Friday, August 21, 2020

Front end of General Motors company Case Study Example | Topics and Well Written Essays - 750 words

Front finish of General Motors organization - Case Study Example The apparatuses utilized in the examination incorporate prevailing monetary highlights, main impetus investigation, key gathering guide, PESTLE and serious investigation system. The fundamental issue being talked about is on item unwavering quality dependent on the items and buyer discernment. The organization has issues with quality affirmation and absence of value control framework. As per the customer reports of 2009, there were various reviews of GM items because of unwavering quality. In this way, the paper thinks of three choices to check the issue on dependability. The principal choice to control the issue is thinking of a robotized checking system that will check any product’s deformity. The option is significant in light of the fact that it will guarantee that no imperfections goes unchecked (General Motors, 1980). A portion of the imperfections that the robotization procedure will check incorporates deficiencies with safety belts, brakes, and other significant regions. Then again, the option however accommodating is over the top expensive and requires a ton of structures and funding to set up. Another choice to check the issues on quality control is that the organization need to set up ensured evaluators who will complete arbitrary and regular determine the status of the company’s item. The examiner need to think of routine reports on the assembling procedure and the gear utilized during the procedure. The benefit of this option is that the organization will ensure that their quality control frameworks are cutting-edge and proficient. One of the cons of this option is that there are propensities that the organization may overlook the reports and proposals from the guaranteed evaluator. Refering to claims that the proposals are costly to actualize (General Motors, 1981). The third choice to check the issue is reviewing all the vehicles that have default issues. Reviewing the vehicle will guarantee that the organization expands quality control issues. Reviewing the vehicle will give the

Tuesday, July 14, 2020

PTSD and Eating Disorders How Are They Treated

PTSD and Eating Disorders How Are They Treated Eating Disorders Print PTSD and Eating Disorders How Are They Treated When They Co-occur? By Lauren Muhlheim, PsyD, CEDS facebook twitter linkedin Lauren Muhlheim, PsyD, is a certified eating disorders expert and clinical psychologist who provides cognitive behavioral psychotherapy. Learn about our editorial policy Lauren Muhlheim, PsyD, CEDS Medically reviewed by Medically reviewed by Steven Gans, MD on August 16, 2018 Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital. Learn about our Medical Review Board Steven Gans, MD Updated on May 09, 2019 More in Eating Disorders Symptoms Treatment Diagnosis Awareness and Prevention In This Article Table of Contents Expand What Is PTSD? What Are Eating Disorders? What Is Trauma? How PTSD Relates to Trauma Eating Disorders and PTSD Psychological Treatment View All Back To Top Post-traumatic stress disorder (PTSD) and eating disorders often co-occur. People with eating disorders may have other mental health conditions, such as generalized anxiety disorder, social anxiety disorder, or obsessive-compulsive disorder (OCD). In fact, many individuals with eating disorders also have one or more anxiety disorders that often predate the eating disorder. What Is PTSD? Prior to the most recent edition of the Diagnostic and Statistical Manual of Mental Disorders, 5th Edition (DSM-5), PTSD was included in the Anxiety Disorders category of the DSM. In 2013, the diagnosis of PTSD was moved to a new category of disorders called Trauma- and Stressor-Related Disorders. A diagnosis of PTSD is made when a person experiences a traumatic event and then has great difficulty in the aftermath of that event. The traumatic incident continues to dominate their daily life. A PTSD diagnosis requires a person to have symptoms that can include upsetting and intrusive memories, nightmares, avoidance of reminders of the event, negative thoughts or feelings related to the event, difficulty concentrating, constant anxiety, and increased physiological arousal since the event. These symptoms must persist for a month or more. What Are Eating Disorders? Eating disorders are complex conditions that affect eating and can seriously impair health and social functioning. The most common eating disorders are: Binge-eating disorder (BED): Eating large amounts of food while feeling out of controlBulimia nervosa: Eating large amounts of food alternating with behaviors designed to counteract the impact of this eatingAnorexia nervosa: Eating insufficiently for one’s energy needs due to a fear of weight gain These are also the three types of eating disorders that have most often been studied in relation to PTSD. What Is Trauma? Trauma refers to a broad range of experiences. While initially eating disorders were often studied and believed to be linked to childhood sexual abuse, the definition of trauma has been broadened to include many other forms of victimization, including other childhood sources such as emotional abuse, emotional and physical neglect, teasing, and bullying, as well as adult experiences such as rape, sexual harassment, and assault. It also can include natural disasters, motor vehicle accidents, and combat. Unfortunately, traumatic events are relatively common. The majority of people in the U.S. will experience at least one traumatic event in their lifetime. How PTSD Relates to Trauma Anyone can develop PTSD at any age. Not every person who experiences trauma develops PTSDâ€"in fact, most people will manage to process a traumatic event and move on without developing the disorder. Others will exhibit some behaviors or transient symptoms of PTSD but never develop the disorder. Certain factors can increase a person’s likelihood of developing PTSD following traumaâ€"these can include the type of trauma, number of traumas experienced, prior problems with anxiety and depression, poor social support, and genetic predisposition. Eating Disorders and PTSD Trauma, including childhood sexual abuse, is a “nonspecific” risk factor for eating disordersâ€"nonspecific because it can also precede a number of other psychiatric disorders. In the U.S., the lifetime prevalence of PTSD is estimated to be at 6.4 percent. Rates of PTSD among people with eating disorders are less clear because there are few studies. What studies do exist show the following rates for lifetime PTSD: Women with bulimia nervosa: 37-40 percentWomen with BED: 21-26 percentWomen with anorexia nervosa: 16 percentMen with bulimia nervosa: 66 percentMen with BED: 24 percent Rates of PTSD are generally found to be higher in cases of eating disorders with symptoms of bingeing and purging, including the anorexia-binge/purge subtype. There are different theories regarding the higher incidence of PTSD among people with eating disorders. One theory is that the trauma directly affects body image or sense of self and leads a person to attempt to modify their body shape to avoid future harm. Another is that trauma exposure leads to emotional dysregulation (difficulty managing emotional reactions), which in turn can increase the risk for various types of psychopathology, including PTSD, borderline personality disorder, and substance use disorders. In this model, binge eating and purging are believed to be an attempt by the affected person to manage or numb their intense PTSD symptoms. When they succeed in doing so, the eating disorder behaviors are reinforced. Psychological Treatment In any case when multiple psychiatric conditions co-occur, treatment becomes more complicated. This can certainly be true with PTSD and eating disorders. An eating disorder patient with PTSD may have more difficulty trusting their provider or allowing others to dictate treatment. Treatment for eating disorders often involves accepting direction around eating, so an unwillingness on the part of a patient with PTSD to trust the caregiver can be problematic. There are few specific clinical guidelines for treating patients with both PTSD and eating disorders. Fortunately, there are effective treatments. Both PTSD and eating disorders can be successfully treated with cognitive-behavioral therapy (CBT), a treatment that focuses on understanding the relationship between thoughts, feelings, and behaviors. Psychotherapy is the leading treatment for PTSD. Some of the leading evidence-based therapies for PTSD include: Cognitive Processing Therapy (CPT) teaches how to reframe your maladaptive beliefs about the trauma.Prolonged Exposure Therapy (PE) teaches how to face feelings and involves talking about the trauma.Trauma-Focused CBT (TF-CBT) is designed for children and adolescents, and teaches how to understand, process, and cope with trauma.Eye Movement Desensitization and Reprocessing (EMDR) helps one to process and understand trauma while making guided eye movements. This treatment tends to be more controversial because it’s unclear whether the eye movements make any contribution to patients’ improvement above and beyond the associated exposure process. Psychotherapy is also the front-line treatment for eating disorders. Enhanced cognitive therapy (CBT-E) is the protocol with the greatest evidence for the treatment of adult eating disorders. It focuses on changing behaviors which in turn helps to challenge problematic thoughts. In the treatment of co-occurring eating disorders and PTSD, there is no consensus on whether treatment should be sequential (with eating disorder treatment first or PTSD treatment first), or concurrent/integrated (treatment for the eating disorder and PTSD provided at the same time). Get Treatment From the 9 Best Online Therapy Programs If a patient is medically unstable due to an eating disorder, the eating disorder should probably be treated first until those issues have improved. Sometimes, treating one condition can help make the treatment of the other condition more effective. For example, if a patient is using eating disorder behaviors to avoid negative feelings, PTSD exposure treatment may not be as effective. However, one of the problems with sequential treatment is that treating one disorder can sometimes worsen the other. This can cause a self-perpetuating cycle that prevents recovery from both disorders. If a patient with an eating disorder is confronting painful trauma memories, they may increase behaviors to avoid feeling the negative emotions, and this avoidance helps maintain their PTSD. By contrast, concurrent treatment can be effective at addressing both problems simultaneously, yet no integrated treatment protocol exists for PTSD and eating disorders. Another decision in treatment planning is which of the aforementioned evidence-based PTSD treatments should be used. Outcomes have been quite similar among the four treatments and no study has indicated which one might be most effective for people with both PTSD and eating disorders. Some professionals have pointed out that CPT may be the most closely aligned with CBT-E, so an integrated treatment could combine aspects of both of those. For patients with more problems with emotion dysregulation and high-risk behaviors, a form of dialectical behavior therapy (DBT), a protocol for treating PTSD, is DBT-PE. This treatment combines prolonged exposure with DBT. It is a new protocol and there are not yet any studies on DBT-PE with patients with eating disorders, but some professionals believe it could be a good option for patients with eating disorders and PTSD.   The following criteria have been suggested for patients with eating disorders on when to begin PTSD treatment: The patient indicates readiness.The patient is adequately nourished and can process information.The eating disorder symptoms are relatively under control.The patient demonstrates an adequate ability to tolerate negative feelings. Patients with PTSD and eating disorders should have a comprehensive assessment. Some patients may not feel comfortable revealing traumatic events early on in treatment, so assessment should be an ongoing process. Their therapist should develop a case formulation that helps them to understand the relationship between the eating disorder and PTSD, and can help guide when and in which order to address the different disorders. A Word From Verywell If you have symptoms of an eating disorder and also a history of trauma, know that you are not alone! It is important to seek help and to try to be open with your providers. While this can be scary, it can be an important first step in the recovery process.

Thursday, May 21, 2020

Why Many Americans Fail to Vote in Elections

Why dont more people  vote? Lets ask them. The California Voter Foundation (CVF) has released the results of a statewide survey on the attitudes of infrequent voters and citizens eligible to vote but not registered. The first-of-its-kind survey sheds new light on the incentives and barriers to voting, along with the sources of information that influence people when they do vote. Voter turnout is the percentage of eligible voters who cast a ballot in an election. Since the 1980s voter turnout has been decreasing steadily in the United States, as well as most other democratic countries worldwide. Political scientists generally attribute falling voter turnout to a combination of disillusionment, indifference, or a sense of futility – the feeling that an individual’s vote will not make a difference.   â€Å"For election officials and others working to maximize voter participation, these survey results provide clear direction on the messages most likely to get infrequent voters to participate in the upcoming election, and on the messages that will motivate more nonvoters to register,† stated the CVF, noting that there are 6.4 million Californians who are eligible but unregistered to vote. It Just Takes Too Long â€Å"Too long† is in the eye of the  waiter. Some people will stand in line for two days to buy the latest, greatest cell phone or concert tickets. But many of the same people will not wait 10 minutes to exercise their right to choose their government leaders. Besides, a 2014 GAO report suggests it doesn’t really take â€Å"too long† to vote. Just Too Busy The survey found that 28% of infrequent voters and 23% of those unregistered said they do not vote or do not register to vote because they are too busy. â€Å"This tells us that many Californians may benefit from more information about the time-saving advantages of early voting and voting by absentee ballot,† the CVF  said. Voter registration forms are available in post offices, libraries and the  Department of Motor Vehicle  offices in most states. The CVF said the survey’s findings might also benefit those campaigns trying to reach infrequent and new voters in advance of the election. The perception that politicians are controlled by special interests is widely shared among two-thirds of the survey’s respondents and represents a significant barrier to voter participation. A feeling that candidates don’t really speak to them was cited as the second leading reason why infrequent voters and nonvoters do not vote. Even Non-Voters Say Voting is Important Still, 93% of infrequent voters agreed that voting is an important part of being a good citizen and 81% of nonvoters agreed it is an important way to voice their opinions on issues that affect their families and communities. â€Å"Civic duty and self-expression provide strong incentives to get potential voters to the polls, despite pervasive cynicism about the influence of special interests,† said the organization. Family and Friends Encourage Others to Vote The survey found that family and friends influence how infrequent voters decide to vote as much as daily newspapers and TV news. Among infrequent voters, 65 percent said conversations with their families and local newspapers were influential sources of information when it comes to making voting decisions. Network TV news rated as influential among 64%, followed by cable TV news at 60%, and conversations with friends at 59%. For more than half of the infrequent voters surveyed, phone calls and door-to-door contact by political campaigns are not influential sources of information when deciding how to vote. The survey also found that family upbringing plays a strong role in determining voting habits as adults. 51% of nonvoters surveyed said they grew up in families that did not often discuss political issues and candidates. Who are the Non-Voters? The survey found that nonvoters are disproportionately young, single, less educated and more likely to be of an ethnic minority than infrequent and frequent voters. 40% of nonvoters are under 30 years old, compared to 29% of infrequent voters and 14% of frequent voters. Infrequent voters are much more likely to be married than nonvoters, with 50% of infrequent voters married compared to only 34% of nonvoters. 76% of nonvoters have less than a college degree, compared to 61% of infrequent voters and 50% of frequent voters. Among nonvoters, 54% are white or Caucasian compared to 60% of infrequent voters and 70% of frequent voters. Voter Turnout in 2018 Soared   On a positive note, voter turnout in November 2018 reached the highest level of any midterm election in over a century. According to the non-partisan, non-profit United States Elections Project, 49.3% of all eligible voters cast more than 116 million ballots nationwide. It was the best turnout since 1914 when 50.4% voted and surpassed the previous high turnout of 48.7% in 1966.   Better yet, 2018 reversed a troubling downward turnout trend. Turnout in the 2010 midterms was 41.8% before dropping to a miserable 36.7% in 2014—the lowest since 1942.   Of course, voter turnout in midterm elections will always lag far behind that of presidential election years. For example, in 2012, when President Obama was elected to his second term, the turnout was 58.6%. Turnout then jumped to 60.1% in 2016, when Republican Donald Trump defied the polls to be elected president over Democrat Hillary Clinton after an especially contentious campaign.

Wednesday, May 6, 2020

Book Report On The Dragons Table - 1912 Words

They were two days into their trip to the Dragon s Table when Chrom noticed a group of cacti he was sure they d passed before. He remembered, because it was near where they d set up camp for lunch the previous day and Sumia had nearly tripped into one. Robin, he said after a second, turning his head to look at the tactician, who was holding the map with an air of confidence, are we doubling back on our route? Hm? Robin looked up, peering into the endless desert as if he could tell one way from the other there. Of course not. It s just that I m sure we ve been this way before, he said, indicating the cacti--which, surely Robin would remember that too? Impossible, was the firm declaration. It s just a similar plant,†¦show more content†¦It s just...I think we...might be...lost? He hadn t actually seen Robin ever give someone a look like that, with the exception of someone he was about to draw a Thoron tome on. We are not lost. We have a map. He peered over at the map, and suddenly noticed something their mapping sessions at night times hadn t quite conveyed to him. ...Do you know where we are on the map? Silence. The temperature seemed to drop about fifteen degrees around them, which was actually rather refreshing. Of course I do, Robin said finally, the same frost in his tone. Feeling as though he was pointlessly jumping in front of a blow, Chrom plowed on recklessly. Do you know where the Dragon s Table is on the map? More silence. There was a very slight tinge of pink to Robin s cheeks now. Well... All right. Find the nearest village then. Chrom sighed. I had hoped to do this without alerting the Plegians in any way, but it looks like we ll need to ask directions. We don t need directions, was the immediate objection. We have a map. Is the Dragon s Table on the map? he asked warily. Of course it... Robin trailed off. That s not the point! We ll find it. Look, we don t need directions. How are we going to find it if we have no idea where it is? Chrom demanded. It s not even on the map, so we need directions. Do you trust the map, Chrom? What? At some point, he had become as lost as he knew they

Pythia (the Oracle of Delphi) Free Essays

Portrait of a Priestess By: Joan Breton Connelly The historical figure referred to as the â€Å"Oracle of Delphi,† in ancient writings by Aeschylus, Aristotle, Diogenes, Euripides, Herodotus, Plato, Plutarch, and Sophocles, was the â€Å"Pythia,† or â€Å"Priestess† of the temple of Apollo at Delphi; located in a cave on mount Parnassus, beneath the caspian Spring. The Pythia was a respectable position for a women among the ancient greeks. Several women were selected to succeed the position of Pythia over the span of the temples practice from 1,400 BC-393 A. We will write a custom essay sample on Pythia (the Oracle of Delphi) or any similar topic only for you Order Now D. I will be focussing on one in particular, whose experience changes the requirements of the position. The Pythia was known for her prophetic visions, said to to be inspired by the God Apollo. Ancient from all around Greece would travel to Delphi in hopes to hear a prophecy from the Pythia that be would be reflect favorable on their future. The myth was that the fumes from the Caspian Spring inspired her visions. Three male priests would accompany her, and interpret her hysterical, unintelligible babble to the visitors. Modern historians and scientists theorize that a hallucinogenic gas from a seismic crack in the mountain intoxicated her, and was the cause of her erratic behavior. However, scientist extensive scientific research has been performed on the location and been found contradictory and inconclusive on both sides. There is no documented procedure on how they selected the Pythia, but it is assumed that she was selected upon the death of her predecessor and chosen from a guild of priestesses. She was always a young, respectable virgin, native to the area. Once she was selected she had to leave her family, forfeit her personal identity, and sever all communication with those she’d previously known. The benefits were that she would receive monetary compensation, position, attend public events, and own her property. They also appeared to select women upon aptitude rather than position in society. One Pythia could be well education and aristocratic, and another could be from the working class. At the Height of the Temples popularity there were up to three Pythias in residents. They would alternate between sessions, because the activity left them exhausted and delirious. It was said that the Pythias life was shortened from the strenuous occupation. After an incident where a Pythias was been attacked and killed for giving unfavorable prophecies, they increased the number. The Pythia I’m choosing served in 300AD, she was attacked and raped in the temple. Upon this incident the priests were forced to make a decision on the policy of the requirements of a priestess, because she was no longer a virgin. They changed the policy which opened the opportunity up to married women as well. I would like to write about this incident, because she was not only violated, but in jeopardy of losing her job, being exiled, and possibly killed. Once a year the Pythia would undergo a cleansing ritual, where she would bathe in the Caspian Stream. The procedure was extremely detailed and strict. I think this would be an awesome incident to write my monologue about. The importance and specificity of the ritual makes it an important event in her life. Also bathing in the toxic spring could also present an interesting opportunity to intoxication, and visions. The Pythias personal life, (I can only imagine) was one of deep sadness and extortion. She may have had high hopes for the position, she may not have wanted to serve at all, but it was not a position that would be socially acceptable to refuse. Not only did she have to lose her family and her identity, but she had to forfeit any chance of getting married and having children. She was in a temple, that was essentially a converted cave, and constantly hyped up on hallucinogens. It was basically an ancient form of prostitution. The temple made money off of her â€Å"prophecies† while her mind and body was slowly destroyed from abuse. The danger of attack, rape and death were very real to her in everyday life. I can only imagine the state of her mind, and her misery. She was dealt a hand that appeared glamorous from the outside, but was misleading. The source of the Pythias visions remain a mystery, which I find both exciting and troubling. If it were true that the woman selected to be Pythia received divine visions from the God Apollo my conjecture about her personal life would differ greatly than if she were a drugged, captive woman who was forced to live a desolate life. I think the mystery of the Pythia, is what makes it so intriguing even to this day. How to cite Pythia (the Oracle of Delphi), Papers

Friday, April 24, 2020

The Suppression and Exploitation of Black People in the U.S. free essay sample

Annie Summary of Panther Power and New Black Panther Party The given extracts from American Protest Literature written by Zoe Trod and published In 2006 deal with the suppression and exploitation of black people In the USA and their protest against the white supremacy. HIP-HOP as an expression of protest referring to a whole culture which was oppressed and exploited over centuries became very popular In the United States during the late 20th century.One famous hip hop artist was Outpace Shaker who was ailed In a drive-by shooting In 1996. Some of his first recordings were released after halls death to give an impression of how socially conscious themes ruled HIP-HOP. One of those records is Panther Power which is about his vision on America and the American Dream, which did not fulfill his dreams and expectations to his American life due to for example empty promises of the government. His intention was to motivate black people to keep on fighting for their freedom and rights. We will write a custom essay sample on The Suppression and Exploitation of Black People in the U.S. or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Moreover, Trod embodies the history of the New Black Panther Party and its emends formulated in their Ten Point Program which have its origins in the Black Panther Partys platform from 1966. The New Black Panther Party follows a radical black nationalist philosophy demanding National Liberation due to their belief that a peaceful social existence of black and white people will be impossible. They want to end the capitalistic, violent and exploitative power which suppressed their culture over centuries. Therefore they demand especially a separate state where they can life in freedom and by their principles.

Tuesday, March 17, 2020

History of the Gulf War

History of the Gulf War Free Online Research Papers Since the Arab oil embargo of 1974, Western states have attempted to find alternatives to their growing dependence on imported oil. However, the West did a better job of negotiating regional security arrangements to protect the leading sources of oil imports than it did in finding substitutes. With the fall of the Shah of Iran and the Iranian hostage situation, the West lost its only regional military base. This loss caused an increased risk that the Gulf could be dominated by a radical anti-Western power (Cordessman 1-2). When Iraq invaded Kuwait, the West moved quickly and decisively to strike down the enemy that would threaten its allies and deprive it of its supply of oil. In a television address, President George Bush stated, â€Å"No nation should rape, pillage, and brutalize its neighbor,† and â€Å"No nation should be able to wipe a member state of the United Nations and the Arab League off the face of the earth (Smith 1).† The war against Iraq was fought for a high principle. Aggression must be punished. There are many reasons, both military and diplomatic, that caused the U.S. to take military action against Iraq’s aggression. One military reason for American involvement was a strategic argument. This argument centered on the conclusion that fighting now may prevent other wars. If force is not used when words fail, future aggressors will be less likely dissuaded by nonviolent means (Dunnigan and Bay 71-72). National security is supported on a three-legged stool called ‘Military Strategy.’ The legs of this stool must be balanced or national security may be in jeopardy. The stool rests on an angle and that angle represents risks associated with not achieving an objective. There were several risks associated with the U.S. military strategy used in the Gulf War. The first risk the U.S. faced was credibility. The U.S. had to prove to the world that it could handle the diplomatic and military challenges posed by Iraq. The second risk was the potential for a great number of casualties. The U.S. took a calculated risk in assuming that the ultimate toll of American and Allied lives would be lower if it applied overwhelming military force (Dunnigan and Bay 73). National security was threatened and the U.S. military strategy was employed. President Bush acted immediately to protect U.S. interests and to punish aggression when the first Iraqi tanks crossed into Kuwait. The national security objective: to deter aggression against the U.S., its citizens, interests, or allies, and defeat such aggression if deterrence fails was achieved. America demonstrated to the world that it has the forces and will use them to counter aggression when its vital interests are at stake. The U.S. used a sequential, step-by-step approach towards attaining their military objective. The strategy was to execute a series of discrete steps and actions to attain the objective. Reinforced by cumulative strategies, the U.S. achieved crushing results. The first strategy was to use an indirect approach, focusing on economic sanctions and non-military options. President Bush immediately signed two executive orders which froze Iraqi assets and barred U.S. trade with Iraq. Economic sanctions began to take hold but there was a marked increase in enemy forces in Kuwait. Naval warships that were stationed in the Gulf were bolstered to demonstrate a show of force. The goal was to prevent or limit the scope of war. Naval operations were a vital part of the Gulf War. Surface warships and amphibious craft threatened the Kuwait coast. The Navy fleet destroyed the small but potentially effective Iraqi coast defense navy; neutralized Iraqi mines; and threatened a major amphibious assault on Iraqi forces in Kuwait. Allied Naval forces maintained the naval embargo and isolated Iraq from the outside world. The Navy stood ready to lead reentry into the Arabian Peninsula if Arab and American ground forces were overwhelmed. These actions supported the maritime theory which provides that we can subdue an enemy if we control the seas and starve the enemy. The continental theory stresses that a decisive victory can be achieved by destroying the enemy’s armed forces and then physically occupying their territory. Continental strategists believe that air and naval forces serve only to support ground forces. There were two phases of Operation Desert Storm which support this theory: the air war and the ground offensive. Allied forces waged the air war to win air supremacy, destroy strategic targets, and to degrade Iraqi ground forces. Using a series of discrete, sequential actions, the allied forces gained air supremacy and destroyed targets vital to the Iraqi war effort. The Iraqi air defense system was rendered ineffective. The allies continued the air war to maximize Iraqi and minimize allied casualties. Air power was the key component in the Allies’ psychological warfare campaign to demoralize the Iraqi Army. These actions paved the way for the ground war. General Schwarzkopf’s plan for the ground war was the climax of the cumulative strategy. The general used the direct strategy and utilized principles of deception, concentration of force, and speed. The goal of the ground war was to regain control of Kuwait by neutralizing Iraqi ground forces (Britannica 231-232). Operation Desert Storm was an AirLand Battle. All allied weapons systems and troops worked together, complementing one another, so that speed and firepower overwhelmed Iraq. The Allies used initiative. U.S. forces used agility to execute rapid and bold maneuver in the ground campaign. The coalition used depth to retain the ability to fight and defend in any direction. Synchronization was used to put all the pieces together in a continuous combat operation (Dunnigan and Bay 263). The strategies used by the U.S. in the Gulf War were developed for a limited war. Allied forces joined and engaged their military forces to defeat the enemy using well-trained manpower and technologically advanced weapons systems. NATO member nation-states joined forces to protect and defend Kuwait from the Iraqi invasion using a strategy of collective military security. The collective military strategy posed some problems for the allies. One of the problems was the difference in equipment. Each member state had its own way of caring for equipment. Communications equipment and procedures presented a big problem. New procedures were developed on the spot to address this problem. The coalition of allied forces combined strength to increase their military might and demonstrate a show of force. The major key was a direct strategy whereby force was the essential factor. Psychology and planning was the minor, indirect strategy. Propaganda which demoralized the enemy and strategic bombing and naval warfare were parts of the direct and indirect strategies. The U.S. made the first strike offense. Massive firepower virtually eliminated all efforts for retaliation. Air power cut Iraqi communications and denied air reconnaissance. The coalition forces isolated the Iraqi Army and nearly killed it. The Allies effectively used their forward defense strategy to contain the Iraqis and prevent them from expansion. The Iraqis’ initial approach to military strategy was to assure the U.S. that its oil supply was not in jeopardy and that Israel would not be attacked. The Iraqis believed that by making these assurances, the U.S. would not interfere in its quarrel with Kuwait. Iraq was using a deterrent strategy to induce the U.S. from retaliating against it. The deterrent strategy was also present in Saddam Hussein’s Iraq-Arab diplomatic talks. The Iraqis would not attack their neighbors if they would agree to give billions of dollars in gifts, forgive Iraq’s war debts, and make certain land concessions. The Iraqi Army was a formidable force. The Iraqis had billions of dollars’ worth of Russian and Western equipment. They also had a large cadre of experienced NCOs and officers which made them highly competent (Dunnigan and Bay 76). The Gulf War was a general war for Iraq. The Iraqis employed all of their resources to win and faced the possibility of total destruction. The Iraqis marched on Kuwait using a direct military strategy. They built defensive positions and engaged in a head-on battle with the Kuwaitis. They also launched a direct airborne assault against Kuwait and moved to secure the Saudi border. These actions support the continental theory which says that victory can be achieved by destroying the enemy’s armed forces and then physically occupying their land. The Iraqis were always on the defensive. They improved their defensive positions and fortified the area with fire trenches, minefields and other obstructions. These defensive strategies were designed to conquer Kuwait and improve Iraq’s ability to counterattack. Iraq used a direct strategy throughout the war. The Iraq-Iran War had left them well equipped and experienced. They expected to use fortification and deception skills to defeat the enemy. The Iraqi forces were fierce on paper. The Army was the fifth largest in the world, with some 950,000 personnel, 5,500 main battle tanks, 10,000 other armored vehicles, and nearly 4,000 artillery pieces. The Air Force of 40,000 personnel had 689 combat aircraft. The Army and Air Force had extensive combat experience from the 1980-88 Iraq-Iran War, including large-scale use of chemical weapons. Iraq was also developing biological weapons. Iraq also was capable of delivering chemical and biological weapons. Iraq intended to use its forces to clearly demonstrate a show of force. Assured destruction is when an aggressor can inflict unacceptable damage on a foe, even after absorbing a first attack. Iraq would use chemical and biological weapons even after the allies had made the first strike offensive. The Iraqis used the assured destruction strategy as an defensive tactic. The Iraqis used the second strike strategic concept as a deterrent to show the U.S. that it maintained the ability to fight back. The strategy was to dig, fortify Kuwait and create a huge â€Å"hedgehog† defensive position. Iraq used its elite Republican Guard for the forward defense. These dug-in forces and complementing minefields, tank traps, fire trenches and other trench and bunker warfare were supposed to frighten the Allies. This was a psychological strategy that was designed to convince the coalition that attacking Iraqi forces would lead to heavy casualties among allied troops. The Iraqis’ objective was to show force throughout the Gulf War. Their strategy was a direct, head-on tactic. The threat of chemical warfare was consistently used as a psychological deterrent. During the Gulf crisis, the U.S. moved quickly and decisively to strike down an enemy that would deprive it of its supply of oil and threaten its national security. The war was a personal crusade for President Bush. It was a black and white struggle between good and evil; an opportunity â€Å"to stand up for what’s right and condemn what’s wrong (Smith 1).† Aggression had to be punished. WORKS CITED Bennis, Phyllis and Michael Moushabeck. Beyond the Storm. New York: Olive Branch Press, 1991. Cordessman, Anthony H. The Gulf and the West Strategic Relations and Military Relations. Colorado: Westview Press, 1992. Dunnigan, James F. and Austin Bay. From Shield to Storm, 1st ed. New York: William Morrow and Company, 1992. Sergeants Major Academy, U.S. U.S. Military Strategy. Fort Bliss, Texas: 1997. Smith, Jean Edward. George Bush’s War. New York: Henry Holt and Company, 1992. â€Å"The Gulf War.† Encyclopedia Britannica, Inc. (1992), 231-232. Research Papers on History of the Gulf WarAppeasement Policy Towards the Outbreak of World War 2Open Architechture a white paperEffects of Television Violence on ChildrenAssess the importance of Nationalism 1815-1850 EuropePETSTEL analysis of IndiaCapital PunishmentIncorporating Risk and Uncertainty Factor in CapitalGenetic EngineeringThe Project Managment Office SystemNever Been Kicked Out of a Place This Nice

Sunday, March 1, 2020

3 New CoSchedule Features You Should Know About (+1 On The Way)

3 New Features You Should Know About (+1 On The Way) Attention marketers! Get ready to feel the HEAAAT. It’s ONLY February †¦but your #1 marketing calendar is pumpin’ out some seriously HOT features just for you + your team. One month into the year and we’ve got 3 NEW features for Team Pro plans  (and another major player coming very soon on the docket.) Intrigued? Cool, keep reading. Here’s your quick highlight reel from this month (+ an exclusive first look at ONE serious feature coming VERY soon). 3 @Features You Should Know About + 1 More On Its WayGet serious about segmentation with Facebook Targeting Segmentation matters. Blanketed responses don’t work on readers AND your Facebook messages are no different. You’ve gotta speak to the right people and the right time. And thanks to ’s recent feature, Facebook Targeting (available on all Team Pro plans), you can now get specific; catering your messages to a very specific audience. Simply create your highly targeted list with FB’s Preferred Audience settings AND save: Age Gender Relationship Status Interested in Location Language Education Level College Graduation Years Interests AND best of all, with ’s Facebook Targeting, you can create your audiences once, save them in your settings, and reuse them again and again. As a marketer, you sell a product (whether it’s YOU, a service, or a tangible item) to a specific audience. Thus, utilizing options such as age ranges, relationship status, location, education level, etc can assist you in converting users MORE effectively. Why? Because  when you share the right content, with the right people, you ADD  VALUE. And when you add value, you build a following that’s a bagillion times more likely to convert. A bagillion. Build a following that’s a bagillion times more likely to convert with @Every message should be seen as one to one, not one to many. When you write a message, you write to ONE reader, and segmenting your messages empowers you to write to a very specific audience. An audience that (thanks to FB targeting) you now know VERY well, and therefore have the means to convince on a very personal level. Get Your Reports Sent to the RIGHT People at the Right Time (With Minimal Effort) You and reports have a love-hate relationship. It’s the bane of your existence and the reason for that pay raise. Every boss, big wig, investor, and client wants to know the fruits of their (your) labor and reports are the tell all. Only frustration: getting your data into a nice, neat, easy to read report and sent ON TIME. You’re busy doing the work, and now you need to make time to report on it. With ’s export capabilities we’ve done the manual work for you. You can now choose to export your Social Analytics reports  via CSV, PDF, or even schedule a recurring email to send to your team, clients, and/or stakeholders. Annnnd you can even add a little branding to your reports. Grab a logo, insert your company (or client’s) name, and a little description to give your reports that added personal touch. In a world where marketing can feel like a bunch of warm fuzzies, having the report to back you up and the numbers to prove your worth are MUY BUENO. Hit the easy button with ’s export report features (available on all Team Pro plans). Hit the easy button with ’s export report featuresBecause Your Content Rarely Fits the â€Å"One Size Fits All† Category Create your own content types (made for you just for you). Content isn’t a â€Å"one size fits all† AND what your team does on a daily basis is unique. Create your own custom content types (available on Team Pro plans) for everything you do! TPS Reports Blog Posts Presentations Podcasts Social Media Campaigns If you can do it, you can organize it. If you can do it, you can organize it with @.Prioritize the Content YOU Care About Not all pieces of content are created equal. With Content Types, you can now prioritize the content that matters most to your team. Easily create a hierarchy of content types based on the pieces of content you use most so you can get to the real work faster. Give your team even more context with Content Types. Clarity is crucial when there’s multiple folks working on a single piece of content. Add context and get specific with Content Types so you can keep your team on the same page and get projects moving forward (faster)! What’s Coming Up? Marketing Projects Are a  BEAST and We’re Here to Tame ‘em Marketing is more than a blog post. It’s more than social promotion. It’s more than an email or a newsletter or a webinar. It’s a million different things†¦ †¦.happening all at once†¦ with finite resources. And you are the MAESTRO of it all. You are the one managing every detail Making sure the right people are working on the right parts Coordinating tasks, timelines, resources, and tools†¦ AND you are the one making sure the entire production of [insert BIG project] is executed  on time. It’s a lot to manage. Especially when all those moving parts are spread across your calendar. Which is why we’re building Marketing Projects (coming soon to a Team Pro plan near you). Why get excited? ‘Cos  with Marketing Projects by you’ll be able to: Keep your entire operation in one big piece of content! (eeeeHHHH!) Track your project’s overall progress with a nifty BURN CHART, cuz we’re all nerds and graphs are our love language. Easily manage your team’s time (know who’s on a project, and what they’re working on) Get a visual preview of your entire project on the main calendar (yes you’ll be able to create events that last more than one day) It’s organization on steroids. And this product marketer here is freakin’ out. Its organization on steroids.It’s gonna be an awesome feature for folks that manage A LOT more than blog content (which is basically all of you!). Stay tuned. P.S.  Not on a Team Pro plan but want a test run? No problem. Go to your billings page and you can trial Facebook targeting, custom content types, and export scheduling FREE for 14 days with a Team Pro trial.

Friday, February 14, 2020

Commercial Aircraft Marketing to Carriers Research Paper

Commercial Aircraft Marketing to Carriers - Research Paper Example Apart from increased level of globalization, the factor concerning gaining momentum of internationalization also made the business market much complex as well as competitive at large. From the overall analysis, it can be affirmed that marketing techniques along with procedures are often viewed to be the imperative aspects of an organizations’ life cycle. The main importance of implementing a proper and an effectual marketing strategy is to deliver active support to an organization towards fulfilling its expected business targets by a greater level. With this concern, it has been viewed that the aircraft manufacturers also uses certain significant marketing techniques along with procedures in order to market their respective aircrafts to potential customers. In this respect, the marketing techniques as well as the procedures that used by the aircraft manufacturers have been viewed to be product innovation, technological development, effective fleet planning, and enhancing environmental performance among others. The aircraft manufacturers strongly believes that with proper and effective adoption as well as exploitation of the aforesaid marketing techniques, they can successfully market their products to their respective potential customers by a considerable level. Thus, it can be concluded that the aforementioned marketing techniques and procedures can support the different aircraft manufacturers towards attaining greater competitive position and most vitally to sustain in this competitive landscape. ... partment of any aircraft manufacturer to analyze the market demand and prepare a blue print of what is needed by its potential aircraft manufacturers. It has been apparently observed that the aircraft manufacturers often execute the aspect of fleet planning as one of the effective marketing techniques as well as procedures for the purpose of attracting along with retaining their potential customers in terms of panning their purchase of new aircrafts efficiently (Avjobs.Inc., â€Å"Airline Economics†). Technology Development In terms of technological development, it has been apparently observed that major aircraft manufacturers often engages in introducing, executing as well as developing pioneering technologies in order to market their aircrafts to different potential airline customers. The formation of the new technologies along with the pioneering production plants has eventually supported the aircraft manufacturers to attain their respective predetermined business targets. Apart from marketing the products i.e. the aircrafts, the aircraft manufactures are often viewed to develop innovative technologies for the purpose of lessening operational costs along with overheads by a considerable level. This ultimately supports them to attain superior competitive position in the respective industry. Relating to this significant aspect of technology development, the aircraft manufacturers have been viewed to be manufacturing numerous aircrafts that possesses greater operational effectiveness as well as superior performance levels in order to market those to their respective potential customers by a significant level. It is worth mentioning that the technological development or the technological innovations not only supported the different aircraft manufacturers towards

Saturday, February 1, 2020

Business plan Research Paper Example | Topics and Well Written Essays - 1500 words

Business plan - Research Paper Example The warehouse will be needed for comedies, late night partnerships with palladium artists; it will also be open for dance and band shows and cabaret style opportunities to both talents. Carmel also referred to as Carmel by the sea is a city found in the Monterey County in California in the United States, whichwas founded in the year 1902 and incorporated in 1916. The city is widely known for its natural scenery and the great artistic history. The city has a great artistic value from the early decades and even got its name from the poets and writers in Carmel. The city has widely been dominated by artists over the decade and the city is widely known for the dog friendly environment, restaurants, numerous hotels, and retail establishments that attract guests with dogs to the region. The country is located on the pacific coast where it is about 350 miles to the north of Los Angeles, and 190 kilometers to the south of San Francisco. According to the United States census in the year 2010, the city was reported to have a population of approximately 3,722. The population density of the city had 3,455.5 people located per square mile. According to the races in the region, the whites took the larger portion of 93.1% of 3464 people, the African American took a portion of 0.3% with 11 people, the Native American were 8 of them with a 0.2, Asians were 111 people at 3%, the Pacific Islander took a 1.2% with 45 people, 1.2% came from other races in the town while the Latino or the Hispanic took a 6.8% with a population of 174 persons. From the census, it reviewed that all the people lived in their households and non-at noon- institutionalized quarters. The population at Carmel was spread out with 10.2% of 381 people were under the age of 18 years, 114 people were of the age between 18 to 24, 544 people of the age between 25 to 44, 1355 people were of the age between 45 and 64 while above 65 years of age there were 1328 people. The city of Carmel

Friday, January 24, 2020

Walt Whitmans Song of Myself Essay examples -- Song of Myself Essays

In one of the sections from the poem, â€Å"Song of Myself† Walt Whitman starts out with a child asking a question, â€Å"What is the grass?† Grass is a symbol of life. God, who created both the heavens and the earth also gave birth to life. When Whitman refers to grass as a â€Å"handkerchief of the Lord† (7), as a gift. When people look at the grass, they do not think of it as a creation but rather just a plant. Whitman refers to the grass as â€Å"a child, the produced babe of vegetation† (11, 12). Here, the grass is a metaphor for the birth of a child. In often cases, the birth of anything is celebrated because it symbolizes a new life, a new beginning. Whitman in a way compares grass as a human society. He mentions that grass is â€Å"a uniform hieroglyphic† (13) and they â€Å"alike† (14). In scientific terms, all humans are similar to each other and the only aspect that makes each person different is their personality and race. But even if people are racially different from each other physically, every person is the same internally as Whitman puts it: â€Å"Growing among black folks as among white, â€Å"Knuck, T...

Thursday, January 16, 2020

Career Assessment Examination Platform

Chapter 4 Presentation, Analysis and Interpretation of Data This chapter reviewed the analysis of the existing system that was used by the proponents, the development of the proposed system and software, the objectives of the proposed system and software, and the evaluation of the system and software products. Presentation of Data In developing the proposed study, the proponents gathered information through the use of the questionnaires. The respondents were asked to answer and give their opinion regarding the existing system assessment examination method.Profile of the Respondents. The respondent’s answer the interview in order to identify their knowledge on the existing system. The respondents are mostly highschool students of Baliuag University. The current process for the existing assessment examination method The current process is done by the admission office prior to the beginning of very semester. The examiner/applicant will fill up the application form manually and wi ll choose his/her desired course.Once the applicant has pass their application form to the admission office, the next step is he/she will take the assessment and after he/she took the assessment exam, he/she will wait for 15-20mins for the result of his/her exam. If they passed in their desired course the admission personnel will tell him/her that they passed in their exam. Tools/Instruments currently used in taking assessment examination method Tools and instrument are the basic necessities required to complete the examination.In a manual process of taking examination, pen, questionnaire and answer sheet are the main instruments used by responsible person such as the applicant. Once the applicant is done with answering the admission personnel will check it also manually and will compute it in an average grading computation. Problems commonly encountered in the existing system There are some factors that need to considered before the applicant will enroll in his/her desired course b e completed. It is possible, given the current method, that errors will not occur.The number one problem encountered is that the applicant is not suitable for the course he/she has chosen. This variable is commonly a human computation error because when manually done the computation of the assessment they cannot be indicate the suitable course for the applicant. Added features suggested for the improvement of the existing system Improving the assessment examination system will be beneficial to all people concerned, a reliable, efficient, accurate and user friendly will prevent the problems encountered in the existing system.A current and always uploaded database containing applicant information, the printed result of the exam and in what course the applicant will be fit in are some of the added features suggested for the improvement of the current system. This database must be a user friendly environment that provides all information that the applicant needed. Components of the Prop osed Software The following are the incorporated components in the proposed software, giving an overview of features and functions included to increase the usability and functionality of the software.General Features. The main function of the proposed software is assessment examination. Menu Driven. The software provides an onscreen list of available function through buttons which is organized in tabs for easier navigation. Button Driven. The system provides a list of choices for the user through the use of mouse and keyboard. User-Friendliness. The interface of the software is designed to be simple and easily access so that the users can use it efficiently. Software Functions. The main objective of the proposed software is to assess exam.Software Inputs and Outputs. The software inputs and outputs can be explained using Input-Process-Output, Visual Table of Contents and Class Diagram. (See Appendix †¦Ã¢â‚¬ ¦ ) Software Development This system development describes how the prop onents develop the proposed system by means of specifying the materials used, describing the implementation and stating how it evaluated. Specifications. The proposed system has been developed using the following software and hardware specification. | | | | | | | | | Design. The system was developed by the proponents using Visual Basic.Net and MySQL which show as the necessary information regarding the assessment examination. The system was designed using program flowchart, VTOC. Programming. The program was set in a computer to give a solution to the problem of the existing system. All the information that has been accumulated is applied in this system. The proposed system is programmed through the use of Visual Basic. Net. The coding part is where the entire design is transmitted into a programming language. Testing. The proponents tried to conduct a series of test in the system that was made if there are any data error or lack of information needed.Implementation of the Proposed Software The proposed software was designed and developed to know how each module of the system works. It is made through coding. The proponents assure that the software will run normally and free from errors. The test was conduct to avoid possible problems. After the system passes the entire test, it is time that the system will implemented that will guarantee users that the system is accurate, reliable and faster to use. Evaluation of the Software Product The proposed system should be evaluated to prove to feasibility for implementation.Many different evaluation approaches are available but the study will only focus on its technical and operational feasibility. Technically Feasibility. The hardware and software requirements of the proposed system are readily available at the marketplace. Windows XP and Windows 7 are Microsoft’s operating system that dominates the market and patronized by many users. Since the software hardware requirements to develop and operate the operate s the propose system can be easily obtained the proposed system is said to be technically feasible. Operational Feasibility.The operational feasibility includes projecting whether the system will operate and used once it is installed. With the prospective users expressing is need to develop the system, the proposed system was design to satisfy the expressed needs of the prospective users. To determine whether to developed proposed system has met user requirements, evaluation forms were given to target users. These forms were used to gather responses to the proposed system. The means given by the users are evidences that the proposed system is acceptable in them.

Wednesday, January 8, 2020

Igneous Rocks Everything You Need to Know

There are three great categories of rocks: igneous, sedimentary, and metamorphic. Most of the time, theyre simple to tell apart. They are all connected  in the endless rock cycle, moving from one form to another and changing shape, texture, and even chemical composition along the way. Igneous rocks form from the cooling of magma or lava and compose much of the Earths continental crust and nearly all of the oceanic crust. Identifying Igneous Rocks The key concept about all igneous rocks is that they were once hot enough to melt. The following traits are all related to that. Because their mineral grains grew together tightly as the melt cooled, they are relatively strong rocks.Theyre made of primary minerals that are mostly black, white, or gray. Any other colors they may have are pale in shade.Their textures generally look like something that was baked in an oven. The even texture of coarse-grained granite is familiar from building stones or kitchen counters. Fine-grained lava may look like black bread (including gas bubbles) or dark peanut brittle (including larger crystals). Origin Igneous rocks (derived from the Latin word for fire, ignis) can have very different mineral backgrounds, but they all share one thing in common: they formed by the cooling and crystallization of a melt. This material may have been lava erupted at the Earths surface, or magma (unerupted lava) at depths of up to a few kilometers, known as magma in deeper bodies. Those three different settings create three main types of igneous rocks. Rock formed of lava is called extrusive,  rock from shallow magma is called intrusive,  and rock from deep magma is called plutonic. The deeper the magma, the slower it cools, and it forms larger  mineral crystals.   Where They Form Igneous rocks form at four main places on Earth: At divergent boundaries, like mid-ocean ridges, plates drift apart and form gaps that are filled by magma.Subduction zones occur whenever a dense oceanic plate is subducted underneath another oceanic or continental plate. Water from the descending oceanic crust lowers the melting point of the above mantle, forming magma that rises to the surface and forms volcanoes.At continental-continental convergent boundaries, large landmasses collide, thickening and heating the crust to melting.  Hot spots, like Hawaii, form as the crust moves over a thermal plume rising from deep in the Earth. Hot spots form extrusive igneous rocks.   People commonly think of lava and magma as a liquid, like molten metal, but geologists find that magma is usually a mush  Ã¢â‚¬â€Ã‚  a partially-melted fluid loaded with mineral crystals. As it cools, magma crystallizes into a series of minerals, some of which crystallize sooner than others. As the minerals crystallize, they leave the remaining magma with a changed chemical composition. Thus,  a body of magma evolves as it cools and also as it moves through the crust, interacting with other rocks. Once magma erupts as lava, it freezes quickly and preserves a record of its history underground that geologists can decipher. Igneous petrology is a very complex field, and this article is only a bare outline. Textures The three types of igneous rocks differ in their textures, starting with the size of their mineral grains. Extrusive rocks cool quickly (over periods of seconds to months) and have invisible or microscopic grains or an aphanitic texture.Intrusive rocks cool more slowly (over thousands of years) and have visible grains of small to medium-size, or phaneritic texture.Plutonic rocks cool over millions of years and can have grains as large as pebbles  Ã¢â‚¬â€Ã‚  even meters across. Because they solidified from a fluid state, igneous rocks tend to have a uniform fabric without layers, and the mineral grains are packed together tightly. Think of the texture of something you would bake in the oven. In many igneous rocks, large mineral crystals float in a fine-grained groundmass. The large grains are called phenocrysts, and rock with phenocrysts is called a porphyry  Ã¢â‚¬â€Ã‚  that is, it has a porphyritic texture. Phenocrysts are minerals that solidified earlier than the rest of the rock, and they are important clues to the rocks history. Some extrusive rocks have distinctive textures. Obsidian, formed when lava hardens quickly, has a glassy texture.Pumice and scoria are volcanic froth, puffed up by millions of gas bubbles that give them a vesicular texture.Tuff is a rock made entirely of volcanic ash, fallen from the air or avalanched down a volcanos sides. It has a pyroclastic texture.Pillow lava is a lumpy formation created by extruding lava underwater. Basalt, Granite, and More Igneous rocks are classified by the minerals they contain. The main minerals in igneous rocks are hard, primary ones: feldspar, quartz, amphiboles, and pyroxenes (together called dark minerals by geologists), as well as olivine, along with the softer mineral mica. The two best-known igneous rock types are basalt and granite, which have distinctly different compositions and textures. Basalt is the dark, fine-grained stuff of many lava flows and magma intrusions. Its dark minerals are rich in magnesium (Mg) and iron (Fe), hence basalt is called a mafic rock. It can be either extrusive or intrusive. Granite is the light, coarse-grained rock formed at a depth that is exposed after deep erosion. It is rich in feldspar and quartz (silica) and hence is called a felsic rock. Therefore, granite is felsic and plutonic. Basalt and granite account for the great majority of igneous rocks. Ordinary people, even ordinary geologists, use the names freely. Stone dealers call any plutonic rock granite. But igneous petrologists use many more names. They generally talk about basaltic and granitic or granitoid rocks among themselves and out in the field, because it takes laboratory work to determine an exact rock type according to the official classifications. True granite and true basalt are narrow subsets of these categories. A few of the less common igneous rock types can be recognized by non-specialists. For instance, a dark-colored plutonic mafic rock, the deep version of basalt, is called gabbro. A light-colored intrusive or extrusive felsic rock, the shallow version of granite, is called felsite or rhyolite. And there is a suite of ultramafic rocks with even more dark minerals and even less silica than basalt. Peridotite is the foremost of those. Where Igneous Rocks Are Found The deep seafloor (the oceanic crust) is made almost entirely of basaltic rocks, with peridotite underneath in the mantle. Basalts are also erupted above the Earths great subduction zones, either in volcanic island arcs or along the edges of continents. However, continental magmas tend to be less basaltic and more granitic. The continents are the exclusive home of granitic rocks. Nearly everywhere on the continents, no matter what rocks are on the surface, you can drill down and reach granitoid eventually. In general, granitic rocks are less dense than basaltic rocks, and thus the continents float higher than the oceanic crust on top of the ultramafic rocks of the Earths mantle. The behavior and histories of granitic rock bodies are among geologys deepest and most intricate mysteries.