Friday, May 22, 2020

The World Of Technology And The Internet Essay - 1246 Words

In the world of technology, the internet has transformed the way we go about our daily lives. Forty years ago, only a few thousand people had access to the internet. Today, the internet is a tool that mostly everyone has access to. With the invention of cell phones, we have the internet at the tip of our fingers. The internet is continuously getting faster and smarter with the help of better developing technology. The internet use to only be used to learn how to build and use networks. With the access of lecture notes and two different articles, there are several different aspects between the internet when it was first founded to the use of the internet now. The growth of the internet will continue to create new technologies that will make it easier for consumers in the future. In 1958, the the Denounce Department created the Advanced Research Projects Agency or ARPA. This was the same time we were fighting in the Cold War. In order to survive a nuclear first strike, the United Sta tes had to find a way to decentralize data and systems control. The internet was a victory for the results of the Cold War. The internet was a survival tool for the United States. In the late 60s, the ARPANET was developed and put into operation in 1969. This advancement opened up new doors for the growth of the internet. ARPANET was the first to use modems, public switched phone networks, packet switching and linked research institutions. ARPANET went international in England and NorwayShow MoreRelatedInternet Technology And Its Effects On The World945 Words   |  4 PagesInternet technology is one of the booming industries in the world. These development increases transform of social and economic results or significance on various perspectives of our daily activities. It provides us with unlimited resource of everything in the world. Some of the main reasons that made internet indispensable in our daily activities are: - it is the main vehicle of social networking and entertain ment, it creates an easy environment for business activities and it’s a tremendous playerRead MoreThe Impact Of Internet Technology On The World867 Words   |  4 PagesIntroduction Internet history, security and technology are one of our generations technological advancement that influences and moving the world more in to a globalized system. This is my own personal perspective that showed and clearly stated about the benefit of this development and what is the positive and the negative that potential influence the world. What is an advantage of internet technology globally ? Surprisingly an internet history, security and technology have been overRead MoreThe Impact Of Internet Technology On The World855 Words   |  4 PagesIntroduction Internet history, security and technology are one of our generation technological advancement that influences and moving the world more in to a globalized system. This is my own personal perspective that showed and clearly stated about the benefit of this development and what is the potential negative that influence the world. What is a advantages of internet technology globally ? Surprisingly an internet history, security and technology have been over twenty-year’s sins activelyRead MoreThe Impact Of Internet Technology On The World Essay960 Words   |  4 PagesIntroduction Internet history, security and technology are one of our generations technological advancement that influences and moving the world more in to a globalized system. This is my own personal perspective that showed and clearly stated about the benefit of this development and what is the positive and the negative that potential influence the world. What is an advantage of internet technology globally ? Surprisingly an internet history, security and technology have been overRead MoreKey Features Of The Ultimate Business Disruptors : Internet, World Wide Web And Communication Technologies2226 Words   |  9 PagesIntroduction The introduction of the ultimate business disruptors: Internet, World Wide Web and communication technologies have revolutionized the way business operates and improving the way people as well as the way people and organizations communicate and collaborate paige. The concept of Web 2.0 (Business 2.0) has earned a lot of prominence in recent years since it has positively changed the global landscape of businesses. Web 2.0 serves as a distinctive communications platform characterizedRead MoreIs Technology A Force Behind Globalization?1161 Words   |  5 Pagesthrough traveling, trading imports and exports, technology, and mostly communication. In particular, media technology increases globalization, it helps interlink people and it causes change globally. Google, Iphones, and social networks are examples fast growing technological trends since floppy disks.  In fact, communication technology is uprising, from the iPhones to GPS satellites, to media, and other communication sources. Even though using technology through globalization can have negative effectsRead MoreCyber World: Charms and Challenges1500 Words   |  6 PagesIntroduction The cyber world is the hot topic of discussion. With the advancement of the science and technology, human race are trying to excel their proficiency to compete the creations of the nature. Cyber world is definitely the first step towards the same path. The Internet is something that mankind feels to be an essential part of the life. We are living an era where life would nearly come to a standstill without the use of this technology. We have got into the trap of this cyber world, for which weRead MoreInternet History, Security And Technology866 Words   |  4 PagesInternet history, security and technology are one of our generations technological advancement that influences and moving the world more in to a globalized system. This is my own personal perspective that showed and clearly stated about the benefit of this development and what is the positive and the negative that potential influence the world. What is an advantage of internet technology globally ? Surprisingly an internet history, security and technology have been over twenty-year’sRead MoreThe Digital Divide: A Problem for Thrid World Problems Essay1325 Words   |  6 PagesThe Digital Divide In 1966, the world was introduced to a television series titled â€Å"Star Trek†, created by Gene Roddenberry, portraying fantasy technology that all members of planet Earth had knowledge of. The characters on the TV show used innovative tools such as Telepresense, Communicators, Phasers, and Universal Translators. In modern society these tools are used worldwide but they are called video conferencing, cell phones, taser guns, and voice recognition software, respectively. Another thingRead MoreUsing Computer in Researching Makes the Students Lazy1171 Words   |  5 PagesIntroduction Since the invention of computer and other technologies, lives of many people especially the students had the major impact. Computer made it easier for students to study. Internet is one of the major innovations in the computer system, and it is widely used all over the world. An information service like one of the uses of the internet is very dependable nowadays. On of the things it serves are t he search engines. Search engines are like building a digital library for the future. It

Saturday, May 9, 2020

Booming Effect The Baby Boomer Generation Essay

Booming Effect: The Baby Boomer Generation The ending of World War II led to one of the most influential generations today. Young males upon returning to the United States, Canada, and Australia following tours of duty overseas during World War II began families. This brought about a significant number of new children into the world. â€Å"In 1946, the first year of the Baby Boom, new births in the U.S. skyrocketed to 3.47 million births† (Rosenburg). This led to many events such as an increase in housing and the development of the suburb, consumerism multiplying, health care system, issues and a more recent topic: retirement. Men and women had to postpone any ideas for having a family because of the prolonged era of the Great Depression and World War II. In 1945, when World War II ended, the men came home, and they could finally resume their wishes to start a family. Almost exactly nine months after World War II ended, Historian Landon Jones said, â€Å"A cry of the baby was heard across the land† (â€Å"Baby†). By the end of the Baby Boom, children made up almost 40 percent of the nation’s population (â€Å"Baby†). This many children will have an impact on society no matter what. After the literal baby boom, families started moving start the suburb boom as well. The Baby Boom was a great way for developers to start up a business and buy land to make modest homes. This led to developers such as William Levitt becoming the mostShow MoreRelatedcase study 1 hgd Essay1004 Words   |  5 Pagesï » ¿What impact do you think the â€Å"Boomers† will have on the next 30 years in our society? Write a minimum three page paper in which you explain: What changes the individual â€Å"boomer,† as well as society at-large, will face?   Technology, religious view points, basic political views and philosophies, loss of prejudices, What will persons in both groups need to do to adjust to social changes resulting from this demographic shift? What are your thoughts on how to provide for an aging society?   DiscussRead MoreThe Cause Of The Baby Boom Era1264 Words   |  6 PagesWhat was the cause of the baby boom era? What made the adults want to have so many kids? There are many predictions that may have caused the baby boom such as the war and all the men coming back to their wives. There are many theories that purport to explain the causes of the baby boom. Among those theories is the belief that the increase in population growth was in direct correlation with the end of the Great Depression and World War II. This theory is explained by considering the decrease in fertilityRead MoreThe Aging Population in the United States and Its Effect on Our Economy2121 Words   |  9 Pages342 The Aging Population in the United States and its Effect on our Economy July 20, 2010 Aging Population 1 The population in the United States is aging at an unprecedented pace. For the first time in history, seventy percent of everyone who has ever lived is alive today (Isidro, 2009). The aging population and their imminent retirement will place an even greater strain on the country’s financial resources. The baby boomers; people born between 1946 and 1964 have influenced our economyRead MoreConsensus and Conformity Essays991 Words   |  4 Pagespeople to seek tranquility and harmony. The fifties were the decade of change led by president Eisenhower. During this time the nation was in an up rise in many ways. The economy was booming as the Gross National Product more than doubled from the past decade. Thus there was a rise in consumer spending which had a domino effect on the economy. Though it was unexpected, many issues arrived such as the fear of communism and the suspicion of communists hiding in the government. At this period the youth wereRead MoreDevelopment of the Ind ustry1073 Words   |  4 Pagesthe existence of over 200 Boutique Investment firms who provide expertise to their niche investors. There is an expectation of consolidation of these firms in view of the recent changes about slim margins but the market has seen disruptive firms booming without any old heritage and running successfully. More than 23 of Australian Investment firms are identified to be the Worlds Top 500 largest firms. The existence alone highlights the growth potential of the industry and the future of the industryRead More HGH: Fountain of Youth? Essay1196 Words   |  5 PagesIt is also not surprising that the anti-aging product market is a booming multi-million dollar phenomenon. We will pay thousands for procedures that make us thinner, stronger, more full of energy and less wrinkled. The new emphasis of the advertising world is not just looking young, but feeling young too. A large importance is placed on energy, vitality and mental awareness. In a time in our so ciety where the baby boomer generation is approaching their mid 50s, and the number of elderly AmericansRead MoreMarket Positioning : A Successful Marketing1465 Words   |  6 Pagesconsuming product such as non-fat, low carb products but are more interested in consuming â€Å"real† food with quality ingredients such as kale and nuts. †¢ The generation Z (1996-2010) has an enormous impact on today’s market. This generation makes up to 23% of the U.S. population. With the growing trend of technology and healthy lifestyle, the generation Z are naturally attracted towards a more innovative and healthy product. †¢ The concept of energy of living an active life, is increasingly growing in theRead MoreChanges in the business environment and labour market affect Human Resource Planning (HRP).1982 Words   |  8 Pagesmake optimum use of workers attitudes and to improve their job satisfaction (Nankervis et al. 1999). HRP provide more opportunities of working for women and minority groups in the labour market. Moreover, the HPR provide a tool for evaluating the effect of alternative human resource actions and policies. Nowadays business environment is multifaceted and complex, thus the changes in business environment will have a great impact on the HRP of the organization. By the definition of HRP, to be a successRead MoreSmall Business3396 Words   |  14 Pagespercent) was starting a business. Indeed, nearly 75 percent of those on the Forbes list of the 400 richest Americans are first-generation entrepreneurs! Self-employed people are four times more likely to become millionaires than those who work for someone else. According to researches Thomas Stanley and William danko, the typical American millionaire is first-generation wealthy, owns a small business in a less-than-glamorous industry such as welding, junk yards, or auctioneering, and works betweenRead MoreMobile Banking : The New Progression Of The Traditional Banking System Essay2126 Words   |  9 Pagesinstitutions; however, concerns of security and personal privacy have halted its implementation among the US population. Though it can be viewed as a broad topic, mobile banking is portrayed through its changes and advancements with mobile payments, network effects, overall international influences, market landscape, and mixed perceptions of security within the model. The market for mobile payments is growing at an all time high with a projected increase in global mobile payment volumes. In fact, payment transactions

Wednesday, May 6, 2020

Electronic Cooling Free Essays

Undoubtedly that increasing the turbine inlet temperature is an important requirement to increase the gas turbine efficiency. There are external and internal efficient cooling methods were used to protect the blade surface from the failure. The internal cooling was enhanced by using rib, pin fins, impingement and swirl techniques. We will write a custom essay sample on Electronic Cooling or any similar topic only for you Order Now In a swirl cooling, the swirling motion is created by tangential inlet velocity that enhances the heat transfer compared to axial inlet velocity. More researchers studied the effect of swirling technique on heat transfer coefficient at different Reynolds numbers [1]. In this study four turbulence models of standard ?-? model, RNG ?-? model, standard ?-? model and the SST ?-? model were used to validate with the experiment. The validation results showed that SST ?-? model gave a good agreement with the experiment for velocity near the wall and Nusselt number through the chamber circumferential. The numerical results showed that heat transfer enhances in swirl chamber with increasing Reynolds numbers. The authors interpreted an increasing of heat transfer coefficient due to development in the thermal boundary layer and vortices interaction and increases this effect with increasing Reynolds numbers and in addition to increase the advection and the flow became more turbulent, more distortion and diffusion [2]. Also at increasing Reynolds numbers, a large pressure drop and large circumferential velocity generated [2]. Another study to decrease the pressure drop in swirling chamber was performed experimentally and analytically [3]. In this study two outlets were used instead of single outlet. The pressure drop decreased for case of two outlets because of decreasing the vortex strength. At increasing Reynolds numbers, the circumferential velocity and the pressure drop increased. The effect of five inlet jets with one outlet swirling chamber on the Nusslet number and pressure drop was performed [4]. The results showed that the Nusslet number and the pressure drop through the chamber for single inlet jet were higher than the case of five jets in case of fixed mass flow rate. Swirling action effect on turbulence intensity was investigated for single inlet and exit [5-6]. The results showed that the turbulence increases with swirling motion at inlet and decay along the chamber with decreasing the swirl intensity. The effect of changing the exit orifice on swirling motion was studied [7-9]. This study used three different exit geometry; large orifice, small orifice and eccentric small orifice. The results showed that different helical flow structures generated near the wall and around the centerline. Also the swirling number didn’t change significantly with these geometries and with increasing Reynolds numbers. Different swirl directions and number of film cooling holes effects on adiabatic film cooling effectiveness were investigated [10-11]. The results showed that the film cooling effectiveness can be increased or can be decreased depending on these conditions. Comparison study between impingement cooling and swirl cooling over Re of 7500 to 12500 was investigated [12]. They concluded that the swirl cooling and impingement cooling matched at high mass flow rate moreover the heat transfer distribution in the swirl cooling is more uniform in the axial direction. Another study investigated the augmentation of heat transfer by swirl cooling techniques in slot shaped channel with aspect ratio of 3:1 and jets issuing from side walls [13-15]. They used different configurations to enhance the swirl flow in the channel. The effect of flow redirection on the heat transfer by using three different outlet geometries; straight, tangential, 180Â ° bend outlets was investigated [16]. The results showed that the heat transfer was higher by four times compared to an axial flow, but without significant changes in heat transfer for three swirl cases. The double swirl chambers with single and multiple inlet jets and with different swirl directions are another method for augmentation the heat transfer [17-19]. By using a proper swirl direction, vortex strength increased leading to increase the heat transfer coefficient. Four turbulence models of standard k, Realizable k, standard k and SST k were used to validate the experimental data of averaged Nusslet number [19]. The validation results showed that SST k model was good agreement with the experiment. How to cite Electronic Cooling, Papers

Tuesday, April 28, 2020

Inflation Rates Essays - Foreign Exchange Market,

Inflation Rates The price of one currency in terms of another is called the exchange rate. The exchange rate affects the economy in our daily lives because it affects the price of domestically produced goods sold abroad and the cost of foreign goods bought domestically. ?Mexicans use pesos, French use francs, Austrians use schillings, and this use of different monies by different countries results in the need to exchange one money for another to facilitate trade between countries?(Husted 315). Without the exchange rate it would make it impossible to purchase goods in other countries that have a different currency. Day-to-day movements in exchange rates are closely related to people's expectations. ?The role of monetary policy would be to manage the exchange rate. A monetary expansion would tend to lower interest rates, thus lead to short-term funds flowing into foreign currencies, and so depreciate the domestic currency?(Corden 21). Throughout the history of the economy, the exchange rate has not always been controlled under the same monetary system. Foreign exchange is usually traded as bank accounts denominated in different currencies. Most of the trade takes place between the major banks and between banks and their corporate customers. Modern communications make it a truly global market. The rates vary by minute. ?Exchange rates changes are largely unexpected and so there is an important element of risk in multinational transactions that domestic transactions lack?(Husted 320). The closing rates in each financial center are reported regularly in the media. The closing rates of the previous day are listed in the morning newspaper for leisurely reading. There are two main typ es of foreign exchange systems: 1) fixed exchange rate, and 2) floating exchange rate. A fixed exchange rate system is where governments can set a certain fixed rate at which their currencies will exchange for each other and then commit themselves to maintaining this rate. Countries use an agreed-upon currency worth a specific measure standard. On the other hand, the unregulated forces of supply and demand determine the floating exchange rate system. ?During this, there is a trade-off between the rate of inflation and the current account?(Corden 86). ?If a country imports large quantities or goods, the demand will push up the exports imports large quantities of good, the demand will push up the exchange rate for that country, making the imported goods more expensive to buyers in that country. As the goods become more expensive, demand drops, and that country's money becomes cheaper in relation to other countries' money?(Gwinn 627). From 1870 to 1914, the exchange rate was determined by the Gold Standard. This system was a fixed exchange rate, and the way it worked was by pricing every currency in terms of gold. So in general terms, if X amount of one currency was equal to one ounce of gold, and Y amount of currency was also equal to one ounce of gold, then X and Y can also be exchanged. But this system had many flaws that led to a new system after all those years. The main problem with the gold standard arose due to the fact that the money supplied depended a great deal on the amount of gold held in banks, but the countries had little control over the money supply. If the demand for a currency exceeded the actual supply, banks were forced to ship gold to satisfy the individual country's requirements for the scarce currency. A flow of gold into a country obviously increased the money supply, which in turn raised prices and made its goods more expensive. This, in turn, reduced foreign demand for its currency. The n an example of how this relates to exchange rates is that if the total demand for a certain currency is decreased, the value of the currency also decrease. So more of it has to be exchanged for another currency to be equal in value. So because of this problem, the gold standard was replaced by a new monetary system. This new system was established near the end of World War II, and it was called the Bretton Woods system. ?The experts who had negotiated the Bretton Woods Agreement, and the Governments that had endorsed it, had been inspired by a desire to learn from

Friday, March 20, 2020

Cryptology and Data Protection

Cryptology and Data Protection Due to the increase in internet usage, emphasis on data security and integrity has been escalated. Better measures in relation to software and hardware based mechanisms are still being invented and put into practice. All information regarding an organization’s business processes is of critical importance.Advertising We will write a custom essay sample on Cryptology and Data Protection specifically for you for only $16.05 $11/page Learn More Information security and integrity is therefore, a vital consideration in all planning and implementation of processes in an organization. Data security ensures that all data is free from damage, erasure, theft, corruption, unauthorized access or modification, (Summers, 2004). Data integrity on the other hand ensures that data is not altered in any way either by addition or substitution. In this essay we look at how to achieve security and integrity of data, in transit and in storage. Considering the case for Store ItRite Inc, the business may be classified as data warehousing. There is need to secure data during transmission and storage. Another issue that arises is how to carry out communication between the staff members effectively yet securely over insecure communication channels. First, we look at data transmission from the client to the database; data should be transmitted as ciphertext to avoid man- in- the- middle attacks. StoreItRite has no business accessing the data that is held in their hard disks for the customers; its sole business is to store data securely on behalf of its clients. A private key scheme will therefore, work effectively in this setting. Each of the clients will generate a key which will be known only to the particular client. The key will be used to encrypt data for sending to the warehouse and the same key will be used to decrypt data on receipt from the warehouse, (Katz and Lindell, 2007). Advertising Looking for essay on it? Let's see if we can help you ! Get your first paper with 15% OFF Learn More Flow of data from the client to the warehouse and back Secondly, to transmit the daily data back up, the warehouse needs to combine all the data received throughout the day. To enhance cost effectiveness of the scheme, the combined data files should be compressed and then encrypted with StoreItRite’s private key. This will reduce the size of the file being transmitted, (Gollmann, 2006). When a client requires the stored data, it will just be retrieved and transmitted to them as ciphertext just the way it came in. On receiving the data from the warehouse, the client decrypts the data using his private key to obtain it in plaintext, (Smith, 2011). In the office, the warehouse staff need to each generate a key pair, {public and private keys}. The public key is given out to all other staff members and each of them keeps their private keys secret. When sending emails, the sender will encrypt the outgoing mail with the recipient’s public key, (Diffie, 1988). To verify the authenticity of the sender, the sender will attach a digital signature to the message. This signature will also serve to prove the integrity of the email. It will be created by first generating a hash of the entire mail and then encrypting it with the sender’s private key. The resulting ciphertext is attached to the email being sent. On receipt the recipient will decrypt the signature with the sender’s public key. If it works that verifies the originator since he alone has his private key. Then he will decrypt the message with his private key and generate a hash of that message. This is then compared with the hash in the signature. If they match the message is original from the sender, (Ferguson and Schneier 2003). Staff member, A Sender Staff member, B Recipient Encrypt message with B’s public key, Decrypt with B’s private key Generate a hash of the entire message Generate a hash of the message Encrypt hash with A’s private key Decrypt the digital signature with A’s public key Attach digital signature and send Compare the two hashes Email security at StoreItRiteAdvertising We will write a custom essay sample on Cryptology and Data Protection specifically for you for only $16.05 $11/page Learn More Kerberos and Public Key Infrastructure (PKI) are the two most widely used architectures for securing communication networks. Kerberos enables two communicating parties to exchange confidential information over an insecure network. In this scheme each user is assigned a secret key which is inserted in the messages sent by that user. This key serves to identify the sender. The Key Distribution Center (KDC) serves to authenticate parties in a transaction that is to be carried out over the network communication channels. On the other hand, Public Key Infrastructure employs a combination of public and private keys. It does not req uire any preceding key exchange. With the use of public-private key pair, a centralized hub is not necessary. Due to the use of a centralized hub, Kerberos is limited to a local intranet due to the management issues attached to a centrally managed KDC in widely distributed networks. The centralization of KDC makes Kerberos an easy to attack network architecture due to the single point of entry. KDC is also a throughput bottleneck in network performance and in case of its failure the whole network fails. PKI on the other hand has its keys distributed using a certificate repository that publicly accessible. This eliminates the risk of PKI becoming a performance bottle neck as well as that of it acting as a single point of failure, (Neuman and Tso 1994). While Kerberos is best suited for centralized platforms PKI is effectively applied in multi-platform and distributed computing. Message encryption and digital signatures are well supported in KPI enhancing the security and integrity of the messages sent and received throughout the network. Kerberos does not support these technologies hence, information security is questionable, (Kohl, Neuman, and Tso 1994). References Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE. 76(2). 560-577.Advertising Looking for essay on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Ferguson, N., Schneier B. (2003). Practical Cryptography. England: John Wiley Sons, Ltd. Gollmann, D (2006). Computer Security. (2nd Ed) West Sussex, England: John Wiley Sons, Ltd. Katz, J., Lindell, Y. (2007). Introduction to Modern Cryptography. CRC Press. Kohl, J., Neuman, B., Tso, T. (1994). The Evolution of the Kerberos Authentication System. Distributed open systems. 78–94. Washington: IEEE Computer Society Press. Neuman, B., Tso, T. (1994). Kerberos: An Authentication Service for Computer Networks. IEEE Communications 32 (9): 33–8. Retrieved from http://gost.isi.edu/publications/kerberos-neuman-tso.html Smith, H. (2011).Data Center Storage: Cost-Effective Strategies, Implementation, and Management. CRC Press. Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases with Access: Nelson Australia Pty Limited. P4-5.

Tuesday, March 3, 2020

Rates of Reaction Example Problem

Rates of Reaction Example Problem This example problem demonstrates how to use reaction rates to determine the coefficients of a balanced chemical equation. Problem The following reaction is observed:2A bB → cC dDAs the reaction progressed, the concentrations changed by these ratesrateA 0.050 mol/LÂ ·srateB 0.150 mol/LÂ ·srateC 0.075 mol/LÂ ·srateD 0.025 mol/LÂ ·sWhat are the values for the coefficients b, c, and d? Solution Chemical reaction rates measure the change in concentration of the substance per unit time.The coefficient of the chemical equation shows the whole number ratio of materials needed or products produced by the reaction. This means they also show the relative reaction rates.Step 1:Â  Find brateB/rateA b/coefficient of Ab coefficient of A x rateB/rateAb 2 x 0.150/0.050b 2 x 3b 6For every 2 moles of A, 6 moles of B are needed to complete the reactionStep 2:Â  Find crateB/rateA c/coefficient of Ac coefficient of A x rateC/rateAc 2 x 0.075/0.050c 2 x 1.5c 3For every 2 moles of A, 3 moles of C are producedStep 3:Â  Find drateD/rateA c/coefficient of Ad coefficient of A x rateD/rateAd 2 x 0.025/0.050d 2 x 0.5d 1For every 2 moles of A, 1 mole of D is produced Answer The missing coefficients for the 2A bB → cC dD reaction are b6, c3, and d1.The balanced equation is 2A 6B → 3C D

Sunday, February 16, 2020

Answer Critical Question about The Acute Effects of Humor and Exercise Essay

Answer Critical Question about The Acute Effects of Humor and Exercise on Mood and Anxiety - Essay Example Based on this information, the author is able to develop new variables which to study based on the hypothesis which has been developed form previous studies. The study design is a quasi-experimental design. This is because there are experiments which are being performed upon the participants but there is not control group, which is normally the case in true experimental design. The interventions are being applied to assess the outcome. The sampling design was non-randomised as the participants were selected with certain specifications which the researcher desired. The specifics of the participants imply that non-random approaches were utilised in the sampling of the participants. The number of participants which was utilised within the context of this research appears sufficient to achieve the desired purpose of the research. This is mainly because previous studies which had been carried out consisted of relatively smaller number of participants and still yielded reliable results. Ecological validity is the capability for a study to be able to approximate the real world requirements in terms of materials, methods and setting. The author sought to maximise ecological validity through not information the participants about their experiments to ensure that there is no bias as a result of perceptions and expectation The author ensured there is treatment fidelity through ensuring the comfort of the participants by adherence to the required regulation the quantity and exposure of the participants to the treatment has also been limited for the safety of the