Author: Admin

Submitted by: Dennisng Ng

Question: 1

Which three statements are true about the operation of a full-duplex Ethernet network? (Choose three.)

A. There are no collisions in full-duplex mode.

B. A dedicated switch port is required for each full-duplex node.

C. Ethernet hub ports are preconfigured for full-duplex mode.

D. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.

E. The host network card and the switch port must be capable of operating in full-duplex mode.

Answer: A, B, E

Explanation:

Half-duplex Ethernet is defined in the original 802.3 Ethernet and Cisco says you only use one wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernettypically 10BaseTis only about 30 to 40 percent efficient as Cisco sees it, because a large 10BaseT network will usually only give you 3- to 4Mbpsat most.

Full-duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. Also, full duplex uses a point-to-point connection between the transmitter of the transmitting device and the receiver of the receiving device, which means that with full-duplex data transfer, you get a faster data transfer compared to half duplex. And because the transmitted data is sent on a different set of wires than the received data, no collisions occur. The reason you dont need to worry about collisions is because now Full-duplex Ethernet is like a freeway with multiple lanes instead of the single-lane road provided by half duplex. Full-duplex Ethernet is supposed to offer 100 percent efficiency in both directions; this means you can get 20Mbps with a 10Mbps Ethernet running full duplex, or 200Mbps for FastEthernet.

Question: 2

DRAG DROP

On the left are various network protocols. On the right are the layers of the TCP/IP model. Assuming a reliable connection is required, move the protocols on the left to the TCP/IP layers on the right to show the proper encapsulation for an email message sent by a host on a LAN. (Not all options are used.)

Answer:

Question: 3

Which OSI layer header contains the address of a destination host that is on another network?

A. application

B. session

C. transport

D. network

E. data link

F. physical

Answer: D

Explanation:

Only network address contains this information. To transmit the packets the sender uses network address and datalink address. But the layer 2 address represents just the address of the next hop device on the way to the sender. It is changed on each hop. Network address remains the same.

Question: 4

Which layer of the TCP/IP stack combines the OSI model physical and data link layers?

A. Internet laye

B. transport laye

C. application laye

D. network access laye

Answer: D

Explanation:

The Internet Protocol Suite, TCP/IP, is a suite of protocols used for communication over the internet. The TCP/ IP model was created after the OSI 7 layer model for two major reasons. First, the foundation of the Internet was built using the TCP/IP suite and through the spread of the World Wide Web and Internet, TCP/IP has been preferred. Second, a project researched by the Department of Defense (DOD) consisted of creating the TCP/IP protocols. The DOD’s goal was to bring international standards which could not be met by the OSI model.

Since the DOD was the largest software consumer and they preferred the TCP/IP suite, most vendors used this model rather than the OSI. Below is a side by side comparison of the TCP/IP and OSI models.

Question: 5

Which protocol uses a connection-oriented service to deliver files between end systems?

A. TFTP

B. DNS

C. FTP

D. SNMP

E. RIP

Answer: C

Explanation:

TCP is an example of a connection-oriented protocol. It requires a logical connection to be established between the two processes before data is exchanged. The connection must be maintained during the entire time that communication is taking place, then released afterwards. The process is much like a telephone call, where a virtual circuit is established–the caller must know the person’s telephone number and the phone must be answered–before the message can be delivered.

TCP/IP is also a connection-oriented transport with orderly release. With orderly release, any data remaining in the buffer is sent before the connection is terminated. The release is accomplished in a three-way handshake between client and server processes. The connection-oriented protocols in the OSI protocol suite, on the other hand, do not support orderly release. Applications perform any handshake necessary for ensuring orderly release.

Examples of services that use connection-oriented transport services are telnet, rlogin, and ftp.

Question: 6

Refer to the exhibit.

If the hubs in the graphic were replaced by switches, what would be virtually eliminated?

A. broadcast domains

B. repeater domains

C. Ethernet collisions

D. signal amplification

E. Ethernet broadcasts

Answer: C

Explanation:

Modern wired networks use a network switch to eliminate collisions. By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links.

Question: 7

Refer to the exhibit.

If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B?

A. 10.168.10.99

B. 10.168.11.88

C. A1:A1:A1:A1:A1:A1

D. B2:B2:B2:B2:B2:B2

E. C3:C3:C3:C3:C3:C3

F. D4:D4:D4:D4:D4:D4

Answer: E

Explanation:

When packets transfer from one host to another across a routed segment, the source IP address always remains the same source IP address, and the source physical (MAC) address will be the existing routers interface address. Similarly, the destination IP address always remains the same and the destination physical (MAC) address is the destination routers interface address.

Question: 8

Refer to the exhibit.

HostX is transferring a file to the FTP server. Point A represents the frame as it goes toward the Toronto router. What will the Layer 2 destination address be at this point?

A. abcd.1123.0045

B. 192.168.7.17

C. aabb.5555.2222

D. 192.168.1.1

E. abcd.2246.0035

Answer: E

Explanation:

For packets destined to a host on another IP network, the destination MAC address will be the LAN interface of the router. Since the FTP server lies on a different network, the host will know to send the frame to its default gateway, which is Toronto.

Question: 9

Which network device functions only at Layer 1 of the OSI model?

A. Option A

B. Option B

C. Option C

D. Option D

E. Option E

Answer: B

Explanation:

Most hubs are amplifying the electrical signal; therefore, they are really repeaters with several ports. Hubs and repeaters are Layer 1 (physical layer) devices.

Question: 10

Refer to the exhibit.

The host in Kiev sends a request for an HTML document to the server in Minsk. What will be the source IP address of the packet as it leaves the Kiev router?

A. 10.1.0.1

B. 10.1.0.5

C. 10.1.0.6

D. 10.1.0.14

E. 10.1.1.16

F. 10.1.2.8

Answer: E

Although the source and destination MAC address will change as a packet traverses a network, the source and destination IP address will not unless network address translation (NAT) is being done, which is not the case here.

Question: 11

Refer to the exhibit.

As packets travel from Mary to Robert, which three devices will use the destination MAC address of the packet to determine a forwarding path? (Choose three.)

A. Hub1

B. Switch1

C. Router1

D. Switch2

E. Router2

F. Switch3

Answer: B, D, F

Explanation:

Switches use the destination MAC address information for forwarding traffic, while routers use the destination IP address information.

Local Area Networks employ Layer 2 Switches and Bridges to forward and filter network traffic. Switches and Bridges operate at the Data Link Layer of the Open System Interconnect Model (OSI). Since Switches and Bridges operate at the Layer 2 they operate more intelligently than hubs, which work at Layer 1 (Physical Layer) of the OSI. Because the switches and bridges are able to listen to the traffic on the wire to examine the source and destination MAC address. Being able to listen to the traffic also allows the switches and bridges to compile a MAC address table to better filter and forward network traffic.

To accomplish the above functions switches and bridges carry out the following tasks:

MAC address learning by a switch or a bridge is accomplished by the same method. The switch or bridge listens to each device connected to each of its ports and scan the incoming frame for the source MAC address. This creates a MAC address to port map that is cataloged in the switches/bridge MAC database. Another name for the MAC address table is content addressable memory or CAM table.

When a switch or bridge is listening to the network traffic, it receives each frame and compares it to the MAC address table. By checking the MAC table the switch/ bridge are able o determine which port the frame came in on. If the frame is on the MAC table the frame is filtered or transmitted on only that port. If the switch determines that the frame is not on the MAC table, the frame is forwarded out to all ports except the incoming port.

Question: 12

Refer to the exhibit.

Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2?

A. Option A

B. Option B

C. Option C

D. Option D

E. Option E

Answer: B

Explanation:

The Source and Destination IP address is not going to change. Host 1 IP address will stay as being the source IP and the Host 2 IP address will stay the destination IP address. Those two are not going to change.

For the MAC address it is going to change each time it goes from one hope to another. (Except switches… they don’t change anything)

Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of Router 1.

Router 1 is going to strip that info off and then will make the source MAC address of Router1’s exiting interface, and making Router2’s interface as the destination MAC address.

Then the same will happen… Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2’s MAC address.

Question: 13

Refer to the exhibit.

A network device needs to be installed in the place of the icon labeled Network Device to accommodate a leased line attachment to the Internet. Which network device and interface configuration meets the minimum requirements for this installation?

A. a router with two Ethernet interfaces

B. a switch with two Ethernet interfaces

C. a router with one Ethernet and one serial interface

D. a switch with one Ethernet and one serial interface

E. a router with one Ethernet and one modem interface

Answer: C

Explanation:

Only a router can terminate a leased line attachment access circuit, and only a router can connect two different IP networks. Here, we will need a router with two interfaces, one serial connection for the line attachment and one Ethernet interface to connect to the switch on the LAN.

Question: 14

Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?

A. HTTP

B. IP

C. TCP

D. Telnet

E. UDP

Answer: E

Explanation:

UDP provides a connectionless datagram service that offers best-effort delivery, which means that UDP does not guarantee delivery or verify sequencing for any datagrams. A source host that needs reliable communication must use either TCP or a program that provides its own sequencing and acknowledgment services.

Question: 15

Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?

A. Physical

B. Data-link

C. Transport

D. Network

Answer: C

Explanation:

About the Author: Test Information:Total Questions: 309Test Number: 100-105Vendor Name: CISCOCert Name: CCNATest Name: Interconnecting Cisco Networking Devices Part 1 (ICND1) v3Official Site:

examcertify.co.uk

For More Details:

examcertify.co.uk/100-105.html

Get20% Immediate Discount on Full Training MaterialDiscount Coupon Code:79741B6012

Source:

isnare.com

Permanent Link:

isnare.com/?aid=1965409&ca=Computers+and+Technology}

Sunday, January 21, 2007

Fire broke out in the Ku-ring-gai Chase National Park, on the outskirts of Sydney, Australia, at approximately 5pm on Sunday 21st January 2007. The site of the fire is inaccessible terrain in the Bobbin Head/Apple Tree Bay area.

For a time properties were threatened in Mount Ku-ring-gai, but this danger has now passed. The F3 freeway and northern train line were closed, causing freeway traffic to be banked up. The morning saw delayed traffic on the F3, which was briefly opened, but for the most part traffic was diverted onto the Pacific Highway at the Berowra Exit.

Around midday the F3 Freeway and Pacific Highway were closed until further notice, severing Sydney’s northern vehicular links. During Monday afternoon the railway line was closed. Traffic for the north was being routed inland via Wisemans Ferry Road, though Windsor. The Pacific Highway, F3 and railway line reopened at 6pm. Welfare centres have been opened for commuters who cannot get home. They are located at Berowra Community Centre (north of the fire) and Thornleigh Baptist Community Centre (south of the fire).

Overnight backburning along with a direct attack has seen the main threat dissipate with the southern fire front under control. On Monday morning spot fires continue to move north towards Cowan Creek. The wind has been picking up in the local area during Monday afternoon. The fire is proving difficult to contain due to spot fires and flying embers.

There has continuous helicopter activity over the area during Monday.

The NSW Rural Fire Service will be holding Community briefings at the Berowra Oval and Samuel King Park Bobbin Head Road Turramurra at 5.30pm today (Monday).

Tuesday saw continuing helicopter activity. Steady rain has been falling throughout Tuesday night and Wednesday morning. The Rural fire service has stated that it is now confident that the fire will be contained.

Retrieved from “https://en.wikinews.org/w/index.php?title=Fire_breaks_out_in_Ku-ring-gai_Chase_National_Park,_Australia&oldid=784300”

Saturday, August 13, 2011

British Prime Minister David Cameron has stated that a change in police strategy is appropriate following what many feel to be an inadequate response to the rioting that has overrun many cities across England. Riots started in Tottenham on Saturday night after the fatal shooting by police of Mark Duggan, a 29-year-old taxi driver who the Independent Police Complaints Commission state was in possession of a handgun, but did not fire it.

During the Parliamentary debate on the riots, David Milliband, the Labour leader, called on Cameron to reconsider cuts to police budgets. Chancellor of the Exchequer George Osborne described the communities where the rioting occurred as being “left behind” and “cut-off from the economic life-blood of the rest of the country”, and called for solutions to the “deep-seated social problems”

One avenue the Prime Minister is said to be considering is changing regulations on social media services like Twitter, Facebook and BlackBerry Messenger, the latter being used to communicate between groups of rioters. The Open Rights Group and Big Brother Watch came out in opposition to any plans to restrict communication using social media, with Jim Killock of the Open Rights Group warning that such regulation would be abused by the police and private companies.

In Southampton, England, three people were arrested by police for the suspicion of using Twitter or BlackBerry Messenger to encourage the rioting. The government is “working with the police, the intelligence services and industry to look at whether it would be right to stop people communicating via these Web sites and services when we know they are plotting violence, disorder and criminality,” said Cameron.

The Prime Minister also announced that he would consider using the army to support the police in controlling future rioting, and also that he would consult with William J. Bratton, CBE, who had been the chief of police in Los Angeles and a police commissioner in New York City and Boston. Bratton is quoted as saying that arrests are not the only way to solve societal problems which lead to rioting and unrest: “You can’t arrest your way out of the problem.”

Retrieved from “https://en.wikinews.org/w/index.php?title=David_Cameron_responds_to_rioting,_promises_changes_on_policing&oldid=3356575”

Submitted by: Darrellsg Yang

Their sleek, narrative top quality, intriguing sentimentality, soft, flowing new music, restorative verve and punctilious spirit add up to location region song lyrics on a higher pedestal than others.

A great blend of standard and contemporary new music styles, region song lyrics have their roots in the southern United States. There is distinctiveness that does not demand composing them any specialized ability. Composing the lyrics is an artwork that can be mastered by any great story teller who will sooner or later do even greater if he bears a couple of ideas in brain:

? There is a haunting magnificence about these lyrics. The motive is pretty apparent. Each individual nation song is quite simply a heart stirring story set to songs utilizing the really basic chords of a guitar, a piano or even the age-previous banjo! The absence of jarring drum beats or other noisy accompaniments does significantly for the region song lyrics.

? The conflating of irenic tone and the modest rendering are furthered by effortless-to-fully grasp language. Phrases are from prevalent each individual-day-use vocabulary that will need no conscientious efforts to grasp, recall or sung along. By different the timbre the author can spell-bind the audience.

? A tiny bit of imagination, power to empathize, practice and perseverance is plenty of for the author of nation song lyrics to etch out pieces of pure delight. A country song on the anvil will need to be structured effectively. Typically the verses are interspersed with ‘catchy’ chorus acquiring usually repeated hooks to make them even far more endearing.

[youtube]http://www.youtube.com/watch?v=b09pFlfjGKo[/youtube]

? Most likely the most vital element is the range of the topic of the lyric. Pick just a person principal matter per song and lay it bare by handful of correct phrases that convey a whole lot of which means. Wanting down the annals of historical past, we can obviously see the most extensively made use of subjects for the very best loved country song lyric ended up the ones that dealt with human feelings or expertise. The central strategy is to connect with the listeners emotionally. Some of the most sung about themes involve:

Morose – death, divorce, separation, betrayal, down-in-the-dumps mood, evening, tears, failure, snow and cold, soreness

Joyous – bells, marriage, close friends, birth, dance, heading gallivanting, cowboys, warmth, mother and father, goods of foods

Romantic – spouse, lady/boy friend, love, moon, wine, attire, candlelight, relationships, heart

Nature – flora and fauna, river, sky, sun, stars, fire, hillside, lake, barn, wate

God – Jesus, church, angels, soul, gospel, miracles

Patriotism – country, state, nation, heroism of a soldier, flag

These are just the suggestion of the ice-berg. There is no stopping the creativeness or the writer from trying out new realms.

There are numerous strategies to create beneficial lyrics to a song (or a poem). This write-up will current some distinctive suggestions, hopefully to assist you take into consideration some new avenues for your songwriting that you could not have considered of in advance of.

When you look and feel at profitable song lyrics, in purchase to sound unique, they tend to keep away from trite phrases and usually embrace pressure, dissonance, or unforeseen instructions. The adhering to are some strategies to look at for composing your own song lyrics:

Wordplay.

Some songs are unique mainly because they contain plays on phrases. For illustration:

About the Author: I Enjoy German Proverbs they contact it Spr che zum Nachdenken

dieversteigerungskobolde.de/sprueche.php

Source:

isnare.com

Permanent Link:

isnare.com/?aid=847096&ca=Entertainment

Monday, April 6, 2009

Over 1,600 volunteers registered to help build approximately 65,000 of the 500,000 sandbags to create dikes 20.5 feet (6.2 meters) high to protect the City of Winnipeg, Manitoba in the war against the Red River of the North flood.

700 volunteers answered at the rural municipality of St. Andrews alone. Once sandbags are filled for West St. Paul, St. Andrews, and Selkirk, then frozen culverts must be cleared.

The height of the river is expected to be Thursday, and predictions are that it will be less than Flood of the Century of 1997. There is no precipitation in the forecast, and snow in the province should be melted by the end of the week.

“The fear right now is we have to get that ice out of the river. The Amphibex [Excavators] are still working and breaking the ice apart, and everyday we buy with the warm weather and the current, it is thinning the ice down a bit, so when it does start to move, the better chance it’ll move right out into the lake,” said Paul Guyder, the emergency coordinator for the RMs of St. Andrews and St. Clements.

“I feel that we’ve done everything humanly possible to get ready,” said Gary Doer, Premier of Manitoba, “But … there are fallibilities with human behaviour. We can take every preventative measure as human beings possible and we can still get Mother Nature proving again she is superior.”

Communities with ring diking will partially or fully close their dikes at the beginning of the week. Provincial officials are considering opening the Red River Floodway gates around mid-week before ice is fully melted.

Ice jams could cause flooding within the city, however opening the gates could spare neighbourhood flooding when the river rises to the estimated 6.3 meters (20.7 feet) height. The province does have back up plans for dealing with ice jams within the city if they do occur. The unpredictability of ice jams and the ensuing water level rise may cause neighbourhood flooding. The city is raising dikes where the river has jammed with ice in the past such as on tight curves and past bridges. Likewise there are excavators and backhoes positioned at these points.

Vulnerable neighbourhoods on the river banks have been reinforced with sandbag dikes at vulnerable areas from the massive volunteer effort over the weekend. Guyader feels no more extra volunteers are needed, however volunteers are still being asked to leave their names and number in case of unpredicted need. Existing personnel will assess roads, and help with clean up.

Approximately 400 of the 800 people who evacuated the Roseau River Anishinabe First Nation have returned to their homes.

Former Premier, Dufferin Roblin, brought forward the floodway as a protection for Winnipeg residents and economy following the 1950 Red River Flood. The Red River floodway, “Duff’s Ditch” was finally finished in 1968, and its floodway gates have been opened 20 times saving Winnipeg from an estimated CA$10 billion in damages. The floodway expansion began in 2005 at a price of $665 million.

Polish and Chinese experts have come to survey the Red River Floodway, and Dennis Walaker, mayor of Fargo, North Dakota recognises the need for Red River flood defences down river. “Every town that you drive by from the Canadian line up to Winnipeg is either elevated or ring-diked,” said Walaker.

Retrieved from “https://en.wikinews.org/w/index.php?title=Manitoba_volunteers_go_to_war_against_Red_River_flooding&oldid=804210”

Thursday, December 13, 2007

Victoria Wyndham was one of the most seasoned and accomplished actresses in daytime soap opera television. She played Rachel Cory, the maven of Another World‘s fictional town, Bay City, from 1972 to 1999 when the show went off the air. Wyndham talks about how she was seen as the anchor of a show, and the political infighting to keep it on the air as NBC wanted to wrest control of the long-running soap from Procter & Gamble. Wyndham fought to keep it on the air, but eventually succumbed to the inevitable. She discusses life on the soap opera, and the seven years she spent wandering “in the woods” of Los Angeles seeking direction, now divorced from a character who had come to define her professional career. Happy, healthy and with a family she is proud of, Wyndham has found life after the death of Another World in painting and animals. Below is David Shankbone’s interview with the soap diva.

Retrieved from “https://en.wikinews.org/w/index.php?title=Victoria_Wyndham_on_Another_World_and_another_life&oldid=2584666”

Wednesday, January 25, 2012

Across Egypt hundreds of thousands have taken to the streets for the day, marking exactly one year since the outbreak of protests leading to 83-year-old longstanding ruler Hosni Mubarak’s downfall. The country’s decades-long emergency rule was partially lifted this week; meanwhile, a possible economic meltdown looms and a newly-elected parliament held their first meeting on Monday.

Despite the new parliament, military rule introduced following Mubarak’s fall last spring remains. Echoing the demands from a year ago, some protesters are demanding the military relinquish power; there are doubts an elected civilian leader will be permitted to replace the army.

The brief unity against Mubarak has since fragmented, with Secularists and Islamists marking the revolution’s anniversary splitting to opposing sides of Cairo’s famed Tahrir Square and chanting at each other. Initial demonstrations last year were mainly from young secularists; now, Islamic parties hold most of the new parliament’s seats — the country’s first democratic one in six decades.

Salafis hold 25% of the seats and 47% are held by the Muslim Brotherhood, which brought supporters to Cairo for the anniversary. Tahrir Square alone contained tens of thousands of people, some witnesses putting the crowd at 150,000 strong. It’s the largest number on the streets since the revolution.

Military rulers planned celebrations including pyrotechnics, commemorative coins, and air displays. The Supreme Council of Armed Forces took power after last year’s February 11 resignation of Mubarak.

Alaa al-Aswani, a pro-democracy activist writing in al-Masry al-Youm, said: “We must take to the streets on Wednesday, not to celebrate a revolution which has not achieved its goals, but to demonstrate peacefully our determination to achieve the objectives of the revolution,” — to “live in dignity, bring about justice, try the killers of the martyrs and achieve a minimum social justice”

Alexandria in the north and the eastern port city of Suez also saw large gatherings. It was bitter fighting in Suez led to the first of the revolution’s 850 casualties in ousting Mubarak. “We didn’t come out to celebrate. We came out to protest against the military council and to tell it to leave power immediately and hand over power to civilians,” said protestor Mohamed Ismail.

“Martyrs, sleep and rest. We will complete the struggle,” chanted crowds in Alexandria, a reference to the 850 ‘martyrs of the revolution’. No convictions are in yet although Mubarak is on trial. Photos of the dead were displayed in Tahrir Square. Young Tahrir chanters went with “Down with military rule” and “Revolution until victory, revolution in all of Egypt’s streets”.

If the protestors demanding the military leave power get their way, the Islamists celebrating election victory face a variety of challenges. For now, Field Marshall Mohamed Hussein Tantawi — whose career featured twenty years as defence minister under Mubarak — rules the nation and promises to cede power following presidential elections this year.

The economy is troubled and unemployment is up since Mubarak left. With tourism and foreign investment greatly lower than usual, budget and payment deficits are up — with the Central Bank eating into its reserves in a bid to keep the Egyptian pound from losing too much value.

Last week the nation sought US$3.2 billion from the International Monetary Fund. The IMF insists upon funding also being secured from other donors, and strong support from Egypt’s leaders. IMF estimates say the money could be handed over in a few months — whereas Egypt wanted it in a matter of weeks.

The country has managed to bolster trade with the United States and Jordan. Amr Abul Ata, Egyptian ambassador to the fellow Middle-East state, told The Jordan Times in an interview for the anniversary that trade between the nations increased in 2011, and he expects another increase this year. This despite insurgent attacks reducing Egyptian gas production — alongside electricity the main export to Jordan. Jordan exports foodstuffs to Egypt and has just signed a deal increasing the prices it pays for gas. 2011 trade between the countries was worth US$1 billion.

The anniversary also saw a new trade deal with the US, signed by foreign trade and industry minister Mahmoud Eisa and U.S. Trade Representative Ron Kirk. President Barack Obama promises work to improve U.S. investment in, and trade with, nations changing political systems after the Arab Spring. Details remain to be agreed, but various proposals include US assistance for Egyptian small and medium enterprises. Both nations intend subjecting plans to ministerial scrutiny.

The U.S. hailed “several historic milestones in its transition to democracy” within a matter of days of Egypt’s revolution. This despite U.S.-Egypt ties being close during Mubarak’s rule.

US$1 billion in grants has been received already from Qatar and Saudi Arabia but army rulers refused to take loans from Gulf nations despite offers-in-principle coming from nations including Qatar, Saudi Arabia, and United Arab Emirates. Foreign aid has trickled in; no money at all has been sent from G8 nations, despite the G8 Deauville Partnership earmarking US$20 billion for Arab Spring nations.

A total of US$7 billion was promised from the Gulf. The United Kingdom pledged to split £110 million between Egypt and Arab Spring initiator Tunisia. The European Bank for Reconstruction and Development says G8 money should start arriving in June, when the presidential election is scheduled.

The African Development Bank approved US$1.5 billion in loans whilst Mubarak still held power but, despite discussions since last March, no further funding has been agreed. The IMF offered a cheap loan six months ago, but was turned away. Foreign investment last year fell from US$6 billion to $375 million.

Rights, justice and public order remain contentious issues. Tantawi lifted the state of emergency on Tuesday, a day before the revolution’s anniversary, but left it in place to deal with the exception of ‘thuggery’. “This is not a real cancellation of the state of emergency,” said Islamist Wasat Party MP Essam Sultan. “The proper law designates the ending of the state of emergency completely or enforcing it completely, nothing in between.”

The same day, Amnesty International released a report on its efforts to establish basic human rights and end the death penalty in the country. Despite sending a ten-point manifesto to all 54 political parties, only the Egyptian Social Democratic Party (of the Egyptian Bloc liberals) and the left-wing Popular Socialist Alliance Party signed up. Measures included religious freedom, help to the impoverished, and rights for women. Elections did see a handful of women win seats in the new parliament.

The largest parliamentary group is the Freedom and Justice Party of the Muslim Brotherhood, who Amnesty say did not respond. Oral assurances on all but female rights and abolition of the death penalty were given by Al-Nour, the Salafist runners-up in the elections, but no written declaration or signature.

“We challenge the new parliament to use the opportunity of drafting the new constitution to guarantee all of these rights for all people in Egypt. The cornerstone must be non-discrimination and gender equality,” said Amnesty, noting that the first seven points were less contentious amongst the twelve responding parties. There was general agreement for free speech, free assembly, fair trials, investigating Mubarak’s 30-year rule for atrocities, and lifting the state of emergency. A more mixed response was given to ensuring no discrimination against LGBT individuals, whilst two parties claimed reports of Coptic Christian persecution are exaggerated.

Mubarak himself is a prominent contender for the death penalty, currently on trial for the killings of protesters. The five-man prosecution team are also seeking death for six senior police officers and the chief of security in the same case. Corruption offences are also being tried, with Gamal Mubarak and Alaa Mubarak accused alongside their father Hosni.

The prosecution case has been hampered by changes in witness testimony and there are complaints of Interior Ministry obstruction in producing evidence. Tantawi has testified in a closed hearing that Mubarak never ordered protesters shot.

HAVE YOUR SAY
Do you believe Egypt’s current military rulers will allow a peacful transition to civilian rule?
Add or view comments

Hisham Talaat Moustafa, an ex-MP and real estate billionaire, is another death penalty candidate. He, alongside Ahmed Sukkari, was initially sentenced to death for the murder of his ex-girlfriend, Lebanese pop star Suzanne Tamim. A new trial was granted on procedural grounds and he is now serving a fifteen-year term for paying Sukkari US$2 million to slit 30-year-old’s Tamim’s throat in Dubai. Her assassin was caught when police followed him back to his hotel and found a shirt stained with her blood; he was in custody within two hours of the murder.

The court of appeals is now set to hear another trial for both men after the convictions were once more ruled unsound.

A military crackdown took place last November, the morning after a major protest, and sparking off days of violence. Egypt was wary of a repeat this week, with police and military massed near Tahrir Square whilst volunteers manned checkpoints into the square itself.

The military has pardoned and released at least 2,000 prisoners jailed following military trials, prominently including a blogger imprisoned for defaming the army and deemed troublesome for supporting Israel. 26-year-old Maikel Nabil was given a three year sentence in April. He has been on hunger strike alleging abuse at the hands of his captors. He wants normalised relations with Israel. Thousands have now left Tora prison in Cairo.

Retrieved from “https://en.wikinews.org/w/index.php?title=One_year_on:_Egyptians_mark_anniversary_of_protests_that_toppled_Mubarak&oldid=4503355”

By Simon Lau

When you step into any one of Chinese colleges, you can find that there are various dressing styles. As most of the boys in China are not so keen in fashion, its hard to tell which style of dressing they are. However, things are different in Chinese girls. Every time you see a Chinese girl, you can easily tell the style of her dressing. Actually, the dressing styles, or we say China fashion trends of college girls can be divided into three categories. I will tell you one by one in the following part.

The most common one is Japanese style. The major feature of this kind of style is cute or we say kawaii in Japanese. If a college girl wears a t-shirt with a big hello kitty on it or a pink backpack just as the primary school kids, there is no doubt that shes following the Japanese style. The popularity of Japanese style is actually following the daily-better relationship between China and Japan. But the political issue is not our key point here. Not only because of the frequent cultural communication between China and Japan, but also because the Japanese culture is basically based on the traditional Chinese culture although we can see many innovative change here, like the miniskirts or sun-tops.

Then next style arises only in this decade along with the popular TV series. Obviously, the trend I mention here is the Korean one. Chinese even coined a local word Hanliu for this special fashion trend. We can use a key word to describe the Korean style: the Girl Next Door. How can we define the dressing of a girl lives next door? It always means that its comfortable, looking good but not so exaggerated as the Japanese style. Girls may carry the little elegant hand bag with them or wear the hairband with a bow on it. Instead of being sexy, girls in this style seem more accessible to others.

[youtube]http://www.youtube.com/watch?v=qYx7YG0RsFY[/youtube]

Last but not least, the western style. This trend has the longer history than the two we mentioned above, however, its not adopted by the majority of college girls in China. The major reason is that we Chinese girls have different builds from the western people. You can find that college girls who have preference for this style are mostly tall and thin like models. They wear super miniskirts to show their slim figures or huge coats to outstand their arrogance. Actually there is a minor trend thats not easily discovered by most people, the campus trend. Students in college are no longer required to wear uniforms which makes them cherish the memory of that dressing.. Thats why campus trend appeared. Its rooted in the western dressing style since they have the most beautiful uniforms for student in high schools.

China College dressing fashion is actually the combination of the three kinds of styles from different countries as I mentioned above. Next time if you have time, you could come to China and walking around in the Chinese Colleges, you will find it very different from yours.

If you need any helps, or any fashion advices, please go to Fashion Bop(Google us please).

About the Author: Welcome to Fashion Bop! We are a professional buy agency in China, primary business: clothes, bags, shoes, electronics, and accessories. Free charge of service fees! You could buy from multi suppliers, we will deliver in one batch!

Shopping from China

!

Wholesale from china

!

Taobao Agent

! Please contact us for more details.(http://www.fashion-bop.com)

Source:

isnare.com

Permanent Link:

isnare.com/?aid=777910&ca=Education

Tuesday, January 30, 2007

Scientists have uncovered the largest Neolithic settlement in the United Kingdom at the Durrington Walls and believe that the village was inhabited by the people who built the Stonehenge monument.

Scientists say that the village was built around 2,600 B.C., roughly when Stonehenge was believed to have been constructed, and housed over 100 people.

Inside the areas which would have been the interior of houses at the time, scientists also found outlines of what they think were beds and cupboards or dressers. Pieces of pottery and “filthy” rubbish around the site. Animal bones, arrowheads, stone tools and other relics were also discovered.

“We’ve never seen such quantities of pottery and animal bone and flint. In what were houses, we have excavated the outlines on the floors of box beds and wooden dressers or cupboards,” said Sheffield University archaeologist Mike Parker Pearson.

So far, the dig has revealed at least 8 houses roughly 14-16 feet square, but scientists say that they think there may have been at least 25 altogether.

The site was likely to have been occupied only seasonally rather than year-round and evidence suggests that a lot of “partying” went on at the location.

“The animal bones are being thrown away half-eaten. It’s what we call a feasting assemblage. This is where they went to party – you could say it was the first free festival. The rubbish isn’t your average domestic debris. There’s a lack of craft-working equipment for cleaning animal hides and no evidence for crop-processing,” added Pearson.

The Durrington Walls are approximately 2 miles from the Stonehenge site.

Retrieved from “https://en.wikinews.org/w/index.php?title=Home_of_Stonehenge_builders_found&oldid=2446970”