Saturday, December 14, 2019
Does Television Advertisement Have Positive Impact on Consumer Free Essays
You must have at least once in your life seen television advertisements which made you feel bored and decide that you would never buy these products. In fact, television advertising becomes an indispensable part in marketing strategies. No doubt, there are many commercial advertisements that produce good responses right after its first broad cast. We will write a custom essay sample on Does Television Advertisement Have Positive Impact on Consumer or any similar topic only for you Order Now However, nowadays, consumers are very easy to ââ¬Å"allergicâ⬠to the advertisements that they do not have feelings. Television advertisements cause negative effects to consumers because they not fit consumersââ¬â¢ spending habit and thinking, use images that are annoying, and never tell all the truth about products. BODY: Many companies use television advertisements to penetrate the market but they did not succeed. The reason was that they forgot the key principle in marketing which is to put yourself in the consumerââ¬â¢s situation. According to Issabelle Szmigin, The act of consumption by people is very different to the picture sometimes produced from studies of consumption. It is one of the reasons why some brands continue to live a charmed life and others cannot. Children, for example, can respond positively from this generation to the next generation with the same toy and refuse others after a few months of interest. On the other hand, as is the case of Novo, the company very clearly get wrong strategies and retrenches but still become successful in the domain of health care, while some other brands are removed for more complex tactical and strategic reason which the consumer will never know about. In fact, you can see many television advertisements, that aired in the time period are very annoying, especially is midnight. Try asking, at this time, how many people will have to sit before the television waiting to see them. Besides that, many advertisements are very complex and have many details that made the audiences have to think. This causes customers to feel uncomfortable with the product. The important thing here is the television advertising does not suit the consumersââ¬â¢ spending habits, thoughts, so their failure in the market access is inevitable. For years, massive advertising appears on television. Besides the good advertisements, there are many advertisements that using crude images, loss of culture. We still know that the advertising are necessary, but the culture in advertising even more important. Especially, with mothers who are raising young children, advertising is an effective solution in helping children eat and learn, so they require a lot from advertisements. According Scott Ward, the extent to which children attempt to influence parental purchasing is very big. His research also reports data from mothers of young children, concerning their perceptions of the frequency with which television commercials influence their children to want advertised products, and the extent to which parents yield to childrenââ¬â¢ s purchase influence attempts. (Report Number 1, Effects of Television advertising on children and adolescents, 1971, p. 5). Motherââ¬â¢s decision to purchase much influenced from their children. The choice of image ads is extremely important but in fact, many marketers forgot this issue. There are many ads that use bad images that are not effective to influence the thinking of the children or attractive to them. And of course, the mother would never buy that product. Culture advertising is not only promote the manufacturerââ¬â¢s brand, distribution in the masses in order to sell more goods, but also help consumers select product that suit with their needs. Besides that, culture advertising is the respect of consumers. Thus, television advertising has caused negative impacts on consumer if bad images are used, making viewers allergic to those products. How to cite Does Television Advertisement Have Positive Impact on Consumer, Essay examples
Friday, December 6, 2019
Sociological Versus Metascientific Risk Assessment â⬠Free Samples
Question: Discuss about the Sociological Versus Metascientific Risk Assessment. Answer: Introduction IT risk management is a risk management method in which information technology is assessed to identify the risks it poses or exposes a company to while being utilized. In a business or firm IT risk can be considered as part of a full scale enterprise risk management system (Crockford, 1986). An information security management system which is present in a company which is continually updated and maintained is a sign that the company has setup the necessary resources in helping to identify, manage and assess information security risks. IT risk management involves the assessment of not only the negative effects of using technology in a company but also the benefits that may be accompanied with it (Verin Trumper, 2007). Decision theory should be utilized when assessing risk because it is something that is comprised of a lot of uncertainty. IT risk management as with all forms of risk management should be done continuously to ensure that the information obtained is updated. This is becau se there are changes which are ongoing all the time that can affect a company and therefore for IT risk management to be effective the process of analysis of risk should be continuous to ensure the company can be able to avert a lot of risk when it faces a problem (Katsicas, 2009). Organizations should have in place an enterprise risk management system (ERM) which is very comprehensive. There are four main categories which should be addressed when implementing an enterprise risk management system. They are operations which focuses on the effective use of resources in an organization, compliance which ensures the company is compliant with the legal regulations and laws that are applicable to it, strategy which ensures the systems support are in line with the mission of the organization and financial reporting which ensures financial records are reliable (Flyvbjerg Budzier, 2011). IT risk management encompasses all these categories and therefore plays a critical role within an organization to ensure risk is kept at manageable level in a company. Risk sensitivity and risk appetite should be a guiding in factor within the IT risk management process (Taylor VanMarcke, 2002). Companies are now not being faced with lawsuits due to such cases because it has been stated in the law that all individuals including their employees are not to handle any handheld device while driving. If a company has blocked social media sites their employees can be able to access these sites using their personal devices. They can engage on social media as usual but if there is a case such as racial discrimination on social media which was instigated by an employee while at the work place the company is liable to any damages that may have been caused by the employee (Roehrig, 2006). An unknown device which is lost and found and used within a company can be a major risk factor. The device might contain unwanted information which might put the company at risk of having legal problems. These devices are also used by individuals who have malicious intent against the company or have purposed to carry out corporate espionage. It is therefore very important for the company to ensure tha t it has a strict policy which restricts employees from using their personal devices as they work (Antunes Vincente, 2015). The personal devices pose a major risk factor and are best avoided when at the workplace to ensure the level of risk that may come from them is minimal or none at all. Financial institutions such as Aztec usually have to adhere to the set industry or government compliance or regulation. This is mainly to ensure that such institutions operate within the law by acts such as ensuring they safeguard the data and finances of their clients Kasperson, Renn, Slovic, Brown, Emel et al., 1988). The presence of government or industry regulations ensure that any financial institution such as Aztec which may be in operation follows the set standards as it carries out its mandate. The regulations are created in a way that will reduce risks in which clients may have to face by setting up key standards in which the institution should adhere to while in operation. The regulations also ensure outsourced operations are evaluated before being given out to find out how much risk a financial institution can have when it gives out it work to a third party. Financial institutions such as Aztec handle a lot of sensitive information which belongs to its clients and sharehol ders. In the advent of various digital breaches and ransomware attacks governments and other regulatory bodies have had to enact stringent policies that ensure these financial institution invest heavily in keeping their data secure (British Standard Institute, 2006). It is a good approach both for the financial institutions and their clients. Reviewing of the risks which are posed when individuals are allowed to bring and use their personal devices at Aztec will demonstrate the importance of the IT risk management process and the benefits it has to a company. It will also shed light on the security posture of Aztec. IT risk management includes a number of processes which are undertaken by a company to establish the potential risks they face and how they can be able to mitigate them (ISACA, 2006). The first step involves establishing some context that can be used for the risk assessment. In this stage or process all the relevant information that pertains a company in our case Aztec is acquired followed by the scope, purpose, boundaries and basic criteria of the risk assessment being established (Technical Standard Risk Taxonomy, 2009). In this stage also the organization which will carry out the risk assessment is determined. The gathering of required information based on the scope and purpose of the risk assessment will h elp the individual performing the task to determine in which areas they are going to assess risk so that they may deliver on their mandate. Aztec has commissioned an IT risk analysis expert to assess the risk and impact which faces the company when employees are allowed to user their personal devices such as tablets, mobile phones and laptops as they work and carry out their mandate in the organization. Purpose of Risk Assessment The purpose of establishing context is to ensure that all the legal procedures and requirements are followed and evidence of this should be provided so that the whole IT risk assessment can be certified as a legitimate and trustworthy process (IEEE, 2006). Context establishment is also done to bring strategic value to the business from the information which will be acquired. This means that the risk assessment should be of benefit to the strategic plan of the business by indicating what kind of risks they can take and those that they cannot afford to take. Stakeholders and shareholders in an organization are the people who own the company. The company may have employees and a chief executive officer but these employees all work for the shareholders. The shareholders have invested their money in the organization because they believe in their mission and vision (Lacey, 2011). They also want to turn a profit from their investment. The shareholders invest in the company with the expectat ion of making a profit but with investments come risks. The risk assessment will give the shareholders more insight on the risks the company might face. It will also give the shareholders confidence in the company being able to bring them a profit or dividends while growing their share value (Korstanje, 2014). A risk assessment also enables an organization to establish a baseline which can help them determine the negative consequences which can befall them and to what extent their reputation can be damaged (Verin Trumper, 2007). Information technology being known as a critical resource within any organization helps in running most of the systems in a company. IT risk assessment is therefore a key factor while doing a risk assessment because it is an underlying factor in most of the operations of an organization. The constraints in which an organization faces are also documented and collected for use in guiding the risk assessment process (Spring, Kern Summers, 2015). The constraints may include cultural, technical, political or budgetary constraints. Risk management deals with continuously analyzing, controlling, implementing, monitoring and planning of the measures that a company has implemented to ensure that the security policy is maintained and enforced within a company. Risk assessment is usually carried out on demand or once a year until a clear view of assessed risk can be established. The risk assessment as established was to determine the risk factors that come with employees bringing their persona l devices to the workplace and using them in work related tasks. After the risk to be assessed has been identified the next step is to perform a risk estimation. Risk assessment in relation to information security field can be done through two methods. These methods are the qualitative and quantitative method. Quantitative risk assessment is the act of performing mathematical calculations that are solely about the security metrics of an application or a system (Lieberman, 2009). In quantitative risk assessment each risk scenario that is being assessed is based on a collection of risk factors which lead to the establishment of a single loss expectancy (SLE). After the single loss expectancy is established the annual loss expectancy can be known by finding the product of the annual rate of occurrence and the single loss expectancy based on the probability of a certain event occurring in a set period such as in a year which is the annual rate or occurrence (ARO). When performing a quantitative risk assessment it is a key factor to note that the total value of all the assets of a company are considered rather than the specific resource which was affected by a problem. From the risk assessment being done at Aztec we can demonstrate quantitative risk assessment by understanding that when employe es bring their own devices to the work place they not only expose their devices to risk but they also expose any company or relating data that has passed through their device. The company can be legally liable for any damages such as loss of confidential data or any other issues that pertain to the use of the employees personal devices as they work (Hubbard, 2009). Qualitative Risk Assessment Qualitative risk assessment is a risk assessment process which is utilized when an organization needs a risk assessment to be performed based on some certain constraints in which they may have. These constraints may include the company having a small budget to perform the risk assessment, the company needing the risk assessment to be performed in a short period of time, when the individuals performing the risk assessment are not equipped with the necessary skills such as financial, mathematical or risk assessment experience to perform a conclusive risk assessment or there is an absence of a significant amount of data which may be crucial in performing a comprehensive risk assessment. The main difference between a qualitative and quantitative risk assessment is that a qualitative risk assessment can be accomplished with the use of less data and shorter time periods as compared to the amount of data and time needed to accomplish a quantitative risk assessment (Hallenbeck, 1986). Qualit ative risk assessment are implemented through holding interviews with the involved stakeholders. In our case interviews can be performed on individuals or employees who use their personal devices at the work place as they do their mandated tasks (OBrien, 2002). Qualitative risk assessments are usually compared based on the description versus its measurable extent. In a risk assessment process a qualitative classification is performed which is later followed by a quantitative evaluation between the costs incurred in implementing security measures compared to the highest risks present. Risk estimation comprises of assessing the consequences of how a risk or problem has impacted an organization. This can be done through valuing the assets in which the company holds. It is also done through assessing the chances in which a risk might occur through vulnerability and threat valuation (Flyvbjerg, 2003). Lastly the chances of a risk occurring are recorded in the measured estimates and the consequences which are accompanied with the risk occurring. A risk registry is a document which contains information on all the risks discovered and the value levels of these risks. Risk evaluation is the process of comparing the risk levels obtained from the risk assessment process against the risk acceptance criteria which the company has specified and prioritizing the risks identified with risk treatment indications (Mayo, 2011). Risk mitigation is the process of evaluating, implementing and prioritizing the necessary steps or actions which are recommended to reduce risks which have been identified in the risk assessment process (Lerche Glaesser, 2006). The removal or elimination of risk is a task which is not practical or is hard to achieve. Senior management and other top management within an organization should utilize the least cost approach to have in place the controls which will be appropriate in controlling or reducing the risks which have been identified to reach a level that is minimal or acceptable such that it does not have any adverse impact on the mission or resources of an organization. In an organization such as Aztec there are measures in place to control which employees have access to what kind of information. The problem is that for any employee to play their needed role in carrying out their mandate within the company they needed to be given access to the resources and assets of the compa ny. If an employee used their personal device to login to the company database or system they might put the company at risk. This is because their personal device has not undergone any form of screening or testing to establish whether it is safe for use within the company (Simon Hillson, 2012). Data security is a key aspect in any organization because their data is a valuable resource to them. Data in an organization which is a financial institution such as Aztec is very important and if this data it tampered with or accessed by unauthorized personnel it can become a great risk to the company because they might incur a lot of costs and legal problems (Rob, 2016).. The equipment used by an organization is usually prescreened and continually patched and updated to ensure that it does not pose a risk which can be capitalized upon by malicious individuals in order for them to gain access to the data in a company. Personal devices which are used by employees have not been prescreened to ensure that they are secure for use in an organization. An employee poses a data risk when they come with their personal devices to use in the company. As soon as they gain access to the company data malicious individuals can use this loophole to again access to company data and demand for a rans om for it or tamper with the data which will cost the company being attacked immensely. Devices in which employees do not know of their origin should also not be used in the company. A device such as a flash disk may contain a virus which affects the computer or system in which it is plugged into. The company can reduce risks concerning data security by having a backup of their data such that when their primary database is attacked they can utilize their backup and continue their operations. The company can also instill a policy which bans employees from using their devices while they do their work (Shrader Westra, 1997). This will go a long way to ensure that the level of risk which might be posed by these devices is reduced immensely. Intrusion Detection Systems The company should also have a firewall in place to ensure that even when employees use their personal devices as they work any malicious software can be blocked from accessing the company system and its resources. The firewall will keep the company system protected and will ensure that the data which is stored on the company database is valid and can be used by the employees effectively as they carry out their duties. The company should also implement vulnerability scanners within their system to ensure that they can detect any risks before they become too severe (Caballero, 2009). Vulnerability scanners are built to regularly check a system for any vulnerabilities present. Unlike a firewall the vulnerability scanner is purposes with checking the system periodically for any suspicious software or vulnerabilities. Vulnerability scanners are important because they enable a company to find any malicious software or system which might have embedded itself within the company system. When employees come with their own devices and use them as they work a vulnerability scanner comes in handy in reducing the risk of the company being affected by any vulnerability or malicious software. The vulnerability scanners can scan their devices and block them from accessing the system to ensure that the risk of affecting the company is reduced. Risk assumption is when a company accepts the potential risks it may face and continue with their business operations as they work on ways to lower their level of risk. Most companies when they encounter a risk usually follow this path because they can work on the problem at hand and still serve their clients (Commoner, 2010). It may however be a risky venture because if the risk gets out of hand they might get into more problems than if they had stopped their operations initially to focus all their resources on fixing the issue. Risk avoidance can be practiced by a company if they deal with the cause of the risk and eliminate it. Risk limitation is the reduction or limitation of risk by having in place controls which can reduce the impact a risk may have on a company. Risk planning is when a company manages risk by coming up with a plan to take care of the risk. Research and acknowledgement is when a company or organization accepts that they are being faced with a risk and they rese arch on methods which can help them correct or rectify the risk. Conclusion A company such as Aztec can transfer risks to its insurers. Transferring risk in such a case to an insurer will ensure that any risk the company is exposed to the insurer can cover them (Dorfman, 2007). This is however a costly venture because the insurer has to be paid hefty premiums depending on the kind of cover the company has taken. Although it may be expensive it can help the company to save its reputation if there is a problem. The insurer will simply step in on behalf of the company and cover any damages the company has been imposed on (Costas, Gritzalisa, Petros, Athsnasois Sokratis, 2005). For a company such as Aztec risk assessment and management should be an activity which is carried out regularly to ensure that the company is always alert of any potential risk that may affect their business. When such a company implements a policy which ensures their employees do not use their personal devices for work related activities or at the work place they can be able to mitigate a lot of risks and vulnerabilities before they become adverse and impact the company largely in a negative way. It is therefore very important for such a company to carry out risk assessment regularly so that they are confident in the integrity of their database. It will also give them confidence to operate in the financial industry since they adhere to the legal requirements concerning risk assessment and mitigation. References Anderson K. (2005). Intelligence Based Threat Assessments for Information Networks and Infrastructures: A White Paper. Antunes R. Vincente G. (2015). A Production Model for Construction. A Theoretical Framework. Buildings. 5(1): 209 228. British Standard Institute. (2006). ISMSs-Part 3: Guidelines for information security risk management. Caballero A. (2009). Computer and Information Security Handbook. Morgan Kaufmann Publications Elsevier Inc. p. 232. Commoner B. (2010). Comparing apples to oranges: Risk of cost/benefit analysis. From Contemporary moral controversies in technology. Pp 64 -65. Costas L., Gritzalisa S., Petros H., Athsnasois N. Y. Sokratis K. (2005). A formal model for pricing information systems insurance contracts. Computer Standards Interfaces. p. 531 -532. Crockford N. (1986). An Introduction to Risk Management. Woodhead-Faulkner. p.18. Dorfman M. S. (2007). Introduction to Risk Management and Insurance. Englewood Cliffs, N.J: Prentice Hall. Flyvbjerg B. Budzier A. (2011).Why Your IT Project May Be Riskier Than You Think. Harvard Business Review. 89(9): 601 603. Flyvbjerg B. (2003). Megaproject and Risk: An Anatomy of Ambition. Cambridge University Press. Hallenbeck W. H. (1986). Quantitative risk assessment for environmental and occupational health. Lewis Publishers Hubbard D. (2009).The Failure of Risk Management: Why Its Broken and How to Fix it. John Wiley Sons. p.46 IEEE (2006). Systems and software engineering Life cycle processes Risk management. ISACA (2006). CISA Review Manual 2006. Information Systems Audit and Control Association. p.85. Kasperson R. E, Renn O., Slovic P., Brown H. S., Emel J. et al. (1988). The social amplification of risk: A conceptual framework. Risk Analysis. 8(2): 177 -187. Katsicas S. K. (2009). Computer and Information Security Handbook. Morgan Kaufmann Publications Elsevier Inc. p. 605. Korstanje M. E. (2014). Why risk research is more prominent in English speaking countries in the digital society. International Journal of Cyber Warfare and Terrorism. 4(1): 8 -18. Lacey P. (2011). An Application of Fault Tree Analysis to the identification and Management of Risks in Government Funded Human Service Delivery. Proceedings of the 2nd International Conference on Public Policy and Social Sciences. Lerche I. Glaesser W. (2006). Environmental risk assessment: quantitative measures, anthropogenic influences, human impact. Springer Lieberman D. (2009). Using a Practical Threat Modelling Quantitative Approach for data security. Lock G. (2017) Public Safety Driving Dynamic Risk Assessment. PS Driver Magazine. Mayo D. G. (2011). Sociological versus metascientific views of technological risk assessment. OBrien M. (2002). Making better environmental decisions: an alternative to risk assessment. MIT Press Rob A. (2016). 3 Types of Security Assessments. Threat Sketch Roehrig P. (2006). Bet On Governance To Manage Outsourcing Risk. Business Trends Quarterly. Shrader F. K. Westra L. (1997). Technology and values. Rowman Littlefield. Simon P. Hillson D. (2012). Practical Risk Management: The ATOM Methodology. Management Concepts. Spring J., Kern S. Summers A. (2015). Global adversarial capability modelling. 2015 APWG Symposium on Electronic Crime Research (eCrime) 1- 21. Technical Standard Risk Taxonomy. (2009). Published by The Open Group. Taylor C. VanMarcke E. (2002). Acceptable Risk Processes: Lifelines and Natural Hazards. Verin L. Trumper M. (2007). Project Decisions: The Art and Science. Management Concepts. Verin L. Trumper M. (2007). Project Think: Why Good Managers Make Poor Project Choices. Gower Pub Co.
Friday, November 29, 2019
How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide Essay Example
How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide Paper Enzymes are large proteins that speed up chemical reaction. As globular protein, enzymes have a specific three-dimensional shape which is determined by their sequence of amino acids. Despite their large overall size, enzyme molecules only have a small region that is functional. This is known as enzymes active site. The substrate molecule is held within the active site by bonds that temporarily form between the R groups of the amino acids of the active site by bonds and all groups on the substrate molecules. This structure is known as enzyme-substrate complex. Enzymes are classified into several categories, such as hydrolytic, oxidising, and educing. Depending on the types of reaction they control. In this case, the enzyme I will use in the investigation is catalase from celery extract, which is concluding as hydrolytic enzyme. This type of enzyme accelerates reactions in which a substrate is broken down into simpler compounds through reaction with adding up water molecules. Oxidising enzyme, known as oxidises, accelerate oxidation reaction; reducing enzyme speed up reducing reactions in which oxygen is removed. A substrate is the molecule, which can bind into the active of enzyme. In this case, I will use hydrogen peroxide as the substrate. Enzyme works in the same way as a key operates a lock. Enzymes active sites have a particular shape like a lock and only a particular key ( substrate) can fit into that lock. Enzymes are therefore specific in the reactions that they catalyse. This is known as the lock and key theory. In practice, unlike a rigid lock, the enzyme actually changes its form slightly to fit the shape of the substrate. In other works, it is flexible and moulds itself around the substrate. As it alters its shape, the enzyme puts a strain on the substrate molecule and thereby lowers its activation energy. We will write a custom essay sample on How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on How different concentration of enzyme catalase affects the rate of breaking down substrate hydrogen peroxide specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In this case, enzyme catalse has a specific active site, which just for the substrate hydrogen peroxide to fit in, then the reaction takes place. The reaction involved is hydrolysis. The equation of reaction is: 2H2O2 2H2O + O2 Factor that would affect the reaction: Temperature At low temperature, the reaction takes place very slowly, this because molecules are moving relatively slowly as have low kinetic energy. Substrate molecules will not often collide with the active site, and so binding between substrate and enzyme is a rare event. Therefore, reaction is slow. A rise in temperature increases the kinetic energy of molecules which therefore move around more rapidly and collide with one another more often. This means at a higher temperature, the reaction will take place faster than a lower temperature and an increasing or a decreasing of temperature will affect my reaction and results. For this reason, I will control this effect by using a water bath to maintain the temperature the same during the whole reaction. As enzyme work best at a certain temperature, this is known as optimum temperature. If the temperature is too low, enzyme cannot work properly; if the temperature is too high, this may denature the enzyme active site and enzyme will lose its function. So to avoid this problem, I will keep the water bath has the temperature of 25?C, which is the room temperature. Therefore enzyme catalase will work properly and temperature will not be a factor to affect this investigation. PH Most enzymes also have an optimum pH at which they function best. In human body, most enzyme work fastest at an optimum pH of about 7. For example, the digestive system Pepsin found in the stomach to digest proteins. A change I pH means a change in the concentration of hydrogen ions in the surrounding of the enzyme. This affects the ionisation of R group in the amino acid residues of the protein molecule and the shape of the active site to bind with the substrate. The lower the pH, the bigger the hydrogen ions concentration it is . Hydrogen ions can interact with the R group of amino acids, affecting the way in which they bond with each other and therefore affect their 3D shape. So the lower the pH, the higher the hydrogen ions concentration it is, and therefore the slower the reaction. Oppositely, the higher the pH, the faster the reaction it will take place. To control this factor, I will keep the pH all the way through the same by using a pH paper to check the pH number during the experiment. Enzyme concentration The rate of reaction increases as the concentration of enzyme increase. Because higher concentration of enzyme means higher number of enzyme molecules, so that more enzyme molecule will collide with substrate molecule, therefore the reaction will take place faster. When there is plenty of substrate, the rate of reaction is not limited by the concentration of enzyme. Therefore if the concentration of enzyme is increased, the number of collision with the substrate molecule and hence the rate of reaction will increase. If the amount of substrate is limited, the rate of reaction decreases because if the amount of substrate is limited, the enzymes active site will not collide with substrate very often, therefore a few products will be made. As the reaction progressing, the substance will be broken down slowly, therefore less substrate left. So enzyme molecules freer, therefore products will be produced more slowly. Hence the slower the reaction goes. In this experiment, the enzyme concentration is an independent variable which I will vary the concentration of celery extract each time to investigate how different concentration of celery extract( enzyme concentration) affect the rate of breaking down hydrogen peroxide. Substrate concentration Increasing in the substrate concentration will increase in the rate of reaction. Because increasing the substrate concentration, we increased the number of substrate molecules; therefore more collision will take place between substrate and enzymes active site. Hence mere products will be produced. Therefore the faster the rate of reaction takes place. However, if we continue increase the substrate keeping the enzyme concentration and volume the same. The rate of reaction will not continue to increase. This is because a higher substrate concentration active site of all the enzyme molecule is busy with substrates. The number of enzyme molecules because a limiting factor. The rate of reaction at higher substrate becomes constant. In this case, I will keep the volume of hydrogen peroxide the same for using each time. Inhibitors Enzyme inhibitors are substances that directly or indirectly interfere with the functioning of the active of an enzyme and so reduce its activity. There are two types of inhibitors: Competitive inhibitors Competitive inhibitors are the molecules which have a shape similar to the substrate, so they fit into the active site of the enzyme. Therefore the substrate cannot enter into the active site and so the enzyme cannot catalyse the reaction. Hence, the reaction is slow down. However, the inhibitors are not permanently bound to the active site and so, when it leaves another molecule can take its place. Sooner or later, all the substrate molecules will find an active site, but the greater the concentration of inhibitors, the longer the reaction will be. Non-competitive inhibitors Non-competitive inhibitors will bind to another part of the enzyme rather than the true active site. This changes the shape of the enzymes active site so that the substrate no longer fits. Therefore the reaction is slow down. As the substrate and the inhibitor are not competry for the same site, an increase in substrate concentration does not decrease the effect of inhibitors. To control the factor of inhibitors. I will not add any substance except celery solution and hydrogen peroxide during the experiment. Prediction I predict that the higher the concentration of celery extract I use, the fast the rate of breaking down hydrogen peroxide I will get. As in higher concentration of celery extract, the more number of catalase molecules in the solution. So there are more collisions between substrate ( hydrogen peroxide) and enzyme( catalase) active site, and more products will be formed( water and oxygen). The rate of reaction can be measured by measuring the volume of oxygen produced in a period of time. The larger the volume of oxygen produced in the same period of time, the fast the reaction is taken place. Preliminary work In order to get finest and reliable results, I did a preliminary work. This enable me not just find out a suitable range of celery extract of catalase concentration I will use in my real experiment, but also help me descried the time interval I will measure the oxygen get and justify the equipment and method. I think these all lead me to get reliable and accurate results in the end. In the preliminary work, I choose to do three different concentration of celery extract. To get different concentrations of celery extract, I used distilled water to dilute the celery extract. I tested the range of celery extract between 100% 20%, the highest concentration is 100%, the lowest concentration is 20% and the median is 60%. The reason I chose these three concentrations is because between each concentration, there is 40% difference and this enable me to test that in which level of concentration, reaction goes best and to find out which concentration of celery extract I will use in my real experiment.
Monday, November 25, 2019
The Battle of San Jacinto in the Texas Revolution
The Battle of San Jacinto in the Texas Revolution The Battle of San Jacinto on April 21, 1836, ââ¬â¹was the defining battle of the Texas Revolution. Mexican General Santa Anna had unwisely divided his force to mop up those Texans still in rebellion after the Battle of the Alamo and the Goliad Massacre. General Sam Houston, sensing Santa Annas mistake, engaged him on the shores of the San Jacinto River. The battle was a rout, as hundreds of Mexican soldiers were killed or captured. Santa Anna himself was captured and forced to sign a treaty, effectively ending the war. Rebellion in Texas Tensions had long been simmering between rebellious Texans and Mexico. Settlers from the USA had been coming to Texas (then a part of Mexico) for years, with the support of the Mexican government, but a number of factors made them unhappy and open war broke out at the Battle of Gonzales on October 2, 1835. Mexican President/General Antonio Lopez de Santa Anna marched north with a massive army to put down the rebellion. He defeated the Texans at the legendary Battle of the Alamo on March 6, 1836. This was followed by the Goliad Massacre, in which some 350 rebellious Texan prisoners were executed. Santa Anna vs. Sam Houston After the Alamo and Goliad, panicked Texans fled east, fearing for their lives. Santa Anna believed that the Texans were beaten even though General Sam Houston still had an army of almost 900 in the field and more recruits came every day. Santa Anna chased the fleeing Texans, alienating many with his policies of driving off Anglo settlers and destroying their homesteads. Meanwhile, Houston kept one step ahead of Santa Anna. His critics called him a coward, but Houston felt he would only get one shot at defeating the much-larger Mexican army and preferred to pick the time and place for battle. Prelude to Battle In April of 1836, Santa Anna learned that Houston was moving east. He divided his army in three: one part went on a failed attempt to capture the provisional government, another remained to protect his supply lines, and the third, which he commanded himself, went after Houston and his army. When Houston learned what Santa Anna had done, he knew the time was right and turned to meet the Mexicans. Santa Anna set up camp on April 19, 1836, in a marshy area bordered by the San Jacinto River, Buffalo Bayou and a lake. Houston set up camp nearby. Shermanââ¬â¢s Charge On the afternoon of April 20, as the two armies continued to skirmish and size each other up, Sidney Sherman demanded that Houston send a cavalry charge to attack the Mexicans: Houston thought this foolish. Sherman rounded up about 60 horsemen and charged anyway. The Mexicans did not flinch and before long, the horsemen were trapped, forcing the rest of the Texan army to briefly attack to allow them to escape. This was typical of Houstonââ¬â¢s command. As most of the men were volunteers, they did not have to take orders from anyone if they didnââ¬â¢t want to and often did things on their own. The Battle of San Jacinto On the following day, April 21, Santa Anna received some 500 reinforcements under the command of General Martà n Perfecto de Cos. When Houston didnââ¬â¢t attack at first light, Santa Anna assumed he would not attack that day and the Mexicans rested. The troops under Cos were particularly tired. The Texans wanted to fight and several junior officers tried to convince Houston to attack. Houston held a good defensive position and wanted to let Santa Anna attack first, but in the end, he was convinced of the wisdom of an attack. At about 3:30, the Texans began silently marching forward, trying to get as close as possible before opening fire. Total Defeat As soon as the Mexicans realized an attack was coming, Houston ordered the cannons to fire (he had two of them, called the ââ¬Å"twin sistersâ⬠) and the cavalry and infantry to charge. The Mexicans were taken completely unawares. Many were asleep and almost none were in defensive position. The angry Texans swarmed into the enemy camp, shouting ââ¬Å"Remember Goliad!â⬠and ââ¬Å"Remember the Alamo!â⬠After about 20 minutes, all organized resistance failed. Panicked Mexicans tried to flee only to find themselves trapped by the river or bayou. Many of Santa Annaââ¬â¢s best officers fell early and loss of leadership made the rout even worse. The Final Toll The Texans, still enraged over the massacres at the Alamo and Goliad, showed little pity for the Mexicans. Many Mexicans tried to surrender, saying ââ¬Å"me no La Bahà a (Goliad), me no Alamo,â⬠but it was no use. The worst part of the slaughter was at the edges of the Bayou, where fleeing Mexicans found themselves cornered. The final toll for the Texans: nine dead and 30 wounded, including Sam Houston, who had been shot in the ankle. For the Mexicans: about 630 dead, 200 wounded and 730 captured, including Santa Anna himself, who was captured the next day as he tried to flee in civilian clothes. Legacy of the Battle of San Jacinto After the battle, many of the victorious Texans clamored for the execution of General Santa Anna. Houston wisely refrained. He correctly surmised that Santa Anna was worth much more alive than dead. There were still three large Mexican armies in Texas, under Generals Filisola, Urrea and Gaona: any one of them was large enough to potentially defeat Houston and his men. Houston and his officers spoke with Santa Anna for hours before deciding on a course of action. Santa Anna dictated orders to his generals: they were to leave Texas at once. He also signed documents recognizing the independence of Texas and ending the war. Somewhat amazingly, Santa Annas generals did as they were told and retreated out of Texas with their armies. Santa Anna somehow evaded execution and eventually made his way back to Mexico, where he would later resume the Presidency, go back on his word, and try more than once to re-take Texas. But every effort was doomed to failure. Texas was gone, soon to be followed by California, New Mexico, and much more Mexican territory. History lends events such as the independence of Texas a certain feeling of inevitabilityà as if it was always the destiny of Texas to become first independent and then a state in the USA. The reality was different. The Texans had just suffered two huge losses at the Alamo and Goliad and were on the run. Had Santa Anna not split his forces, Houstons army may well have been beaten by the Mexicans superior numbers. In addition, Santa Annas generals had the strength to defeat the Texans: had Santa Anna been executed, they likely would have kept fighting. In either case, history would be much different today. As it was, the Mexicans crushing defeat at the Battle of San Jacinto proved decisive for Texas. The Mexican army retreated, effectively ending the only realistic chance they ever had of re-taking Texas. Mexico would futilely try for years to reclaim Texas, only finally relinquishing any claim to it after the Mexican-American War. San Jacinto was Houstons finest hour. The glorious victory silenced his critics and gave him the invincible air of a war hero, which served him in good stead during his subsequent political career. His decisions were consistently proven wise. His reluctance to attack Santa Annas unified force and his refusal to let the captured dictator be executed are two good examples. For the Mexicans, San Jacinto was the start of a long national nightmare that would end with the loss of not only Texasà but also California, New Mexico, and much more. It was a humiliating defeat and for years. Mexican politicians made great plans to get Texas back, but deep down they knew it was gone. Santa Anna was disgracedà but would make yet another comeback in Mexican politics during the Pastry War against France in 1838-1839. Today, there is a monument at the San Jacinto battlefield, not far from the city of Houston. Resources and Further Reading Brands, H.W. Lone Star Nation: the Epic Story of the Battle for Texas Independence. New York: Anchor Books, 2004.
Thursday, November 21, 2019
Susan Sontag on Photography Essay Example | Topics and Well Written Essays - 3500 words
Susan Sontag on Photography - Essay Example In all of her works, Sontag believed that the proliferation of photographic images had developed a worldwide recognition that photographs ought to be exact representations of reality. Thus, the essence of photography is pure reflection of reality. As such, every photographer must know, both technically and artistically, the proper way of capturing images in order to deliver a pure message about a phenomenon. In this paper, we intend to examine further some of Sontagââ¬â¢s critical teachings about photography by emphasizing on its purpose, the ideal relation between the photographer and his subject, and the key issues surrounding the practice of photography. After this, we deepen our understanding on the essence of photography by looking at one essential issue, that is, the problem of photo manipulation in modern photojournalism. In this part, we first study the trends in photographic manipulation to understand how the practices have been caused, either directly or indirectly, by t echnological and commercial innovations. After this, we discuss why and how photo manipulation is done. Such topics are to be discussed in relation to specific cases of photo manipulation in the mass media like newspapers and magazines. ... A. Important Ideas: Susan Sontagââ¬â¢s On Photography Susan Sontag condemned photography by asserting that it only delivers images that are nothing more than shadows of reality. As she metaphorically strengthened this thesis, humans who view photographs are like trapped men in a cave who only see the shadows of the outside world. What they deem as ââ¬Ërealââ¬â¢ are actually distorted reflections of reality. To arrive at a more meaningful discussion of On Photography, let us first delve into her definition of photography. To Sontag, to photograph is to appropriate to the thing being photographed. It is an act of non-intervention. Thus, there should be distance between the photographer and his subject. However, she believed that since photographs do not provide contextual stories about the world, they become miniatures of reality. The world, therefore, becomes a series of unrelated particles or phenomena, with no interconnectedness or continuity. But the capacity to imitate re ality is not the only definitive characteristic of photography, for in the artistic activity of the photographer he is able to elevate his creations as pretentious works of art. As narrated by Bridget Brimer in her online article entitled Literary Interpretation and Analysis of Susan Sontag's Book, On Photography, Chapter 1: "In Plato's Cave", through the use of various skills in photography, the photographer is able to convert a phenomenon into an image that provides a transient experience to its intended audience. Thus, Sontag saw the act of photographing as symbolic shooting, or even raping. Sontag reckoned that photographing is like raping since the photographer sees his subject in a manner that is unavailable to himself (subjectââ¬â¢s). He gains knowledge about
Wednesday, November 20, 2019
Divine Chocolate; Marketing and Communications Plan Essay
Divine Chocolate; Marketing and Communications Plan - Essay Example They create barriers in the distribution channel by offering attractive bonuses to retailers who surpass their preset targets. Divine also lacks the international economies of scale that the dominators enjoy. In a research conducted in 2007 divine held 0.3% of the total chocolate sales in the UK as compared to 83% market shared by the three dominates. The use of fair-trade certification has contributed significantly to the marketing communications of divine chocolates to the consumers. A research conducted in 2007n proved that most consumers had left other chocolate brands in favor of Divine due to the mark of quality and its splendid taste. It therefore, has been suggested that Divine should develop a marketing plan focused on communicating it product to retailers and final consumers on the basis of fair pricing, product differentiation and emphasis on quality. In conclusion, it has been established that though divine is a small organization it has a high potential of the top of the value chain. It all the features required to get their only solution is adopting a communication plan focusing on the retailers and attaining economies of scale. Divine chocolate company, is a manufacture fair-trade chocolates in UK and United States, marking its first establishment in the UK in 1996. It partners with Kuapa Kokoo cocoa growers from Ghana, comic relief and Christian aid. It has a unique trading system; the farmers are the main shareholders in the company. Its first product, Divine milk chocolate, has been launched in late 1998. Another range of its products include dark chocolate and drinking chocolate; it launched another product in 2000 called dubble, in collaboration with comic relief. The brand was later on launch in the US in early 2007. Currently three main organizations own divine chocolate company. These organizations include Kuapa Kokoo; a group of cocoa producers from Ghana own 45% of the shares, Twin trading
Monday, November 18, 2019
Drama Essay Example | Topics and Well Written Essays - 1500 words - 1
Drama - Essay Example ?The Piano Lessonâ⬠defines the history of African-Americans, which is a history that is painful and problematic to all ethnic groups in this country because of the conflicts and dispersion of traditions and values that African-Americans have a right to keep. The plot follows the Charles family and the symbolic and literal piano that maintains the centerpiece of their lives. Every aspect of the play revolves around the piano, past and present, and a reader is left to wonder at the intensity with which the Charles family values music in their lives. At its foundation, however, the play isnââ¬â¢t about a piano; it is about the need for stability and heritage that is inherent in all of their lives. Neither brother nor sister can live without what that particular piano represents, and that, in itself, highlights the purity of the metaphor that Wilson has crafted for his audience. Wilsonââ¬â¢s cannon of plays on the African-American perspective may be ââ¬Å"more thematic than theatrical; the plays are rich in their variety of characters and conflicts, and in the resolutions to these conflictsâ⬠(Boan 263). Even a casual reader of his plays, specifically ââ¬Å"The Piano Lesson,â⬠will come away feeling like they have been granted access into the African-American dynamic and struggles that African-Americans as a culture have to deal with in all elements of their lives. Culture, to any race, is a specific understanding and implementation of their heritage, and itââ¬â¢s easy to lose that in white America, where the dominant culture has become a melting pot of ideologies that are inconsistent with any one race or heritage. Many of these ideologies are often incompatible with the heritage and beliefs that certain races may want to uphold, which makes balancing life with personal traditions more complicated than it seems. Further, ââ¬Å"beneath the diversity within the dramatic framework of the plays lies the assertion that the present for black America has been invariably shaped
Subscribe to:
Posts (Atom)