Thursday, October 31, 2019
EGT Essay Example | Topics and Well Written Essays - 750 words
EGT - Essay Example Admittedly, the very first thing that is noticed about Chinese culture is the importance they give to relationships and connections. In other words, there is a term ââ¬ËGuanxiââ¬â¢ in Chinese that means ââ¬Ërelationshipââ¬â¢. Evidently, the Chinese give too much stress on having relationships based on trust and cooperation. In other words, for them, business promotion will not merely run on publicity but it will depend on developing trust and cooperation in China. Another sensitive area in business marketing in China is the personal pride. In this nation, humiliation; either private or public, has a seriously negative impact. However, in this nation, praising can do wonders even if done in moderation. It brings respect, loyalty and negotiations. Another important point is the use of ââ¬ËKeqiââ¬â¢, which means ââ¬Ëcourteous and refined behaviorââ¬â¢. Generally, in China, exaggerated claims are often viewed with suspicion and disdain. On the other hand, modesty and humility always manage to win hearts easily, as they are recognized as the indications of truthfulness. One important point where contradiction can arise is the speed of negotiations. As Zhao (1991) points out, while Americans are known for their fast pace and the eagerness to get immediate result, Chinese believe in long term relationships and they generally dislike hurried transactions. Evidently, the American marketing strategy should aim first at developing trust and then at praising the Chinese culture in a way that does not arouse suspicion. Efforts to exaggerate the companyââ¬â¢s credentials in the very beginning may not get the kind of response it can reasonably expect in the West. The second point of consideration is that the marketing and business negotiations should aim at the right person. Often, US marketing people engage in negotiations with people and finally realize that they were
Tuesday, October 29, 2019
Substance Abuse Treatment Essay Example | Topics and Well Written Essays - 500 words
Substance Abuse Treatment - Essay Example Many of the counselors at GCASA revealed that they actually prefer to work with mandated clients because, even if they initially resent having to come to treatment, they eventually are more motivated to continue with treatment and get something positive from it. Dr. John Kelly, the lead investigator on the study mentioned above is quoted as saying, "Once in a therapeutic environment, mandated patients seem to reflect on their situation and accept the need for treatment. The findings suggest that people can learn from the 'teachable moment' offered by a judicial mandate, even though the initial motivation for treatment is external." Employees are a vital part of any business. It is better to offer assistance to employees with personal problemsthan to discipline or fire them. Recovering employees become productive and effective members of your Kelly, J.F.; Finney, J.W.; and Moos, R. Substance use disorder patients who are mandated to treatment: Characteristics, treatment process, and 1- and 5-year outcomes. Journal of Substance Abuse Treatment 28(3):213-223, 2005.
Sunday, October 27, 2019
Antigen Presenting Cell (APC): Structure and Function
Antigen Presenting Cell (APC): Structure and Function There are many complex mechanisms employed by the immune system to destroy invading organisms, abnormal cells and contain infections in order to maintain health and life. Antigen presenting cells (APC) are some of the cells that form part of these mechanisms. This essay will look at what APCs are, the different types with examples and their specific roles in the immune response. APCs are cells that take up antigens and present them to lymphocytes during an immune response (Sherwood et al, 2009). The components of APCs that actually do the presenting are Major Histocompatibility complexes (MHCs): Class I and Class II MHC molecules (Sompayrac, 2003). These two complexes provide two different pathways of antigen presentation that stimulates different population of T cells to eliminate the invading pathogen concerned. All nucleated cells of the body express MHC class I molecules and are therefore referred to as non-professional APCs (Kropshofer et al, 2005). MHC class I molecules are like billboards that display on the surface of the cell, peptides of processed endogenous proteins (Sompayrac, 2003).The endogenous proteins could be those encoded by viruses or parasites that have infected the cell. The main focus of MHC class I APCs is on events within the cell. Typically in a viral infection, the virus enters the cell and uses the cells own biosynthetic machinery to produce proteins encoded by viral genes (Wagner et al, 2004). Viral proteins are broken down into peptides by enzymes within the cell (proteasomes) (DeFranco et al, 2007). Following this, the peptides are carried into the endoplasmic reticulum by a TAP transporter (Sompayrac, 2003). After which MHC class I molecules within the cell are loaded with these peptides along with a sample of other normal proteins being made by the cell. This M HC-peptide complex is then transported to the cell surface for presentation. The protein fragments are displayed on MHC class I molecules to cytotoxic T cells (Tc) (Schindler, 1991). Having this mechanism in place allows all body cells to be monitored by CD8+ve Tc cells which inspect the cells. Tc cells detect foreign peptides bound to an MHC so if a cell has been invaded by a virus or parasite, the Tc cells are alerted and respond by destroying the abnormal cell thus preventing the spread of viruses throughout the body (DeFranco et al, 2007). MHC class II molecules are designed to present peptides to helper T cells (Th). Unlike the MHC class I molecules, MHC class II molecules are restricted to certain cell types termed professional APCs. Their focus is on events unfolding in the outside environment so can present samples of antigens derived from exogenous antigens in various parts of the body. Professional APCs display class I and class II MHCs as well as co-stimulatory signals (Sompayrac, 2003). In order to function, T cells, both Tc and Th cells, require activation. For this to happen, T cells need to recognise its cognate antibody in an MHC complex and they also need a co-stimulatory signal which can only be provided by professional APCs (Wellness.com, 2010). Co-stimulation is provided by a protein (B7) on APCs which interlocks with another protein (CD28) on the surface of T cells. Examples of professional APCs are activated macrophages, activated dendritic cells (DC) and activated B cells. DCs are the most important of the APCs as it capable of initiating an immune response by activating naà ¯ve T cells (Sompayrac, 2003). These cells are strategically located in areas of the body such as the skin, mucosal lining of lung and digestive tract where microbes are likely to enter (Sherwood et al, 2009). In normal tissues DCs are immature, expressing few B7 protein and MHC molecules on their surfaces so are poor antigen presenters. However, when a microbe(s) invade the tissue which DCs reside, they mature. DC are specialised as they have pattern recognition receptors on their surface which recognises common features of invading microbes such as LPS on the surface of gram negative bacteria. DCs takes up pathogens through receptor mediated endocytosis and degrade it in a lysosome (DeFranco et al, 2007). During a invasion, cytokines (TNF à ±) released by activated mac rophages are recognised by the DC which informs it that innate immune system is under attack. Cytokines bind to receptors on the DC causing it to cease phagocytosis, leave the tissues (site of infection) and migrate through the lymphatic system. Whilst travelling, the DC equips the class II MHC reserves with the antigen and also produces B7 co-stimulatory protein. During this time also, DC upregulates the expression of class I MHC molecules as a precautionary measure that if the DC was infected by a virus or parasite at the site of infection, the antigen could be processed into protein fragments for presentation if necessary (Male, 2004). By the time the DC reaches the lymph node, it has its co-stimulatory molecules and the MHC class II- peptide complex(es) primed and ready to activate naà ¯ve T cells. Lymph nodes have compartments that have bountiful supplies of B and T cells (Schindler, 1991). Whilst at the lymph node, DCs trigger the adaptive immune response by presenting antigens to CD4+ve Th cells with matching receptors (Sherwood, 2009). After which, the APC secrete interleukin, a chemical which activate Th cells. Activated Th cells then secretes cytokines which stimulates the Th into rapid proliferation and differentiation into effector Th cells and memory Th cells (DeFranco et al, 2007). Memory Th cells are useful in future infections by the same pathogen whilst effector Th cells activate B cells to secrete antibodies enhancing other immune activities (Sherwood, 2009). Additionally effector Th cells and antibody molecules depart from the lymph node and enter the circulation which they then leave at the infection site. Antibodies opsonise the bacteria enhancing their uptakes by phagocytes, stimulate Natural killer cells (NK) to directly lyse the bacteria and also activate th e lethal compliment system (Sherwood, 2009). CD4 +ve T-cell on the other hand activate macrophages to become more cytotoxic. It is important that the magnitude of the immune response be in proportion to the seriousness of the attack (Sompayrac, 2003). As previously mentioned DCs migrate to lymph nodes only when activated by battle cytokines. In a serious infection, many cytokines are released and thus more DCs are activated. Before their migration to lymph nodes, activated DCs release chemokines, a chemical which triggers precursor cells (monocytes) to leave the blood stream and become their replacement as DCs in (Sompayrac, 2003). These new DCs are then able to be activated and make their way to the lymph node which amplifies the response to the invasion. The new recruits of DCs are like photojournalists, the antigenic peptide which they carry to the lymph node being a snapshot of the infection site (Sompayrac, 2003). This is useful so if there are changes in the area, the appropriate T cell can be activated and thus elicit the immune response most suitable. If the infection is mild, there will be fewer c ytokines produced, less DCs activated, fewer chemokines released, fewer replacements of DCs therefore the number of DCs that make their way to the lymph node will also be significantly less. Consequently the number of B and T cells that becomes activated in the lymph nodes relies greatly on the number of DCs present. As detailed above DCs play a role in the activation of macrophages. Macrophages are one of the early defences against invaders that initiate the cell mediated immune response (Schindler, 1991). Macrophages are very weak at presenting antigens as they only possess enough MHC molecules and co-stimulatory proteins when activated by battle cytokines e.g. IFN à ³ (DeFranco et al, 2007). Macrophages function in the re-stimulation of experienced T cells so they continue to partake in the fight against the pathogen (Male, 2004). They engulf pathogens that have invaded the tissues, process it using internal enzymes and present the peptides on MHC class II molecules. This continual display of antigens is recognised by Th cells which continue to complete their function. Next the activated macrophage releases cytokines are previously mention that act on the DC i.e. TNF à ±. Other cytokines released includes IL-1 and IL-8. IL-1 aids in the activation of B and T cells (Schindler, 1991). B cells are the third professional APC. At the start of an infection B cells are naà ¯ve so do not play a definitive role. However throughout the course of the infection B cells become activated. Some B-cells are specific to T-independent antigen so only require binding of its receptor (BCR) to a cognate antigen for activation (Sherwood 2009). Other B-cells are specific to T-dependent antigen so after processing the antigen and displaying it on MHC class II molecules, binding of a Th cell is required for their activation. The MHC class II complex interacts with the TCR on the CD4+ Th cell which recognise the specific antigen on the B cell. Next the helpers release a chemical known as interleukin triggering the activation of the B cell. Activated B cells go through rapid proliferation and differentiation into memory cells and antibody producing plasma cells (Sherwood, 2009). B cells have the advantage of presenting the antigen very quickly so makes the immune response more efficient. The development of two different pathways of antigen presentation i.e. via MHC class I and II molecules can be rationalised in that each ultimately helps to elicit the most appropriate immune response through stimulation of the T cell the population most effective in eliminating the pathogen in question. MHC class I APCs allows for the monitoring of all body cells through Tc cells whilst MHC class II APCs seek the help of Th cells and B cells which directs the immune response in a way that corresponds to the seriousness an infection. Through these functions, APCs ultimately helps to maintain health and life. Should Teens Be Allowed Internet Access? Should Teens Be Allowed Internet Access? The internet is a large market with practically everything available in it. It is a massive network of computers worldwide connected by cables and satellites. Most of the time, it is just referred to as The Net or the World Wide Web (www). The internet today is used for multiple tasks such as receiving email, communicating with people from all around the world, receive text, images, video and sound. It is a very helpful tool for getting any information needed. This is because it has people from all around the globe posting information onto the internet for the use of everybody who access the internet which is a public accessible feather for millions of people nationwide. (Young Media Australia 2008, What is the internet?) However, the internet nowadays is too widely used by tweens and is becoming an issue among our society. This is caused by different factors that may be dangerous to them. This study is to investigate whether it is advisable for tweens to be allowed internet access. We may wonder who exactly are tweens? To be exact, they are individuals who are no longer children anymore yet not a teenager. This means they would fall in the age group of between 11 13 years old. People are doubtful about giving them internet access because they may not be mature enough to differentiate what is good or bad and this may cause them to be susceptible to internet danger. Internet danger is generally caused by people who are not taught with moral ethics and try to inflict damage onto tweens. Advantages of the internet for tweens Offers a wide spectrum of information The internet is a virtual treasure chest full of valuable information. It has a huge amount of publications added everyday and is slowly evolving as one of the greatest source of information. Any form of information from A to Z can nowadays be so easily obtained just by a few clicks on the computer and tons of information show on the screen. Also, with the help of search engines on the internet, the work of hunting for information or data is minimized. Since the internet provides so much of information, it is a great source of reference for students who does research work or even just to look for information which cannot be obtained in school. Through the internet, forums can be accessed and through forums, people are able to trade information and share opinions with each other. (The Advantages Disadvantages Of The Internet n.d.) Communication with the world There are plenty of chat rooms that can be used on the internet such as Live Messenger, Yahoo Messenger, Skype and so on. These chat rooms allow worldwide communication to be possible. As long as computers are connected to the internet, anybody from any part of the world can communicate online. It is very convenient for family members who are apart to communicate with each other instantaneously without the need of using email or snail mail. (The Advantages Disadvantages Of The Internet n.d.) Saves times in completing tasks Before internet existed, there were many tasks that took a lot of time to complete. Now with the help of internet in the modern society, the time used to complete these tasks is reduced by an uncanny amount. One example would be students using the internet to communicate with teachers online. Students who are slacking in studies may have extra classes with teachers through communication programs. This greatly reduces students time needed to revise on their own and yet not fully comprehend the subject. Also, assignments done can be sent to teachers via the computer with the use of email. Educational games programs Games nowadays intrigue tweens and play a big role in their lives. Computer games are constantly being played by tweens from all around the world and the internet has a huge load of these games. Specifically, educational games are the games that have positive effect on tweens. These games can provide practice in problem solving and logic and also provide practice in use of fine motor and spatial skills. Furthermore, some of the educational games require two players or more so this allows parents to occasionally play together with the child and have some family bonding. These games being fun activities help to relieve stress and help keep the mind fresh. (Effects Of Video Game Playing On Children 2009) Risks disadvantages tweens might face However good the internet might appear to be and have many advantages upon tweens, the ugly side of internet should also be reviewed carefully to actually determine whether the internet is more harmful than helpful to tweens. Access to inappropriate content or information The internet being the treasure chest to all information, it also contains negative contents such as pornography and violence. Tweens who accidentally access to pornography may see images that would scar them for life and may potentially cause problems in their future life as these images may surface without warning. It is always internet pornography that is the first exposure to tweens of these sexual images and the images they see causes their brain to play mind tricks on them. This causes human intimacy to be planted into them as something twisted and perverted and this implantation is irreversible. Ultimately, this may lead to sexual deviancy and crime, which in turn affects their future relationships and marriages. (Children as Victims n.d.) Violence also can make a huge impact on tweens. Tweens who are exposed to violence would generally be more hot-tempered and are very likely to have antisocial behavior such as threatening aggression and assault. This is because they are brainwashed into the world of violence and cannot distinguish between fantasy and reality. They may think that violence is the only way to settle problems and that being violent shows charisma and looks macho-like. (Children And Media Violence 2009) Chance to come across internet predators An internet predator is usually an adult who exploits vulnerable children or tweens for sexual or abusive purposes, or also known as paedophiles. These people try to do these out of the norm things to satisfy their personal fetish. They would try to use the internet as a way of getting in contact with tweens and try to coax them to meet up. At this point, these tweens who are not under adult supervision may not be mature enough to think that this is potential danger and would simply just agree to meeting with this anonymous person. This would allow tweens to be vulnerable to these internet predators to carry out their dirty activities. In some reported cases, these paedophiles have raped and killed innocent children. (What are the risks involved with my child using the internet n.d.) Become victims of cyber bullying Cyber bullying is quite common nowadays in the virtual world. What exactly does cyber bullying mean? It basically is any form of harassment that occurs via the internet. Posting fake videos on web sites, leaving mean and evil emails towards somebody are forms of cyber bullying. Tweens who are cyber bullied would feel very depressed and overwhelmed as they do not know who these people are who cyber bully them. These helpless victims would usually suffer quietly and be mentally imbalanced because they usually dont tell an adult about this issue and just keep it to themselves. (What is Cyberbullying? n.d.) Be subjected to invasion of privacy, unsolicited advertising financial risks There are plenty of commercial websites on the internet that may invade privacy by requesting for personal information. Tweens may be encouraged to complete questionnaires and enter competitions that lead to the divulgence of personal information or incur unforeseen costs. Also, some sites have advertisements that encourage tweens to acquire products which are costly and unnecessary for them. (What are the risks involved with my child using the internet n.d.) Addiction to the internet It is very easy for tweens to get addicted to the internet because it is so interactive. With all the contents available on the internet, tweens would opt to sit in front of a computer all day and this would cause them not to have time to finish assignments or work and decrease the time for socializing with people in person. This usually also causes tweens to be less healthy as they would lack the exercise needed for their body. (What are the risks involved with my child using the internet n.d.) Conclusion To look at the whole argument in an unbiased way, a comparison has to be made between the advantages and disadvantages of the internet. It may appear that it is not advisable for tweens to be allowed internet access because of all the negative effects it may cause. However, from a survey carried out, majority of the people agree that tweens should be given internet access and that the advantages outweigh the disadvantages of the internet. These negative effects are avoidable and it basically comes down to the way tweens use the internet and how much they understand about the internet. These problems may be avoided if they are guided along the way by an adult because an adult is able to differentiate whats good and whats not on the internet and teach tweens how to avoid these sites on the internet. Most of the tweens who suffer from internet disadvantages are those who are ignorant and are not taught well on how to utilize internet as a powerful tool. (1615 words)
Friday, October 25, 2019
Organ Transplants in the UK Essay -- Healthcare
The need for organs in the UK is increasing by an outstanding rate, leaving up to 5000 people to die, while waiting for an organ to be donated, each year. Hospitals and their resources are exhausted. The number of donated organs is simply not enough to keep up with the increasing demand for healthy, transplantable organs. Scientists have in recent years come up with numerous advances in this area of science; however various issues have become apparent on the road to successful transplantation. Transplantation is the process of replacing a damaged or failing organ with a compatible functioning one. For years the only foreseeable solution were voluntary donors who allowed the use of their organs after they passed away or live donors who were prepared to donate cells, blood or transplantable organs such as kidneys. The main issue with organ transplantation is the lack of donors. Governments in the past have put forward the idea of compulsory donation. However some people argue that this is unethical and a person has the right to refuse. In some major religions the idea of harming the body after death is just simply not an option. Counter arguments claim that these issues are irrelevant as the number of lives saved would outweigh any negatives; they would be ââ¬Ësaving livesââ¬â¢. Transplants from human donors are relatively straightforward on the face of it however underneath the surface hides a tangle of ethical and moral concerns. What are the sources of organs used in transplantation? Should we pay for organs? Should someone who has already received one transplant, be allowed a second? Should alcoholics be given liver transplants? Yes, in the United Kingdom, organs are sourced from volunteers, however in recent years the issue of or... ...arch?ââ¬â¢ http://www.sciencemag.org/content/318/5858/1917.abstract, ââ¬ËInduced Pluripotent Stem Cell Lines Derived from Human Somatic Cellsââ¬â¢, November 2007 http://www.wellcome.ac.uk/About-us/Policy/Spotlight-issues/Human-Fertilisation-and-Embryology-Act/Stem-cell-basics/WTD040077.htm, ââ¬ËThe ethics of stem cellsââ¬â¢ http://www.stemcellresources.org/pdf/uw_ethics.pdf, ââ¬ËThe ethics of stem cellsââ¬â¢ http://stemcells-research.net/2011/07/09/stem-cells-ethics/, ââ¬Ëstem cell ethicsââ¬â¢ http://ndt.oxfordjournals.org/content/27/3/1246.full.pdf+html?sid=cc03e2a4-2c56-4dfa-9a45-2ac85b454869, ââ¬ËComparison between bortezomib and rituximab in the treatment of antibody-mediated renal allograft rejectionââ¬â¢ Journals/Books: Budiani-Saberi, Da; Delmonico, Fl, "Organ trafficking and transplant tourism: a commentary on the global realities.â⬠, American journal of transplantation, May 2008
Thursday, October 24, 2019
Health and social care unit 1 m1 criteria Essay
In health and social care, there are many legislations, policies and procedures you have to abide by in order to maintain a lawfully and safe run setting. After watching the clip of Holby City, I noticed a few legislations, policies and procedures, being followed and being breached. Policies and procedures in a hospital are put in place in order to promote the health and safety of individuals. When watching the clip, I had noticed that Archieââ¬â¢s step dad was not allowed to enter the operating room or take part in the operation. This is because if in the operating room anything would have happened to Archie, the step dad would have felt at fault. Also he could have felt like Archieââ¬â¢s life was in his hands and would have or could have made a quick reaction mistake, thinking he was doing something extra to help when in reality he could have made things worse. We also see medical staff wearing appropriate clothing to minimise risks of cross contamination. They were wearing, face masks, aprons and head covers. Personal Protective Equipment (PPE) When watching the Holby City clip, I noticed that all medical staff were clothed accordingly, when operating on the child (Archie) and whilst preparing medicines and following procedures for the child in their care. Face masks, aprons and head covers were worn, to stop spread of germs, bacteria, illnesses or diseases. PPE is put in place in order to reduce the risks of cross contamination. Security During the Holby City clip, I noticed that all staff were wearing ID badges and that all doors were security coded. In also had noticed that all the patients notes were handled with care and not just left on the side. There was always a member of the medical tam holding on to the notes so that they were not seen by anybody who did not need to have a glimpse of the notes. Legislations, laws, acts and regulations are put in place for all workplaces to abide by lawfully =. They are put into practice to protect all individuals. Control of Substances Hazardous to Health (COSHH) This regulation is put in place to ensure that any substances and chemicals are handled and disposed of correctly. In the Holby City clip, this regulation was breached. We see one of the nurseââ¬â¢s droop and mix up two different types of medications. The nurse did not act on the issue appropriately, which the later led to Archieââ¬â¢s death. The wrong medication was given to the patient, which meant that he was taking a lethal dose of the wrong medication. Medications should have been prepared in a medication dispensary, if the medication was prepared in the dispensary, the risks of the medicines being swapped would have been reduced. She wouldnââ¬â¢t have been as pressured as she was in the clients resting room and wouldnââ¬â¢t have acted in a pressured way. The nurse also didnââ¬â¢t report the incident that occurred. If she reported the incident, she and the other medical staff could have acted accordingly; the medication would have been disposed of appropriately and then prepared again with caution. Then they could have found a way of then reducing the risk of happening again. This was an act of omission that she had committed.
Wednesday, October 23, 2019
Management and Interpersonal Roles
In this article Mintzberg reviewed that managing through people bringing them one step closer to managerial action instead of information roles. The author used Hawthorneââ¬â¢s organizational experiments as their data gained which demonstrated in 1930s to describe the importance of interpersonal roles. His research focused on the managerial roles, which are interpersonal, informational and decisional roles towards management. This article is useful for my research topic, as Mintzberg stated that interpersonal roles dealt with leadership. The main limitation of the article is that the author more concerned about leading. However, Mintzberg indicated that most of the managers seemed to spend most of their time in interpersonal roles. This article will help me to form the base of my research essay. Lamond,D. 2003, ââ¬Å"Henry Mintzberg vs Henri Fayol: Of Lighthouses, Cubists and the Emperorââ¬â¢s New Clothes, The Journal of Applied Management and Entrepreneurship, vol 8, no. 4, pp. 5. In this article Liamond reviewed the management of Mintzberg as the nature of managerial work. Based on the author article, Mintzberg used structured observation techniques for his research. His article differentiates the management of Henri Mintzberg and Henri Fayol. This article is useful for my research topic, as Liamond explained how Mintzbergââ¬â¢s management works. The main limitation of this article is that the author used generalization as a description of his article. Thus, his article discusses the works of Mintzberg and Fayol theoretical understanding about managerial. This article will help me as additional information to my research. Mintzberg, H. 1975. The managerââ¬â¢s job: folklore and fact. Harvard Business Review, 53(4), pp. 49-61. In this article Mintzberg stated that there are 3 main roles in management, which are interpersonal roles, informational roles and decisional roles. Mintzberg studied and researched to maintain his point of view. His article focused on the managerââ¬â¢s job. This article is useful for my research topic by how Mintzberg separate those roles in detail. The limitation of this article is it doesnââ¬â¢t fully focus on my research topic, which are the interpersonal rules. However, he also gives us some important information about the various types of interpersonal roles. This article will help me to complete the base of my research topic.
Tuesday, October 22, 2019
Energy Resources essays
Energy Resources essays For this paper, I am going to explain different geological energy resources. Along with the different types of resources, you will learn about what they are made of and how they are used. One can divide the energy resources of the world into two divisions: Renewable and Non-renewable. Renewable resources include chemical and nuclear energy, while non-renewable resources are solar, hydro, wind, and geothermal. (See Table 1 in the Appendix to see the worlds usage.) Although working with a group was recommended for this research paper, I found out all the information by myself. Because the internet is often unreliable, all of my information is gathered from the Fremont Main Library. I checked out books four weeks before the paper was due and spent the first two weeks getting information and making notes of what I read. Moreover, as previously learned in high school, I used index cards to make note cards. With the note cards, I organized them by types of energy, so when writing, all the information I had would be in order. When the time came to write the paper, I found Microsoft Word easiest to use. Most of our energy comes from non-renewable resources. However, chemical and nuclear energy is being used faster than it can be replaced. Chemical energy consists of all the energy bound up in fossil fuels and biomass, and it supplies over 90% of the current US energy needs. Commonly used fossil fuels are oil, natural gas, and coal. Oil is made of a mixture of hydrocarbons, which consist of carbon and hydrogen atoms. It is found underground between folds of rock and in areas of rock that are porous and contain the oils within the rock itself. Nearly 45% of a typical barrel of oil is refined into gasoline. An additional 45% is transformed into other fuels such as propane, jet fuel, diesel fuel, home-heating oil, and heavy fuel oils for industries, ships, and electric power plants. The remaining 10% is used to make p...
Subscribe to:
Posts (Atom)