uid
stringlengths 4
7
| premise
stringlengths 19
9.21k
| hypothesis
stringlengths 13
488
| label
stringclasses 3
values |
---|---|---|---|
id_2800 | HELIUMS FUTURE UP IN THE AIR In recent years we have all been exposed to dire media reports concerning the impending demise of global coal and oil reserves, but the depletion of another key non-renewable resource continues without receiving much press at all. Helium an inert, odourless, monatomic element known to lay people as the substance that makes balloons float and voices squeak when inhaled could be gone from this planet within a generation. Helium itself is not rare; there is actually a plentiful supply of it in the cosmos. In fact, 24 per cent of our galaxys elemental mass consists of helium, which makes it the second most abundant element in our universe. Because of its lightness, however, most helium vanished from our own planet many years ago. Consequently, only a miniscule proportion 0.00052%, to be exact remains in earths atmosphere. Helium is the byproduct of millennia of radioactive decay from the elements thorium and uranium. The helium is mostly trapped in subterranean natural gas bunkers and commercially extracted through a method known as fractional distillation. The loss of helium on Earth would affect society greatly. Defying the perception of it as a novelty substance for parties and gimmicks, the element actually has many vital applications in society. Probably the most well known commercial usage is in airships and blimps (non-flammable helium replaced hydrogen as the lifting gas du jour after the Hindenburg catastrophe in 1932, during which an airship burst into flames and crashed to the ground killing some passengers and crew). But helium is also instrumental in deep-sea diving, where it is blended with nitrogen to mitigate the dangers of inhaling ordinary air under high pressure; as a cleaning agent for rocket engines; and, in its most prevalent use, as a coolant for superconducting magnets in hospital MRI (magnetic resonance imaging) scanners. The possibility of losing helium forever poses the threat of a real crisis because its unique qualities are extraordinarily difficult, if not impossible to duplicate (certainly, no biosynthetic ersatz product is close to approaching the point of feasibility for helium, even as similar developments continue apace for oil and coal). Helium is even cheerfully derided as a loner element since it does not adhere to other molecules like its cousin, hydrogen. According to Dr. Lee Sobotka, helium is the most noble of gases, meaning its very stable and non-reactive for the most part ... it has a closed electronic configuration, a very tightly bound atom. It is this coveting of its own electrons that prevents combination with other elements. Another important attribute is heliums unique boiling point, which is lower than that for any other element. The worsening global shortage could render millions of dollars of high-value, life-saving equipment totally useless. The dwindling supplies have already resulted in the postponement of research and development projects in physics laboratories and manufacturing plants around the world. There is an enormous supply and demand imbalance partly brought about by the expansion of high-tech manufacturing in Asia. The source of the problem is the Helium Privatisation Act (HPA), an American law passed in 1996 that requires the U. S. National Helium Reserve to liquidate its helium assets by 2015 regardless of the market price. Although intended to settle the original cost of the reserve by a U. S. Congress ignorant of its ramifications, the result of this fire sale is that global helium prices are so artificially deflated that few can be bothered recycling the substance or using it judiciously. Deflated values also mean that natural gas extractors see no reason to capture helium. Much is lost in the process of extraction. As Sobotka notes: [t]he government had the good vision to store helium, and the question now is: Will the corporations have the vision to capture it when extracting natural gas, and consumers the wisdom to recycle? This takes long-term vision because present market forces are not sufficient to compel prudent practice. For Nobel-prize laureate Robert Richardson, the U. S. government must be prevailed upon to repeal its privatisation policy as the country supplies over 80 per cent of global helium, mostly from the National Helium Reserve. For Richardson, a twenty- to fifty-fold increase in prices would provide incentives to recycle. A number of steps need to be taken in order to avert a costly predicament in the coming decades. Firstly, all existing supplies of helium ought to be conserved and released only by permit, with medical uses receiving precedence over other commercial or recreational demands. Secondly, conservation should be obligatory and enforced by a regulatory agency. At the moment some users, such as hospitals, tend to recycle diligently while others, such as NASA, squander massive amounts of helium. Lastly, research into alternatives to helium must begin in earnest. | Helium chooses to be on its own. | e |
id_2801 | HELIUMS FUTURE UP IN THE AIR In recent years we have all been exposed to dire media reports concerning the impending demise of global coal and oil reserves, but the depletion of another key non-renewable resource continues without receiving much press at all. Helium an inert, odourless, monatomic element known to lay people as the substance that makes balloons float and voices squeak when inhaled could be gone from this planet within a generation. Helium itself is not rare; there is actually a plentiful supply of it in the cosmos. In fact, 24 per cent of our galaxys elemental mass consists of helium, which makes it the second most abundant element in our universe. Because of its lightness, however, most helium vanished from our own planet many years ago. Consequently, only a miniscule proportion 0.00052%, to be exact remains in earths atmosphere. Helium is the byproduct of millennia of radioactive decay from the elements thorium and uranium. The helium is mostly trapped in subterranean natural gas bunkers and commercially extracted through a method known as fractional distillation. The loss of helium on Earth would affect society greatly. Defying the perception of it as a novelty substance for parties and gimmicks, the element actually has many vital applications in society. Probably the most well known commercial usage is in airships and blimps (non-flammable helium replaced hydrogen as the lifting gas du jour after the Hindenburg catastrophe in 1932, during which an airship burst into flames and crashed to the ground killing some passengers and crew). But helium is also instrumental in deep-sea diving, where it is blended with nitrogen to mitigate the dangers of inhaling ordinary air under high pressure; as a cleaning agent for rocket engines; and, in its most prevalent use, as a coolant for superconducting magnets in hospital MRI (magnetic resonance imaging) scanners. The possibility of losing helium forever poses the threat of a real crisis because its unique qualities are extraordinarily difficult, if not impossible to duplicate (certainly, no biosynthetic ersatz product is close to approaching the point of feasibility for helium, even as similar developments continue apace for oil and coal). Helium is even cheerfully derided as a loner element since it does not adhere to other molecules like its cousin, hydrogen. According to Dr. Lee Sobotka, helium is the most noble of gases, meaning its very stable and non-reactive for the most part ... it has a closed electronic configuration, a very tightly bound atom. It is this coveting of its own electrons that prevents combination with other elements. Another important attribute is heliums unique boiling point, which is lower than that for any other element. The worsening global shortage could render millions of dollars of high-value, life-saving equipment totally useless. The dwindling supplies have already resulted in the postponement of research and development projects in physics laboratories and manufacturing plants around the world. There is an enormous supply and demand imbalance partly brought about by the expansion of high-tech manufacturing in Asia. The source of the problem is the Helium Privatisation Act (HPA), an American law passed in 1996 that requires the U. S. National Helium Reserve to liquidate its helium assets by 2015 regardless of the market price. Although intended to settle the original cost of the reserve by a U. S. Congress ignorant of its ramifications, the result of this fire sale is that global helium prices are so artificially deflated that few can be bothered recycling the substance or using it judiciously. Deflated values also mean that natural gas extractors see no reason to capture helium. Much is lost in the process of extraction. As Sobotka notes: [t]he government had the good vision to store helium, and the question now is: Will the corporations have the vision to capture it when extracting natural gas, and consumers the wisdom to recycle? This takes long-term vision because present market forces are not sufficient to compel prudent practice. For Nobel-prize laureate Robert Richardson, the U. S. government must be prevailed upon to repeal its privatisation policy as the country supplies over 80 per cent of global helium, mostly from the National Helium Reserve. For Richardson, a twenty- to fifty-fold increase in prices would provide incentives to recycle. A number of steps need to be taken in order to avert a costly predicament in the coming decades. Firstly, all existing supplies of helium ought to be conserved and released only by permit, with medical uses receiving precedence over other commercial or recreational demands. Secondly, conservation should be obligatory and enforced by a regulatory agency. At the moment some users, such as hospitals, tend to recycle diligently while others, such as NASA, squander massive amounts of helium. Lastly, research into alternatives to helium must begin in earnest. | Helium is a very cold substance. | n |
id_2802 | HELIUMS FUTURE UP IN THE AIR In recent years we have all been exposed to dire media reports concerning the impending demise of global coal and oil reserves, but the depletion of another key non-renewable resource continues without receiving much press at all. Helium an inert, odourless, monatomic element known to lay people as the substance that makes balloons float and voices squeak when inhaled could be gone from this planet within a generation. Helium itself is not rare; there is actually a plentiful supply of it in the cosmos. In fact, 24 per cent of our galaxys elemental mass consists of helium, which makes it the second most abundant element in our universe. Because of its lightness, however, most helium vanished from our own planet many years ago. Consequently, only a miniscule proportion 0.00052%, to be exact remains in earths atmosphere. Helium is the byproduct of millennia of radioactive decay from the elements thorium and uranium. The helium is mostly trapped in subterranean natural gas bunkers and commercially extracted through a method known as fractional distillation. The loss of helium on Earth would affect society greatly. Defying the perception of it as a novelty substance for parties and gimmicks, the element actually has many vital applications in society. Probably the most well known commercial usage is in airships and blimps (non-flammable helium replaced hydrogen as the lifting gas du jour after the Hindenburg catastrophe in 1932, during which an airship burst into flames and crashed to the ground killing some passengers and crew). But helium is also instrumental in deep-sea diving, where it is blended with nitrogen to mitigate the dangers of inhaling ordinary air under high pressure; as a cleaning agent for rocket engines; and, in its most prevalent use, as a coolant for superconducting magnets in hospital MRI (magnetic resonance imaging) scanners. The possibility of losing helium forever poses the threat of a real crisis because its unique qualities are extraordinarily difficult, if not impossible to duplicate (certainly, no biosynthetic ersatz product is close to approaching the point of feasibility for helium, even as similar developments continue apace for oil and coal). Helium is even cheerfully derided as a loner element since it does not adhere to other molecules like its cousin, hydrogen. According to Dr. Lee Sobotka, helium is the most noble of gases, meaning its very stable and non-reactive for the most part ... it has a closed electronic configuration, a very tightly bound atom. It is this coveting of its own electrons that prevents combination with other elements. Another important attribute is heliums unique boiling point, which is lower than that for any other element. The worsening global shortage could render millions of dollars of high-value, life-saving equipment totally useless. The dwindling supplies have already resulted in the postponement of research and development projects in physics laboratories and manufacturing plants around the world. There is an enormous supply and demand imbalance partly brought about by the expansion of high-tech manufacturing in Asia. The source of the problem is the Helium Privatisation Act (HPA), an American law passed in 1996 that requires the U. S. National Helium Reserve to liquidate its helium assets by 2015 regardless of the market price. Although intended to settle the original cost of the reserve by a U. S. Congress ignorant of its ramifications, the result of this fire sale is that global helium prices are so artificially deflated that few can be bothered recycling the substance or using it judiciously. Deflated values also mean that natural gas extractors see no reason to capture helium. Much is lost in the process of extraction. As Sobotka notes: [t]he government had the good vision to store helium, and the question now is: Will the corporations have the vision to capture it when extracting natural gas, and consumers the wisdom to recycle? This takes long-term vision because present market forces are not sufficient to compel prudent practice. For Nobel-prize laureate Robert Richardson, the U. S. government must be prevailed upon to repeal its privatisation policy as the country supplies over 80 per cent of global helium, mostly from the National Helium Reserve. For Richardson, a twenty- to fifty-fold increase in prices would provide incentives to recycle. A number of steps need to be taken in order to avert a costly predicament in the coming decades. Firstly, all existing supplies of helium ought to be conserved and released only by permit, with medical uses receiving precedence over other commercial or recreational demands. Secondly, conservation should be obligatory and enforced by a regulatory agency. At the moment some users, such as hospitals, tend to recycle diligently while others, such as NASA, squander massive amounts of helium. Lastly, research into alternatives to helium must begin in earnest. | High-tech industries in Asia use more helium than laboratories and manufacturers in other parts of the world. | n |
id_2803 | HOSTEL RULES AND REGULATIONS 1. BEHAVIOUR AND DISCIPLINE 1.1 Hostelites are expected to display acceptable forms of behavior, maintain discipline and decorum in the hostel complex. 1.2 Smoking is not allowed in the hostel complex at anytime. 1.3 Possession, distribution and consumption of alcoholic beverages, prohibited drugs, chewable tobacco in the hostel complex is not allowed. 1.4 Parties, social or political gatherings in the hostel complex are not permitted without the prior and written consent of the accommodation officer. 1.5 Hostelites must return to the hostel by 8 pm everyday and are not allowed to leave the hostel before 6 am. 1.6 The hostelites will be allowed to stay out of the hostel on submission of proper application duly authorized by a parent and only if the permission granted in writing by the accommodation officer. 1.7 A hostel campus should be a place where students can have the best possible conditions for studying and adequate rest. As such due consideration must be accorded to other hostelites at all times. Noise level must be kept low to allow others the opportunity to study or sleep in comfort. Television, radio etc provided in the common room must be switched off or volume turned down after 10:00 pm. These rules are intended to ensure a conducive environment for all hostelites. 2. UPKEEP OF THE HOSTEL 2.1 Hostelites are responsible for keeping their rooms and the common areas in the hostel such as visitors area, bathrooms, stair case, and common room etc clean and tidy at all times. 2.2 All fans, lights and electrical appliances must be switched off when not in use. 2.3 Cooking, making tea etc is not allowed in the hostel. 2.4 Common hostel furniture must not be moved without the permission of the accommodation officer. 2.5 Any damage to the hostel property must be reported immediately to the accommodation officer. Hostelites will be charged for all damages except damages caused by normal wear and tear. 2.6 Pasting of posters, writings, wall chalking, slogans of any kind or defacing the hostel in any form is not allowed. 2.7 The hostel management reserves the right to make spot checks on the hostel and rooms without having to give prior notice to the students. 2.8 Electricians, contractors or any other service person may enter rooms as and when necessary in the course of their duty under the directive of the accommodation officer. However, every effort will be made to respect the privacy and dignity of the hostelites. 2.9 The hostel management reserves the right to move hostelites to other hostel units if there is a necessity. 3. VISITORS 3.1 Visitors including parents are allowed only into the visitors area of the hostel during the visiting hours as follows. Weekdays: (Monday-Friday) - 5:00 pm to 8:00 pm & 7:30 am to 8:30 am, Weekend (Saturday, Sunday) and holidays- 7:30 am to 8:00 pm 3.2 All visitors must register at the guard house and provide all details and documents as requested by Security before entering the hostel complex. All visitors must leave the hostel complex by 8:00 pm. 3.3 Hostelites are not permitted to allow visitors of the opposite sex into rooms at any time for whatever reason. Any hostelites found violating this rule will be evicted from the hostel. 3.4 Non-Hostel students are prohibited in the hostel without the permission of Residential Warden. The student who violates this is answerable to the Warden. | Guests are allowed to smoke in restricted areas of the hostal. | c |
id_2804 | HOSTEL RULES AND REGULATIONS 1. BEHAVIOUR AND DISCIPLINE 1.1 Hostelites are expected to display acceptable forms of behavior, maintain discipline and decorum in the hostel complex. 1.2 Smoking is not allowed in the hostel complex at anytime. 1.3 Possession, distribution and consumption of alcoholic beverages, prohibited drugs, chewable tobacco in the hostel complex is not allowed. 1.4 Parties, social or political gatherings in the hostel complex are not permitted without the prior and written consent of the accommodation officer. 1.5 Hostelites must return to the hostel by 8 pm everyday and are not allowed to leave the hostel before 6 am. 1.6 The hostelites will be allowed to stay out of the hostel on submission of proper application duly authorized by a parent and only if the permission granted in writing by the accommodation officer. 1.7 A hostel campus should be a place where students can have the best possible conditions for studying and adequate rest. As such due consideration must be accorded to other hostelites at all times. Noise level must be kept low to allow others the opportunity to study or sleep in comfort. Television, radio etc provided in the common room must be switched off or volume turned down after 10:00 pm. These rules are intended to ensure a conducive environment for all hostelites. 2. UPKEEP OF THE HOSTEL 2.1 Hostelites are responsible for keeping their rooms and the common areas in the hostel such as visitors area, bathrooms, stair case, and common room etc clean and tidy at all times. 2.2 All fans, lights and electrical appliances must be switched off when not in use. 2.3 Cooking, making tea etc is not allowed in the hostel. 2.4 Common hostel furniture must not be moved without the permission of the accommodation officer. 2.5 Any damage to the hostel property must be reported immediately to the accommodation officer. Hostelites will be charged for all damages except damages caused by normal wear and tear. 2.6 Pasting of posters, writings, wall chalking, slogans of any kind or defacing the hostel in any form is not allowed. 2.7 The hostel management reserves the right to make spot checks on the hostel and rooms without having to give prior notice to the students. 2.8 Electricians, contractors or any other service person may enter rooms as and when necessary in the course of their duty under the directive of the accommodation officer. However, every effort will be made to respect the privacy and dignity of the hostelites. 2.9 The hostel management reserves the right to move hostelites to other hostel units if there is a necessity. 3. VISITORS 3.1 Visitors including parents are allowed only into the visitors area of the hostel during the visiting hours as follows. Weekdays: (Monday-Friday) - 5:00 pm to 8:00 pm & 7:30 am to 8:30 am, Weekend (Saturday, Sunday) and holidays- 7:30 am to 8:00 pm 3.2 All visitors must register at the guard house and provide all details and documents as requested by Security before entering the hostel complex. All visitors must leave the hostel complex by 8:00 pm. 3.3 Hostelites are not permitted to allow visitors of the opposite sex into rooms at any time for whatever reason. Any hostelites found violating this rule will be evicted from the hostel. 3.4 Non-Hostel students are prohibited in the hostel without the permission of Residential Warden. The student who violates this is answerable to the Warden. | All visitors must show their driving licence or passport at the guard house. | n |
id_2805 | HOSTEL RULES AND REGULATIONS 1. BEHAVIOUR AND DISCIPLINE 1.1 Hostelites are expected to display acceptable forms of behavior, maintain discipline and decorum in the hostel complex. 1.2 Smoking is not allowed in the hostel complex at anytime. 1.3 Possession, distribution and consumption of alcoholic beverages, prohibited drugs, chewable tobacco in the hostel complex is not allowed. 1.4 Parties, social or political gatherings in the hostel complex are not permitted without the prior and written consent of the accommodation officer. 1.5 Hostelites must return to the hostel by 8 pm everyday and are not allowed to leave the hostel before 6 am. 1.6 The hostelites will be allowed to stay out of the hostel on submission of proper application duly authorized by a parent and only if the permission granted in writing by the accommodation officer. 1.7 A hostel campus should be a place where students can have the best possible conditions for studying and adequate rest. As such due consideration must be accorded to other hostelites at all times. Noise level must be kept low to allow others the opportunity to study or sleep in comfort. Television, radio etc provided in the common room must be switched off or volume turned down after 10:00 pm. These rules are intended to ensure a conducive environment for all hostelites. 2. UPKEEP OF THE HOSTEL 2.1 Hostelites are responsible for keeping their rooms and the common areas in the hostel such as visitors area, bathrooms, stair case, and common room etc clean and tidy at all times. 2.2 All fans, lights and electrical appliances must be switched off when not in use. 2.3 Cooking, making tea etc is not allowed in the hostel. 2.4 Common hostel furniture must not be moved without the permission of the accommodation officer. 2.5 Any damage to the hostel property must be reported immediately to the accommodation officer. Hostelites will be charged for all damages except damages caused by normal wear and tear. 2.6 Pasting of posters, writings, wall chalking, slogans of any kind or defacing the hostel in any form is not allowed. 2.7 The hostel management reserves the right to make spot checks on the hostel and rooms without having to give prior notice to the students. 2.8 Electricians, contractors or any other service person may enter rooms as and when necessary in the course of their duty under the directive of the accommodation officer. However, every effort will be made to respect the privacy and dignity of the hostelites. 2.9 The hostel management reserves the right to move hostelites to other hostel units if there is a necessity. 3. VISITORS 3.1 Visitors including parents are allowed only into the visitors area of the hostel during the visiting hours as follows. Weekdays: (Monday-Friday) - 5:00 pm to 8:00 pm & 7:30 am to 8:30 am, Weekend (Saturday, Sunday) and holidays- 7:30 am to 8:00 pm 3.2 All visitors must register at the guard house and provide all details and documents as requested by Security before entering the hostel complex. All visitors must leave the hostel complex by 8:00 pm. 3.3 Hostelites are not permitted to allow visitors of the opposite sex into rooms at any time for whatever reason. Any hostelites found violating this rule will be evicted from the hostel. 3.4 Non-Hostel students are prohibited in the hostel without the permission of Residential Warden. The student who violates this is answerable to the Warden. | Parents are allowed to visit their children in their rooms on Saturday and Sunday from 7:30 am to 8:00 pm. | c |
id_2806 | HOSTEL RULES AND REGULATIONS 1. BEHAVIOUR AND DISCIPLINE 1.1 Hostelites are expected to display acceptable forms of behavior, maintain discipline and decorum in the hostel complex. 1.2 Smoking is not allowed in the hostel complex at anytime. 1.3 Possession, distribution and consumption of alcoholic beverages, prohibited drugs, chewable tobacco in the hostel complex is not allowed. 1.4 Parties, social or political gatherings in the hostel complex are not permitted without the prior and written consent of the accommodation officer. 1.5 Hostelites must return to the hostel by 8 pm everyday and are not allowed to leave the hostel before 6 am. 1.6 The hostelites will be allowed to stay out of the hostel on submission of proper application duly authorized by a parent and only if the permission granted in writing by the accommodation officer. 1.7 A hostel campus should be a place where students can have the best possible conditions for studying and adequate rest. As such due consideration must be accorded to other hostelites at all times. Noise level must be kept low to allow others the opportunity to study or sleep in comfort. Television, radio etc provided in the common room must be switched off or volume turned down after 10:00 pm. These rules are intended to ensure a conducive environment for all hostelites. 2. UPKEEP OF THE HOSTEL 2.1 Hostelites are responsible for keeping their rooms and the common areas in the hostel such as visitors area, bathrooms, stair case, and common room etc clean and tidy at all times. 2.2 All fans, lights and electrical appliances must be switched off when not in use. 2.3 Cooking, making tea etc is not allowed in the hostel. 2.4 Common hostel furniture must not be moved without the permission of the accommodation officer. 2.5 Any damage to the hostel property must be reported immediately to the accommodation officer. Hostelites will be charged for all damages except damages caused by normal wear and tear. 2.6 Pasting of posters, writings, wall chalking, slogans of any kind or defacing the hostel in any form is not allowed. 2.7 The hostel management reserves the right to make spot checks on the hostel and rooms without having to give prior notice to the students. 2.8 Electricians, contractors or any other service person may enter rooms as and when necessary in the course of their duty under the directive of the accommodation officer. However, every effort will be made to respect the privacy and dignity of the hostelites. 2.9 The hostel management reserves the right to move hostelites to other hostel units if there is a necessity. 3. VISITORS 3.1 Visitors including parents are allowed only into the visitors area of the hostel during the visiting hours as follows. Weekdays: (Monday-Friday) - 5:00 pm to 8:00 pm & 7:30 am to 8:30 am, Weekend (Saturday, Sunday) and holidays- 7:30 am to 8:00 pm 3.2 All visitors must register at the guard house and provide all details and documents as requested by Security before entering the hostel complex. All visitors must leave the hostel complex by 8:00 pm. 3.3 Hostelites are not permitted to allow visitors of the opposite sex into rooms at any time for whatever reason. Any hostelites found violating this rule will be evicted from the hostel. 3.4 Non-Hostel students are prohibited in the hostel without the permission of Residential Warden. The student who violates this is answerable to the Warden. | After 10:00 pm the noise level of appliances must be lowered. | e |
id_2807 | HOSTEL RULES AND REGULATIONS 1. BEHAVIOUR AND DISCIPLINE 1.1 Hostelites are expected to display acceptable forms of behavior, maintain discipline and decorum in the hostel complex. 1.2 Smoking is not allowed in the hostel complex at anytime. 1.3 Possession, distribution and consumption of alcoholic beverages, prohibited drugs, chewable tobacco in the hostel complex is not allowed. 1.4 Parties, social or political gatherings in the hostel complex are not permitted without the prior and written consent of the accommodation officer. 1.5 Hostelites must return to the hostel by 8 pm everyday and are not allowed to leave the hostel before 6 am. 1.6 The hostelites will be allowed to stay out of the hostel on submission of proper application duly authorized by a parent and only if the permission granted in writing by the accommodation officer. 1.7 A hostel campus should be a place where students can have the best possible conditions for studying and adequate rest. As such due consideration must be accorded to other hostelites at all times. Noise level must be kept low to allow others the opportunity to study or sleep in comfort. Television, radio etc provided in the common room must be switched off or volume turned down after 10:00 pm. These rules are intended to ensure a conducive environment for all hostelites. 2. UPKEEP OF THE HOSTEL 2.1 Hostelites are responsible for keeping their rooms and the common areas in the hostel such as visitors area, bathrooms, stair case, and common room etc clean and tidy at all times. 2.2 All fans, lights and electrical appliances must be switched off when not in use. 2.3 Cooking, making tea etc is not allowed in the hostel. 2.4 Common hostel furniture must not be moved without the permission of the accommodation officer. 2.5 Any damage to the hostel property must be reported immediately to the accommodation officer. Hostelites will be charged for all damages except damages caused by normal wear and tear. 2.6 Pasting of posters, writings, wall chalking, slogans of any kind or defacing the hostel in any form is not allowed. 2.7 The hostel management reserves the right to make spot checks on the hostel and rooms without having to give prior notice to the students. 2.8 Electricians, contractors or any other service person may enter rooms as and when necessary in the course of their duty under the directive of the accommodation officer. However, every effort will be made to respect the privacy and dignity of the hostelites. 2.9 The hostel management reserves the right to move hostelites to other hostel units if there is a necessity. 3. VISITORS 3.1 Visitors including parents are allowed only into the visitors area of the hostel during the visiting hours as follows. Weekdays: (Monday-Friday) - 5:00 pm to 8:00 pm & 7:30 am to 8:30 am, Weekend (Saturday, Sunday) and holidays- 7:30 am to 8:00 pm 3.2 All visitors must register at the guard house and provide all details and documents as requested by Security before entering the hostel complex. All visitors must leave the hostel complex by 8:00 pm. 3.3 Hostelites are not permitted to allow visitors of the opposite sex into rooms at any time for whatever reason. Any hostelites found violating this rule will be evicted from the hostel. 3.4 Non-Hostel students are prohibited in the hostel without the permission of Residential Warden. The student who violates this is answerable to the Warden. | Guests are not allowed to have parties anywhere in the hostal complex. | c |
id_2808 | HOSTEL RULES AND REGULATIONS 1. BEHAVIOUR AND DISCIPLINE 1.1 Hostelites are expected to display acceptable forms of behavior, maintain discipline and decorum in the hostel complex. 1.2 Smoking is not allowed in the hostel complex at anytime. 1.3 Possession, distribution and consumption of alcoholic beverages, prohibited drugs, chewable tobacco in the hostel complex is not allowed. 1.4 Parties, social or political gatherings in the hostel complex are not permitted without the prior and written consent of the accommodation officer. 1.5 Hostelites must return to the hostel by 8 pm everyday and are not allowed to leave the hostel before 6 am. 1.6 The hostelites will be allowed to stay out of the hostel on submission of proper application duly authorized by a parent and only if the permission granted in writing by the accommodation officer. 1.7 A hostel campus should be a place where students can have the best possible conditions for studying and adequate rest. As such due consideration must be accorded to other hostelites at all times. Noise level must be kept low to allow others the opportunity to study or sleep in comfort. Television, radio etc provided in the common room must be switched off or volume turned down after 10:00 pm. These rules are intended to ensure a conducive environment for all hostelites. 2. UPKEEP OF THE HOSTEL 2.1 Hostelites are responsible for keeping their rooms and the common areas in the hostel such as visitors area, bathrooms, stair case, and common room etc clean and tidy at all times. 2.2 All fans, lights and electrical appliances must be switched off when not in use. 2.3 Cooking, making tea etc is not allowed in the hostel. 2.4 Common hostel furniture must not be moved without the permission of the accommodation officer. 2.5 Any damage to the hostel property must be reported immediately to the accommodation officer. Hostelites will be charged for all damages except damages caused by normal wear and tear. 2.6 Pasting of posters, writings, wall chalking, slogans of any kind or defacing the hostel in any form is not allowed. 2.7 The hostel management reserves the right to make spot checks on the hostel and rooms without having to give prior notice to the students. 2.8 Electricians, contractors or any other service person may enter rooms as and when necessary in the course of their duty under the directive of the accommodation officer. However, every effort will be made to respect the privacy and dignity of the hostelites. 2.9 The hostel management reserves the right to move hostelites to other hostel units if there is a necessity. 3. VISITORS 3.1 Visitors including parents are allowed only into the visitors area of the hostel during the visiting hours as follows. Weekdays: (Monday-Friday) - 5:00 pm to 8:00 pm & 7:30 am to 8:30 am, Weekend (Saturday, Sunday) and holidays- 7:30 am to 8:00 pm 3.2 All visitors must register at the guard house and provide all details and documents as requested by Security before entering the hostel complex. All visitors must leave the hostel complex by 8:00 pm. 3.3 Hostelites are not permitted to allow visitors of the opposite sex into rooms at any time for whatever reason. Any hostelites found violating this rule will be evicted from the hostel. 3.4 Non-Hostel students are prohibited in the hostel without the permission of Residential Warden. The student who violates this is answerable to the Warden. | Hostal management cannot enter a student's room without informing them previously. | c |
id_2809 | HOSTEL RULES AND REGULATIONS 1. BEHAVIOUR AND DISCIPLINE 1.1 Hostelites are expected to display acceptable forms of behavior, maintain discipline and decorum in the hostel complex. 1.2 Smoking is not allowed in the hostel complex at anytime. 1.3 Possession, distribution and consumption of alcoholic beverages, prohibited drugs, chewable tobacco in the hostel complex is not allowed. 1.4 Parties, social or political gatherings in the hostel complex are not permitted without the prior and written consent of the accommodation officer. 1.5 Hostelites must return to the hostel by 8 pm everyday and are not allowed to leave the hostel before 6 am. 1.6 The hostelites will be allowed to stay out of the hostel on submission of proper application duly authorized by a parent and only if the permission granted in writing by the accommodation officer. 1.7 A hostel campus should be a place where students can have the best possible conditions for studying and adequate rest. As such due consideration must be accorded to other hostelites at all times. Noise level must be kept low to allow others the opportunity to study or sleep in comfort. Television, radio etc provided in the common room must be switched off or volume turned down after 10:00 pm. These rules are intended to ensure a conducive environment for all hostelites. 2. UPKEEP OF THE HOSTEL 2.1 Hostelites are responsible for keeping their rooms and the common areas in the hostel such as visitors area, bathrooms, stair case, and common room etc clean and tidy at all times. 2.2 All fans, lights and electrical appliances must be switched off when not in use. 2.3 Cooking, making tea etc is not allowed in the hostel. 2.4 Common hostel furniture must not be moved without the permission of the accommodation officer. 2.5 Any damage to the hostel property must be reported immediately to the accommodation officer. Hostelites will be charged for all damages except damages caused by normal wear and tear. 2.6 Pasting of posters, writings, wall chalking, slogans of any kind or defacing the hostel in any form is not allowed. 2.7 The hostel management reserves the right to make spot checks on the hostel and rooms without having to give prior notice to the students. 2.8 Electricians, contractors or any other service person may enter rooms as and when necessary in the course of their duty under the directive of the accommodation officer. However, every effort will be made to respect the privacy and dignity of the hostelites. 2.9 The hostel management reserves the right to move hostelites to other hostel units if there is a necessity. 3. VISITORS 3.1 Visitors including parents are allowed only into the visitors area of the hostel during the visiting hours as follows. Weekdays: (Monday-Friday) - 5:00 pm to 8:00 pm & 7:30 am to 8:30 am, Weekend (Saturday, Sunday) and holidays- 7:30 am to 8:00 pm 3.2 All visitors must register at the guard house and provide all details and documents as requested by Security before entering the hostel complex. All visitors must leave the hostel complex by 8:00 pm. 3.3 Hostelites are not permitted to allow visitors of the opposite sex into rooms at any time for whatever reason. Any hostelites found violating this rule will be evicted from the hostel. 3.4 Non-Hostel students are prohibited in the hostel without the permission of Residential Warden. The student who violates this is answerable to the Warden. | Guests should not change the position of hostal furniture. | e |
id_2810 | HOT AIR BALLOONING The birth of the hot air balloon is largely contributed to the efforts of two French brothers, Joseph and Etienne Montgolfier, who employed the fact that hot air was lighter than cool air and using this, managed to lift a small silk balloon 32 metres into the air. The brothers went on to elevate a balloon into the air ten thousand metres before it started to descend and then exploded. Arguably limited success, but their work came to the eye of the French Science Academy as the discovery of the properties of hot air balloons helped scientists to study weather patterns and the atmosphere. It was not until some considerable time later that a balloon was launched that was capable of carrying passengers. Initial flights were trialled by animals, but after the success of these voyages, two passengers, Jean Francois Pilatre and Francois Laurent dArlendes, were sent up in a balloon which travelled across Paris for 29 minutes. The men fuelled the fire in the centre of their wicker basket to keep the balloon elevated and the trip across Paris was a great success. The discovery of hydrogen-fuelled flights led to the death in 1785 of Pilatre, a tragedy which caused a downfall in the popularity of hot air ballooning but an increase in the popularity of hydrogen. Hot air ballooning lost further ground when alternate modes of air travel were introduced but in the 1950s, ballooning experienced something of a revival as a leisure activity and sport. Today there are balloons of all shapes and sizes, with many unique designs. In 1987, British entrepreneur Richard Branson crossed the Atlantic in a balloon named Virgin Atlantic Flyer. At the time, this balloon was the largest ever constructed at 65 thousand cubic metres, but four years later, he and Per Lindstrand from Sweden flew nearly 8000 kilometres from Japan to Northern Canada in their balloon the Virgin Pacific Flyer, which was nearly 10 thousand cubic metres bigger and was the longest flight in a hot air balloon ever made. The Pacific Flyer was designed to fly in the trans-oceanic jet streams and recorded the highest ground speed for a manned balloon at 394 kilometres per hour. There are now a wide variety of designs and equipment available, from baskets with room for two people right up to 35 or more, separated compartments and specially designed flame resistant fabrics, but the basic parts of the balloon have remained relatively unchanged. There is a basket, commonly made of wicker, inside which are stored the propane fuel tanks. Immediately above the basket and partly wrapped around by the skirt are the burners, attached on suspension wires. The balloon itself is made of strips of fabric called gores which run from the skirt to the top of the balloon; they are further broken into individual panels. This section of the craft is referred to as the envelope. At the top of the envelope is a self closing flap that allows hot air to escape at a controlled rate to slow ascents or cause the balloon to descend descents. This is named the parachute valve, and is controlled by the vent line the cable that runs the length of the envelope and hangs just above the basket so the pilot can open and close the parachute valve. At the mercy of prevailing wind currents, piloting a balloon takes a huge amount of skill but the controls used are fairly straight forward. To lift a balloon the pilot moves the control which releases propane. The pilot can control the speed of the balloon by increasing or decreasing the flow of propane gas, but they cannot control horizontal direction. As a result, balloons are often followed by ground crew, who may have to pick up the pilot, passengers and balloon from any number of landing sites. A pilot who wants to fly a hot air balloon must have his commercial pilots license to fly and must have at least 35 hours of flight instruction. There are no official safety requirements for passengers onboard, but they should know whom theyre flying with and what qualifications they may have. For safety reasons, hot air balloons dont fly in the rain because the heat in the balloon can cause water to boil on top of the balloon and destroy the fabric. One of the largest hot air balloon organisations is the Balloon Federation of America. Founded in 1961, membership in the BFA attracts those with a fascination with ballooning (or Lighter Than Air flight). With an active discussion forum, meetings and displays all around the USA and beyond, the BFA runs on a number of guiding principles, primarily that the future of ballooning is directly related to the safety of enthusiasts. They run a number of training courses, from a novice who is interested in getting a basic licence to pilot achievement courses. They even boast of a balloon simulator, which although will not directly lead to a pilots license, it can give participants a degree of the sensation enjoyed by professional balloon pilots. | The Montgolfier brothers were the first people to fly in a hot air balloon. | c |
id_2811 | HOT AIR BALLOONING The birth of the hot air balloon is largely contributed to the efforts of two French brothers, Joseph and Etienne Montgolfier, who employed the fact that hot air was lighter than cool air and using this, managed to lift a small silk balloon 32 metres into the air. The brothers went on to elevate a balloon into the air ten thousand metres before it started to descend and then exploded. Arguably limited success, but their work came to the eye of the French Science Academy as the discovery of the properties of hot air balloons helped scientists to study weather patterns and the atmosphere. It was not until some considerable time later that a balloon was launched that was capable of carrying passengers. Initial flights were trialled by animals, but after the success of these voyages, two passengers, Jean Francois Pilatre and Francois Laurent dArlendes, were sent up in a balloon which travelled across Paris for 29 minutes. The men fuelled the fire in the centre of their wicker basket to keep the balloon elevated and the trip across Paris was a great success. The discovery of hydrogen-fuelled flights led to the death in 1785 of Pilatre, a tragedy which caused a downfall in the popularity of hot air ballooning but an increase in the popularity of hydrogen. Hot air ballooning lost further ground when alternate modes of air travel were introduced but in the 1950s, ballooning experienced something of a revival as a leisure activity and sport. Today there are balloons of all shapes and sizes, with many unique designs. In 1987, British entrepreneur Richard Branson crossed the Atlantic in a balloon named Virgin Atlantic Flyer. At the time, this balloon was the largest ever constructed at 65 thousand cubic metres, but four years later, he and Per Lindstrand from Sweden flew nearly 8000 kilometres from Japan to Northern Canada in their balloon the Virgin Pacific Flyer, which was nearly 10 thousand cubic metres bigger and was the longest flight in a hot air balloon ever made. The Pacific Flyer was designed to fly in the trans-oceanic jet streams and recorded the highest ground speed for a manned balloon at 394 kilometres per hour. There are now a wide variety of designs and equipment available, from baskets with room for two people right up to 35 or more, separated compartments and specially designed flame resistant fabrics, but the basic parts of the balloon have remained relatively unchanged. There is a basket, commonly made of wicker, inside which are stored the propane fuel tanks. Immediately above the basket and partly wrapped around by the skirt are the burners, attached on suspension wires. The balloon itself is made of strips of fabric called gores which run from the skirt to the top of the balloon; they are further broken into individual panels. This section of the craft is referred to as the envelope. At the top of the envelope is a self closing flap that allows hot air to escape at a controlled rate to slow ascents or cause the balloon to descend descents. This is named the parachute valve, and is controlled by the vent line the cable that runs the length of the envelope and hangs just above the basket so the pilot can open and close the parachute valve. At the mercy of prevailing wind currents, piloting a balloon takes a huge amount of skill but the controls used are fairly straight forward. To lift a balloon the pilot moves the control which releases propane. The pilot can control the speed of the balloon by increasing or decreasing the flow of propane gas, but they cannot control horizontal direction. As a result, balloons are often followed by ground crew, who may have to pick up the pilot, passengers and balloon from any number of landing sites. A pilot who wants to fly a hot air balloon must have his commercial pilots license to fly and must have at least 35 hours of flight instruction. There are no official safety requirements for passengers onboard, but they should know whom theyre flying with and what qualifications they may have. For safety reasons, hot air balloons dont fly in the rain because the heat in the balloon can cause water to boil on top of the balloon and destroy the fabric. One of the largest hot air balloon organisations is the Balloon Federation of America. Founded in 1961, membership in the BFA attracts those with a fascination with ballooning (or Lighter Than Air flight). With an active discussion forum, meetings and displays all around the USA and beyond, the BFA runs on a number of guiding principles, primarily that the future of ballooning is directly related to the safety of enthusiasts. They run a number of training courses, from a novice who is interested in getting a basic licence to pilot achievement courses. They even boast of a balloon simulator, which although will not directly lead to a pilots license, it can give participants a degree of the sensation enjoyed by professional balloon pilots. | The largest hot air balloon had a capacity of over 75000 cubic metres. | c |
id_2812 | HOT AIR BALLOONING The birth of the hot air balloon is largely contributed to the efforts of two French brothers, Joseph and Etienne Montgolfier, who employed the fact that hot air was lighter than cool air and using this, managed to lift a small silk balloon 32 metres into the air. The brothers went on to elevate a balloon into the air ten thousand metres before it started to descend and then exploded. Arguably limited success, but their work came to the eye of the French Science Academy as the discovery of the properties of hot air balloons helped scientists to study weather patterns and the atmosphere. It was not until some considerable time later that a balloon was launched that was capable of carrying passengers. Initial flights were trialled by animals, but after the success of these voyages, two passengers, Jean Francois Pilatre and Francois Laurent dArlendes, were sent up in a balloon which travelled across Paris for 29 minutes. The men fuelled the fire in the centre of their wicker basket to keep the balloon elevated and the trip across Paris was a great success. The discovery of hydrogen-fuelled flights led to the death in 1785 of Pilatre, a tragedy which caused a downfall in the popularity of hot air ballooning but an increase in the popularity of hydrogen. Hot air ballooning lost further ground when alternate modes of air travel were introduced but in the 1950s, ballooning experienced something of a revival as a leisure activity and sport. Today there are balloons of all shapes and sizes, with many unique designs. In 1987, British entrepreneur Richard Branson crossed the Atlantic in a balloon named Virgin Atlantic Flyer. At the time, this balloon was the largest ever constructed at 65 thousand cubic metres, but four years later, he and Per Lindstrand from Sweden flew nearly 8000 kilometres from Japan to Northern Canada in their balloon the Virgin Pacific Flyer, which was nearly 10 thousand cubic metres bigger and was the longest flight in a hot air balloon ever made. The Pacific Flyer was designed to fly in the trans-oceanic jet streams and recorded the highest ground speed for a manned balloon at 394 kilometres per hour. There are now a wide variety of designs and equipment available, from baskets with room for two people right up to 35 or more, separated compartments and specially designed flame resistant fabrics, but the basic parts of the balloon have remained relatively unchanged. There is a basket, commonly made of wicker, inside which are stored the propane fuel tanks. Immediately above the basket and partly wrapped around by the skirt are the burners, attached on suspension wires. The balloon itself is made of strips of fabric called gores which run from the skirt to the top of the balloon; they are further broken into individual panels. This section of the craft is referred to as the envelope. At the top of the envelope is a self closing flap that allows hot air to escape at a controlled rate to slow ascents or cause the balloon to descend descents. This is named the parachute valve, and is controlled by the vent line the cable that runs the length of the envelope and hangs just above the basket so the pilot can open and close the parachute valve. At the mercy of prevailing wind currents, piloting a balloon takes a huge amount of skill but the controls used are fairly straight forward. To lift a balloon the pilot moves the control which releases propane. The pilot can control the speed of the balloon by increasing or decreasing the flow of propane gas, but they cannot control horizontal direction. As a result, balloons are often followed by ground crew, who may have to pick up the pilot, passengers and balloon from any number of landing sites. A pilot who wants to fly a hot air balloon must have his commercial pilots license to fly and must have at least 35 hours of flight instruction. There are no official safety requirements for passengers onboard, but they should know whom theyre flying with and what qualifications they may have. For safety reasons, hot air balloons dont fly in the rain because the heat in the balloon can cause water to boil on top of the balloon and destroy the fabric. One of the largest hot air balloon organisations is the Balloon Federation of America. Founded in 1961, membership in the BFA attracts those with a fascination with ballooning (or Lighter Than Air flight). With an active discussion forum, meetings and displays all around the USA and beyond, the BFA runs on a number of guiding principles, primarily that the future of ballooning is directly related to the safety of enthusiasts. They run a number of training courses, from a novice who is interested in getting a basic licence to pilot achievement courses. They even boast of a balloon simulator, which although will not directly lead to a pilots license, it can give participants a degree of the sensation enjoyed by professional balloon pilots. | Membership of the BFA is only open to people in America. | c |
id_2813 | HOT AIR BALLOONING The birth of the hot air balloon is largely contributed to the efforts of two French brothers, Joseph and Etienne Montgolfier, who employed the fact that hot air was lighter than cool air and using this, managed to lift a small silk balloon 32 metres into the air. The brothers went on to elevate a balloon into the air ten thousand metres before it started to descend and then exploded. Arguably limited success, but their work came to the eye of the French Science Academy as the discovery of the properties of hot air balloons helped scientists to study weather patterns and the atmosphere. It was not until some considerable time later that a balloon was launched that was capable of carrying passengers. Initial flights were trialled by animals, but after the success of these voyages, two passengers, Jean Francois Pilatre and Francois Laurent dArlendes, were sent up in a balloon which travelled across Paris for 29 minutes. The men fuelled the fire in the centre of their wicker basket to keep the balloon elevated and the trip across Paris was a great success. The discovery of hydrogen-fuelled flights led to the death in 1785 of Pilatre, a tragedy which caused a downfall in the popularity of hot air ballooning but an increase in the popularity of hydrogen. Hot air ballooning lost further ground when alternate modes of air travel were introduced but in the 1950s, ballooning experienced something of a revival as a leisure activity and sport. Today there are balloons of all shapes and sizes, with many unique designs. In 1987, British entrepreneur Richard Branson crossed the Atlantic in a balloon named Virgin Atlantic Flyer. At the time, this balloon was the largest ever constructed at 65 thousand cubic metres, but four years later, he and Per Lindstrand from Sweden flew nearly 8000 kilometres from Japan to Northern Canada in their balloon the Virgin Pacific Flyer, which was nearly 10 thousand cubic metres bigger and was the longest flight in a hot air balloon ever made. The Pacific Flyer was designed to fly in the trans-oceanic jet streams and recorded the highest ground speed for a manned balloon at 394 kilometres per hour. There are now a wide variety of designs and equipment available, from baskets with room for two people right up to 35 or more, separated compartments and specially designed flame resistant fabrics, but the basic parts of the balloon have remained relatively unchanged. There is a basket, commonly made of wicker, inside which are stored the propane fuel tanks. Immediately above the basket and partly wrapped around by the skirt are the burners, attached on suspension wires. The balloon itself is made of strips of fabric called gores which run from the skirt to the top of the balloon; they are further broken into individual panels. This section of the craft is referred to as the envelope. At the top of the envelope is a self closing flap that allows hot air to escape at a controlled rate to slow ascents or cause the balloon to descend descents. This is named the parachute valve, and is controlled by the vent line the cable that runs the length of the envelope and hangs just above the basket so the pilot can open and close the parachute valve. At the mercy of prevailing wind currents, piloting a balloon takes a huge amount of skill but the controls used are fairly straight forward. To lift a balloon the pilot moves the control which releases propane. The pilot can control the speed of the balloon by increasing or decreasing the flow of propane gas, but they cannot control horizontal direction. As a result, balloons are often followed by ground crew, who may have to pick up the pilot, passengers and balloon from any number of landing sites. A pilot who wants to fly a hot air balloon must have his commercial pilots license to fly and must have at least 35 hours of flight instruction. There are no official safety requirements for passengers onboard, but they should know whom theyre flying with and what qualifications they may have. For safety reasons, hot air balloons dont fly in the rain because the heat in the balloon can cause water to boil on top of the balloon and destroy the fabric. One of the largest hot air balloon organisations is the Balloon Federation of America. Founded in 1961, membership in the BFA attracts those with a fascination with ballooning (or Lighter Than Air flight). With an active discussion forum, meetings and displays all around the USA and beyond, the BFA runs on a number of guiding principles, primarily that the future of ballooning is directly related to the safety of enthusiasts. They run a number of training courses, from a novice who is interested in getting a basic licence to pilot achievement courses. They even boast of a balloon simulator, which although will not directly lead to a pilots license, it can give participants a degree of the sensation enjoyed by professional balloon pilots. | Hot air ballooning became less popular in the late eighteenth century. | e |
id_2814 | HOW DOES THE BIOLOGICAL CLOCK TICK? Our life span is restricted. Everyone accepts this as biologically obvious. Nothing lives for ever! However, in this statement we think of artificially produced, technical objects, products which are subjected to natural wear and tear during use. This leads to the result that at some time or other the object stops working and is unusable (death in the biological sense). But are the wear and tear and loss of function of technical objects and the death of living organisms really similar or comparable? Our dead products are static, closed systems. It is always the basic material which constitutes the object and which, in the natural course of things, is worn down and becomes older. Ageing in this case must occur according to the laws of physical chemistry and of thermodynamics. Although the same law holds for a living organism, the result of this law is not inexorable in the same way. At least as long as a biological system has the ability to renew itself it could actually become older without ageing; an organism is an open, dynamic system through which new material continuously flows. Destruction of old material and formation of new material are thus in permanent dynamic equilibrium. The material of which the organism is formed changes continuously. Thus our bodies continuously exchange old substance for new, just like a spring which more or less maintains its form and movement, but in which the water molecules are always different. Thus ageing and death should not be seen as inevitable, particularly as the organism possesses many mechanisms for repair. It is not, in principle, necessary for a biological system to age and die. Nevertheless, a restricted life span, ageing, and then death are basic characteristics of life. The reason for this is easy to recognise: in nature, the existent organisms either adapt or are regularly replaced by new types. Because of changes in the genetic material (mutations) these have new characteristics and in the course of their individual lives they are tested for optimal or better adaptation to the environmental conditions. Immortality would disturb this system - it needs room for new and better life. This is the basic problem of evolution. Every organism has a life span which is highly characteristic. There are striking differences in life span between different species, but within one species the parameter is relatively constant. For example, the average duration of human life has hardly changed in thousands of years. Although more and more people attain an advanced age as a result of developments in medical care and better nutrition, the characteristic upper limit for most remains 80 years. A further argument against the simple wear and tear theory is the observation that the time within which organisms age lies between a few days (even a few hours for unicellular organisms) and several thousand years, as with mammoth trees. If a life span is a genetically determined biological characteristic, it is logically necessary to propose the existence of an internal clock, which in some way measures and controls the ageing process and which finally determines death as the last step in a fixed programme. Like the life span, the metabolic rate has for different organisms a fixed mathematical relationship to the body mass. In comparison to the life span this relationship is inverted: the larger the organism the lower its metabolic rate. Again this relationship is valid not only for birds, but also, similarly on average within the systematic unit, for all other organisms (plants, animals, unicellular organisms). Animals which behave frugally with energy become particularly old, for example, crocodiles and tortoises. Parrots and birds of prey are often held chained up. Thus they are not able to experience life and so they attain a high life span in captivity. Animals which save energy by hibernation or lethargy (e. g. bats or hedgehogs) live much longer than those which are always active. The metabolic rate of mice can be reduced by a very low consumption of food (hunger diet). They then may live twice as long as their well fed 70comrades. Women become distinctly (about 10 per cent) older than men. If you examine the metabolic rates of the two sexes you establish that the higher male metabolic rate roughly accounts for the lower male life span. That means that they live life energetically - more intensively, but not for as long. It follows from the above that sparing use of energy reserves should tend to extend life. Extreme high performance sports may lead to optimal cardiovascular performance, but they quite certainly do not prolong life. Relaxation lowers metabolic rate, as does adequate sleep and in general an equable and balanced personality. Each of us can develop his or her own energy saving programme with a little self-observation, critical self-control and, above all, logical consistency. Experience will show that to live in this way not only increases the life span but is also very healthy. This final aspect should not be forgotten. | The wear and tear theory applies to both artificial objects and biological systems. | c |
id_2815 | HOW DOES THE BIOLOGICAL CLOCK TICK? Our life span is restricted. Everyone accepts this as biologically obvious. Nothing lives for ever! However, in this statement we think of artificially produced, technical objects, products which are subjected to natural wear and tear during use. This leads to the result that at some time or other the object stops working and is unusable (death in the biological sense). But are the wear and tear and loss of function of technical objects and the death of living organisms really similar or comparable? Our dead products are static, closed systems. It is always the basic material which constitutes the object and which, in the natural course of things, is worn down and becomes older. Ageing in this case must occur according to the laws of physical chemistry and of thermodynamics. Although the same law holds for a living organism, the result of this law is not inexorable in the same way. At least as long as a biological system has the ability to renew itself it could actually become older without ageing; an organism is an open, dynamic system through which new material continuously flows. Destruction of old material and formation of new material are thus in permanent dynamic equilibrium. The material of which the organism is formed changes continuously. Thus our bodies continuously exchange old substance for new, just like a spring which more or less maintains its form and movement, but in which the water molecules are always different. Thus ageing and death should not be seen as inevitable, particularly as the organism possesses many mechanisms for repair. It is not, in principle, necessary for a biological system to age and die. Nevertheless, a restricted life span, ageing, and then death are basic characteristics of life. The reason for this is easy to recognise: in nature, the existent organisms either adapt or are regularly replaced by new types. Because of changes in the genetic material (mutations) these have new characteristics and in the course of their individual lives they are tested for optimal or better adaptation to the environmental conditions. Immortality would disturb this system - it needs room for new and better life. This is the basic problem of evolution. Every organism has a life span which is highly characteristic. There are striking differences in life span between different species, but within one species the parameter is relatively constant. For example, the average duration of human life has hardly changed in thousands of years. Although more and more people attain an advanced age as a result of developments in medical care and better nutrition, the characteristic upper limit for most remains 80 years. A further argument against the simple wear and tear theory is the observation that the time within which organisms age lies between a few days (even a few hours for unicellular organisms) and several thousand years, as with mammoth trees. If a life span is a genetically determined biological characteristic, it is logically necessary to propose the existence of an internal clock, which in some way measures and controls the ageing process and which finally determines death as the last step in a fixed programme. Like the life span, the metabolic rate has for different organisms a fixed mathematical relationship to the body mass. In comparison to the life span this relationship is inverted: the larger the organism the lower its metabolic rate. Again this relationship is valid not only for birds, but also, similarly on average within the systematic unit, for all other organisms (plants, animals, unicellular organisms). Animals which behave frugally with energy become particularly old, for example, crocodiles and tortoises. Parrots and birds of prey are often held chained up. Thus they are not able to experience life and so they attain a high life span in captivity. Animals which save energy by hibernation or lethargy (e. g. bats or hedgehogs) live much longer than those which are always active. The metabolic rate of mice can be reduced by a very low consumption of food (hunger diet). They then may live twice as long as their well fed 70comrades. Women become distinctly (about 10 per cent) older than men. If you examine the metabolic rates of the two sexes you establish that the higher male metabolic rate roughly accounts for the lower male life span. That means that they live life energetically - more intensively, but not for as long. It follows from the above that sparing use of energy reserves should tend to extend life. Extreme high performance sports may lead to optimal cardiovascular performance, but they quite certainly do not prolong life. Relaxation lowers metabolic rate, as does adequate sleep and in general an equable and balanced personality. Each of us can develop his or her own energy saving programme with a little self-observation, critical self-control and, above all, logical consistency. Experience will show that to live in this way not only increases the life span but is also very healthy. This final aspect should not be forgotten. | Conserving energy may help to extend a humans life. | e |
id_2816 | HOW DOES THE BIOLOGICAL CLOCK TICK? Our life span is restricted. Everyone accepts this as biologically obvious. Nothing lives for ever! However, in this statement we think of artificially produced, technical objects, products which are subjected to natural wear and tear during use. This leads to the result that at some time or other the object stops working and is unusable (death in the biological sense). But are the wear and tear and loss of function of technical objects and the death of living organisms really similar or comparable? Our dead products are static, closed systems. It is always the basic material which constitutes the object and which, in the natural course of things, is worn down and becomes older. Ageing in this case must occur according to the laws of physical chemistry and of thermodynamics. Although the same law holds for a living organism, the result of this law is not inexorable in the same way. At least as long as a biological system has the ability to renew itself it could actually become older without ageing; an organism is an open, dynamic system through which new material continuously flows. Destruction of old material and formation of new material are thus in permanent dynamic equilibrium. The material of which the organism is formed changes continuously. Thus our bodies continuously exchange old substance for new, just like a spring which more or less maintains its form and movement, but in which the water molecules are always different. Thus ageing and death should not be seen as inevitable, particularly as the organism possesses many mechanisms for repair. It is not, in principle, necessary for a biological system to age and die. Nevertheless, a restricted life span, ageing, and then death are basic characteristics of life. The reason for this is easy to recognise: in nature, the existent organisms either adapt or are regularly replaced by new types. Because of changes in the genetic material (mutations) these have new characteristics and in the course of their individual lives they are tested for optimal or better adaptation to the environmental conditions. Immortality would disturb this system - it needs room for new and better life. This is the basic problem of evolution. Every organism has a life span which is highly characteristic. There are striking differences in life span between different species, but within one species the parameter is relatively constant. For example, the average duration of human life has hardly changed in thousands of years. Although more and more people attain an advanced age as a result of developments in medical care and better nutrition, the characteristic upper limit for most remains 80 years. A further argument against the simple wear and tear theory is the observation that the time within which organisms age lies between a few days (even a few hours for unicellular organisms) and several thousand years, as with mammoth trees. If a life span is a genetically determined biological characteristic, it is logically necessary to propose the existence of an internal clock, which in some way measures and controls the ageing process and which finally determines death as the last step in a fixed programme. Like the life span, the metabolic rate has for different organisms a fixed mathematical relationship to the body mass. In comparison to the life span this relationship is inverted: the larger the organism the lower its metabolic rate. Again this relationship is valid not only for birds, but also, similarly on average within the systematic unit, for all other organisms (plants, animals, unicellular organisms). Animals which behave frugally with energy become particularly old, for example, crocodiles and tortoises. Parrots and birds of prey are often held chained up. Thus they are not able to experience life and so they attain a high life span in captivity. Animals which save energy by hibernation or lethargy (e. g. bats or hedgehogs) live much longer than those which are always active. The metabolic rate of mice can be reduced by a very low consumption of food (hunger diet). They then may live twice as long as their well fed 70comrades. Women become distinctly (about 10 per cent) older than men. If you examine the metabolic rates of the two sexes you establish that the higher male metabolic rate roughly accounts for the lower male life span. That means that they live life energetically - more intensively, but not for as long. It follows from the above that sparing use of energy reserves should tend to extend life. Extreme high performance sports may lead to optimal cardiovascular performance, but they quite certainly do not prolong life. Relaxation lowers metabolic rate, as does adequate sleep and in general an equable and balanced personality. Each of us can develop his or her own energy saving programme with a little self-observation, critical self-control and, above all, logical consistency. Experience will show that to live in this way not only increases the life span but is also very healthy. This final aspect should not be forgotten. | Within seven years, about 90 per cent of a human body is replaced as new. | n |
id_2817 | HOW DOES THE BIOLOGICAL CLOCK TICK? Our life span is restricted. Everyone accepts this as biologically obvious. Nothing lives for ever! However, in this statement we think of artificially produced, technical objects, products which are subjected to natural wear and tear during use. This leads to the result that at some time or other the object stops working and is unusable (death in the biological sense). But are the wear and tear and loss of function of technical objects and the death of living organisms really similar or comparable? Our dead products are static, closed systems. It is always the basic material which constitutes the object and which, in the natural course of things, is worn down and becomes older. Ageing in this case must occur according to the laws of physical chemistry and of thermodynamics. Although the same law holds for a living organism, the result of this law is not inexorable in the same way. At least as long as a biological system has the ability to renew itself it could actually become older without ageing; an organism is an open, dynamic system through which new material continuously flows. Destruction of old material and formation of new material are thus in permanent dynamic equilibrium. The material of which the organism is formed changes continuously. Thus our bodies continuously exchange old substance for new, just like a spring which more or less maintains its form and movement, but in which the water molecules are always different. Thus ageing and death should not be seen as inevitable, particularly as the organism possesses many mechanisms for repair. It is not, in principle, necessary for a biological system to age and die. Nevertheless, a restricted life span, ageing, and then death are basic characteristics of life. The reason for this is easy to recognise: in nature, the existent organisms either adapt or are regularly replaced by new types. Because of changes in the genetic material (mutations) these have new characteristics and in the course of their individual lives they are tested for optimal or better adaptation to the environmental conditions. Immortality would disturb this system - it needs room for new and better life. This is the basic problem of evolution. Every organism has a life span which is highly characteristic. There are striking differences in life span between different species, but within one species the parameter is relatively constant. For example, the average duration of human life has hardly changed in thousands of years. Although more and more people attain an advanced age as a result of developments in medical care and better nutrition, the characteristic upper limit for most remains 80 years. A further argument against the simple wear and tear theory is the observation that the time within which organisms age lies between a few days (even a few hours for unicellular organisms) and several thousand years, as with mammoth trees. If a life span is a genetically determined biological characteristic, it is logically necessary to propose the existence of an internal clock, which in some way measures and controls the ageing process and which finally determines death as the last step in a fixed programme. Like the life span, the metabolic rate has for different organisms a fixed mathematical relationship to the body mass. In comparison to the life span this relationship is inverted: the larger the organism the lower its metabolic rate. Again this relationship is valid not only for birds, but also, similarly on average within the systematic unit, for all other organisms (plants, animals, unicellular organisms). Animals which behave frugally with energy become particularly old, for example, crocodiles and tortoises. Parrots and birds of prey are often held chained up. Thus they are not able to experience life and so they attain a high life span in captivity. Animals which save energy by hibernation or lethargy (e. g. bats or hedgehogs) live much longer than those which are always active. The metabolic rate of mice can be reduced by a very low consumption of food (hunger diet). They then may live twice as long as their well fed 70comrades. Women become distinctly (about 10 per cent) older than men. If you examine the metabolic rates of the two sexes you establish that the higher male metabolic rate roughly accounts for the lower male life span. That means that they live life energetically - more intensively, but not for as long. It follows from the above that sparing use of energy reserves should tend to extend life. Extreme high performance sports may lead to optimal cardiovascular performance, but they quite certainly do not prolong life. Relaxation lowers metabolic rate, as does adequate sleep and in general an equable and balanced personality. Each of us can develop his or her own energy saving programme with a little self-observation, critical self-control and, above all, logical consistency. Experience will show that to live in this way not only increases the life span but is also very healthy. This final aspect should not be forgotten. | In principle, it is possible for a biological system to become older without ageing. | e |
id_2818 | Hacked off Internet security, or rather the lack of it, is the bane of todays computer user. Computer hackers write malicious computer programs (or malware) that infect vulnerable computers and modify the way they operate. Typically, these programs are downloaded from the internet inadvertently with a single click of the mouse. The consequences are detrimental to the user, ranging from a minor nuisance for example, slowing the computers speed to a major financial loss for an individual or company, when login and password details are accessed and fraud ensues. Examples of malware include viruses, worms, trojans (Trojan horses), spyware, keystroke logging, scareware and dishonest adware. A virus can be released when a user opens an e-mail and downloads an attach ment. The text portion of the e-mail cannot carry any malware but the attachment may contain a virus, for example in a macro (a short program) embedded in a worksheet document, such as Excel. Viruses can replicate and if they spread to the host com puters boot sector files they can leave the user with a blue-screen of death. In this circumstance, the blue-screen is accompanied by a message that starts A problem has been detected and Windows has been shut down to prevent damage to your computer. Whilst malware cannot physically damage the computers hard drive the information on the boot sector has been destroyed and the computer is unable to function. In a worst case scenario the hard disk has to be wiped clean by reformatt ing, before the operating system can be reinstalled, in which case every program and file will be lost. Unlike a virus, a worm can infect a computer without the user downloading an attachment, so it can spread through a network of computers at tremendous speed. The ability of worms to replicate in this way means that they can infect every contact in the users e-mail address book and potentially every e-mail contact in each recipients computer. Instant messaging programs and social networking sites are similarly at risk. A main feature of a worm is that it slows the computer down by consuming memory or hard disk space so that the computer eventually locks up. The word trojan derives from the Trojan Horse of Greek mythology that tricked the Trojans into allowing Greek soldiers into the city of Troy, hidden inside a wooden horse. Today a trojan is a metaphor for malware that masquerades as useful software. Trojans are unable to replicate but they interfere with the computer surreptitiously, allowing viruses and worms unfettered access to the system. Spyware programs monitor a computer users internet surfing habits covertly. Some spyware simply monitors how many visits consumers make to particular web pages and what they are buying or spending, usually for marketing purposes. Keystroke logging is the main fraudulent activity linked to spyware. Here, private and confidential information is obtained from the users keystrokes, enabling criminals to acquire credit card details, or login names and passwords for online bank accounts. Some keystroke loggers operate legitimately to monitor the internet use of employees in the office or to keep tabs on childrens surfing activities at home. Scareware is a form of extortion where a victim is informed that the computer is infected with a virus and, for a fee, is offered a solution to fix the problem. The user is tricked into clicking an OK button and buys software unnecessarily because there is usually no virus. In one scam, a scareware pop-up informs the victim that the computers registry contains critical errors when the problems are actually minor or even non-existent. Persuaded by the pop-up advert, the victim buys the registry cleaner, which may not work or could even damage the computers registry. There are of course legitimate registry cleaners that will boost your computers speed. A genuine registry cleaner will normally be endorsed by a reputable company or recommended in a PC magazine. Adware pop-up adverts are similar to scareware but are merely a nuisance rather than malware (unless dishonest), though they can still download programs that track your shopping habits and slow your computer down. The adverts pop up auto matically when the user opens the internet browser and can become irritating because they conceal information on the opened up page. One answer is to turn on the Internet Explorers pop-up blocker under the privacy tab because this will block most automatic pop-ups. More effectively, a user can purchase an all-in-one security suite to block any malware. Security software automatically blocks and deletes any malicious programs for a more secure web experience. Normally, the software will update itself every day as long as the computer is switched on. | Malware is usually downloaded from the internet by mistake. | e |
id_2819 | Hacked off Internet security, or rather the lack of it, is the bane of todays computer user. Computer hackers write malicious computer programs (or malware) that infect vulnerable computers and modify the way they operate. Typically, these programs are downloaded from the internet inadvertently with a single click of the mouse. The consequences are detrimental to the user, ranging from a minor nuisance for example, slowing the computers speed to a major financial loss for an individual or company, when login and password details are accessed and fraud ensues. Examples of malware include viruses, worms, trojans (Trojan horses), spyware, keystroke logging, scareware and dishonest adware. A virus can be released when a user opens an e-mail and downloads an attach ment. The text portion of the e-mail cannot carry any malware but the attachment may contain a virus, for example in a macro (a short program) embedded in a worksheet document, such as Excel. Viruses can replicate and if they spread to the host com puters boot sector files they can leave the user with a blue-screen of death. In this circumstance, the blue-screen is accompanied by a message that starts A problem has been detected and Windows has been shut down to prevent damage to your computer. Whilst malware cannot physically damage the computers hard drive the information on the boot sector has been destroyed and the computer is unable to function. In a worst case scenario the hard disk has to be wiped clean by reformatt ing, before the operating system can be reinstalled, in which case every program and file will be lost. Unlike a virus, a worm can infect a computer without the user downloading an attachment, so it can spread through a network of computers at tremendous speed. The ability of worms to replicate in this way means that they can infect every contact in the users e-mail address book and potentially every e-mail contact in each recipients computer. Instant messaging programs and social networking sites are similarly at risk. A main feature of a worm is that it slows the computer down by consuming memory or hard disk space so that the computer eventually locks up. The word trojan derives from the Trojan Horse of Greek mythology that tricked the Trojans into allowing Greek soldiers into the city of Troy, hidden inside a wooden horse. Today a trojan is a metaphor for malware that masquerades as useful software. Trojans are unable to replicate but they interfere with the computer surreptitiously, allowing viruses and worms unfettered access to the system. Spyware programs monitor a computer users internet surfing habits covertly. Some spyware simply monitors how many visits consumers make to particular web pages and what they are buying or spending, usually for marketing purposes. Keystroke logging is the main fraudulent activity linked to spyware. Here, private and confidential information is obtained from the users keystrokes, enabling criminals to acquire credit card details, or login names and passwords for online bank accounts. Some keystroke loggers operate legitimately to monitor the internet use of employees in the office or to keep tabs on childrens surfing activities at home. Scareware is a form of extortion where a victim is informed that the computer is infected with a virus and, for a fee, is offered a solution to fix the problem. The user is tricked into clicking an OK button and buys software unnecessarily because there is usually no virus. In one scam, a scareware pop-up informs the victim that the computers registry contains critical errors when the problems are actually minor or even non-existent. Persuaded by the pop-up advert, the victim buys the registry cleaner, which may not work or could even damage the computers registry. There are of course legitimate registry cleaners that will boost your computers speed. A genuine registry cleaner will normally be endorsed by a reputable company or recommended in a PC magazine. Adware pop-up adverts are similar to scareware but are merely a nuisance rather than malware (unless dishonest), though they can still download programs that track your shopping habits and slow your computer down. The adverts pop up auto matically when the user opens the internet browser and can become irritating because they conceal information on the opened up page. One answer is to turn on the Internet Explorers pop-up blocker under the privacy tab because this will block most automatic pop-ups. More effectively, a user can purchase an all-in-one security suite to block any malware. Security software automatically blocks and deletes any malicious programs for a more secure web experience. Normally, the software will update itself every day as long as the computer is switched on. | An e-mail text can carry a virus. | c |
id_2820 | Hacked off Internet security, or rather the lack of it, is the bane of todays computer user. Computer hackers write malicious computer programs (or malware) that infect vulnerable computers and modify the way they operate. Typically, these programs are downloaded from the internet inadvertently with a single click of the mouse. The consequences are detrimental to the user, ranging from a minor nuisance for example, slowing the computers speed to a major financial loss for an individual or company, when login and password details are accessed and fraud ensues. Examples of malware include viruses, worms, trojans (Trojan horses), spyware, keystroke logging, scareware and dishonest adware. A virus can be released when a user opens an e-mail and downloads an attach ment. The text portion of the e-mail cannot carry any malware but the attachment may contain a virus, for example in a macro (a short program) embedded in a worksheet document, such as Excel. Viruses can replicate and if they spread to the host com puters boot sector files they can leave the user with a blue-screen of death. In this circumstance, the blue-screen is accompanied by a message that starts A problem has been detected and Windows has been shut down to prevent damage to your computer. Whilst malware cannot physically damage the computers hard drive the information on the boot sector has been destroyed and the computer is unable to function. In a worst case scenario the hard disk has to be wiped clean by reformatt ing, before the operating system can be reinstalled, in which case every program and file will be lost. Unlike a virus, a worm can infect a computer without the user downloading an attachment, so it can spread through a network of computers at tremendous speed. The ability of worms to replicate in this way means that they can infect every contact in the users e-mail address book and potentially every e-mail contact in each recipients computer. Instant messaging programs and social networking sites are similarly at risk. A main feature of a worm is that it slows the computer down by consuming memory or hard disk space so that the computer eventually locks up. The word trojan derives from the Trojan Horse of Greek mythology that tricked the Trojans into allowing Greek soldiers into the city of Troy, hidden inside a wooden horse. Today a trojan is a metaphor for malware that masquerades as useful software. Trojans are unable to replicate but they interfere with the computer surreptitiously, allowing viruses and worms unfettered access to the system. Spyware programs monitor a computer users internet surfing habits covertly. Some spyware simply monitors how many visits consumers make to particular web pages and what they are buying or spending, usually for marketing purposes. Keystroke logging is the main fraudulent activity linked to spyware. Here, private and confidential information is obtained from the users keystrokes, enabling criminals to acquire credit card details, or login names and passwords for online bank accounts. Some keystroke loggers operate legitimately to monitor the internet use of employees in the office or to keep tabs on childrens surfing activities at home. Scareware is a form of extortion where a victim is informed that the computer is infected with a virus and, for a fee, is offered a solution to fix the problem. The user is tricked into clicking an OK button and buys software unnecessarily because there is usually no virus. In one scam, a scareware pop-up informs the victim that the computers registry contains critical errors when the problems are actually minor or even non-existent. Persuaded by the pop-up advert, the victim buys the registry cleaner, which may not work or could even damage the computers registry. There are of course legitimate registry cleaners that will boost your computers speed. A genuine registry cleaner will normally be endorsed by a reputable company or recommended in a PC magazine. Adware pop-up adverts are similar to scareware but are merely a nuisance rather than malware (unless dishonest), though they can still download programs that track your shopping habits and slow your computer down. The adverts pop up auto matically when the user opens the internet browser and can become irritating because they conceal information on the opened up page. One answer is to turn on the Internet Explorers pop-up blocker under the privacy tab because this will block most automatic pop-ups. More effectively, a user can purchase an all-in-one security suite to block any malware. Security software automatically blocks and deletes any malicious programs for a more secure web experience. Normally, the software will update itself every day as long as the computer is switched on. | A virus can result in the loss of every program and file. | e |
id_2821 | Hacked off Internet security, or rather the lack of it, is the bane of todays computer user. Computer hackers write malicious computer programs (or malware) that infect vulnerable computers and modify the way they operate. Typically, these programs are downloaded from the internet inadvertently with a single click of the mouse. The consequences are detrimental to the user, ranging from a minor nuisance for example, slowing the computers speed to a major financial loss for an individual or company, when login and password details are accessed and fraud ensues. Examples of malware include viruses, worms, trojans (Trojan horses), spyware, keystroke logging, scareware and dishonest adware. A virus can be released when a user opens an e-mail and downloads an attach ment. The text portion of the e-mail cannot carry any malware but the attachment may contain a virus, for example in a macro (a short program) embedded in a worksheet document, such as Excel. Viruses can replicate and if they spread to the host com puters boot sector files they can leave the user with a blue-screen of death. In this circumstance, the blue-screen is accompanied by a message that starts A problem has been detected and Windows has been shut down to prevent damage to your computer. Whilst malware cannot physically damage the computers hard drive the information on the boot sector has been destroyed and the computer is unable to function. In a worst case scenario the hard disk has to be wiped clean by reformatt ing, before the operating system can be reinstalled, in which case every program and file will be lost. Unlike a virus, a worm can infect a computer without the user downloading an attachment, so it can spread through a network of computers at tremendous speed. The ability of worms to replicate in this way means that they can infect every contact in the users e-mail address book and potentially every e-mail contact in each recipients computer. Instant messaging programs and social networking sites are similarly at risk. A main feature of a worm is that it slows the computer down by consuming memory or hard disk space so that the computer eventually locks up. The word trojan derives from the Trojan Horse of Greek mythology that tricked the Trojans into allowing Greek soldiers into the city of Troy, hidden inside a wooden horse. Today a trojan is a metaphor for malware that masquerades as useful software. Trojans are unable to replicate but they interfere with the computer surreptitiously, allowing viruses and worms unfettered access to the system. Spyware programs monitor a computer users internet surfing habits covertly. Some spyware simply monitors how many visits consumers make to particular web pages and what they are buying or spending, usually for marketing purposes. Keystroke logging is the main fraudulent activity linked to spyware. Here, private and confidential information is obtained from the users keystrokes, enabling criminals to acquire credit card details, or login names and passwords for online bank accounts. Some keystroke loggers operate legitimately to monitor the internet use of employees in the office or to keep tabs on childrens surfing activities at home. Scareware is a form of extortion where a victim is informed that the computer is infected with a virus and, for a fee, is offered a solution to fix the problem. The user is tricked into clicking an OK button and buys software unnecessarily because there is usually no virus. In one scam, a scareware pop-up informs the victim that the computers registry contains critical errors when the problems are actually minor or even non-existent. Persuaded by the pop-up advert, the victim buys the registry cleaner, which may not work or could even damage the computers registry. There are of course legitimate registry cleaners that will boost your computers speed. A genuine registry cleaner will normally be endorsed by a reputable company or recommended in a PC magazine. Adware pop-up adverts are similar to scareware but are merely a nuisance rather than malware (unless dishonest), though they can still download programs that track your shopping habits and slow your computer down. The adverts pop up auto matically when the user opens the internet browser and can become irritating because they conceal information on the opened up page. One answer is to turn on the Internet Explorers pop-up blocker under the privacy tab because this will block most automatic pop-ups. More effectively, a user can purchase an all-in-one security suite to block any malware. Security software automatically blocks and deletes any malicious programs for a more secure web experience. Normally, the software will update itself every day as long as the computer is switched on. | Java applets can contain malicious code. | n |
id_2822 | Hacked off Internet security, or rather the lack of it, is the bane of todays computer user. Computer hackers write malicious computer programs (or malware) that infect vulnerable computers and modify the way they operate. Typically, these programs are downloaded from the internet inadvertently with a single click of the mouse. The consequences are detrimental to the user, ranging from a minor nuisance for example, slowing the computers speed to a major financial loss for an individual or company, when login and password details are accessed and fraud ensues. Examples of malware include viruses, worms, trojans (Trojan horses), spyware, keystroke logging, scareware and dishonest adware. A virus can be released when a user opens an e-mail and downloads an attach ment. The text portion of the e-mail cannot carry any malware but the attachment may contain a virus, for example in a macro (a short program) embedded in a worksheet document, such as Excel. Viruses can replicate and if they spread to the host com puters boot sector files they can leave the user with a blue-screen of death. In this circumstance, the blue-screen is accompanied by a message that starts A problem has been detected and Windows has been shut down to prevent damage to your computer. Whilst malware cannot physically damage the computers hard drive the information on the boot sector has been destroyed and the computer is unable to function. In a worst case scenario the hard disk has to be wiped clean by reformatt ing, before the operating system can be reinstalled, in which case every program and file will be lost. Unlike a virus, a worm can infect a computer without the user downloading an attachment, so it can spread through a network of computers at tremendous speed. The ability of worms to replicate in this way means that they can infect every contact in the users e-mail address book and potentially every e-mail contact in each recipients computer. Instant messaging programs and social networking sites are similarly at risk. A main feature of a worm is that it slows the computer down by consuming memory or hard disk space so that the computer eventually locks up. The word trojan derives from the Trojan Horse of Greek mythology that tricked the Trojans into allowing Greek soldiers into the city of Troy, hidden inside a wooden horse. Today a trojan is a metaphor for malware that masquerades as useful software. Trojans are unable to replicate but they interfere with the computer surreptitiously, allowing viruses and worms unfettered access to the system. Spyware programs monitor a computer users internet surfing habits covertly. Some spyware simply monitors how many visits consumers make to particular web pages and what they are buying or spending, usually for marketing purposes. Keystroke logging is the main fraudulent activity linked to spyware. Here, private and confidential information is obtained from the users keystrokes, enabling criminals to acquire credit card details, or login names and passwords for online bank accounts. Some keystroke loggers operate legitimately to monitor the internet use of employees in the office or to keep tabs on childrens surfing activities at home. Scareware is a form of extortion where a victim is informed that the computer is infected with a virus and, for a fee, is offered a solution to fix the problem. The user is tricked into clicking an OK button and buys software unnecessarily because there is usually no virus. In one scam, a scareware pop-up informs the victim that the computers registry contains critical errors when the problems are actually minor or even non-existent. Persuaded by the pop-up advert, the victim buys the registry cleaner, which may not work or could even damage the computers registry. There are of course legitimate registry cleaners that will boost your computers speed. A genuine registry cleaner will normally be endorsed by a reputable company or recommended in a PC magazine. Adware pop-up adverts are similar to scareware but are merely a nuisance rather than malware (unless dishonest), though they can still download programs that track your shopping habits and slow your computer down. The adverts pop up auto matically when the user opens the internet browser and can become irritating because they conceal information on the opened up page. One answer is to turn on the Internet Explorers pop-up blocker under the privacy tab because this will block most automatic pop-ups. More effectively, a user can purchase an all-in-one security suite to block any malware. Security software automatically blocks and deletes any malicious programs for a more secure web experience. Normally, the software will update itself every day as long as the computer is switched on. | A Trojan disguises itself as useful software. | e |
id_2823 | Hacked off Internet security, or rather the lack of it, is the bane of todays computer user. Computer hackers write malicious computer programs (or malware) that infect vulnerable computers and modify the way they operate. Typically, these programs are downloaded from the internet inadvertently with a single click of the mouse. The consequences are detrimental to the user, ranging from a minor nuisance for example, slowing the computers speed to a major financial loss for an individual or company, when login and password details are accessed and fraud ensues. Examples of malware include viruses, worms, trojans (Trojan horses), spyware, keystroke logging, scareware and dishonest adware. A virus can be released when a user opens an e-mail and downloads an attach ment. The text portion of the e-mail cannot carry any malware but the attachment may contain a virus, for example in a macro (a short program) embedded in a worksheet document, such as Excel. Viruses can replicate and if they spread to the host com puters boot sector files they can leave the user with a blue-screen of death. In this circumstance, the blue-screen is accompanied by a message that starts A problem has been detected and Windows has been shut down to prevent damage to your computer. Whilst malware cannot physically damage the computers hard drive the information on the boot sector has been destroyed and the computer is unable to function. In a worst case scenario the hard disk has to be wiped clean by reformatt ing, before the operating system can be reinstalled, in which case every program and file will be lost. Unlike a virus, a worm can infect a computer without the user downloading an attachment, so it can spread through a network of computers at tremendous speed. The ability of worms to replicate in this way means that they can infect every contact in the users e-mail address book and potentially every e-mail contact in each recipients computer. Instant messaging programs and social networking sites are similarly at risk. A main feature of a worm is that it slows the computer down by consuming memory or hard disk space so that the computer eventually locks up. The word trojan derives from the Trojan Horse of Greek mythology that tricked the Trojans into allowing Greek soldiers into the city of Troy, hidden inside a wooden horse. Today a trojan is a metaphor for malware that masquerades as useful software. Trojans are unable to replicate but they interfere with the computer surreptitiously, allowing viruses and worms unfettered access to the system. Spyware programs monitor a computer users internet surfing habits covertly. Some spyware simply monitors how many visits consumers make to particular web pages and what they are buying or spending, usually for marketing purposes. Keystroke logging is the main fraudulent activity linked to spyware. Here, private and confidential information is obtained from the users keystrokes, enabling criminals to acquire credit card details, or login names and passwords for online bank accounts. Some keystroke loggers operate legitimately to monitor the internet use of employees in the office or to keep tabs on childrens surfing activities at home. Scareware is a form of extortion where a victim is informed that the computer is infected with a virus and, for a fee, is offered a solution to fix the problem. The user is tricked into clicking an OK button and buys software unnecessarily because there is usually no virus. In one scam, a scareware pop-up informs the victim that the computers registry contains critical errors when the problems are actually minor or even non-existent. Persuaded by the pop-up advert, the victim buys the registry cleaner, which may not work or could even damage the computers registry. There are of course legitimate registry cleaners that will boost your computers speed. A genuine registry cleaner will normally be endorsed by a reputable company or recommended in a PC magazine. Adware pop-up adverts are similar to scareware but are merely a nuisance rather than malware (unless dishonest), though they can still download programs that track your shopping habits and slow your computer down. The adverts pop up auto matically when the user opens the internet browser and can become irritating because they conceal information on the opened up page. One answer is to turn on the Internet Explorers pop-up blocker under the privacy tab because this will block most automatic pop-ups. More effectively, a user can purchase an all-in-one security suite to block any malware. Security software automatically blocks and deletes any malicious programs for a more secure web experience. Normally, the software will update itself every day as long as the computer is switched on. | Scareware is not harmful to the user. | c |
id_2824 | Hacked off Internet security, or rather the lack of it, is the bane of todays computer user. Computer hackers write malicious computer programs (or malware) that infect vulnerable computers and modify the way they operate. Typically, these programs are downloaded from the internet inadvertently with a single click of the mouse. The consequences are detrimental to the user, ranging from a minor nuisance for example, slowing the computers speed to a major financial loss for an individual or company, when login and password details are accessed and fraud ensues. Examples of malware include viruses, worms, trojans (Trojan horses), spyware, keystroke logging, scareware and dishonest adware. A virus can be released when a user opens an e-mail and downloads an attach ment. The text portion of the e-mail cannot carry any malware but the attachment may contain a virus, for example in a macro (a short program) embedded in a worksheet document, such as Excel. Viruses can replicate and if they spread to the host com puters boot sector files they can leave the user with a blue-screen of death. In this circumstance, the blue-screen is accompanied by a message that starts A problem has been detected and Windows has been shut down to prevent damage to your computer. Whilst malware cannot physically damage the computers hard drive the information on the boot sector has been destroyed and the computer is unable to function. In a worst case scenario the hard disk has to be wiped clean by reformatt ing, before the operating system can be reinstalled, in which case every program and file will be lost. Unlike a virus, a worm can infect a computer without the user downloading an attachment, so it can spread through a network of computers at tremendous speed. The ability of worms to replicate in this way means that they can infect every contact in the users e-mail address book and potentially every e-mail contact in each recipients computer. Instant messaging programs and social networking sites are similarly at risk. A main feature of a worm is that it slows the computer down by consuming memory or hard disk space so that the computer eventually locks up. The word trojan derives from the Trojan Horse of Greek mythology that tricked the Trojans into allowing Greek soldiers into the city of Troy, hidden inside a wooden horse. Today a trojan is a metaphor for malware that masquerades as useful software. Trojans are unable to replicate but they interfere with the computer surreptitiously, allowing viruses and worms unfettered access to the system. Spyware programs monitor a computer users internet surfing habits covertly. Some spyware simply monitors how many visits consumers make to particular web pages and what they are buying or spending, usually for marketing purposes. Keystroke logging is the main fraudulent activity linked to spyware. Here, private and confidential information is obtained from the users keystrokes, enabling criminals to acquire credit card details, or login names and passwords for online bank accounts. Some keystroke loggers operate legitimately to monitor the internet use of employees in the office or to keep tabs on childrens surfing activities at home. Scareware is a form of extortion where a victim is informed that the computer is infected with a virus and, for a fee, is offered a solution to fix the problem. The user is tricked into clicking an OK button and buys software unnecessarily because there is usually no virus. In one scam, a scareware pop-up informs the victim that the computers registry contains critical errors when the problems are actually minor or even non-existent. Persuaded by the pop-up advert, the victim buys the registry cleaner, which may not work or could even damage the computers registry. There are of course legitimate registry cleaners that will boost your computers speed. A genuine registry cleaner will normally be endorsed by a reputable company or recommended in a PC magazine. Adware pop-up adverts are similar to scareware but are merely a nuisance rather than malware (unless dishonest), though they can still download programs that track your shopping habits and slow your computer down. The adverts pop up auto matically when the user opens the internet browser and can become irritating because they conceal information on the opened up page. One answer is to turn on the Internet Explorers pop-up blocker under the privacy tab because this will block most automatic pop-ups. More effectively, a user can purchase an all-in-one security suite to block any malware. Security software automatically blocks and deletes any malicious programs for a more secure web experience. Normally, the software will update itself every day as long as the computer is switched on. | Keystroke logging is always fraudulent. | c |
id_2825 | Half of all the worlds wealth is now held by 2 per cent of the worlds population. There are estimated to be 500 dollar billion- aires and over half a billion dollar millionaires. At the other end of the spectrum, the poorest half of the worlds adult population cannot lay claim to even 1 per cent of global wealth. Per capita wealth was lowest in the Republic of Congo and estimated at $180 per person. Such inequality means that, for example, whole populations can never realistically aspire to own the land they work or the modest home in which they have lived for genera- tions. Collectively, the citizens of North America, Europe and a few Asia Pacific countries hold 90 per cent of global wealth. But even within these wealth zones there is inequality. The United States came top as the most unequal nation, while Japan and China had some of the lowest levels of inequality. | Such inequity between the rich and poor creates enormous tension. | n |
id_2826 | Half of all the worlds wealth is now held by 2 per cent of the worlds population. There are estimated to be 500 dollar billion- aires and over half a billion dollar millionaires. At the other end of the spectrum, the poorest half of the worlds adult population cannot lay claim to even 1 per cent of global wealth. Per capita wealth was lowest in the Republic of Congo and estimated at $180 per person. Such inequality means that, for example, whole populations can never realistically aspire to own the land they work or the modest home in which they have lived for genera- tions. Collectively, the citizens of North America, Europe and a few Asia Pacific countries hold 90 per cent of global wealth. But even within these wealth zones there is inequality. The United States came top as the most unequal nation, while Japan and China had some of the lowest levels of inequality. | There are poor people in every nation, so the passage can be criticized for making the mistaken assumption that the worlds poor all live in certain countries. | c |
id_2827 | Half of all the worlds wealth is now held by 2 per cent of the worlds population. There are estimated to be 500 dollar billion- aires and over half a billion dollar millionaires. At the other end of the spectrum, the poorest half of the worlds adult population cannot lay claim to even 1 per cent of global wealth. Per capita wealth was lowest in the Republic of Congo and estimated at $180 per person. Such inequality means that, for example, whole populations can never realistically aspire to own the land they work or the modest home in which they have lived for genera- tions. Collectively, the citizens of North America, Europe and a few Asia Pacific countries hold 90 per cent of global wealth. But even within these wealth zones there is inequality. The United States came top as the most unequal nation, while Japan and China had some of the lowest levels of inequality. | The author would not agree that wealth is largely the monopoly of people living in North America, Europe and a few Asia Pacific countries. | c |
id_2828 | Hampford College Work-Study Program Certain students at Hampford College may be eligible for the college WorkStudy Program. To determine eligibility and to apply for the program, read the information below. * The Hampford College WorkStudy Program is open to all full-time Hampford College students, regardless of the particular study program in which they are enrolled. The program is not open to part-time students. Information on financial support programs for part-time students is available in the Counseling Center. * Before applying for a workstudy position, the student must demonstrate financial need. To do this, complete the Statement of Financial Need Form, available in the Counseling Center. * To apply for a work-study position, submit a letter of interest to the Work-Study Program Office, describing your skills and interests. You may also, but are not required to, submit a resume describing any previous jobs you may have held. Students both with and without an employment history are eligible for the program. * Once you have been approved for the program, look at the help-wanted ads posted on the Counseling Center website. All of the jobs are located at the college. You may apply for any job that you are interested in. Please note that job placement is subject to job availability. While we make every effort to place all Work-Study Program students in a job, there are no guarantees. * All work-study students must be students in good standing at the college; that is, they must receive passing grades in all their courses in order to continue in the program the following semester. * Work-study positions are generally for one year. Students wishing to continue in the program after one year must resubmit their applications. | The WorkStudy Program is available to all students at the college. | c |
id_2829 | Hampford College Work-Study Program Certain students at Hampford College may be eligible for the college WorkStudy Program. To determine eligibility and to apply for the program, read the information below. * The Hampford College WorkStudy Program is open to all full-time Hampford College students, regardless of the particular study program in which they are enrolled. The program is not open to part-time students. Information on financial support programs for part-time students is available in the Counseling Center. * Before applying for a workstudy position, the student must demonstrate financial need. To do this, complete the Statement of Financial Need Form, available in the Counseling Center. * To apply for a work-study position, submit a letter of interest to the Work-Study Program Office, describing your skills and interests. You may also, but are not required to, submit a resume describing any previous jobs you may have held. Students both with and without an employment history are eligible for the program. * Once you have been approved for the program, look at the help-wanted ads posted on the Counseling Center website. All of the jobs are located at the college. You may apply for any job that you are interested in. Please note that job placement is subject to job availability. While we make every effort to place all Work-Study Program students in a job, there are no guarantees. * All work-study students must be students in good standing at the college; that is, they must receive passing grades in all their courses in order to continue in the program the following semester. * Work-study positions are generally for one year. Students wishing to continue in the program after one year must resubmit their applications. | Work-study students must prove that they require monetary support. | e |
id_2830 | Hampford College Work-Study Program Certain students at Hampford College may be eligible for the college WorkStudy Program. To determine eligibility and to apply for the program, read the information below. * The Hampford College WorkStudy Program is open to all full-time Hampford College students, regardless of the particular study program in which they are enrolled. The program is not open to part-time students. Information on financial support programs for part-time students is available in the Counseling Center. * Before applying for a workstudy position, the student must demonstrate financial need. To do this, complete the Statement of Financial Need Form, available in the Counseling Center. * To apply for a work-study position, submit a letter of interest to the Work-Study Program Office, describing your skills and interests. You may also, but are not required to, submit a resume describing any previous jobs you may have held. Students both with and without an employment history are eligible for the program. * Once you have been approved for the program, look at the help-wanted ads posted on the Counseling Center website. All of the jobs are located at the college. You may apply for any job that you are interested in. Please note that job placement is subject to job availability. While we make every effort to place all Work-Study Program students in a job, there are no guarantees. * All work-study students must be students in good standing at the college; that is, they must receive passing grades in all their courses in order to continue in the program the following semester. * Work-study positions are generally for one year. Students wishing to continue in the program after one year must resubmit their applications. | Work-study students must choose a job that is related to their study program. | n |
id_2831 | Hampford College Work-Study Program Certain students at Hampford College may be eligible for the college WorkStudy Program. To determine eligibility and to apply for the program, read the information below. * The Hampford College WorkStudy Program is open to all full-time Hampford College students, regardless of the particular study program in which they are enrolled. The program is not open to part-time students. Information on financial support programs for part-time students is available in the Counseling Center. * Before applying for a workstudy position, the student must demonstrate financial need. To do this, complete the Statement of Financial Need Form, available in the Counseling Center. * To apply for a work-study position, submit a letter of interest to the Work-Study Program Office, describing your skills and interests. You may also, but are not required to, submit a resume describing any previous jobs you may have held. Students both with and without an employment history are eligible for the program. * Once you have been approved for the program, look at the help-wanted ads posted on the Counseling Center website. All of the jobs are located at the college. You may apply for any job that you are interested in. Please note that job placement is subject to job availability. While we make every effort to place all Work-Study Program students in a job, there are no guarantees. * All work-study students must be students in good standing at the college; that is, they must receive passing grades in all their courses in order to continue in the program the following semester. * Work-study positions are generally for one year. Students wishing to continue in the program after one year must resubmit their applications. | Previous work experience is required to participate in the Work-Study Program. | c |
id_2832 | Hampford College Work-Study Program Certain students at Hampford College may be eligible for the college WorkStudy Program. To determine eligibility and to apply for the program, read the information below. * The Hampford College WorkStudy Program is open to all full-time Hampford College students, regardless of the particular study program in which they are enrolled. The program is not open to part-time students. Information on financial support programs for part-time students is available in the Counseling Center. * Before applying for a workstudy position, the student must demonstrate financial need. To do this, complete the Statement of Financial Need Form, available in the Counseling Center. * To apply for a work-study position, submit a letter of interest to the Work-Study Program Office, describing your skills and interests. You may also, but are not required to, submit a resume describing any previous jobs you may have held. Students both with and without an employment history are eligible for the program. * Once you have been approved for the program, look at the help-wanted ads posted on the Counseling Center website. All of the jobs are located at the college. You may apply for any job that you are interested in. Please note that job placement is subject to job availability. While we make every effort to place all Work-Study Program students in a job, there are no guarantees. * All work-study students must be students in good standing at the college; that is, they must receive passing grades in all their courses in order to continue in the program the following semester. * Work-study positions are generally for one year. Students wishing to continue in the program after one year must resubmit their applications. | All students in the Work-Study Program will be given a job. | c |
id_2833 | Hampford College Work-Study Program Certain students at Hampford College may be eligible for the college WorkStudy Program. To determine eligibility and to apply for the program, read the information below. * The Hampford College WorkStudy Program is open to all full-time Hampford College students, regardless of the particular study program in which they are enrolled. The program is not open to part-time students. Information on financial support programs for part-time students is available in the Counseling Center. * Before applying for a workstudy position, the student must demonstrate financial need. To do this, complete the Statement of Financial Need Form, available in the Counseling Center. * To apply for a work-study position, submit a letter of interest to the Work-Study Program Office, describing your skills and interests. You may also, but are not required to, submit a resume describing any previous jobs you may have held. Students both with and without an employment history are eligible for the program. * Once you have been approved for the program, look at the help-wanted ads posted on the Counseling Center website. All of the jobs are located at the college. You may apply for any job that you are interested in. Please note that job placement is subject to job availability. While we make every effort to place all Work-Study Program students in a job, there are no guarantees. * All work-study students must be students in good standing at the college; that is, they must receive passing grades in all their courses in order to continue in the program the following semester. * Work-study positions are generally for one year. Students wishing to continue in the program after one year must resubmit their applications. | Work-study students cannot stay in the program if they receive failing grades. | e |
id_2834 | Hampford College Work-Study Program Certain students at Hampford College may be eligible for the college WorkStudy Program. To determine eligibility and to apply for the program, read the information below. * The Hampford College WorkStudy Program is open to all full-time Hampford College students, regardless of the particular study program in which they are enrolled. The program is not open to part-time students. Information on financial support programs for part-time students is available in the Counseling Center. * Before applying for a workstudy position, the student must demonstrate financial need. To do this, complete the Statement of Financial Need Form, available in the Counseling Center. * To apply for a work-study position, submit a letter of interest to the Work-Study Program Office, describing your skills and interests. You may also, but are not required to, submit a resume describing any previous jobs you may have held. Students both with and without an employment history are eligible for the program. * Once you have been approved for the program, look at the help-wanted ads posted on the Counseling Center website. All of the jobs are located at the college. You may apply for any job that you are interested in. Please note that job placement is subject to job availability. While we make every effort to place all Work-Study Program students in a job, there are no guarantees. * All work-study students must be students in good standing at the college; that is, they must receive passing grades in all their courses in order to continue in the program the following semester. * Work-study positions are generally for one year. Students wishing to continue in the program after one year must resubmit their applications. | Work-study students have to apply for the program every year. | e |
id_2835 | Hanson, Inc. Employee Manual Chapter V: Employee Benefits Leave All full-time employees are entitled to a minimum of two weeks of annual leave time. Employees who have completed five years at Hanson are entitled to three weeks of annual leave. After completing ten years at Hanson, employees may have four weeks of annual leave. In order to take advantage of annual leave time, the employee must complete the Request for Annual Leave Form and submit it to his or her supervisor a minimum of thirty days in advance. The supervisor has the final decision about whether to grant the leave as requested. Any annual leave days not used in a calendar year may be rolled over and added to the leave days for the following year. In addition to annual leave, all full-time employees are entitled to ten personal leave days per year. Personal leave days must be used within the calendar year, or they will be forfeited. Part-time employees are entitled to five personal leave days per year. Health Insurance Employees may choose to sign up for a company-sponsored health plan. Complete information on the available plans can be requested from the Human Resources Department. Health benefits are also provided for the employees spouse and children. The company pays 50 percent of the monthly premiums, with the other 50 percent being deducted from each paycheck. Part-time employees are also eligible for the company-sponsored health plans; the company pays 25 percent of the premiums. Retirement Employees may determine how much they wish to contribute to the company retirement fund, up to 5 percent of their salary. Contributions will be deducted from each paycheck. The company will contribute an equal amount to each employees retirement fund. This benefit is available to both full-time and part-time employees. | Annual leave for part-time employees is half that of full-time employees. | n |
id_2836 | Hanson, Inc. Employee Manual Chapter V: Employee Benefits Leave All full-time employees are entitled to a minimum of two weeks of annual leave time. Employees who have completed five years at Hanson are entitled to three weeks of annual leave. After completing ten years at Hanson, employees may have four weeks of annual leave. In order to take advantage of annual leave time, the employee must complete the Request for Annual Leave Form and submit it to his or her supervisor a minimum of thirty days in advance. The supervisor has the final decision about whether to grant the leave as requested. Any annual leave days not used in a calendar year may be rolled over and added to the leave days for the following year. In addition to annual leave, all full-time employees are entitled to ten personal leave days per year. Personal leave days must be used within the calendar year, or they will be forfeited. Part-time employees are entitled to five personal leave days per year. Health Insurance Employees may choose to sign up for a company-sponsored health plan. Complete information on the available plans can be requested from the Human Resources Department. Health benefits are also provided for the employees spouse and children. The company pays 50 percent of the monthly premiums, with the other 50 percent being deducted from each paycheck. Part-time employees are also eligible for the company-sponsored health plans; the company pays 25 percent of the premiums. Retirement Employees may determine how much they wish to contribute to the company retirement fund, up to 5 percent of their salary. Contributions will be deducted from each paycheck. The company will contribute an equal amount to each employees retirement fund. This benefit is available to both full-time and part-time employees. | Personal leave days not used before the end of the year will be lost. | e |
id_2837 | Hanson, Inc. Employee Manual Chapter V: Employee Benefits Leave All full-time employees are entitled to a minimum of two weeks of annual leave time. Employees who have completed five years at Hanson are entitled to three weeks of annual leave. After completing ten years at Hanson, employees may have four weeks of annual leave. In order to take advantage of annual leave time, the employee must complete the Request for Annual Leave Form and submit it to his or her supervisor a minimum of thirty days in advance. The supervisor has the final decision about whether to grant the leave as requested. Any annual leave days not used in a calendar year may be rolled over and added to the leave days for the following year. In addition to annual leave, all full-time employees are entitled to ten personal leave days per year. Personal leave days must be used within the calendar year, or they will be forfeited. Part-time employees are entitled to five personal leave days per year. Health Insurance Employees may choose to sign up for a company-sponsored health plan. Complete information on the available plans can be requested from the Human Resources Department. Health benefits are also provided for the employees spouse and children. The company pays 50 percent of the monthly premiums, with the other 50 percent being deducted from each paycheck. Part-time employees are also eligible for the company-sponsored health plans; the company pays 25 percent of the premiums. Retirement Employees may determine how much they wish to contribute to the company retirement fund, up to 5 percent of their salary. Contributions will be deducted from each paycheck. The company will contribute an equal amount to each employees retirement fund. This benefit is available to both full-time and part-time employees. | The company pays half the monthly insurance charges for full-time employees. | e |
id_2838 | Hanson, Inc. Employee Manual Chapter V: Employee Benefits Leave All full-time employees are entitled to a minimum of two weeks of annual leave time. Employees who have completed five years at Hanson are entitled to three weeks of annual leave. After completing ten years at Hanson, employees may have four weeks of annual leave. In order to take advantage of annual leave time, the employee must complete the Request for Annual Leave Form and submit it to his or her supervisor a minimum of thirty days in advance. The supervisor has the final decision about whether to grant the leave as requested. Any annual leave days not used in a calendar year may be rolled over and added to the leave days for the following year. In addition to annual leave, all full-time employees are entitled to ten personal leave days per year. Personal leave days must be used within the calendar year, or they will be forfeited. Part-time employees are entitled to five personal leave days per year. Health Insurance Employees may choose to sign up for a company-sponsored health plan. Complete information on the available plans can be requested from the Human Resources Department. Health benefits are also provided for the employees spouse and children. The company pays 50 percent of the monthly premiums, with the other 50 percent being deducted from each paycheck. Part-time employees are also eligible for the company-sponsored health plans; the company pays 25 percent of the premiums. Retirement Employees may determine how much they wish to contribute to the company retirement fund, up to 5 percent of their salary. Contributions will be deducted from each paycheck. The company will contribute an equal amount to each employees retirement fund. This benefit is available to both full-time and part-time employees. | Part-time employees do not receive health benefits. | c |
id_2839 | Hanson, Inc. Employee Manual Chapter V: Employee Benefits Leave All full-time employees are entitled to a minimum of two weeks of annual leave time. Employees who have completed five years at Hanson are entitled to three weeks of annual leave. After completing ten years at Hanson, employees may have four weeks of annual leave. In order to take advantage of annual leave time, the employee must complete the Request for Annual Leave Form and submit it to his or her supervisor a minimum of thirty days in advance. The supervisor has the final decision about whether to grant the leave as requested. Any annual leave days not used in a calendar year may be rolled over and added to the leave days for the following year. In addition to annual leave, all full-time employees are entitled to ten personal leave days per year. Personal leave days must be used within the calendar year, or they will be forfeited. Part-time employees are entitled to five personal leave days per year. Health Insurance Employees may choose to sign up for a company-sponsored health plan. Complete information on the available plans can be requested from the Human Resources Department. Health benefits are also provided for the employees spouse and children. The company pays 50 percent of the monthly premiums, with the other 50 percent being deducted from each paycheck. Part-time employees are also eligible for the company-sponsored health plans; the company pays 25 percent of the premiums. Retirement Employees may determine how much they wish to contribute to the company retirement fund, up to 5 percent of their salary. Contributions will be deducted from each paycheck. The company will contribute an equal amount to each employees retirement fund. This benefit is available to both full-time and part-time employees. | All full-time employees are entitled to three weeks of annual leave. | c |
id_2840 | Hanson, Inc. Employee Manual Chapter V: Employee Benefits Leave All full-time employees are entitled to a minimum of two weeks of annual leave time. Employees who have completed five years at Hanson are entitled to three weeks of annual leave. After completing ten years at Hanson, employees may have four weeks of annual leave. In order to take advantage of annual leave time, the employee must complete the Request for Annual Leave Form and submit it to his or her supervisor a minimum of thirty days in advance. The supervisor has the final decision about whether to grant the leave as requested. Any annual leave days not used in a calendar year may be rolled over and added to the leave days for the following year. In addition to annual leave, all full-time employees are entitled to ten personal leave days per year. Personal leave days must be used within the calendar year, or they will be forfeited. Part-time employees are entitled to five personal leave days per year. Health Insurance Employees may choose to sign up for a company-sponsored health plan. Complete information on the available plans can be requested from the Human Resources Department. Health benefits are also provided for the employees spouse and children. The company pays 50 percent of the monthly premiums, with the other 50 percent being deducted from each paycheck. Part-time employees are also eligible for the company-sponsored health plans; the company pays 25 percent of the premiums. Retirement Employees may determine how much they wish to contribute to the company retirement fund, up to 5 percent of their salary. Contributions will be deducted from each paycheck. The company will contribute an equal amount to each employees retirement fund. This benefit is available to both full-time and part-time employees. | Employees must contribute 5 percent of their salary to the retirement fund. | c |
id_2841 | Hanson, Inc. Employee Manual Chapter V: Employee Benefits Leave All full-time employees are entitled to a minimum of two weeks of annual leave time. Employees who have completed five years at Hanson are entitled to three weeks of annual leave. After completing ten years at Hanson, employees may have four weeks of annual leave. In order to take advantage of annual leave time, the employee must complete the Request for Annual Leave Form and submit it to his or her supervisor a minimum of thirty days in advance. The supervisor has the final decision about whether to grant the leave as requested. Any annual leave days not used in a calendar year may be rolled over and added to the leave days for the following year. In addition to annual leave, all full-time employees are entitled to ten personal leave days per year. Personal leave days must be used within the calendar year, or they will be forfeited. Part-time employees are entitled to five personal leave days per year. Health Insurance Employees may choose to sign up for a company-sponsored health plan. Complete information on the available plans can be requested from the Human Resources Department. Health benefits are also provided for the employees spouse and children. The company pays 50 percent of the monthly premiums, with the other 50 percent being deducted from each paycheck. Part-time employees are also eligible for the company-sponsored health plans; the company pays 25 percent of the premiums. Retirement Employees may determine how much they wish to contribute to the company retirement fund, up to 5 percent of their salary. Contributions will be deducted from each paycheck. The company will contribute an equal amount to each employees retirement fund. This benefit is available to both full-time and part-time employees. | Annual leave must be requested a month in advance. | e |
id_2842 | Harassment occurs when one person, with the intention of annoying, alarming, or tormenting another person, threatensby telephone or in writingto harm that person, damage his or her property, or harm a member of his or her family. a. Lydia leaves a note on Pete's car telling him that she didn't like it when he asked her out on a date and that she'll call police if he ever asks again. This situation is the best example of Harassment. | Rudy calls Edward on the phone and tells him he is going to break out the headlights on his car if he doesn't stop parking on the street in front of Rudy's house. This situation is the best example of Harassment. | e |
id_2843 | Harassment occurs when one person, with the intention of annoying, alarming, or tormenting another person, threatensby telephone or in writingto harm that person, damage his or her property, or harm a member of his or her family. a. Lydia leaves a note on Pete's car telling him that she didn't like it when he asked her out on a date and that she'll call police if he ever asks again. This situation is the best example of Harassment. | Armando writes a note to Julia telling her that, because she is behind on her rent, she will have to move out of the house he is renting to her or he will change the locks on the door and take her property. This situation is the best example of Harassment. | c |
id_2844 | Harassment occurs when one person, with the intention of annoying, alarming, or tormenting another person, threatensby telephone or in writingto harm that person, damage his or her property, or harm a member of his or her family. a. Lydia leaves a note on Pete's car telling him that she didn't like it when he asked her out on a date and that she'll call police if he ever asks again. This situation is the best example of Harassment. | Tyler calls Ramon and tells him he will be dating Ramon's ex- wife from now on, even though doing so will upset Ramon. This situation is the best example of Harassment. | c |
id_2845 | Hardley Health Car Boot Sale The Hardley Health Car Boot Sale is one of the largest in the area. Join us on every Sunday morning of the year to buy or sell at Hardley Health Arena. Surrounded by beautiful terraced amphitheatres and extensive areas of secure car parking, the multi-functional and all weather Hardley Health Arena is the all purpose open air arena complex. The Hardley Health Arena has easy access from different roads for drivers and the number 76 bus stops right outside. For the uninitiated, a car boot sale is when ordinary people clear out things they dont want any more, put them in the car boot and then sell the contents to the public. It is a great way to get rid of things and make money as a seller and to find bargains if you are a buyer. Open every Sunday, from 15th March to 15th December, rain, shine or snow! For sellers Open for setting up from 5 am Try and be with us by 6.30 am 10 per car 15 per van No lorries, please No reservation required Hot food and drinks available from 5.30 am For buyers/ borrowers Open from 7 am Parking for 5000 cars (50p per car/ motorbike) On foot no charge Hot food and drinks available all day Supervised fun and games area for kids A recent review from our website: Great, great, great! Would not miss it every Sunday I am there without fail and always come away with a bargain. | The car boot sale is cancelled in bad weather. | c |
id_2846 | Hardley Health Car Boot Sale The Hardley Health Car Boot Sale is one of the largest in the area. Join us on every Sunday morning of the year to buy or sell at Hardley Health Arena. Surrounded by beautiful terraced amphitheatres and extensive areas of secure car parking, the multi-functional and all weather Hardley Health Arena is the all purpose open air arena complex. The Hardley Health Arena has easy access from different roads for drivers and the number 76 bus stops right outside. For the uninitiated, a car boot sale is when ordinary people clear out things they dont want any more, put them in the car boot and then sell the contents to the public. It is a great way to get rid of things and make money as a seller and to find bargains if you are a buyer. Open every Sunday, from 15th March to 15th December, rain, shine or snow! For sellers Open for setting up from 5 am Try and be with us by 6.30 am 10 per car 15 per van No lorries, please No reservation required Hot food and drinks available from 5.30 am For buyers/ borrowers Open from 7 am Parking for 5000 cars (50p per car/ motorbike) On foot no charge Hot food and drinks available all day Supervised fun and games area for kids A recent review from our website: Great, great, great! Would not miss it every Sunday I am there without fail and always come away with a bargain. | Sellers must finish and leave by 2.30 pm. | n |
id_2847 | Hardley Health Car Boot Sale The Hardley Health Car Boot Sale is one of the largest in the area. Join us on every Sunday morning of the year to buy or sell at Hardley Health Arena. Surrounded by beautiful terraced amphitheatres and extensive areas of secure car parking, the multi-functional and all weather Hardley Health Arena is the all purpose open air arena complex. The Hardley Health Arena has easy access from different roads for drivers and the number 76 bus stops right outside. For the uninitiated, a car boot sale is when ordinary people clear out things they dont want any more, put them in the car boot and then sell the contents to the public. It is a great way to get rid of things and make money as a seller and to find bargains if you are a buyer. Open every Sunday, from 15th March to 15th December, rain, shine or snow! For sellers Open for setting up from 5 am Try and be with us by 6.30 am 10 per car 15 per van No lorries, please No reservation required Hot food and drinks available from 5.30 am For buyers/ borrowers Open from 7 am Parking for 5000 cars (50p per car/ motorbike) On foot no charge Hot food and drinks available all day Supervised fun and games area for kids A recent review from our website: Great, great, great! Would not miss it every Sunday I am there without fail and always come away with a bargain. | Sellers with a lot to sell can bring a truck at extra charge. | c |
id_2848 | Hardley Health Car Boot Sale The Hardley Health Car Boot Sale is one of the largest in the area. Join us on every Sunday morning of the year to buy or sell at Hardley Health Arena. Surrounded by beautiful terraced amphitheatres and extensive areas of secure car parking, the multi-functional and all weather Hardley Health Arena is the all purpose open air arena complex. The Hardley Health Arena has easy access from different roads for drivers and the number 76 bus stops right outside. For the uninitiated, a car boot sale is when ordinary people clear out things they dont want any more, put them in the car boot and then sell the contents to the public. It is a great way to get rid of things and make money as a seller and to find bargains if you are a buyer. Open every Sunday, from 15th March to 15th December, rain, shine or snow! For sellers Open for setting up from 5 am Try and be with us by 6.30 am 10 per car 15 per van No lorries, please No reservation required Hot food and drinks available from 5.30 am For buyers/ borrowers Open from 7 am Parking for 5000 cars (50p per car/ motorbike) On foot no charge Hot food and drinks available all day Supervised fun and games area for kids A recent review from our website: Great, great, great! Would not miss it every Sunday I am there without fail and always come away with a bargain. | The website provides any latest news regarding the car boot sale. | n |
id_2849 | Hardley Health Car Boot Sale The Hardley Health Car Boot Sale is one of the largest in the area. Join us on every Sunday morning of the year to buy or sell at Hardley Health Arena. Surrounded by beautiful terraced amphitheatres and extensive areas of secure car parking, the multi-functional and all weather Hardley Health Arena is the all purpose open air arena complex. The Hardley Health Arena has easy access from different roads for drivers and the number 76 bus stops right outside. For the uninitiated, a car boot sale is when ordinary people clear out things they dont want any more, put them in the car boot and then sell the contents to the public. It is a great way to get rid of things and make money as a seller and to find bargains if you are a buyer. Open every Sunday, from 15th March to 15th December, rain, shine or snow! For sellers Open for setting up from 5 am Try and be with us by 6.30 am 10 per car 15 per van No lorries, please No reservation required Hot food and drinks available from 5.30 am For buyers/ borrowers Open from 7 am Parking for 5000 cars (50p per car/ motorbike) On foot no charge Hot food and drinks available all day Supervised fun and games area for kids A recent review from our website: Great, great, great! Would not miss it every Sunday I am there without fail and always come away with a bargain. | People who walk to the car boot sale will not be charged for entry. | e |
id_2850 | Hardley Health Car Boot Sale The Hardley Health Car Boot Sale is one of the largest in the area. Join us on every Sunday morning of the year to buy or sell at Hardley Health Arena. Surrounded by beautiful terraced amphitheatres and extensive areas of secure car parking, the multi-functional and all weather Hardley Health Arena is the all purpose open air arena complex. The Hardley Health Arena has easy access from different roads for drivers and the number 76 bus stops right outside. For the uninitiated, a car boot sale is when ordinary people clear out things they dont want any more, put them in the car boot and then sell the contents to the public. It is a great way to get rid of things and make money as a seller and to find bargains if you are a buyer. Open every Sunday, from 15th March to 15th December, rain, shine or snow! For sellers Open for setting up from 5 am Try and be with us by 6.30 am 10 per car 15 per van No lorries, please No reservation required Hot food and drinks available from 5.30 am For buyers/ borrowers Open from 7 am Parking for 5000 cars (50p per car/ motorbike) On foot no charge Hot food and drinks available all day Supervised fun and games area for kids A recent review from our website: Great, great, great! Would not miss it every Sunday I am there without fail and always come away with a bargain. | Activities for children are available. | e |
id_2851 | Hardley Health Car Boot Sale The Hardley Health Car Boot Sale is one of the largest in the area. Join us on every Sunday morning of the year to buy or sell at Hardley Health Arena. Surrounded by beautiful terraced amphitheatres and extensive areas of secure car parking, the multi-functional and all weather Hardley Health Arena is the all purpose open air arena complex. The Hardley Health Arena has easy access from different roads for drivers and the number 76 bus stops right outside. For the uninitiated, a car boot sale is when ordinary people clear out things they dont want any more, put them in the car boot and then sell the contents to the public. It is a great way to get rid of things and make money as a seller and to find bargains if you are a buyer. Open every Sunday, from 15th March to 15th December, rain, shine or snow! For sellers Open for setting up from 5 am Try and be with us by 6.30 am 10 per car 15 per van No lorries, please No reservation required Hot food and drinks available from 5.30 am For buyers/ borrowers Open from 7 am Parking for 5000 cars (50p per car/ motorbike) On foot no charge Hot food and drinks available all day Supervised fun and games area for kids A recent review from our website: Great, great, great! Would not miss it every Sunday I am there without fail and always come away with a bargain. | The car boot sale is easily reached by public transport. | e |
id_2852 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Harriet Beecher had a religious father. | e |
id_2853 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Harriet Beecher was an autobiographies. | c |
id_2854 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Harriet Beecher was a letter-writer. | e |
id_2855 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Harriet Beecher had five brothers waiting for her when she was born. | c |
id_2856 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Harriet Beecher was between three and four when her mother died. | c |
id_2857 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Harriet Beecher was born in an average American town. | c |
id_2858 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Harriet Beecher was born in the 18th century. | c |
id_2859 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Harriet Beecher was born in the English town Litchfield. | c |
id_2860 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Harriet, the main character in the article, was the third daughter of Roxanna Beecher: | c |
id_2861 | Harriet Beecher (Stowe) was born June 14, 1811, in the characteristic New England town of Litchfield, Connecticut. Her father was the Rev. Dr. Lyman Beecher, a distinguished Calvinistic divine, her mother Roxanna Foote, his first wife. Harriet Beecher was ushered into a household of happy, healthy children, and found five brothers and sisters awaiting her. The eldest was Catherine, born September 6, 1800. Following her were two sturdy boys, William and Edward; then came Mary, then George, and at last Harriet. Another little Harriet was actually born three years before, but died when aged only one month old; the fourth daughter, the subject of this passage, was named in memory of this sister Harriet Elizabeth. Just two years after Harriet was born, in the same month, another brother, Henry Ward, was welcomed to the family circle, and after him came Charles, the last of Roxanna Beechers children. The first memorable incident of Harriets life was the death of her mother, which occurred when she was four years old, and which ever afterwardsremained with her as the most tender, sad and sacred memory of her childhood. Mrs Stowes recollections of her mother are found in a letter to her brother Charles, afterwards published in the Autobiography and Correspondence of Lyman Beecher. She says: I was between three and four years of age when our mother died, and my personal recollections of her are therefore but few. But the deep interest and veneration that she inspired in all who knew her were such that during all my childhood I was constantly hearing her spoken of, and from one friend or another some incident or anecdote of her life was constantly being impressed upon me. | Roxanna Beecher was an admired woman. | e |
id_2862 | Has the idea of health and safety been taken a step too far? Recent changes to the law, aimed at improving the quality of working environments, can be seen to have a detrimental effect. For example, firemen are no longer allowed to use a firemans pole as this has been noted to cause injury. However, statistics suggest that such injuries amount to a total of 0.02% of all injuries received by fire-fighters. In comparison, up to 40% of injuries received by fire-fighters are in the form of bruises, cuts and wounds received at the scene. Such health and safety initiatives can also be seen in other professions. Teachers today are less likely to organise school trips than in previous years, due to the strict nature of health and safety laws. Such laws make it possible for students who are injured during a trip to hold the staff liable. | Recent health and safety law changes have benefited work environments | c |
id_2863 | Has the idea of health and safety been taken a step too far? Recent changes to the law, aimed at improving the quality of working environments, can be seen to have a detrimental effect. For example, firemen are no longer allowed to use a firemans pole as this has been noted to cause injury. However, statistics suggest that such injuries amount to a total of 0.02% of all injuries received by fire-fighters. In comparison, up to 40% of injuries received by fire-fighters are in the form of bruises, cuts and wounds received at the scene. Such health and safety initiatives can also be seen in other professions. Teachers today are less likely to organise school trips than in previous years, due to the strict nature of health and safety laws. Such laws make it possible for students who are injured during a trip to hold the staff liable. | Teachers are more likely to take students on trips than ever before. | c |
id_2864 | Has the idea of health and safety been taken a step too far? Recent changes to the law, aimed at improving the quality of working environments, can be seen to have a detrimental effect. For example, firemen are no longer allowed to use a firemans pole as this has been noted to cause injury. However, statistics suggest that such injuries amount to a total of 0.02% of all injuries received by fire-fighters. In comparison, up to 40% of injuries received by fire-fighters are in the form of bruises, cuts and wounds received at the scene. Such health and safety initiatives can also be seen in other professions. Teachers today are less likely to organise school trips than in previous years, due to the strict nature of health and safety laws. Such laws make it possible for students who are injured during a trip to hold the staff liable. | injuries using a firemans-pole are more likely than at the scene | c |
id_2865 | Has the idea of health and safety been taken a step too far? Recent changes to the law, aimed at improving the quality of working environments, can be seen to have a detrimental effect. For example, firemen are no longer allowed to use a firemans pole as this has been noted to cause injury. However, statistics suggest that such injuries amount to a total of 0.02% of all injuries received by fire-fighters. In comparison, up to 40% of injuries received by fire-fighters are in the form of bruises, cuts and wounds received at the scene. Such health and safety initiatives can also be seen in other professions. Teachers today are less likely to organise school trips than in previous years, due to the strict nature of health and safety laws. Such laws make it possible for students who are injured during a trip to hold the staff liable. | Injuries are more likely the scene than using a firemans-pole. | e |
id_2866 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. 65The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | The synthetic bacteria can only replicate for several generations. | n |
id_2867 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. 65The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | DNA was also injected into animals. | n |
id_2868 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. 65The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | Bacteria have been made to produce insulin. | e |
id_2869 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. 65The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | Tryptophan is one example of an amino acid. | e |
id_2870 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. 65The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | Bacteria were taught to spell. | c |
id_2871 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. 65The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | Fuel is already being produced using genetically altered algae. | c |
id_2872 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. 65The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | The research team gave money to ExxonMobil. | c |
id_2873 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | Bacteria have been made to produce insulin. | e |
id_2874 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | DNA was also injected into animals. | n |
id_2875 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | The research team gave money to ExxonMobil. | c |
id_2876 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | The synthetic bacteria can only replicate for several generations. | n |
id_2877 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | Bacteria were taught to spell. | c |
id_2878 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | Tryptophan is one example of an amino acid. | e |
id_2879 | Have Researchers Created Synthetic Life at the J. Craig Venter Institute? Researchers often insert a gene or two into an organism in order to make it do something unique. For example, researchers inserted the insulin gene into bacteria in order to make them produce human insulin. However, researchers at the J. Craig Venter Institute (JCVI) in Rockville, MD, have now created organisms that contain a completely synthetic genome. This synthetic genome was designed by computer, resulting in the "first self-replicating species ... whose parent is a computer, " as stated by Dr. Venter, the lead scientist on this project. In essence, the JCVI scientists took the genome of one bacterial species, M. mycoides, synthesized it from scratch, and then transplanted it into a different bacterial species, M. capricolum. The DNA was synthesized as a series of cassettes, or pieces, spanning roughly 1,080 bases (the chemical units that make up DNA) each. These cassettes were then painstakingly assembled together and slowly input into the M. capricolum species. The JVCI researchers also included several "watermarks" in the synthetic genome. Because DNA contains introns, which are non-expressed spans of DNA, as well as exons, which are expressed spans of DNA, much of the code can be altered without affecting the final organism. Also, the four bases of the DNA code - A, C, G, and T - can combine into triplets to code for 20 amino acids (the chemical units of which protein is composed), as well as start and stop instructions for gene expression. These amino acids are designated by single alphabetical letters; for example, tryptophan is designated by the letter W. Thus, by using the amino acid "alphabet, " the JCVI researchers were able to insert sequences of DNA that were specifically designed to spell out the names of study authors, project contributors, web addresses, and even include quotations from James Joyce, and Richard Feynman. Such engineering helped clarify that the M. capricolum genome is completely synthetic and not a product of natural bacterial growth and replication. Over one million total bases were inserted into M. capricolum. The final result was a bacterial cell that originated from M. capricolum, but behaved like and expressed the proteins of M. mycoides. This synthetic M. mycoides bacterium was also able to self- replicate, a fundamental quality of life. The demonstration that completely synthetic genomes can be used to start synthetic life promises other exciting discoveries and technologies. For example, photosynthetic algae could be transplanted with genomes that would enable these organisms to produce biofuel. In fact, the ExxonMobil Research and Engineering Company has already worked out an agreement with Synthetic Genomics, the company that helped fund the JCVI research team, to start just such a project. While some researchers agree that the technical feat of the JCVI team is astounding, detractors point to the difficulty of creating more complicated organisms from scratch. Other researchers point to the fact that some biofuels are already being produced by microorganisms via the genetic engineering of only a handful of genes. And Dr. David Baltimore, a leading geneticist at CalTech, has countered the significance of the work performed by the JCVI research team, stating that its lead researcher, Dr. Venter, "... has not created life, only mimicked it. " | Fuel is already being produced using genetically altered algae. | c |
id_2880 | Have Teenagers Always Existed A. Our ancestor. Homo erectus, may not have had culture or even language, but did they have teenagers? That question has been contested in the past few years, with some anthropologists claiming evidence of an adolescent phase in human fossil. This is not merely an academic debate. Humans today are the only animals on Earth to have a teenage phase, yet we have very little idea why. Establishing exactly when adolescence first evolved and finding out what sorts of changes in our bodies and lifestyles it was associated with could help US understand its purpose. Why do we, uniquely' have a growth spurt so late in life? B. Until recently, the dominant explanation was that physical growth is delayed by our need to grow large brains and to learn all the behavior patterns associated with humanity - speaking, social interaction and so on. While such behaviour is still developing, humans cannot easily fend for themselves, so it is best to stay small and look youthful. That way your parents and other members of the social group are motivated to continue looking after you. What's more, studies of mammals show a strong relationship between brain size and the rate of development, with larger-brained animals taking longer to reach adulthood. Humans are at the far end of this spectrum. If this theory is correct, and the development of large brains accounts for the teenage growth spurt, the origin of adolescence should have been with the evolution of our* own species (Homo sapiens) and Neanderthals, starting almost 200,000 years ago. The trouble is, some of the fossil evidence seems to tell a different story. C. The human fossil record is extremely sparse, and the number of fossilised children minuscule. Nevertheless, in the past few years anthropologists have begun to look at what can be learned of lives of our ancestors from these youngsters, of the most studied is the famous Turkana boy, an almost complete skeleton of Homo erectus f 1.6 million years ago found in Kenya in 1984. Accurately assessing how old someone is from their skeleton is a trickybusiness. Even with a modern human, you can only make a rough estimate based on the developmental stage of teeth and bones and the skeleton's general size. D. You need as many developmental markers as possible to get an estimate of age. The Turkana's teeth made him 10 or 11 years old. The features of his skeleton put him at 13, but he as tall as a modem 15-year-old. Susan Anton of New York University points to research by Margaret Clegg who studied a collection of 18th-century 19th-century skeletons whose ages at death were known. When she tried to age the skeletons Without checking the records, she found similar discrepancies to those of the Turkana boy. One 10-year-old boy, for example, had a dental age of 9, the skeleton of a 6-year-old but was tall enough to be 11. 'The Turkana kid still has a rounded skull, and needs more growth to reach the adult shape/ Anton adds. She thinks that Homo erectus already developed modern human patterns growth, with a late, if not quite so extreme, adolescent spurt. She believes Turkana boy was just about to enter it. E. If Anton is right, that theory contradicts the orthodox idea linking late growth with development of a large brain. Anthropologist Steven Leigh from the University of Illinois goes further. He believes the idea of adolescence as catch- up growth does not explain why the growth rate increases so dramatically. He says that many apes have growth spurts in particular body regions that are associated with reaching maturity, and this makes sense because by timing the short but crucial spells of maturation to coincide with the seasons when food is plentiful, they minimise the risk of being without adequate food supplies while growing. What makes humans unique is that the whole skeleton is involved. For Leigh, this is the key. F. According to his theory, adolescence evolved as an integral part of efficient upright locomotion, as well as to accommodate more complex brains. Fossil evidence suggests that our ancestors first walked on two legs six million years ago. If proficient walking was important for survival, perhaps the teenage growth spurt has very ancient origins. While many anthropologists will consider Leigh's theory a step too far, he is not the only one with new ideas about the evolution of teenagers. G. Another approach, which has produced a surprising result, relies on the minute analysis of tooth growth. Every nine days or so the growing teeth of both apes and humans acquire ridges on their enamel surface. These are like rings in a tree trunk: the number of them tells you how long the crown of a tooth took to form. Across mammals' the rate at which teeth develop is closely related to how fast the brain grows and the age you mature. Teeth are good indicators of lifehistory because thefr growth is less related to the environment and nutrition than is the growth of the skeleton. H. A more decisive piece of evidence came last year, when researchers in France and Spain published their findings from a study of Neanderthal teeth. Neanderthals had much faster tooth growth than erectus who went before them, and hence, possibly, a shorter childhood. Lead researcher Fernando Ramirez- Rozzi thinks Neanderthals died young-about 25 years old - primarily because of the cold, harsh environment they had to endure in glacial Europe. They evolved to grow up quicker than their immediate ancestors. Neanderthals and Homo erectus probably had to reach adulthood fairly quickly, without delaying for an adolescent growth spurt. So it still looks as though we are the original teenagers. | Steen Leighs ideas are likely to be met with disbelief by many anthropologists. | e |
id_2881 | Have Teenagers Always Existed A. Our ancestor. Homo erectus, may not have had culture or even language, but did they have teenagers? That question has been contested in the past few years, with some anthropologists claiming evidence of an adolescent phase in human fossil. This is not merely an academic debate. Humans today are the only animals on Earth to have a teenage phase, yet we have very little idea why. Establishing exactly when adolescence first evolved and finding out what sorts of changes in our bodies and lifestyles it was associated with could help US understand its purpose. Why do we, uniquely' have a growth spurt so late in life? B. Until recently, the dominant explanation was that physical growth is delayed by our need to grow large brains and to learn all the behavior patterns associated with humanity - speaking, social interaction and so on. While such behaviour is still developing, humans cannot easily fend for themselves, so it is best to stay small and look youthful. That way your parents and other members of the social group are motivated to continue looking after you. What's more, studies of mammals show a strong relationship between brain size and the rate of development, with larger-brained animals taking longer to reach adulthood. Humans are at the far end of this spectrum. If this theory is correct, and the development of large brains accounts for the teenage growth spurt, the origin of adolescence should have been with the evolution of our* own species (Homo sapiens) and Neanderthals, starting almost 200,000 years ago. The trouble is, some of the fossil evidence seems to tell a different story. C. The human fossil record is extremely sparse, and the number of fossilised children minuscule. Nevertheless, in the past few years anthropologists have begun to look at what can be learned of lives of our ancestors from these youngsters, of the most studied is the famous Turkana boy, an almost complete skeleton of Homo erectus f 1.6 million years ago found in Kenya in 1984. Accurately assessing how old someone is from their skeleton is a trickybusiness. Even with a modern human, you can only make a rough estimate based on the developmental stage of teeth and bones and the skeleton's general size. D. You need as many developmental markers as possible to get an estimate of age. The Turkana's teeth made him 10 or 11 years old. The features of his skeleton put him at 13, but he as tall as a modem 15-year-old. Susan Anton of New York University points to research by Margaret Clegg who studied a collection of 18th-century 19th-century skeletons whose ages at death were known. When she tried to age the skeletons Without checking the records, she found similar discrepancies to those of the Turkana boy. One 10-year-old boy, for example, had a dental age of 9, the skeleton of a 6-year-old but was tall enough to be 11. 'The Turkana kid still has a rounded skull, and needs more growth to reach the adult shape/ Anton adds. She thinks that Homo erectus already developed modern human patterns growth, with a late, if not quite so extreme, adolescent spurt. She believes Turkana boy was just about to enter it. E. If Anton is right, that theory contradicts the orthodox idea linking late growth with development of a large brain. Anthropologist Steven Leigh from the University of Illinois goes further. He believes the idea of adolescence as catch- up growth does not explain why the growth rate increases so dramatically. He says that many apes have growth spurts in particular body regions that are associated with reaching maturity, and this makes sense because by timing the short but crucial spells of maturation to coincide with the seasons when food is plentiful, they minimise the risk of being without adequate food supplies while growing. What makes humans unique is that the whole skeleton is involved. For Leigh, this is the key. F. According to his theory, adolescence evolved as an integral part of efficient upright locomotion, as well as to accommodate more complex brains. Fossil evidence suggests that our ancestors first walked on two legs six million years ago. If proficient walking was important for survival, perhaps the teenage growth spurt has very ancient origins. While many anthropologists will consider Leigh's theory a step too far, he is not the only one with new ideas about the evolution of teenagers. G. Another approach, which has produced a surprising result, relies on the minute analysis of tooth growth. Every nine days or so the growing teeth of both apes and humans acquire ridges on their enamel surface. These are like rings in a tree trunk: the number of them tells you how long the crown of a tooth took to form. Across mammals' the rate at which teeth develop is closely related to how fast the brain grows and the age you mature. Teeth are good indicators of lifehistory because thefr growth is less related to the environment and nutrition than is the growth of the skeleton. H. A more decisive piece of evidence came last year, when researchers in France and Spain published their findings from a study of Neanderthal teeth. Neanderthals had much faster tooth growth than erectus who went before them, and hence, possibly, a shorter childhood. Lead researcher Fernando Ramirez- Rozzi thinks Neanderthals died young-about 25 years old - primarily because of the cold, harsh environment they had to endure in glacial Europe. They evolved to grow up quicker than their immediate ancestors. Neanderthals and Homo erectus probably had to reach adulthood fairly quickly, without delaying for an adolescent growth spurt. So it still looks as though we are the original teenagers. | Susan Antons conclusion about the Turkana boy reinforces an established idea. | c |
id_2882 | Have Teenagers Always Existed A. Our ancestor. Homo erectus, may not have had culture or even language, but did they have teenagers? That question has been contested in the past few years, with some anthropologists claiming evidence of an adolescent phase in human fossil. This is not merely an academic debate. Humans today are the only animals on Earth to have a teenage phase, yet we have very little idea why. Establishing exactly when adolescence first evolved and finding out what sorts of changes in our bodies and lifestyles it was associated with could help US understand its purpose. Why do we, uniquely' have a growth spurt so late in life? B. Until recently, the dominant explanation was that physical growth is delayed by our need to grow large brains and to learn all the behavior patterns associated with humanity - speaking, social interaction and so on. While such behaviour is still developing, humans cannot easily fend for themselves, so it is best to stay small and look youthful. That way your parents and other members of the social group are motivated to continue looking after you. What's more, studies of mammals show a strong relationship between brain size and the rate of development, with larger-brained animals taking longer to reach adulthood. Humans are at the far end of this spectrum. If this theory is correct, and the development of large brains accounts for the teenage growth spurt, the origin of adolescence should have been with the evolution of our* own species (Homo sapiens) and Neanderthals, starting almost 200,000 years ago. The trouble is, some of the fossil evidence seems to tell a different story. C. The human fossil record is extremely sparse, and the number of fossilised children minuscule. Nevertheless, in the past few years anthropologists have begun to look at what can be learned of lives of our ancestors from these youngsters, of the most studied is the famous Turkana boy, an almost complete skeleton of Homo erectus f 1.6 million years ago found in Kenya in 1984. Accurately assessing how old someone is from their skeleton is a trickybusiness. Even with a modern human, you can only make a rough estimate based on the developmental stage of teeth and bones and the skeleton's general size. D. You need as many developmental markers as possible to get an estimate of age. The Turkana's teeth made him 10 or 11 years old. The features of his skeleton put him at 13, but he as tall as a modem 15-year-old. Susan Anton of New York University points to research by Margaret Clegg who studied a collection of 18th-century 19th-century skeletons whose ages at death were known. When she tried to age the skeletons Without checking the records, she found similar discrepancies to those of the Turkana boy. One 10-year-old boy, for example, had a dental age of 9, the skeleton of a 6-year-old but was tall enough to be 11. 'The Turkana kid still has a rounded skull, and needs more growth to reach the adult shape/ Anton adds. She thinks that Homo erectus already developed modern human patterns growth, with a late, if not quite so extreme, adolescent spurt. She believes Turkana boy was just about to enter it. E. If Anton is right, that theory contradicts the orthodox idea linking late growth with development of a large brain. Anthropologist Steven Leigh from the University of Illinois goes further. He believes the idea of adolescence as catch- up growth does not explain why the growth rate increases so dramatically. He says that many apes have growth spurts in particular body regions that are associated with reaching maturity, and this makes sense because by timing the short but crucial spells of maturation to coincide with the seasons when food is plentiful, they minimise the risk of being without adequate food supplies while growing. What makes humans unique is that the whole skeleton is involved. For Leigh, this is the key. F. According to his theory, adolescence evolved as an integral part of efficient upright locomotion, as well as to accommodate more complex brains. Fossil evidence suggests that our ancestors first walked on two legs six million years ago. If proficient walking was important for survival, perhaps the teenage growth spurt has very ancient origins. While many anthropologists will consider Leigh's theory a step too far, he is not the only one with new ideas about the evolution of teenagers. G. Another approach, which has produced a surprising result, relies on the minute analysis of tooth growth. Every nine days or so the growing teeth of both apes and humans acquire ridges on their enamel surface. These are like rings in a tree trunk: the number of them tells you how long the crown of a tooth took to form. Across mammals' the rate at which teeth develop is closely related to how fast the brain grows and the age you mature. Teeth are good indicators of lifehistory because thefr growth is less related to the environment and nutrition than is the growth of the skeleton. H. A more decisive piece of evidence came last year, when researchers in France and Spain published their findings from a study of Neanderthal teeth. Neanderthals had much faster tooth growth than erectus who went before them, and hence, possibly, a shorter childhood. Lead researcher Fernando Ramirez- Rozzi thinks Neanderthals died young-about 25 years old - primarily because of the cold, harsh environment they had to endure in glacial Europe. They evolved to grow up quicker than their immediate ancestors. Neanderthals and Homo erectus probably had to reach adulthood fairly quickly, without delaying for an adolescent growth spurt. So it still looks as though we are the original teenagers. | Modem methods mean it is possible to predict the age of a skeleton with accuracy. | c |
id_2883 | Have Teenagers Always Existed A. Our ancestor. Homo erectus, may not have had culture or even language, but did they have teenagers? That question has been contested in the past few years, with some anthropologists claiming evidence of an adolescent phase in human fossil. This is not merely an academic debate. Humans today are the only animals on Earth to have a teenage phase, yet we have very little idea why. Establishing exactly when adolescence first evolved and finding out what sorts of changes in our bodies and lifestyles it was associated with could help US understand its purpose. Why do we, uniquely' have a growth spurt so late in life? B. Until recently, the dominant explanation was that physical growth is delayed by our need to grow large brains and to learn all the behavior patterns associated with humanity - speaking, social interaction and so on. While such behaviour is still developing, humans cannot easily fend for themselves, so it is best to stay small and look youthful. That way your parents and other members of the social group are motivated to continue looking after you. What's more, studies of mammals show a strong relationship between brain size and the rate of development, with larger-brained animals taking longer to reach adulthood. Humans are at the far end of this spectrum. If this theory is correct, and the development of large brains accounts for the teenage growth spurt, the origin of adolescence should have been with the evolution of our* own species (Homo sapiens) and Neanderthals, starting almost 200,000 years ago. The trouble is, some of the fossil evidence seems to tell a different story. C. The human fossil record is extremely sparse, and the number of fossilised children minuscule. Nevertheless, in the past few years anthropologists have begun to look at what can be learned of lives of our ancestors from these youngsters, of the most studied is the famous Turkana boy, an almost complete skeleton of Homo erectus f 1.6 million years ago found in Kenya in 1984. Accurately assessing how old someone is from their skeleton is a trickybusiness. Even with a modern human, you can only make a rough estimate based on the developmental stage of teeth and bones and the skeleton's general size. D. You need as many developmental markers as possible to get an estimate of age. The Turkana's teeth made him 10 or 11 years old. The features of his skeleton put him at 13, but he as tall as a modem 15-year-old. Susan Anton of New York University points to research by Margaret Clegg who studied a collection of 18th-century 19th-century skeletons whose ages at death were known. When she tried to age the skeletons Without checking the records, she found similar discrepancies to those of the Turkana boy. One 10-year-old boy, for example, had a dental age of 9, the skeleton of a 6-year-old but was tall enough to be 11. 'The Turkana kid still has a rounded skull, and needs more growth to reach the adult shape/ Anton adds. She thinks that Homo erectus already developed modern human patterns growth, with a late, if not quite so extreme, adolescent spurt. She believes Turkana boy was just about to enter it. E. If Anton is right, that theory contradicts the orthodox idea linking late growth with development of a large brain. Anthropologist Steven Leigh from the University of Illinois goes further. He believes the idea of adolescence as catch- up growth does not explain why the growth rate increases so dramatically. He says that many apes have growth spurts in particular body regions that are associated with reaching maturity, and this makes sense because by timing the short but crucial spells of maturation to coincide with the seasons when food is plentiful, they minimise the risk of being without adequate food supplies while growing. What makes humans unique is that the whole skeleton is involved. For Leigh, this is the key. F. According to his theory, adolescence evolved as an integral part of efficient upright locomotion, as well as to accommodate more complex brains. Fossil evidence suggests that our ancestors first walked on two legs six million years ago. If proficient walking was important for survival, perhaps the teenage growth spurt has very ancient origins. While many anthropologists will consider Leigh's theory a step too far, he is not the only one with new ideas about the evolution of teenagers. G. Another approach, which has produced a surprising result, relies on the minute analysis of tooth growth. Every nine days or so the growing teeth of both apes and humans acquire ridges on their enamel surface. These are like rings in a tree trunk: the number of them tells you how long the crown of a tooth took to form. Across mammals' the rate at which teeth develop is closely related to how fast the brain grows and the age you mature. Teeth are good indicators of lifehistory because thefr growth is less related to the environment and nutrition than is the growth of the skeleton. H. A more decisive piece of evidence came last year, when researchers in France and Spain published their findings from a study of Neanderthal teeth. Neanderthals had much faster tooth growth than erectus who went before them, and hence, possibly, a shorter childhood. Lead researcher Fernando Ramirez- Rozzi thinks Neanderthals died young-about 25 years old - primarily because of the cold, harsh environment they had to endure in glacial Europe. They evolved to grow up quicker than their immediate ancestors. Neanderthals and Homo erectus probably had to reach adulthood fairly quickly, without delaying for an adolescent growth spurt. So it still looks as though we are the original teenagers. | It is difficult for anthropologists to do research on human fossil because they are so rare. | e |
id_2884 | Have Teenagers Always Existed A. Our ancestor. Homo erectus, may not have had culture or even language, but did they have teenagers? That question has been contested in the past few years, with some anthropologists claiming evidence of an adolescent phase in human fossil. This is not merely an academic debate. Humans today are the only animals on Earth to have a teenage phase, yet we have very little idea why. Establishing exactly when adolescence first evolved and finding out what sorts of changes in our bodies and lifestyles it was associated with could help US understand its purpose. Why do we, uniquely' have a growth spurt so late in life? B. Until recently, the dominant explanation was that physical growth is delayed by our need to grow large brains and to learn all the behavior patterns associated with humanity - speaking, social interaction and so on. While such behaviour is still developing, humans cannot easily fend for themselves, so it is best to stay small and look youthful. That way your parents and other members of the social group are motivated to continue looking after you. What's more, studies of mammals show a strong relationship between brain size and the rate of development, with larger-brained animals taking longer to reach adulthood. Humans are at the far end of this spectrum. If this theory is correct, and the development of large brains accounts for the teenage growth spurt, the origin of adolescence should have been with the evolution of our* own species (Homo sapiens) and Neanderthals, starting almost 200,000 years ago. The trouble is, some of the fossil evidence seems to tell a different story. C. The human fossil record is extremely sparse, and the number of fossilised children minuscule. Nevertheless, in the past few years anthropologists have begun to look at what can be learned of lives of our ancestors from these youngsters, of the most studied is the famous Turkana boy, an almost complete skeleton of Homo erectus f 1.6 million years ago found in Kenya in 1984. Accurately assessing how old someone is from their skeleton is a trickybusiness. Even with a modern human, you can only make a rough estimate based on the developmental stage of teeth and bones and the skeleton's general size. D. You need as many developmental markers as possible to get an estimate of age. The Turkana's teeth made him 10 or 11 years old. The features of his skeleton put him at 13, but he as tall as a modem 15-year-old. Susan Anton of New York University points to research by Margaret Clegg who studied a collection of 18th-century 19th-century skeletons whose ages at death were known. When she tried to age the skeletons Without checking the records, she found similar discrepancies to those of the Turkana boy. One 10-year-old boy, for example, had a dental age of 9, the skeleton of a 6-year-old but was tall enough to be 11. 'The Turkana kid still has a rounded skull, and needs more growth to reach the adult shape/ Anton adds. She thinks that Homo erectus already developed modern human patterns growth, with a late, if not quite so extreme, adolescent spurt. She believes Turkana boy was just about to enter it. E. If Anton is right, that theory contradicts the orthodox idea linking late growth with development of a large brain. Anthropologist Steven Leigh from the University of Illinois goes further. He believes the idea of adolescence as catch- up growth does not explain why the growth rate increases so dramatically. He says that many apes have growth spurts in particular body regions that are associated with reaching maturity, and this makes sense because by timing the short but crucial spells of maturation to coincide with the seasons when food is plentiful, they minimise the risk of being without adequate food supplies while growing. What makes humans unique is that the whole skeleton is involved. For Leigh, this is the key. F. According to his theory, adolescence evolved as an integral part of efficient upright locomotion, as well as to accommodate more complex brains. Fossil evidence suggests that our ancestors first walked on two legs six million years ago. If proficient walking was important for survival, perhaps the teenage growth spurt has very ancient origins. While many anthropologists will consider Leigh's theory a step too far, he is not the only one with new ideas about the evolution of teenagers. G. Another approach, which has produced a surprising result, relies on the minute analysis of tooth growth. Every nine days or so the growing teeth of both apes and humans acquire ridges on their enamel surface. These are like rings in a tree trunk: the number of them tells you how long the crown of a tooth took to form. Across mammals' the rate at which teeth develop is closely related to how fast the brain grows and the age you mature. Teeth are good indicators of lifehistory because thefr growth is less related to the environment and nutrition than is the growth of the skeleton. H. A more decisive piece of evidence came last year, when researchers in France and Spain published their findings from a study of Neanderthal teeth. Neanderthals had much faster tooth growth than erectus who went before them, and hence, possibly, a shorter childhood. Lead researcher Fernando Ramirez- Rozzi thinks Neanderthals died young-about 25 years old - primarily because of the cold, harsh environment they had to endure in glacial Europe. They evolved to grow up quicker than their immediate ancestors. Neanderthals and Homo erectus probably had to reach adulthood fairly quickly, without delaying for an adolescent growth spurt. So it still looks as though we are the original teenagers. | Researchers in France and Spain developed a unique method of analyzing teeth. | n |
id_2885 | Have Teenagers Always Existed A. Our ancestor. Homo erectus, may not have had culture or even language, but did they have teenagers? That question has been contested in the past few years, with some anthropologists claiming evidence of an adolescent phase in human fossil. This is not merely an academic debate. Humans today are the only animals on Earth to have a teenage phase, yet we have very little idea why. Establishing exactly when adolescence first evolved and finding out what sorts of changes in our bodies and lifestyles it was associated with could help US understand its purpose. Why do we, uniquely' have a growth spurt so late in life? B. Until recently, the dominant explanation was that physical growth is delayed by our need to grow large brains and to learn all the behavior patterns associated with humanity - speaking, social interaction and so on. While such behaviour is still developing, humans cannot easily fend for themselves, so it is best to stay small and look youthful. That way your parents and other members of the social group are motivated to continue looking after you. What's more, studies of mammals show a strong relationship between brain size and the rate of development, with larger-brained animals taking longer to reach adulthood. Humans are at the far end of this spectrum. If this theory is correct, and the development of large brains accounts for the teenage growth spurt, the origin of adolescence should have been with the evolution of our* own species (Homo sapiens) and Neanderthals, starting almost 200,000 years ago. The trouble is, some of the fossil evidence seems to tell a different story. C. The human fossil record is extremely sparse, and the number of fossilised children minuscule. Nevertheless, in the past few years anthropologists have begun to look at what can be learned of lives of our ancestors from these youngsters, of the most studied is the famous Turkana boy, an almost complete skeleton of Homo erectus f 1.6 million years ago found in Kenya in 1984. Accurately assessing how old someone is from their skeleton is a trickybusiness. Even with a modern human, you can only make a rough estimate based on the developmental stage of teeth and bones and the skeleton's general size. D. You need as many developmental markers as possible to get an estimate of age. The Turkana's teeth made him 10 or 11 years old. The features of his skeleton put him at 13, but he as tall as a modem 15-year-old. Susan Anton of New York University points to research by Margaret Clegg who studied a collection of 18th-century 19th-century skeletons whose ages at death were known. When she tried to age the skeletons Without checking the records, she found similar discrepancies to those of the Turkana boy. One 10-year-old boy, for example, had a dental age of 9, the skeleton of a 6-year-old but was tall enough to be 11. 'The Turkana kid still has a rounded skull, and needs more growth to reach the adult shape/ Anton adds. She thinks that Homo erectus already developed modern human patterns growth, with a late, if not quite so extreme, adolescent spurt. She believes Turkana boy was just about to enter it. E. If Anton is right, that theory contradicts the orthodox idea linking late growth with development of a large brain. Anthropologist Steven Leigh from the University of Illinois goes further. He believes the idea of adolescence as catch- up growth does not explain why the growth rate increases so dramatically. He says that many apes have growth spurts in particular body regions that are associated with reaching maturity, and this makes sense because by timing the short but crucial spells of maturation to coincide with the seasons when food is plentiful, they minimise the risk of being without adequate food supplies while growing. What makes humans unique is that the whole skeleton is involved. For Leigh, this is the key. F. According to his theory, adolescence evolved as an integral part of efficient upright locomotion, as well as to accommodate more complex brains. Fossil evidence suggests that our ancestors first walked on two legs six million years ago. If proficient walking was important for survival, perhaps the teenage growth spurt has very ancient origins. While many anthropologists will consider Leigh's theory a step too far, he is not the only one with new ideas about the evolution of teenagers. G. Another approach, which has produced a surprising result, relies on the minute analysis of tooth growth. Every nine days or so the growing teeth of both apes and humans acquire ridges on their enamel surface. These are like rings in a tree trunk: the number of them tells you how long the crown of a tooth took to form. Across mammals' the rate at which teeth develop is closely related to how fast the brain grows and the age you mature. Teeth are good indicators of lifehistory because thefr growth is less related to the environment and nutrition than is the growth of the skeleton. H. A more decisive piece of evidence came last year, when researchers in France and Spain published their findings from a study of Neanderthal teeth. Neanderthals had much faster tooth growth than erectus who went before them, and hence, possibly, a shorter childhood. Lead researcher Fernando Ramirez- Rozzi thinks Neanderthals died young-about 25 years old - primarily because of the cold, harsh environment they had to endure in glacial Europe. They evolved to grow up quicker than their immediate ancestors. Neanderthals and Homo erectus probably had to reach adulthood fairly quickly, without delaying for an adolescent growth spurt. So it still looks as though we are the original teenagers. | There has been too little research comparing the brains of Homo erectus and Neanderthals. | n |
id_2886 | Have you ever set your mouth on fire by biting into a chilli pepper? The sensation is caused by capsaicin, a chemical compound that stimulates the mouths pain receptors, which in turn tell the brain youve eaten something hot. The body reacts by perspiring and releasing endorphins, the feel-good effect of which perhaps accounts for spicy foods appeal. The first scale for measuring a chillis heat was developed in 1912 by the chemist Wilbur Scoville. Scoville Heat Units refer to the number of times a chilli must be diluted before it is undetectable to tasters. The worlds hottest chilli, the Indian-originating naga jolokia, measures 970,000 SHU. Today a chillis heat can be measured more accurately using high-pressure liquid chromatography, a technique that calculates the concentration of capsaicin in a solution. Humans have consumed chillies for over 8,000 years, but they were first cultivated 6,000 years ago in South and Central America. In the late 15th century Christopher Columbus introduced chillies to the rest of the world for the first time, where they were called peppers because they were spicy like peppercorns. In addition to their culinary uses, chillies have long been prized for their medicinal properties. Scientific studies show that capsaicin may lower blood pressure and aid weight loss. Capsaicin has traditionally been used in tropical analgesics, however new research indicates that the compound may actually be carcinogenic. | Although eaten around the world, chilli peppers are indigenous only to South and Central America. | c |
id_2887 | Have you ever set your mouth on fire by biting into a chilli pepper? The sensation is caused by capsaicin, a chemical compound that stimulates the mouths pain receptors, which in turn tell the brain youve eaten something hot. The body reacts by perspiring and releasing endorphins, the feel-good effect of which perhaps accounts for spicy foods appeal. The first scale for measuring a chillis heat was developed in 1912 by the chemist Wilbur Scoville. Scoville Heat Units refer to the number of times a chilli must be diluted before it is undetectable to tasters. The worlds hottest chilli, the Indian-originating naga jolokia, measures 970,000 SHU. Today a chillis heat can be measured more accurately using high-pressure liquid chromatography, a technique that calculates the concentration of capsaicin in a solution. Humans have consumed chillies for over 8,000 years, but they were first cultivated 6,000 years ago in South and Central America. In the late 15th century Christopher Columbus introduced chillies to the rest of the world for the first time, where they were called peppers because they were spicy like peppercorns. In addition to their culinary uses, chillies have long been prized for their medicinal properties. Scientific studies show that capsaicin may lower blood pressure and aid weight loss. Capsaicin has traditionally been used in tropical analgesics, however new research indicates that the compound may actually be carcinogenic. | The scale developed by Wilbur Scoville was the most accurate method of measuring a chillis heat. | e |
id_2888 | Have you ever set your mouth on fire by biting into a chilli pepper? The sensation is caused by capsaicin, a chemical compound that stimulates the mouths pain receptors, which in turn tell the brain youve eaten something hot. The body reacts by perspiring and releasing endorphins, the feel-good effect of which perhaps accounts for spicy foods appeal. The first scale for measuring a chillis heat was developed in 1912 by the chemist Wilbur Scoville. Scoville Heat Units refer to the number of times a chilli must be diluted before it is undetectable to tasters. The worlds hottest chilli, the Indian-originating naga jolokia, measures 970,000 SHU. Today a chillis heat can be measured more accurately using high-pressure liquid chromatography, a technique that calculates the concentration of capsaicin in a solution. Humans have consumed chillies for over 8,000 years, but they were first cultivated 6,000 years ago in South and Central America. In the late 15th century Christopher Columbus introduced chillies to the rest of the world for the first time, where they were called peppers because they were spicy like peppercorns. In addition to their culinary uses, chillies have long been prized for their medicinal properties. Scientific studies show that capsaicin may lower blood pressure and aid weight loss. Capsaicin has traditionally been used in tropical analgesics, however new research indicates that the compound may actually be carcinogenic. | The passage suggests that some people eat chilli peppers for their psychological effect as well as their spicy taste. | e |
id_2889 | Have you ever set your mouth on fire by biting into a chilli pepper? The sensation is caused by capsaicin, a chemical compound that stimulates the mouths pain receptors, which in turn tell the brain youve eaten something hot. The body reacts by perspiring and releasing endorphins, the feel-good effect of which perhaps accounts for spicy foods appeal. The first scale for measuring a chillis heat was developed in 1912 by the chemist Wilbur Scoville. Scoville Heat Units refer to the number of times a chilli must be diluted before it is undetectable to tasters. The worlds hottest chilli, the Indian-originating naga jolokia, measures 970,000 SHU. Today a chillis heat can be measured more accurately using high-pressure liquid chromatography, a technique that calculates the concentration of capsaicin in a solution. Humans have consumed chillies for over 8,000 years, but they were first cultivated 6,000 years ago in South and Central America. In the late 15th century Christopher Columbus introduced chillies to the rest of the world for the first time, where they were called peppers because they were spicy like peppercorns. In addition to their culinary uses, chillies have long been prized for their medicinal properties. Scientific studies show that capsaicin may lower blood pressure and aid weight loss. Capsaicin has traditionally been used in tropical analgesics, however new research indicates that the compound may actually be carcinogenic. | The chemical compound capsaicin sends a message to the brain that something hot has been consumed. | c |
id_2890 | Have you ever set your mouth on fire by biting into a chilli pepper? The sensation is caused by capsaicin, a chemical compound that stimulates the mouths pain receptors, which in turn tell the brain youve eaten something hot. The body reacts by perspiring and releasing endorphins, the feel-good effect of which perhaps accounts for spicy foods appeal. The first scale for measuring a chillis heat was developed in 1912 by the chemist Wilbur Scoville. Scoville Heat Units refer to the number of times a chilli must be diluted before it is undetectable to tasters. The worlds hottest chilli, the Indian-originating naga jolokia, measures 970,000 SHU. Today a chillis heat can be measured more accurately using high-pressure liquid chromatography, a technique that calculates the concentration of capsaicin in a solution. Humans have consumed chillies for over 8,000 years, but they were first cultivated 6,000 years ago in South and Central America. In the late 15th century Christopher Columbus introduced chillies to the rest of the world for the first time, where they were called peppers because they were spicy like peppercorns. In addition to their culinary uses, chillies have long been prized for their medicinal properties. Scientific studies show that capsaicin may lower blood pressure and aid weight loss. Capsaicin has traditionally been used in tropical analgesics, however new research indicates that the compound may actually be carcinogenic. | Chilli peppers were only introduced to Europeans in the 15th century. | e |
id_2891 | Having a lot of money is not civilised. A man who has all the wealth and luxury at his command may be miles away from culture and the term civilised. On the other hand, some intellectual, living in a remote slum may enrich the civilisation through his precious contribution and may be thoroughly cultured and civilised. | Money is no standard for judging culture and civilisation. | e |
id_2892 | Having a lot of money is not civilised. A man who has all the wealth and luxury at his command may be miles away from culture and the term civilised. On the other hand, some intellectual, living in a remote slum may enrich the civilisation through his precious contribution and may be thoroughly cultured and civilised. | All people living in slums contribute towards civilisation. | n |
id_2893 | Having a lot of money is not civilised. A man who has all the wealth and luxury at his command may be miles away from culture and the term civilised. On the other hand, some intellectual, living in a remote slum may enrich the civilisation through his precious contribution and may be thoroughly cultured and civilised. | All rich men are uncivilised. | n |
id_2894 | Having a lot of money is not civilised. A man who has all the wealth and luxury at his command may be miles away from culture and the term civilised. On the other hand, some intellectual, living in a remote slum may enrich the civilisation through his precious contribution and may be thoroughly cultured and civilised. | The rich never contribute to civilisation. | n |
id_2895 | Having a lot of money is not civilised. A man who has all the wealth and luxury at his command may be miles away from culture and the term civilised. On the other hand, some intellectual, living in a remote slum may enrich the civilisation through his precious contribution and may be thoroughly cultured and civilised. | People living in slums are highly cultured. | n |
id_2896 | Health in the Wild Many animals seem able to treat their illnesses themselves. Humans may have a thing or two to learn from them. For the past decade Dr Engel, a lecturer in environmental sciences at Britains Open University, has been collating examples of self-medicating behaviour in wild animals. She recently published a book on the subject. In a talk at the Edinburgh Science Festival earlier this month, she explained that the idea that animals can treat themselves has been regarded with some scepticism by her colleagues in the past. But a growing number of animal behaviourists now think that wild animals can and do deal with their own medical needs. One example of self-medication was discovered in 1987. Michael Huffman and Mohamedi Seifu, working in the Mahale Mountains National Park in Tanzania, noticed that local chimpanzees suffering from intestinal worms would dose themselves with the pith of a plant called Veronia. This plant produces poisonous chemicals called terpenes. Its pith contains a strong enough concentration to kill gut parasites, but not so strong as to kill chimps (nor people, for that matter; locals use the pith for the same purpose). Given that the plant is known locally as goat- killer, however, it seems that not all animals are as smart as chimps and humans. Some consume it indiscriminately, and succumb. Since the Veronia-eating chimps were discovered, more evidence has emerged suggesting that animals often eat things for medical rather than nutritional reasons. Many species, for example, consume dirta behaviour known as geophagy. Historically, the preferred explanation was that soil supplies minerals such as salt. But geophagy occurs in areas where the earth is not a useful source of minerals, and also in places where minerals can be more easily obtained from certain plants that are known to be rich in them. Clearly, the animals must be getting something else out of eating earth. The current belief is that soiland particularly the clay in ithelps to detoxify the defensive poisons that some plants produce in an attempt to prevent themselves from being eaten. Evidence for the detoxifying nature of clay came in 1999, from an experiment carried out on macaws by James Gilardi and his colleagues at the University of California, Davis. Macaws eat seeds containing alkaloids, a group of chemicals that has some notoriously toxic members, such as strychnine. In the wild, the birds are frequently seen perched on eroding riverbanks eating clay. Dr Gilardi fed one group of macaws a mixture of harmless alkaloid and clay, and a second group just the alkaloid. Several hours later, the macaws that had eaten the clay had 60% less alkaloid in their bloodstreams than those that had not, suggesting that the hypothesis is correct. Other observations also support the idea that clay is detoxifying. Towards the tropics the amount of toxic compounds in plants increases-and so does the amount of earth eaten by herbivores. Elephants lick clay from mud holes all year round, except in September when they are bingeing on fruit which, because it has evolved to be eaten, is not toxic. And the addition of clay to the diets of domestic cattle increases the amount of nutrients that they can absorb from their food by 10-20%. A third instance of animal self-medication is the use of mechanical scours to get rid of gut parasites, in 1972 Richard Wrangham, a researcher at the Gombe Stream Reserve in Tanzania, noticed that chimpanzees were eating the leaves of a tree called Aspilia. The chimps chose the leaves carefully by testing them in their mouths. Having chosen a leaf, a chimp would fold it into a fan and swallow it. Some of the chimps were noticed wrinkling their noses as they swallowed these leaves, suggesting the experience was unpleasant. Later, undigested leaves were found on the forest floor. Dr Wrangham rightly guessed that the leaves had a medicinal purposethis was, indeed, one of the earliest interpretations of a behaviour pattern as self-medication. However, he guessed wrong about what the mechanism was. His (and everybody elses) assumption was that Aspilia contained a drug, and this sparked more than two decades of phytochemical research to try to find out what chemical the chimps were after. But by the 1990s, chimps across Africa had been seen swallowing the leaves of 19 different species that seemed to have few suitable chemicals in common. The drug hypothesis was looking more and more dubious. It was Dr Huffman who got to the bottom of the problem. He did so by watching what came out of the chimps, rather than concentrating on what went in. He found that the egested leaves were full of intestinal worms. The factor common to all 19 species of leaves swallowed by the chimps was that they were covered with microscopic hooks. These caught the worms and dragged them from their lodgings. Following that observation, Dr Engel is now particularly excited about how knowledge of the way that animals look after themselves could be used to improve the health of live-stock. People might also be able to learn a thing or two, and may, indeed, already have done so. Geophagy, for example, is a common behaviour in many parts of the world The medical stalls in African markets frequently sell tablets made of different sorts of clays, appropriate to different medical conditions. Africans brought to the Americas as slaves continued this tradition, which gave their owners one more excuse to affect to despise them. Yet, as Dr Engel points out, Rwandan mountain gorillas eat a type of clay rather similar to kaolinite the main ingredient of many patent medicines sold over the counter in the West for digestive complaints. Dirt can sometimes be good for you, and to be as sick as a parrot may, after all, be a state to be desired. | Dr. Engel has been working on animal self-medication research for 10 years. | e |
id_2897 | Health in the Wild Many animals seem able to treat their illnesses themselves. Humans may have a thing or two to learn from them. For the past decade Dr Engel, a lecturer in environmental sciences at Britains Open University, has been collating examples of self-medicating behaviour in wild animals. She recently published a book on the subject. In a talk at the Edinburgh Science Festival earlier this month, she explained that the idea that animals can treat themselves has been regarded with some scepticism by her colleagues in the past. But a growing number of animal behaviourists now think that wild animals can and do deal with their own medical needs. One example of self-medication was discovered in 1987. Michael Huffman and Mohamedi Seifu, working in the Mahale Mountains National Park in Tanzania, noticed that local chimpanzees suffering from intestinal worms would dose themselves with the pith of a plant called Veronia. This plant produces poisonous chemicals called terpenes. Its pith contains a strong enough concentration to kill gut parasites, but not so strong as to kill chimps (nor people, for that matter; locals use the pith for the same purpose). Given that the plant is known locally as goat- killer, however, it seems that not all animals are as smart as chimps and humans. Some consume it indiscriminately, and succumb. Since the Veronia-eating chimps were discovered, more evidence has emerged suggesting that animals often eat things for medical rather than nutritional reasons. Many species, for example, consume dirta behaviour known as geophagy. Historically, the preferred explanation was that soil supplies minerals such as salt. But geophagy occurs in areas where the earth is not a useful source of minerals, and also in places where minerals can be more easily obtained from certain plants that are known to be rich in them. Clearly, the animals must be getting something else out of eating earth. The current belief is that soiland particularly the clay in ithelps to detoxify the defensive poisons that some plants produce in an attempt to prevent themselves from being eaten. Evidence for the detoxifying nature of clay came in 1999, from an experiment carried out on macaws by James Gilardi and his colleagues at the University of California, Davis. Macaws eat seeds containing alkaloids, a group of chemicals that has some notoriously toxic members, such as strychnine. In the wild, the birds are frequently seen perched on eroding riverbanks eating clay. Dr Gilardi fed one group of macaws a mixture of harmless alkaloid and clay, and a second group just the alkaloid. Several hours later, the macaws that had eaten the clay had 60% less alkaloid in their bloodstreams than those that had not, suggesting that the hypothesis is correct. Other observations also support the idea that clay is detoxifying. Towards the tropics the amount of toxic compounds in plants increases-and so does the amount of earth eaten by herbivores. Elephants lick clay from mud holes all year round, except in September when they are bingeing on fruit which, because it has evolved to be eaten, is not toxic. And the addition of clay to the diets of domestic cattle increases the amount of nutrients that they can absorb from their food by 10-20%. A third instance of animal self-medication is the use of mechanical scours to get rid of gut parasites, in 1972 Richard Wrangham, a researcher at the Gombe Stream Reserve in Tanzania, noticed that chimpanzees were eating the leaves of a tree called Aspilia. The chimps chose the leaves carefully by testing them in their mouths. Having chosen a leaf, a chimp would fold it into a fan and swallow it. Some of the chimps were noticed wrinkling their noses as they swallowed these leaves, suggesting the experience was unpleasant. Later, undigested leaves were found on the forest floor. Dr Wrangham rightly guessed that the leaves had a medicinal purposethis was, indeed, one of the earliest interpretations of a behaviour pattern as self-medication. However, he guessed wrong about what the mechanism was. His (and everybody elses) assumption was that Aspilia contained a drug, and this sparked more than two decades of phytochemical research to try to find out what chemical the chimps were after. But by the 1990s, chimps across Africa had been seen swallowing the leaves of 19 different species that seemed to have few suitable chemicals in common. The drug hypothesis was looking more and more dubious. It was Dr Huffman who got to the bottom of the problem. He did so by watching what came out of the chimps, rather than concentrating on what went in. He found that the egested leaves were full of intestinal worms. The factor common to all 19 species of leaves swallowed by the chimps was that they were covered with microscopic hooks. These caught the worms and dragged them from their lodgings. Following that observation, Dr Engel is now particularly excited about how knowledge of the way that animals look after themselves could be used to improve the health of live-stock. People might also be able to learn a thing or two, and may, indeed, already have done so. Geophagy, for example, is a common behaviour in many parts of the world The medical stalls in African markets frequently sell tablets made of different sorts of clays, appropriate to different medical conditions. Africans brought to the Americas as slaves continued this tradition, which gave their owners one more excuse to affect to despise them. Yet, as Dr Engel points out, Rwandan mountain gorillas eat a type of clay rather similar to kaolinite the main ingredient of many patent medicines sold over the counter in the West for digestive complaints. Dirt can sometimes be good for you, and to be as sick as a parrot may, after all, be a state to be desired. | Animals often walk a considerable distance to find plants for medication. | n |
id_2898 | Health in the Wild Many animals seem able to treat their illnesses themselves. Humans may have a thing or two to learn from them. For the past decade Dr Engel, a lecturer in environmental sciences at Britains Open University, has been collating examples of self-medicating behaviour in wild animals. She recently published a book on the subject. In a talk at the Edinburgh Science Festival earlier this month, she explained that the idea that animals can treat themselves has been regarded with some scepticism by her colleagues in the past. But a growing number of animal behaviourists now think that wild animals can and do deal with their own medical needs. One example of self-medication was discovered in 1987. Michael Huffman and Mohamedi Seifu, working in the Mahale Mountains National Park in Tanzania, noticed that local chimpanzees suffering from intestinal worms would dose themselves with the pith of a plant called Veronia. This plant produces poisonous chemicals called terpenes. Its pith contains a strong enough concentration to kill gut parasites, but not so strong as to kill chimps (nor people, for that matter; locals use the pith for the same purpose). Given that the plant is known locally as goat- killer, however, it seems that not all animals are as smart as chimps and humans. Some consume it indiscriminately, and succumb. Since the Veronia-eating chimps were discovered, more evidence has emerged suggesting that animals often eat things for medical rather than nutritional reasons. Many species, for example, consume dirta behaviour known as geophagy. Historically, the preferred explanation was that soil supplies minerals such as salt. But geophagy occurs in areas where the earth is not a useful source of minerals, and also in places where minerals can be more easily obtained from certain plants that are known to be rich in them. Clearly, the animals must be getting something else out of eating earth. The current belief is that soiland particularly the clay in ithelps to detoxify the defensive poisons that some plants produce in an attempt to prevent themselves from being eaten. Evidence for the detoxifying nature of clay came in 1999, from an experiment carried out on macaws by James Gilardi and his colleagues at the University of California, Davis. Macaws eat seeds containing alkaloids, a group of chemicals that has some notoriously toxic members, such as strychnine. In the wild, the birds are frequently seen perched on eroding riverbanks eating clay. Dr Gilardi fed one group of macaws a mixture of harmless alkaloid and clay, and a second group just the alkaloid. Several hours later, the macaws that had eaten the clay had 60% less alkaloid in their bloodstreams than those that had not, suggesting that the hypothesis is correct. Other observations also support the idea that clay is detoxifying. Towards the tropics the amount of toxic compounds in plants increases-and so does the amount of earth eaten by herbivores. Elephants lick clay from mud holes all year round, except in September when they are bingeing on fruit which, because it has evolved to be eaten, is not toxic. And the addition of clay to the diets of domestic cattle increases the amount of nutrients that they can absorb from their food by 10-20%. A third instance of animal self-medication is the use of mechanical scours to get rid of gut parasites, in 1972 Richard Wrangham, a researcher at the Gombe Stream Reserve in Tanzania, noticed that chimpanzees were eating the leaves of a tree called Aspilia. The chimps chose the leaves carefully by testing them in their mouths. Having chosen a leaf, a chimp would fold it into a fan and swallow it. Some of the chimps were noticed wrinkling their noses as they swallowed these leaves, suggesting the experience was unpleasant. Later, undigested leaves were found on the forest floor. Dr Wrangham rightly guessed that the leaves had a medicinal purposethis was, indeed, one of the earliest interpretations of a behaviour pattern as self-medication. However, he guessed wrong about what the mechanism was. His (and everybody elses) assumption was that Aspilia contained a drug, and this sparked more than two decades of phytochemical research to try to find out what chemical the chimps were after. But by the 1990s, chimps across Africa had been seen swallowing the leaves of 19 different species that seemed to have few suitable chemicals in common. The drug hypothesis was looking more and more dubious. It was Dr Huffman who got to the bottom of the problem. He did so by watching what came out of the chimps, rather than concentrating on what went in. He found that the egested leaves were full of intestinal worms. The factor common to all 19 species of leaves swallowed by the chimps was that they were covered with microscopic hooks. These caught the worms and dragged them from their lodgings. Following that observation, Dr Engel is now particularly excited about how knowledge of the way that animals look after themselves could be used to improve the health of live-stock. People might also be able to learn a thing or two, and may, indeed, already have done so. Geophagy, for example, is a common behaviour in many parts of the world The medical stalls in African markets frequently sell tablets made of different sorts of clays, appropriate to different medical conditions. Africans brought to the Americas as slaves continued this tradition, which gave their owners one more excuse to affect to despise them. Yet, as Dr Engel points out, Rwandan mountain gorillas eat a type of clay rather similar to kaolinite the main ingredient of many patent medicines sold over the counter in the West for digestive complaints. Dirt can sometimes be good for you, and to be as sick as a parrot may, after all, be a state to be desired. | Birds, like Macaw, often eat clay because it is part of their natural diet. | c |
id_2899 | Health in the Wild Many animals seem able to treat their illnesses themselves. Humans may have a thing or two to learn from them. For the past decade Dr Engel, a lecturer in environmental sciences at Britains Open University, has been collating examples of self-medicating behaviour in wild animals. She recently published a book on the subject. In a talk at the Edinburgh Science Festival earlier this month, she explained that the idea that animals can treat themselves has been regarded with some scepticism by her colleagues in the past. But a growing number of animal behaviourists now think that wild animals can and do deal with their own medical needs. One example of self-medication was discovered in 1987. Michael Huffman and Mohamedi Seifu, working in the Mahale Mountains National Park in Tanzania, noticed that local chimpanzees suffering from intestinal worms would dose themselves with the pith of a plant called Veronia. This plant produces poisonous chemicals called terpenes. Its pith contains a strong enough concentration to kill gut parasites, but not so strong as to kill chimps (nor people, for that matter; locals use the pith for the same purpose). Given that the plant is known locally as goat- killer, however, it seems that not all animals are as smart as chimps and humans. Some consume it indiscriminately, and succumb. Since the Veronia-eating chimps were discovered, more evidence has emerged suggesting that animals often eat things for medical rather than nutritional reasons. Many species, for example, consume dirta behaviour known as geophagy. Historically, the preferred explanation was that soil supplies minerals such as salt. But geophagy occurs in areas where the earth is not a useful source of minerals, and also in places where minerals can be more easily obtained from certain plants that are known to be rich in them. Clearly, the animals must be getting something else out of eating earth. The current belief is that soiland particularly the clay in ithelps to detoxify the defensive poisons that some plants produce in an attempt to prevent themselves from being eaten. Evidence for the detoxifying nature of clay came in 1999, from an experiment carried out on macaws by James Gilardi and his colleagues at the University of California, Davis. Macaws eat seeds containing alkaloids, a group of chemicals that has some notoriously toxic members, such as strychnine. In the wild, the birds are frequently seen perched on eroding riverbanks eating clay. Dr Gilardi fed one group of macaws a mixture of harmless alkaloid and clay, and a second group just the alkaloid. Several hours later, the macaws that had eaten the clay had 60% less alkaloid in their bloodstreams than those that had not, suggesting that the hypothesis is correct. Other observations also support the idea that clay is detoxifying. Towards the tropics the amount of toxic compounds in plants increases-and so does the amount of earth eaten by herbivores. Elephants lick clay from mud holes all year round, except in September when they are bingeing on fruit which, because it has evolved to be eaten, is not toxic. And the addition of clay to the diets of domestic cattle increases the amount of nutrients that they can absorb from their food by 10-20%. A third instance of animal self-medication is the use of mechanical scours to get rid of gut parasites, in 1972 Richard Wrangham, a researcher at the Gombe Stream Reserve in Tanzania, noticed that chimpanzees were eating the leaves of a tree called Aspilia. The chimps chose the leaves carefully by testing them in their mouths. Having chosen a leaf, a chimp would fold it into a fan and swallow it. Some of the chimps were noticed wrinkling their noses as they swallowed these leaves, suggesting the experience was unpleasant. Later, undigested leaves were found on the forest floor. Dr Wrangham rightly guessed that the leaves had a medicinal purposethis was, indeed, one of the earliest interpretations of a behaviour pattern as self-medication. However, he guessed wrong about what the mechanism was. His (and everybody elses) assumption was that Aspilia contained a drug, and this sparked more than two decades of phytochemical research to try to find out what chemical the chimps were after. But by the 1990s, chimps across Africa had been seen swallowing the leaves of 19 different species that seemed to have few suitable chemicals in common. The drug hypothesis was looking more and more dubious. It was Dr Huffman who got to the bottom of the problem. He did so by watching what came out of the chimps, rather than concentrating on what went in. He found that the egested leaves were full of intestinal worms. The factor common to all 19 species of leaves swallowed by the chimps was that they were covered with microscopic hooks. These caught the worms and dragged them from their lodgings. Following that observation, Dr Engel is now particularly excited about how knowledge of the way that animals look after themselves could be used to improve the health of live-stock. People might also be able to learn a thing or two, and may, indeed, already have done so. Geophagy, for example, is a common behaviour in many parts of the world The medical stalls in African markets frequently sell tablets made of different sorts of clays, appropriate to different medical conditions. Africans brought to the Americas as slaves continued this tradition, which gave their owners one more excuse to affect to despise them. Yet, as Dr Engel points out, Rwandan mountain gorillas eat a type of clay rather similar to kaolinite the main ingredient of many patent medicines sold over the counter in the West for digestive complaints. Dirt can sometimes be good for you, and to be as sick as a parrot may, after all, be a state to be desired. | According to Dr. Engel, research into animal self-medication ca new painkillers. | c |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.