Wednesday, January 29, 2020

Plain Packaging on Cigarettes Essay Example for Free

Plain Packaging on Cigarettes Essay Tobacco laws have started as early as the 1970s (ACOSH, 2010). Government has implanted laws, such that of the Tobacco Act (1987), which goals are to discourage the smoking of tobacco, encouraging non-smokers; in particular young people to not start smoking, to limit the exposure of children and young people to the persuasion of smoking, to encourage and assists smokers to give up smoking, and finally the promotion of good well being and illness prevention. The tobacco act of 1897, had over the years since, been reformed, and it seems like there is no stopping now. To further reinforce its initial goal, recently the Australian government reformed this Tobacco Act. The Australian government had announced, the 25% increase in tobacco tax, plain packaging on tobacco products to be implemented in the near future of 2012, ban on tobacco advertisement on the internet, as well as major increase in funding for tobacco media campaigns (ACOSH, 2010). The implementation of plain packaging on tobacco products of the announcement fueled a major debate with very opposing views. Those against tobacco plain packaging bring up issues of illicit trading, trademark rights, and lack of evidence; that plain packaging would in fact reduce cigarette consumptions (PMI, 2010). On the contrary, anti-smoking groups and health advocates, such as World Health Organizations (WHO), Cancer Council Australia (CCA, 2010) fully supports the new reformation to the Tobacco Act. They argue that plain packing would make cigarettes less appealing, and eliminates any last straw of advertisements, which the tobacco companies have put in placed, to begin with, to promote consumption of their tobacco products. Firstly, Tobacco Companies argue that plain packaging implementation is an unintelligent move on the government. Tobacco companies propose that plain packaging would promote illicit trading. Philip Morris international (PMI), one of the leading international tobacco companies views are that they are opposing the legislation mandating plain packaging. PMI state that they support effective regulation of tobacco based on harm reduction (PMIMSA, 2010). However they feel that plain packaging is too extreme, and that the government has gone too far. PMI states that Plain packaging would be easier to be counterfeited, as the plain packaging are simple and are not designed uniquely. This illicit trading would cause a major loss in the government revenue, stating that the government would lose an estimated of $40. 5 billions of dollars annually (PMIMSA, 2010). With illicit trading the Tobacco Company also believed that it will spark a new problem; that the counterfeited tobacco products would be more harmful to smokers. Tobacco Company believes that with the counterfeit tobacco products, consumers are not guaranteed that their products are safe, because of poor quality, since it has been found that counterfeited products of tobacco contains â€Å"rat droppings, fiber glass†¦ and high levels of toxic chemicals. † (PMIMSA, 2010). Another large tobacco company, British American Tobacco Australia, along with the PMI, have tried to make aware that plain packaging would also cause harm to retailers of local business, stating that it would cause retailers great confusion and inconvenience (ARR, 2010). It would inconvenience retailers, because all packets would look the same, and thus taking them longer to make transactions with customers. Retailer is also made to believe that with more time spent on one transaction it would result security issues, as they would not be able to pay more attention to their shop (PMIMSA, 2010). As well as illicit trading and inconveniencing issues, Tobacco Companies do not approve the plain packaging because it violates trademark rights. With the removal of current packaging and the implementation of plain packaging, it breaches intellectual property rights (Casben, 2010). According to Canadian Health Minister David Dingwall, plain packaging would â€Å"violate trademarks and constitutional rights† (PMIMSA, 2010) Finally, tobacco companies say that there is no evidence which proves that plain packaging would in fact reduce smoking. Arguing that young adolescence first encounter with cigarettes, are in most case, a single cigarette already taken out of the pack and handed to them from their peers. Nonetheless, Government with the support of anti-smoking and health advocate believes that with the plain packaging implements taking place, it will reduce smoking and consequently allow smokers to have the opportunity to break the habit. Plain packaging of tobacco is like removing the force which drives young adolescence to take up smoking, as well as to remove any temptations and promotion to ex-smokers as well as active smokers (Freeman, Chapman, Rimmer, 2008) Advertisements main objectives are to promote the selling of their products to consumers. They are meant to appeal to many people by their use of puns, catchy phrases, and the messages that sends out â€Å"glamour†, causing it to be an object desire. The ban of advertisement on tobacco products in the media, billboards, and eventually the Point of Sale Advertising regulations under the Tobacco Control Act (1990), which prohibits tobacco advertising outside of shops or in view of public places, leaves the tobacco companies, the need to use smarter ways to sell their products. The package of cigarettes currently, does exactly this, it promotes smoking and â€Å"it’s the only mechanism remaining to make the link explicit between the package and the imagery created†¦Ã¢â‚¬  (CCS, 1993). Plain packaging, as explained by Fiona Sharkie (2010), the executive director of Quit, in the article, Big tobaccos coughing fit a big tick for plain packaging, would mean that â€Å"Cigarette packets will no longer feature a colorful, flashy mini-billboard, communicating images of desirability and glamour The brand name will be featured in a mandated size and font, alongside an enlarged graphic health warning,†¦Ã¢â‚¬  on either a white or brown colored background. Studies have shown (Freeman, Chapman, Rimmer, 2008), which provides evidence that plain packs would be perceived as dull and boring as well as cheap looking hence reducing the flair and appeal associated with smoking. The idea surrounding plain packaging, however seems to be unsuccessful to active smokers, a person stating in the article, Tobacco companies rally against plain packaging (2010), that I dont go into the shop and go, hmm, which one is going to look prettiest this week. I have a particular brand that I smoke and have smoked for quite a long time and will continue to smoke those. This reformation however, are not to target active smokers primarily, it is design to stop young children to be tempted to try because of the constant bombarding the desirable, colorful packages of cigarettes (Casben, 2010). Children even though are not seeing the advertisement in the media per se, encounters cigarettes packages everyday and everywhere. We have failed to remove the last promotion of cigarettes, which are unconsciously being fed to them constantly through packages. Further by removing the packaging, not only we would eradicate all forms of advertisements, it would also remove the visibility on the shelf to the population. The plain packaging would reinforce to ex-smokers that, the government are supporting their actions. Ex-smokers would no longer be reminded of their bad habits and will never be tempted to take on smoking once again. The plain packaging which would contain, large warning sign, would be seen in the eyes of young children, as harmful substances. This would decline their desire to try. These labels would only projects cigarettes as one thing; POISON. The tobacco company remains certain that plain packaging would not be efficient. They are fighting very hard in order to stop this Act from taking place. The negative attitude towards this reformations, speaks loudly and clearly, that they are afraid that the new reforms might in fact be effective. Government should, in my opinion, ensure that plain packaging, which is due to be implemented on 2012, be carried out. Tobacco has already shaped the society this far, and would continue to shape our society for the many years to come. It would remain as ongoing issue. Clearly the prohibition of this product would not be a smart option, and certainly not a solution to our problem. Thus, governments should continue to make changes to the Tobacco Act. Even though these laws may not be a 100% in its efficiency would provide a long term goal in reducing smoking amongst active smokers and keeping the younger generation from taking up smoking. Since there are some degree of correlation between plain packaging and reduction of cigarette consumption (Freeman, Chapman, Rimmer, 2008), plain packaging should be given an opportunity. It is at the very least; better to have tried, than turning a blind eye and saying that wont work therefore should not try. Reference http://www.abc.net.au/news/2010-04-29/tobacco-companies-rally-against-plain-packaging/414540

Monday, January 20, 2020

Free College Essays - Imagery, Metaphors, and Diction in Dulce et Decorum Est :: Dulce et Decorum Est Essays

Imagery, Metaphors, and Diction in Dulce et Decorum Est All exceptional poetry displays a good use of figurative language, imagery, and diction. Wilfred Owen's "Dulce et Decorum Est" is a powerful antiwar poem which takes place on a battlefield during World War I. Through dramatic use of imagery, metaphors, and diction, he clearly states his theme that war is terrible and horrific. The use of compelling figurative language helps to reveal the reality of war. In the first line, "Bent double, like old beggars under sacks,"(1) shows us that the troops are so tired that they can be compared to old beggars. Another great use of simile, "His hanging face, like a devil's sick of sin,"(20) suggests that his face is probably covered with blood which is the colour symbolizing the devil. A very powerful metaphor is the comparison of painful experiences of the troops to "[v]ile, incurable sores on innocent tongues."(24) This metaphor emphasizes that the troops will never forget these horrific experiences. As you can see, Owen has used figurative language so effectively that the reader gets drawn into the poem. The images drawn in this poem are so graphic that it could make readers feel sick. For example, in these lines: "If you could hear, at every jolt, the blood/ Come gargling from the froth-corrupted lungs/ Obscene as cancer, bitter as the cud,"(21-23) shows us that so many men were brutally killed during this war. Also, when the gas bomb was dropped, "[s]omeone still yelling out and stumbling/ [a]nd flound'ring like a man in fire or lime.../ [h]e plunges at me, guttering, choking, drowning."(11-12,16) These compelling lines indicate that men drowned helplessly in the toxic gasses. These graphic images are very disturbing but play a very effective role in the development of the poem. Another tool in developing the effectiveness of the poem is the excellent use of diction. The word "blood-shod" explains how the troops have been on their feet for days without rest. Also, words like "guttering", "choking", and "drowning" shows us that the troops are suffering in extreme pain and misery. If you haven't noticed, most of these words are examples of cacophony, which are words with harsh and discordant sounds. As this poem is about how harsh and terrible war is, Owen's use of cacophony is very effective in generating the tone of the poem. Is it really that sweet to die for one's country?

Sunday, January 12, 2020

Difference between poems Essay

Both poems are a response to other people’s idea of the poet’s cultural identities. The poems are written as though the poet is replying to some one directly. ‘Half-Cast’ is about a multi cultural person who is standing up against racism and against people look down upon them because of their ethnicity. John Agard is arguing with the person who is being racist to him by questioning if ‘Half-Cast’ means he is half a man. ‘Still I rise’ is about a woman, Maya Angelou who has had a traumatic personal and cultural history but still she rises above it. She has had to face racial and sexual prejudice, but she still stands strong. In ‘Half-Cast’ John Agard opens the poem with a polite but angry request. This opening is only an angry one because of the following lines. ‘Excuse me; standing on one leg, I am half-cast’ This sarcasm is showing that he is trying to be nice but is annoyed about it. The first line is very polite but immediately after the poet is acquiring the ‘reader’ of suggesting he is half a man by using the words ‘half-caste’. He uses informal language throughout the poem, the language is also written in john Agard’s dialect. It makes you say the words how it sounds. This could be the poet celebrating his culture. ‘Explain yuself, Wha yu mean’ This also makes you as the reader feel the anger, annoyance and sadness through the Agards tone. The structure of the poem is simple but effective by using a three line opening two quite large stanzas then closes with three lines. One poetic technique he uses in each stanza is repetition of his points. ‘Explain yuself, Wha yu mean’ This is repeated also so that Agard could give his reasons for being insulted and emphasises his argument. In each stanza he uses comparisons; ‘When yu say half-caste, Yu mean Tchaikovsky, Sit down at dah piano, an mix a black key Wid a white key, Is a half-caste symphony’. This is questioning it Tchaikovsky’s music should be seen as inferior because he mixed black and white notes. The poem is well structured and the language is perfectly composed. I have keep using this quote as it very strong and uses a lot of poetic techniques. ‘Explain yu self, Wha yu mean’. The comparisons are very good because you can understand and relate to his point as he compares his situation using metaphors. ‘Still I rise’, it is set out in 8 stanzas, and in which 7 out of 8 are all the same lengths except the eighth as it is the last stanza and is the climax of the poem. The language she uses is mostly formal but it very up beat. ‘You may kill me’, but she is not bothered. In some stanzas it seems as she is mocking the person/people who are putting her down; like they are pathetic. ‘Does my sexiness upset you’ the word ‘sexiness’ in this context does not only imply that she is beautiful and believes that she is, but that she feels proud of her culture, which makes her confident. Maya uses many techniques in her writing such as through out the poem she uses rhetorical questions. ‘Did you want to see me broken? ‘ These questions force the reader to think and imagine about there own views on racism and what it would be like to be in her shoes. She also uses personification; ‘You may kill me with your hatefulness’. This is effective because ‘kill me’ is a very strong phrase and keeps creating the image of her arriving back at her town after the sager. Throughout the poem she has used a rhyming pattern of every first and last lines this is successful as it builds a flowing structure to the poem. The poet uses repetition to emphasise her point ‘Out of the hut of history’s shame I rise Up from a†¦. I rise’. This shows that once again she has risen above it. ‘History’s shame’ this is a direct reference to the struggles faced by her ancestors in her cultural history. I think that Maya’s technique clearly puts her point across and the last stanza finishes the poem with a strong phrase of ‘I rise, I rise, I rise, I rise’ presenting that life is hard but what ever it throws at you, you shall rise above it. In each of the poems Maya Angelou and John Agard use repetition which emphasises their subliminal messages in the poem. John Agard gets quite defensive and angry, whereas Maya Angelou although angry and annoyed she stays calms and ‘rises’ above it. I think the message of the two poems is that even when we are faced with prejudice and discrimination we can be the better people by not complying with it. I also believe the most effective techniques used to present their opinions of their cultures and peoples perception of them were repetition, similes and rhetorical questions; this created the tense moments that draw the reader in to go on and finish the poem.

Saturday, January 4, 2020

Computing Abstraction Information - Free Essay Example

Sample details Pages: 12 Words: 3538 Downloads: 6 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Discuss computing as a discipline and the role of abstraction in advances made in computing Computing has been defined in various ways, including the body of knowledge that surrounds computers and computation used by the Computing Sciences Accreditation Board (Denning et al 1989), and any goal-oriented activity requiring, benefiting from, or creating computers (Shackelford et al 2006). According to the Joint Task Force for Computing Curriculas definition therefore, computing encompasses design and implementation of hardware and software systems for a wide range of purposes; processing, structuring, and managing various kinds of information; doing scientific studies using computers; making computer systems behave intelligently; creating and using communications and entertainment media; finding and gathering information relevant to any particular purpose, and so on. Don’t waste time! Our writers will create an original "Computing Abstraction Information" essay for you Create order By its nature, computing draws knowledge and skills from the fields of engineering, mathematics and science, from which the discipline itself is rooted. Abstraction is a mental model which removes complex details, and leaves only the information necessary to accomplish the goal (Dale Lewis, 2006). The concept is widely used in Electrical Engineering circuit analysis as Thevenin and Nortons theorems for representing complex circuits as equivalent simple circuits. Abstraction has also been key in the development of computing as it allowed innovations within individual layers of computing systems to be researched and developed independently of each other, e.g. the developments in Operating Systems designs and User Applications were all happening independent from advances in processor construction. Discuss Unicode standards. The Unicode standard is a universal means of character encoding, developed by the Unicode Consortium, that is used to represent every character in every language (Wikipedia). The Unicode character set 16 bits per character, enabling it to represent over 65,000 characters (Dale Lewis, 2006); a lot more than the ASCII sets 256 characters, which were incorporated as a subset of the Unicode character set. Each character is represented by a hexadecimal code, and the characters are classified under their source, e.g. ASCII/Latin, Thai, Greek, Chinese, etc. The versatility of the standard has made it widely popular, and is used in many programming languages and computer systems. Not all of the available codes in the standard have been assigned to characters, and although more than 30 writing systems are currently included, more are constantly being added. The standard was first published in 1991, and has also been in constant revision since then; version 5.1 is expected during March 2008. Who first thought about the idea of using the binary number system to be able to create electronic devices that can present numbers and do calculations? The binary number system as we know and use in computing today, was first used in the early 20th century on early non-mechanical computers. The word bit, short for binary digit was coined by John Wilder Tukey, an American statistician and early computer scientist, who was working on an early computer project with John von Neumann in 1946(tefan Porubsk 2007). However, George Stibitz of the Bell Telephone Laboratories (Bell Labs), New York City, had build a demonstration 1-bit binary adder using relays in 1937. Although it was just a demonstration machine, it was still the first binary computer (Stephen White 1996). Write the decimal number 127 as a Hexadecimal, an Octal and as a Binary number. According to the Free Dictionary, the Hexadecimal Number System is a positional system of numeration that uses hexadecimal digits and a radix of sixteen. To convert the decimal 127 to hexadecimal, we shall employ the recursion method. Division Quotient Remainder Hex Number 127/16 7 15 F 7/16 0 7 7F So the hexadecimal equivalent is 7F The Octal Number System is a positional system of numeration that uses octal digits and a radix of eight. To convert the decimal 127 to octal, we shall employ the recursion method. Division Quotient Remainder Octal Number 127/8 15 7 7 15/8 1 7 77 1/8 0 1 177 So the octal equivalent is 177 The Binary Number System is defined as a positional system of numeration that uses binary digits and a radix of two To convert the decimal 127 to binary, we shall employ the recursion method. Division Quotient Remainder Binary Number 127/2 63 1 1 63/2 31 1 11 31/2 15 1 111 15/2 7 1 1111 7/2 3 1 11111 3/2 1 1 111111 1/2 0 1 1111111 So the binary equivalent is 1111111 What is the minimum number of bits is needed to represent marital status? Given that marital status can be one of the following options: married, divorced, widowed or never married. Explain your answer. In the inherent nature of the binary system, each bit can only have two states, such as zero or one, one or off, etc. Each bit can, therefore, only represent two things, i.e. with one being the one-state, and the other, the zero-state. In order to represent a more varied field, more bits would be required. In this case the marital status field contains has four possible states, namely married, divorced, widowed and never married. In general 2n bits represent n states (Dale), so in this case, 2n = 4 = 22. So 2 bits would be required to represent the marital status, and this would use one of the combinations of 00, 01, 10 or 11 to correspond to one of the possible states. Given a fixed-size number scheme where k in the formula for the tens compliment is 6 (see page 61), answer the following questions: a) How many positive integers can be represented? In the formula for tens complement, Negative (I) = 10k-I, k is the number of digits. For k=6, then the largest integer possible is 999,999. In a fixed size number system, half of the numbers represent negative integers, and in this case the positive integers would range from 1 to 499,999. Therefore, 499,999 positive integers can be represented. b) How many negative integers can be represented? The negative integers are represented by integers 500,000 till 999,999. Thus giving (999,999-500,000)+1=500,000 negative integers represented. c) Draw the number line showing the three smallest and largest positive numbers, the three smallest and largest negative numbers and zero. Show the behaviour of the following circuit with a truth table Inputs Gate 1 Gate 2 Gate 3 Gate 4 Gate 5 A B C (AB) (BC) C (AB+C) (AB+C)+(BC) Output 0 0 0 0 1 1 0 1 1 0 0 1 0 1 0 1 1 1 0 1 0 0 1 1 0 1 1 0 1 1 0 0 0 1 1 1 1 0 0 0 1 1 0 1 1 1 0 1 0 1 0 1 1 1 1 1 0 1 1 1 0 1 1 1 1 1 1 0 0 0 0 0 Draw a circuit corresponding to the following Boolean expression: AB + (B + C) a) Calculate the capacity of a hard disk with 3736 Cylinders, 128 Heads and 63 Sectors with 512 bytes per sector. Give the answer in gigabytes (GB) and in gibibytes (GiB). We shall use the equation: Disk Size in Bytes = No. of Cylinders * No. of Heads * No. of Sectors * Bytes per sector = 3736 * 128 * 63 * 512 = 15696221184 Bytes According to the decimal definition of Gigabyte, 1 Gigabyte= 109 Bytes Therefore, the disk size in Gigabytes is = 15696221184/109 = 15.696 GB Since, 1 Gibibyte= 230 Bytes = 1,073,741,824 Bytes Then the disk size in Gibibytes is, = 15696221184/ 230 = 14.618 GiB b) Why do you think that the practical use of binary prefixes remain mostly ignored by marketing literature. According to James Wiebe, hard drive manufacturers have historically used decimal computations to determine disk size (Wiebe 2003). This gave them numbers to describe capacity which were direct and easily understandable by their clients. Marketing literature have a much greater impact and sales appeal to an audience when advertising a disk as having a capacity of 120GB, as opposed to 115.039GB. A less complicated number is also more comfortable for the general public to deal with, than mathematical jargon. c) The following image is how windows reports the disk usage of a hard disk with a capacity reported to be 50GB by its manufacturer. Explain why it does not seem to add up. The discrepancy in the sizes of the disk reported by the manufacturer, and the Windows operating system is due to the dissimilar computations used to obtain the decimal representation of the disk capacity. Disk manufacturers use decimal or Base10 arithmetic to perform the computation, while Operating system vendors use binary, or Base2 arithmetic. The decimal GB is (1000x1000x1000) Bytes, while the binary GB is (1024x1024x1024) Bytes (Wiebe 2003). Therefore the binary size of this disk is: 52,428,795,904/(10243) =48.8281 =48.8 GB a) Write a pseudo code algorithm to get three positive integers from a user and print them in numerical order. Print Please enter three positive integers separately Set List 1 to 0 Set List 2 to 0 Set List 3 to 0 Read num1 Read num2 Read num3 If (num1num2) (num1num2) Set Li to num1 If (num2num3) Set List2 to num2 Set List3 to num3 else Set List2 to num3 Set List3 to num2 ElseIf (num2num1) (num2num3) Set Li to num2 If (num1num3) Set List2 to num1 Set List3 to num3 else Set List2 to num3 Set List3 to num1 Else Set Li to num3 If (num1num2) Set List2 to num1 Set List3 to num2 else Set List2 to num2 Set List3 to num1 Print The numerical order of the numbers is: Print Li+ +List2+ +List3 b) Enclose the algorithm within a loop that repeat until the user enters the first value of the trio as negative. When the user enters a negative value for the first value the program must not require the second and third values to be entered. Print This program will sort 3 positive integers. To end, please enter a negative value for the first entry Print Please enter three positive integers separately Set num1 to zero While (num1=0) Set List 1 to 0 Set List 2 to 0 Set List 3 to 0 Read num1 If (num10) break Read num2 Read num3 If (num1num2) (num1num2) Set Li to num1 If (num2num3) Set List2 to num2 Set List3 to num3 else Set List2 to num3 Set List3 to num2 ElseIf (num2num1) (num2num3) Set Li to num2 If (num1num3) Set List2 to num1 Set List3 to num3 else Set List2 to num3 Set List3 to num1 Else Set Li to num3 If (num1num2) Set List2 to num1 Set List3 to num2 else Set List2 to num2 Set List3 to num1 Print The numerical order of the numbers is: Print Li+ +List2+ +List3 Print Thank you for using the program c) List the identifiers in the algorithm in b) and tell whether they named data or actions. The algorithm uses the following variables: num1:data, integer num2:data, integer num3:data, integer List 1:data, integer List2:data, integer List3:data, integer Print:action output data to display Set:action store value into the variable If ElseIf Elseaction perform the indented statements depending on the whether the condition is true or false. While:action repeat the indented statements if the condition is true d) Verify the algorithm in b) using a walk-through. num1 num2 num3 Li List2 List3 At the beginning 0 ? ? 0 0 0 After first entry 4 ? ? 0 0 0 After second entry 4 7 ? 0 0 0 After third entry 4 7 5 0 0 0 After If statement 4 7 5 4 5 7 On second iteration -1 0 0 0 a) Use Pep/7 assembly language instructions to write a program to add the decimal values 7 and 19 and store the result in memory location 7D (Location is given in hexadecimal). BR Main num1:.WORD d#7 num2:.WORD d#19 Main:LOADA h#0000,i ADDA num1,d ADDA num2,d STOREA h#007D,d DECO h#007D,d STOP .END b) Write the above program in Pep/7 machine language using hexadecimal notation. 70 00 07 00 07 00 13 08 00 00 19 00 03 19 00 05 11 00 7D F1 00 7D 00 zz Distinguish between the four programming paradigms mentioned in Chapter 8 and discuss the benefits of using each of them as purported in the literature. Also give an example of a programming language that supports each of the paradigms and the URL of a vendor for each language. In their discussion of programming paradigms, Dale and Lewis (2006) introduce four programming paradigms namely: imperative, functional, logic programming, and object-oriented paradigms. As the name implies, the imperative programming paradigm is characterized by sequential instructions executed in an order governed by control structures to solve a task. The languages in this class allow the programmer to express algorithms as a hierarchy of tasks, and they tend to use a syntax that is similar to descriptions of everyday routines. One such language in this category is C++, which is available from Borland/CodeGear. Information on their product and tutorials and downloads can be obtained from https://www.codegear.com/products/cppbuilder. The functional programming paradigm is based on the mathematical theory of functions. Computations are crafted and expressed as function calls, with no need for variables or value assignments, making it quite simple. One of the popular languages in this paradigm is Lisp, which is available from Franz Inc. and more information on the product can be accessed their website at https://www.franz.com/. The third kind discussed by Dale and Lewis is the Logic programming paradigm, which is based, as the name suggests, on the principles of symbolic logic. It utilizes axioms, inference rules, and queries and program execution is by systematic search in a set of facts declared by one type, and another type making use of a set of inference rules. It is widely utilized in artificial intelligence, and PROLOG is a popular logic programming paradigm language. EZY Prolog is a PROLOG compiler which is available from EZY-Software at: https://www.ezy-software.com/ezyprolog/Prolog_Inference_Engine/ezy_prolog_overview.htm. In the object-oriented programming paradigm the data and operations are encapsulated in objects, which interact with each other. Programmers are able to express their algorithms using a hierarchy of objects. Smalltalk is a popular object-oriented programming language available from Cincom in their VisualWorks product, whose website is https://www.cincomsmalltalk.com/userblogs/cincom/blogView. What exchange will be made next? The Selection Sort algorithm works by progressively working through the array from the first or last index, and exchanging the positions of the current element and the next matching element in the unsorted section of the array. The sorting procedure may be by numerical or alphabetical precedence in ascending or descending order. In the given example, the sorting algorithm is performing a numerical sorting procedure in descending order from right to left. The next position to be processed is that occupied by element 10, and it shall be exchanged with element 14, which is the highest numerical element in the unsorted subsection. Compare Bubble Sort and Quicksort by giving an example of a scenario where each of these algorithms would outperform the other. Bubblesort and Quicksort are simple sorting algorithms that are classified under exchange sorts, as they sort data by systematically exchanging the positions held by individual items in an array (Knuth 1997). Bubble sort works by progressively working from one end of the array, comparing the two adjacent items, switching them if so determined by the sort criteria, and then shifting the focus one step forward in the array to repeat the procedure on the next item in the array with the one from the prior sort. The operation continues until the end of the array has been reached, at which point the highest or lowest value shall have bubbled to the end of the array. The rest of the items in the array may have altered their positions in the array, but may not be in their sorted positions. Therefore, the procedure may have to be repeated a number of times, in order to get the second, third, and all other items into their correctly sorted positions. Due to its operation, the bubble sort is an inherently slow procedure, and a common method used to improve the performance, is to reverse the direction and invert the sort criteria when at the end of the array. Quicksort, on the other hand, works by progressively breaking down the data for sorting, first into two lists of greater-than and less-than around an element in array called a pivot, recursively sorting the sub lists, and then combing the two sorted sub lists to give the final sorted array. The Quicksort algorithm can be further enhanced when sorting really large lists of data, by recursively breaking down the sub lists into smaller ones using pivot elements in the sub lists. This would be handy when, for example, sorting names of participants attending a conference. The first pivot could be surnames starting with M, giving sub lists of A-L and M-Z. The A-L sub list could then itself be pivoted using F, and so on until a level is reached at which point simple sorting can be done. After which, the sub lists would be recombined to give the sorted list of data. Sorting such a large list of data using the Bubble sort would be extremely slow and impractical. However, the Bubble sort algorithm can be used as a simple confirmation algorithm to verify if the data list has been correctly sorted. If we setup the Bubble sort algorithm to keep count of any exchanges it performs, and we obtain a result of nil, then the list has been arranged correctly. Use examples to show when each of the three partition selection approaches mentioned in chapter 10 is optimal. Partition selection describes the decision process by which memory locations for new programs in variable length. Partitions are allocated. There are three general methods used in the allocation (Dale Lewis, 2006) namely: first fit, best fit and worst fit. The First fit method simply places the program into the first partition big enough to hold it. For example, in a system that uses fixed partition sizes determined at boot time, the system may divide the memory into partitions of size X, Y and Z, where Y is greater than X and Z is greater than Y. When a new program is started, and is determined to require a memory size larger than X but less than Y, then it is loaded into the first Y or Z size partition that is available. If a Z size partition is available ahead of any Y size partition, then it shall be allocated that partition. Best fit criteria works by allocating the program the smallest partition that it can fit in. In the above example, if the program is determined to require a size larger than X, but less than Z, then it shall be allocated an available Y size partition. The worst fit method allocates the program the largest partition that is big enough to hold it. In the above example, a Z size partition would be allocated. This method is impractical to use in fixed partition sizes, as it would be wasteful. In dynamic partitions, though, where partition sizes are constantly getting resized to fit programs, this allocation method leaves the largest partitions intact to accommodate other programs later on. The term virtual machine is used in three different contexts (Page 235, 328 and 343). Discuss the relation between the different definitions of a virtual machine. According to Dale and Lewis (2006), a virtual machine can be defined in three different contexts as: A hypothetical computer entity operating on a computer and running programs by interpreting Byte code. An implementation on a computer system where a user utilizes the computer resources as they would on their own computer, although in effect the resources are shared with other users in a similar environment on the same computer system. The illusion created by a timesharing system that each user has a dedicated machine. The first definition refers to an interaction between processes running on computer, for example The Java Virtual machine is a computer process running on a computer that provides a separate computer environment for the execution of Java bytecode. The second and third definitions are interconnected and are in the domain of computer system and its timesharing user environment. One is the virtual machine from the perspective of the user, who is primarily concerned with their own virtual computing environment created through the sharing of resources, e.g. a Linux terminal window. The other is as seen by the computer system itself, which is running a managerial process overseeing the administration of the timeshared resources for all the users on the system, e.g. IBMs VM/370 operating system (Creasy, 1981). Bibliography Bubble sort From Wikipedia, the free encyclopedia [Online] Available at:https://en.wikipedia.org/wiki/Bubble_sort Creasy R.J 1981. The Origin of the VM/370 Time-sharing System IBM Journal of Research and Development Volume 25 No. 5 Dale N. Lewis J. 2006. Computer Science Illuminated, Third Edition Sadbury, Massachusetts: Jones Bartlett Publishers Denning, P.J et al 1989 Computing as a DisciplineComputer Volume 22, Issue 2 Pages: 63 70 Donald Knuth. The Art of Computer Programming, Volume 3: Sorting and Searching, Second Edition. Addison-Wesley, 1997. ISBN 0-201-89685-0. Section 5.3.1: Minimum-Comparison Sorting, pp.180-197. James Wiebe 2003 When One Billion does not equal One Billion, or: Why your computers disk drive capacity doesnt appear to match the stated capacity White-paper on the controversy over drive capacities Quicksort From Wikipedia, the free encyclopedia [Online] Available at: https://en.wikipedia.org/wiki/Quicksort Shackelford R. et al 2006 Computing Curricula 2005: The Overview Report ACM SIGCSE Bulletin Volume 38, Issue 1 Schwartzman, S. (1994). The Words of Mathematics: an etymological dictionary of mathematical terms used in English. ISBN 0-88385-511-9. tefan Porubsk: Bit. Interactive Information Portal for Algorithmic Mathematics, Institute of Computer Science of the Czech Academy of Sciences, Prague, Czech Republic [Online] Available at: https://www.cs.cas.cz/portal/AlgoMath/ComputerScience/DataStructures/Bit.htm [Accessed on 24 February 2008] Unicode From Wikipedia, the free encyclopedia [Online] Available at: https://en.wikipedia.org/wiki/Unicode