Admin

Texas college student found dead on campus

Wednesday, April 18, 2012

Authorities have confirmed that a student at Texas State Technical College-Marshall was found dead in his on-campus room around 9am CDT yesterday.

Emergency personnel were notified and CPR was performed on the student, without success. Authorities state that foul play is not suspected. Campus police and local law enforcement are conducting a full investigation. A campus representative told media sources that the cause of death has not yet been determined.

Just last year, a student at the college died from gunshot wounds he’d sustained while attending an event at a community center located on the outskirts of the city. Shortly following that incident, the school initiated a short-term controlled access plan, restricting much of the traffic into and out of the campus.

The school is one of several campuses in the TSTC system. According to a press release on the campus’s web site, the student’s name had not been yet released. The school is reportedly offering counseling sessions to all students throughout the week. A phone call to a campus representative made shortly before 4:00pm CDT was not immediately returned.

Retrieved from “https://en.wikinews.org/w/index.php?title=Texas_college_student_found_dead_on_campus&oldid=2714868”
Posted by Admin

First face transplant performed on French woman

Thursday, December 1, 2005

Surgeons in France have performed a face transplant operation on a French woman who had lost her nose, lips and chin after being savaged by a dog. According to Iain Hutchison, an oral-facial surgeon at Barts and the London Hospital, the transplant is the first one to use skin from another person.

Doctors say the woman’s new face will be a “hybrid” between her donor’s face and her own face before the attack. In the five hour long operation, the donor’s tissues, muscles, arteries and veins were attached to the patient’s lower face. It is more favourable to use skin from another person’s face instead of skin from another part of the patient’s body, as the texture and colour of the skin are more likely to match.

A statement released by the hospital in Amiens said that the 38-year-old patient, who wishes to remain anonymous, has not been able to eat or speak properly since the attack in May this year. The woman was reportedly in “excellent general health” and her graft looked normal.

Ethical concerns, psychological impact, concerns relating to immunosuppression and consequences of technical failure have prevented teams from performing face transplant operations in the past, even though it has been technically possible to carry out such procedures for years.

Mr Hutchison warned of several problems with face transplants, such as blood vessels in the donated tissue clotting and immunosuppressants failing or increasing the patient’s risk of cancer. He also pointed out ethical issues with the fact that the procedure requires a “beating heart donor”. The transplant is carried out while the donor is brain dead, but still alive by use of a ventilator.

According to Stephen Wigmore, chair of British Transplantation Society’s ethics committee, it is unknown to what extent facial expressions will function in the long term. He said that it is not certain whether a patient could be left worse off in the case of a face transplant failing.

Mr Michael Earley, a member of the Royal College of Surgeon’s facial transplantation working party, commented that if successful, the transplant would be “a major breakthrough in facial reconstruction” and “a major step forward for the facially disfigured.”

Retrieved from “https://en.wikinews.org/w/index.php?title=First_face_transplant_performed_on_French_woman&oldid=717676”
Posted by Admin

U.S. Senate passes landmark health care reform bill

Thursday, December 24, 2009

The United States Senate has approved a hard-fought measure to overhaul the health care system. The vote will be followed by the difficult process of reconciling the Senate-passed bill with one approved by the House of Representatives, in order to get a final measure to President Barack Obama.

HAVE YOUR SAY
How do you feel about the bill’s passage? Do you think it will be effective or fail?
Add or view comments

“The yeas are 60, the nays are 39. H.R. 3590 as amended, the Patient Protection and Affordable Care Act is passed,” Vice President Joe Biden announced. Senator Jim Bunning of Kentucky did not show up for the vote leading to the 39 nays. Mike Reynard, a spokesman for Bunning, said in an e-mail that “The senator had family commitments.”

The vice president presided over the Senate at the time of the vote in his role as President of the United States Senate.

As expected, Republicans voted against the bill while all Democrats and two Independents, Joe Lieberman of Connecticut and Bernie Sanders of Vermont, voted for it.

At an estimated $87 billion, the measure would expand health insurance coverage to about 30 million more Americans currently without it, and create new private insurance marketplaces, or exchanges, to expand choice.

And, like the slightly more expensive measure passed by the House of Representatives, the Affordable Health Care for America Act, it would end a practice by private insurance companies of denying coverage to individuals with existing health problems.

Both the Senate and House measures would require nearly all Americans to purchase some form of insurance, while lower-income Americans would receive help from federal government subsidies.

This is a victory because we have affirmed that the ability to live a healthy life in our great country is a right and not merely a privilege for the select few.

In remarks before the vote, Senate Majority Leader Harry Reid, Democrat from Nevada, said opponents had done everything they could to prevent the vote from taking place.

Speaking to reporters, Reid and others hailed the vote as a victory and a major step toward providing millions more Americans with access to health care. “This is a victory because we have affirmed that the ability to live a healthy life in our great country is a right and not merely a privilege for the select few,” Reid said.

Reid and others including Robert Byrd, the 92-year-old Democrat from West Virginia, paid tribute to Senator Edward Kennedy, who died this past August after spending decades of his career in the Senate pursuing health care reform.

When casting his vote Byrd said, “Mr. President, this is for my friend Ted Kennedy. Aye.”

Victoria Reggie Kennedy, the widow of Senator Kennedy, watched the proceedings from the Senate visitor’s gallery, as did Representative John Dingell, Democrat from Michigan, who has been a long time advocate of health care reform and who sponsored and introduced the House version of the health care reform bill.

In the final hours of debate on the Senate bill, Republicans asserted it would be ineffective and add sharply to the U.S. budget deficit.

Mr. President, this is for my friend Ted Kennedy. Aye.

Senator Jeff Sessions, Republican from Alabama said of the bill, “This legislation may have a great vision, it may have a great idea about trying to make the system work better. But it does not. These are huge costs [and] it’s not financially sound.”

Senate Minority Leader Mitch McConnell vowed to defeat the bill when the Senate reconvenes in January saying, “This fight is not over. This fight is long from over. My colleagues and I will work to stop this bill from becoming law.”

Senator Olympia Snowe, a moderate Republican from Maine who helped approved the Senate Finance Committee’s version of health care reform, the America’s Healthy Future Act, earlier in the year and who remarked she may not vote on the final bill, said, “I was extremely disappointed,” noting that when the Democrats reached their needed 60 votes to overcome a filibuster, “there was zero opportunity to amend the bill or modify it, and Democrats had no incentive to reach across the aisle.”

Ahead are difficult negotiations with the House of Representatives to craft a final bill President Obama would sign into law. These talks, which will formally get under way early in the new year, will take place amid anger among many liberal House Democrats the Senate bill failed to contain a government-run public health insurance option.

This fight is not over. This fight is long from over. My colleagues and I will work to stop this bill from becoming law.

Members of the House Progressive Caucus have vowed to fight to keep this public option in any final legislation that emerges, along with other provisions they say are needed to protect lower and middle-income Americans and hold insurance companies accountable.

In a statement, the Democratic chairmen of three key House committees said while there are clear differences between House and Senate bills, both will bring fundamental health care coverage to millions who are currently uninsured.

Obama administration officials have been quoted as saying they anticipate negotiations on a final bill would not be complete until after the President’s State of the Union Address in January, and could slip even later into the new year.

If passed, this will be the most important piece of social policy since the Social Security Act in the 1930s, and the most important reform of our health care system since Medicare passed in the 1960s.

President Obama issued a statement to the press in the State Dining Room in the White House saying that the vote is “legislation that brings us toward the end of a nearly century-long struggle to reform America’s health care system.”

He also pointed out the bill’s strengths, noting, “The reform bill that passed the Senate this morning, like the House bill, includes the toughest measures ever taken to hold the insurance industry accountable. Insurance companies will no longer be able to deny you coverage on the basis of a preexisting condition. They will no longer be able to drop your coverage when you get sick. No longer will you have to pay unlimited amounts out of your own pocket for the treatments you need. And you’ll be able to appeal unfair decisions by insurance companies to an independent party.”

He also noted how historic the bill is, saying, “If passed, this will be the most important piece of social policy since the Social Security Act in the 1930s, and the most important reform of our health care system since Medicare passed in the 1960s.”

Obama noted the potential social impact, saying, “It’s the impact reform will have on Americans who no longer have to go without a checkup or prescriptions that they need because they can’t afford them; on families who no longer have to worry that a single illness will send them into financial ruin; and on businesses that will no longer face exorbitant insurance rates that hamper their competitiveness.”

Obama afterwards made phone calls to various Senators and other people, including Victoria Kennedy and David Turner of Little Rock, Arkansas. Mr. Turner had his health insurance rescinded in January of last year, after his insurance company went back into his record and alleged that he failed to disclose his full medical record at the time he applied for coverage. Turner was First Lady Michelle Obama’s guest during her husband’s speech to a joint session of Congress on health care reform back in September.

Retrieved from “https://en.wikinews.org/w/index.php?title=U.S._Senate_passes_landmark_health_care_reform_bill&oldid=4384266”
Posted by Admin

N10 006 Real Exam}

N10-006 Real Exam

by

Adila Masih

Question: 1

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?

A. Add a router and enable OSPF.

B. Add a layer 3 switch and create a VLAN.

C. Add a bridge between two switches.

D. Add a firewall and implement proper ACL.

Answer: B

Explanation:

We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs. A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even ifthey are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic.

To allow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a Layer 3 switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header inthe packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 2

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?

A. Layer 3 switch

B. Proxy server

C. Layer 2 switch

D. Smart hub

Answer: A

Explanation:

The question states that the traffic being transported is a mixture of multicast and unicast signals. There are three basic types of network transmissions: broadcasts, which are packets transmitted to every node on the network; unicasts, which are packets transmitted to just one node; and multicasts, which are packetstransmitted to a group of nodes. Multicast is a layer 3 feature of IPv4 & IPv6. Therefore, we would need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 3

Which of the following network devices use ACLs to prevent unauthorized access into company systems?

A. IDS

B. Firewall

C. Content filter

D. Load balancer

Answer: B

Explanation:

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. Firewalls use ACLs (access control lists) to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet passes through the firewall, which examines each message and blocks or allows the message depending on rules specified in the ACL. The rules in the ACL specify which combinations of source IP address, destination address in IP port numbers are allowed.

Question: 4

Which of the following is used to define how much bandwidth can be used by various protocols on the network?

A. Traffic shaping

B. High availability

C. Load balancing

D. Fault tolerance

Answer: A

Explanation:

If a network connection becomes saturated to the point where there is a significant level of contention, network latency can rise substantially. Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment, business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the ports used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher priority traffic has been sent.

Question: 5

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).

A. OSPF

B. VTP trunking

C. Virtual PBX

D. RADIUS

E. 802.1x

Answer: DE

Explanation: D: A RADIUS (Remote Authentication Dial-in User Service) server is a server with a database of user accountsand passwords used as a central authentication database for users requiring network access. RADIUS servers are commonly used by ISPs to authenticate their customers Internet connections. Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server.

E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network. 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device, such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server isthe RADIUS server.

Question: 6

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?

A. Multifactor authentication

B. ISAKMP

C. TACACS+

D. Network access control

Answer: C

Explanation:

TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol that handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a centralized authentication solution used to provide access to network resources. TACACS+ separates the authentication, authorization, and accounting services enabling you to host each service on a separate server if required.

Question: 7

A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?

A. Leases

B. Helper addresses

C. Scopes

D. Reservations

Answer: D

Explanation:

A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address of the network interface card that should receive the IP address.For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get

192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.

Question: 8

Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IPaddresses, to be able to access the Internet and internal company servers? (Select THREE).

A. Default gateway

B. Subnet mask

C. Reservations

D. TFTP server

E. Lease expiration time of 1 day

F. DNS servers

G. Bootp

Answer: ABF

Explanation:

The question states that the client computers need to access the Internet as well as internal company servers. To access the Internet, the client computers need to be configured with an IP address with a subnet mask (answer B) and the address of the router that connects the company network to the Internet. This is known as the default gateway (answer A).To be able to resolve web page URLs to web server IP addresses, the client computers need to be configured with the address of a DNS server (answer F).

Question: 9

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?

A. Configure NAT on the firewall

B. Implement a split horizon DNS

C. Place the server in the DMZ

D. Adjust the proper internal ACL

Answer: B

Explanation:

Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply different DNS query results depending on the source of the request. This can be done by hardware-based separation but is most commonly done in software. In this question, we want external users to be able to access the website by using a public IP address. To do this, we would have an external facing DNS server hosting a DNS zone for the website domain. For the internal users, we would have an internal facing DNS server hosting a DNS zone for the website domain. The externalDNS zone will resolve the website URL to an external public IP address. The internal DNS server will resolve the website URL to an internal private IP address.

Question: 10

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly?

A. Load balancer

B. FTP server

C. Firewall DMZ

D. Mail server

Answer: D

Explanation:

A mail exchanger record (MX record) is a DNS record used by email servers to determine the name of the email server responsible for accepting email for the recipients domain. For example a user sends an email to recipient@somedomain.com. The sending users email server will query the somedomain.com DNS zone for an MX record for the domain. The MX record will specify the hostname ofthe email server responsible for accepting email for the somedomain.com domain, for example, mailserver.somedomain.com. The sending email server will then perform a second DNS query to resolve mailserver.somedomain.com to an IP address. The sending mail server will then forward the email to the destination mail server.

Question: 11

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?

A. BGP

B. OSPF

C. IS-IS

D. MPLS

Answer: D

Explanation:

In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself.MPLS works by prefixing packets with an MPLS header, containing one or more labels. An MPLS router that performs routing based only on the label is called a label switch router (LSR) or transit router. This is a type of router located in the middle of a MPLS network. It is responsible for switching the labelsused to route packets. When an LSR receives a packet, it uses the label included in the packet header as an index to determine the next hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup table. The old label is then removed from the header and replaced with the new label before the packet is routed forward. A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as the entry and exit points for the network. LERs respectively, add an MPLS label onto an incoming packet and remove it offthe outgoing packet.When forwarding IP datagrams into the MPLS domain, an LER uses routing information to determine appropriate labels to be affixed, labels the packet accordingly, and then forwards the labelled packets into the MPLS domain. Likewise, upon receiving a labelled packet which is destined to exit the MPLS domain, the LER strips off the label and forwards the resulting IP packet using normal IP forwarding rules.

Question: 12

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch

B. Access point

C. Analog modem

D. DOCSIS modem

Answer: C

Explanation:

Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By todays standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps. An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computer to an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer. An analog modem uses an RJ-11 connector to connect to a phone line (POTS) in the same way a phone does.

Question: 13

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which ofthe following protocols was MOST likely used on this cable?

A. RS-232

B. 802.3

C. ATM

D. Token ring

Answer: A

Explanation:

A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines the functions ofthe 9 pins in a DB-9 connector. The RS-232 standard was around long before computers. Its rare to see a new computer nowadays with a serial port but they were commonly used for connecting external analog modems, keyboards and mice to computers.

Question: 14

Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?

A. 66 block

B. BNC

C. F-connector

D. RJ-11

Answer: B

Explanation: A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s. DS3 uses 75 ohm coaxial cable and BNC connectors.

Question: 15

An F-connector is used on which of the following types of cabling?

A. CAT3

B. Single mode fiber

C. CAT5

D. RG6

Answer: D

Explanation:

An F connector is a coaxial RF connector commonly used for terrestrial television, cable television and universally for satellite television and cable modems, usually with RG-6/U cable or, in older installations, withRG-59/U cable.

Question: 16

A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).

A. 1000Base-LR

B. 1000Base-SR

C. 1000Base-T

D. 10GBase-LR

E. 10GBase-SR

F. 10GBase-T

Answer: BE

Explanation:

1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiber with a distance capability between 220 meters and 550 meters. 10Gbase-SR is a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable and short wavelength signaling.

Question: 17

CORRECT TEXTSIMULATIONYou have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen. Step 1: Select the tool that was used to create the cable test results. Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the ‘Submit Cable Test Analysis’ button.

Answer: Here is the solution below

Explanation: A Cable Certifier provides Pass or Fail information in accordance with industry standards but can also show detailed information when a Fail occurs. This includes shorts, the wire pairs involved and the distance to the short. When a short is identified, at the full length of the cable it means the cable has not been crimped correctly.

Question: 18

A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?

A. Star

B. Bus

C. Ring

D. Mesh

Answer: C

Explanation:

Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a star topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before ittransmits to the next node. Therefore, although the cables are physically connected in a star, the data pathtakes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a token. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data before releasing the token. Only a computer in possession of the token can transmit data onto the network.

Question: 19

A network topology that utilizes a central device with point-to-point connections to all other devices is which ofthe following?

A. Star

B. Ring

C. Mesh

D. Bus

Answer: A

Explanation:

A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form a star network. The switch forms the central component of the star. All network devices connect to the switch. A network switch has a MAC address table which it populates with the MAC address of every device connected to the switch. When the switch receives data on one of its ports from a computer, it looks in the MAC address table todiscover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to.

Question: 20

Which of the following network topologies has a central, single point of failure?

A. Ring

B. Star

C. Hybrid

D. Mesh

Answer: B

Explanation: A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form a star network. The switch forms the central component of the star. All network devices connect to the switch. A network switch has a MAC address table which it populates with the MAC address of every device connected to the switch. When the switch receives data on one of its ports from a computer, it looks in the MAC address table todiscover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to. The switch that forms the central component of a star network is a single point of failure. If the switch fails, no computers will be able to communicate with each other.

Question: 21

Which of the following refers to a network that spans several buildings that are within walking distance of each other?

A. CAN

B. WAN

C. PAN

D. MAN

Answer: A

Explanation:

CAN stands for Campus Area Network or Corporate Area Network. Universities or colleges often implementCANs to link the buildings in a network. The range of CAN is 1KM to 5KM. If multiple buildings have the same domain and they are connected with a network, then it will be considered as a CAN.

Question: 22

Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?

A. PAN

B. LAN

C. WLAN

D. MAN

Answer: A

Explanation:

PAN stands for Personal Area Network. It is a network of devices in the area of a person typically within a range of 10 meters and commonly using a wireless technology such as Bluetooth or IR (Infra-Red).

Question: 23

Which of the following describes an

Test Information:Total Questions: 323Test Number: N10-006Vendor Name: COMPTIACert Name: COMPTIA NETWORK+Test Name: Http://www.certifyschool.com/product/n10-006/Official Site: http://www.examkill.co.ukFor More Details http://www.examkill.co.uk/N10-006.htmlGet20% Immediate Discount on Full Training MaterialDiscount Coupon Code: 3219R86596

Article Source:

eArticlesOnline.com}

Posted by Admin in Nutrition

Fuel leak prompts 17,000-vehicle recall by Toyota

Sunday, June 27, 2010

Toyota announced on Friday that it will recall around 17,000 Lexus vehicles in response to risks of the fuel tank in the cars leaking after a collision.

The Lexus HS 250h model was subjected to the recall following a US National Highway Traffic Safety Administration (NHTSA) investigation. Despite previously passing Toyota safety inspections, the conclusions of an NHTSA sub-contracted investigator were that; when the vehicles in question collided with an object at more than fifty-miles-per hour, more than 142 grams of fuel, the maximum allowed by US law, leaked from the crashed car.

According to Toyota, further tests did not show any additional failure of the fuel tank.

In response to the findings, Toyota issued a recall of all affected vehicles, since the company had no solution immediately available. The recall includes 13,000 cars already sold, as well as another 4,000 still at dealerships.

Toyota says it plans to conduct further tests to determine the cause of the leak. A Toyota spokesman, Brian Lyons, said that the company was “still working to determine what the root cause of the condition is.” It’s still unclear when exactly the recall will take place, or when dealerships will be allowed to sell this model again. Lyons said that Toyota is “working feverishly to get this resolved as soon as possible.”

Toyota isn’t aware of any accidents stemming from the leaking fuel tank in the affected vehicles, first introduced in the summer of 2009.

Retrieved from “https://en.wikinews.org/w/index.php?title=Fuel_leak_prompts_17,000-vehicle_recall_by_Toyota&oldid=4099641”
Posted by Admin

Iran’s morality police crack down on un-Islamic dress

Wednesday, April 25, 2007

The Iranian police forces have faced criticism from Ayatollah Hashemi Shahrudi, the head of the judiciary who was appointed by Grand Ayatollah Ali Khamenei, for their re-invigorated campaign to do away with un-Islamic dress.

Ayatollah Shahroudi proclaimed, “Tough measures on social problems will backfire and have counter-productive effects.” Others have, of course, made it clear that un-Islamic dress can lead to moral corruption, engender innumerable vices, and hurt the Islamic character of the nation.

Some believe that no one had any issue with the creation of an Islamic atmosphere. The core of the matter revolves around the implementation of the Islamic dress code; additionally, heavy-handed measures should be shunned. For instance, Mehdi Ahmadi, information head of Tehran’s police, told Al Jazeera: “Some citizens may complain about the way the law is being enforced but they all agree with the plan itself.”

According to one student, “You simply can’t tell people what to wear. They don’t understand that use of force only brings hatred towards them, not love.” Nevertheless, Hojatoll-Islam Mostafa Pour-Mohammadi, Iran’s interior minister who is in charge of policing, prognosticated positive feedback from the populace when he said, “People are unhappy with the social and moral status of the society. They expect that the fight against social insecurity be properly implemented.” Thus, Hujjat al-Islam Pour-Mohammadi re-iterated the necessity of proper implementation and methodology towards the restoration of morality in the Islamic Republic. Islamic officials and religious people affirm that this is indispensable to promote righteousness, curb sin, and bring open sinners to justice.

Following the Islamic Revolution in 1979, hijab became mandatory in Iran for every woman including foreigners after over 98% of citizens voted for an Islamic government. Women may face caning up to 74 strokes for failing to observe hijab. In this recent crackdown, the authorities have arrested many citizens throughout the country. Not only have women been taken into custody for their hair being uncovered on their foreheads and tight clothes that show body shapes, For men they need to cover from knee to their waist as according to Sharia. Even a foreign journalist was detained because the photograph on her press card was indecent.

It has not been clear whence the directive for the re-newed clampdown emanated. Some have blamed Mahmoud Ahmadinejad while Gholam Hossein Elham, the government spokesman, stated to reporters, “The police work as agents of the judiciary to confront crimes. The government as an executive body does not interfere in the affairs of the judiciary.” The following pre-election speech seems to corroborate this latter statement:

In reality, is the problem of our people the shape of the hair of our children? Let our children arrange their hair any way they wish. It doesn’t concern me and you. Let you and me overhaul the basic problems of the nation. The government should fix the economy of the nation and improve its atmosphere…[It should] better psychological security and support the people. People have variegated tastes. As if now the arch obstacle of our nation is the arrangement of our kids’ hair and the government disallowing them <He chuckles>. Is this the government’s responsibility? Is this the people’s merit? In actuality, this is the denigration of our people. Why do you underestimate and belittle the people? It is the real issue of our nation that one of our daughters donned a certain dress? Is this the issue of our nation and the problem of our nation?
Retrieved from “https://en.wikinews.org/w/index.php?title=Iran%27s_morality_police_crack_down_on_un-Islamic_dress&oldid=4558895”
Posted by Admin

U.S. Real Estate Forecast From A Supply &Amp; Demand Perspective

By Real Estate Advisor

On any given day, people can easily find articles and news stories describing an impending bust of the so-called real estate bubble. Despite this gloomy prediction, many experts believe that the recent slowdown in housing will be a gradual and modest readjustment rather than sharp bust or decline. These experts believe that factors that lead to a sharp decline in the real estate market are just not present in the current economic outlook. In fact, a recent study by the Joint Center for Housing Studies at Harvard University noted that ‘despite the current cool-down, the long-term outlook for housing is bright.’

The rise and fall of the real estate market is subject to the forces of supply and demand, and these factors point to stable and positive growth in the real estate segment.

SUPPLY FACTORS

Limited supply of real estate makes it scarce and usually pushes home prices up. In contrast, an oversupply of real estate tends to put downward pressure on home prices. Despite the current slow down in the real estate market, factors that impact limited supply favor continued growth in the real estate market. Some of these factors include:

1. Builders have readjusted growth plans in regions that have an oversupply of new housing. Over time, any excess inventory is likely to be depleted and equilibrium achieved between supply and demand.

2. The availability of land in certain regions, as well land use regulations and associated compliance costs will continue to restrict the supply of new homes.

[youtube]http://www.youtube.com/watch?v=w6IYgbVikgA[/youtube]

DEMAND FACTORS:

Housing located in regions with high demand tend to be more expensive than homes in regions with low demand. Factors that impact the demand for housing suggests a favorable long-term housing outlook. Some of these factors include:

1. No current evidence of significant and across-the-board job losses; forecasts of relatively low unemployment rates.

2. Long-term increased demand for second homes, vacation homes and senior housing by baby boomers.

3. Long-term increased demand for entry-level homes by the children of baby boomers.

4. Long-term increased demand for entry-level homes by immigrants.

5. Long-term increased demand for entry-level homes by second-generation Americans.

6. Forecasts that the outflows and inflows of the U.S. population in and out different regions will not significantly impact the overall U.S. real estate housing market.

7. Relative stability in interest rates.

8. Continued stability in long-term home appreciation rates.

9. Overall, rising rate of wealth across all age groups.

SUMMARY

In summary, strong household growth, overall rising incomes and wealth, and a stable economy all bode well for continued long-term growth in the real estate market. While the overall housing outlook is favorable, affordability will continue to be a challenge, as wages, especially in the lower income levels, have not kept up with housing costs.

About the Author: San Diego HomesMira Mesa HomesPacific Beach

Source: isnare.com

Permanent Link: isnare.com/?aid=113676&ca=Real+Estate

Posted by Admin in Property Development

International team of scientists reports on Antarctic lead pollution

Monday, August 4, 2014

Researchers from Australia, Denmark, Germany, Norway, United Kingdom, and the United States conducted lead concentration measurements of sixteen ice core samples, and found that industrial air pollution has persisted Antarctica since its arrival there in 1889 and remains significant in the current century. Their study was published in Scientific Reports on July 28, and covered in Nevada’s Review journal this Saturday.

Lead was chosen to trace the industrial pollution of atmosphere because of its low natural concentrations in ecosystems, as well as unique ‘fingerprints’ of different sources. Each lead ore deposit has its own distinct mixture of lead isotopes. Analysis of such characteristic isotopic signatures traced Broken Hill, Australia as the pioneering source of lead pollution in Antarctica, and even today its contribution remains significant. Coauthor Paul Vallelonga detailed, “Lead is a toxic heavy metal with strong potential to harm ecosystems […] While concentrations measured in Antarctic ice cores are very low, the records show that atmospheric concentrations and deposition rates increased approximately six-fold in the late 1880s, coincident with the start of mining at Broken Hill in southern Australia and smelting at nearby Port Pirie”. Lead author Joe McConnell noted, in Review journal, “A single industrial complex was enough to contaminate the entire continent of Antarctica thousands of kilometers away […] We’re still polluting Antarctica today”.

McConnell said in getting the cores he traveled to Antarctica “four or five” times. Each of the drilled samples is about 4 inches (10 cm) across and 100–500 feet (30–150 m) long. They were cut for storage in boxes, six three-foot sections per box weighing over 100 pounds (450 kg). A single ice core can be used by researchers in many experiments during the next several years.

Concentrations of lead on the Antarctic continent have declined after the 1990s, but remain around three times higher than before industrialization, despite banning of leaded petrol and similar emissions regulations. As McConnell said, “Our measurements indicate that approximately 660 tonnes [1.5 million pounds] of industrial lead have been deposited on the snow-covered surface of Antarctic during the past 130 years […] While recent contamination levels are lower, clearly detectable industrial contamination of the Antarctic continent persists today, so we still have a ways to go.”

Support for the study came from, amongst others, the U.S. National Science Foundation Division of Polar Programs, WAIS Divide Science Coordination Office, Ice Drilling and Design and Operations, the National Ice Core Laboratory, Raytheon Polar Services, and the 109th New York Air National Guard.

Retrieved from “https://en.wikinews.org/w/index.php?title=International_team_of_scientists_reports_on_Antarctic_lead_pollution&oldid=3789608”
Posted by Admin

Police warn new drone owners to obey law after disruption at UK’s Gatwick Airport

Friday, December 28, 2018

Police on Tuesday warned new owners of drones to obey the law after Gatwick Airport, the second-largest airport in Britain, faced days of closure on account of drone sightings. About 150,000 travellers have had their plans affected. Two suspects were arrested but later released without charge.

Airport authorities closed the facility’s single runway on December 19. The airport briefly reopened two days later, on Friday, but was shut down again after renewed drone activity. In total the airport, which serves London, was not able to operate normally for about 36 hours.

Over the three days, people reported seeing drones fly over the airport 67 times but, according to Sussex Police Detective Chief Superintendent Jason Tingley as of Monday, there was no video of any drone activity and “always a possibility that there may not have been any genuine drone activity in the first place”, though the police generally referred to the sightings as credible and were examining a downed drone found not far from the airport.

“Before anyone uses a drone it is vital that they make themselves aware of their responsibilities and the rules to make sure these devices are operated in a safe and responsible way” said Deputy Chief Constable Serena Kennedy, a national lead on drone policing. The law on drone misuse was tightened in July and presently provides for fines and up to five years in prison. She continued “Police officers will use all available powers to investigate reports of drones being misused and seek the appropriate penalty”.

Police officers will use all available powers to investigate reports of drones being misused and seek the appropriate penalty

The law prevents drone use above 400ft and within a kilometre of airports. UK rules planned for late next year mandate registration of any drone above 250g (about 9oz) and the taking of an online safety exam before piloting them.

Airport authorities grounded all planes in the airport, and diverted the planes meant to arrive at Gatwick to other airports in England or even other countries, such as London Heathrow, Luton, Birmingham, Amsterdam in the Netherlands, Manchester, Dublin in Ireland, Glasgow in Scotland, and Paris in France.

Gatwick Airport authorities instructed travellers to check how their flights had been affected before coming to the airport. The Civil Aviation Authority (CAA) has said since this is an “extraordinary circumstance”, travellers may not be owed money by the airline they were travelling with.

The British army was called in during the incident. Police said there was no reason to think the incident was terrorism, but was probably a deliberate attempt to disrupt the airport.

Couple Paul Gait and Elaine Kirk were arrested on Friday and named in several newspapers, before being cleared by police and released without charge. They said on Monday they feel “completely violated” by the incident and its press coverage. In light of a landmark legal ruling earlier this year, libel lawyer Mark Stephens of media law specialists Howard Kennedy said they were likely in line for a payout of £75,000 to £125,000 if they chose to take any publishers to court.

Hacked Off, a campaign group seeking media reform, was also critical of the media outlets that named the couple. Trevor Kavanagh, former politics editor at The Sun, defended that paper’s decision to release their names, on the basis press attention had hastened the police’s identification of a “cast-iron, watertight alibi” proving their innocence. TV personality Piers Morgan apologised for claiming Gait and Kirk were “terrorists”.

Planes can sustain significant damage from collisions with drones. The Guardian recently outlined a few possible ways to stop drones from entering restricted areas, such as blocking the radio signals. This was used in English prisons in an attempt to stop drugs from being smuggled in via drones. However, in an airport, this could also stop important signals getting through. Training eagles to take down drones has also been attempted by the Dutch police. Another possible method is firing nets at the drones.

According to The Guardian, most drones can fly for roughly half an hour. The drone sightings at Gatwick continued for hours. The Guardian speculated there might have been multiple drones involved or an operator changing out the battery packs to allow the drone or drones to relaunch quickly. However, the packs take time to recharge, so it would take a large number of packs and effort to operate drones for so long, constantly.

According to The Guardian, despite this short flying time, most drones’ range is mainly limited by signal strength. Some drones are able to fly up to five miles away from the controller. With a big enough budget, drone range is nearly unlimited.

Gatwick airport’s CEO said that he is sorry about the disruption, but must keep the travellers’ safety as the most important thing. He claimed he was working with the police and government to resolve this problem. He said the incident highlighted a weak area in British aviation and drones should not be able to do this much damage.

Prime Minister Theresa May said she “feels for all those passengers” affected. Britain’s transport secretary said that this was an “entirely new kind of threat”.

Gatwick Airport offered a £50,000 reward for information leading to an arrest and conviction in the ongoing investigation. Crimestoppers chair Lord Ashcroft added another £10,000 to the sum.

Drone incidents are increasing in the UK, with the CAA reporting for the year until December 4, 120 incursions of drones into airspace close to other aircraft. This represents a roughly 30% increase from the previous year. 2014, by contrast, had less than ten such occasions. According to Farming UK on Monday, in an incident earlier this year a Tornado jet belonging to the Royal Air Force came within 22m (about 70ft) of an agricultural drone whilst flying at low altitude at over 500mph. The drone was at a 100m (about 330ft) altitude and the incident came to CAA attention after being reported by the farmer.

Also reported earlier this month, in August a Boeing 737 approaching Stansted Airport, which also serves London, came within 15m (about 50ft) of hitting a drone at a 10,000ft altitude. Gatwick, meanwhile, is not the only English airport to face disruption over the Christmas travel period. On Sunday Birmingham Airport closed for two hours due to malfunctioning air traffic control equipment.

Retrieved from “https://en.wikinews.org/w/index.php?title=Police_warn_new_drone_owners_to_obey_law_after_disruption_at_UK%27s_Gatwick_Airport&oldid=4578503”
Posted by Admin

Definition And Historic Timeline Of Toaster Oven

By David H. Urmann

Toaster oven is an electrical appliance that works both as an oven and a toaster. It is a small appliance which can easily fit on a kitchen counter or table. The toaster oven has emerged as an integral part of every home in the modern times and has really evolved from being merely a bread toaster to a multi-purpose unit. Toaster ovens come in different kinds and sizes with many brands in the market producing them.

Body: Toaster ovens can be defined as ‘an electrical appliance that functions as both an oven and a toaster and is small enough to fit on a kitchen counter or table.’ Toasted bread is called toast and other toastable products can be described as toaster pastry.

The main function of the toaster is to toast the bread by heating it. The heat is usually produced by passing electricity through nichrome wires. The main aim of the toasting process is to reduce the water content in the bread, raising its temperature and charring its surface slightly.

But it was not always the electric toaster ovens that were used. Before the development of these electrical appliances, sliced bread was toasted by placing it in a metal frame and holding it over a fire or near to the fire by using a long-handled fork. The history of toasting bread over open fires goes back to at least 200 years and then people simply speared bread with a stick or a knife and held it over a fire.

History of Toaster Ovens:

[youtube]http://www.youtube.com/watch?v=CT5Ld2vjnPA[/youtube]

The concept of toaster ovens developed from the electric toasters which were developed in the mid-nineteenth century. The first electric bread toaster was created by Maddy Kennedy in 1872. Crompton, Stephen J. Cook & Company of the UK marketed an electric, iron-wired toasting appliance in 1893 but this did not get the expected response and therefore there is no significant information with the Toaster Museum too.

In 1905, an Irish man Connor Neeson (1877-1944) of Detroit and his employer William Hoskins (1862-1934) invented chromel, an alloy from which the first high-resistance wire were made. These wires are used in almost all early electric heating appliances. This alloy was patented in 1906 sometime before the filing of patent application for electric toaster.

George Schneider of the American Electrical Heater Company, Detroit was the first person to file a patent application for an electric toaster.

The General Electricals released an electric toaster in 1909 that was patented under the name D-12 but it had to face some opposition from the Pacific Electric Heating Company’s product Hotpoint which also catered to the same market segment.

The first toaster oven was invented in 1910 by a person called William Hadaway who built it for the Westinghouse Corporation which is still a leading producer of toaster ovens in the country. This was developed as a by-product of the electric stove.

Till this time, the bread had to be turned and roasted manually. But in 1919, the pop-up toaster was patented by Charles Strite. This type of electric toaster ejects the toast after toasting it.

In 1925, The Toastmaster Company started marketing a redesigned version of Charles Strite’s toaster. It was the first household toaster which could brown both sides of the bread simultaneously. It had a time setter and could eject the bread after it was done. By 1926, this newer version was a huge success among the masses and had become a household name.

Till a few decades back, only bread could be toasted but with the changes in technology, one can toast frozen bread and also operate multi-layers in the oven to toast either two or four slices as per the requirement.

Today toaster ovens have horizontal electrical filaments instead of the vertical ones like that of a pop-up toaster. It also has a reheating function which allows the toast to be reheated without burning it. The toaster oven now has a glass door which has to be opened to pull out the detachable tray. Given its design, a toaster oven can also perform some of the functions provided by a regular oven, just on a smaller scale.

Thus, toaster ovens have come a long way from being mere toasters. They have developed into multi-purpose utilities.

About the Author: For more information on Toaster-Ovens and Toaster Reviews please visit our website.

Source: isnare.com

Permanent Link: isnare.com/?aid=656311&ca=Home+Management

Posted by Admin in Online Gambling