...RANGKUMAN KIMNAL SPEKTROFOTOMETRI ISTILAH: 1. Spektroskopi Ilmu yg mempelajari interaksi radiasi dan materi 2. Spektrofotometri Pengukuran kuantitatif dari interaksi radiasi elektromagnetik pada 1 atau lebih panjang gelombang dengan suatu detektor 3. Spectrum Tampilan dari intensitas radiasi teremisikan, absorbs, atau hamburkan oleh sampel vs kuantitas energi foton (E), panjang gelombang (λ) atau frekuensi (v) 4. Radiasi elektromagnetik (RE) Bentuk energi yg ditransmisikan melewati ruang dengan laju yg besar bersifat dualism (bisa sbg gelombang atau partikel energi/foton) Bisa disebut sbg cahaya dlm daerah uv-vis Sifat sbg gelombang: a. Memantul/ reflection b. Membias/ refraction belok c. Berinterferensi/ interference ganggu d. Berdifraksi/ diffraction pecah 5. Panjang gelombang (λ) Jarak antar dua puncak gelombang 6. Frekuensi (v) Jumlah gelombang yg melintasi satu titik tertentu selama waktu tertentu Λ makin kecil E makin besar Frekuensi besar INTERAKSI RADIASI DAN MATERI Fenomena gelombang refraksi dan refleksi Fenomena energi absorbs dan emisi absorbs transmisi emisi refleksi refraksi BAGAIMANA RADIASI DAN MATERI BERINTERAKSI? 1. Merubah SPIN a. NMR b. ESR 2. Mengubah arah orientasi electron * Gelombang micro 3. Mengubah konfigurasi * IR 4. Mengubah distribusi electron a. UV-VIS b. X-Ray 5. Mengubah konfigurasi nuclear/...
Words: 4543 - Pages: 19
...Lenovo Group Limited is the world's fourth largest personal computer manufacturer after Hewlett-Packard and Dell of the U.S. and Acer of Taiwan.In 2005, it purchased IBM's PC division. Lenovo produces desktops, laptops, servers, handheld computers, imaging equipment, and mobile phone handsets. Lenovo also provides information technology integration and support services, and its QDI unit offers contract manufacturing. Its executive headquarters are located in Beijing, China and in Morrisville, North Carolina, USA. It is incorporated in Hong Kong. Lenovo makes a variety of products for world wide sale.These products include: Lenovo ThinkCentre desktops Lenovo ThinkPad laptops and tablets Lenovo ThinkStation workstations Lenovo ThinkServer servers IdeaCentre desktops IdeaPad consumer-oriented laptops Lenovo 3000 J Series desktops Lenovo 3000 C, N, and V Series laptops LCD and CRT monitors ThinkVision projectors and monitors An agreement allows Lenovo to sell IBM-branded desktops and laptops until 2010. Ownership As of October 31, 2008, 50.4% of Lenovo is owned by public shareholders, 42.3% by Legend Holdings Limited...
Words: 2180 - Pages: 9
...|家具名称 |配方 |等级 | |黑麻垂曼帘 |普通木材类 |普通布料类 |印染工艺 |10级 | |桦木圆桌 |普通木材类 |普通手艺 | |10级 | |桦木立柜 |普通木材类 |普通木材类 |普通手艺 |15级 | |草编地毯 |闲杂材料一 |普通手艺 |灵巧手艺 |15级 | |漆花竹凳 |普通木材类 |印花工艺 |普通手艺 |20级 | |榛木床 |普通木材类 |普通木材类 |普通木材类 |20级 | |印花屏风 |普通木材类 |普通布料类 |印花工艺 |25级 | |文竹 |闲杂材料一 |闲杂材料二 |陶瓷类 |25级 | |君子兰 |装饰工艺 |闲杂材料三 |陶瓷类 |30级 | |蝴蝶兰 |普通木材类 |闲杂材料三 |陶瓷类 |30级 | |水仙 |装饰工艺 |闲杂材料一 |陶瓷类 |35级 | |仙人掌 |闲杂材料二 |闲杂材料三 |陶瓷类 |35级 | |银烛台 |普通金属类 |装饰工艺 |普通手艺 |40级 | |玉瓷画瓶 |灵巧手艺 |陶瓷类 | |40级 | |踏春图 |绘画工艺 |普通手艺 | |45级 | |漆花地板 |普通木材类 |印花工艺 |闲杂材料一 |45级 | 二级家具配方 |家具名称 |配方 ...
Words: 286 - Pages: 2
...Релятивизм - философский принцип интерпретации природных, социокультурных, мировоззренческих, когнитивных объектов в их отношении друг к другу и к окружению. Абсолютизм - методологический подход в межкультурных исследованиях, характеризующийся абсолютизацией сходства между культурами Универсализм – методологический подход в межкультурных исследованиях, основной постулат которого − культуры равные, внешне разные, но в основе одинаковые. Этноцентризм − склонность этнических групп воспринимать и оценивать окружающий мир, явления и процессы в нем сквозь призму традиций и норм собственной группы, которые считаются эталоном. Этический подход − подход исследователя, занимающего позицию внешнего наблюдателя. симпатия, Эмический подход – подход в изучении явлений, при котором исследователь рассматривает любые элементы культуры с точки зрения непосредственного участника, т.е. изнутри системы. Эмпатия − возможность испытывать разные ощущения в процессе коммуникации на основе своих представлений о потребностях другого человека. стратегии редукции неуверенности, Теория адаптации – теория, описывающая приспособление индивида к новой среде (Я. Ким), которое проходит по схеме «два шага вперед, один назад». Биографической рефлексии метод − осмысление своей биографии с целью выяснения собственной идентичности и форм ее проявления в повседневной жизни. Наблюдение – метод целенаправленной и систематической фиксация явлений (сплошное и выборочное, включенное и невключенное, контролируемое...
Words: 749 - Pages: 3
...Energy & Resources Accounting for Emission Rights Introduction Accounting for greenhouse gas emissions remains a challenge, and market participants continue to wait for clear guidance from accounting standards setters. Formative efforts on the part of those standards setters have proven unsuccessful. The International Financial Reporting Interpretations Committee (“IFRIC”) initially took on this task, and issued IFRIC 3, Emission Rights. Unfortunately, considerable pressure from both the business community and European politicians, who objected to the financial statement consequences of applying that interpretation, led to its withdrawal by the International Accounting Standards Board (“IASB”) within a year of its issuance. In the US, the Emerging Issues Task Force (“EITF”) also attempted to address the related accounting issues in EITF Issue 03-14, Participants’ Accounting for Emissions Allowances under a “Cap and Trade” Program. However, it was never finalized, and ultimately removed from the EITF’s agenda. More recently, organizations have been advised of informal views from both the Financial Accounting Standards Board (“FASB”) and the Securities and Exchange Commission (“SEC”) on the appropriate accounting for emissions allowances held, especially since EITF 03-14 was tabled. As a consequence, many companies remain confused about the appropriate accounting treatments under both International Financial Reporting Standards (“IFRS”) and generally accepted accounting principles...
Words: 4828 - Pages: 20
...CERTIFICATE IN FOUNDATION STUDIES CRITICAL THINKING (Intake 8) Assessment 1 (30%) Read the article below and respond to the questions below: You are allowed to search for related articles on this issue and respond to the questions below: NUS to decide on student sex blogger in a week's time By Dylan Loh | Posted: 31 October 2012 2011 hrs Source: http://www.channelnewsasia.com/stories/singaporelocalnews/view/1234575/1/.html SINGAPORE: The NUS will decide in a week's time whether to take any disciplinary action against a student for posting explicit videos and pictures of himself and his girlfriend online. Law student Alvin Tan, who met representatives of the National University of Singapore (NUS) on Wednesday, said he is worried about the possible consequences of his actions, including expulsion. He is currently on a leave of absence from the university, and intends to return to his studies in January, if allowed to. He apologized to the varsity's disciplinary board for affecting the school's reputation as a result of what he did. The media were not allowed to observe the NUS disciplinary proceedings. The board conducting the proceedings was made up of five members - three of them senior academics and two student leaders. Mr. Tan said: "I'm not sure what sort of action they would mete out. I really have no idea. There was not a single bit of the discussion that was directed towards that. I felt it was more like an interview to just get to know me as...
Words: 793 - Pages: 4
...Types The two primary forms of communication are one-way communication and two-way communication. One-way communication in business is when the business sends out a message to its customers or employees, but doesnâ??t accept responses from the customers or employees. One-way communication is important because it allows the business to share information with the customers who can benefit from the companyâ??s products or services. One of the most common forms of one-way communications in business is advertising, such as print ads in newspapers and magazines on billboards are examples. Two-way communication occurs when customers can also respond to the company in business communication. Social media marketing is a form of two-way communication has gained in popularity because it not only allows businesses to communicate with its prospects and customers, but it also allows the prospects and customers to respond. Effects When communication lines are open between a business and its customers, it can directly affect the sales of the business. When a business effectively communicates to prospects and customers how its products and services can benefit them, it converts prospects into customers. Good communication ultimately boosts the bottom line of a business. Related Reading: The Importance of the Grapevine in Internal Business Communications Identification Good communication can take on several different forms. The three primary forms of communication are verbal, written...
Words: 613 - Pages: 3
...ՀՀ ԿՐԹՈՒԹՅԱՆ ԵՎ ԳԻՏՈՒԹՅԱՆ ՆԱԽԱՐԱՐՈՒԹՅՈՒՆ ՀԱՅԱՍՏԱՆԻ ՊԵՏԱԿԱՆ ԱԳՐԱՐԱՅԻՆ ՀԱՄԱԼՍԱՐԱՆ ՀԱՅՈՑ ՊԱՏՄՈՒԹՅԱՆ ԵՎ ՓԻԼԻՍՈՓԱՅՈՒԹՅԱՆ ԱՄԲԻՈՆ Ա.Ա.ԳԵՎՈՐԳՅԱՆ ԳԻՏՈՒԹՅԱՆ ՓԻԼԻՍՈՓԱՅՈՒԹՅՈՒՆ ԴԱՍԱԽՈՍՈՒԹՅՈՒՆՆԵՐԻ ՏԵՔՍՏԵՐ ԵՐԵՎԱՆ ՀՊԱՀ 2012 ՀՏԴ 001։1/14 (042.4) ԳՄԴ 72+87.3 ց7 Գ 479 Հաստատված է Հայաստանի պետական ագրարային համալսարանի գիտական խորհրդի կողմից ԳՐԱԽՈՍՆԵՐ՝ փ.գ.թ., դոցենտ Ա.Բաբաջանյան փ.գ.թ., դոցենտ Մ.Դեմիրճյան փ.գ.թ., դոցենտ Ա.Սարգսյան փ.գ.թ., դոցենտ Դ.Մոսինյան ԽՄԲԱԳԻՐ ՝ Ա.Կուրղինյան ԳԵՎՈՐԳՅԱՆ Ա.Ա. Գ 479 Գիտության փիլիսոփայություն։ Դասախոսությունների տեքստեր / Ա.Գևորգյան։ ՀՀ կրթ. և գիտ. նախարարություն.- Եր. ՀՊԱՀ, 2012.-98 էջ Ձեռնարկը նախատեսված է մագիստրատուրայի բոլոր մասնագիտությունների համար։ ՀՏԴ 001։ 1/14 (042.4) ԳՄԴ 72+87.3 ց7 ISBN 978-54-546-2 © Ա.Ա.Գևորգյան, 2012 © Հայաստանի պետական ագրարային համալսարան, 2012 Դասախոսություն I Ներածություն Ժամանակակից հասարակության կենսակերպը, համեմատելով 500, 300 կամ նույնիսկ 100 տարի գոյություն ունեցած հասարակական կենսաձևերի հետ, կտեսնենք, որ այն անասելի փոփոխություններ է կրել։ Հետադարձ հայացք նետելով մեր անցյալի վրա` վստահ կարող ենք ասել, որ հոգևոր մշակույթի ոչ մի ոլորտ, ոչ մի տարր այնքան էական ու դինամիկ ազդեցություն չի ունեցել հասարակական կենսոլորտի վերոհիշյալ ձևափոխությունների վրա, ինչպիսին որ ունեցել և ունի գիտությունը։ Ընդ որում` ոչ միայն մեզ շրջապատող իրերի առումով, այլ նաև մեր...
Words: 20143 - Pages: 81
...11111111 111 11111 11111 1111111 111111 1111111 111111 11111111 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111 11111 1111111 111111 1111111 111111 1111111 1 1111 11111111 111 11111...
Words: 406 - Pages: 2
...126 128 – 191 129 - 190 Broadcast 192 – 255 Address Borrow 3 bits S S S H H H H H # of subnets = 23 = 8 Subnet mask = 3 bits = 128 + 64 + 32 = 224 Range of hosts = 25 = 32 Range 0 – 31 32 – 63 64 – 95 96 – 127 128 – 159 160 – 191 192 – 223 224 – 255 Useable Range 33 - 62 65 - 94 97 -126 129 -158 161 -190 193 -222 Network ID Broadcast Address ©1999 Dan Foss How to Calculate Subnets Decimal/Binary Subnet Ranges Borrow 2 bits S S H H H H H H # of subnets = 22 = 4 = 00000100 Subnet mask = 2 bits = 128 + 64 = 192 = 11000000 Range of hosts = 26 = 64 = 01000000 [Range ……………………………] [Useable Range …………………...] Network ID 0 – 63 00 000000 – 00 111111 64 – 127 01 000000 – 01 111111 65 - 126 01 000001 – 01 111110 128 – 191 10 000000 – 10 111111 129 – 190 10 000001 – 10 111110 Broadcast 192 – 255 11 000000 – 11 111111 Address Borrow 3 bits S S S H H H H H # of subnets = 23 = 8 Subnet mask = 3 bits = 128 + 64 + 32 = 224 = 11100000 Range of hosts = 25 = 32 = 00100000 [Range ……………………………] Network ID 0 – 31 000 00000 – 000 11111 32 – 63 001 00000 – 001 11111 64 – 95 010 00000 – 010 11111 96 – 127 011 00000 – 011 11111 128 – 159 100 00000 – 100 11111 160 – 191 101 00000 – 101 11111 192 – 223 110 00000 – 110 11111 Broadcast 224 – 255 111 00000 – 111 11111 Address [Useable Range …………………...] 33 – 62 65 – 94 97 – 126 129 – 158 161 – 190 193 – 222 001 00001 – 001 11110 010 00001 – 010 11110 011 00001 – 011 11110 100 00001 – 100 11110 101 00001 – 101 11110 110 00001 – 110 11110 ...
Words: 942 - Pages: 4
...UML Book | -ISBN-Author-Title-Price | +over$50( ) | TextBook | -Grade | +GradeRange3to6( ) | PictureBook | -Age | +AgeRange3to4( ) | Book Class START setBook(inISBN, inAuthor, inTitle, inPrice) ISBN= inISBN Aurthor= inAuthor Title= inTitle Price= inPrice END START Over$50 validatePrice(validInput) IF validInput AND Price > 50.00 THEN Print ISBN, Author, Title, Price ENDIF END START validatePrice validate=true IF Price Not numeric THEN validInput=false Display ‘Invalid Price’, Price ENDIF END Book Driver Algorithm START testBook Create Book 1 as new Book( ) inISBN= 111111 inAuthor= ‘Test Aurthor’ inTitle= ‘Test Title’ inPrice= 55.99 Book 1.setBook(inISBN, inAuthor, intitle, inPrice) Book1.Over$50( ) END START TextBook class setTextBook(inISBN, inAuthor, inTitle, inPrice, inGrade) ISBN= inISBN Aurthor= inAurthor Title= inTitle Price= inPrice Grade=inGrade END START GradeRange3to6 validateGrade(validate) IF validInput AND Grade < 6 AND > 3 THEN Print ISBN, Author, Title, Price, Grade ENDIF END Textbook Driver Algorithm START testTextBook Create TectBook 1 as new TextBook( ) inISBN= 222222 inAuthor=’Test2 Aurthor’ inTitle=’Test2 Title’ inPrice=35...
Words: 1298 - Pages: 6
...19 remainder 1. The reminder tells you the day. Sunday 0 Monday 1 Tuesday 2 Wednesday 3 Thursday 4 Friday 5 Saturday 6 Answer: Monday Sequential Inputs of numbers with 8 1 x 8 + 1 = 9 12 x 8 + 2 = 98 123 x 8 + 3 = 987 1234 x 8 + 4 = 9876 12345 x 8 + 5 = 98765 123456 x 8 + 6 = 987654 1234567 x 8 + 7 = 9876543 12345678 x 8 + 8 = 98765432 123456789 x 8 + 9 = 987654321 Sequential 1's with 9 1 x 9 + 2 = 11 12 x 9 + 3 = 111 123 x 9 + 4 = 1111 1234 x 9 + 5 = 11111 12345 x 9 + 6 = 111111 123456 x 9 + 7 = 1111111 1234567 x 9 + 8 = 11111111 12345678 x 9 + 9 = 111111111 123456789 x 9 + 10 = 1111111111 Sequential 8's with 9 9 x 9 + 7 = 88 98 x 9 + 6 = 888 987 x 9 + 5 = 8888 9876 x 9 + 4 = 88888 98765 x 9 + 3 = 888888 987654 x 9 + 2 = 8888888 9876543 x 9 + 1 = 88888888 98765432 x 9 + 0 = 888888888 Numeric Palindrome with 1's 1 x 1 = 1 11 x 11 = 121 111 x 111 = 12321 1111 x 1111 = 1234321 11111 x 11111 = 123454321 111111 x 111111 = 12345654321 1111111 x 1111111 = 1234567654321 11111111 x 11111111 = 123456787654321 111111111 x 111111111 = 12345678987654321...
Words: 991 - Pages: 4
...+Pelican Stores 111 Pelican Road Pelican, Texas 111111 Phone: 111-111-1111 Fax: 111-111-1112 E-Mail: pelican@pelican.com Web: pelican1.com Managerial Report Group 9 Aroloye, Tinuade Knudson, Jason 02/05/12 +Pelican Stores Managerial Report 2 Introduction Based on a sample of 100 customers for Pelican Stores Net sales for the period, find below detailed sales analysis. Credit Card Payments As shown in table 1 below, it appears Proprietary card is the method of payment mostly used by customers followed by Master card, Visa, Discover and American Express. Method of Payment American Express Discover MasterCard Proprietary Card Visa Grand Total Frequency 2 4 14 70 10 100 Table 1. Relative Frequency 0.02 0.04 0.14 0.7 0.1 1 Demographics Breakdown Grouping customers on the basis of marital status and gender as shown on Table 2, it seems that Pelican stores have more married customers than single customers. Of those married customers, the majority of them are female. It appears the relevant frequency for married females and everyone else is 80% and 20% respectively. Also it seems married customers spend more money on purchases at the store more than single customers, average spend by married and singles appears to be $78.03 and $75.35 respectively (Table 6 on page 5). Pie Chart of Genders with Marital Status 4% 3% Married Female 13% Married Male Single Female 80% Single Male +Pelican Stores Managerial Report 3 Data on Regular Customer Table 3 is a...
Words: 753 - Pages: 4
...PLFS: A Checkpoint Filesystem for Parallel Applications John Bent∗† Garth Gibson‡ Gary Grider∗ Ben McClelland∗ , , , , Paul Nowoczynski§ James Nunez∗ Milo Polte† Meghan Wingate∗ , , , ABSTRACT Categories and Subject Descriptors D.4.3 [Operating Systems]: File Systems ManagementFile organization General Terms Performance, Design Keywords High performance computing, parallel computing, checkpointing, parallel file systems and IO ∗ LANL Technical Information Release: 09-02117 Los Alamos National Laboratory ‡ Carnegie Mellon University § Pittsburgh Supercomputing Center † (c) 2009 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by a contractor or affiliate of the U.S. Government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only. SC09 November 14–20, Portland, Oregon, USA. Copyright 2009 ACM 978-1-60558-744-8/09/11 ...$10.00. 100 Speedup (X) Parallel applications running across thousands of processors must protect themselves from inevitable system failures. Many applications insulate themselves from failures by checkpointing. For many applications, checkpointing into a shared single file is most convenient. With such an approach, the size of writes are often small and not aligned with file system boundaries. Unfortunately for these applications, this preferred data...
Words: 12373 - Pages: 50
...4.7 NETWORK LAYER PROTOCOLS • IP (Internet Protocol) • ICMP (Internet Control Message Protocol) • ARP (Address Resolution Protocol) • RARP (Reverse Address Resolution Protocol) 4.7.1 The IP PROTOCOL • IP represents the heart of the Internet Protocol suite • Provides the main service of the layer: data transmission in connectionless mode – datagram IP Header Format IP Header Format (Including user data, this makes an IP packet) IP Header fields: • Version - Indicates the version of IP currently used (now 4); • IP Header Length - Indicates the datagram header length in 32-bit words (value = 5); • Type-of-service - Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance through this field; • Total length - Specifies the length of the entire IP packet, including data and header, in bytes. • Identification - Contains an integer that identifies the current datagram (sequence number). This field is used for re-assembling the datagram fragments; • Flags - A 3-bit field for fragmentation control: 000 - last fragment; 001 - not last fragment; 010 - the fragmentation not allowed. • Fragment offset - measured in double-words (offset from main datagram); • Time-to-live - Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly; • Protocol - Indicates which upper-layer...
Words: 1379 - Pages: 6