Friday, January 24, 2020

Hydrogen Peroxide Essay examples -- essays research papers

(H2O2), a colourless liquid usually produced as aqueous solutions of various strengths, used principally for bleaching cotton and other textiles and wood pulp, in the manufacture of other chemicals, as a rocket propellant, and for cosmetic and medicinal purposes. Solutions containing more than about 8 percent hydrogen peroxide are corrosive to the skin. First recognized as a chemical compound in 1818, hydrogen peroxide is the simplest member of the class of s. Of the several processes of manufacture, the principal ones involve reactions of oxygen from the air with certain organic compounds, especially anthraquinone or isopropyl alcohol. Major commercial grades are aqueous solutions containing 35, 50, 70, or 90 percent hydrogen peroxide and small amounts of stabilizers (often tin salts and phosphates) to suppress decomposition. Hydrogen peroxide decomposes into water and oxygen upon heating or in the presence of numerous substances, particularly salts of such metals as iron, copper, manganese, nickel, or chromium. It combines with many compounds to form crystalline solids useful as mild oxidizing agents; the best-known of these is sodium perborate (NaBO2H2O23H2O or NaBO34H2O). With certain organic compounds, hydrogen peroxide reacts to form hydroperoxides or peroxides, several of which are used to initiate polymerization reactions. In most of its reactions, hydrogen peroxide oxidizes other substances, although it is itself oxidized by a few compounds, such as potassium perm...

Thursday, January 16, 2020

Pros and Cons of Social Network Essay

According to Tynan (2005, p. 72), 70% of online users are concerned about their online privacy. Many users of social networking sites such as Facebook and Twitter complain about how these sites do not have the appropriate settings to prevent online threats such as identity theft and the invasion of privacy. They believe that it is the responsibility of social networking sites to safeguard users’ privacy. However, users often forget how willing they are when it comes to revealing intimate details and information of their lives on these sites. This willingness to give out their personal information invites the online privacy ‘troubles’ that users often complain about. With all these information exposed to hackers, identity thieves are given a green light to tap into users’ database when users decide to reveal their information online. Thus, we can say that the users of social networking sites are the biggest threat to their own online privacy and cases of identity thefts. There are three main reasons why people choose to reveal their personal information on social networking sites. Firstly, people use social networking sites to connect, and to do so, they have to reveal personal information about themselves. As Andrews, L. (2011, p. 2) has said, â€Å"Social networking has enormous benefits, helping us stay in touch with people from our pasts and introducing us to people who share our interests. † These information includes their name, age, city they are staying in, company or school they belong to and etc. The information they provide will help long-lost friends connect with them, help them make new friends with common interests and perhaps even help them find a love interest. Another reason why people choose to reveal information about themselves is to create identity. This ‘identity’ is like the information sheet of how the user is like. Users might even want to post their every thought and actions even places they have been to, it becomes a part of their life to log on to social networking sites and post their current status (Andrews, 2011). Writing about the groups and activities a person is involved in for example, tells friends and people around him what are his interests and helps people to understand him better. Lastly, people reveal personal information to gain access to certain websites. These include gaming sites and articles provided by social networking websites, and they often request for the user’s personal information. Users might find it worth it to reveal their information in order to enjoy the entertainment provided by these sites. Thus, they might decide that since their information will be kept confidential, it is safe to provide their personal details without a second thought. It is understood that people choose to reveal their personal information online in exchange for the benefits of using social networking sites. However, they might want to think twice after hearing what dangers they are putting themselves in. Users should be aware of how they are putting their Internet privacy at risk when they reveal personal information about themselves; there are three major threats that users should be wary of. First of all, there is there is the threat of cyber bullying. Cyber bullying is a serious problem among teenagers and it might cause mental illnesses such as depression to the victim. It can happen when a bully gets hold of the content a user posted on the Internet. Unlike normal bullying, where the victim can escape home to safety, the victim can get bullied even at home as it happens on the Internet. The bully can even get hold of the victim’s home address or phone number if the victim had posted it online. One of the most famous cases of online bullying is the â€Å"Star Wars Kid†, Ghyslain Raza, whose homemade video of him fighting with a pretend light sabre was leaked and had more than 15 million downloads. He had been so affected that he was admitted into a child psychiatric ward (Johnson, 2004). We can see from this case study how badly cyber bullying can affect a victim, and this started from a post that the victim had not expected would be leaked. All of these threats occur because people choose to post their details on the social networking sites. While social networking sites are growing, more people are online than ever before and this includes the bad guys on the net (Viega, 2009). Thus, we have to be even more careful about the threats that we might face online. Other than that, users should also beware identity theft. Identity theft is the use of one person’s personal information to commit fraud or other crimes (Columbia University Press, n. d. ). This can happen to users who reveal too much information on the Internet for an identity thief to pose as him or her. As Waldrop, B. (2011) has said, â€Å"A case of identity theft can be as serious as having your entire bank account to be wiped out. † This can be a very serious threat and users should beware of it. Finally, there is the lack of privacy online. The thing about social networking websites is that it has the weakest data link and was even rated by The Cocoon Blog as the second biggest online privacy threat in 2011. With a weak data link, it is easy for even non-users of social networking sites to hack into a user’s database and gain access to what the user has posted. In fact, Mark Zukerberg, the founder of Facebook himself had hacked into the email accounts of two Harvard Crimson reporters using data obtained from TheFacebook. com’s logs (Carlson, 2010). This shows how information is easily accessed on social networking sites. People often believe that it is the responsibility of social networking websites to safeguard its users’ privacy. However, here are some of the reasons why users have a major role to play in protecting their own online privacy. Firstly, social networking sites can only protect their users to a limited extent. Social networking sites have really weak data links and they have too many users to be able to take care of all of them. Facebook for example, would be the third largest nation in the world if it were a country (Andrews, 2011, p. 1). We can think Facebook as the government and its privacy settings as the law. In a real country, there would be people breaking rules despite knowing the laws. A weak data link is like Facebook’s version of a weak police force, being unable to prevent data from being stolen. Hence, users cannot choose to rely solely on social networking sites to protect their privacy. Secondly, it is the user’s responsibility to provide his or her loved ones. Some of a user’s information such as home number or address is shared with his or her non-user family members. Thus, revealing information as such might bring harm to the family. An example would be if a burglar decides to break in to a user’s house, whose address he found on the Internet. If a social networking site user had revealed his address and phone number online, all the burglar has to do is to type in phone number or address in Google Search and it will direct him to the user’s home (Tynan, 2005). Finally, it is important that users are aware of what harm information they post can bring. This is so as the information that had been posted cannot be taken back. Even if the user had used the best services to get all of his data removed, the information can be reinstalled within a short period of time (Andrews, 2011). Hence, users are considered the biggest threat to their own online privacy as they are the ones who have a final say on what information they choose to post on the Internet. As mentioned in Cocoon’s 2011 List of the Top 10 Internet Privacy threats, the weakest link in the privacy chain could be the users themselves. Everything that Internet users do online leaves a digital footprint from search engine tastes to browsing patterns and social interactions. Therefore, users should be responsible for what they choose to do on the Internet, as they will never know who is watching and what online privacy threats awaits them. While enjoying the benefits that social networking websites provide them with, they should also be aware of the threats they are facing and learn to protect their own privacy. I strongly believe that the best way to do so is for users to limit the amount of intimate information they reveal online. Privacy settings on social networking sites might help but only to a certain extent and it is better to be safe then sorry. All in all, users should understand that while they are limiting the amount the intimate information of themselves online, they are also protecting themselves from their greatest Internet privacy enemy- themselves.

Wednesday, January 8, 2020

Learning Disabilities and the Classroom - 1102 Words

Mary L. Burkitt Grand Canyon University: SPE 359 July 7, 2013 Learning Disabilities and the Classroom With every classroom you are able to see a dynamic between students and their teacher. It takes a strong teacher to really make everything accessible to all students including student with learning disabilities. The class that I watched was Christina Hilliker’s second grade. The disabilities that were part of this great dynamic were Downs, Autism, ADHD, auditory processing and behavior issues that cause learning difficulties. Within the classroom I was able to see many ways that Ms. Hilliker was maintaining her classroom. For general classroom behavior she used a stop light method (red, green yellow). Each student had a†¦show more content†¦I found it very strange to find out that the student with Downs was not labeled as a learning disability but was put into this category to access what she needed academically. I did not like the fact that due to funding most of the students like this were not on an alternative curriculum in a ll cases. I would however use Ms. Hilliker’s seating ideas because it seemed to help B.S. maintain his behavior and compete is work with minimal distractions and M.M. was close to the teacher at all times to ask for clarification. I did notice that M.M. was labeled as auditory processing disorder and there were few accommodations to help this student as an individual. While watching B.S. it was clear that there was the need to have some type of social skills expectations that should be worked with, this student was very immature and inappropriate at times. M.M. on the other hand had no social interaction with his classmates unless the teacher essential made him do it. I also saw that students that were higher sometimes made B.S. and C.S. get off task when they thought it would be funny for them to get negative attention from the teacher, this was normally right after the Para or teacher paid one on one attention to these two particular students. It was clear that Ms. Hillik er was familiar with this behavior as well because she was able to stop most of this behavior before it got out of hand and wasShow MoreRelatedLearning Disability And Its Impact On The Classroom849 Words   |  4 Pageshave more hardship than any child should ever have. In my second grade classroom, we have a majority of ELL’s coming from Spanish-speaking homes. As I have been observing my Cooperating teachers students’ that she looped with from first grade to second grade, she has been providing me with insight on some non-academic disabilities that one of our students suffers with. Although it is not technically considered a learning disability it prevents them from accomplishing tasks at the same rate as our otherRead More Students with Learning Disabilities and the Inclusive Classroom2748 Words   |  11 Pagesteachers dream of the classroom filled with fifteen tranquil, enthusiastic students, all with their note books out and pencils prompt for note taking. Thi s is the classroom where everyone works together, at the same pace, and without any interruptions or distractions. This is the ideal classroom setting. The only problem with this picture is that it does not exist. Students are all different. Kids all learn different ways, and at varying paces. Both Physical and Learning Disabilities can hinder a child’sRead MoreClassroom And Student Implications : Students With Learning Disabilities964 Words   |  4 PagesClassroom/Student Implications: In the classroom, the student with learning disabilities, notably struggles with pronouncing simple words, reading, or solving math problems as their peers. The major ramification of learning disabilities is the underachievement in one or more academic skills that are shared by most students with LD, with reading as the most difficult area for students. Later, their struggling might reach a point of dropping out of school, which rate is 8% (one out five studentsRead MoreStudents With Learning Disabilities Academic Needs Essay1069 Words   |  5 Pageswithin integrated classroom is students with learning disabilities academic needs are not being meet. For teachers to successfully enforce integrated classroom they need all the same resources a special education classroom receives for the students. What can occur unfortunately classroom population for teacher and student’s ratio is increasing, and can have a negative effect for student academic performance. For a classroom to b e successful the classroom size matter because classroom size has a greatRead MoreChildren And Disabled Students With Disabilities950 Words   |  4 Pagesstudents with disabilities feel? Have you question why students with disabilities are excluded from classrooms. Not everyone is passionate about bringing students with disabilities into a normal classroom environment. Let s begin with defining the terms students with disabilities. Students with disabilities mean children or students who require special education because of: autism; communication disorders; emotional disturbances; hearing impairments, specific learning disabilities; traumatic brainRead MoreBenefits Of Mainstreaming Students With Disabilities Essay1658 Words   |  7 Pageschoice to mainstream students in regular education classrooms for many years and have been set back in each IEP (Individualized Educational Plan) on what would benefit the child. Not enough students with disabilities are being mainstreamed so t hey can experience the full capacity of their learning stages. It is important for all individuals involved to understand the pros and cons associated with placing a student with disabilities into a normal classroom with everyday students. Allowing students theRead MoreDoes Inclusion Result In Favorable Effects? Essay709 Words   |  3 Pagestrends in education today is the inclusive of children and youth with handicaps into regular learning classrooms. Inclusion refers to the practice of instructing all students regardless of disability. Although the term is new, the basic law is not, and reflects the belief that students with a disability should be taught in the least restrictive environment, or as close to the mainstream of regular learning as possible. The least restrictive environment doctrine is one key element of federal specialRead MoreInclusion For Special Needs Students Essay1633 Words   |  7 Pagespursuance in including culturally sensitive curriculum in today†™s classroom. However, there is still a lack of inclusion for special needs students in general classroom settings. My interest in this topic stems from my major in EC-6, Special Education. My goal is to work with students with special needs. It is important to integrate students with disabilities in classrooms with students without disabilities. By allowing students with disabilities to have access to a general education will enable them toRead MoreInclusion Has Been A Major Topic Between Educators And1576 Words   |  7 Pagesgood idea to educate general education children in the same classroom along with special needs children, including those with multiple disabilities. And then there are many that believe special education and general education can actually can be accomplished in one classroom along with one general education teacher and one special education teacher working together , teaching the same curriculum to a full inclusive classroom. Having a classroom like this f or children with special needs would be a hugeRead MoreI Am Observing For The After School Action Program Essay1724 Words   |  7 Pages12 students, which 4 students have learning disabilities. Research has been conducted by my observation of various techniques implemented for the inclusion of these students. During my observation, several approaches have been used with success in retaining students understanding of the material being presented. First, as a student whose major is ECL-6 Special Education, I want to study different approaches to which teachers implement on students with disabilities. Secondly, as I continue to observe