Free Essay

Mod 1 Case

In:

Submitted By ataylorvb
Words 1155
Pages 5
Enforcement programs have always been required to monitor the safety of the public and there are plenty of statistics that show an increase in compliance with established regulations as a result of enforcement. I believe that it is important to implement a mandatory food safety training requirement for all restaurant employees. The health department can enforce regulations, but education always comes before enforcement. If restaurant employees are not educated in the proper food handling, preparation, and proper cleaning procedures in the kitchen then they most likely won’t understand why it is important to follow established protocols. This will guarantee failure of any type of standard enforcement inspections. Most public health departments have limited resources to perform inspections and therefore establishments may only get inspected one to six times per year depending on certain risk factors associated with the number and type of foods served. According to (National Digestive Diseases Information Clearinghouse, 2012)” Foods may also be contaminated with bacteria during food preparation in a restaurant or home kitchen. If food preparers do not thoroughly wash their hands, kitchen utensils, cutting boards, and other kitchen surfaces that come into contact with raw foods, cross-contamination—the spread of bacteria from contaminated food to uncontaminated food—may occur. If hot food is not kept hot enough or cold food is not kept cold enough, bacteria may multiply. Bacteria multiply quickly when the temperature of food is between 40 and 140 degrees. Cold food should be kept below 40 degrees and hot food should be kept above 140 degrees. Bacteria multiply more slowly when food is refrigerated, and freezing food can further slow or even stop the spread of bacteria. However, bacteria in refrigerated or frozen foods become active again when food is brought to room temperature. Thoroughly cooking food kills bacteria.”
Worker behaviors may promote or compromise food safety. Why don’t food handlers wash their hands? Why are raw meats stored over ready-to-eat foods? Why isn’t that food stored at the required temperatures? These questions address just a couple of worker behaviors that compromise food safety. Why do workers do what they do? Often it is because of one’s opinion of the perception of the seriousness of the impact, one’s opinion of an action or confidence in one’s ability to take action. Most workers will state that they didn’t realize the possible dangers or weren’t educated on the importance of cleanly procedures. The way to influence behaviors to achieve an acceptable change is to specify the consequences, increase awareness of a need for change, promote awareness and employ reminder systems, provide training and guidance in performing the action, use verbal reinforcement, and demonstrate desired behaviors. In order to accomplish these things the following must be done, demonstrate proper hand washing, use examples of restaurant foodborne outbreaks, involve the staff in mock inspections, and possibly have weekly meetings to re-emphasize key food protection points. When this occurs you will have a restaurant staff that not only exhibits proper worker behavior, but also understands why it is important. Food safety is an extremely important issue, due to the times per week the average American eats out. Cooking at home is a rarity for most families, as the busy life style is the norm in this society. We are eating tons of poultry, seafood, fruits and vegetables. While this is conducive to a healthier lifestyle it presents greater challenges when it comes to food safety. Mandating educational programs and professional training for restaurant employees is the best way to limit the spread of foodborne illness and will ultimately enhance food safety practices. This in turn will be reflected in a reduction of reportable public health illnesses that occur as a result of improper food preparation or handling and be evident during future enforcement inspections. Now I will be discussing the second point of this paper. According to MedicineNet.com (2012) “Vectors are a carrier of disease or of medication. For example, in malaria a mosquito is the vector that carries and transfers the infectious agent”. The first thing that I would do is contact the Center of Disease Control (CDC) and the Environmental Protection Agency (EPA). I would contact these agencies because my local health department is very limited on its personnel and financial resources, however, I would still involve them. The CDC and the EPA have greater resources to provide and may be able to assist in providing recommendations. The increased mosquito population in the community is a serious problem as proven by the deaths related to West Nile Virus. In an effort to control and combat the mosquito population the number one recommendation I would give the community would be to limit the amount of free standing water around living areas, treat swimming pools and make sure they are continuously circulating, keep rain gutters on homes unclogged, and keep all doors closed. Since funds are limited, I would establish a community outreach program to educate members of the community on the proper use of insect repellents. I would set up a donation center so that members of the community with more money and income can donate repellents available at no cost to lower income communities to increase compliance. According to the literature, the West Nile Virus is a mosquito-borne disease. People get infected with the virus when they are bitten by an infected mosquito. The mosquitoes become infected with the virus when they feed on infected birds. The infected mosquitoes can spread the virus to humans and animals that they bite. I would educate the community so they would know that the virus is not spread through the air or by contact. In an effort to prevent the spread of the West Nile virus, I would recommend to the community to use mosquito control measures to reduce the risk of being bit by mosquitoes. In addition, I would inform the community to be on the lookout for dead birds and tree squirrels and report them to local public health departments. This can indicate the presence of the virus and the health departments will want to test the dead animal for the virus. This allows the public health department to use the information for surveillance purposes. If the mosquito problem didn’t get better, I would advise that the members of the community stay indoors and try to avoid going outside if need be. Mosquitoes have, and always will be, around community areas. It is very important that the communities take measures to keep their kids, and themselves, from getting bit. We can educate, but it always comes down to people doing the smart thing and avoiding things that will cause them to get bitten.

References
National Digestive Diseases Information Clearinghouse (2012). Retrieved on April 6, 2013 from http://digestive.niddk.nih.gov/ddiseases/pubs/bacteria/
Definition of Vector (2012). Retrieved on April 7, 2013 from http://www.medterms.com/script/main/art.asp?articlekey=5968

Similar Documents

Free Essay

Bus599 Mod 1 Case

...MBA Integrative Project BUS599 Module 1 Strategic Review Skype FOR Dr. Harry Hascall From: William E. Lopez-Valentin Date: Jul 23, 2012 Trident University Strategic Analysis of Skype Introduction This paper will present a strategic analysis of Skype. I will discuss Skype Mission, Vision, Values, Goals / Objectives and strategic business. Skype was founded in Luxembourg in 2003, by Niklas Zennstrom and Janus Friis, creators of Kazaa, software designed to share music and movies. Throughout its history, framed by investment offers and sales of the company, Skype remains a large and prized signature in the world of technology. In 2005, eBay the product auction site through internet bought Skype for 2.6 billion dollars. Before the end of that year, the company introduced one of its flagship services: video calling. In 2006, Skype reached 100 million users worldwide. In the same year, it released version 3.0 of its software for Windows and 2.0 for Mac. From conception to acquisition Since in the changing world of technology everything cannot be 'rosy', in 2008 Skype began to have conflicts with eBay. On the one hand, the service implemented to enhance communication between buyers and sellers in the online auction service; was not leaving the desired results. On the other hand, the old system developers sued eBay for licenses used had expired. In 2009, eBay ended up selling 70% of Skype for 2.7 billion dollars to the group Silver Lake...

Words: 2550 - Pages: 11

Free Essay

Mhm502 Case Study Mod 1

...MHM502 Case Study Module 1 Health Care Finance 12 June 2015 Identify the distribution of national health spending by type of financing source. Identify the distribution of health insurance coverage among the U.S. population. Discuss the impact of the Patient Protection and Affordable Care Act and the difficulties that might be encountered by those mandated to participate. Discuss the origin of employment-based health insurance. Explain the difference between fully insured and self-insured health plans. In the most recent survey identified, the distribution of national health spending for calendar year 2002 it was noted that the public sector accounted for 56.1 percent of health spending within the civilian noninstitutionalized population. Public spending on health care among the civilian, noninstitutionalized population averaged $2,612 per person (2002 dollars). Tax subsidies averaged $745 per person. Public spending averaged more than half of total health spending. Age, sex, and race/ethnicity. Public spending was strongly related to age. Children age eighteen or under received $1,225 of public spending apiece, on average, which was less than one-fifth of average public spending for seniors ($6,921). This is not surprising, given that total expenditures rise with age. What is more interesting is that public spending as a share of total spending was ten percentage points higher for seniors than for children, despite much-publicized expansions in children's eligibility...

Words: 1650 - Pages: 7

Premium Essay

Tui Acc 501 Mod 1 Case

...Trident University International ACC501 Case Assignment #1 Core Faculty: Dr. Timothy Brown Introduction The purpose of the following paper is to address common terms used in accounting, to include Generally Accepted Accounting Principles (GAAP), double entry accounting, historical cost, accrual basis vs. cash basis accounting and current assets and liabilities vs. non-current items. I will also describe the general organization of the following three companies; Apple, Inc., Swatch Group, and Nikon. In doing so, I will attempt to determine and demonstrate what is more useful – net income or cash from operating activities. Part I The field of accounting can be understood as the art of analyzing and interpreting data. Every organization uses a form of accounting in its day-to-day operations. While some may use it knowingly or unknowingly, nonetheless, accounting is an indispensable method in understanding any business/endeavor in today's global marketplace. It is the means of providing the financial information of any given organization. It summarizes all the company’s transactions and provides a clear image of the business. Accounting keeps the record of all financial reports which is very important for all the managers and stakeholders, such as shareholders, creditors or owners. Among the terms that are necessary to be familiar with and understand are the following: Generally Accepted Accounting Principles (US GAAP) – Accountants use Generally...

Words: 1405 - Pages: 6

Premium Essay

Mgt 599 Mod 1 Case Assignment

...Trident University International XXXXXXXXXXX MGT-599 Module Case Assignment #1 Coordinating Professor: XXXXXXXXXXXX 21 April 2014 Introduction Kraft Foods Inc. is a publically traded food company that has been around since 1980, based originally in Delaware and has expanded into a globally recognized food company that was a spin-off from Mondelez International. The Kraft foods brand is synonymous with other well known brands like General Mills and Hines and their products can be found in almost every home in America. They make a variety of food products in the beverage, dressings and cheeses, refrigerated meals, meals & desserts, enhancers and snacks, to include other owned brands such as Canada. The company exists in the highly competitive market where advertising dollars spent directly correlate to revenue gained. According to Kraft Food’s 2013 annual report they compete “primarily on the basis of product quality and innovation, brand recognition and loyalty, service, the ability to identify and satisfy consumer preferences, the introduction of new products and the effectiveness of our advertising campaigns and marketing programs, and price” (Vernon, 2013). Their stated strategy for “improving our market position or introducing a new product requires substantial advertising and promotional expenditures” (Vernon, 2013). This shows a strong level a strategic thinking and planning within the company even though they are highly focused on competition through...

Words: 1678 - Pages: 7

Free Essay

Hht Task 1

...A. Rounding and Truncation A1-A2. To determine if Student 1 will receive an A, we must first calculate the percentage. Divide the total points earned by the total points possible. THis gives us a solution of .895 or 89.5%. Next we round up to the nearest whole number. When rounding, we focus on the digit to the right of the digit we are trying to round. If it is 5 or greater, we round up by adding one. If it is less than 5, then we leave the digit alone. 89.5% rounds up to 90%. Student 1 will receive an A. If the teacher were truncate the grade, then the student would not receive an A. He/she would only have a 89% because we drop all digits to the right of the digit to be truncated. A3a. A taxpayer would hope for the tax rate to be truncated because they would owe less taxes. You are basically erasing everything behind the decimal with truncation. Thus the resulting number will always be smaller. This is ideal especially whenever dealing money owed. In this case the taxpayer would have a tax rate of 27%. A3b. The government obviously prefers taxpayers to round, due to the possibility of a higher tax rate. If the digit to the right of the digit to be rounded is 5 or greater, then we add a 1 when rounding. So in this example the tax rate would increase to 28%. Let’s say the taxpayer makes $80,000 a year. The government would be due an extra $800. Now if you multiply this by several taxpayers, and it’s evident how much more the government will benefit from simply rounding...

Words: 1016 - Pages: 5

Free Essay

Rrod Guide

...1 1 The Xbox 360 3 Red Lights of Death Repair Guide: How we fixed our Xbox 360 within an hour without experience! By: James Dean 2 2 Table of Contents Introduction Tips Tools and Hardware Disassembling Xbox 360 Removing X- Clamps Mod 1 – Keep it cool Mod 2 – Screw it Mod 3 – “Baker, baker” Start it up 4 5 6-7 8-23 24-25 26-29 30-34 35-43 41 3 3 Introduction Dear Xbox 360 Ring of Death Victim, You are reading this E-book because you want to fix your Xbox 360 and eliminate the 3 Red Lights problem without having to send it out for repairs. You also do not want to spend $140.00 and have to wait weeks to get back to your Xbox 360. This picture guide and videos have been created to show you in full detail how to fix your own Xbox 360 within the next hour. The reason your Xbox 360 has the 3 Red Lights problem is because you have encountered a hardware problem that is linked to overheating and the solder is not holding up. We have tested and found methods that work. This fix does involve taking your Xbox360 apart and requires tools and hardware to fix the 3 Red Lights. Our fully detailed guide will make disassembling and assembling your Xbox 360 very easy. Good Luck! James Dean 4 4 Tips  Follow each and every step as directed in the detailed guide.  Have all tools and hardware ready before beginning.  Make sure your work area is not on carpet; static is your worst enemy when handling internal pieces in your Xbox 360.  All hardware required is available...

Words: 3009 - Pages: 13

Premium Essay

Mhe 512 Module 1 Case Assignment

...Trident University Module #1 – Case Assignment MHE 512 – Disaster Relief Objectives:  For this case you are discuss the response by government, NGOs and volunteer groups to Hurricane Katrina. The question for you to answer is whether or not the organizational structure for disaster response for the City of New Orleans, State of Louisiana, and FEMA was adequate to effectively respond to a Cat. 3 - 5 hurricane on August 26th, 2005. As you respond to this question please complete the following: o Review the various reports concerning the Katrina response and relief efforts. Identify an example of a relief effort which was successful and one which was unsuccessful. o Discuss the reasons why the examples you cited above were or were not successful. Comment specifically on whether you believe that the organizational structure at the City of New Orleans, State of Louisiana, and the Federal government was adequate, including communications and command and control. (Please refer to the Organization Structure for incident management in the National Response Plan.) Focus on how coordinating structures, processes, and protocols were employed to manage the disaster response. Discuss the importance of social networks during the Katrina Disaster. Please review the following (referenced) article and comment on the importance of social networks during a disaster response.  ~ 1 of 11 ~ MHE 512- MOD 1 - Case Introduction to Disaster Relief; Organizational Structure of Relief Organizations;...

Words: 1972 - Pages: 8

Free Essay

Student

...encryption method we get the following steps: 1. Two prime numbers p = 11 and q = 7 2. Compute n = pq and z = (p – 1)(q – 1) 3. n = pq = (11)(7) = 77 4. z = ( p – 1 )( q – 1 ) = ( 11 – 1)( 7 – 1) = (10)(6) = 60 5. Choose a number e < n such that it has no common factors with z other than 1 6. So here we are choosing k = 7 7. Thus, the encrypted value c of the plain text message m is: 8. c = me mod n Now, using the alphabet such that the letters are numbered 1 through 26 we get Plain Text | h | e | l | l | o | Number | 8 | 5 | 12 | 12 | 15 | Encrypted value | 8 | 10 | 17 | 17 | 15 | Plain Text: h e l l o Number: 8 5 12 12 15 Where, 87 mod 77 = 57 57 mod 77 = 47 127 mod 77 = 12 127 mod 77 = 12 157 mod 77 = 71 Encrypted value 57 47 12 12 71 SOLUTION: This gives the encrypted value of the word “hello” as 57 47 12 12 71 DECRYPTION: Using the RSA Decryption method we get the following steps: 1. Find a number d such that ed divided z has a remainder of 1 2. Using the extended Euclidean algorithm to find the inverse modulo 35 3. We get d = 43 4. The public key becomes K+B or the number pair (n, e) and the private key becomes K-B or the number pair (n, d) In order to decrypt the message c, calculate: m = cd mod n Thus, we get: Encrypted value 57 47 12 12 71 Where 5743 mod 77 = 8 47743mod 77 = 5 1243 mod 77 = 12 1243 mod 77 = 12 7143 mod 77 = 15 Encrypted Number: 8 5 12 12 15 ...

Words: 372 - Pages: 2

Premium Essay

Crhypho

...PRACTICE FOURTH EDITION WILLIAM STALLINGS Copyright 2006: William Stallings -2- © 2006 by William Stallings All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author. -3- NOTICE This manual contains solutions to all of the review questions and homework problems in Cryptography and Network Security, Fourth Edition. If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to ws@shore.net. An errata sheet for this manual, if needed, is available at ftp://shell.shore.net/members/w/s/ws/S. W.S. -4- TABLE OF CONTENTS Chapter 1: Chapter 2: Chapter 3: Chapter 4: Chapter 5: Chapter 6: Chapter 7: Chapter 8: Chapter 9: Chapter 10: Chapter 11: Chapter 12: Chapter 13: Chapter 14: Chapter 15: Chapter 16: Chapter 17: Chapter 18: Chapter 19: Chapter 20: Introduction ..................................................................................................5 Classical Encryption Techniques ...............................................................7 Block Ciphers and the Date Encryption Standard ................................13 Finite Fields .................................................................................................21 Advanced Encryption Standard ..............................................................28 More on Symmetric Ciphers...

Words: 21497 - Pages: 86

Premium Essay

None Verbal Communication

...Front Office Management 1 Front Office Operations & Service 1 Non-verbal communication is often subtle and can include body language, tone of voice, and gestures so in this case, Drew – a bell attendant gave an audible sign and muttered loudly about amount of tips. When the guests came into the lobby, he was standing and leaning against the front desk - in the place where no one can see him. After guest’s check in, they needed the assistance and at that time Drew just walked away. He heard the radio call him and he ignored the cue from MOD. He went to find Jim, the second bell attendant. When Jim interacts with guest waiting for the luggage, the main problem will be for him, is that the atmosphere the attitude he created and the mood he destroyed by making guest’s wait. All the bell attendants act like they are bosses. They only work for the tips, however in the contract they already have the 15% tips on every room charge whether guests used service or not. The bell attendant is usually the first representative of the establishment who meets face-to-face with the guest and this meeting can therefore have a lasting impression. The moment the bell attendant identifies a guest; they should immediately acknowledge them and not wait for the guest to make the first move and not wait to ask. When guests arrive the bell attendant should welcome them warmly, the establishment may have a protocol for greeting guests. As part of the greeting, offer assistance to guests. Check...

Words: 401 - Pages: 2

Free Essay

Algorithm

...1. Illustrate the operation of Radix_sort on the following list of English words: cow, dog, seq, rug, row, mob, box tab, bar ear, tar, dig, big, tea, now, fox. ANSWER: It is a sorting algorithm that is used to sort numbers. We sort numbers from least significant digit to most significant digit. In the following array of words, three is the maximum number of digits a word has, hence the number of passes will be three. In pass 1, sort the words alphabetically using first letter from the right. For eg, tea has “a” as the last letter, hence it comes first, similarly mob which has “b” as the last letter comes second. In this way the remaining words are sorted. In pass 2, sort the words alphabetically using second letter from the right. For eg, tab has “a” as its middle letter which comes first, then comes bar and so on. In pass 3, sort the words alphabetically using third letter from the right. For eg, bar has “b” as its first letter from left and since no word starts with “a”, bar will appear first. Similarly, big, box, cow and so on. UNSORTED ARRAY | PASS 1 | PASS 2 | PASS 3(SORTED ARRAY) | cow | tea | tab | bar | dog | mob | bar | big | seq | tab | ear | box | rug | rug | tar | cow | row | dog | tea | dig | mob | dig | seq | dog | box | big | dig | ear | tab | seq | big | fox | bar | bar | mob | mob | ear | ear | dog | now | tar | tar | cow | row | dig | cow | row | rug | ...

Words: 1470 - Pages: 6

Premium Essay

Proofs of Discreet Mathematics

...LOGICAL INFERENCE & PROOFs Debdeep Mukhopadhyay Dept of CSE, IIT Madras Defn • A theorem is a mathematical assertion which can be shown to be true. A proof is an argument which establishes the truth of a theorem. Nature & Importance of Proofs • In mathematics, a proof is: – a correct (well-reasoned, logically valid) and complete (clear, detailed) argument that rigorously & undeniably establishes the truth of a mathematical statement. • Why must the argument be correct & complete? – Correctness prevents us from fooling ourselves. – Completeness allows anyone to verify the result. • In this course (& throughout mathematics), a very high standard for correctness and completeness of proofs is demanded!! Overview • Methods of mathematical argument (i.e., proof methods) can be formalized in terms of rules of logical inference. • Mathematical proofs can themselves be represented formally as discrete structures. • We will review both correct & fallacious inference rules, & several proof methods. Applications of Proofs • An exercise in clear communication of logical arguments in any area of study. • The fundamental activity of mathematics is the discovery and elucidation, through proofs, of interesting new theorems. • Theorem-proving has applications in program verification, computer security, automated reasoning systems, etc. • Proving a theorem allows us to rely upon on its correctness even in the most critical scenarios. Proof Terminology • Theorem ...

Words: 2416 - Pages: 10

Premium Essay

Discrete Log Problem

...1. Introduction Initially, the encryption of message was based on symmetric key cryptography where sender and receiver of message use the same key for encryption and decryption.But, to use the same key, sender and receiver must share the key in advance. And if their locations are different than there is risk in transmission of the key. Later in 1976,a cryprosystem,which is known as Diffie-hellman key-exchange, was published by Whitefield Diffie and Martin Hellman and concept behind the cryptosystem is known as public key encryption. In public key cryptosystem, each one gets a pair of keys, public key and private key. The pubic key is freely available to everyone while the private key remains secret. The sender, who wants to send a message securely to someone, use public key of receiver to encrypt the message and receiver use his private key to decrypt the message.This system doesn’t require secure key transmission.So, it resolves the one of the problem faced by symmetric key cryptosystem. If someone is able to compute respective private key from a given public key, then this system is no more secure. So, Public key cryptosystem requires that calculation of respective private key is computationally impossible from given public key. In most of the Public key cryptosystem, private key is related to public key via Discrete Logarithm. Examples are Diffie-Hellman Key Exchange, Digital Signature Algorithm (DSA), Elgamal which are based on DLP in finite multiplicative group. 1 2. Discrete...

Words: 1261 - Pages: 6

Premium Essay

Hhhhhhhhhhh

...Differential effects of incentive motivators on work performanceAlexander D Stajkovic, Fred Luthans. Academy of Management Journal. Briarcliff Manor: Jun 2001. Vol. 44, Iss. 3; pg. 580, 11 pgs | Abstract (Summary) In this field experiment, first compared is the performance effects of money systematically administered through the organizational behavior (O.B Mod.) modification model and routine pay for performance. This was compared with the effects of O.B Mod.-administered money, social recognition, and performance feedback. The money intervention based on the O.B. Mod. outperformed routine pay for performance and also had stronger effects on performance than social recognition and performance feedback. Full Text (7144  words) Copyright Academy of Management Jun 2001 [Headnote] | In this field experiment, we first compared the performance effects of money systematically administered through the organizational behavior modification (O.B. Mod.) model and routine pay for performance and then compared the effects of O.B. Mod.administered money, social recognition, and performance feedback. The money intervention based on the O.B. Mod. outperformed routine pay for performance (performance increase = 37% vs. 11%) and also had stronger effects on performance than social recognition (24%) and performance feedback (20%). | | Although behavioral management, as a systematic approach to increasing employee effectiveness, was formulated about 25 years ago (e.g., Luthans & Kreitner...

Words: 6534 - Pages: 27

Premium Essay

Statistic

...Value of Money OVERVIEW OF EXERCISES, PROBLEMS, AND CASES Estimated Time in Learning Objective Exercises Minutes Level 1. Identify the components of the current liability category of 1 10 Easy the balance sheet. 2 10 Easy 3 10 Easy 2. Examine how accruals affect the current liability category. 4 20 Mod 5 15 Mod 6 10 Mod 7 15 Mod 8 15 Mod 3. Demonstrate an understanding of how changes in current liabilities 9 5 Easy affect the statement of cash flows. 10 5 Mod 11 5 Mod 4. Determine when contingent liabilities should be presented on the 12 15 Mod balance sheet or disclosed in notes and how to calculate their amounts. 5. Explain the difference between simple and compound interest. 13 20 Mod 6. Calculate amounts using the future value and present value concepts. 14 5 Easy 15 5 Mod 16 10 Mod 17 10 Mod 24* 10 Diff 25* 10 Diff 7. Apply the compound interest concepts to some common 18 5 Mod accounting situations. 19 10 Mod 20 10 Diff 24* 10 Diff 25* 10 Diff 8. Demonstrate an understanding of the deductions 21 15 Mod and expenses for payroll accounting. (Appendix 9A) 22 20 Mod 9. Determine when compensated absences must be 23 10 Diff accrued as a liability. (Appendix 9A) *Exercise, problem, or case covers two or more learning objectives Level = Difficulty levels: Easy; Moderate (Mod); Difficult (Diff) Problems Estimated and Time...

Words: 11002 - Pages: 45