Summary

HandWiki is the world's largest wiki-style encyclopedia dedicated to science, technology and computing. It allows you to create and edit articles as long as you have external citations and login account. In addition, this is a content management environment that can be used for collaborative editing of original scholarly content, such as books, manuals, monographs and tutorials.

Expand All
Entries
Topic Review
Slender Glass Lizard
The slender glass lizard (Ophisaurus attenuatus) is a legless lizard in the Glass Lizard subfamily (Anguinae) The species is endemic to the United States. Two subspecies are recognized. The lizard was originally believed to be a subspecies of the eastern glass lizard (Ophisaurus ventralis). Their name comes from their easily broken tail which they can break off themselves without ever being touched. It is difficult to find a specimen with an undamaged tail. The lizard eats a variety of insects and small animals, including smaller lizards. Snakes and other animals are known to prey on the species. Humans have a part in destroying their environment and killing their food supply with insecticides. The lizard is considered to be a least-concern species according to the International Union for Conservation of Nature (IUCN), though it is vulnerable in Iowa and endangered in Wisconsin. It is important to note that the streamlined, legless species is often confused with snakes. Glass Lizards, however, differ from snakes as they possess a moveable eyelid, which is absent in snakes. Another way to distinguish glass lizards from snakes is the presence of an external ear opening, which are absent in snakes.
  • 1.6K
  • 01 Nov 2022
Topic Review
Fixed Exchange-Rate System
A fixed exchange rate, sometimes called a pegged exchange rate, is a type of exchange rate regime in which a currency's value is fixed against either the value of another single currency to a basket of other currencies or to another measure of value, such as gold. There are benefits and risks to using a fixed exchange rate. A fixed exchange rate is typically used to stabilize the value of a currency by directly fixing its value in a predetermined ratio to a different, more stable, or more internationally prevalent currency (or currencies) to which the value is pegged. In doing so, the exchange rate between the currency and its peg does not change based on market conditions, unlike flexible exchange regime. This makes trade and investments between the two currency areas easier and more predictable and is especially useful for small economies that borrow primarily in foreign currency and in which external trade forms a large part of their GDP. A fixed exchange-rate system can also be used to control the behavior of a currency, such as by limiting rates of inflation. However, in doing so, the pegged currency is then controlled by its reference value. As such, when the reference value rises or falls, it then follows that the value(s) of any currencies pegged to it will also rise and fall in relation to other currencies and commodities with which the pegged currency can be traded. In other words, a pegged currency is dependent on its reference value to dictate how its current worth is defined at any given time. In addition, according to the Mundell–Fleming model, with perfect capital mobility, a fixed exchange rate prevents a government from using domestic monetary policy to achieve macroeconomic stability. In a fixed exchange-rate system, a country’s central bank typically uses an open market mechanism and is committed at all times to buy and/or sell its currency at a fixed price in order to maintain its pegged ratio and, hence, the stable value of its currency in relation to the reference to which it is pegged. To maintain a desired exchange rate, the central bank during the depreciation of the domestic money, sells its foreign money in the reserves and buys back the domestic money. This creates an artificial demand for the domestic money, which increases its exchange rate. In case of an undesired appreciation of the domestic money, the central bank buys back the foreign money and thus flushes the domestic money into the market for decreasing the demand and exchange rate. The central bank from its reserves also provides the assets and/or the foreign currency or currencies which are needed in order to finance any imbalance of payments. In the 21st century, the currencies associated with large economies typically do not fix or peg exchange rates to other currencies. The last large economy to use a fixed exchange rate system was the People's Republic of China, which, in July 2005, adopted a slightly more flexible exchange rate system, called a managed exchange rate. The European Exchange Rate Mechanism is also used on a temporary basis to establish a final conversion rate against the euro from the local currencies of countries joining the Eurozone.
  • 7.7K
  • 02 Nov 2022
Topic Review
Critical Incident Technique
The Critical Incident Technique (or CIT) is a set of procedures used for collecting direct observations of human behavior that have critical significance and meet methodically defined criteria. These observations are then kept track of as incidents, which are then used to solve practical problems and develop broad psychological principles. A critical incident can be described as one that makes a contribution—either positively or negatively—to an activity or phenomenon. Critical incidents can be gathered in various ways, but typically respondents are asked to tell a story about an experience they have had. CIT is a flexible method that usually relies on five major areas. The first is determining and reviewing the incident, then fact-finding, which involves collecting the details of the incident from the participants. When all of the facts are collected, the next step is to identify the issues. Afterwards a decision can be made on how to resolve the issues based on various possible solutions. The final and most important aspect is the evaluation, which will determine if the solution that was selected will solve the root cause of the situation and will cause no further problems.
  • 1.2K
  • 01 Nov 2022
Topic Review
History of Intersex Surgery
The history of intersex surgery is intertwined with the development of the specialities of pediatric surgery, pediatric urology, and pediatric endocrinology, with our increasingly refined understanding of sexual differentiation, with the development of political advocacy groups united by a human qualified analysis, and in the last decade by doubts as to efficacy, and controversy over when and even whether some procedures should be performed. Prior to the medicalization of intersex, Canon and common law referred to a person's sex as male, female or hermaphrodite, with legal rights as male or female depending on the characteristics that appeared most dominant. The foundation of common law, the Institutes of the Lawes of England described how a hermaphrodite could inherit "either as male or female, according to that kind of sexe which doth prevaile." Single cases have been described by legal cases sporadically over the centuries. Modern ideas of medicalization of intersex and birth defects can be traced to French anatomist Isidore Geoffroy Saint-Hilaire (1805–1861), who pioneered the field of teratology. Since the 1920s surgeons have attempted to "fix" an increasing variety of conditions. Success has often been partial and surgery is often associated with minor or major, transient or permanent complications. Techniques in all fields of surgery are frequently revised in a quest for higher success rates and lower complication rates. Some surgeons, well aware of the immediate limitations and risks of surgery, feel that significant rates of imperfect outcomes are no scandal (especially for the more severe and disabling conditions). Instead they see these negative outcomes as a challenge to be overcome by improving the techniques. Genital reconstruction evolved within this tradition. In recent decades, nearly every aspect of this perspective has been called into question, with increasing concern regarding the human rights implications of medical interventions.
  • 4.0K
  • 01 Nov 2022
Topic Review
Threat (Computer)
In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application. A threat can be either a negative "intentional" event (i.e. hacking: an individual cracker or a criminal organization) or an "accidental" negative event (e.g. the possibility of a computer malfunctioning, or the possibility of a natural disaster event such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event. This is differentiated from a threat actor who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact. A more comprehensive definition, tied to an Information assurance point of view, can be found in "Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems" by NIST of United States Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability. National Information Assurance Glossary defines threat as: Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. ENISA gives a similar definition: Any circumstance or event with the potential to adversely impact an asset [G.3] through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. The Open Group defines threat as: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events,etc.); malicious actors; errors; failures. Factor analysis of information risk defines threat as: threats are anything (e.g., object, substance, human, etc.) that are capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a flood, as is a hacker. The key consideration is that threats apply the force (water, wind, exploit code, etc.) against an asset that can cause a loss event to occur. National Information Assurance Training and Education Center gives a more articulated definition of threat: The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. Categorize and classify threats as follows: Categories Classes Human Intentional Unintentional Environmental Natural Fabricated 2. Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification or data, and/or denial of service. 3. Any circumstance or event with the potential to cause harm to the ADP system or activity in the form of destruction, disclosure, and modification of data, or denial of service. A threat is a potential for harm. The presence of a threat does not mean that it will necessarily cause actual harm. Threats exist because of the very existence of the system or activity and not because of any specific weakness. For example, the threat of fire exists at all facilities regardless of the amount of fire protection available. 4. Types of computer systems related adverse events (i. e. , perils) that may result in losses. Examples are flooding, sabotage and fraud. 5. An assertion primarily concerning entities of the external environment (agents); we say that an agent (or class of agents) poses a threat to one or more assets; we write: T(e;i) where: e is an external entity; i is an internal entity or an empty set. 6. An undesirable occurrence that might be anticipated but is not the result of a conscious act or decision. In threat analysis, a threat is defined as an ordered pair, <peril; asset category>, suggesting the nature of these occurrences but not the details (details are specific to events). 7. The potential violation of security. 8. A set of properties of a specific external entity (which may be either an individual or class of entities) that, in union with a set of properties of a specific internal entity, implies a risk (according to a body of knowledge).
  • 2.7K
  • 02 Nov 2022
Topic Review
Neo (Constructed Language)
Neo is a constructed international auxiliary language created by Arturo Alfandari, a Belgian diplomat of Italian descent. The language combines features of Esperanto, Ido, Novial and Volapük. The root base of the language and grammar (in contrast to that of Esperanto and Ido) are closely related to that of the French language, with some English influences.
  • 1.2K
  • 01 Nov 2022
Topic Review
Njangsa
The term Njangsa refers to an oily seeds tree, Ricinodendron heudelotii, found in tropical West Africa. It is also known as Munguella (Angola), Essessang (Cameroon), Bofeko (Zaire), Wama (Ghana), Okhuen (Nigeria), Kishongo (Uganda), Akpi (Côte d'Ivoire), Djansang, Essang, Ezezang and Njasang. Two varieties of the tree species are recognized R. heudelotii var. heudelotii in Ghana and R. heudelotii var. africanum in Nigeria and Westwards.
  • 2.3K
  • 01 Nov 2022
Topic Review
Conjunction
In astronomy, a conjunction occurs when two astronomical objects or spacecraft have either the same right ascension or the same ecliptic longitude, usually as observed from Earth. When two objects always appear close to the ecliptic—such as two planets, the Moon and a planet, or the Sun and a planet—this fact implies an apparent close approach between the objects as seen in the sky. A related word, appulse, is the minimum apparent separation in the sky of two astronomical objects. Conjunctions involve either two objects in the Solar System or one object in the Solar System and a more distant object, such as a star. A conjunction is an apparent phenomenon caused by the observer's perspective: the two objects involved are not actually close to one another in space. Conjunctions between two bright objects close to the ecliptic, such as two bright planets, can be seen with the naked eye. The astronomical symbol for conjunction is (Unicode U+260C ☌). The conjunction symbol is not used in modern astronomy. It continues to be used in astrology.
  • 3.1K
  • 01 Nov 2022
Topic Review
DRDO Rustom
The DRDO Rustom (English: Warrior) is a Medium Altitude Long Endurance unmanned air vehicle (UAV) being developed by Defence Research and Development Organisation for the three services, Indian Army, Indian Navy and the Indian Air Force of the Indian Armed Forces. Rustom is derived from the NAL's LCRA (Light Canard Research Aircraft) developed by a team under the leadership of late Prof Rustom Damania in the 1980s. The UAV will have structural changes and a new engine. Rustom will replace/supplement the Heron UAVs in service with the Indian armed forces.
  • 5.7K
  • 02 Nov 2022
Topic Review
Venus (Planet)
Venus is the second-closest planet to the Sun, orbiting it every 224.7 Earth days. After Earth's Moon, it is the brightest object in the night sky, reaching an apparent magnitude of −4.6. As an inferior planet from Earth it never appears to venture far from the Sun, and its elongation reaches a maximum of 47.8°. Venus reaches its maximum brightness shortly before sunrise or shortly after sunset, and is often referred to as the Morning Star or as the Evening Star. A terrestrial planet, it is sometimes called Earth's "sister planet", as the two are similar in size and bulk composition. The planet is covered with an opaque layer of highly reflective clouds and its surface cannot be seen from space in visible light, making it a subject of great speculation until some of its secrets were revealed by planetary science in the 20th century. Venus has the densest atmosphere of the terrestrial planets, consisting mostly of carbon dioxide, and the atmospheric pressure at the planet's surface is 90 times that of the Earth. Venus' surface has been mapped in detail only in the last 20 years. It shows evidence of extensive volcanism, and some of its volcanoes may still be active today. In contrast to the constant crustal movement seen on Earth, Venus is thought to undergo periodic episodes of plate tectonics, in which the crust is subducted rapidly within a few million years separated by stable periods of a few hundred million years. The planet is named after Venus, the Roman goddess of love, and most of its surface features are named after famous and mythological women. The adjective Venusian is commonly used for items related to Venus, though the Latin adjective is the rarely used Venereal; the now-archaic Cytherean is still occasionally encountered.
  • 2.4K
  • 01 Nov 2022
  • Page
  • of
  • 863
>>