Thursday, May 21, 2020

Cloning Genetics and Society - Free Essay Example

Sample details Pages: 2 Words: 718 Downloads: 2 Date added: 2019/08/08 Category Science Essay Level High school Tags: Cloning Essay Did you like this example? Cloning is a very controversial topic, when Dolly the sheep was introduced people were amazed amazing, but the discussion on whether people should be able to be cloned is still at large. I say that plants and animals is safe enough but, people should not be cloned. The pros of cloning animals and plants is that they arent hurting anyone, cloning can bring back dying species and repopulate species with downing numbers, and it can be used with animals to create a better version of that species. Creating new plants and animals wont hurt anyone because it is different for the over population for animals and plants. For those, you could easily fix it with hunting or trimming. Cloning animals that are going extinct is helpful because they are dying it would be good to save the animals if anything its just balancing the scale of things. The last pro for animal cloning is that it can be used to make a better version of the animal. Say a bull has a specific gene or something that can help cure cancer, you would want to get more of it without losing the bull. Cloning would do that by creating multiple of the bull so you can get more.(Advantages and Disadvantages)(MacDonald)(Center for Genetics and Society) Don’t waste time! Our writers will create an original "Cloning: Genetics and Society" essay for you Create order The cons of animal cloning is that it is usually unsuccessful, it is very expensive, and its very unreliable in the form of reproduction. It is very unsuccessful as 95% of attempts usually end in failure. Cloning animals also has a high risk of birth defects or getting illnesses easier. Some animals who were cloned that seemed to have been healthy have required health complications. Viagen Pets has said that the cost to make a twin of a cat costs about 25,000 dollars, the clone a dog is around 50,000 dollars, and it is has been said that the cost of Dolly the Sheep was around 1 million dollars. If that is the cost to get something cloned, imagine the cost of the equipment and the time and the effort to create it. The reason it is an unreliable form of reproduction is because it can cause Large Offspring Syndrome, which can be fatal to the clone and the animal it came out of. For bovines that have been bred out of cloning, it can occur in around half of the attempts. Also, 1 in 4 bovi nes can also contract a disease called hydrops, which is when the animal swells with fluid it has retained.(Advantages and Disadvantages)(Center for Genetics and Society) This reasons for why human cloning is bad is because it will make overpopulation a bigger problem than it already is and egg extraction is very risky. It will make overpopulation a bigger problem because a women can only have one baby a year and if scientists have a bunch of womens eggs, they can create a lot more than just one. This leads me to my next issue with it as taking eggs from women is extremely risky. Paying women for their eggs can be damaging to them and some women might feel pressured to give them away if they need money. Otherwise, women wouldnt give away their eggs if they werent being paid for it. (The Case Against Human Cloning) Although, I am for animal and plant cloning, I can recognize when something is not all perfect. I still that plants and animals is safe enough but, people should not be cloned. Work Cited Animal Cloning: Old MacDonalds Farm Is Not What It Used To Be. Remedies From Native American Cultures, www.manataka.org/page1033.html. Animal Cloning: Old MacDonalds Farm Is Not What It Used To Be. Remedies From Native American Cultures, www.manataka.org/page1033.html. Burgstaller, Jerg Patrick, and Gottfried Brem. Aging of Cloned Animals: A www.karger.com/Article/FullText/452444. Crystal Lombardo. Vittana.org, 8 Nov. 2017, vittana.org/10-advantages-and-disadvantages-of-cloning-animals. Reproductive Cloning Arguements Pros and Cons. How Much Do Stem Cell Treatments Really Cost? | Center for Genetics and Society, 15 May 2006, www.geneticsandsociety.org/internal-content/reproductive-cloning-arguments-pro-and-con. Research Cloning Arguement Pros and Cons. How Much Do Stem Cell Treatments Really Cost? | Center for Genetics and Society, 2006, www.geneticsandsociety.org/internal-content/research-cloning-arguments-pro-and-con. The Case Against Human Cloning. RNA Editing Tools Could Create New Disease Therapies BioNews, 28 Sept. 2015, www.bionews.org.uk/page_95215

Monday, May 18, 2020

Management Planning Presentation Mgt 230 Essay - 947 Words

Management Planning Presentation Travis Williams  © BP 2006 Oil section BP Statistical Review of World Energy 2007  © BP 2007 Functions of Management Function of Management Steps: 1. Stick to a system approach the system the same way every time 2. Focus on the future with specific goals, i. e. , be specific and plan accordingly 3. All employees should be aware of the company’s goals and work together toward them. 4. Plans and goals should be as detailed as possible to avoid crisis situations. 5. In addition, to ensure that your company avoids a crisis, multiple strategies and plans should be on hand. 6. Formulate step by step plans, with goals for each step in the process. 7.Be sure to include all employees in†¦show more content†¦These plans are not only being revised and developed to increase preparation in case another similar accident occurs, but much money is being invested into these plans. Specifically, money is being invested to purchase safety equipment. ï  ¬ Another issue that affected BP’s plans is that its machinery was outdated and its pipelines were damaged. To prevent any additional accidents or further damage to the environment or to people, BP is in the process of preparing an Operating Management System. ï  ¬ BP is not only motivated by the recent oil spill but also by its desire to create healthy and environmentally friendly energy sources. For this reason, BP will continue to evaluate and revise its business plan and develop new plans and technology to reach this goal. BP Statistical Review of World Energy 2007  © BP 2007 Direction of British Petroleum ï  ¬ Although BP has had a recently bumpy past, the company is now focused on the future. BP’s main goal, in looking toward the future, is to continue to act in an ethical and moral way and to continue to improve safety and energy efficiency. ï  ¬ In order to reach these goals, BP must not only repair its existing equipment but must also continually develop new products and equipment. Another way to reach these goals, and to improve the way BP is viewed by the public, is to research and implement new ways to conduct business in an environmentallyShow MoreRelatedThesis Documentation of Library System2535 Words   |  11 Pagesthese developments and expectations means that library instruction has to restructure its curriculum. Degreed librarians today must have taken courses in basic computing, automated information management, design and implementation of distributed information methods, web site exploration, network management, etc. They have to evolve and stay ahead of changes in the environment; otherwise, other private information providers will usurp the librarian’s place. One role that they should be in the forefrontRead MoreMgt/230 Week 2 Team Assignment1684 Words   |  7 PagesInternal and External Factors M GT/230 Week 2 Team Assignment Internal and external factors greatly affect an organizations ability to accomplish the four functions of management. Management at every level is tasked with planning, leading, controlling, and organizing. As leadership applies the four functions to their day-to-day tasks, it is extremely important that things like; innovation, technology, globalization, ethics, and diversity are represented clearly within all aspects. The largestRead MoreStudy Guide for Mgt 2302192 Words   |  9 Pages| Syllabus School of Business MGT/230 Version 1 Management Theory and Practice | Copyright  © 2011 by University of Phoenix. All rights reserved. Course Description This course explores the rich field of management in theory and practice, and as both a science and an art. Students learn to apply management concepts to current workplace issues. Other topics include increasing competitive forces, expectations for successful performance of employees and organizations, and achieving desiredRead MoreMgt 2302466 Words   |  10 Pages| Course Syllabus School of Business MGT/230 Version 1 Management Theory and Practice | Copyright  © 2011 by University of Phoenix. All rights reserved. Course Description This course explores the rich field of management in theory and practice, and as both a science and an art. Students learn to apply management concepts to current workplace issues. Other topics include increasing competitive forces, expectations for successful performance of employees and organizations, and achievingRead MoreService Quality and Customer Satisfaction in Public and Private Universities in Tanzania22790 Words   |  92 PagesIntroduction 28 3.1 Research paradigm and design 28 3.2 Study area 29 3.3 Nature and source of data 30 3.3.1 Primary data 30 3.3.2 Secondary Data 30 3.4 Sample and Sampling procedure 31 3.5 Data collection method/instruments 32 3.6 Data management 33 3.6.1 Data cleaning 33 3.6.2 Validity 33 3.6.3 Reliability 34 3.7 Data analysis 34 3.8 Testing of hypotheses 35 CHAPTER FOUR 36 Findings and Data analysis 36 4.0 Introduction: 36 4.1 Universities’ perceived satisfiers 36 4Read More THE IMPACT OF KNOWLEDGE MANAGEMENT PRACTICES IN IMPROVING STUDENT LEARNING OUTCOMES65118 Words   |  261 PagesDurham E-Theses THE IMPACT OF KNOWLEDGE MANAGEMENT PRACTICES IN IMPROVING STUDENT LEARNING OUTCOMES LEE, SHIUAN,EN,CHRIS How to cite: THE IMPACT OF KNOWLEDGE MANAGEMENT PRACTICES IN IMPROVING STUDENT LEARNING OUTCOMES, Durham theses, Durham University. Available at LEE, SHIUAN,EN,CHRIS (2009) Durham E-Theses Online: http://etheses.dur.ac.uk/242/ Use policy The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal

Wednesday, May 6, 2020

The Civilization Of Ancient Rome - 1366 Words

The Civilization of Ancient Rome and The Time of the Kings, From Republic to Empire: Romulus and Remus, the Etruscans, the Greeks and early influences HST 101 Spring 2015 Lance Raebel Pima Community College West Campus Tucson, Arizona Table of Contents Introduction I. Romulus And Remus founding story a. Twin brothers i. Considered to be half gods ii. Rasied by a she wolf b. Father the god of war i. Rapes Rhea Silvia their mother c. Find Rome i. Romulus then kills Remus for leadership II. The Time of The Kings a. Real founders of Rome was a tribe called the Latins i. Rome’s position on the Tiber was very advantageous ii. Only Trading ships could navigate the river no fleets. iii. They could only go as far as Rome but no further iv. Served as a commercial port safe from attacks b. Had a Patriarchal King who exercised power check by the elders. III. Greeks a. Romans got there alphabet from the greeks i. As well as architecture and art forms IV. Etruscans a. Got their influences from the greeks i. Changed their ways to suit their own needs and way of life ii. Were open to women having a sense of leadership or power V. From Republic To Empire a. War and agriculture remained the chef occupations for romans for 2 centuries b. This changed in 265 BCE after completing the absorption of Etruscan i. Started wars over seas ii. Empire starts to form Conclusion To the Romans their vast and great accomplishments of their empire meant that they were chosen toShow MoreRelatedThe Civilization Of Ancient Rome1595 Words   |  7 Pages The civilization of Ancient Rome thrived from the sixth century BC to the fifth century AD. The Roman Empire was the second empire to conquer most of the Mediterranean Sea basin, the first being the Ancient Greeks. After taking over the former Greek Empire, the Romans assimilated many aspects of Greek culture into their own, including the Greek Architecture. The main attributions to Ancient Roman architecture are cement, the arch, the vault, the dome and centralized road systems. The RomanRead MoreAncient Civilizations Of Greece And Rome1436 Words   |  6 Pagesshape. Unlike other member of the Dracaenaceae family the Dracaena cinnabari produces a red resin from the bark after wounding. The medicinal and coloring properties of this resin, along with other dragon trees, was recorded by the ancient civilizations of Greece and Rome. Today, it continues to be used in medicines, dyes, varnish and incense all over the world. Dracaena cinnabari belongs to the Plantae Kingdom. Its Phylum is Tracheophyta, its class is Liliopsida, its Order is Liliales, its FamilyRead MoreAncient Rome : The Ruins Of A Unique Civilization1536 Words   |  7 PagesAncient Rome Set atop seven mighty hills stands the ruins of a unique civilization. A powerful empire that grew from the fertile fields, and pleasant weather of the Italian Peninsula resided on this land. Ancient Rome was truly one of the most powerful and significant civilizations from history. Known to be found by the myth of Romulus and Remus, Rome offered many advancements (or wonders) to the modern world, such as the famous style of government -the republic- or the infamous architecture ofRead MoreClassical Civilizations of Ancient Greece, Rome, and China Essay897 Words   |  4 PagesThroughout history, there have been many civilizations, empires, colonies, and tribes that have impacted the world. The civilizations of Greece, Rome, and China have done this, but what sets them apart from the others is their lasting significance and lasting impact they had on the world. For this reason, they are considered classical civilizations. To describe how Greece, Rome, and Han China are classical, t here are three systems that are used; these are Economic, Social, and Political. OutRead More Contributions to Western Civilization Made by Ancient Greece and Rome2004 Words   |  9 PagesThe ancient Greeks and Romans were perhaps two of the greatest civilizations of the ancient world. These two civilizations thrived in their ancient environments which eventually led to a vast amount of prosperity within these two cultures. It is because of this prosperity that these ancient cultures were able to make a variety of advancements in literature, architecture, art and a variety of other fields. These two civilizations also produced some of the ancient world’s greatest writers, leadersRead MoreGreek And Roman Civilizations : Greece And Ancient Civilizations1498 Words   |  6 Pages Greek and Roman Civilizations In examining the impact that the ancient world has had on modern Western civilization, the two ancient civilizations which are frequently understood as having had the greatest influence are Ancient Greece and Ancient Rome. These two civilizations would eventually come to shape much of what would become the modern European culture, politics and society, and by extension, a vast proportion of global culture and society. In examining the trajectory of modern historyRead MoreGreek And Roman Civilizations : Greece And Ancient Civilizations1503 Words   |  7 Pages Greek and Roman Civilizations In examining the impact that the ancient world has had on modern Western civilization, the two ancient civilizations which are frequently understood as having had the greatest influence are Ancient Greece and Ancient Rome. These two civilizations would eventually come to shape much of what would become the modern European culture, politics and society, and by extension, a vast proportion of global culture and society. In scrutinizing the trajectory of modern historyRead MoreAncient Rome And Ancient China939 Words   |  4 PagesAncient Rome and Ancient China were two different civilizations with very different yet very similar ways of life. Culture, religion, and more importantly, politics, helped make life the way it was for those who lived in ancient rome and ancient china. Politics were what made everything function, just as it does today. Politics is what was responsible for the wars that took place between civilizations, and why dynasty’s fell and why new ones rose ri ght after. Politics were the backbone holding upRead MoreSlavery in Ancient Roman Society1301 Words   |  5 Pagesï » ¿Unfortunately, Western Civilization includes many instances of social, political, and economic oppression. When most people now think of slavery, they think of the United States because that memory is relatively new and culturally relevant to Americans. However, slavery existed in many other cultures and times across the world. Understanding the nature of slavery is integral to an understanding of Western Civilization in general. Ancient Rome practiced slavery throughout much of the Empire, andRead MoreAncient Roman Civilization And Modern Times936 Words   |  4 PagesThe ancient Roman civilization had many enduring contributions to modern times. Many of the ancient structures survived the ravages of time. This leads the modern tourist to experience the ancient civilization through much of what Ancient Rome’s engineers enduring achievements, namely, te mples, baths, aqueducts and roads (Temin, The economy of the early Roman Empire, 2006). Beyond the physical structures that survived the millennia, there are numerous modern cultural influences that are readily

The Criminal Justice System An Introduction - 1652 Words

This report will critically review The Criminal Justice System: An Introduction (2008) by Bryan Gibson, Paul Cavadino and David Faulkner. It will identify key themes in the book and discuss how it contributes to the understanding of the criminal justice system in England and Wales. First published in 1995 by three highly regarded members of the criminal justice system (Bryan Gibson is a barrister, Paul Cavadino is chief executive of NACRO and David Faulkner is senior research fellow at the Centre for Criminological Research, Oxford University) and subsequently revised, the authors clearly state the primary aim of the book is to focus on the everyday events which occur from the discovery of an offence until such time when the case comes to a natural conclusion. Furthermore it gives a brief overview of the different constituent parts of the criminal justice system and key processes and practitioners involved in it with more detail being offered in later chapters. Included in the book are two introductory chapters offering the reader a definition of the term criminal justice – â€Å"the chain of events, activities, tasks or functions that constitute the official response to perceived problems of law and order.† (2008:1:9). Chapter 1 gives an overview of the criminal justice system while chapter 2 briefly considers more general matters such as the reasons behind decisions at varying stages in the proceedings, the law on double jeopardy and the recording and reporting of crime.Show MoreRelatedCriminology : Crime And Crime1410 Words   |  6 PagesCriminology is defined by the book Criminal Justice: A Brief Introduction, which was written by author Dr. Frank Schmalleger, Ph.D., as â€Å"the scientific study of the causes and prevention of crime and the rehabilitation and punishment of offenders† (Schmalleger, 2006, p. 20). People look at criminology in a big concept of criminal prevention but criminology in itself carries a wide variety of functions in treating crime and providing punishment to those who commit crimes. Crime increases when theRead MoreThe Wedding Cake Model of the Criminal Jusice System1303 Words   |  6 Pagesopinions about the criminal justices system from the media. But how true are these images of justice? Developing the criminal justice system Introduction--London Metropolitan Police was the first police agency and was developed in 1829. The first police agencies in the United States were in Boston (1838), New York (1844); and Philadelphia (1854). Criminal justice system was first recognized in 1919, by the Chicago crime commission. The modern era of justice Modern era of justice can be traced toRead MoreExpository Essay : The Criminal Justice Department1081 Words   |  5 PagesCampbell English 101-I November 18 2015 Expository essay on college major Introduction The Criminal Justice Department provides educational opportunities to help gain skills and knowledge in the areas of criminal delinquent process, criminology, and corrections while evaluating moral and ethical issue of public servants. As a student at Chowan University my career path is law enforcement. I stride to obtain a Criminal Justice, Law Enforcement Track, B.S degree, obtaining this degree will prepareRead MoreExclusionary Rule Evaluation Essay1122 Words   |  5 PagesExclusionary Rule Evaluation Criminal Procedure/CJA 364 University of Phoenix Exclusionary Rule Evaluation The exclusionary rule is an important doctrine supporting the ideals of the Fourth Amendment of the United States Constitution. The Fourth Amendment provides people under the jurisdiction of the American criminal justice system protections from unreasonable searches and seizures. The amendment also delineates the methods members of the criminal justice system may obtain information viaRead MoreJustice Systems in Egypt and in the United States Essay680 Words   |  3 PagesJustice System in Egypt and the United States Brian L. Goodman Daymar College Outline Abstract Introduction III. The Legal Systems A. The United States Legal System B. The Egypt Legal System IV. Types of Crimes V. Components of Justice System in the United States VI. Components of Justice System in Egypt VII. Crimes A. United States B. Egypt VIII. Notes IX. References Abstract Justice System in Egypt and the United States are similarRead MoreWhy Do We Need a Criminal Justice System?1140 Words   |  5 PagesIntroduction It is not always clear why a criminal justice system is needed or indeed what it contributes to the functioning of a society. In the discussion that will follow, it will be argued that there are essentially four reasons why we do need to have a criminal justice system. First, it upholds the freedoms of individuals and maintenance of public order. Second, a criminal justice system instils fear in people and thus deterring illegal activities. Third, a good justice system providesRead MoreCriminal Justice and Leading U.S. Supreme Court Cases, Annotated Bibliography1035 Words   |  5 PagesAnnotated Bibliography Champion, D.J. (2009). Leading U.S. supreme court cases in criminal justice: Briefs and key terms. Upper Saddle river, NJ: Prentice Hall. Leading U.S. supreme court cases in criminal justice: Briefs and key terms is a source reference with respect to criminal law, constitutional law, and criminal procedure. The major focus of this book includes explained mandates of over 1000 U.S. Supreme Court cases and this book details key terms and definitions. Grant, H.B. and Terry,Read MoreThe Issues Of The Criminal Justice System1526 Words   |  7 PagesINTRODUCTION The realities and everyday necessities in Indigenous communities seem concealed and compromised in the enduring Indigenous criminal law discourse which is framed by issues throughout history, jurisdictions, prisons, courts and the criminal justice system. Whilst today’s intergeneration effects of poverty and the loss of autonomy fuel Indigenous disadvantage, the criminal law institution is another contributor which vividly displays disadvantages and barriers which preclude IndigenousRead More The Justice System Essay1352 Words   |  6 PagesThe Justice System Looking into criminal justice procedure, many administrations are at work. Starting with the police, to the courts and concluding in corrections. Though all these sectors have different tasks, their combined focus is processing the law. Regardless what the process is called criminal justice will continue to serve with discretion, conviction, and correction. When first presented with the question whether criminal justice is a system, non-system, and network I leaned toward aRead MoreExplore the reasons why victim participation creates tension and conflict in the contemporary criminal justice system.1374 Words   |  6 PagesLiterature Review Explore the reasons why victim participation creates tension and conflict in the contemporary criminal justice system. Introduction The purpose of this literature review is to explore the impact of victim statements in the contemporary criminal justice system and observe how it can create tension and conflict in the courtroom between the victim, and the courts process itself. There are two pieces of literature used as the focal point of this review, they are; Tracey Booth’s

Kalimunda Hakim Internship Report 2012 Free Essays

string(54) " routing in electronic data networks using packet II\." 1 INTERNSHIP REPORT MTN RWANDA PO BOX 264 BY Kalimunda Hakim Student At RTUC Bachelor In Business Information Technologies _____________________ SUPERVISED BY Aymard Mbonabucya Information Network Security Administrator _____________________ FROM 26 November, 2012 TO 15 January, 2013 INTERNSHIP REPORT 2 ACKNOWLEDGEMENT I am deeply intended to almighty God who has protected me through the whole period of internship. My special thanks are addressed to the MTN RWANDA administration for giving me such opportunity of passing an internship in their company, My sincere acknowledgement go to the Human resource Director Merry Assimwe for their acceptance of my intern . Thank you for all. We will write a custom essay sample on Kalimunda Hakim Internship Report 2012 or any similar topic only for you Order Now I am grateful to my Supervisor Aymard MBONABUCYA for being a best man I have ever known and his modesty, encouragement and understanding s on all my daily questions and answer it because of his spiritual and technical support; I used to became free to ask any question regarding network because he is very good at networking, may thanks be given to him. I finally thank all MTN staff in technology department for their good collaboration during this very important internship. INTERNSHIP REPORT 3 PREFACE The purpose of this report is to fulfill the internship requirement for the Bachelor degree in Business Information Technology program at Rwanda Tourism University College ; to till 15 January, 2013) with a private organizations in Rwanda called MTN RWANDA. successes and short. explain what I did achieved and learned during my internship period (26 November, 2012 The report focuses primarily on intern’s duties and responsibilities, internship results, its INTERNSHIP REPORT 4 About MTN Rwanda MTN is a global communications company and world-class cellular network. empowerment. As a major communications company, MTN is specifically focused on the Africa and the Middle East. We believe that through access to communication comes economic Serving you since 1998, MTN Rwanda continues to expand its network, offer new and innovative packages and services and keep up with the latest trends in communications while maintaining affordability. MTN Mobile Money has transacted over US$36 million Bulk Payment Services. MTN Rwanda has over 2. 9 million subscribers and its network coverage extends to over 98% of the population. ince its launch in 2010. The payment platform is now offering Cash Power Top-up and INTERNSHIP REPORT 5 ACKNOWLEDGEMENT PREFACE. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 BACKGROUND OF COMPANY. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 CHAPTER I. INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. 1. OVERVIEW OF SWITCHING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. II. 1. OVERVIEW OF ROUTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. II. 2. CONCEPTS OF ROUTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ?II. 2. CONCEPTS OF SWITCHING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. TABLE OF CONTENTS TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦3 CHAPTER II. PRESENATION ON SWITCHING AND ROUTING CONCEPTS AND CONFIG URATION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. 3. SOME CONFIGURATION OF SWITCHING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. II. II. 3. SOME CONFIGURATION OF ROUTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. III. NETWORK LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. III. 2. CISCO HIERARCHIAL LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. III. 3. CORE LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ II. III. 4. DISTRIBUTION LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. III. 5. ACCESS LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. III. 1. OVERVIEW OF NETWORK LAYER†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. II. IV. NETWORK DESIGN CONCEPT †¦. II. IV. 1. THEORIES ON NETWORK DESIGN†¦Ã¢â‚¬ ¦ II. IV. 4 SWITCH PASSWORD RECOVERY II. IV. 2. OVERVIEW ON VIRTUAL LOCAL AREA NETWORK (VLAN) II. IV. 5. FIREWALL PASSWORD RECOVERY II. IV. 3. ROUTER PASSWORD RECOVERY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. INTERNSHIP REPORT 6 INTERNSHIP REPORT 7 Chapter 2. Presentation on switching, routing concepts and configuration II. 1. OVERVIEW OF SWITCH What is switching? Networking concept has two basic concepts and they are Switching and Routing . They using one of these methods. are fundamental concepts in Networking ,other topics like network security are based on these concept. Routing and Switching are the base packet or data delivering methods in When we are talking about the switching ,the protocols and concepts are related to the layer 2 and data packets with in this layer that are called frame . re bigger and bigger and also more expensive. 10base5, 10base-T for cabling were used . . Better switches have more choices than 2 condition and because of this capacity, they In Networking there is a long history for switches. At first time the direct connection network and each device like router , switch , hub , firewall , proxy , cash server, modem are As you know the switch refers to the de vice that can select one condition from 2 or more conditions . For example an electrical switch can select 0 as turn off and select 1 for turn on between to or more computer used to make a network and such technology like 10base2, In those technologies , the base topology was BUS Technology and the most advanced of more devices for sending and receiving data , and when a device wants to send data for figure below we can see a logical view to a hub and the meaning of bus . II. 2. CONCEPTS OF SWITCHING this technology is HUB. A bus or data bus refers to the one link(shared link) between 2 or another device ,this bus should be empty and none of devices should not use the bus . In INTERNSHIP REPORT FIGURE 1: SWITCH II. 3. SOME CONFIGURATION OF SWITCHING Command switch? switchenable switch# switch#disable switchexit switch#show version switch#show flash: switch#show mac-addresstable switch#show running-config switch#show startup-config switch#show vlan switch#show interfaces switch#show interface vlan1 descriptions The ? works here the same as in a r outer Used to get the list of all available commands User mode, same as a router Privileged mode Leaves privileged mode Leaves user mode Displays information about software and hardware. Displays information about flash memory (will work only for the 2900/2950 series). Displays the current MAC address forwarding table . Displays the current configuration in DRAM. Displays the current configuration in NVRAM. Displays the current VLAN configuration. Displays the interface configuration and status of line: up/up, up/down, admin down. Displays setting of virtual interface VLAN 1, the default VLAN on the switch. INTERNSHIP REPORT 9 II. II. 1. OVERVIEW OF ROUTING is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (circuit switching technology. Routers switching), electronic data networks (such as the Internet), and transportation networks. This article is concerned primarily with routing in electronic data networks using packet II. You read "Kalimunda Hakim Internship Report 2012" in category "Papers" II. 2. CONCEPTS OF ROUTING Whereas switches and bridges operate at OSI Layer 2 (the data link layer), routers primarily operate at OSI Layer 3 (the network layer). Like bridging, make the forwarding decisions. Routers make decisions based on network layer protocols such as Internet Protocol (IP) and Novell NetWare Internetwork Packet Exchange (IPX). growing beyond the capability of bridges. Before this popularity, networ he primary act of routing involves moving packets across a network from a source to a destination. The difference involves the information that is used to Routing gained popularity in the mid- to late 1980s as a result of internetworks Figure 2: Image of Router II. II. 3. SOME CONFIGURATION OF ROUTING modes, and the resulting prompts. The prompt helps you identify which mode you are in and, therefore, which commands are available to you: Mode of Operation Usage Mode How to Enter the Prompt The following table describes some of the most commonly used modes, how to enter the INTERNSHIP REPORT 10 User EXEC Change terminal settings on a temporary basis, perform basic tests, and list system information. First level accessed. Router Privileged EXEC Global Config System administration, set operating parameters. Modify configuration that affect the system as a whole. Modify the operation of an interface. Create the initial configuration. From user EXEC mode, enter enable password command Interface Config Setup From privileged EXEC, enter configure terminal. From global mode, enter interface type number. Router# Router(config)# Router(config-if)# Prompted dialog From privileged EXEC mode, enter command setup. User EXEC Mode: When you are connected to the router, you are started in user EXEC mode. The user EXEC commands are a subset of the privileged EXEC commands. Privileged EXEC Mode: Privileged commands include the following: †¢ Configure – Changes the software configuration. Enter the command disable to exit from the privileged EXEC mode and return to user EXEC mode. †¢ Debug – Display process and hardware event messages. †¢ Setup – Enter configuration information at the prompts. INTERNSHIP REPORT 11 Configuration Mode Configuration mode has a set of submodes that you use for modifying interface settings, routing protocol settings, line settings, and so forth. Use caution with configuration mode because all changes you enter take effect immediately. Note: To enter configuration mode, enter the command configure terminal and exit by pressing Ctrl-Z. Almost every configuration command also has a no form. In general, use the no form to disable a feature or function. Use the command without the keyword no to re-enable a disabled feature or to enable a feature that is disabled by default. For example, IP routing is enabled by default. To disable IP routing, enter the no ip routing command and enter ip routing to re-enable it. INTERNSHIP REPORT 12 Getting Help In any command mode, you can get a list of available commands by entering a question mark (? ). To obtain a list of commands that begin with a particular character sequence, type in those characters followed immediately by the question mark (? ). Router#co? configure connect copy Router? To list keywords or arguments, enter a question mark in place of a keyword or argument. Include a space before the question mark. Router#configure ? memory Configure from NV memory network Configure from a TFTP network host terminal Configure from the terminal You can also abbreviate commands and keywords by entering just enough characters to make the command unique from other commands. For example, you can abbreviate the show command to sh. INTERNSHIP REPORT 13 Configuration Files Any time you make changes to the router configuration, you must save the changes to memory because if you do not they will be lost if there is a system reload or power outage. There are two types of configuration files: the running (current operating) configuration and the startup configuration. Use the following privileged mode commands to work with configuration files. show running-config – display the running configuration. †¢ show startup-config – display the startup configuration. †¢ configure terminal – modify the running configuration manually from the terminal. †¢ copy running-config startup-config – copy the running configuration to the startup configuration. †¢ copy startup-config running-config – copy the startup configuration to the running configuration. †¢ erase startup-config – erase the startup-configuration in NVRAM. †¢ copy tftp running-config – load a configuration file stored on a Trivial File Transfer Protocol (TFTP) server into the running configuration. copy running-config tftp – store the running configuration on a TFTP server. INTERNSHIP REPORT 14 IP Address Configuration Take the following steps to configure the IP address of an interface. Step 1: Enter privileged EXEC mode: Routerenable password Router#config terminal Example: Example, Step 2: Enter the configure terminal command to enter global configuration mode. Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for Cisco 2500 series) to enter the interface configuration mode. Step 4: Enter the IP address and subnet mask of the interface using the ip address ipaddress subnetmask command. Step 5: Exit the configuration mode by pressing Ctrl-Z Router(config-if)#[Ctrl-Z Router (config-if)#ip address 192. 168. 10. 1 255. 255. 255. 0 Router (config)#interface ethernet 0/1 II. III. NETWORK LAYER II. III. 1. OVERVIEW OF NETWORK LAYER INTERNSHIP REPORT II. III. 2. CISCO HIERARCHIAL LAYER 15 Hierarchy has many of the same benefits in network design that it does in other areas of life. When used properly, it makes networks more predictable. It helps us define at which levels of hierarchy we should perform certain functions. Likewise, you can use tools such as access lists at certain levels in hierarchical networks and avoid them at others. large networks can be extremely complicated, with multiple protocols, detailed configurations, and diverse technologies. Hierarchy helps us summarize a complex collection of details into an understandable model. Then, as specific configurations are needed, the model dictates the appropriate manner to apply them. The Cisco hierarchical model can help you design, implement, and maintain a scalable, reliable, cost-effective hierarchical internetwork. The following are the three layers: ? ? ? FIGURE 3 : CISCONHIERARCHIAL Each layer has specific responsibilities. However, that the three layers are logical and are not necessarily physical devices. Consider the OSI model, another logical hierarchy. The seven layers describe functions but not necessarily protocols. Now, let’s take a closer look at each of the layers. II. III. 3. CORE LAYER the core layer is responsible for transporting large amounts of data quickly The Core layer or Backbone The Distribution layer The Access layer and reliably. The designer must ensure that the core layer is designed with fault tolerance, especially because all users in the network can be affected by a failure. The ability to avoid unnecessary delays INTERNSHIP REPORT in network traffic quickly becomes a top priority for the network designer. What Happens at the Core Layer? 16 The core layer is sometimes called the network backbone. Routers and switches at the core layer provide high-speed connectivity. In an enterprise LAN, the core layer, shown in Figure 1-7, may connect multiple buildings or multiple sites, and may provide connectivity to the server farm. Goals of the Core Layer The core layer design enables the efficient, high-speed transfer of data between one section of the network and another. The primary design goals at the core layer are as follows: – Provide 100% uptime. -Maximize throughput. -Facilitate network growth. Core Layer Technologies Technologies used at the core layer include the following: – Routers or multilayer switches that combine routing and switching in the same device -Redundancy and load balancing – High-speed and aggregate links II. III. 4. DISTRIBUTION LAYER The distribution layer is sometimes referred to as the workgroup layer and is the major communication point between the access layer and the core. The primary function of the distribution layer is to provide routing, filtering, and WAN access and to determine how packets can access the core, if needed. The distribution layer must determine the fastest way that network service requests are handled; for example, how a file request is forwarded to a server. After the distribution layer determines the best path, it forwards the request to the core layer. The core layer then quickly transports the request to the correct service. II. III. 5. ACCESS LAYER The access layer controls user and workgroup access to internetwork resources. The access layer is sometimes referred to as the desktop layer. The network resources most users need will be available locally. The distribution layer handles any traffic for remote services. INTERNSHIP REPORT The following are some of the functions to be included at the access layer: ? ? ? 17 Technologies such as DDR and Ethernet switching are frequently seen in the access layer. Static routing is seen here as well. As already noted, three separate levels does not imply three separate routers. It could be fewer, or it could be more. Remember, this is a layered approach. II. IV. NETWORK DESIGN CONCEPT My second part of my internship dealt with network design concept. In this I have been able to read different theories of network design from eBooks downloaded from the internet, doing exercises on subnetting, VLSM and VLANs and finally I had opportunity to do some practices on network documentation and laboratories on virtual LAN. II. IV. 1. THEORIES ON NETWORK DESIGN Designing a network for a better performance of data access and resource sharing of any institution is an extremely important thing to consider. I learned different concept of designing a network whether by reading eBooks or discussing it with my supervisor. A good network design is composed of four parts in general: Continued access control and policies Creation of separate collision domains Workgroup connectivity into the distribution layer through layer 2 switching Identification of customer’s needs and goals: In this part you deal with identifying business goals and technical requirements which include the task of characterizing the existing network, analysis of the network traffic. Logical network design: Here, it’s all about developing a network topology. During this phase, you devise a network layer addressing model, and selects switching and routing protocols. It also includes security planning, network management design. Finally you make a study of the service provider on how he can meet your WAN and remote access requirements Physical network design: The physical design phase deals with specific technologies and products to realize the logical design. It starts with the selection of technologies and devices for campus networks that includes cabling, Ethernet switches, wireless access points, wireless bridges, and routers. There is also a selection of technologies and devices for remote-access and WAN needs. INTERNSHIP REPORT Testing, Optimizing and Documentation: The final step is to write and implement a test plan, build a prototype or pilot, optimize the network design, and document your work with a network design proposal. If your test results indicate any performance problems, then during this phase you have to update your design to include such optimization features. 18 In all this different network design steps, I have been able to do some practices on logical network design where I did exercises on subnetting, VLAN as network management requires it. II. IV. 2. OVERVIEW VIRTUAL LOCAL AREA NETWORK (VLAN) Definition A VLAN (Virtual Local Network) is a logically separate IP subnetwork. VLANs allow multiple IP networks and subnets to exist on the same-switched network. A VLAN is a logical broadcast domain that can span multiple physical LAN segments. It allows an administrator to group together stations by logical function. A VLAN has three major functions: i. Limits the size of broadcast domains ii. Improves network performance ii. Provides a level of security Security – Security of sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches. Advantages of VLAN: Higher performance – Division of Layer 2 networks into multiple logical workgroups (broadcast domains) reduces unnecessary traffic on the network and boosts performance. Cost reduction – Cost savings result from less need for expensive network upgrades and more on this network. Types of VLAN There are different types of VLANs. The type of network traffic they carry defines a particular type of VLAN and others INTERNSHIP REPORT 9 names due to the type or a specific function the VLAN performs. The following describes common VLAN: Default VLAN At the initial boot up of the switch, All switch ports become a member of the default VLAN, which makes them all part of the same broadcast domain. This allows any network device connected to any of the switch port to communicate with other devices on other switch po rts. On Cisco switches the default VLAN is VLAN 1. VLAN 1 has all the features of any VLAN, except that you cannot rename or delete it. Data VLAN A data VLAN that can also be referred to as user VLAN. This is configured to carry only usergenerated traffic. The importance of separating user data from other type of VLAN is proper switch management and control. Native VLAN A native VLAN is assigned to trunk port. An trunk port supports traffic coming from many VLANs as well as traffic that do not come from a VLAN. The trunk port places untagged traffic (traffic that does not come from a VLAN) on the native VLAN. In summary, the native VLAN observes and identifies traffic coming from each end of a trunk link. Management VLAN A management VLAN is any VLAN you configure to access the management capabilities of a switch. Your configured management VLAN is to be assign with an IP address and subnet mask. Any of a switch VLAN could be configured as the management VLAN if you has not configured or define a unique VLAN to serve as the management VLAN. In some cases, a network administrator proactively defines VLAN 1 as the management VLAN; this enables a loophole for an unauthorized connection to a switch. Voice VLAN Voice VLAN is configured to carry voice traffic. Voice VLANs are mostly given transmission priority over other types of network traffic. Communication over the network is not complete without phone calls. More calls are made over the network than other forms of a message transmission. Sending emails and text messages are also forms of inter-relations but listening to a real voice provides legitimacy and assurance. SOME EXAMPLE OF VLAN INTERNSHIP REPORT There I was design a network that are composed with 1 router ,2 switch ,6machine. 20 And each switch have 3 computer . one switch to three machine . on the network we have default vlan ,native vlan ,management vlan. Management vlan can control other machine on network. this network have the vlan and trunk . e have design it by using a outils that called packet tracer FIGURE 4: DESIGN OF A NETWORK Example of same machine i ping Machine ip 196. 168. 40. 105 are pinging a switch3 ip address 196. 168. 40. 106 INTERNSHIP REPORT 21 FIGURE 5 : Command Prompt INTERNSHIP REPORT 22 II. IV. 3. ROUTER PASSWORD RECOVERY 1. Connect the router to the PC using a console cable/port. 2. Open an emulation software (Hyper Terminal or Terra Term or Secure C RT, Putty) + setup (Com port and bits=9600, etc. ) 3. Switch on the router HOLDING DOWN CTRL + BREAK (keys) a. The router will boot and display the ROMMON prompt (Rommon;) 4. Type the CONFREG command to view current status 5. Change the configuration register (this is a hexadecimal number that tells the IOS where to fetch the configuration file. 0x142 bypasses the NVRAM contents, 0x2102 gets the configuration file from the NVRAM) a. Rommon;confreg 0x142 b. Reset (reboot i. e. power-cycle the router) The router will boot in normal but asking for a new configuration. 6. Router; (after saying NO to the configuration wizard) 7. Go to privilege mode (enable) and copy the startup-config to the running-config (Router#copy startup-config running-config). This will load the configuration with an unkown password back to RAM). 8. As you are already in privilege, the unkown password won’t prevent you from changing the configuration. You can now change the privilege password (LAB#config t ; LAB(config)#enable secret cisco). Also change the console and vty passwords. 9. Change the configuration register back to 0x2102 (LAB(config)# config-register 0x2102) then reload (in privilege mode). 10. Save your configuration. (LAB#copy running-config startup-config or write memory ~ wr) INTERNSHIP REPORT How to cite Kalimunda Hakim Internship Report 2012, Papers

Food & Nutrition-Free-Samples for Students-Myassignmenthelp.com

Question: Discuss about the Food and Nutrition. Answer: From the past studies, I have observed that the guidelines of the Brazilian dietary ensures our understanding of the workers that will be crucial regard to the dissemination of the capacity building trainers, as well as other professionals. The ten basics step that I have observed contains the healthy diet plan of the Brazilian dietary guideline. The step one involves the making the natural or minimally processed food based on the diet of the individual (Monteiro et al., 2015). The second step involves the usage of minimal amount of oil, fats and seasoning in cooking. The third step involves the limited consumption of the processed food. The fourth step involves the avoiding the consumption of the ultra processed food. The fifth step includes the regular eating in careful and appropriate manner. The sixth step involves shopping in the places that offers the variety of naturally processed food (Pereira et al., 2014). The seventh step involves the developing of cooking skills and the eight steps involve the planning of the time of each meal. The last two steps involve the eating from healthy food joints and keep oneself away from the advertized market junk food (Pereira et al., 2014). On the contrary, I have observed several guidelines that the Australian population needs to be maintained for the proper health of the people (McClave et al., 2016). The first guideline according to me involves maintaining the proper body weight of the individuals through regular physical activities and choosing of the right amount of the food that are nutritious (Desbrow et al., 2016). The second guideline involves that every individual should consume different types of fruits and vegetables on a daily basis. The third guideline involves the controlling the consumption of food that have saturated fat and added salt in it McClave et al., 2016). The last guideline I think involves the encouragement of breastfeeding and the last guideline promotes the care for food and storing it in a safe place. References Desbrow, B., McCormack, J., Burke, L. M., Cox, G. R., Fallon, K., Hislop, M., ... Star, A. (2014). Sports Dietitians Australia position statement: sports nutrition for the adolescent athlete.International journal of sport nutrition and exercise metabolism,24(5), 570-584. McClave, S. A., Taylor, B. E., Martindale, R. G., Warren, M. M., Johnson, D. R., Braunschweig, C., ... Gervasio, J. M. (2016). Guidelines for the provision and assessment of nutrition support therapy in the adult critically ill patient: Society of Critical Care Medicine (SCCM) and American Society for Parenteral and Enteral Nutrition (ASPEN).Journal of Parenteral and Enteral Nutrition,40(2), 159-211. Monteiro, C. A., Cannon, G., Moubarac, J. C., Martins, A. P. B., Martins, C. A., Garzillo, J., ... Levy, R. B. (2015). Dietary guidelines to nourish humanity and the planet in the twenty-first century. A blueprint from Brazil.Public health nutrition,18(13), 2311-2322. Pereira, R. A., Souza, A. M., Duffey, K. J., Sichieri, R., Popkin, B. M. (2015). Beverage consumption in Brazil: results from the first National Dietary Survey.Public health nutrition,18(7), 1164-1172.