made up of five individuals who have sufficient business expertise in different business fields. Three of the managers have MIS experience while the other two have finance experience. Fatima is an ex HR manager.

Demand

Survey

  • Question one: Do you believe the Non-Contact Driver Drowsiness Detect System will reduce the number of accidents in Saudi Arabia?
  • Question two: Would you install the Non-Contact Driver Drowsiness Detect System in your car?
  • Question three: What are your thoughts on the importance of installing the Non-Contact Driver Drowsiness Detect Sytem on every car in Saudi Arabia?

Analysis

Based on the survey questions, we were able to determine that there was a gap in the market. Responses were affirmative. The product is needed within the market.

References

Dinges, F. (2001). Managing Fatigue by Drowsiness Detection: Can Technological Promises be Realized? Bristol, PA: Taylor & Francis.

Federal Highway Administration. (1998). Crash Problem Size Assessment: Large Truck Crashes Related Primarily to Driver Fatigue. Washington, D.C: Heign Press.

Sun, Y. (2011). An Innovative Physiological Signal Monitoring System for Driving Fatigue Detection. Washington, DC: Heign Press.

Reinforcing Concrete: Making Strong Concrete and Reinforcing Its Structures

Introduction

Concrete is a mixture of ballast, sand, cement and water mixed in an appropriate proportion. It is needed to build foundations, beams and other structures during the construction. For many years now people have been using concrete in the construction of storey buildings, bridges, roads and other structures. Many engineers have not tried to find means of making these structures stronger. This report seeks to explain the various methods of strengthening concrete and concrete structures.

The strength of the structures constructed depends on the nature of the concrete. The stronger the concrete, the stronger the structures built. Thus, various reinforcement methods can be adopted to make the concrete stronger.

Use of steel and other materials

Steel structures can be constructed to support concrete works to ensure they last long. When constructing beams, one uses steal metals of appropriate length and diameter to strengthen the structures. Other materials with similar expansion and contraction behaviours can be used in the construction of the structures together with concrete. The diagrams below show how concrete pillars can be reinforced with steel depending on the shape and design of the pillar.

Pillars

The steel metal can be made into different patterns as shown in the pillars above. It is then able to strengthen the pillars made of concrete as the major component (Kim, 2007, p. 45).

Proper proportions

One way of obtaining strong concrete structures is by mixing the right proportions of the cement, ballast, sand and water. There are various aspects that affect the ratio in which they should be mixed such as the structure that the concrete is to be used to make. For instance, concrete for making beams usually contains components with different ratios from that for making floors and foundations.

The appropriate ratios for each structure can be found in construction and material science books since they vary depending on the structure to be built. Such an example is the chart below (Schwartz, 1993, p. 76).

Concrete estimating guide

Scarcity of one material could also see one reduce its proportion in the concrete which is what happens most of the time. However, this habit should not be encouraged as it produces weak concrete and the structures obtained from such concrete have a short lifespan. Hence, for strong structures the right proportions are needed (Nawy, 2001, p. 102).

Impact of components used

Water

Another factor is the type of water used in making the concrete since it directly determines its strength. Water is a natural substance made up of hydrogen and oxygen as its major components and the presence of the hydrogen bond in water makes it a good solvent. As a result of this, water may dissolve substances like minerals and depending on where the water is obtained from, the concentration of the minerals will vary. For instance, rain water contains a different concentration of calcium compared to lake water. The chemical reactions between the minerals dissolved in water and the other components of concrete affect the strength of concrete. Thus, to ensure the concrete obtained is strong enough water with the right concentrations of minerals is recommended.

The concentration of the various minerals in water can be determined in the laboratory. Samples from different sources of water can be taken and the relevant experiments carried out. This way the water source with the most appropriate concentration of the minerals is used. The hardness or softness of water also has an effect on the strength of concrete and it should be determined in the laboratory to ensure water with the most appropriate texture is used in the mixing of concrete components (Nawy, 2011, p. 56).

Ballast

The strength of concrete depends on the ballast. Ballast is obtained from splitting large stones into small appropriate sizes for construction. The type of stone affects the type of ballast obtained which in turn affects the strength of the concrete. Stones originate from rocks after they fragment through either natural or man-made processes. The chemical compositions of the rocks are different and this affects the strengths of the rocks. For example, ignite rock has a different chemical composition from pumice rock and this makes their strengths different (Nawy, 2001, p.29).

A strong rock produces strong ballast which in turn produces stronger concrete. Like in the case of water, the chemical composition and the strengths of different rocks should be determined from laboratory experiments. This way the strongest rocks are used in making ballast thus ensuring structures made from this ballast last long enough.

The size of the ballast is also an important parameter as far as the strength of concrete is concerned. Smaller sizes of ballast tend to be strongly bound together making the concrete stronger. Ballast is obtained from breaking rocks using machines or handheld equipment. It is proven that machines produce smaller sized ballast than the ballast created using hand tools. Therefore, it is advisable to use machines when breaking the stones in order to obtain smaller ballast (Nawy, 2011, p. 67).

Cement

The type of cement used determines the strength of concrete. Cement is the binding component of concrete that is loose when wet but holds tightly when it dries up. It is obtained from crushing limestone to very fine pieces and mixing it with appropriate chemicals. There are different manufacturers of cement and the strength of the concrete depends on the binding ability of the cement which varies depending on the chemical composition of the cement as different manufacturers add different proportions of chemicals during the manufacturing process.

Engineers and constructors have the right knowledge to tell which company uses the right proportions of the chemicals. Cement with the correct ratios of the chemicals should be used in making concrete if its strength is of importance. The chemicals mixed are usually heated at high temperatures for a given duration after which water is added and then left to solidify. Engineers can investigate the binding abilities of different brands of cement before deciding on the most appropriate brand to use. This ensures that the concrete used is strong and in turn produces strong structures.

Sand

The type of sand used is of paramount importance in determining the strength of the concrete. Sand is a key element of concrete and is mined from different sources such as water bodies or from grounds that are rich in sandy soil. The chemical compositions and grain sizes of sand from these sources are not the same. It is the chemical composition of sand that determines the reaction of sand with other components when mixed which in turn affects the strength of the concrete. The most appropriate chemical composition of sand can be determined through experimental means. This type of sand should then be adopted in making all structures to ensure they are long lasting (Nawy, 2011, p. 45).

Foundations

Reinforcing concrete structures can be done using strong foundations that are deep such as the one below. The foundation was first dug then filled with different layers of concrete and stones. This way it is able to support the weight of the structure (Varghese, 2009, p. 51).

Foundations

Mixing techniques

The mixing techniques employed when making concrete can also affect the strength of the concrete. Thus, thorough mixing of ballast, sand, cement and water should be done to obtain strong concrete. This can be achieved by the use of machines in the mixing process (Nawy, 2001, p. 157)

Use of wooden structures

Apart from the preparation process, some structures as mentioned earlier can also be constructed to provide support. Wooden supports can be put in place to support drying pillars of concrete. These supports are put in place for a short duration when the pillars are still weak and wet. They are later removed after the pillars dry and become stronger (Nawy, 2009, p. 75).

Type of design

The designs adopted in constructing concrete structures also affect their strength as some designs enable engineers to build strong structures while others limit them to building weaker structures. Proper weight and beam balancing calculations should be adopted to ensure the structures constructed are strong. More so, the sizes of the concrete structures to be constructed should be considered as they also affect the strength of the structures built. Tall structures should be constructed with wide bases to ensure they are stable and strong (Varghese, 2009, p. 65).

Conclusion

In conclusion, concrete structures will last longer if the concrete used to construct them is improved. Thus, reinforcement of concrete is an aspect that engineers need to embrace and the methods discussed in this article can be of great help in construction works. Engineers need to consider the type of components used, the mixing techniques, use of wooden structures, the use of steel rods and the most appropriate designs to ensure the concrete structures obtained last long. If all the factors explained in this article are adopted in construction works then we will be home and dry as far the strength of concrete structures in concerned.

Reference List

Kim, J 2007, Joint shear behavior of reinforced concrete beam-column connections subjected to seismic lateral loading, Dissertation Abstracts International, Vol. 69, no. 2, pp. 44-46.

Nawy, E. G 2001, Fundamentals of high-performance concrete, John Wiley & Sons, Upper Saddle River, NJ.

Nawy, E. G 2009, Reinforced concrete: a fundamental approach, Prentice Hall, Upper Saddle River, NJ.

Nawy, E. G., Opaluch, W., & Stark, H 2011, Prestressed concrete: a fundamental approach. Pearson Education Limited, Princeton, NY.

Schwartz, M 1993, Basic engineering for builders, Craftsman Book Company, Carlsbad, CA.

Varghese, P 2009. Design of reinforced concrete foundations, PHI Learning, New Delhi, India.

Understanding Emerging Technologies

Introduction

Over the past 13 years, Emerging Technologies (ET) has diversified deployment of voice recognition applications in order to meet the demands of many users. For instance, it has managed to come up with voice-enabled solutions that enable people to communicate regardless of difference in language and accent. The voice recognition software enables the clients of ET access their bank accounts, make transactions, book flights, and access business information. With the voice recognition software, callers also manage to communicate via emails and get in touch with voice portals at any time and place.

Historical Background, development and Growth of Emerging Technologies

Emerging Technologies was introduced by Mr. Saeed Al-Romaithi in 2001. The main aim of its introduction was to develop voice recognition software that could aid in communication and business transactions in United Arab Emirates. Sassine Mazraani, its current CEO, joined it in late 2003. He is the one that outlined the main benefit of Interactive Voice Response, a product of ET. According to him, majority of the people preferred using automated Interactive Voice Response to traditional IVR.

Vision and Mission Statement

Vision for the future

Emerging Technologies vision statement is to be recognized as one of the best company in the world in terms of providing quality and human oriented voice recognition services.

Mission Statement

  1. Business- to provide an automated human support system that process information in Arabic, English, and Hindi.
  2. Operation- to reduce the time spent in handling calls and inquiries in order to minimize working costs.
  3. Customer- to provide a 24 hour service of unique support to its customers.
  4. Business- to differentiate the main goals of the company from the competition. Also to increase company productivity.

Emerging Technologies Current strategies

Today, ET pays much attention to two essential things namely expansion of the use of Interactive Voice Response system and automated parts that serve customers. Having invested immensely in setting up call centers in terms of finance and time, ET is currently, focusing on becoming one of the most preferred companies in terms of providing solutions pertaining voice recognition. It also seeks to spread out its operation to the Middle East and North Africa.

Many types of tools can be used to analyze the roles played by ET. For instance, SWOT analysis mainly focuses on internal aspects of a company. That is the threats, opportunities, weaknesses, and strengths of the working strategies of a given company. Although business organizations such as ET do not need to overcome all their weaknesses, it is crucial for them to maintain their strengths.

SWOT analysis

Strengths

Emerging Technologies was the first company in UAE to develop voice recognition software that aided in business transactions. Additionally, it has the most talented and experienced employees in UAE. High professionalism of its employees contributes immensely to its success in terms of delivering quality voice applications. It has also managed to diversify the use of IVR and automated customer parts in UAE.

Weaknesses

Besides its exceptional strengths, ET has numerous weaknesses that include the inability to meet the demands of many customers and high price of services. Most of the customers prefer speaking to live representatives to traditional IVR system; the setting up of call centers is too expensive.

Opportunities

Advancement of use of IVR and automated parts that process the customer products worldwide will play a significant role in enhancing the success of ET. The IVR will aid in meeting the demands of many customers that seek assistance via calls. On the other hand, the automated parts will help reduce time spent by customers in carrying out their business activities.

Threats

Emerging Technologies experience serious challenges in terms of advancement. Highly developed countries such as America have incomparable advanced technology. Therefore, ET has to invest considerably in terms of money and time in order to equate the technologies in local areas such as countries in Middle East with the technologies in the USA.

PEST analysis

Besides SWOT analysis, it is also appropriate to look at the environment in which ET operates. PEST analysis is most effective in analyzing how companies operate in their respective environments.

Although ET has diversified its operation in Middle East, UAE and North America, it is appropriate for it to focus on macro environment. Macro environment consists of political and economic factors. It also includes technological and socio-cultural factors.

Political factors

Political factors are vastly manipulated by the government of a given state. These factors consist of rules and regulations that a company ought to observe. Many governments rely on voice recognition software in tracking down criminals. Thus, ET ought to be subjective to government demands in order to be successive.

Economic factors

The operations of ET are extremely essential to UAE. Currently, many nations in North America and Middle East use voice recognition software in meeting the demands of clients that carry their business from their respective homes. In this respect, ET need to consider the cost they incur in setting up call centers. It has to come up with strategies that will aid it acquire many customers in order to boost its economy.

Social factors

Voice recognition software plays a significant role in day-to-day activities of customers. Majority of the people requires voice recognition application for not only communication, but also business transactions.

Technological factors

Emerging Technologies have managed to meet the demands of many clients via the introduction of IVR and automated parts that serve customers. It has also managed to expand its technologies to regions found in the Middle East and North America.

Porters analysis

Porter five-value chain analysis also plays a significant role in providing exceptional framework for company analysis. The forces used in Porters analysis include the threat of substitutes, the bargaining power of customers, and the bargaining power of suppliers. Other forces include the threat of established rivals and the threat of new entrants.

The threat of substitutes

Despite the invention of new IVR, many people may prefer using traditional IVR. ET experience a lot of challenge in terms of meeting the demands of many customers who call at the same time.

The threat of established rivals

Even though ET is the leading company in UAE in terms of production of voice recognition software, other companies such as the one found in the USA may advance its services to nations regions found in North America.

The threat of new entrants

The development of recognition software is a unique activity. However, with the advancement of technology other companies may come with software that relates to voice recognition software.

The bargaining power of suppliers

Most regions in Middle East and North America have not technologically advanced in terms of communication. Therefore, ET controls the prices of the services they offer in such areas.

The bargaining power of customers

The customers of new voice recognition application have the option of using the traditional IVR in carrying out their activities. Therefore, ET must meet the demands of its clients.

Conclusion

Conclusively, this analysis shows that Emerging Technologies has much control over the production of voice recognition software. It also shows that Emerging Technologies has high opportunities of expanding its services to Middle East and North America.

Aerodynamic Controls of a Typical Aircraft

Introduction

Aerodynamics is a wing of dynamics concerned with studying the movement of air, specifically in a situation where it is in contact with another moving solid object (Chavarria, 2012, p. 3). While in motion, managers with experience in airplanes justify that an aircraft experiences four different forces, which aid in the motion and stability of the aircraft. These are thrust, lift, drag, and weight.

Aerodynamic principles

Lift

The lift is governed by two basic principles, which are Bernoullis principle of pressure and Newtons Third Law of Motion. Bernoullis principle states, An increase in the speed of air has an effect of reduction in the air pressure (Craig, 2002, p. 12). Thus, when an aircraft is in motion, the air mass above it is at a very high velocity due to the speed of the aircraft. When the air is at that high velocity, consequently its pressure falls. While the air above the craft is at very low pressure, the air mass below the aircraft maintains its high pressure thus the pressure difference causes a lift of the plane. More lift is explained by Newtons law of motion, which states, for every action, there is an equal, and opposite reaction (Chavarria, 2012). As air strikes the bottom of the aircraft, an equal reaction is produced in form of a force that pushes the plane up.

Drag

The movement of the aircraft through the air creates this force. There are two types of drag. The drag created as a result of the occurrence of a lift is called induced drag, while the other type of drag, parasitic drag, is not related to the lift (Chavarria, 2012). Parasitic drag is caused by those protruding objects of the aircraft which reduce its extend of streamlines. Parasite drag is usually high when the speed of the plane is low. However, with an increase in the speed of the airplane, parasite drag reduces. Drag is also caused by the air mass of air that is accelerating forward. From a managers point of view, aircrafts should be designed in such a way that the minimum possible drag is obtained. This is because it helps in the optimization of fuel consumption and in minimizing pollution.

Thrust

A thrust is important to overcome the drag and to push the airplane through the air. The spinning blades of a propeller that push air out create this thrust.

Weight

This is a force created by the pull of gravity towards the ground. The stability of the plane is mainly determined by the extent to which the lift overcomes the weight. If the lift is greater than the weight then the aircraft will gain altitude. If the weight is greater, then the aircraft will lose its altitude and be unstable (Nicolai & Carichner, 2010).

Controls

From a managers point of view, three parameters are significant to flight dynamics. These include pitch, yaw, and roll. These refer to rotations about the center of gravity of the airplane. The pitch movement is an upward or downward movement of the nose of the aircraft (Nicolai & Carichner, 2010). It is also known as the lateral axis. The elevator controls rotation about the pitch and it has the same features as a seesaw. It has a primary effect of changing the aircrafts pitches attitude and a secondary effect of changing its speed (Nicolai & Carichner, 2010). The pilots cockpit usually has a control column used to change the position of the elevators either by pushing it in or out of the instrument panel. As the control column is pushed in, the elevators move down, moving the nose of the aircraft down and the tail up (Craig, 2002). On the other hand, when they are pulled out, they make the plane pitch upwards.

The roll

This is a rotation around the longitudinal axis and lies at a right angle to the other two axes. It is an upward and downward motion of the wingtips of the airplane (Nicolai & Carichner, 2010). It is achieved by the use of ailerons. Ailerons are outboard moveable portions located at the tips of each wing. They operate in opposite direction. If one goes up, the other moves in the opposite direction. Their use in controlling the roll has a side effect of causing a small yawing motion to occur in the opposite direction of the roll Nicolai & Carichner, 2010). This yawing movement is usually known as the adverse yaw since it acts in the opposite of the yaw motion required. It is normally regulated by the use of the rudder (Nicolai & Carichner, 2010).

The Yaw

This is a rotation about the vertical axis. It lies at a right angle to the wing of the aircraft and is a motion of the nose from side to side (Craig, 2002). The rudder undertakes this rotation, and pilots use it to move the aircraft to the left or the right. Therefore, in this case, from a managers point of view, the ailerons and the rudder will have to be used together at once.

References

Chavarria, M. (2012). Aircraft Controls. New Delhi: White Word Publications.

Craig, M. G. (2002). Introduction to Aerodynamics. New York: Regenerative Press

Nicolai, M.L & Carichner, G. (2010). Fundamentals of Aircraft and Airship Design. Washington, DC: American Institute of Aeronautics and Astronautics.

Systematic Terminological Investigation on Passive House

Introduction

Identification of different terms is important, especially in two cases, when the language where the term is taken is a second one for a student and when the term is taken from the specific field of knowledge. The language of specific terminology in most cases is not understood by native speakers, saying anything of nonnative speakers. To provide a systematic terminological investigation of any term, a student should create a scheme according to which he/she will conduct research. The main purpose of the current paper is to choose a sub-domain (passive house), to present a terminology case file for the selected five concepts, and complete a term record for each of the five concepts.

Terminological information sources

First of all, it should be noted that we want to give information on the terms connected with the passive house. The taken term is referred to the language of special purposes. To explain what is meant, it should be pointed that:

LSP [language for special purposes] is a formalized and codified variety of language, used for special purposes&with the function of communicating information of a specialist nature at any level& to inform or initiate other interested parties, in the most economic, precise and unambiguous terms possible (Picht & Draskau 1985, p. 3)

The concept choice is one of the most important stages of the systematic terminological investigation on the passive house as it gives us an opportunity to be sure that the information you read is exactly what you need (Bowker & Pearson 2002, p. 38). Before beginning the term consideration, the following steps should be completed, determining research objectives, becoming familiar with the subject field, selecting and evaluating the documentation, and preparing a breakdown of the subject field (Dubuc 1997, p. 55). Describing the passive house, it is possible to present the term in several concepts, broader, superordinate, subordinate, specific, and non-hierarchical concepts (Wright & Budin 1997, p. 565).

Completed 5 term records (one record per concept)

Now, we want to represent you with the completed 5 term records (one record per concept) related to the passive house terminology. The following terms are going to be explained low-energy house, thermal insulation, heat recovery, heat demand, and energy saving.

Energy-saving terms will be considered in the broader concept that includes the term nature of the topic it deals with (Pavel and Nolet 2001, p. 24). So, energy saving is the term that is related to passive housing and eco-friendly homes, when the building is completed according to the technologies which allow reducing the energy that is spent on house heating.

A superordinate concept is a concept in a hierarchical relationship whose semantic features are inherited by those concepts that are subordinate to it (Pavel and Nolet 2001, p. 117). Low-energy house is subordinate to the innovative technologies which make it possible for architectures to create houses of compact construction, which are thermally insulated and the ventilation should be properly organized. The creation of low-energy houses would have been impossible without technological development.

A subordinate concept is a concept that is closely related to the other term with the broader meaning (Pavel and Nolet 2001, p. 117). Thermal insulation is the term that is closely related to the low-energy house term and passive housing in general. Thermal insulation may be related to several items, windows, doors, or walls. The higher level of thermal insulation, the better results will be achieved after the house is ready.

A specific concept is a concept that has the broader intension and that inherits semantic features from its hierarchically superior generic concept (Pavel and Nolet 2001, p. 116). Heat recovery, for example, is the term that is hierarchically lower than low-energy house and means the technology that makes it possible to reduce the level of the energy consumption while heating the house and not allow this energy to leave.

The non-hierarchical concept is the concept that makes it possible to explain the term without reference to the other term in the field of study. In other words, the definition of the term may be completed without reference to the notions in the field of study. Heat demand is the term that means the level of heat consumption in the buildings. The term is used when the new house is built, especially when workers have to characterize the benefits of the house.

Conclusion

In conclusion, the passive house sub-domain was chosen for the systematic terminological investigation. The main stages of the process were researched and the concepts of the terminology presentation were presented. It may be said that there are two types of concepts in the systematic terminological investigation, hierarchical and non-hierarchical. There is several hierarchical concepts. We presented the following, broader, superordinate, subordinate, and specific. The terms that were explained with the help of different concepts depend either on each other or on the notions using which they are characterized. Only one term was explained according to the non-hierarchical concept.

  • Terminological concepts (Passive house)
  • Hierarchical non-hierarchical (heat demand)
  • Broader (energy saving) Subordinate (thermal insulation)
  • Superordinate (low-energy house) specific (heat recovery)

References

Bowker, L & Pearson, J 2002, Working with Specialized Language: A practical guide to using corpora, Routledge, London/New York.

Dubuc, R 1997, Terminology: A Practical Approach, Montreal: Linguatech Quebec.

Pavel, S & Nolet, D 2001, Handbook of Terminology, Public Works and Government Services, Translation Bureau, Ottawa.

Picht, J & Draskau, H 1985, Terminology: an introduction, University of Surrey, Guildford.

Wright, SE & Budin, G 1997, Handbook of terminology management, Vol. 2,: John Benjamins Publishing Co., Amsterdam/Philadelphia.

File Sharing and Its Pros and Cons

Human beings use technology for various reasons. One of the key aims of using modern technology is to make life easier and secure. This is possible through the many shortcuts that modern technology has brought in terms of accessing various services that would have otherwise taken too long to access (Fehily 17). There is no single aspect of human life that has not seen the impacts of using modern technology. The use of social network sites like Facebook and Twitter, and equipment like computers (including related gadgets), and mobile phones have simplified communication among people. File sharing is an aspect that has brought economic, moral, and legal controversies throughout the world. This discussion outlines the key consequences of file sharing among peers, friends, and family members.

File sharing refers to the distribution of digital messages among individuals. These messages may be in the form of songs, videos, video clips, images, graphics, or pictures. It is easy to share these messages through computers connected to networks, social sites, or using removable mass storage devices. People who share files consider a number of aspects that propel them to prefer this as a suitable alternative compared to purchasing the file from known vendors. The presence of these files on the internet enables peers, friends, and workmates to share them easily. Modern technology has simplified access to millions of information on the internet. This process involves basic stages as long as an individual has the domain name where he can retrieve the file (Wang 25). The presence of many search engines and notifications propel individuals to find it easy to access sites containing fascinating messages. Computers and internet connections are becoming cheaper courtesy of competition among computer manufacturers and internet service providers. This has led to the establishment of sites that provide shortcuts to accessing various files available on the internet.

Celebrities have found it convenient to gain popularity by allowing some of their products to be downloaded free of charge from various sites. They view this as the best way through which they can promote their popularity among the eager public. On the other hand, companies have come up with simplified access routes to their services by allowing free downloading and sharing of vital documents. This carefree provisions aim at promoting the popularity of such companies as an attempt of fighting their competitors. Celebrities have found it cheaper to gain popularity by allowing their fans to access their products without prior permission (Brains 22). Therefore, they are able to suppress upcoming competitors, and thus remain dominant in the market. On the same hand, companies have used file-sharing as an appropriate way of promoting their products by offering free downloads and sharing trial versions of their services to clients. Thirdly, file sharing is the cheapest way of accessing relevant information by people who can not afford them. In addition, the high costs of living have made it impossible for people to access quality services from the internet. The presence of sites that enable people to download and share various files from the internet offers relief to the less fortunate in society. Moreover, sharing files with friends and peers is cheaper compared to buying products from stores. Most companies would have found it extremely impossible to compete with other well-established companies in terms of advertisements and publicity. However, the presence of file-sharing provisions enables all companies to stand equal chances of competing for the limited market. File sharing enables individuals to evaluate products from various companies, and decide on the best option. Upcoming celebrities have had equal opportunities of marketing their products without fears of unhealthy competition from established celebrities. File sharing is the easiest way of introducing new products to new, and existing markets. People do not like to surf the internet or spend hours on the streets looking for new products. The presence of file sharing enables businessmen and consumers to be aware of new products in the market. File sharing simplifies the lengthy procedures of looking for new products by clients who like to be in line with modern trends.

However, file sharing is to blame for a number of woes that link this practice to a number of legal, economic, and ethical issues. File sharing is illegal in products that are protected by copyright acts. The provision of file sharing is illegal in many states, and individuals face fines and jail terms if they fail to observe copyright infringement laws. Despite the presence of many files in circulation among people worldwide, many people do not know the risks they expose to their businesses and personalities by sharing copy-protected files. However, the lack of strict laws to curb copyright infringement in many states has led people to believe that sharing files is not a criminal act. The public has taken advantage of these provisions, and downloaded and shared millions of files from the internet and other sources.

File sharing is an enormous blow to the government in terms of collecting revenue. Many products available for sale in the market have certain percentages of tax that the government uses to finance its projects. However, file sharing makes a collection of revenue by states to be extremely difficult. States are losing millions of financial resources through file-sharing that evades taxes imposed on various products. This reduces the amount of revenue a country generates from various trading activities. Therefore, it becomes difficult for states to make proper budgetary allocations to various projects due to unpredictable revenue collection. Moreover, this practice is among the many incentive killers in upcoming investments. Artists who invest their money, time, and talent singing or performing various theatrical shows find file-sharing an extremely retrogressive practice. Moreover, they find it to be difficult to continue investing resources in investments that do not reward them appropriately (Wang 88). File sharing makes people not buy original products from stores, but get them from their friends and peers. Most files that people share are those that are on the current trending list. Those out of the charts do not attract any attention since they are behind times, and inferior to others. This discriminates against quality services and products on offer by other celebrities. People overlook the work of other celebrities whose products do not appear among the chart list that shows the popularity of various products. Lastly, file sharing promotes laziness among people, since individuals can get any file from their friends on request, and they never bother to look for them elsewhere. Eventually, they become lazy and rely on their friends, and peers to look for these files.

Modern technology has enabled people to share millions of files over the internet daily. This practice continues to be complex as more technological advances continue to emerge. The debate on file sharing and copyright infringement will continue due to the differences in opinions of key players in aspects associated with digital media. The legality of file sharing needs to be defined clearly to enable people to know the freedoms and boundaries of file sharing.

File sharing refers to the distribution of digital messages among individuals. These messages may be in the form of songs, videos, video clips, images, graphics or pictures. It is easy to share these messages through computers connected to networks, social sites or using removable mass storage devices. People who share files consider a number of aspects that propel them to prefer this as a suitable alternative compared to purchasing the file from known vendors. The presence of these files in the internet enables peers, friends and workmates to share them easily. Modern technology has simplified access to millions of information on the internet. This process involves basic stages as long as an individual has the domain name where he can retrieve the file (Wang 25). The presence of many search engines and notifications propel individuals to find it easy to access sites containing fascinating messages. Computers and internet connections are becoming cheaper courtesy of competitions among computer manufacturers and internet service providers. This has led to the establishment of sites that provide short cuts to accessing various files available in the internet.

Celebrities have found it convenient to gain popularity through allowing some of their products to be downloaded free of charge from various sites. They view this as the best way through which they can promote their popularity among the eager public. On the other hand, companies have come up with simplified access routes to their services by allowing free downloading and sharing of vital documents. This carefree provisions aim at promoting the popularity of such companies as an attempt of fighting their competitors. Celebrities have found it cheaper to gain popularity through allowing their fans to access their products without prior permission (Brains 22). Therefore, they are able to suppress upcoming competitors, and thus remain dominant in the market. On the same hand, companies have used file sharing as an appropriate way of promoting their products by offering free downloads, and sharing of trial versions of their services to clients. Thirdly, file sharing is the cheapest way of accessing relevant information by people who can not afford them. In addition, the high costs of living have made it impossible for people to access quality services from the internet. The presence of sites that enable people to download and share various files from the internet offers relief to the less fortunate in society. Moreover, sharing files with friends and peers is cheaper compared to buying products from stores. Most companies would have found it extremely impossible to compete with other well established companies in terms of advertisements and publicity. However, the presence of file sharing provisions enables all companies to stand equal chances of competing for the limited market. File sharing enables individuals to evaluate products from various companies, and decide on the best option. Upcoming celebrities have had equal opportunities of marketing their products without fears of unhealthy competitions from established celebrities. File sharing is the easiest way of introducing new products to new, and existing markets. People do not like to surf the internet or spend hours on the streets looking for new products. The presence of file sharing enables businessmen and consumers to be aware of new products in the market. File sharing simplifies the lengthy procedures of looking for new products by clients who like to be in line with modern trends.

However, file sharing is to blame for a number of woes that link this practice to a number of legal, economic and ethical issues. File sharing is illegal in products that are protected by copyright acts. The provision of file sharing is illegal in many states, and individuals face fines and jail terms if they fail to observe copyright infringement laws. Despite the presence of many files in circulation among people world wide, many people do not know the risks they expose to their businesses and personalities by sharing copy protected files. However, lack of strict laws to curb copyright infringement in many states has led people to believe that sharing files is not a criminal act. The public has taken advantage of these provisions, and downloaded and shared millions of files from the internet and other sources.

File sharing is an enormous blow to the government in terms of collecting revenue. Many products available for sale in the market have certain percentages of tax that the government uses to finance its projects. However, file sharing makes collection of revenue by states to be extremely difficult. States are losing millions of financial resources through file sharing that evades taxes imposed on various products. This reduces the amount of revenue a country generates from various trading activities. Therefore, it becomes difficult for states to make proper budgetary allocations to various projects due to unpredictable revenue collection. Moreover, this practice is among the many incentive killers in upcoming investments. Artists who invest their money, time and talent singing or performing various theatrical shows find file sharing an extremely retrogressive practice. Moreover, they find it to be difficult to continue investing resources in investments that do not reward them appropriately (Wang 88). File sharing makes people not to buy original products from stores, but get them from their friends and peers. Most files that people share are those that are on the current trending list. Those out of the charts do not attract any attention since they are behind times, and inferior to others. This discriminates against quality services and products on offer by other celebrities. People overlook the work of other celebrities whose products do not appear among the chart list that shows the popularity of various products. Lastly, file sharing promotes laziness among people, since individuals can get any file from their friends on request, and they never bother to look for them elsewhere. Eventually, they become lazy, and rely on their friends, and peers to look for these files.

Modern technology has enabled people to share millions of files over the internet daily. This practice continues to be complex as more technological advances continue to emerge. The debate on file sharing and copyright infringement will continue due to the differences in opinions of key players in aspects associated with digital media. The legality of file sharing needs to be defined clearly to enable people to know the freedoms and boundaries of file sharing.

Works Cited

Brains, John. Steal this File Sharing Book: What They Wont Tell You about File Sharing. California: No Starch Press, 2004. Print.

Fehily, Chris. Cancel Cable: How Internet Pirates Get Free Stuff. California: Questing Vole Press, 2011. Print.

Wang, Wallace. File Sharing. New York: Apogee, 2005. Print.

Information Security Issues Concerning Limewire LLC

LimeWire

LimeWire is a free file sharing P2P client program that runs on different operating system platforms on the BitTorrent and Gnutella protocols to provide free file sharing services with different features, which can enable inadvertent sharing of information with unsuspecting parties (Germain 1). Users of the program could be asked to accidentally configure LimeWire when being installed, allowing the program to access any file on their computer and to gather and distribute sensitive personal information from the victims computer (Sandoval 1). Previous findings show that the free LimeWire program downloaded has a backdoor feature, including Lime shop that monitors online purchases and directs the sales commission earned to the illegitimate Lime Wire LLC, providing an example of the several illegal acts supported on the program features (Germain 1).

Once LimeWire has been installed on the clients computer, it could be used to commit identity theft by searching the hosting computer for peoples inadvertently shared information for financial information such as credit card information. Langlie (1) has written on a case reported from Seattle Washington about Kopiloff who used LimeWire with its file-sharing capabilities to access the private financial information of unsuspecting people to search for federal income tax, credit card information, and other sensitive information to fraudulently use the information (Langlie 1). Many similar cases of using LimeWire to commit cybercrime have been reported by the Postal Inspection Service and the Electronic Crimes Task Force of the U.S. Secret Service on electronic crimes committed using LimeWire, showing the level of vulnerabilities in using the program on government or personal computers. Identity thieves use the financial data stolen using the features integrated into the LimeWire program from the victims computer to perpetrate crimes such as emptying the financial accounts, applying for new loans, filing fraudulent tax returns, and conducting other criminal activities (Germain 1).

Security Threats

The consumer protection division has shown that LimeWire integrates features that can be used to exploit the vulnerability in information-sharing systems to innocently provide sensitive information about their tax records, social security numbers, and private family information. The inadvertent sharing of information escalates individual and government security threats because the type of information found on computers with LimeWire installed includes classified government military orders, terrorist assessment threats, confidential corporate and accounting data, personal credit card information, medical records, bank statements, and tax returns (Sandoval 1).

LimeWire and P2P Networks

According to Broache, has reported P2P networks to be the potential source of threats that can harm national security because P2P networks can host and provide direct communication between peers in the network free the LimeWire file-sharing capabilities for free to millions of people who like to download music, video, and other sensitive data (1). Studies show that LimeWire has an interactive user interface that allows virtually anyone to use the program to download any program from any of the anonymous directly collaborating dynamic (ad-hoc collaborative communication) nodes with non-administrative authority making documents such as classified government documents, confidential corporate accounts information, bank statements, and other sensitive information vulnerable. P2Pnetworks that host the LimeWire software provide file sharing, distributed computing, multilayer games, and collaborative applications capabilities (Broache 1). The distributive nature of the LimeWire program and the ability to access, download, and share large files imperil individual and national security by intruding on personal and national privacy in violation of copyright and privacy laws.

Another threat from P2P networks to national security is because LimeWire can search the entire network for any content that has been requested by the user and download the content from multiple sources regardless of the copyright laws.

It has been established files downloaded via LimeWire do not guarantee that they are from a genuine source. Such files appear to be from a genuine source, but when one double clicks the executable files, there is the possibility of installing malware on the computer (Langlie 1).

How to be safe

It is critical for users of P2P programs in private or in government to be aware of the security risks and network vulnerabilities when establishing P2P connections by determining the exact location of third-party IP addresses. Systems can be compromised if executable files are run by masqueraders as innocuous files via the LimeWire software (Doell 1).

It is important for users of the LimeWire software and the users of the P2P network to avoid sharing everything, but should only share non-sensitive files which are saved in the default file sharing folder. Do not designate the root as C: drive as the file-sharing folder as it could enable malware to see every file in the entire drive (Doell 1).

Conclusion

LimeWire is software that enables the downloading and sharing of services on the P2P network, with features that enable individual and corporate users to inadvertently provide confidential information to criminals. It is however possible to guard against such crimes by taking appropriate countermeasures.

Works Cited

Broache, Anne, CNET News. 2007. Web.

Doell, Linda, LimeWire Warning Consumers of Security Risks in Its Software. InvestorCenter. 2011. Web.

Germain, Jack M. , TechNewsWorld Collaboration. 2009. Web.

Langlie, Emily, Seattle Man Indicted For ID Theft Using Computer File Sharing Programs. Public Affairs Officer for the United States Attorneys Office, 2007. Web.

Sandoval, Greg, RIAA wants revived LimeWire dead and buried. CNET.com. Web.

Problems of the Existing Gaming Industry

In the present world, there are many ways of communication between people, organizations, and industries. One of the most rapidly developing parts of entertainment and time-consuming activities is games. There is no doubt that media and games, in particular, have a certain effect on a person and their mind. It gives an individual access to a world of fantasy, which very often is made to reflect the real world and so the connection between the two worlds becomes more transparent. Just as TV, games are said to influence the cognitive schemas of an individual in relation to the real, everyday world. But there is a problematic trend of underrepresentation of certain kinds of people in the gaming industry. A study where characters used in games were analyzed showed that a bias towards certain races indeed took place. Some characters are used less often than others. These are females, children, and elderly people. Also, the characters are mostly white favoring one race more than others. While a user plays a game he spends more time as a primary character-whichever character he plays with, while the other characters in the game, which he or she randomly interacts with, spend very little time on the screen. Because of this, a player gets used to a certain kind of people mostly represented in the game. And here a line is drawn to the real world where that person will be less inclined to communicate or relate to people of other races or backgrounds, different from those she or he have experienced in the game. This creates a barrier in the communication between a generation that is game-centered and people who do not spend as much time in front of the screen.

Another problem is that a person who is a part of a minority group will notice that their own presence in the game is not given much consideration and this could possibly create thoughts that their race is inferior or not as good as the one that is mostly represented in the game. This is a sensitive matter where an individual will make conclusions based on this representation and communicate to their peers or particularly friends and family from the same background, reinforcing the already prejudiced view that the majority of people have towards minorities. This is a problem that was unnoticed previously but became an issue in the present.

It was not someones particular goal to purposefully deny the presence of a certain race or nationality in the game industry. This can be evident in a closer look at the professional sports games, like baseball, basketball, football, and soccer, where the players from every background are present. Nonetheless, the game industry has indirectly influenced the views of gamers. It is a known fact that it is the younger generation that mostly plays games, even though today this trend seems to be changing and the older population is starting to take part in gaming as well.

Younger people are more susceptible to the influence of media and stereotypes present in it. The gaming industry inadvertently communicates to the customer that some people are more favored than others or that a certain group can be more appealing in a setting than others. In the 21st century, the society has taken many steps in fighting discrimination and unequal treatment and it is only a matter of time until fair representation reaches all mediums of communication, without biases and stereotypes.