instruction
stringlengths 5
2.56k
| response
stringlengths 65
13.7k
| score
int64 5
5
|
---|---|---|
There is a general historical trend.
In the olden days, memories were small, and so programs were perforce small. Also, compilers were not very smart, and many programs were written in assembler, so it was considered a good thing to be able to write a program using few instructions. Instruction pipelines were simple, and processors grabbed one instruction at a time to execute it. The machinery inside the processor was quite complex anyway; decoding instructions was not felt to be much of a burden.
In the 1970s, CPU and compiler designers realized that having such complex instructions was not so helpful after all. It was difficult to design processors in which those instructions were really efficient, and it was difficult to design compilers that really took advantage of these instructions. Chip area and compiler complexity was better spent on more generic pursuits such as more general-purpose registers. The Wikipedia article on RISC explains this in more detail.
MIPS is the ultimate RISC architecture, which is why it's taught so often.
The x86 family is a bit different. It was originally a CISC architecture meant for systems with very small memory (no room for large instructions), and has undergone many successive versions. Today's x86 instruction set is not only complicated because it's CISC, but because it's really a 8088 with a 80386 with a Pentium possibly with an x86_64 processor.
In today's world, RISC and CISC are no longer the black-and-white distinction they might have been once. Most CPU architectures have evolved to different shades of grey.
On the RISC side, some modern MIPS variants have added multiplication and division instructions, with a non-uniform encoding. ARM processors have become more complex: many of them have a 16-bit instruction set called Thumb in addition to the “original” 32-bit instructions, not to mention Jazelle to execute JVM instructions on the CPU. Modern ARM processors also have SIMD instructions for multimedia applications: some complex instructions do pay after all.
On the CISC side, all recent processors are to some extent RISC inside. They have microcode to define all these complex macro instructions. The sheer number of instructions in the x86 instruction set is not as important as it used to be.
In the end, it's not so much about RISC vs. CISC as it is about complexity vs. generality. | There is a general historical trend.
In the olden days, memories were small, and so programs were perforce small. Also, compilers were not very smart, and many programs were written in assembler, so it was considered a good thing to be able to write a program using few instructions. Instruction pipelines were simple, and processors grabbed one instruction at a time to execute it. The machinery inside the processor was quite complex anyway; decoding instructions was not felt to be much of a burden.
In the 1970s, CPU and compiler designers realized that having such complex instructions was not so helpful after all. It was difficult to design processors in which those instructions were really efficient, and it was difficult to design compilers that really took advantage of these instructions. Chip area and compiler complexity was better spent on more generic pursuits such as more general-purpose registers. The Wikipedia article on RISC explains this in more detail.
MIPS is the ultimate RISC architecture, which is why it's taught so often.
The x86 family is a bit different. It was originally a CISC architecture meant for systems with very small memory (no room for large instructions), and has undergone many successive versions. Today's x86 instruction set is not only complicated because it's CISC, but because it's really a 8088 with a 80386 with a Pentium possibly with an x86_64 processor.
In today's world, RISC and CISC are no longer the black-and-white distinction they might have been once. Most CPU architectures have evolved to different shades of grey.
On the RISC side, some modern MIPS variants have added multiplication and division instructions, with a non-uniform encoding. ARM processors have become more complex: many of them have a 16-bit instruction set called Thumb in addition to the “original” 32-bit instructions, not to mention Jazelle to execute JVM instructions on the CPU. Modern ARM processors also have SIMD instructions for multimedia applications: some complex instructions do pay after all.
On the CISC side, all recent processors are to some extent RISC inside. They have microcode to define all these complex macro instructions. The sheer complexity of the processor makes the design of each model take several years, even with a RISC design, what with the large number of components, with pipelining and predictive execution and whatnot.
So why do the fastest processors remain CISC outside? Part of it, in the case of the x86 (32-bit and 64-bit) family, is historical compatibility. But that's not the whole of it. In the early 2000s, Intel tried pushing the Itanium architecture. Itanium is an extreme case of complex instructions (not really CISC, though: its design has been dubbed EPIC). It even does away with the old-fashioned idea of executing instructions in sequence: all instructions are executed in parallel until the next barrier. One of the reasons Itanium didn't take is that nobody, whether at Intel or elsewhere, could write a decent compiler for it. Now a good old mostly-sequential processor like x86_64, that's something we understand. | 5 |
What is the new warning added in Git 2.27? | This is a new warning added in Git 2.27:
* "git pull" issues a warning message until the pull.rebase configuration variable is explicitly given, which some existing users may find annoying---those who prefer not to rebase need to set the variable to false to squelch the warning.
To remove the warning, set one of the suggested values to your preferred default behaviour for git pull if you don't specify behaviour on the command line (using --ff, --no-ff, --ff-only, --rebase). In all cases, git will attempt a fast-forward merge if possible. The settings control what happens when there are changes in your branch but not present in the remote branch.
```
git config pull.rebase false # merge (the default strategy)
```
This is the existing default behaviour; set this for no warning, and no change in behaviour; git will merge the remote branch into your local one.
```
git config pull.rebase true # rebase
```
Here, git will attempt to rebase your changes on top of the remote branch.
```
git config pull.ff only # fast-forward only
```
If a fast-forward merge is not possible, git will refuse to proceed.
> Refuse to merge and exit with a non-zero status unless the current HEAD is already up-to-date or the merge can be resolved as a fast-forward | 5 |
What is the English expression for a burdensome gift? | In fact, the English expression for a burdensome gift is literally white elephant:
> a thing that is useless and no longer needed, although it may have cost a lot of money [OALD]
So-called white elephants, or albino elephants, are found in many parts of South and Southeast Asia. In Buddhist countries they may be venerated as Queen Maya, mother of the Buddha, was said to have been visited in a dream by a white elephant holding a white lotus flower, and Siddharth Gautama entered his mother's womb in the form a white elephant. The white elephant is also associated with traits like mental strength and purity.
It became a royal symbol in Siam (Thailand); the king continues to keep white elephants. The story emerged that if a courtier displeased him, the king would make him a gift of a white elephant. The courtier could hardly decline a royal gift, and could hardly afford not to maintain a sacred animal, and could not put it to productive use, and so would be ruined by the cost of upkeep.
The earliest example of its use is from a 1721 essay in London Journal:
In short, Honour and Victory are generally no more than white Elephants; and for white Elephants the most destructive Wars have been often made.
A 2011 paper by Ross Bullen entitled “This Alarming Generosity”: White Elephants and the Logic of the Gift, in American Literature, covers the popularization of the term in the mid-19th century, presents an alternative account, that the story is a piece of orientalism and the white elephant rose as a literary trope. | 5 |
Because javascript in a browser is single threaded (except for webworkers which aren't involved here) and one thread of javascript execution runs to completion before another can run, your statement:
```while(flag==false) {}
```
will simply run forever (or until the browser complains about a non-responsive javascript loop), the page will appear to be hung and no other javascript will ever get a chance to run, thus the flag's value can never be changed.
For a little more explanation, Javascript is an event driven language. That means that it runs a piece of Javascript until it returns control back to the interpreter. Then, only when it returns back to the interpreter, Javascript gets the next event from the event queue and runs it.
All things like timers and network events run through the event queue. So, when a timer fires or a network request arrives, it does not ever "interrupt" the currently running Javascript. Instead, an event gets put in the Javascript event queue and then, when the currently running Javascript finishes, the next event is pulled from the event queue and it gets its turn to run.
So, when you do an infinite loop such as ```while(flag==false) {}```, the currently running Javascript never finishes and thus the next event is never pulled from the event queue and thus the value of ```flag``` never gets changed. They key here is that Javascript is not interrupt driven. When a timer fires, it does not interrupt the currently running Javascript, run some other Javascript and then let the currently running Javascript continue. It just gets put in the event queue waiting until the currently running Javascript is done to get its turn to run.
What you need to do is rethink how your code works and find a different way to trigger whatever code you want to run when the ```flag``` value changes. Javascript is designed as an event-driven language. So, what you need to do is figure out what events you can register an interest in so you can either listen for the event that might cause the flag to change and you can examine the flag on that event or you can trigger your own event from whatever code might change the flag or you can implement a callback function that whatever code changes that flag can call your callback whenever the piece of code responsible for changing the flag value would change it's value to ```true```, it just calls the callback function and thus your code gets a chance to run. | Because javascript in a browser is single threaded (except for webworkers which aren't involved here) and one thread of javascript execution runs to completion before another can run, your statement:
```while(flag==false) {}
```
will simply run forever (or until the browser complains about a non-responsive javascript loop), the page will appear to be hung and no other javascript will ever get a chance to run, thus the flag's value can never be changed.
For a little more explanation, Javascript is an event driven language. That means that it runs a piece of Javascript until it returns control back to the interpreter. Then, only when it returns back to the interpreter, Javascript gets the next event from the event queue and runs it.
All things like timers and network events run through the event queue. So, when a timer fires or a network request arrives, it does not ever "interrupt" the currently running Javascript. Instead, an event gets put in the Javascript event queue and then, when the currently running Javascript finishes, the next event is pulled from the event queue and it gets its turn to run.
So, when you do an infinite loop such as ```while(flag==false) {}```, the currently running Javascript never finishes and thus the next event is never pulled from the event queue and thus the value of ```flag``` never gets changed. They key here is that Javascript is not interrupt driven. When a timer fires, it does not interrupt the currently running Javascript, run some other Javascript and then let the currently running Javascript continue. It just gets put in the event queue waiting until the currently running Javascript is done to get its turn to run.
What you need to do is rethink how your code works and find a different way to trigger whatever code you want to run when the ```flag``` value changes. Javascript is designed as an event-driven language. So, what you need to do is figure out what events you can register an interest in so you can either listen for the event that might cause the flag to change and you can examine the flag on that event or you can trigger your own event from whatever code might change the flag or you can implement a callback function that whatever code changes that flag can call your callback whenever the piece of code responsible for changing the flag value would change it's value to ```true```, it just calls the callback function and thus your code that wants to run when the flag gets set to ```true``` will get to run at the right time. This is much, much more efficient than trying to use some sort of timer to constantly check the flag value.
```function codeThatMightChangeFlag(callback) {
// do a bunch of stuff
if (condition happens to change flag value) {
// call the callback to notify other code
callback();
}
}
``` | 5 |
There are many different yet simple ways to cook corn. Corn on the cob can be boiled, microwaved, grilled, steamed, or baked, while loose kernel corn is usually boiled, steamed, or microwaved. Keep reading to learn more about your preferred cooking method.
## Boiling corn on the cob[1]
x
research source
1. Boil a large stockpot of water. Meanwhile, prepare the corn cobs by removing the husks and silks. The exact amount of water you need will vary depending on how large each ear of corn is. Make sure that you use enough water to completely cover the ears of corn once they are submerged. Note that you can add up to 1 tsp (5 mL) salt to the water if desired, but it is not needed. To remove the husks, snap off the stem of the corn with your hands. Pull the stem over the length of the corn to peel off the husks still attached to it. Remove the remaining husks by peeling them off with your fingers. Rinse the husk-free corn cobs under running water. Rub your hands over the corn to loose and free as many of the silky threads you spot clinging to the corn.
2. Transfer the corn to the boiling water. Cover the pot and let it return to boiling. Use tongs to dunk the corn into the water. Avoid using your hands to transfer the corn since doing so may result in burns. If the boiling slows or stops after you place the corn in the stockpot, allow the water to reach a boiling point again before timing the cooking process.
3. Cook for 3 to 8 minutes. The corn should be "tender-crisp" when done. "Tender-crisp" means that the corn is soft enough to press, but not mushy. The precise amount of cooking time will vary based on the type of corn and how mature it is. Fresh corn and sweet corn usually cook fastest.
4. Remove and serve. Transfer the ears of corn to a layer of clean paper towels and let drain for 30 to 60 seconds before serving. The corn will be hot, so you may want to wait a few minutes before biting into it. Corn is usually served with a drizzle of melted butter, salt, and pepper.
## Microwaving corn on the cob[2]
x
research source
1. Remove the husks and silks from the corn cobs | There are many different yet simple ways to cook corn. Corn on the cob can be boiled, microwaved, grilled, steamed, or baked, while loose kernel corn is usually boiled, steamed, or microwaved. Keep reading to learn more about your preferred cooking method.
## Boiling corn on the cob[1]
x
research source
1. Boil a large stockpot of water. Meanwhile, prepare the corn cobs by removing the husks and silks. The exact amount of water you need will vary depending on how large each ear of corn is. Make sure that you use enough water to completely cover the ears of corn once they are submerged. Note that you can add up to 1 tsp (5 mL) salt to the water if desired, but it is not needed. To remove the husks, snap off the stem of the corn with your hands. Pull the stem over the length of the corn to peel off the husks still attached to it. Remove the remaining husks by peeling them off with your fingers. Rinse the husk-free corn cobs under running water. Rub your hands over the corn to loose and free as many of the silky threads you spot clinging to the corn.
2. Transfer the corn to the boiling water. Cover the pot and let it return to boiling. Use tongs to dunk the corn into the water. Avoid using your hands to transfer the corn since doing so may result in burns. If the boiling slows or stops after you place the corn in the stockpot, allow the water to reach a boiling point again before timing the cooking process.
3. Cook for 3 to 8 minutes. The corn should be "tender-crisp" when done. "Tender-crisp" means that the corn is soft enough to press, but not mushy. The precise amount of cooking time will vary based on the type of corn and how mature it is. Fresh corn and sweet corn usually cook fastest.
4. Remove and serve. Transfer the ears of corn to a layer of clean paper towels and let drain for 30 to 60 seconds before serving. The corn will be hot, so you may want to wait a few minutes before biting into it. Corn is usually served with a drizzle of butter.
## Microwaving corn on the cob[2]
x
research source
1. Place an ear of corn in a microwave-safe dish. You will need to cook the corn one ear at a time, but the instructions are the same for each ear. Do not remove the husk. The corn will cook better in the microwave if left in the husk during the cooking process.
2. Microwave the corn for 5 minutes. The microwave should be set on high power or full power. Let stand in the microwave for 1 to 2 minutes to avoid burning yourself with the steam.
3. Transfer the corn to a cutting board. Cut of the stem end using a sharp kitchen knife. Use oven mitts or a towel when removing the corn from the microwave. As you cut, you should also remove the first row of kernels. Make sure to cut through the husk completely.
4. Slip the corn out of its husk and serve. Use oven mitts or a towel to grab hold of the corn from the uncut top end. Gently shake the ear, allowing the corn to slip free. The ear of corn should slip out of the husk easily. Usually, even the silks will remain left behind inside the husks. You can serve the corn with butter and salt, or however you prefer it.
## Grilling corn on the cob
1. Preheat your grill to medium-high heat. Meanwhile, remove the husks and silks from your ears of corn. If using a gas grill, set all the burners to medium-high heat and allow the grill to preheat for 5 to 10 minutes. If using a charcoal grill, allow a thick layer of coals to burn until white ash begins to form over the surface. Husk the corn by snapping off the stem and pulling it over the length of the corn, thereby removing the husk attached to the stem. Peel away the rest of the husk with your fingers. Rinse the ears under running water to remove most of the loose silks.
2. Brush the corn with olive oil. Use a basting brush to apply a thin coat of olive oil to the surface of each ear of corn. Use no more than 1 Tbsp (15 mL) olive oil per ear. You could also use melted butter instead of olive oil.
3. Transfer the corn to the grill. Cook for 6 to 10 minutes. Turn the corn occasionally to ensure even cooking and prevent burning. The corn is done once the majority of the kernels begin to brown lightly. It will also be charred in some spots, especially near the smaller kernels.
4. Serve as desired. Remove the corn from the grill and transfer each ear to a serving platter. Let cool until you can handle it comfortably with your bare hands. Butter and salt are frequently served with corn, but if you used butter on the corn before grilling it, you may find that you do not need to add more.
## Steaming corn on the cob[3]
x
research source
1. Boil water in the bottom portion of a steamer. Husk and de-silk the ears of corn as you wait. If you do not have an actual steamer, you can use a large stockpot and perforated metal colander instead. Make sure that the metal colander can rest on the lip of the stockpot before attempting to use it, however. The basket portion of the colander should not dip below the halfway point of the stockpot. Snap off the stem of the corn and pull it over the length of the ear, removing the attached husk. Peel the rest of the husk away with your fingers. Rinse the corn under cool running water, scrubbing it gently with your hands. This should remove the majority of the silks.
2. Transfer the corn to the steaming basket. Cook for 8 to 12 minutes. Use tongs to transfer the corn into the steaming basket. Using your hands could result in burns. The exact cooking time will vary depending on how mature the corn is. Fresher corn cooks quicker than older corn. The corn is done once the kernels feel tender but not mushy.
3. Serve warm. Remove the corn from the steamer with your tongs and let rest for a minute or two before enjoying. Season with butter and salt, if desired.
## Baking corn on the cob[4]
x
research source
1. Preheat the oven to 425 degrees Fahrenheit (220 degrees Celsius). Remove the husks and silks from each ear of corn as the oven preheats. To remove the husk from an ear of corn, snap off the stem using your hands. Pull the broken stem down over the ear, stripping away any husk attached to it. Peel the rest of the exposed husk away with your fingers. Rinse each corn cob under running water, scrubbing gently with your hands to remove any visible silks. Pat dry with paper towels.
2. Season the ears with butter. You can also add a little salt and pepper, if desired. Use plenty of butter. Spread at least 1 to 2 Tbsp of melted butter over each ear.
3. Wrap each ear in aluminum foil. Each ear must be completely wrapped inside its own sheet of aluminum foil. If you are worried about butter leaking out from the aluminum foil, place a flat baking sheet or jelly-roll pan beneath the wrapped ears of corn to catch any dripping butter.
4. Bake the corn for 20 to 30 minutes. Most ears of corn will only take 20 minutes to cook, but larger ears may need as many as 30 minutes. Place the corn on the middle rack of your oven to ensure the most even cooking.
5. Remove and serve. Let the cooked ears of corn rest for 2 to 5 minutes before carefully removing the aluminum foil. Serve once they are cool enough to touch.
## Boiling corn kernels
1. Boil water in a medium saucepan. Meanwhile, measure out your frozen whole corn kernels. You can add up to 1 tsp (5 mL) of salt to the boiling water, if desired, but the salt is not necessary. The corn does not need to be thawed prior to use. You could also use canned corn kernels instead of frozen corn. Note that the amount of time needed to boil canned corn is significantly less than the amount of time needed to boil frozen corn. Additionally, canned corn should be drained before you add it to the boiling water.
2. Add the corn to the boiling water. If the boiling decreases or stops, let the water come up to a boil again. After it returns to a rolling boil, reduce the heat to medium-low.
3. Cover and cook. Frozen whole kernels of corn should simmer for 5 to 10 minutes. Drain once finished. Canned corn should only boil for 1 to 3 minutes. Once finished, the corn should be hot and tender but not mushy.
4. Serve as desired. Do not refreeze corn kernels after cooking them. If desired, you can mix the cooked corn kernels with butter, salt, and black pepper. You can also use other seasonings, like parsley, according to your own tastes.
## Steaming corn kernels
1. Simmer water in a steamer. Fill the lower part of a steamer with water and heat, on the stove, over medium heat until the water steams and starts to simmer. Do not boil the water. Do not fill the steamer high enough for water to slip up through the holes of the steamer basket. If you do not have a steamer, you could use a stockpot and a metal colander with fine holes. Make sure that the colander fits over the lip of the stockpot without falling in.
2. Add frozen corn kernels into the steamer basket. Spread the kernels out into a single layer. Canned corn kernels can also be used, but they will finish cooking in a much shorter amount of time. They may also be soggier once finished. You do not need to thaw frozen corn kernels before use.
3. Cook for 9 to 10 minutes. Allow the corn to steam for 9 to 10 minutes without covering it. Drain once finished. Canned kernels will only need to steam for 3 or 4 minutes.
4. Serve. Steamed corn can be served with butter and salt as well as other seasonings.
## Microwaving corn kernels
1. Place corn kernels in a microwave-safe dish. Spread frozen corn kernels into an even layer in the dish. Canned corn kernels can also be used, but there are some differences in the cooking method and length. Frozen corn does not need to be thawed prior to cooking.
2. Add 2 to 4 Tbsp (30 to 60 mL) of water. Stir the water into the corn to disperse it throughout. Note that this step is only needed if using frozen corn kernels. You do not need to add water if using canned corn, but you should not drain the canned corn before use.
3. Cover the dish with plastic wrap. Use a fork to poke a few holes into the plastic wrap, providing ventilation. Only use plastic wrap that is safe to use in the microwave. If the dish has a cover, you could use that instead of the plastic wrap. Make sure that the cover is placed on the dish loosely so that the corn is still ventilated.
4. Microwave for 4 to 5 minutes. If using canned corn, only microwave the dish for 1 to 2 minutes. The exact length of time varies depending on how much wattage your microwave has. A lower-powered microwave will need longer time, while a higher-powered microwave will need less time. If you hear popping sounds as the corn cooks, stop the microwave early.
5. Drain and serve. Drain the cooking liquid from the corn and season as desired with butter, salt, and pepper.
## Charcoal grilled corn on the cob
1. Cut the tip of each ear of corn off. Soak the corn in the husks in a sink or a big pot in 4 to 6 inches (10.2 to 15.2 cm) of tap water for about an hour.
2. While they're soaking, prepare your outdoor charcoal grill. Add enough coals for an hour of cooking.
3. Place the corn still in the husks on the grill. Cook for about an hour, turning occasionally, allowing the husks to char.
4. Remove the husks.
5. Add butter, salt and pepper to taste. Serve immediately.
| 5 |
I'm looking for a PhD advisor. How can an inexperienced advisor hurt my career? How can an experienced advisor hurt my career? | An inexperienced advisor can hurt your career by being relatively unknown. This means they may not have access to the same network and that their recommendation letters do not carry the same weight. Inexperience in supervision may, for example, lead to unrealistic expectations. Or an inexperienced advisor can be very good for your career, by quickly rising to fame with the awesome publications the two of you will write together and being fresh in everybody's memory when writing recommendation letters. They may spend plenty of time on working with you.
An experienced advisor can hurt your career by being never there. They may already have made their name, have extremely high expectations from PhD students, to the level of cause them to be overly stressed and quit. Or they may be very good for your career, as dedicated as can be to PhD students, prioritising them above most other duties, having realistic expectations from PhD students, and having great influence when writing recommendation letters.
Bottom line: an experienced advisor may be better for you than an inexperienced one, but that certainly does not have to be the case. And keep in mind: a very good/famous scientist is not always a very good PhD advisor. | 5 |
Sure thing! This iconic North American climb is a 1200 ft (364 m) multi-pitch alpine trad route with 18 pitches, rated as Grade III. It is a famous alpine rock route, not just in Washington, but nationally. First ascended by John Rupley & Don Gordon (1956) [Great Gendarme] and James Wickwire & Fred Stanley (1964), it's a must-do for alpine rock enthusiasts.
Route Overview:
From the Stuart Glacier notch, approximately 11 pitches of low/mid 5th class climbing lead to the Gendarme's base. Despite the enjoyable exposed climbing, the Gendarme features the most remarkable pitches. Two crux 5.9 pitches await, with the first being a steep dihedral offering good rests between challenging sections. Traverse to the offwidth, power through it, and tackle one more 5.8-5.9 pitch before the final three pitches of low 5th.
Equipment:
Gear preferences vary. Carry your usual equipment for long alpine rock routes. If you want extra security in the cruxy 5.9 offwidth, carry one 3.5" piece. You may need an ice axe and crampons if you approach via the glacier.
Getting there:
Drive I-90 to exit 85, turn left to join SR-970. Drive 6.6 mi and turn left on Teanaway River Road. Follow north fork road approximately 23 mil to the end of road.
Approach and Descends:
Multiple approach options exist, each with pros and cons. Either approach from the south via Longs Pass TH or from the north via Mountaineer Creek. Acquire a topographic map to determine the best route. If approaching from LPTH, head to Ingalls Lake, traverse ledges around the lake's east side, follow the trail to Stuart Pass, and descend northwest on talus. Ascend more talus to Goat Pass, traverse Stuart Glacier, and reach the 4th class gully leading to the North Ridge's prominent notch, marking the beginning of the Gendarme.
If approaching from Mountaineer Creek TH, head to Ingalls Lake, traverse ledges around the lake's east side, follow the trail to Stuart Pass, and descend northwest on talus. Ascend | Sure thing! This iconic North American climb is a 1200 ft (364 m) multi-pitch alpine trad route with 18 pitches, rated as Grade III. It is a famous alpine rock route, not just in Washington, but nationally. First ascended by John Rupley & Don Gordon (1956) [Great Gendarme] and James Wickwire & Fred Stanley (1964), it's a must-do for alpine rock enthusiasts.
Route Overview:
From the Stuart Glacier notch, approximately 11 pitches of low/mid 5th class climbing lead to the Gendarme's base. Despite the enjoyable exposed climbing, the Gendarme features the most remarkable pitches. Two crux 5.9 pitches await, with the first being a steep dihedral offering good rests between challenging sections. Traverse to the offwidth, power through it, and tackle one more 5.8-5.9 pitch before the final three pitches of low 5th.
Equipment:
Gear preferences vary. Carry your usual equipment for long alpine rock routes. If you want extra security in the cruxy 5.9 offwidth, carry one 3.5" piece. You may need an ice axe and crampons if you approach via the glacier.
Getting there:
Drive I-90 to exit 85, turn left to join SR-970. Drive 6.6 mi and turn left on Teanaway River Road. Follow north fork road approximately 23 mil to the end of road.
Approach and Descends:
Multiple approach options exist, each with pros and cons. Either approach from the south via Longs Pass TH or from the north via Mountaineer Creek. Acquire a topographic map to determine the best route. If approaching from LPTH, head to Ingalls Lake, traverse ledges around the lake's east side, follow the trail to Stuart Pass, and descend northwest on talus. Ascend more talus to Goat Pass, traverse Stuart Glacier, and reach the 4th class gully leading to the North Ridge's prominent notch, marking the beginning of the upper ridge. If descending via LPTH, head down from the summit towards the false summit via blocky terrain, follow cairns and a ledge system east, and descend the seemingly endless Cascadian Couloir, eventually reaching Ingalls Creek.
Scramble to the false summit. Descend steep snow or scree then keep right through sparse trees to enter the Cascadian Couloir. Descend all the way to the valley floor, and then you can go back to via Long’s peak or Ingalls Lake.
This route is incredible and a must-do for anyone at ease with alpine rock climbing at this level. Keep in mind, though, that it's quite challenging and requires serious commitment. Just make sure you're prepared and always stay safe! | 5 |
The proposed law co-sponsored by Clinton in 2005 prohibits flag burning under specific circumstances. It does not attempt to make flag burning illegal in general (i.e. outside of those specific circumstances). Clinton has voted against a proposed amendment to the Constitution that would allow Congress to ban flag burning in general.
In 2005, Clinton co-sponsored the Flag Protection Act of 2005, whose summary is as follows:
> Flag Protection Act of 2005 - Amends the federal criminal code to revise provisions regarding desecration of the flag to prohibit: (1) destroying or damaging a U.S. flag with the primary purpose and intent to incite or produce imminent violence or a breach of the peace; (2) intentionally threatening or intimidating any person, or group of persons, by burning a U.S. flag; or (3) stealing or knowingly converting the use of a U.S. flag belonging to the United States, or belonging to another person on U.S. lands, and intentionally destroying or damaging that flag.
It seems like a reaction to ongoing efforts to pass a constitutional amendment allowing Congress to ban flag burning, a move that the co-sponsors of the 2005 act oppose and voted against. Its text notes:
> the Bill of Rights is a guarantee of those freedoms and should not be amended in a manner that could be interpreted to restrict freedom, a course that is regularly resorted to by authoritarian governments which fear freedom and not by free and democratic nations
but suggests that flag burning with intent to incite violence is not protected by the Constitution (unlike flag burning as political expression, which is protected):
> destruction of the flag of the United States can be intended to incite a violent response rather than make a political statement and such conduct is outside the protections afforded by the first amendment to the Constitution.
Note that the distinction between
* banning flag burning for being offensive, and
* banning flag burning when it incites violence or disturbs the peace
is an important one. The Flag Protection Act proposed in 2005 was essentially a replacement for a previous Flag Protection Act of 1990, which was struck down by the Supreme Court in 1990 as unconstitutional. The 1990 act banned flag burning in general, while the 200 | The proposed law co-sponsored by Clinton in 2005 prohibits flag burning under specific circumstances. It does not attempt to make flag burning illegal in general (i.e. outside of those specific circumstances). Clinton has voted against a proposed amendment to the Constitution that would allow Congress to ban flag burning in general.
In 2005, Clinton co-sponsored the Flag Protection Act of 2005, whose summary is as follows:
> Flag Protection Act of 2005 - Amends the federal criminal code to revise provisions regarding desecration of the flag to prohibit: (1) destroying or damaging a U.S. flag with the primary purpose and intent to incite or produce imminent violence or a breach of the peace; (2) intentionally threatening or intimidating any person, or group of persons, by burning a U.S. flag; or (3) stealing or knowingly converting the use of a U.S. flag belonging to the United States, or belonging to another person on U.S. lands, and intentionally destroying or damaging that flag.
It seems like a reaction to ongoing efforts to pass a constitutional amendment allowing Congress to ban flag burning, a move that the co-sponsors of the 2005 act oppose and voted against. Its text notes:
> the Bill of Rights is a guarantee of those freedoms and should not be amended in a manner that could be interpreted to restrict freedom, a course that is regularly resorted to by authoritarian governments which fear freedom and not by free and democratic nations
but suggests that flag burning with intent to incite violence is not protected by the Constitution (unlike flag burning as political expression, which is protected):
> destruction of the flag of the United States can be intended to incite a violent response rather than make a political statement and such conduct is outside the protections afforded by the first amendment to the Constitution.
Note that the distinction between
* banning flag burning for being offensive, and
* banning flag burning when it incites violence or disturbs the peace
is an important one. The Flag Protection Act proposed in 2005 was essentially a replacement for a previous Flag Protection Act that banned flag burning in general:
> Whoever knowingly mutilates, defaces, physically defiles, burns, maintains on the floor or ground, or tramples upon any flag of the United States shall be fined under this title or imprisoned for not more than one year, or both.
but this was deemed unconstitutional in United States v. Eichman, 496 U.S. 310 in 1990, on the basis of their earlier (1989) decision in Texas v. Johnson, 491 U.S. 397. There, the Supreme Court noted that
> an important governmental interest in regulating nonspeech can justify incidental limitations on First Amendment freedoms when speech and nonspeech elements are combined in the same course of conduct
but that in the case under consideration, this did not apply:
> An interest in preventing breaches of the peace is not implicated on this record.
and further noted that
> Expression may not be prohibited [p398] on the basis that an audience that takes serious offense to the expression may disturb the peace, since the Government cannot assume that every expression of a provocative idea will incite a riot, but must look to the actual circumstances surrounding the expression.
Clinton was not one of the 59 co-sponsors of a proposed amendment to the constitution that would allow Congress to ban flag burning in general:
> Proposing an amendment to the Constitution of the United States authorizing Congress to prohibit the physical desecration of the flag of the United States.
and she also voted against it. The proposed amendment failed to pass by one vote. | 5 |
What is embedded bitcode? When to enable ENABLE_BITCODE in new Xcode? What happens to the binary when ENABLE_BITCODE is enabled in the new Xcode? | > What is embedded bitcode?
According to docs:
> Bitcode is an intermediate representation of a compiled program. Apps you upload to iTunes Connect that contain bitcode will be compiled and linked on the App Store. Including bitcode will allow Apple to re-optimize your app binary in the future without the need to submit a new version of your app to the store.
This phrase in "New Features in Xcode 7" made me to think for a long time that Bitcode is needed for Slicing to reduce app size:
When you archive for submission to the App Store, Xcode will compile your app into an intermediate representation. The App Store will then compile the bitcode down into the 64 or 32 bit executables as necessary.
However that's not true, Bitcode and Slicing work independently: Slicing is about reducing app size and generating app bundle variants, and Bitcode is about certain binary optimizations. I've verified this by checking included architectures in executables of non-bitcode apps and founding that they only include necessary ones.
Bitcode allows other App Thinning component called Slicing to generate app bundle variants with particular executables for particular architectures, e.g. iPhone 5S variant will include only arm64 executable, iPad Mini armv7 and so on.
> When to enable ENABLE_BITCODE in new Xcode?
For iOS apps, bitcode is the default, but optional. If you provide bitcode, all apps and frameworks in the app bundle need to include bitcode. For watchOS and tvOS apps, bitcode is required.
> What happens to the binary when ENABLE_BITCODE is enabled in the new Xcode?
From Xcode 7 reference:
> Activating this setting indicates that the target or project should generate bitcode during compilation for platforms and architectures which support it. For Archive builds, bitcode will be generated in the linked binary for submission to the app store. For other builds, the compiler and linker will check whether the code complies with the requirements for bitcode generation, but will not generate actual bitcode. | 5 |
Good luck! | Welcome to the "Terrible Two's"!
Your son behaves typically for his age. At 2 he starts to assert himself and express his demands. It's likely that he has also learned that he gets his way when he throws a tantrum. For a 2-year old screaming, hitting or even biting is a normal way to express his anger - at least he will try and every success reinforces this.
He also comes across more limitations: The more he is able to do, the more often he is stopped.
The solution? It's already in your question:
He will copy what others do. So by all means, stay calm. No yelling, no fussing and - please! - no hitting. He has some learning (accepted behaviour like sharing) and some unlearning (no hitting or pushing) to do and needs your help.
* When he throws a tantrum, either ignore him, or quietly remove him from the scene. Do not worry about others! Most likely they have had the same trouble with their kids or will some time ;-)
* When he doesn't want to share yet - fine, he will learn. This can be practiced. Don't make him share, or he will resent it. Rather, teach him the benefits of sharing. Start with food, for example. Have a plate of cookies (or other favorite food), that's yours. He will likely demand some, but demanding doesn't get him a cookie. Asking nicely will! Explain, repeat. Then, switch roles. If he has cookies, ask him to share. If he does, praise him. Else - remind him next time when he wants your cookies that he didn't share. Share whenever possible: Having a bite from your plate, getting a piece off his. Repeat, repeat, repeat.... Same goes for objects. Ask him to "please" share a toy, "play" with it for a short moment, then return. Say "Thank you". He learns, that he gets the toy back. Share some of your things. (Monitor the behaviour of other children, that want his toys - make sure they ask first and give toys back, at least during this learning stage.)
You have some serious work to do, but it will be sooooo worth it! | 5 |
What is the best way to structure a project with both a backend and a frontend? | These days it is much easier as vscode has better support for this.
You can use this directory structure so all the code is independent:
```├── frontend/
│ ├── src/
│ │ ├──
│ ├── package.json
│ ├── tsconfig.json
├── shared/
│ ├── package.json
├── backend/
│ ├── src/
│ │ ├──
│ ├── package.json
│ ├── tsconfig.json
```
Then in both the backend and frontend ```tsconfig.json```:
```{
"compilerOptions": {
"paths": {
"~shared/*": ["../shared/*"]
},
"rootDirs": [
"./src",
"../shared"
]
}
}
```
To allow access to the shared code e.g.:
```import { Foo } from '~shared/foo';
``` | 5 |
Tell me a joke | I told a joke on a Zoom meeting today and no one laughed.
Turns out I'm not remotely funny. | 5 |
What are the branches of philosophy? | The traditional branches of philosophy generally include
* Aesthetics
* Epistemology
* Ethics
* Logic
* Metaphysics / Ontology
We can go ahead and add a few contemporary branches on to this (more examples could certainly be adduced):
* Philosophy of Science [referring to the hard sciences] (Mathematics, Technology, etc.)
* Philosophy of Politics [referring to the social sciences] (Society, etc.)
* Philosophy of Religion [actually two things -- question related to the existence of God or gods AND questions relating to the sociological phenomenon of religion. Generally, referring to the former]
* Philosophy of Value (Axiology)
* Philosophy of Language
* Philosophy of Mind
Philosophy of language and philosophy of mind are sometimes done in ways that mirror the philosophy of the hard sciences [e.g. cognitive science] and sometimes not.
In addition, we could add many schools and movements (again, more examples could certainly be added). From the 20th century alone, there is:
* Phenomenology (Husserl)
* Schizoanalysis (Gilles Deleuze and Felix Guattari)
* Chaosophy (Felix Guattari)
* Non-philosophy (Francois Laruelle)
* Existentialism (Sartre, et al.)
* Vienna Circle/Logical Positivism
Finally, we can also consider the history of philosophy itself as constituting a series of fruitful conjunctions of cultures and eras where ideas were changing. The structure here is taken from Wikipedia's article on the History of Philosophy:
* Western philosophy
* Ancient philosophy
* Medieval philosophy
* Renaissance philosophy
* Modern philosophy
* Contemporary philosophy
* Eastern philosophy
* Indian philosophy
* Persian philosophy
* Chinese philosophy
* Japanese philosophy
* Buddhist philosophy
* Abrahamic philosophy
* Jewish philosophy
* Christian philosophy
* Islamic philosophy | 5 |
Write a letter to your brother about your travels. | Dear brother,
Another futile attempt. The burns are healing, at least. Today I resume my journey, I have another lead. I've earned a fair amount of coin in my travels, expect some in my next letter. Save some for our cousins, you know how happy it makes W. The swelling in my knees has gone down, these mushrooms seem to help. The locals seem to have a special strain in these parts, I'll send some home to you if I can manage it. So far I've only been able to get my hands on what I can find laying around--the shop owners are a bit random and prefer gambling to negotiation. Imbeciles. Maybe if they could read they would send letters like this to each other and I'd know where to find the princess by now. Instead I'll have to check every place myself.
Wish me luck,
M. | 5 |
What is the weather like today? | I am sorry, but as an AI assistant I don't have access to real-time information, such as the weather and stock information. Feel free to ask me something else. | 5 |
Write a story about a brave young boy who is trapped in a giant tower made of metal and painted black. The tower has no windows. The tower is a scary place. | Once upon a time, a brave young boy was trapped in a giant tower.
The tower was made of metal and painted black.
The tower had no windows.
The tower was a scary place.
*How I want to smell the grass again*, the brave young boy thought, *and swim in the sea like a dolphin, and watch the clouds again like a happy bird.*
"Not today. Not ever," the mean evil villain told him, as he shut and locked the door. He owned the tower, and he wasn't going to let him leave.
As the days passed, the brave young boy started to forget it all.
He forgot the smell of the grass.
He forgot the feeling of the sea.
And somehow, he started to forget the fluffy white clouds, when he heard a *knock knock knock* on the door.
"Hello?" the brave young boy answered.
It was a pair of federal agents in vests and sunglasses. They unlocked and opened the door.
Sunshine and fresh air filled the room.
They told the brave young boy that thanks to an unexpected leak of classified information, the mean evil villain had just been arrested on charges of fraud, money laundering, unlawful espionage, corporate warfare, and 117 infractions of the Mumbai Accords.
In other words, they told him, the brave young boy was free to go. | 5 |
How can I keep my clothes easily accessible and less messy? | To keep you clothes easily accessible and less messy, one option is getting an IVAR side panel from IKEA.
Lean it against a wall at a slight angle and put these “limbo” clothes over the horizontal bars.
It comes in different sizes, and stands almost entirely flat against the wall if you don't use it. If you want it hidden, it usually fits behind a door pretty well.
In addition, it will also look rather unique compared to most people’s clothes-chair solution. | 5 |
Write a letter to a potential employer on behalf of Consuela, the most astute servant that Fear Lord has ever seen. | To whom it may concern,
I am Fear Lord! Scourge of Humanity, Vanquisher of Captain Pillow, and Grand Ruler of 2/3 of Australia! Bow before me!
I write you today on behalf of Consuela! Scourge of Dust, Vanquisher of Laundry, and Grand Maid of Fear Lord Tower.
You shall hire Consuela to do your bidding or you shall hear from Fear Lord! Consuela is the most astute servant that Fear Lord has ever seen. Should my plans include killing the human race, I would spare Consuela for her ability to rid the world of the bodies. Her services are above reproach, any who say otherwise shall incur the wrath of me! Fear Lord! Muahaha!
So, puny potential employer, take note of her abilities. She masterfully cleans blood from carpets! She is able to attach laser beams to various animals! She has the magical ability to fold fitted sheets!
Consuela is too good for you! Hire her at once.
Sincerely,
Fear Lord! Scourge of Humanity, Vanquisher of Captain Pillow, and Grand Ruler of 2/3 of Australia!
p.s. Bow before me! | 5 |
Pop Punk combines the aggressive energy and instrumentation of punk with catchy melodies and hooks of pop music. Begun by The Ramones and Buzzcocks in the 1970s and made famous by bands such as Green Day in the 1990s and Blink-182 in the 2000s, pop punk has been popular and widespread for years. Luckily, there is no wrong way to write a pop punk song and, as far as writing music goes, the genre is relatively easy to learn.
## Write the instrumentals
1. Learn power chords on the guitar to play any pop punk song. Power chords are the backbone of every punk song ever written. They are short, easy to play, and sound great when played loud. A power chord is just three notes -- your index finger on the E or A string, and the next two strings fretted two frets down. You can move this form anywhere on the guitar to play every single chord. For example, an A, G, D, chord would look like:
*
* A-Chord | G-Chord | D-Chord |
* |e|----x-----|------x------|-----x------|
* |B|----x----|------x------|-----x------|
* |G|----x----|------x------|-----7------|
* |D|----7----|------5------|-----7------|
* |A|----7----|------5------|-----5------|
* |E|----5----|------3------|-----x------|
2. Follow the guitar chords on bass to get the basics of pop punk. Bass players have a lot to look forward to in pop punk. If you're stuck or a newbie, quickly repeated 16th notes on the bass (basically playing one note over and over again) can follow the chords on the guitar to instantly fit in. For example, if the guitarist is playing an A-bar chord, you play the A note in time with each one of her chords. From here you can feel free to improvise during chord changes, before switching to the chorus or verse, or if you can think of a fun bass line to play.
3. Learn the drum beat for pop punk. The drum beat for pop punk is simple and repetitive. It's usually a 4/4 time signature, which means that there are four beats in | Pop Punk combines the aggressive energy and instrumentation of punk with catchy melodies and hooks of pop music. Begun by The Ramones and Buzzcocks in the 1970s and made famous by bands such as Green Day in the 1990s and Blink-182 in the 2000s, pop punk has been popular and widespread for years. Luckily, there is no wrong way to write a pop punk song and, as far as writing music goes, the genre is relatively easy to learn.
## Write the instrumentals
1. Learn power chords on the guitar to play any pop punk song. Power chords are the backbone of every punk song ever written. They are short, easy to play, and sound great when played loud. A power chord is just three notes -- your index finger on the E or A string, and the next two strings fretted two frets down. You can move this form anywhere on the guitar to play every single chord. For example, an A, G, D, chord would look like:
*
* A-Chord | G-Chord | D-Chord |
* |e|----x-----|------x------|-----x------|
* |B|----x----|------x------|-----x------|
* |G|----x----|------x------|-----7------|
* |D|----7----|------5------|-----7------|
* |A|----7----|------5------|-----5------|
* |E|----5----|------3------|-----x------|
2. Follow the guitar chords on bass to get the basics of pop punk. Bass players have a lot to look forward to in pop punk. If you're stuck or a newbie, quickly repeated 16th notes on the bass (basically playing one note over and over again) can follow the chords on the guitar to instantly fit in. For example, if the guitarist is playing an A-bar chord, you play the A note in time with each one of her chords. From here you can feel free to improvise during chord changes, before switching to the chorus or verse, or if you can think of a fun bass riff. Check out Green Day's "She," which opens with a great but simple bass riff, and note how it follows the guitar, but with subtle flourishes. Rancid's "Olympia, WA" is almost straight 16th notes on the bass, carrying the song along.
3. Focus on your kick, snare, and hi-hat on the drums for a driving, strong beat. You want to keep the song moving forward with a quick, regular beat. Sixteenth notes on the hi-hat, alternating the kick drum and the snare every other note. While there is a lot more to drumming than this, this basic beat can go behind any pop punk song. Big, quick fills on the toms and crash cymbals are the common way to transition into new parts of the song. Pop-punk drummers like Travis Barker are talented musicians who drive the song forward. Focus on keeping time perfectly, especially at high speeds, to become an invaluable drummer.
4. Start writing a song with just one good guitar riff. 95% of pop punk songs are short, fast, and guitar-driven. Find 3-4 notes or power chords that you think sound good together and make up a short little phrase to repeat. Most pop-punk songs are simple -- find a riff you like and repeat it to write a verse or chorus. Chop up and change your favorite riffs from other bands. Pop-punk is heavily borrowed, adapted, and repeated. In general, three power chords are the bare minimum for a song. Play with the rhythm and timing of your chords to give them a unique spin.
5. Write a new riff for the chorus or verse, so you have two unique melodies. To be honest, many bands play the exact same chords, just in a different order or tempo (listen to the Ramones for proof). In general, the verse is slower and or muted and the chorus gets louder, faster, and more melodic. When coming up with a chorus:
* Keep it simple -- the chorus should not be hard to follow. Aim for catchy melodies -- this is where you hook people's ears. Add a short, improvised 1-2 bar riff coming in and out of the chorus to mark each change.
6. Consider coming up with one new section for the breakdown or solo. After hearing the verse and chorus twice, most bands add in one quick, unique section to change the song up. This is called the breakdown, and there is often a solo, different lyrics, or a slow drop and build back to full energy or tempo. They are usually slower, either building up power or leaving room for another instrument to play by itself. If you're struggling to write breakdowns, try to:
* Play the verse or chorus at half-time. Replay or change up the intro riff or melody. Simplify the chords to the 1-2 most important ones, leaving space for vocals or a solo. Drop out certain instruments, then slowly build them back in.
7. Follow the basic pop song structure when crafting songs. Most pop punk songs begin with an intro, and they usually then follow this order: Intro, first verse, second verse, chorus, third verse, chorus solo and/or bridge, and then finish with the chorus again or outro. Though some songs will be different, this is the most common structure of a Pop Punk song. Blink-182's "Dammit" is an excellent example. All you have to write is a riff for the verse, the chorus, and the bridge. when it comes to solos, they are usually very simple. Occasionally it's just the intro again, and in some cases there are no solos at all
8. Play the song as fast as possible. Pop punk is not about sitting back quietly. It is about brash, loud, youthful energy. All pop-punk songs should be played as fast as you feel comfortable, and maybe even a little faster. Once you've got the structure down, start thrashing. When you play live, your number one goal is to have high, contagious energy. Quick songs make it much easier to get people jumping around with you. It is rare for songs to go longer than three minutes. Many are even over before the two minute mark.
9. Pick up influences from other bands and genres to make your songs stand out. Pop-punk, luckily enough, is easily adapted to other influences and ideas. Keep playing music of all types to learn new riffs and styles. It is the best way to make your own song unique. Common genres to blend with pop punk include:
* Ska and Reggae (Rancid, Operation Ivy, Less Than Jake. Country (Social Distortion, Lucero)
* Swing/Rockabilly (The Misfits, Cobra Skulls).
## Write the lyric
1. Come up with one image, idea, or person to write a song about. Pop-punk songs can be about almost anything. Most commonly, however, they talk about love, adolescence, and rebellion. Unlike its older cousin punk, pop-punk songs are focused more on melodies and relatable lyrics than hard-hitting social criticism. Common subjects include:
* Love and heartbreak
* Suburban angst
* Rebellion against school, parents, etc. Joke-y and goofy lyrics
* Growing up.
2. Focus on a simple, catchy chorus before anything else. Pop music, no matter what subgenre, is about music that hooks the listener in. You want everyone singing or humming your chorus when the song is done. Keep it short, simple, and make sure it sounds great. Whistling the lyrics is a great way to hear the melody. Write lyrics so that they sound great even when you're just whistling. Green Day, Blink-182, Operation Ivy, and Rancid are great bands on their own, but it is their ability to write a catchy, radio-friendly chorus got them famous.
3. Make verses short, matching the same length and rhyme scheme for each. The easiest way to write song lyrics is in rhyming couplets. Basically, you write one line, then write another line that rhymes with it. These lyrics need to flesh out your chorus and idea. If you're stuck with the verses, you might--
* Tell a story ("Timebomb")
* Describe related moments or images about a girl, life, school ("Story of my Life."). Explore a theme or idea, using each verse to talk about a different aspect ("Longview").
4. Consider adding a refrain or sing-along section. The sing-along, often little more than "lalalas" "oooohhhs" and "ahhhhhhs," is a staple of pop-punk. Often used in the chorus or outro, a good sing-along section is key for a pop-punk section. You don't need one in every song, but even something as simple as "nananana nanananana" in "All the Small Things" is the difference between a good song and a hit.
5. Get personal. Pop punk is personal medium. Your own worries, fears, and anger will fit right at home in the lyrics, so don't shy away from personal stories or opinions. Punk is known as an inclusive, do-it-yourself genre, so just be yourself. Even somewhat angsty, emo-type lyrics work well, as evidenced by Good Charlotte, Fall Out Boy, and Screeching Weasel. Feel free to get weird. The Lillingtons, for example, made their mark with sci-fi inspired songs. Feel free to be funny. Pop-punk has a long history of pranksters and joke songs, from the poppier NOFX songs to the self-awareness of The Steinways.
| 5 |
Why does hot water freeze faster than cold water? | In certain settings, cold water freezers slower than hot water. This is called the Mpemba effect:
Hot water can in fact freeze faster than cold water for a wide range of experimental conditions. This phenomenon is extremely counterintuitive, and surprising even to most scientists, but it is in fact real. It has been seen and studied in numerous experiments. While this phenomenon has been known for centuries, and was described by Aristotle, Bacon, and Descartes, it was not introduced to the modern scientific community until 1969, by a Tanzanian high school student named Mpemba.
Here are some suggested reasons:
1. Evaporation — As the initially warmer water cools to the initial temperature of the initially cooler water, it may lose significant amounts of water to evaporation. The reduced mass will make it easier for the water to cool and freeze. Then the initially warmer water can freeze before the initially cooler water, but will make less ice.
2. Dissolved Gasses — Hot water can hold less dissolved gas than cold water, and large amounts of gas escape upon boiling. So the initially warmer water may have less dissolved gas than the initially cooler water. | 5 |
What is the difference between a god and a titan? Why do the titans have their own order name? | A 'god' is synonymous to a 'deity'; the Titans and Titanesses were gods, they were members of the second order of divine beings - after Gaia and Uranus, and the other primordial deities.
Cronus and his fellow Titans comprised the second Ancient Greek pantheon (the first comprising of deities such as Ananke, Gaea, and Ouranos), which the younger generation of gods, including Zeus, would later usurp, as the Titans usurped the primordial gods before them. (For more information on this concept of change in dominant deities, read up on the theory of The Golden Age, particularly that of Hesiod, who also wrote the only surviving account of the Titans in his Theogony.)
As for why the Titans have their own order name as opposed to Zeus et al who are simply 'gods', there is debate as to the exact etymology of the word 'titan' but this quote from Hesiod's Theogony states:
"But these sons whom he begot himself great Heaven used to call Titans (Strainers) in reproach, for he said that they strained (τιταίνοντας) and did presumptuous a fearful deed, and that vengeance (τίσιν) for it would come afterwards."
Trans. Evelyn-White, here with side-by-side Greek.
However this is not to say Hesiod was correct; he himself was writing long after the supposed Golden Age ended. | 5 |
How can I make an element scroll into view with 10px of additional space? | CSS ```scroll-margin``` and ```scroll-padding```
You might want to have a look at new CSS properties ```scroll-padding``` and ```scroll-margin```. You can use ```scroll-padding``` for the scrolling container (```html``` in this case), and ```scroll-margin``` for the element within the container.
For your example, you would want to add ```scroll-margin-top``` for the element that you want to scroll into view, like this:
```.example {
scroll-margin-top: 10px;
}
```
This affects ```scrollIntoView``` code, like this code:
```const el = document.querySelector(".example");
el.scrollIntoView({block: "start", behavior: "smooth"});
```
This will cause the viewport to scroll to align the top border of the viewport with the top border of the element, but with 10px of additional space. In other words, these properties of the element are taken into account:
* ```padding-top```
* ```border-top```
* ```scroll-margin-top```
* (and not ```margin-top```)
In addition, if the ```html``` element has ```scroll-padding-top``` set, then that is taken into account too.
If you're using a framework like Vue, you might want to make sure that all changes to the DOM are finished before running `scrollIntoView` by using something like `Vue.nextTick(() => el.scrollIntoView())` | 5 |
Give me 10 trivia questions based on the three Wikipedia paragraphs I have provided:
1. In the Super Mario video game series, which color is a typical warp pipe?
2. In newer Super Mario games, which | Here are 10 trivia questions based on the three Wikipedia paragraphs you have provided:
1. In the Super Mario video game series, which color is a typical warp pipe?
2. In newer Super Mario games, which alternative mode of transportation serves as a similar mode of transportation to warp pipes?
3. In the original Super Mario Bros. series, how can Mario skip several worlds at once?
4. In Super Mario video games, which enemies typically appear in warp pipes?
5. Who is the guardian of the Master Emerald in the Sonic the Hedgehog franchise?
6. Who is Sonic the Hedgehog's girlfriend?
7. Who was Sonic the Hedgehog's first sidekick?
8. Who played Raiden in the first two Mortal Kombat video games?
9. In Mortal Kombat II, what could trigger the "Toasty!" sound effect?
10. In the Mortal Kombat video game, there is a character named Noob Saibot. What is the origin of his name? | 5 |
Describe the city of Arcadia. | Smooth edges. Clean streets. People bustle about, heading to lunch, with smiles on their faces. Posters line the walls of the city saying "Be Your Brother's Keeper" or "Arcadia is Our Mother". Loudspeakers chime in with daily reminders about citywide events or milestones met. "Without Arcadia," says the woman on the announcements, "we are nothing." Police in crisp white uniforms patrol the streets on foot, and everyone smiles and nods at them. Above, through the small clouds, an impossibly tall tower can be seen standing at the center of the sprawl.
A great wall surrounds the city. The First Founders began building it long ago, during their age, and by the time their generation had passed it was finished. A dull grey barrier, blocking Arcadia off from the outside world. Every man, woman, and child knows what lies beyond. Ruins of the fallen world, the world that came before. Anyone is free to leave, but such a thought rarely ever crosses the mind. They are taught the truth when they are young, how societies collapsed after fossil fuels ran out. How wars were fought not for land, but for water. How the nuclear missiles, the Dust Makers, were made. How terrifyingly destructive they had been. How they had sailed through the air like shooting stars before crashing back down to Earth like meteors.
They picked through the ashes and learned from their ancestor's mistakes. They come together as a community, and stay together as a community, for each other's sake. Division, the teachers said, is what split the old world apart. People were separated, not just by the borders of their country, but by the borders they made themselves. Race. Class. Religion. Political views. In Arcadia, these things still exist, but the people are taught to embrace their difference. To cherish it. To not let it consume and divide them.
Because if there is division, there is no Arcadia. And without Arcadia, they are nothing. | 5 |
Are martial arts inadequate in the real world? | Yes, depending on your definitions of martial arts, inadequate, and real world.
No, depending on your definitions of martial arts, inadequate, and real world.
Surviving an attack (or combat) is all about stacking the deck in your favour: martial arts (arts of Mars, the God of War) do help, so do guns, team mates, artillery, the police, not being there, body armour, etc...
There is no such thing as a typical real world violent attack. For example, urban warfare is not the same thing as a bar brawl and both require very different skill sets to survive. The no prior warning is utter rubbish. There are always signs that something is about to happen. Sure, one may not notice those and a skilled attacker will be trained in camouflaging those signs but they always are. Police officers, body guards, soldiers, etc... are all trained in recognise those signs.
Making general sweeping statements about violence and how to survive it generally indicate either bad research or an agenda.
For a good site about self defence, especially the section on martial arts, see MacYoung's no nonsense self defense. But this is about civilian self defence in a stable country. If you were in a civil war zone, the advise would be very different. | 5 |
Basically, a fold or crease in paper will remain because the structure of the fibers in the paper have become irreversibly damaged. This happens because the paper is bent/compressed beyond its elastic limit.
Chemically, paper is mainly composed of cellulose from plant fibers. Cellulose is an organic polymer, which has D-glucose units connected through hydrogen bonds. These bonds form between the oxygen atom of the one-hydroxyl group belonging to the glucose and the hydrogen atom of the next glucose unit. These are microscopic properties of paper, but to understand what happens when we fold paper or do Origami, it is sufficient to learn what is happening macroscopically.
All materials have what is called an elastic limit and a plastic region. The elastic limit is the point at which a material will bend but still return to its original position without any permanent change or damage to its structure. Further deforming the material beyond this limit takes it to its plastic region. At this point any structural or physical changes become permanent and the paper will not return to its original form.
Every material has a different elastic limit or yield, and plastic region. Imagine holding a piece of paper slightly bent but not folding or creasing it. The plant fibers that make up the paper will not have exceeded their elastic limit. So as soon as you let go of the paper sheet it will quickly return to its noncreased original flat state. However, if you were to roll that piece of paper into a cylinder and hold it for a few minutes, some of these fibers will be pushed beyond the elastic limit which is evident since it will not lie flat anymore since slight deformations have occurred in this sheet.
Now, when you properly fold a piece of paper as you would during Origami, the plant fibers along the crease are pushed into the plastic region of the paper, causing a fracture point at the actual line of the fold. A practical example of this is if you were to fold a piece of paper, you will note that if you stretch the paper evenly on both sides of the fold, the paper will tear right on the fold (a quick way to "cut" paper if you have no scissors). The fold is irreversible because the plant fibers have been permanently deformed beyond their elastic limit. | Basically, a fold or crease in paper will remain because the structure of the fibers in the paper have become irreversibly damaged. This happens because the paper is bent/compressed beyond its elastic limit.
Chemically, paper is mainly composed of cellulose from plant fibers. Cellulose is an organic polymer, which has D-glucose units connected through hydrogen bonds. These bonds form between the oxygen atom of the one-hydroxyl group belonging to the glucose and the hydrogen atom of the next glucose unit. These are microscopic properties of paper, but to understand what happens when we fold paper or do Origami, it is sufficient to learn what is happening macroscopically.
All materials have what is called an elastic limit and a plastic region. The elastic limit is the point at which a material will bend but still return to its original position without any permanent change or damage to its structure. Further deforming the material beyond this limit takes it to its plastic region. At this point any structural or physical changes become permanent and the paper will not return to its original form.
Every material has a different elastic limit or yield, and plastic region. Imagine holding a piece of paper slightly bent but not folding or creasing it. The plant fibers that make up the paper will not have exceeded their elastic limit. So as soon as you let go of the paper sheet it will quickly return to its noncreased original flat state. However, if you were to roll that piece of paper into a cylinder and hold it for a few minutes, some of these fibers will be pushed beyond the elastic limit which is evident since it will not lie flat anymore since slight deformations have occurred in this sheet.
Now, when you properly fold a piece of paper as you would during Origami, the plant fibers along the crease are pushed into the plastic region of the paper, causing a fracture point at the actual line of the fold. A practical example of this is if you were to fold a piece of paper, you will note that if you stretch the paper evenly on both sides of the fold, the paper will tear right on the fold (a quick way to "cut" paper if you have no scissors). The fold then becomes an irreversible structural failure and the fibers in the paper will never regain their original state.
Because of this damage to its structure, the paper will from then on have this fold. And no matter how hard you try to flatten out the fold it will never return to its original state. This is why Origami models continually retain their shape. | 5 |
You can remove a mounted volume, also known as dismounting a volume when you no longer want separate drives, or partitions on your computer for extra storage purposes. You can dismount a volume on Windows computers using the Control Panel, and on Mac OS X using the Terminal application.
## Dismount a volume in windows
1. Click on “Start” and select “Control Panel.” The Control Panel window will display on-screen.
2. Click on “System and Security,” then on “Administrative Tools.”
3. Click on “Computer Management,” then enter the administrator password. Dismounting a volume can only be done by the administrator.
4. Click on “Disk Management” under “Storage” in the left pane.
5. Right-click on the volume you want dismounted and select “Change Drive Letter and Paths.”
6. Click on “Remove,” then select “Yes” when asked to confirm that you want to dismount the volume. The volume you selected will now be dismounted.
## Dismount a volume on mac os x
1. Open the Applications folder and click on “Utilities.”
2. Click on “Terminal.” The Terminal application will launch and display on-screen.
3. Type “diskutil list” into Terminal and hit “Return.” This command will provide you with a list of all drives connected to your Mac computer so you can grab the “drive identifier” of the volume you want dismounted.
4. Locate the name of the volume you want dismounted in the list of results. For example, if you want to dismount a flash drive you had named “wikiHow data,” find the volume for “wikiHow data” in the list of results.
5. Locate the drive identifier of that particular volume. The drive identifier will be named “disk” followed by a combination of different numbers and characters, and is located at the end of the line for each volume listed. For example, the drive identifier may read as “disk0s2” or “disk1s2.”
6. Type the following command into Terminal: “diskutil unmount /dev/disk1s2,” while making sure that the appropriate drive identifier for the volume you want dismounted is used in place of “disk1s2” in this command. The volume will be officially dismounted when you hit “Return.” | You can remove a mounted volume, also known as dismounting a volume when you no longer want separate drives, or partitions on your computer for extra storage purposes. You can dismount a volume on Windows computers using the Control Panel, and on Mac OS X using the Terminal application.
## Dismount a volume in windows
1. Click on “Start” and select “Control Panel.” The Control Panel window will display on-screen.
2. Click on “System and Security,” then on “Administrative Tools.”
3. Click on “Computer Management,” then enter the administrator password. Dismounting a volume can only be done by the administrator.
4. Click on “Disk Management” under “Storage” in the left pane.
5. Right-click on the volume you want dismounted and select “Change Drive Letter and Paths.”
6. Click on “Remove,” then select “Yes” when asked to confirm that you want to dismount the volume. The volume you selected will now be dismounted.
## Dismount a volume on mac os x
1. Open the Applications folder and click on “Utilities.”
2. Click on “Terminal.” The Terminal application will launch and display on-screen.
3. Type “diskutil list” into Terminal and hit “Return.” This command will provide you with a list of all drives connected to your Mac computer so you can grab the “drive identifier” of the volume you want dismounted.
4. Locate the name of the volume you want dismounted in the list of results. For example, if you want to dismount a flash drive you had named “wikiHow data,” find the volume for “wikiHow data” in the list of results.
5. Locate the drive identifier of that particular volume. The drive identifier will be named “disk” followed by a combination of different numbers and characters, and is located at the end of the line for each volume listed. For example, the drive identifier may read as “disk0s2” or “disk1s2.”
6. Type the following command into Terminal: “diskutil unmount /dev/disk1s2,” while making sure that the appropriate drive identifier for the volume you want dismounted is used in place of “disk1s2” in this command. The volume will be officially dismounted when the following command is displayed in Terminal: “$ diskutil unmount /dev/disk1s2 Volume wikiHow data on disk1s2 unmounted”
| 5 |
Clean plants are a beautiful addition to your home and garden, and do a wonderful job of purifying the air. Choose a cleaning method that is safe for your plant, especially if your plant is sensitive to water. Experiment with different shine agents to add a beautiful glow to your plant leaves. Each of these strategies will leave your plants looking clean and shiny.
## Remove dust and grime
1. Wipe large, shiny leaves with a damp cloth. This is the best way to clean large plants, such as rubber plants, that are difficult to move. Dunk your cloth in water and then squeeze out any excess liquid. Gently wipe both sides of all of the leaves to remove any dust and grime. Microfiber cloths or cheesecloths work well for cleaning plants. Clean the leaves each time that you notice dust or dirt building up. This works well for both indoor and outdoor plants such as Gunnera, Plantain Lillies, and Elephant Ears. Place a drop of dishwashing liquid on the cloth if you notice insects eating or landing on your plant.
2. Use a soft paintbrush to remove dust from plants with fuzzy leaves. Plants with fluffy leaves, such as African Violets, are quite delicate and shouldn’t be wiped. Instead, gently brush any dust or insects off the leaves with a clean, soft paintbrush. If you don’t have a soft paintbrush on-hand, use a pipe cleaner or soft toothbrush instead. Avoid wetting the leaves of fuzzy plants, as this can cause water spots to appear.
3. Rinse indoor plant leaves with warm water to remove insects and dust. Place your indoor plant in the sink or shower and use the pressure of the water stream to remove any dust and dirt from the plant. The mist from the shower will also help to hydrate the plant’s leaves. Leave the plants to drip-dry and then take them outside to dry in the sunshine. Always use warm water, as cold water can leave spots on the leaves. Don’t wash plants, such as cacti and African Violets, that are sensitive to water. This method works well for Peace Lilies, Spider Plants, and Aloe Vera.
## Use a shine agent
1. Dip a cotton swab in rubbing alcohol and gently wipe the leaves of your plant. Rubbing alco | Clean plants are a beautiful addition to your home and garden, and do a wonderful job of purifying the air. Choose a cleaning method that is safe for your plant, especially if your plant is sensitive to water. Experiment with different shine agents to add a beautiful glow to your plant leaves. Each of these strategies will leave your plants looking clean and shiny.
## Remove dust and grime
1. Wipe large, shiny leaves with a damp cloth. This is the best way to clean large plants, such as rubber plants, that are difficult to move. Dunk your cloth in water and then squeeze out any excess liquid. Gently wipe both sides of all of the leaves to remove any dust and grime. Microfiber cloths or cheesecloths work well for cleaning plants. Clean the leaves each time that you notice dust or dirt building up. This works well for both indoor and outdoor plants such as Gunnera, Plantain Lillies, and Elephant Ears. Place a drop of dishwashing liquid on the cloth if you notice insects eating or landing on your plant.
2. Use a soft paintbrush to remove dust from plants with fuzzy leaves. Plants with fluffy leaves, such as African Violets, are quite delicate and shouldn’t be wiped. Instead, gently brush any dust or insects off the leaves with a clean, soft paintbrush. If you don’t have a soft paintbrush on-hand, use a pipe cleaner or soft toothbrush instead. Avoid wetting the leaves of fuzzy plants, as this can cause water spots to appear.
3. Rinse indoor plant leaves with warm water to remove insects and dust. Place your indoor plant in the sink or shower and use the pressure of the water stream to remove any dust and dirt from the plant. The mist from the shower will also help to hydrate the plant’s leaves. Leave the plants to drip-dry and then take them outside to dry in the sunshine. Always use warm water, as cold water can leave spots on the leaves. Don’t wash plants, such as cacti and African Violets, that are sensitive to water. This method works well for Peace Lilies, Sword Ferns, and Devils Ivy.
4. Dunk small plants into water to quickly get rid of dust. Place your hand over the soil to keep it in place and then turn the plant upside down and submerge the plant in room temperature water. This is a great option for small houseplants and outdoor plants. Allow the plants to drip-dry out of direct light.
5. Spray compressed air onto cacti to avoid getting them wet. Cacti are used to desert conditions and will often wilt and die if they are over-watered. Spray air from an air compressor can over the spikes to dislodge any dust or dirt from the cacti. Hold the can 10 centimetres (3.9 in) away from the cacti to avoid damaging the spikes. Purchase an air-compressor can from a hardware store or a plant nursery. This works well for both spiky and smooth cacti.
## Add shine
1. Rub a thin coat of mayonnaise over the leaves to keep them shiny. Squeeze a little mayonnaise onto a paper towel and wipe it over the leaves. Cover the entire leave with a light enough coat that it cannot be seen. Remove any excess mayonnaise with a clean paper towel. This shiny coating will last for approximately 2 weeks. Simply reapply the mayonnaise to restore the shine of the leaves. This method works for all types of plants.
2. Cover the leaves in a thin layer of mineral oil for a long-lasting glow. Mineral oil provides a shiny coating for the leaves and helps to prevent dust from accumulating quickly. Simply place a drop of mineral oil onto each leaf and use your fingers to evenly spread it over the top side of the leaf. Use this method on any type of plant. Avoid using coconut or olive oil on the leaves, as this can block the pores of the plant. Keep plants with mineral oil on them out of the direct sun to avoid the leaves from getting burnt. Reapply the mineral oil once or twice per year.
3. Spray a commercial plant shining product onto the leaves to add sheen. These sprays are specially formulated to keep your plant leaves looking shiny. Liberally spray the product over all the leaves on your plants. If you are spraying outdoor plants, choose a product that is designed for outdoor plants. Purchase a plant shining spray from a plant store. Follow the application instructions on the packet. This is a great option for cacti, as you don’t have to touch the plant.
| 5 |
What is CSRF? | What is CSRF?
The Authenticity Token is a countermeasure to Cross-Site Request Forgery (CSRF). What is CSRF, you ask?
It's a way that an attacker can potentially hijack sessions without even knowing session tokens.
Scenario:
* Visit your bank's site, log in.
* Then visit the attacker's site (e.g. sponsored ad from an untrusted organization).
* Attacker's page includes form with same fields as the bank's "Transfer Funds" form.
* Attacker knows your account info, and has pre-filled form fields to transfer money from your account to attacker's account.
* Attacker's page includes Javascript that submits form to your bank.
* When form gets submitted, browser includes your cookies for the bank site, including the session token.
* Bank transfers money to attacker's account.
* The form can be in an iframe that is invisible, so you never know the attack occurred.
* This is called Cross-Site Request Forgery (CSRF).
CSRF solution:
* Server can mark forms that came from the server itself
* Every form must contain an additional authentication token as a hidden field.
* Token must be unpredictable (attacker can't guess it).
* Server provides valid token in forms in its pages.
* Server checks token when form posted, rejects forms without proper token.
* Example token: session identifier encrypted with server secret key.
* Rails automatically generates such tokens: see the authenticity_token input field in every form.
| 5 |
Babysitting is an important job. Whether you are a teenager looking to make some extra cash or an adult looking to do child care as your profession, babysitting certifications can help. Courses or online programs can give younger babysitters the knowledge and credentials necessary to gain clients and become skilled babysitters.
## Take class at the red cross
1. Contact your local Red Cross Center. Most Red Cross centers across the United States offer courses in “Babysitting Basics,” “Babysitting Training,” and “Advanced Child Care.” The Red Cross is a nationally-recognized and widely respected organization, so it is an excellent choice for babysitting training courses.
2. Select the course that is right for you. The “Babysitting Training” course is the most extensive and effective option. This on-site class last for 7 hours over the course of 1 day. “Babysitting basics” and “Advanced Child Care” are both online courses. Each lasts for 4 hours, and can be completed at your own pace. Babysitting Training is recommended for students aged 11-15. Babysitting Basics is intended for students 11 and up. Advanced Child Care does not carry an age requirement, but is geared toward experienced babysitters.
3. Pay the appropriate fee. The “Babysitting Training” course, once again, is the most comprehensive overview. The fee for this course is $85. The “Babysitting Basics” online course is $29. The “Advanced Child Care” course costs $49, although it is sometimes on sale at half-price (for $24.50). These fees are due at the time of registration.
4. Attend the class. If you have signed up for the “Babysitting Training” course, make your way to your local Red Cross center on the date of your course. Students are instructed to bring a lunch. If you have registered for one of the online courses, log in and begin working whenever you have a couple of hours to dedicate to learning. When you have completed the course, you will receive a certificate. The Babysitting Training course focuses on developing leadership skills, developing a babysitting business, keeping kids safe, and handling emergencies. The Babysitting Basics course covers the same topics, but at a more basic level. The Advanced Child Care course is intended for experienced babysitters, and covers topics such as caring for children | Babysitting is an important job. Whether you are a teenager looking to make some extra cash or an adult looking to do child care as your profession, babysitting certifications can help. Courses or online programs can give younger babysitters the knowledge and credentials necessary to gain clients and become skilled babysitters.
## Take class at the red cross
1. Contact your local Red Cross Center. Most Red Cross centers across the United States offer courses in “Babysitting Basics,” “Babysitting Training,” and “Advanced Child Care.” The Red Cross is a nationally-recognized and widely respected organization, so it is an excellent choice for babysitting training courses.
2. Select the course that is right for you. The “Babysitting Training” course is the most extensive and effective option. This on-site class last for 7 hours over the course of 1 day. “Babysitting basics” and “Advanced Child Care” are both online courses. Each lasts for 4 hours, and can be completed at your own pace. Babysitting Training is recommended for students aged 11-15. Babysitting Basics is intended for students 11 and up. Advanced Child Care does not carry an age requirement, but is geared toward experienced babysitters.
3. Pay the appropriate fee. The “Babysitting Training” course, once again, is the most comprehensive overview. The fee for this course is $85. The “Babysitting Basics” online course is $29. The “Advanced Child Care” course costs $49, although it is sometimes on sale at half-price (for $24.50). These fees are due at the time of registration.
4. Attend the class. If you have signed up for the “Babysitting Training” course, make your way to your local Red Cross center on the date of your course. Students are instructed to bring a lunch. If you have registered for one of the online courses, log in and begin working whenever you have a couple of hours to dedicate to learning. When you have completed the course, you will receive a certificate. The Babysitting Training course focuses on developing leadership skills, developing a babysitting business, keeping kids safe and helping children behave, and learning about basic child care and basic first aid. The Babysitting Basics class focuses on staying safe, what to do in an emergency, selecting age-appropriate activities, and handling a variety of behaviors. The Advanced Babysitting course focuses on how to take care of children outside of the home. It teaches students how to keep children safe and happy in a variety of situations. You will not need to pass a test. Simply complete the course to earn your certificate.
5. Take a CPR and First Aid class. Although it is not required, it is strongly encouraged for all babysitters to take a course in CPR and First Aid. These courses are also offered through the Red Cross. Certifications in CPR and First Aid increase make you a more hireable babysitter. The Red Cross Adult and Pediatric First Aid/CPR class meets for 6.5 hours. The cost is $110. The certification you earn will be good for 2 years.
## Complete an online course
1. Find an online babysitting course. Numerous online agencies offer courses in babysitting. Look for an online training course geared toward your needs (such as infant care or early childhood development). Search for an option that fits your budget. Many childcare licensing agencies offer free babysitting courses. Check your local childcare licensing agency’s website or call and ask if they have any upcoming courses. Free courses generally do not grant "certificates," however, they may still offer valuable knowledge. Online babysitting courses range from as low as $20 to as high as $200.
2. Verify that this source is reputable. Although there are many online options for babysitting classes, not all of them may be worthwhile. Look for a company with positive online reviews as well as testimonials from clients. Also, look for a contact telephone number, call them, and ask them some questions over the phone. A company that you cannot reach by phone is probably not a good choice.
3. Make sure you meet the requirements. Some training programs are geared towards students of a specific age. For example, some are created for young adults (usually ages 11-15), while others are for older students. Additionally, some course like you to already have a background in childcare, while others are for beginners. Finally, some courses require you to be fluent in English, while others do not. Be sure you meet any requirements for the course before you enroll. Most babysitting courses are geared toward younger people (often ages 11-17). If you are an adult looking to train in babysitting, search for "advanced" courses.
4. Pay the fee. Various courses will have various fees. Some online babysitting classes are as low as $20, and may go as high as $200. Select a course that you feel good about, and pay the appropriate fee at the time of registration.
5. Take the course. Once you have registered and paid the fee, you simply need to log in and complete the course. Various courses will span different timelines. Most courses can run anywhere from 4 to 12 hours. In general, the benefit of these online courses is that they may be completed at your own pace. Most courses combine learning modules with short quizzes and tests. Once you have passed the course, you will be able to print out a certificate.
## Become a “licensed childcare provider” in your state
1. Decide if you want a career in childcare. Becoming a state licensed childcare provider is more than just “babysitting.” It means that you are a small business owner responsible for the health, happiness, and development of small children. Before seeking a childcare license, ask yourself the following questions:
* Do I enjoy working with children? Am I knowledgeable about child development or willing to learn? Am I ready to be a small business owner? Do I have the resources I need to start my own childcare business?
2. Contact the proper department in your state. In each state, there is a department that handles the licensing of childcare providers. Each state will have different specific requirements for gaining your childcare license (such as age and education requirements), so it is important to contact your state before you take any steps. Ask the department for a childcare business application and review the application to ensure you, your intended program, and your property meet the requirements. In Illinois, this is either the Department of Health and Human Services (DHS), or the Department of Children and Family Services (DCFS). In California, this is the Department of Social Services (CDSS). In Missouri, this is the Department of Health and Senior Services. In Florida, child care licenses are issued by the Department of Children and Families (DCF).
3. Pass background checks. Once you are sure that you meet the age and education requirements in your state, you will need to pass a criminal background check through your state agency. They will also ensure that you do not appear on the national or state–level sex offender registries or within the Child Abuse and Neglect Tracking System. Each state is different, but you may be disqualified if you have been convicted of a felony. You will likewise be disqualified if you have been convicted of a sex crime, are listed in any sex offender registry, or have been convicted of child abuse or neglect. Additionally, they may look into your driving record and general criminal history.
4. Pass an inspection. The next step in becoming a licensed childcare provider in your state is for the location to pass an inspection. Whether you plan to open a daycare center or to care for children in your home, an inspector will need to come out and ensure that you meet all the standard health and safety requirements. Once again, these will vary by state, so it is imperative for you to check with your local government agency. Contact your local agency to procure a list of safety requirements, and make any adjustments, before requesting an inspection. For example, some states require you to have a fence around a swimming pool.
5. Apply for a license through your state. After you have met the age and education requirements, passed the appropriate background checks, and passed the home/facility inspection, you are eligible to apply for a license in your state. Once again, you will need to contact the appropriate department in your given state and follow the particulars of your state’s procedures.
| 5 |
Why should I cover my mouth when I cough or sneeze? | One reason is to prevent droplet infection. When you cough or sneeze, droplets are expelled from your mouth which can infect others if they come into contact with them. By covering your mouth, you reduce the number of droplets in the air.
Another reason is to prevent the spread of germs on surfaces. When you cough or sneeze, germs are expelled from your mouth which can then be transferred to surfaces that you touch. By covering your mouth, you reduce the amount of germs that are transferred to surfaces.
These two effects together reduce the spread of infection. | 5 |
How can I avoid SQL injection attacks? | The correct way to avoid SQL injection attacks, no matter which database you use, is to separate the data from SQL, so that data stays data and will never be interpreted as commands by the SQL parser. It is possible to create an SQL statement with correctly formatted data parts, but if you don't fully understand the details, you should always use prepared statements and parameterized queries. These are SQL statements that are sent to and parsed by the database server separately from any parameters. This way it is impossible for an attacker to inject malicious SQL.
You basically have two options to achieve this:
1. Using PDO (for any supported database driver):
```
$stmt = $pdo->prepare('SELECT * FROM employees WHERE name = :name');
$stmt->execute([ 'name' => $name ]);
foreach ($stmt as $row) {
// Do something with $row
}
```
2. Using MySQLi (for MySQL):
Since PHP 8.2+ we can make use of execute_query() which prepares, binds parameters, and executes SQL statement in one method:
```
$result = $dbConnection->execute_query('SELECT * FROM employees WHERE name = ?', [$name]);
while ($row = $result->fetch_assoc()) {
// Do something with $row
}
```
Up to PHP8.1:
```
$stmt = $dbConnection->prepare('SELECT * FROM employees WHERE name = ?');
$stmt->bind_param('s', $name); // 's' specifies the variable type => 'string'
$stmt->execute();
$result = $stmt->get_result();
while ($row = $result->fetch_assoc()) {
// Do something with $row
}
```
If you're connecting to a database other than MySQL, there is a driver-specific second option that you can refer to (for example, pg_prepare() and pg_execute() for PostgreSQL). PDO is the universal option. | 5 |
Why do road bike tires have tread patterns? | The tread on a road bike's tires is really quite unimportant and purely cosmetic. Road bike tires have tread patterns because they sell better, not because they perform better.
Here's some questions to ask to decide about replacing a tire:
* Can you see any of the fabric?
* Are you getting flats more easily than you used to?
* Is any part of the tire bulging out or lumpy?
* Are there visible holes/gashes in the tire?
* Does the wear indicator indicate you should replace? (Some tires have dimples or grooves that are there to indicate when the tire should be replaced. Some have an alternate color of rubber underneath, and when that shows through the tire should be replaced)
Smooth tread is actually ideal for road conditions, but not commonly found on tires. If you're on hard surfaces such as pavement/asphalt, the tread doesn't help you and actually slightly reduces contact area and increases rolling resistance. On most road tires the minimal tread pattern is just cosmetic to make their customers feel better (since a smooth tire looks slippery).
See also: Sheldon Brown's comments on tire replacement and tread patterns
If you plan to ride through mud, sand or other soft surfaces, you need tread. So when you no longer have tread on your mountain bike or cyclocross bike's tires, it's time to replace them (unless you plan to only use them on the road). | 5 |
What jobs will be fully automated by the 2030's? | Here are some examples of jobs that may become fully automated by the 2030's:
* Truck Drivers. With the current pace of advances in AI, we may see more and more semi-autonomous and even fully-autonomous vehicles on the road over the next few years. As of 2021, there are about 3.5 million truck drivers in the US alone, many of which may be replaced by fully-autonomous trucks by 2030.
* Customer Service Representatives. As of the early 2020's, text and voice-based chatbots are already supplementing agents in call centers. This trend is expected to grow exponentially, especially with the recent surge in large language models, to a point where only a handful of human representatives may be needed to assist with extreme cases.
* Professional Translators. Machine translation is already commoditized via Google Translate and similar products. As this technology becomes more robust, it is easy to imagine official documents and even novels being translated into dozens of languages at a flip of a switch.
It is important to remember that these suggestions are speculative, since technological advances and their impact on society are hard to predict. | 5 |
Java has static nested classes but it sounds like you're looking for a top-level static class. Java has no way of making a top-level class static but you can simulate a static class like this:
* Declare your class ```final``` - Prevents extension of the class since extending a static class makes no sense
* Make the constructor ```private``` - Prevents instantiation by client code as it makes no sense to instantiate a static class
* Make all the members and functions of the class ```static``` - Since the class cannot be instantiated no instance methods can be called or instance fields accessed
* Note that the compiler will not prevent you from declaring an instance (non-static) member. The issue will only show up if you attempt to call the instance member
Simple example per suggestions from above:
```public class TestMyStaticClass {
public static void main(String []args){
MyStaticClass.setMyStaticMember(5);
System.out.println("Static value: " + MyStaticClass.getMyStaticMember());
System.out.println("Value squared: " + MyStaticClass.squareMyStaticMember());
// MyStaticClass x = new MyStaticClass(); // results in compile time error
}
}
// A top-level Java class mimicking static class behavior
public final class MyStaticClass {
private MyStaticClass () { // private constructor
myStaticMember = 1;
}
private static int myStaticMember;
public static void setMyStaticMember(int val) {
myStaticMember = val;
}
public static int getMyStaticMember() {
return myStaticMember;
}
public static int squareMyStaticMember() {
return myStaticMember * myStaticMember;
}
}
```
What good are static classes? A good use of a static class is in defining one-off, utility and/or library classes where instantiation would not make sense. A great example is the Math class that contains some mathematical constants such as PI and E and simply provides mathematical calculations. Requiring instantiation in such a case would be unnecessary and confusing. See the ```Math``` class and source code. Notice that it is ```final``` and all of its members are ```static```. If Java allowed top-level static classes, the ```Math``` class would be a static class.
```public class Math {
public static final double PI = 3.14159265358979323 | Java has static nested classes but it sounds like you're looking for a top-level static class. Java has no way of making a top-level class static but you can simulate a static class like this:
* Declare your class ```final``` - Prevents extension of the class since extending a static class makes no sense
* Make the constructor ```private``` - Prevents instantiation by client code as it makes no sense to instantiate a static class
* Make all the members and functions of the class ```static``` - Since the class cannot be instantiated no instance methods can be called or instance fields accessed
* Note that the compiler will not prevent you from declaring an instance (non-static) member. The issue will only show up if you attempt to call the instance member
Simple example per suggestions from above:
```public class TestMyStaticClass {
public static void main(String []args){
MyStaticClass.setMyStaticMember(5);
System.out.println("Static value: " + MyStaticClass.getMyStaticMember());
System.out.println("Value squared: " + MyStaticClass.squareMyStaticMember());
// MyStaticClass x = new MyStaticClass(); // results in compile time error
}
}
// A top-level Java class mimicking static class behavior
public final class MyStaticClass {
private MyStaticClass () { // private constructor
myStaticMember = 1;
}
private static int myStaticMember;
public static void setMyStaticMember(int val) {
myStaticMember = val;
}
public static int getMyStaticMember() {
return myStaticMember;
}
public static int squareMyStaticMember() {
return myStaticMember * myStaticMember;
}
}
```
What good are static classes? A good use of a static class is in defining one-off, utility and/or library classes where instantiation would not make sense. A great example is the Math class that contains some mathematical constants such as PI and E and simply provides mathematical calculations. Requiring instantiation in such a case would be unnecessary and confusing. See the ```Math``` class and source code. Notice that it is ```final``` and all of its members are ```static```. If Java allowed top-level classes to be declared ```static``` then the Math class would indeed be static. | 5 |
I can sprint with my character in Skyrim, but I can't sprint with my horse. Why is that? | Don't forget that you can sprint with a horse. It might be that you know that you can sprint on your character, but not on your horse. Please note that your horse is also able to sprint using stamina. You can do this using the default Alt key.
Horses are indeed faster, transportation was simplified.
Since Oblivion, they took Acrobatics and Athletics skills away, thus you can't improve your speed in such way anymore that it would be faster than a horse. The speed improvements by not being Fatigued and not being overweight are not enough to be significant.
All horses in Skyrim have the same speed and hardiness, they are all draft types that resemble a Clydesdale, and all cost 1000 septims.
— Wikia - Elder Scrolls V: Skyrim - Horse
All horses in Skyrim are the same, seems that they wanted to simplify the whole transportation idea.
Restrictions apply on both your character and horse.
Without mods, a horse can't be used inside a city. If you do a lot of role-playing within cities having a horse might not be useful. At the same time, characters are limited in Skyrim as Raven Dreamer noted; while you can get over some mountains by jumping left and right trying to get over a rock, a horse will be more superior in performing this task as it is less restricted by physics. You can however be smart enough to choose your path right, rather than trying to work against the physics... | 5 |
What is the Ark of the Covenant in Indiana Jones and the Last Crusade? | There was a deleted scene that explained it:
A plot element involving the Ark of the Covenant was cut from the film and is only hinted at during the finale when the Ark is opened.
Basically, there were 2 rules about the Ark not mentioned in the final cut of the film:
* If you touch the Ark, you die
* If you look at the Ark when it is opened, you die
This is first explained in additional dialogue for the scene when Indy and Sallah visit Imam. Before translating the writings on the headpiece that give the height of the Staff of Ra, Imam warns Indy not to touch the Ark or look at it when it is opened.
[Source]
The next scene involving this Ark subplot is when Sallah and Indy remove the Ark from the Well of the Souls. When Sallah first sees it he reaches out to touch it. Indy stops him before he does and reminds him of Imam's warning. Then they insert long poles through each side of the Ark to lift it out of its crypt.
[Source]
Notice that nobody ever touches the Ark throughout the rest of the film until the finale.
And from the Bible (King James Version):
1 Samuel 6:19:
And he smote the men of Bethshemesh, because they had looked into the ark of the Lord, even he smote of the people fifty thousand and threescore and ten men...
2 Samuel 6:6-7
And when they came to Nachon's threshingfloor, Uzzah put forth his hand to the ark of God, and took hold of it; for the oxen shook it. And the anger of the Lord was kindled against Uzzah; and God smote him there for his error; and there he died by the ark of God.
| 5 |
How would the discovery of live dinosours affect the world? | The discovery of live dinosours would be a major scientific breakthrough and would have a number of implications for science, history and society.
First, scientists would go nuts. The discovery of any new species is big news, but the discovery of a population of new species that are dinosaurs would be the biggest scientific discovery of all time. Paleontologists would fight tooth and claw to be the first to study them. The island would be immediately declared a nature preserve and probably a UNESCO World Heritage Site. The country that owns the island (if it's a country that has a good relationship with the scientific community) would be overjoyed at all the scientific attention and would do everything they could to help the scientists study the dinosaurs.
Second, the public would also go nuts. It would get a lot of media coverage. There would be huge demand for tours to the island, as much to see the dinosaurs as to see the amazing new species of plants and other animals that would almost certainly be found there as well. The country that owns the island would be overjoyed at all the income from tourists and would do everything they could to set up tours, as long as the scientists didn't object too strongly.
Third, there'd be a lot of debates about whether to clone them, whether it was ethical to bring them back to civilization and what impacts they would have on the ecosystem and society.
Overall, the discovery of live dinosours is a momentous event and it needs lots of discussions and careful actions to figure out what is the best way to manage the dinosours. | 5 |
Is it a rule or a guideline that the GetHashCode method should return the same value for two equal objects? | The answer is mostly, it is a valid guideline, but perhaps not a valid rule. It also doesn't tell the whole story.
The point being made is that for mutable types, you cannot base the hash code on the mutable data because two equal objects must return the same hash code and the hash code has to be valid for the lifetime of the object. If the hash code changes, you end up with an object that gets lost in a hashed collection because it no longer lives in the correct hash bin.
For example, object A returns hash of 1. So, it goes in bin 1 of the hash table. Then you change object A such that it returns a hash of 2. When a hash table goes looking for it, it looks in bin 2 and can't find it - the object is orphaned in bin 1. This is why the hash code must not change for the lifetime of the object, and just one reason why writing GetHashCode implementations is a pain in the butt.
A guideline is just a guide, not a rule. In reality, ```GetHashCode``` only has to follow these guidelines when things expect the object to follow the guidelines, such as when it is being stored in a hash table. If you never intend to use your objects in hash tables (or anything else that relies on the rules of ```GetHashCode```), your implementation doesn't need to follow the guidelines. When you see "for the lifetime of the object", you should read "for the time the object needs to co-operate with hash tables" or similar. Like most things, ```GetHashCode``` is about knowing when to break the rules. | 5 |
What is 25/2 of a milligram? | Here is the solution:
25/2 of a milligram is 12.5 milligram.
Since 1 milligram = 1,000 micrograms, 25/2 of a milligram = 12.5 * 1,000 = 12,500 micrograms. | 5 |
What was your first impression of being on the surface of the moon? | My first words of my impression of being on the surface of the Moon that just came to my mind was "magnificent desolation." The magnificence of human beings, humanity, Planet Earth, maturing the technologies, imagination and courage to expand our capabilities beyond the next ocean, to dream about being on the Moon, and then taking advantage of increases in technology and carrying out that dream - achieving that is magnificent testimony to humanity. But it is also desolate - there is no place on earth as desolate as what I was viewing in those first moments on the Lunar Surface.
Because I realized what I was looking at, towards the horizon and in every direction, had not changed in hundreds, thousands of years. Beyond me I could see the moon curving away - no atmosphere, black sky. Cold. Colder than anyone could experience on Earth when the sun is up- but when the sun is up for 14 days, it gets very, very hot. No sign of life whatsoever.
That is desolate. More desolate than any place on Earth. | 5 |
ASCII has 128 code points, 0 through 127. It can fit in a single 8-bit byte, the values 128 through 255 tended to be used for other characters. With incompatible choices, causing the code page disaster. Text encoded in one code page cannot be read correctly by a program that assumes or guessed at another code page.
Unicode came about to solve this disaster. Version 1 started out with 65536 code points, commonly encoded in 16 bits. Later extended in version 2 to 1.1 million code points. The current version is 6.3, using 110,187 of the available 1.1 million code points. That doesn't fit in 16 bits anymore.
Encoding in 16-bits was common when v2 came around, used by Microsoft and Apple operating systems for example. And language runtimes like Java. The v2 spec came up with a way to map those 1.1 million code points into 16-bits. An encoding called UTF-16, a variable length encoding where one code point can take either 2 or 4 bytes. The original v1 code points take 2 bytes, added ones take 4.
Another variable length encoding that's very common, used in *nix operating systems and tools is UTF-8, a code point can take between 1 and 4 bytes, the original ASCII codes take 1 byte the rest take more. The only non-variable length encoding is UTF-32, takes 4 bytes for a code point. Not often used since it is pretty wasteful. There are other ones, like UTF-1 and UTF-7, widely ignored.
An issue with the UTF-16/32 encodings is that the order of the bytes will depend on the endian-ness of the machine that created the text stream. So add to the mix UTF-16BE, UTF-16LE, UTF-32BE and UTF-32LE.
Having these different encoding choices brings back the code page disaster to some degree, along with heated debates among programmers which UTF choice is "best". Their association with operating system defaults pretty much draws the lines. One counter-measure is the definition of a BOM (Byte Order Mark) at the start of a text stream, to indicate the endian-ness of the text. | ASCII has 128 code points, 0 through 127. It can fit in a single 8-bit byte, the values 128 through 255 tended to be used for other characters. With incompatible choices, causing the code page disaster. Text encoded in one code page cannot be read correctly by a program that assumes or guessed at another code page.
Unicode came about to solve this disaster. Version 1 started out with 65536 code points, commonly encoded in 16 bits. Later extended in version 2 to 1.1 million code points. The current version is 6.3, using 110,187 of the available 1.1 million code points. That doesn't fit in 16 bits anymore.
Encoding in 16-bits was common when v2 came around, used by Microsoft and Apple operating systems for example. And language runtimes like Java. The v2 spec came up with a way to map those 1.1 million code points into 16-bits. An encoding called UTF-16, a variable length encoding where one code point can take either 2 or 4 bytes. The original v1 code points take 2 bytes, added ones take 4.
Another variable length encoding that's very common, used in *nix operating systems and tools is UTF-8, a code point can take between 1 and 4 bytes, the original ASCII codes take 1 byte the rest take more. The only non-variable length encoding is UTF-32, takes 4 bytes for a code point. Not often used since it is pretty wasteful. There are other ones, like UTF-1 and UTF-7, widely ignored.
An issue with the UTF-16/32 encodings is that the order of the bytes will depend on the endian-ness of the machine that created the text stream. So add to the mix UTF-16BE, UTF-16LE, UTF-32BE and UTF-32LE.
Having these different encoding choices brings back the code page disaster to some degree, along with heated debates among programmers which UTF choice is "best". Their association with operating system defaults pretty much draws the lines. One counter-measure is the definition of a BOM, the Byte Order Mark, a special codepoint (U+FEFF, zero width space) at the beginning of a text stream that indicates how the rest of the stream is encoded. It indicates both the UTF encoding and the endianess and is neutral to a text rendering engine. Unfortunately it is optional and many programmers claim their right to omit it so accidents are still pretty common. | 5 |
Write a poem about a man who struggles with his body, heart, and mind. | He with body waged a fight,
But body won; it walks upright.
Then he struggled with the heart;
Innocence and peace depart.
Then he struggled with the mind;
His proud heart he left behind.
Now his wars on God begin;
At stroke of midnight God shall win. | 5 |
How do I push a tag in git? | In default git remote configuration you have to push tags explicitly (while they are fetched automatically together with commits they point to). You need to use
```
$ git push <remote> tag <tagname>
```
to push a single tag,
```
$ git push <remote> --tags
```
to push all tags (or ```git push --tags``` to push to default remote, usually ```origin```).
This is very much intended behavior, to make pushing tags explicit. Pushing tags should be usually conscious choice. | 5 |
## Prevention
1. Cover your mouth and nose when you cough or sneeze. Use a disposable tissue and flush it down the toilet or throw it in a trash can immediately (don't put it down on any surface). Wash your hands or use hand sanitizer right afterwards. If you don't have anything to cough or sneeze into, cough or sneeze into the inside of your elbow rather than your hand. Change your clothing (if you were wearing long sleeves) or wash your arm as soon as you can. Carry tissues with you and offer them to others.
2. Keep your hands clean. Wash your hands throughout the day, especially after touching other people or any surface that others have touched. Carry alcohol-based sanitizer with you. Offer it to others. Avoid touching your face unless your hands are just cleaned.
3. Don't share utensils or drinks. In cafeteria settings, it's not uncommon for people to casually share utensils or take a sip from someone else's drink. This should be completely avoided if there is any risk of a flu pandemic.
4. Wear a face mask or respirator as instructed by authorities. If used correctly, face masks and respirators may help prevent some exposure to flu viruses. However, face masks should be used along with other preventive measures, such as frequent hand washing.
5. Stay healthy. Get plenty of sleep, be physically active, manage your stress, drink plenty of fluids, and eat nutritious food. The healthier you are, the better your immune system will be at defending your body against a virus.
## Preparation
1. Know what to expect. A vaccine for pandemic flu may not be available for 4-6 months after a pandemic starts, and even then, it may only be available in limited amounts. People will have little or no immunity to pandemic flu since it is a new virus to humans. With seasonal flu, people have some immunity built up from previous exposure to the viruses. Symptoms of pandemic flu may be more severe than seasonal flu. More people are likely to die from pandemic flu than from seasonal flu.
2. Make a plan. Discuss with your family and co-workers how you will work together during a pandemic. Discuss how you will care for each other if you get sick. Discuss how you | ## Prevention
1. Cover your mouth and nose when you cough or sneeze. Use a disposable tissue and flush it down the toilet or throw it in a trash can immediately (don't put it down on any surface). Wash your hands or use hand sanitizer right afterwards. If you don't have anything to cough or sneeze into, cough or sneeze into the inside of your elbow rather than your hand. Change your clothing (if you were wearing long sleeves) or wash your arm as soon as you can. Carry tissues with you and offer them to others.
2. Keep your hands clean. Wash your hands throughout the day, especially after touching other people or any surface that others have touched. Carry alcohol-based sanitizer with you. Offer it to others. Avoid touching your face unless your hands are just cleaned.
3. Don't share utensils or drinks. In cafeteria settings, it's not uncommon for people to casually share utensils or take a sip from someone else's drink. This should be completely avoided if there is any risk of a flu pandemic.
4. Wear a face mask or respirator as instructed by authorities. If used correctly, face masks and respirators may help prevent some exposure to flu viruses. However, face masks should be used along with other preventive measures, such as frequent hand washing.
5. Stay healthy. Get plenty of sleep, be physically active, manage your stress, drink plenty of fluids, and eat nutritious food. The healthier you are, the better your immune system will be at defending your body against a virus.
## Preparation
1. Know what to expect. A vaccine for pandemic flu may not be available for 4-6 months after a pandemic starts, and even then, it may only be available in limited amounts. People will have little or no immunity to pandemic flu since it is a new virus to humans. With seasonal flu, people have some immunity built up from previous exposure to the viruses. Symptoms of pandemic flu may be more severe than seasonal flu. More people are likely to die from pandemic flu than from seasonal flu.
2. Stock up. Store nonperishable foods, bottled water, over-the-counter drugs, health supplies, and other necessities. The U.S. Department of Health and Human Services (HHS) recommends having a 2-week supply. (These supplies can be useful in other types of emergencies, such as power outages.) Have basic, over-the-counter health supplies such as a thermometer, facemasks, tissues, soap, hand sanitizers, medicine to relieve fever, and cold medicine.
3. Plan ahead. Plan for what you will do in the following cases:
* Schools dismissed: Consider childcare needs. Plan home learning activities and exercises. Have materials, such as books, on hand. Also plan recreational activities that your children can do at home. You or family member becomes sick and requires care: Make plans for how to care for people with special needs in case the services they rely on are not available. Plan to stay home for at least 10 days when you are sick with pandemic flu. Staying home will keep you from giving it to others. Make sure others in your household also stay home when they are sick. During a severe pandemic, stay home if someone in your household is sick with pandemic flu. Transportation networks disrupted. Think about how you can rely less on public transportation during a pandemic. For example, store food and other essential supplies so you can make fewer trips to the store. Prepare backup plans for taking care of loved ones who are far away. Consider other ways to get to work, or, if you can, work at home.
4. Talk to your employer. Ask your employer about how business will continue during a pandemic. You can Develop a Risk Management Plan that accounts for the possibility of a flu pandemic. Find out if you can work from home, or if your employer will consider virtualizing the workforce. Plan for the possible reduction or loss of income if you are unable to work or your place of employment is closed. Check with your employer or union about leave policies.
5. Stay updated. Identify sources you can count on for reliable information. If a pandemic occurs, having accurate and reliable information will be critical. Reliable, accurate, and timely information is available at http://www.pandemicflu.gov. Another source for information on pandemic influenza is the Centers for Disease Control and Prevention (CDC) Hotline at: 1-800-CDC-INFO (1-800-232-4636). This line is available in English and Spanish, 24 hours a day, 7 days a week. TTY: 1-888-232-6348. If you do not live in the U.S., check if there is an equivalent hotline in your area. Look for information on your local and state government Web sites. Review your state's planning efforts and those of your local public health and emergency preparedness officials. Listen to local and national radio, watch news reports on television, and read your newspaper and other sources of printed and Web-based information.
| 5 |
Often you are required to construct some angles without using a protractor. The following answer teaches you how to draw a 90 degrees angle using a compass and a ruler.
## At the end of a line segment
1. Mark the vertex of your angle anywhere on the paper. Let us name this point as M.
2. Draw a ray MN, extending in any direction and of any length. This will be one of the arms of our angle.
3. Place tip of the compass on point M and draw a circle cutting the ray MN at some point (say P).
4. Keep the width of the compass the same. Then place its tip on P and draw an arc cutting the circle at some point (say Q).
5. Keep the width of the compass the same. Place its tip on Q and draw another arc cutting the circle at another point (say R).
6. Keep the tip of the compass still on Q. Draw another arc somewhere outside the circle. For carrying out this step, you can set the width of the compass to any measure.
7. Keep the same width of the compass (as set in the previous step). Now place its tip on R and draw another arc which cuts the arc drawn in the previous step at some point (say S).
8. Connect the points M and S with a straight line. Extend it to form a ray ML. The measure of the angle LMN is 90.
## Through the middle of a line segment
1. Draw a straight line. On a piece of paper, draw a line segment of any convenient length. Make it horizontal for the sake of simplicity, but it could be at any angle. Label the line segment AB.
2. Pick any point on AB. Mark it, and label it O. O can be anywhere on the line segment, including at either end point (A or B). For convenience, let's put O somewhere near the middle of AB. The line segment could now be referred to as AOB.
3. Grab a compass. Open the compass to a radius a little shorter than either AO or OB. Now place the compass point at O. Strike short arcs through AB on either side of O. The two arcs should have the same radius. Label those two points of intersection C and D. Now the line segment could be referred to as ACD.
4. Place the compass point at D. Strike short arcs through AB on either side of D. The two arcs should have the same radius. Label those two points of intersection E and F | Often you are required to construct some angles without using a protractor. The following answer teaches you how to draw a 90 degrees angle using a compass and a ruler.
## At the end of a line segment
1. Mark the vertex of your angle anywhere on the paper. Let us name this point as M.
2. Draw a ray MN, extending in any direction and of any length. This will be one of the arms of our angle.
3. Place tip of the compass on point M and draw a circle cutting the ray MN at some point (say P).
4. Keep the width of the compass the same. Then place its tip on P and draw an arc cutting the circle at some point (say Q).
5. Keep the width of the compass the same. Place its tip on Q and draw another arc cutting the circle at another point (say R).
6. Keep the tip of the compass still on Q. Draw another arc somewhere outside the circle. For carrying out this step, you can set the width of the compass to any measure.
7. Keep the same width of the compass (as set in the previous step). Now place its tip on R and draw another arc which cuts the arc drawn in the previous step at some point (say S).
8. Connect the points M and S with a straight line. Extend it to form a ray ML. The measure of the angle LMN is 90.
## Through the middle of a line segment
1. Draw a straight line. On a piece of paper, draw a line segment of any convenient length. Make it horizontal for the sake of simplicity, but it could be at any angle. Label the line segment AB.
2. Pick any point on AB. Mark it, and label it O. O can be anywhere on the line segment, including at either end point (A or B). For convenience, let's put O somewhere near the middle of AB. The line segment could now be referred to as AOB.
3. Grab a compass. Open the compass to a radius a little shorter than either AO or OB. Now place the compass point at O. Strike short arcs through AB on either side of O. The two arcs should have the same radius. Label those two points of intersection C and D. Now the line segment could be referred to as ACODB.
4. Strike two more arcs. Place the compass point at C, and strike an arc to one side of the line segment. Then place the compass point at D, and strike a second arc of the same radius and on the same side of the line segment. Make sure those two arcs intersect. Call that point of intersection E.
5. Draw the 90° angle. Draw a straight line from E to O. Line segment EO forms a 90° angle with line segment AB. It actually forms two 90° angles at O. If you were to extend EO beyond AB, you would form four 90° angles at O.Note that you can draw a 90° angle at either end of line segment AB if you want to (in other words at point A or point B). Simply extend AB beyond A or beyond B, and then follow the above steps. Point A (or point B) would serve as point O in the above instructions. This is essentially the same method featured in How to Construct a Perpendicular Line to a Given Line Through Point on the Line, Method 2.
| 5 |
If you own real property (a home or land) in the United States, you are responsible for paying state property taxes each year. While these taxes are assessed through the county where the property is located, most counties in each state allow property owners to pay their taxes online. The specific information you need to pay your property taxes online depends on where your property is located.
## Calculate your payments
1. Look on your tax bill. You should receive an annual property tax statement in the mail that provides information about the amount of tax you owe each year. This statement also has other information, such as a property identification number or PIN, that may be necessary for you to pay your taxes online. Your tax bill may not include any delinquent taxes, or any other tax assessments, such as supplemental taxes. Those typically are sent separately.
2. Check online if you haven't received a bill. Just because you don't receive a bill doesn't mean you don't owe property taxes. In most states and counties, you can find out how much tax you owe by going to your state or county's property tax website. The amount of tax online typically will be more up to date than what's on your bill, so even if you have your bill handy you may want to check online. If there's a discrepancy, go by the amount online rather than the amount on your bill. Unfortunately, you may need a PIN or identification number located on the bill to access your tax amount online.
3. Call the tax assessor's office if you need more information. If you haven't received a bill and can't find the amount you owe on the website, you can always call the tax assessor's office and ask. The clerk should be able to give you the total amount of property tax you owe, as well as any other information you need, such as a PIN, so you can pay your taxes online.
4. Confirm the types of property tax you owe. Some states or counties may have different types of property taxes that you'll have to pay. You may have to check for different types separately. For example, in California you may have secured and unsecured property taxes. Unsecured property taxes are taxes on watercraft, airplanes and other personal property. Secured property taxes are taxes on real property, such as homes and land.
## Pay your property taxes online
1. Go to your state or county's property tax website. If you | If you own real property (a home or land) in the United States, you are responsible for paying state property taxes each year. While these taxes are assessed through the county where the property is located, most counties in each state allow property owners to pay their taxes online. The specific information you need to pay your property taxes online depends on where your property is located.
## Calculate your payments
1. Look on your tax bill. You should receive an annual property tax statement in the mail that provides information about the amount of tax you owe each year. This statement also has other information, such as a property identification number or PIN, that may be necessary for you to pay your taxes online. Your tax bill may not include any delinquent taxes, or any other tax assessments, such as supplemental taxes. Those typically are sent separately.
2. Check online if you haven't received a bill. Just because you don't receive a bill doesn't mean you don't owe property taxes. In most states and counties, you can find out how much tax you owe by going to your state or county's property tax website. The amount of tax online typically will be more up to date than what's on your bill, so even if you have your bill handy you may want to check online. If there's a discrepancy, go by the amount online rather than the amount on your bill. Unfortunately, you may need a PIN or identification number located on the bill to access your tax amount online.
3. Call the tax assessor's office if you need more information. If you haven't received a bill and can't find the amount you owe on the website, you can always call the tax assessor's office and ask. The clerk should be able to give you the total amount of property tax you owe, as well as any other information you need, such as a PIN, so you can pay your taxes online.
4. Confirm the types of property tax you owe. Some states or counties may have different types of property taxes that you'll have to pay. You may have to check for different types separately. For example, in California you may have secured and unsecured property taxes. Unsecured property taxes are taxes on watercraft, airplanes, or temporary fixtures that are not connected to real property. These may be listed separately, or included on separate websites. Depending on where you live, certain types of property taxes may not be included in the online information. For example, the property tax website for Cook County, Illinois, does not include amounts for back taxes, air pollution taxes, and some other types of property taxes.
5. Confirm due dates for taxes owed. On the tax assessor's website, you'll find information about the dates property taxes are due each year. If you have any delinquent taxes, they typically are considered due immediately. If you pay your taxes on or before the due dates you'll avoid penalties, interest, and other fees. Plan ahead, especially if you won't be able to pay the total amount all at once.
6. Determine how much of your taxes you can pay. Particularly if you have delinquent taxes, you may not be able to pay all of your taxes at once. Access the website well before the due date, if possible, so you can budget for your payments accordingly.
7. Check to see if your mortgage company is paying your property taxes. If you have a mortgage on your property, your monthly mortgage payment may include an escrow amount that goes to pay your property taxes. When property taxes are due, your mortgage company will withdraw the money from the escrow account and pay them on your behalf. You typically still will get a bill or property tax statement, even though you don't owe anything. Check with your mortgage company if you're not sure so you don't end up paying twice.
## Make your payments
1. Visit your county or state's property tax website. Property taxes are assessed by county governments. The easiest way to find your county's property tax website is to check on your state's website for a link. Your state will have a .gov web address, so you can be assured that the link you find from the state website is the legitimate website for your county. This way you can make sure you keep all your information secure.
2. Enter information for your property. The information you need to enter to access your account and pay your taxes online differs among states and counties. Typically you'll have a PIN or property identification number that you must enter to correctly find your property. A street address typically isn't enough, because property may be assessed using parcel numbers or some other system of organization.
3. Do a search for your property. Some property tax assessors may allow you to look up the property identification number you need on the website itself. Others may require you to call the county tax assessor's office to get the information you need. If you don't have the information you need, look for a link that will allow you to search for your property. When you click on the link to pay your taxes, there should be a link close to the space where you would enter the information that you can follow to get the information you need.
4. Review acceptable methods of payment. Depending on the county, different methods of payment are accepted if you want to pay your property taxes online. Some methods of payment may come with an additional fee. If you pay using an electronic check, you typically won't have to pay a fee. Using a debit or credit card may incur a fee ranging from a few dollars to 2 or 3 percent of the amount of your payment.
5. Make your payment. Once you've entered the information you need and chosen your method of payment, simply enter the amount of money you want to pay along with your payment information to pay your property taxes online.
6. Print your confirmation. Once you've submitted your payment, you'll typically get a confirmation screen that will include a unique confirmation number and an option to print the page for your records. You may also get a confirmation through email. If you get an email confirmation you don't necessarily have to print a paper copy, just make sure to save the email.
## Use other online resources
1. Create a portfolio. If you own several parcels of property in the same state or county, you may be able to create a portfolio of properties on your state or county's property tax website. The portfolio allows you to manage all of your property taxes in one place. Look for a link on the property tax page that will allow you to create a portfolio, and follow the instructions. If you don't see a link, look for a FAQ page and see if anything is listed about how to link multiple properties.
2. Set up recurring payments. Some states and counties allow you to enter payment information once and schedule payments, which are automatically deducted from your bank account or credit card. If you have the option to schedule payments, this can be helpful with budgeting. You can schedule a partial payment each month so you don't have to pay the whole thing all at once. Mark your payment dates on your calendar or set a reminder on your phone so you don't forget that the payment is coming out.
3. Subscribe to email notifications. Some counties provide email notifications that will alert you before the due date for property taxes, or when there have been changes to your account. If you weren't able to set up recurring payments, these notifications can help you ensure you don't miss a due date and incur additional penalties and fees. If you subscribe to email notifications, you may want to add the email address to your contacts list or preferred addresses list. This will ensure you actually receive the notifications and they don't fall into your spam folder.
4. Apply for a payment plan. Most counties allow you to set up a payment plan if you have delinquent property taxes. You typically have to fill out an application, and may be subject to a credit check. Some counties also allow payment plans even if your taxes are current, if you anticipate you won't be able to pay the amount in full by the due date. If this option is available to you, it can save you in potential late fees and penalties. A payment plan typically requires the payments to be automatically debited from your bank account.
| 5 |
Write a job posting for a project manager position. | Job Position: Project Manager
Location: [Location to be filled]
Company Description:
[Provide a brief description of the company.]
Job Overview:
We are seeking an experienced Project Manager with exceptional skills to join our team. The selected candidate will be responsible for managing projects from initiation to completion, ensuring that they are delivered on time, within budget, and to the satisfaction of all stakeholders.
Responsibilities:
* Effectively manage project timelines, budgets, and resources
* Ensure all project activities adhere to established policies and procedures
* Conduct regular status meetings with project teams and stakeholders
* Develop, implement, and communicate project plans and progress reports to team members and stakeholders
* Maintain accurate records of project activities for reporting and invoicing purposes
Qualifications:
* A degree in Engineering, Business Administration, or a related field
* A minimum of [Insert number] years of experience in project management
* Proven ability to manage multiple projects simultaneously
* Strong communication, leadership, and interpersonal skills
* Excellent organizational and time-management skills
* Proficiency in project management software and tools
How to Apply:
[Include instructions on how to apply for the job.] | 5 |
How can I increase the font size on my Ubuntu 14.04 system? | There are some steps to take:
1. System wide Menu and titlebar scaling
Starting with Ubuntu 14.04 we have an option that helps a bit:
Scaling Support
open the System Settings (here in english:)
```LANG=c unity-control-center
```
Go to "Displays" and set the "Scale for menu and title bars".
Since Ubuntu 17.10 the scaling can be set in
```LANG=c gnome-control-center
```
Go to ```Settings > Devices > Displays``` there
see also: How to find and change the screen DPI?
2. Universal Access
Go to "Universal Access" (```unity-control-center universal-access```) and select "Large Text".
Note: not all applications handle this correctly, some will not reserve the extra space, so some UI elements are not accessible with this option!
3.Increase unity dock size
In ```unity-control-center```->```Appearance```->```Look``` at the botom, you can adjust the size.
4. Adapt Firefox
see: Adjust Firefox and Thunderbird to a High DPI touchscreen display (retina)
(or use Chrome, which works fine since Version 41.0.2272.76 Ubuntu 14.10, though Chrome will need to be restarted to take effect)
5. Increase font in Pidgin
There is a plugin you can install:
```sudo apt-get install pidgin-extprefs
```
Then you can increase the font in Plugins->Extended Prefs
6. Create starter for applications that still don't scale
Some applications still don't obey the global scaling (mainly java) for those few applications you can create a starter to only Fix scaling of java-based applications for a high DPI screen
Note: In older Ubuntu versions, with unity-tweak-util in the section "Fonts" you can set the "Text Scaling Factor" to 2.0. This will scale the fonts in most applications to double size. | 5 |
Hello | Nice to meet you! I am an AI assistant, how can I help you today? | 5 |
I blinked, and turned towards the clock which informed me that it was now 2 am. Sleep usually found me easily, and yet tonight, I was left thinking about what I'd read in that book I'd just | I blinked yet again, and turned towards the clock which informed me that it was now 3 am. Sleep usually found me easily, and yet tonight, I was left thinking about what I'd read in that book I'd just bought.
A world in which some had more money than others? A world in which young children were left to starve while others received new toys every day? A world in which men, heterosexuals, and white people dominated? How could such an unequal society exist, even in a book?
The worst part was that everyone expected something in that world. Nothing was done out of the kindness of someone's heart; it was all for their own benefit. Friendships were only created to have someone listen to your problems, and families only talked to one another to feel comfort and safety. Everything was so selfish. How could it be like that?
And yet, I could see the appeal. There seemed something so satisfying with having more than other people, with being above them, superior, even. In a world like ours, where everyone was equal, everything was so... similar.
In fact, I worked hard every day. Why shouldn't I have more than others?
The more I thought about it, the more beautiful the idea seemed. I could taste it, that feeling of pride when I saw how little others had. The envy, the desire, the greed that they'd feel when they saw me... I could taste the power that I'd have. | 5 |
What is the downside of using ```docker exec``` and how can I use ```docker inspect -f``` instead? | The downside of using ```docker exec``` is that it requires a running container, so ```docker inspect -f``` might be handy if you're unsure a container is running.
Example #1. Output a list of space-separated environment variables in the specified container:
```docker inspect -f \
'{{range $index, $value := .Config.Env}}{{$value}} {{end}}' container_name
```
the output will look like this:
```ENV_VAR1=value1 ENV_VAR2=value2 ENV_VAR3=value3
```
Example #2. Output each env var on new line and ```grep``` the needed items, for example, the mysql container's settings could be retrieved like this:
```docker inspect -f \
'{{range $index, $value := .Config.Env}}{{println $value}}{{end}}' \
container_name | grep MYSQL_
```
will output:
```MYSQL_PASSWORD=secret
MYSQL_ROOT_PASSWORD=supersecret
MYSQL_USER=demo
MYSQL_DATABASE=demodb
MYSQL_MAJOR=5.5
MYSQL_VERSION=5.5.52
```
Example #3. Let's modify the example above to get a bash friendly output which can be directly used in your scripts:
```docker inspect -f \
'{{range $index, $value := .Config.Env}}export {{$value}}{{println}}{{end}}' \
container_name | grep MYSQL
```
will output:
```export MYSQL_PASSWORD=secret
export MYSQL_ROOT_PASSWORD=supersecret
export MYSQL_USER=demo
export MYSQL_DATABASE=demodb
export MYSQL_MAJOR=5.5
export MYSQL_VERSION=5.5.52
```
If you want to dive deeper, then go to Go’s text/template package documentation with all the details of the format. | 5 |
How can I prevent less from clearing the screen? | This is actually a function of the terminal emulator you are using (xterm, gnome-terminal, konsole, screen). An alternate screen, or altscreen, gets launched when programs such as ```less``` or ```vim``` are invoked. This altscreen has no history buffer and exits immediately when you quit the program, switching back to the original screen which restores the previous window content history and placement.
You can prevent ```less``` from launch in an altscreen by passing the argument "-X".
```less -X /path/to/some/file```
You can also pass "-X" as an environment variable. So if you are using ```bash```, place this in ```~/.bashrc```:
```export LESS="-X"
```
However, this disbles the termcap (terminal capability) initialization and deinitialization, so other views when you use ```less``` may appear off.
Another option would be to use ```screen``` and set the option ```altscreen off``` in your ```~/.screenrc```. ```less``` will not clear the screen and should preserve color formatting. Presumably ```tmux``` will have the same option. | 5 |
Write a poem about a vampire waiting for his mistress. | Hours,
pass like days,
I wait here in silent desire,
askew across my dark mistress' place of rest,
as she walks the world without me.
Alone.
A roaring noise,
to others it is a annoyance,
as it escapes my hollow lips,
but inside?
I am silent,
For she is not here. | 5 |
Write 10 trivia questions about the human body, based on the provided facts:
1. At what age does the brain stop growing?
2. At what time of day are humans tallest?
3. What is a | Here are 10 trivia questions about the human body, based on the provided facts:
1. At what age does the brain stop growing?
2. At what time of day are humans tallest?
3. What is a negative side effect of blowing out birthday candles?
4. What happens if you rub onion on your feet?
5. Who has more bones: babies or adults?
6. How long do dreams typically last?
7. Why do testicles hang outside the body?
8. If the eye were a camera, what would be its resolution?
9. Where are the smallest bones in the human body?
10. What is the largest organ in the human body? | 5 |
Você pode fazer uploads de arquivos utilizando o método ```POST``` porém deve incluir o FormData com a propriedade ```enctype``` definida como ```multipart/form-data``` para que seus arquivos sejam enviados na requisição.
Contudo, a formatação do envio não vai ser um JSON, mas sim no ```enctype``` que você definir no seu ```FormData```, que dependendo da linguagem que você está utilizando no backend vai ter uma forma diferente de interpretar estes dados.
* application/x-www-form-urlencoded: é o enctype padrão, todos os valores de espaço são convertidos para "+" e caracteres não padrões são convertidos para representação ANSII HEX;
* multipart/form-data: nenhum caractere é convertido, mantendo os valores do formulário intactos, necessário para upload de arquivos;
* text/plain: apenas espaços são convertidos em "+";
Sendo essas as possibilidades, o que está sendo trafegado não é um JSON quando vamos comunicar enviando dados para o servidor. Esses dados são serializados para serem entregues dentro da área de data do método que você esta utilizando pra trafegar via HTTP(S) dentro dos formatos apresentados.
Durante o upload você pode capturar (nos browsers modernos) evento de progresso do upload, conforme no exemplo abaixo.
Exemplo utilizando **jQuery**:
**Formulário**
```<form id="formulario" method="post" enctype="multipart/form-data">
<input type="text" name="campo1" value="hello" />
<input type="text" name="campo2" value="world" />
<input name="arquivo" type="file" />
<input type="submit" value="Enviar" />
</form>```
**Script**
```< | Você pode fazer uploads de arquivos utilizando o método ```POST``` porém deve incluir o FormData com a propriedade ```enctype``` definida como ```multipart/form-data``` para que seus arquivos sejam enviados na requisição.
Contudo, a formatação do envio não vai ser um JSON, mas sim no ```enctype``` que você definir no seu ```FormData```, que dependendo da linguagem que você está utilizando no backend vai ter uma forma diferente de interpretar estes dados.
* application/x-www-form-urlencoded: é o enctype padrão, todos os valores de espaço são convertidos para "+" e caracteres não padrões são convertidos para representação ANSII HEX;
* multipart/form-data: nenhum caractere é convertido, mantendo os valores do formulário intactos, necessário para upload de arquivos;
* text/plain: apenas espaços são convertidos em "+";
Sendo essas as possibilidades, o que está sendo trafegado não é um JSON quando vamos comunicar enviando dados para o servidor. Esses dados são serializados para serem entregues dentro da área de data do método que você esta utilizando pra trafegar via HTTP(S) dentro dos formatos apresentados.
Durante o upload você pode capturar (nos browsers modernos) evento de progresso do upload, conforme no exemplo abaixo.
Exemplo utilizando **jQuery**:
**Formulário**
```<form id="formulario" method="post" enctype="multipart/form-data">
<input type="text" name="campo1" value="hello" />
<input type="text" name="campo2" value="world" />
<input name="arquivo" type="file" />
<button>Enviar</button>
</form>
```
**Javascript**
```$("#formulario").submit(function() {
var formData = new FormData(this);
$.ajax({
url: window.location.pathname,
type: 'POST',
data: formData,
success: function(data) {
alert(data)
},
cache: false,
contentType: false,
processData: false,
xhr: function() { // Custom XMLHttpRequest
var myXhr = $.ajaxSettings.xhr();
if (myXhr.upload) { // Avalia se tem suporte a propriedade upload
myXhr.upload.addEventListener('progress', function() {
/* faz alguma coisa durante o progresso do upload */
}, false);
}
return myXhr;
}
});
});
``` | 5 |
I lost a screw in my carpet. How can I find it? | This is why you should always have spare screws on hand. Fortunately, there is a way:
## Light Method
Most screws are silver. Shine a flashlight into the carpet and look for little silvery glints. This may take some time, but you'll probably find it. If your carpet is unnaturally thick...
## Magnet Method
Take a powerful magnet (like a bar magnet, hardware stores - fridge magnets might work) and run it over the surface where you think the screw is. You should find it. If that still fails...
## Vacuum Method
Take a good vacuum cleaner. Put a sock over the extending arm, and run it over where you think the screw is. The sock will prevent the screw from being vacuumed up, but it will be stuck to the sock. There will still be enough suction to pick up the screw, even with the sock. If not, get a new vacuum! If that fails...
## Organize your screws
There are many useful tools to organize screws. Go to your local RadioShack and get one, or make one out of a magnet for that awesome lifehack feel.
## Stop using carpet!
[Not a "find your screws" method - a tip about not frying your computer]
Carpet can cause static discharge, which is very very very bad for a computer (personal experience). Work on a hard floor with an antistatic strap to reduce the chance of frying your PC. | 5 |
Is the De Beers Group of Companies a diamond cartel that has complete control of the diamond market? | Yes, the De Beers Group of Companies is a diamond cartel that had complete control of the diamond market for most of the 20th century. They still control a sizable portion of the market and their effort at marketing (particularly with the slogan "A Diamond is Forever") has done much to inflate the market for diamonds in our society.
The intrinsic value of diamonds is much lower than the market prices currently reflect, but with the caveat that there is a rarity factor which does drive up the price of larger diamonds.
The larger the diamond, the more likely it is to have flaws, so when it comes to diamonds that are 5 carats or greater, you are not as likely to see a new supply of diamonds disrupt the prices of those larger stones.
Some other ways that high end jewelers and suppliers are differentiating themselves is by patenting a specific cut that they design. This is another barrier to entry that works to create some artificial price inflation. One common example is the Lucida cut sometimes referred to as the Tiffany cut.
Diamonds can also be manufactured. The same carbon structure can be grown in a lab. These stones have the same carbon structure as natural diamonds but without the flaws and visible impurities. Most manufactured diamonds are used industrially, but processes have improved sufficiently to allow for gemstone quality synthetic diamonds. They sell at a decent discount, so that might be an option to consider if you want a substitute. In the years to come, you can expect prices for synthetic diamonds to continue to decrease which will probably put some further downward pressure on jewelers' prices. | 5 |
Are high heels bad for your health? | Yes, high heels can negatively impact your health. Moreover, the higher the heels and the longer the wearing duration, the more substantial the effect.
Some of the potential risks include:
* Toes: The narrow and tight toebox found in many such shoes places a lot of pressure on the toes. This can often leads to bunions, hammertoes, and other conditions which result in foot pain.
* Achilles tendon: High heels tighten up and shorten the achilles tendon, which might cause pain around the heel.
* Calf muscles: Similarly to the achilles tendon, the calf muscles can also shorten over time, as they are constantly flexed while wearing high heels.
* Knees: The altered posture when wearing heels pushes the body forward. This imposes additional force on the knee, which is a frequent site of osteoarthritis among women. | 5 |
There are several different types of confirmation letters, each requiring a slightly different format. Basic confirmation letters written to confirm the details of a meeting, event, or other arrangements are typically brief and to the point. Employment confirmation letters usually include specific terms and conditions, so they may be longer. If you are called upon to write a letter for someone receiving the Catholic sacrament of Confirmation, your letter will be significantly more personal.
## Confirm an employment offer
1. Use business letter format on company letterhead. A formal business letter on company letterhead sets the appropriate tone and establishes the letter as official business communication. Set a standard font and margins, typing the body of the letter in block-paragraph style – single-spaced, with a double-space between paragraphs. Avoid using any abbreviations when you type addresses in formal business letters. For example, instead of typing "123 Main St.," you would type "123 Main Street." If your letterhead includes the address for your business, you can typically eliminate the address block for yourself.Tip: Government and small business agencies may have templates you can download for free that cover all the legal requirements for a formal offer of employment letter.
2. List the job title, salary, and start date. Begin your letter with an enthusiastic tone, welcoming the recipient to the company in their new capacity. You might also include a brief summary of the recipient's job duties unless the job title makes them obvious. For example, you might write: "On behalf of Bob Builders, Inc., I am pleased to offer you the position of Secretary at a salary of $28,500 a year. Your first day will be January 22, 2019."
3. Summarize the terms and conditions of the offer. If there are any limitations to your offer they should be clearly stated. Additionally, if the offer is contingent on anything, those contingencies should be stated up front. For example, the offer may be contingent on a clean background check, or a clean drug test. This section may also include any documents the new employee needs to sign, such as a confidentiality agreement or a non-compete agreement. If you include any contingencies, provide the new employee with a deadline by which those things need to be completed. If you do not include any contingencies, you can simply state that the offer is contingent on nothing. For example, you might write: "This offer is contingent on nothing."
4. Provide contact information. Include your | There are several different types of confirmation letters, each requiring a slightly different format. Basic confirmation letters written to confirm the details of a meeting, event, or other arrangements are typically brief and to the point. Employment confirmation letters usually include specific terms and conditions, so they may be longer. If you are called upon to write a letter for someone receiving the Catholic sacrament of Confirmation, your letter will be significantly more personal.
## Confirm an employment offer
1. Use business letter format on company letterhead. A formal business letter on company letterhead sets the appropriate tone and establishes the letter as official business communication. Set a standard font and margins, typing the body of the letter in block-paragraph style – single-spaced, with a double-space between paragraphs. Avoid using any abbreviations when you type addresses in formal business letters. For example, instead of typing "123 Main St.," you would type "123 Main Street." If your letterhead includes the address for your business, you can typically eliminate the address block for yourself.Tip: Government and small business agencies may have templates you can download for free that cover all the legal requirements for a formal offer of employment letter.
2. List the job title, salary, and start date. Begin your letter with an enthusiastic tone, welcoming the recipient to the company in their new capacity. You might also include a brief summary of the recipient's job duties unless the job title makes them obvious. For example, you might write: "On behalf of Bob Builders, Inc., I am pleased to offer you the position of Secretary at a salary of $28,500 a year. Your first day will be January 22, 2019."
3. Summarize the terms and conditions of the offer. If there are any limitations to your offer they should be clearly stated. Additionally, if the offer is contingent on anything, those contingencies should be stated up front. For example, the offer may be contingent on a clean background check, or a clean drug test. This section may also include any documents the new employee needs to sign, such as a confidentiality agreement or a non-compete agreement. If you include any contingencies, provide the new employee with a deadline by which those things need to be completed. If you're only asking for documents to be signed, you might state that those documents can be signed on the new employee's first day.
4. Provide details about any benefits your company offers. If your company offers health insurance, retirement benefits, educational assistance, paid time off, or other benefits, list those briefly. Let the new employee know when they will be eligible for those benefits, and how they can find out more information about them. Some employers start benefits at day one, but most require employees to work 60 or 90 days before they become eligible for benefits.Tip: While an employment confirmation letter may end up being more than one page, try to make it no longer than two pages. Remove details that the recipient can find on other documents they receive.
5. Close by thanking the recipient. Let the recipient know that you're grateful for their interest in your company and that you're glad they're coming to work with you. Communicate your excitement or enthusiasm for having the new employee join your team. For example, you might say "Thank you so much for your interest in our mission here at Bob Builders, Inc. We're excited to bring you on board and look forward to your contributions." Use a formal closing immediately before your signature, such as "Sincerely" or "Sincerely yours."
6. Include your job title under your name. The business letter template provides 4 blank lines for your signature after the formal closing. Under that space, type your first and last name. Under your name, type your job title and the name of the company. For example, you might type "Director of Operations, Bob Builders, Inc."
7. Proofread your letter carefully. Make sure your letter is free of any typos and spelling or grammatical errors. You may also want someone from human resources to read over the letter and verify that all the content is correct. Double-check numbers in particular. It's easy to transpose digits by mistake, and this can lead to a huge misunderstanding. These types of mistakes could also have legal consequences.
8. Print and sign your letter for mailing. Your letter will look more professional if printed on quality paper. Even if you send an email confirmation, mail an official signed copy as well. Sign the letter in the space provided, using blue or blank ink. Include any credentials, such as "CPA" or "JD," if appropriate. Mail the letter promptly, so that your new employee will receive it well before their planned start date.Tip: It also looks more professional to type the envelope. Most word-processing apps have templates you can use to place the addresses correctly on the envelope.
## Write a catholic confirmation letter
1. Start with a statement about the importance of confirmation. The sacrament of Confirmation deepens baptismal grace, strengthening the bond between the confirmand and the Church. Address the confirmand personally, and congratulate them for taking this step and receiving this sacrament. For example, you might say "As you prepare to receive the sacrament of Confirmation, I am honored to support you as you take this important step to deepen your bond with Christ and the Church." Use words and phrases from the Catholic Catechism to stress the importance of this step in the confirmand's journey of faith.
2. Discuss your relationship with the recipient. Use shared memories and experiences to encourage and build up the confirmand. Supplement your stories with verses from Scripture or other sources. Choose stories or events that demonstrate your love for the recipient and their journey in the faith. For example, you might discuss memories of when the recipient was baptized. Questions the recipient may have asked you about the Church or about your faith are also good jumping-off points for reflection. Don't worry about making this long or overly detailed. Brevity can also be powerful.Tip: It may help to outline your letter before you start writing it. Be prepared to go through several drafts to get it right.
3. Include encouraging or inspirational quotes from Scripture. Use quotes to further express the meaning of the sacrament and the teachings of the Church. You can search online or use the Bible's concordance to find quotes that resonate with you. For example, you might try "The name of the Lord is a strong tower; the righteous run to it and are safe." (Proverbs 18:10). Another encouraging quote is "For I know the plans I have for you, says the Lord, plans for welfare and not for evil and not for harm, to give you a future with hope." (Jeremiah 29:11). You might also try "I can do all things through Christ who strengthens me." (Philippians 4:13).
4. Assure the recipient that they have your support. Close your letter by letting the recipient know that you support them on their journey and are praying for them. Thank the recipient for being in your life and bringing you love and joy. For example, you might write "I am extremely proud of you, and all the blessings you have brought to my life. I am honored to be your Confirmation sponsor, and pray that you will continue to grow in faith, hope, and charity. "Variation: If you know the recipient's confirmation name, you might close your letter with a prayer to that saint.
5. Write your final letter by hand to make it more personal. Formal letters are typically typed. However, a handwritten confirmation letter feels more personal and authentic, as though it came straight from the heart. This can be a great touch to add. If you're going to write your letter by hand, go slowly. Write as neatly as possible, and make sure you aren't introducing any errors. It can help to type your letter out first and then copy it.
## Draft other formal confirmation letter
1. Type your letter in formal business letter format. A formal business letter communicates that you are serious and sets the proper tone for your letter. Most word processing apps include a business letter template that you can use to type your confirmation letter. Use a standard font, such as Times New Roman or Arial. In a legal sense, a confirmation letter also may be used to create a record of an agreement made orally. The formal business letter format is appropriate, as these letters may be used as evidence in court. Because confirmation letters are typically extremely brief, you may find that your letter only has a single paragraph. It should never be longer than a page.
2. Use an appropriate salutation. Typically you'll start the salutation line with the word "dear," followed by "Mr." or "Ms." and the first and last name of the recipient of the letter. Place a colon at the end of the person's name to start the letter. If the person is a doctor, use "Dr."
* If you don't know the recipient's gender identity, simply use their first and last name. Don't use the abbreviation "Mrs." unless you know the recipient is a married woman who prefers that title.
3. Confirm the specific arrangement made. There's no reason for any extended introduction or pleasantries in a confirmation letter. Get straight to the point of the event or arrangement you're confirming. This will likely include dates, times, and locations. For example, you might start the letter "This letter is to confirm" or "I am writing to confirm," followed by the information you're confirming. If you're writing to confirm receipt of something, you can start your letter "I am pleased to confirm," or "I was pleased to receive," followed by a list of the specific items you received.Err on the side of formality. You can be more personable when confirming a personal arrangement made with someone you know well. But generally, keep your tone formal and professional.
4. Include any other important information. Other details may include the names and roles of other people involved, specific tasks, conditions of the arrangement, or monetary agreements. Repeat any terms or conditions that were part of the agreement to clarify what is expected. For example, if you're writing to confirm that the recipient will volunteer at a nonprofit event, you might want to include the day, time, and location of the event, as well as specific acts the volunteer will be expected to perform.
5. Ask for a follow-up if needed. Towards the end of your letter, let the recipient know if you need them to contact you and provide additional information. If your confirmation included a request or an assignment of responsibilities, ask them to confirm their agreement on those terms. Even if you don't have anything specific for the person to contact you about, it's usually a good idea to include a line with your preferred method of communication and let them know that they can contact you if they have any further questions. For example, you might write "If you have any questions or comments, you can reach me at (999) 444-1212."
6. Thank the recipient. Start a new paragraph and add a line thanking the recipient for joining you in the arrangement or agreeing with you on the terms, whatever is appropriate to the subject of the letter. For example, if you are confirming someone's agreement to volunteer at a nonprofit event, you might say "Thank you so much for your commitment to our cause. We are grateful for all of your effort." Make a statement of your enthusiasm, if appropriate. For example, if you are writing to confirm a job interview, you might say "I appreciate the opportunity" or "I look forward to talking to you."
7. Edit and proofread your letter before printing. Your confirmation letter won't be taken seriously if it includes typos or grammatical errors. In addition to proofreading, make sure your writing is as clear and concise as it can be. Reading your letter aloud can help you pick up on places where your writing could be simpler and more direct, as well as making it easier to notice mistakes. Edit out legalese or other industry jargon. Be clear and direct about what you're confirming.
8. Print your letter on quality paper. Once you're confident your letter is error-free, print it on a premium, stationery paper. You can buy small quantities of this type of paper in office supply stores or online. If you're sending the letter in your capacity as an employee or representative of a business or organization, use the letterhead of that business or organization. However, if you're writing to confirm a personal matter, don't use the business letterhead – even if you own the business. Most word processing apps have templates you can use to create your own personal letterhead if you want your letter to look a little more polished.
9. Sign the letter using blue or black ink. After you've printed the letter, sign it neatly in the space you provided over your typed name. Try to keep your signature professional and reasonably legible, without being excessively stylistic. Sign your first and last name exactly as it is typed. It's typically not appropriate to use a nickname or abbreviation when signing a confirmation letter.
10. Send your letter to the recipient promptly. Try to get your letter in the mail the same day you sign it. You won't make a good impression if the date of your letter is several days before the date of the postmark. If the letter is confirming something that could possibly have legal significance, make a copy of the confirmation letter for your own records before you mail it.
| 5 |
What would the world be like if the industrial revolution had never happened? | If the Industrial Revolution had never happened, our world would be not too different from the world of 1800, both from a technological-scientific aspect and a socio-economical one.
Here are a few aspects of modern life that could not exist without industrialization:
* Transportation: Without mass manufacturing, there would be no automobiles or aircraft. While the advancement of science might have enabled hand-made instances of motorized vehicles for very wealthy individuals, the main mode of transportation for people would have remained foot, horse, or sail.
* Communication: The Industrial Revolution enabled the creation of power and communication infrastructures, which would not exist in an unindustrialized world, forcing people to communicate slowly via physical transportation of messages.
* Agriculture: Our timeline's population boom is supported by the ability to mass produce food. In an unindustrialized world, supporting a large global population would be impossible, and there would likely be substantially less humans alive than there are today.
* Education: Industrialization incentivized public education systems. In a pre-industrialized world, most people could not read.
* Global Warming: One negative aspect of the Industrial Revolution is that it eventually led to the climate crisis Earth faces today.
Hence, the world would still remain in a pre-modern state. However, it is perhaps inevitable that some form of industrial revolution would eventually occur due to the emergence of the necessary economic and technological factors at some point in time. | 5 |
Why is the GM on my team? | The GM isn't on a team, they’re the referee.
The way Pathfinder, D&D, and similar games work is that there are one or more player characters (the "party") that are controlled by the players.
The GM (DM, in D&D) usually doesn't run a player character (PC), but they are responsible for representing all aspects of the world, all the non-player characters (NPCs) and monsters and stuff, and adjudicating the rules.
So the GM may be controlling a character or creature that is friendly to the PCs, or a character or creature that is hostile to the PCs, or both at once! The GM is the orcs you fight and the friendly cleric that heals you and the rain that falls on you.
GMs aren't supposed to be hostile to you in general; they are generally taught to give the players a fun challenge. It's no good to be "against" the players, because you can always kill PCs just by saying "rocks fall, everyone dies!" The GM is on your team inasmuch as they want everyone to have fun. Because their role is running monsters and the other stuff that you fight, they are often in opposition to you tactically, as they are responsible for the "other team" as part of their job. Some new GMs do get confused by this and decide it's them against the party, but that ends up being a problem that has to be solved by them wising up or their players leaving.
The context of your question isn't clear, so I'll add a note that might be relevant - some GMs, especially new ones, do run a PC of their own that's part of the party, these are referred to as GMPCs (or DMPCs). This is generally frowned upon because of the conflict of interest inherent in doing it, but it happens. That GMPC may be on your side, on your side most of the time, betray you, have other plans - just like any other person in the game world might. | 5 |
I'm a software developer and I'm working on a project that has a lot of bugs. I'm angry because I have to spend a lot of time fixing bugs instead of working on new features. I'm also angry because my | If this is a medical application you are talking about it is serious stuff. What if the bugs affected real users? Developers would be much less happy if they put in life threat someone or if management has to retire a product or make public excuses. Nowadays it is pretty standard for software having minor bugs, but a medical application should be as much as bug-free as possible.
A good developer should not be angry about bugs, but rather be happy, and a good manager already know how software development work so should not put under too much pressure its team unless really necessary:
* It has been caught before product release
* It is pretty standard for a programmer fixing bugs daily
* If you have to focus on programming it is hard also to focus on testing
* A tester Always reports bugs
* A regular user usually not (unless particularly angry or determined)
* If the user is your client, he will report bugs and he will not be happy if the project already cost him much money or required a good amount of time.
Literally a project for which bugs are not reported at least on a weekly basis:
* Too simple project: no value every other company could easily create a better clone
* Not much-used project: maybe there are bugs but no one incurred in them
* Bad management: if there are no bugs it's time to move on further work (extra features or different projects).
* Bug fixes should drive development, they give a correct idea of what should work and is not working, this allows to manage priorities between fixes and features
* In important projects it makes sense adding automated testing so that every fix and feature comes with new tests that avoid breaking pre-existing functionality
| 5 |
Yes, it is definitely doable. -20°C is only -4°F. The real question is whether it is doable by you at the level of discomfort and hassle you are willing to put up with. Only you can answer that. At best we can point out what the hassles and discomforts will be.
First, your fear of dying of cold in your sleep is silly. You'd have to do something pretty stupid to die of hypothermia, and even that's not going to happen when you're inside the sleeping bag. The main danger will be from frostbite, but that again would largely need stupidity to help it along, although that's easier to do than outright death from hypothermia.
Your tent will be a long term fixed installation you set up once at a time and conditions of your choosing. You can therefore afford a larger and heavier tent with more stuff you bring in once. Definitely get a tent you can stand upright in. That will make changing clothes much quicker and more comfortable. Since you should be able to keep water out of the tent, get a nice down sleeping bag and a few light blankets. The down bag should be rated for most nights, then put the blankets on top for the few unusually cold nights. Since again weight is not really a issue, get a full sleeping bag, not a mummy bag. They are simply more comfortable. Get a good insulating pad, and another two as backup. Get a tent large enough to fit your sleeping bag and something to sit on next to it, like a folding chair. Put something under the legs to spread out the weight to that they don't hurt the tent floor. Get one of those rubber-backed mats people sometimes put just inside their doors and put it just inside your tent. That allows a place to step with boots still on, then you can sit down on the chair with boots still on the mat to take them off. The crud stays on the mat, which you can shake clean by reaching outside after having put on your down hut booties.
Some things are going to be a hassle. At -4°F you want to keep your gloves on whenever possible, but some tasks will be difficult that way. You end up taking your gloves off to do things, then putting them back on when you're done. That's going to be a hassle, but you'll get used to it. You'll also have to take your boots off to | Yes, it is definitely doable. -20°C is only -4°F. The real question is whether it is doable by you at the level of discomfort and hassle you are willing to put up with. Only you can answer that. At best we can point out what the hassles and discomforts will be.
First, your fear of dying of cold in your sleep is silly. You'd have to do something pretty stupid to die of hypothermia, and even that's not going to happen when you're inside the sleeping bag. The main danger will be from frostbite, but that again would largely need stupidity to help it along, although that's easier to do than outright death from hypothermia.
Your tent will be a long term fixed installation you set up once at a time and conditions of your choosing. You can therefore afford a larger and heavier tent with more stuff you bring in once. Definitely get a tent you can stand upright in. That will make changing clothes much quicker and more comfortable. Since you should be able to keep water out of the tent, get a nice down sleeping bag and a few light blankets. The down bag should be rated for most nights, then put the blankets on top for the few unusually cold nights. Since again weight is not really a issue, get a full sleeping bag, not a mummy bag. They are simply more comfortable. Get a good insulating pad, and another two as backup. Get a tent large enough to fit your sleeping bag and something to sit on next to it, like a folding chair. Put something under the legs to spread out the weight to that they don't hurt the tent floor. Get one of those rubber-backed mats people sometimes put just inside their doors and put it just inside your tent. That allows a place to step with boots still on, then you can sit down on the chair with boots still on the mat to take them off. The crud stays on the mat, which you can shake clean by reaching outside after having put on your down hut booties.
Some things are going to be a hassle. At -4°F you want to keep your gloves on whenever possible, but some tasks will be difficult that way. You end up taking your gloves on and off a lot, trading off efficiency with cold fingers. Get a pair of polypro glove liners. They are thin and still allow many tasks to be done, but provide at least a little insulation. Their main advantage is that any metal you touch won't immediately conduct the heet from your hand away. Touching bare metal at -4°F is a good way to get frostbite.
Be prepared for some discomfort no matter what equipment you have. The toughest part will be getting yourself out of the sleeping bag in the morning. You'll really have to will yourself to leave the warm comfort of the bag and get into the air at probably the coldest part of the day. At some point you'll have to change your clothes and get undressed in the process. That's going to be cold. It won't be cold long enough to be any real danger, so it's really a mindset issue to get over. Whether you can or not and are willing to push yourself in that way only you can say.
You say you have access to heated buildings during the day, so it would make things a lot simpler for you if you don't have to deal with cooking and eating at your camp. Perparing food outside in the cold takes a lot longer than in a heated kitchen, severly limits what you can do, and may also risk predator encounters depending on what is around your area in the winter. | 5 |
End of preview. Expand
in Dataset Viewer.
README.md exists but content is empty.
- Downloads last month
- 42