Thursday, December 26, 2019

Air Pollution and Human Health - 574 Words

Air pollution has become a big problem to our environment and human health. Air pollution are certain gases and aerosols in the atmosphere that have harmful effects. (Wright Boorse, 2014) These pollutions can be put into our air in many different ways. Air pollution is cause by both human and natural actions. Some natural actions are things like volcanic eruptions, radioactivity, forest fires, or even evaporation of organic compounds. Some human activities are things like industries and manufacturing, burning fossil fuels, fumes from cars, and household and farming chemicals. What are the different types of air pollution? How does each type affect human health and the environment? And what are some ways to control air pollution? are the questions that I needed answered. There are many different types of air pollution. These types are broking down into two categories, primary and secondary. The primary pollution consists of seven major air pollutants that are the direct products of combustion and evaporation. Primary air pollutions are pollutants released directly into the atmosphere, mainly as a result of burning fuels and wastes, as opposed to secondary air pollutants. The first primary pollution is Suspended particulate matter, (PM). This pollution affects the human health and the environment by reducing the lung function and it affects respiration. The second pollution is Volatile organic compounds (VOC). This pollution affects human health and the environment by theShow MoreRelatedEffects Of Air Pollution On Human Health1319 Words   |  6 PagesCareful What You Breathe In: Effects of Air Pollution on Human Health The idea that we, as a global community, are destroying the very earth we commonly share is something that takes time for people to fully understand. It takes research and a open mind to be knowledgeable about the environmental issues the human race is causing to planet earth, as well as the issues that it is causes to our personal health. Air pollution is a large problem that exists in the United States. However, the challengeRead MoreThe Effects Of Air Pollution On Human Health1874 Words   |  8 PagesAIR POLLUTION Do you know 3.3 million people die each year due to air pollution? According to Borenstein, â€Å"Air pollution kills more than HIV and malaria combined.† Both of these diseases have caused worry from many people. How come people do not seem as worried about air pollution? In a study conducted by Harvard University, they found that â€Å"the yearly death total will double to about 6.6 million a year by 2050† because of air pollution. Something needs to be done in order to control air pollutionRead MoreThe Effects Of Air Pollution On Human Health850 Words   |  4 Pagesincreasing, so does pollution. The debate associated with this contamination on the environment has to do with how much should be done to stop pollution, and whether or not this is a serious enough issue to be concerned with. Well, this issue should disturb people. The most frightening point about it is that these poisonous impurities infect the Earth in multiple forms, including air pollution and water pollution. The value of Earth is incomparable, and the presence of pollution devaluing it needsRead MoreThe Effects Of Air Pollution On Human Health Essay1381 Words   |  6 PagesObjectives 1. To establish the definition of air pollution and pollutants and determine their chemical nature. 2. To identify the causes of Air pollution 3. To define air pollution in India with respect to law as stated in the Indian Constitution. 4. To describe the Supreme Court interjection due to Delhi’s pollution and its results. 5. To assess the air pollution level in Delhi and compare the levels before and after Diwali 6. To find the level of pollution caused by different sources and the data supportingRead MoreThe Effects Of Air Pollution On Human Health And / Or The Environment Essay1780 Words   |  8 PagesAir pollution refers to a â€Å"broad range of contaminates† (Brimblecombe Atkins, 2013, p.20) found in the atmosphere that are harmful to human health and/or the environment. While air pollution can, at its most simplistic, be defined as â€Å"any input of chemical, aerosol, or particulate† (Blauvelt Gates, 2011, p. 17) found to be deleterious and airborne, the term can be subdivided in many ways by source, components, and mode of formation. (Blauvelt Gates, 2011, p. 17) Typically, an essential distinctionRead MoreHuman Health Problems Caused By Air Pollution1796 Words   |  8 PagesNext, there are human health problems caused by air pollution from the burning of coal and oil. Air pollution can cause long-term damage including many diseases and a range of short-term respiratory symptoms, such as coughing, throat irritation, wheezing, chest tightness, and shortness of breath. Children, seniors, and asthmatics are most vulnerable to this air pollution. Miners, especially, are prone to black lung disease. Another cost of fossil fuels includes damage to land from coal mining. ItRead MoreThe Effects Of Air Pollution On Human Health And Quality Of Life965 Words   |  4 PagesAir is the ocean we breathe. Air supplies us with oxygen which is essential for our bodies to live. It is the most essential element for all living organisms and yet, most humans play a big role on polluting this essential resource and this means air pollution occurs. According to the Geoplanet.org, air pollution is the addition of harmful substances to the atmosphere resulting in damage to the environment, human health and quality ofRead MoreEffects Of Outdoor Air Pollution And Its Effects On Human Health1405 Words   |  6 Pagespoor air quality due to outdoor air pollution and its’ effects on human health. I have examined numerous documents, learning about the anthropogenic causes of the air pollution in addition to studying the hazards the c ontaminated air presents to the public, particularly in urban areas. I have created a policy that I believe directly addresses the current needs of the atmosphere in order to continue to reduce the amount of pollution in the air we breathe, in turn improving our overall health. LookingRead MoreAir Pollution1499 Words   |  6 PagesAir Pollution emissions have been a leading threat to the world, as the world has become more and more industrialized over the past century. However, many fail to realize the threat that air pollution emissions pose to human health. As humans continue to buy gasoline for the excessive amount of cars that are driven on a daily basis, create waste from factories, using coal and biomass fuels to power their daily lives, they will continue to put their own health at risk. China, a developing countryRead MoreEffects Of Population Pollution Essay1464 Words   |  6 Pagesnegative impacts on the environment. Each day the air around us is becoming more polluted as the amount of carbon dioxide emitted into the atmosphere caused by human activities increases each day. As population continues to gradually increase, it is causing harmful effects in terms of air pollution. An increase in the number of people directly varies with the polluti on that is emitted into the environment. Moreso, the human population is polluting the air due to the use of vehicles such as cars, trucks

Tuesday, December 17, 2019

Terrorists in the 1972 Munich Olympic Games - 1241 Words

On September fifth, 1972, the terrorist group, Black September, took nine Israeli athletes hostage during the 1972 Munich Olympic Games. Black September was a small group of Palestinian militants, almost unknown to the world before the Munich Games. The group belonged to the PLO, or the Palestinian Liberation Organization. The origin of Black September’s anger goes back to the long-lasting conflict between the Palestinians and the Israelis, which dates back thousands of years . Black September had one purpose for the attack: they wanted to televise the event to bring more attention to the Palestinian-Israeli conflict. The Black September terrorist group used the attacks on the Israeli athletes as well as the constant media at the 1972 Munich Olympics, to bring attention to the Palestinians wrongful treatment during the Palestinian-Israeli conflict. There has been an unsettling conflict between the Israelis and the Palestinians for many years. The two territories of Israel and Palestine were originally ruled by Britain, but because of many disputes and fights, the United Nations passed the UN Partition Plan in 1947. This plan suggested that the two territories of Israel and Palestine would be turned into separate countries. The Arabs loathed this idea because they got less land, but the Israelis loved it, for they received much more territory. In this spring of 1948, the United Nations declared the creation of Israel, in result, many countries in the Middle East wereShow MoreRelatedThe Events That Occurred At The 1972 Olympics1614 Words   |  7 Pages1972 Munich Summer Olympic Games The events that occurred at the 1972 Olympics were the result of a long conflict between Palestinian Arabs and Israeli Jews dating to the end of the nineteenth century. Although the two groups have different religions (Palestinians include Muslims, Christians and Druze), religious differences are not the cause of the strife. The conflict began as a struggle over land. From the end of World War I until 1948, the area that both groups claimed was known internationallyRead MoreOlympic Games And Its Impact On Society1494 Words   |  6 Pagesbillions of people. No one sporting event is greater than the Summer Olympic games, for it brings together athletes from all across the globe to compete and represent their respected nations. Winning an Olympic gold medal can create a widespread feeling of patriotism and unite a nation. Unfortunately, the events of the 1972 Olympic Games were a catastrophic disaster. Consequently, the following will reveal the 1972 Munich Summer Olympic Games trage dy and the ramifications of its build up, the event, andRead MoreThe Federal Republic Of Germany1248 Words   |  5 Pagesoptimism, but was equally marked by national and international debate and dispute. The symbolic potential of the Games did not escape the Munich organizers who took just one month in 1965 to secure promises of funding from the city of Munich, the Bavarian State and the Federal Government. Hosting the Games was deemed to be of immense importance. As Chancellor Willy Brandt said, â€Å"Munich 1972 was to serve as a showcase of modern Germany†, a chance to replace memories of the Third Reich with images ofRead MoreThe World Shook With Terror1593 Words   |  7 Pageswith terror September 5, 1972, when a group of eight Palestinian terrorists killed two Israeli Olympic team members and took nine hostage, during the 1972 Summer Olympics in Munich, Germany. Prior to the hostage crisis, the games had run smoothly and were into their second week of competition . The games were used to present a new identity of democracy and optimism for Germany. This was the first-time Germany had been allowed to host the games since the 1936 Berlin Olympics, which still loomed in internationalRead More1972 Munich Olympics Essay1578 Words   |  7 Pagesthat are providing coverage of events around the world? Do news sources invest time and work into their reports, or do they release reports teeming with bias and unproven facts solely for money and satisfactory ratings? The massacre at the 1972 Munich Olympics shocked the world and its citizens, and newspapers responded by producing a variety of biased reports of coverage from the attack and its aftermath. After evaluating news releases from the left-leaning New York Times, the centrist Trenton EveningRead MoreTerrorism in the Olympics Essay1151 Words   |  5 Pagesin the Olympics Security is a fundamental notion in sports. Nowadays athletes are viewed often through the media, therefore they are recognizable. In the Olympics security measures must be taken to protect the athletes. There are many different nationalities involved therefore security has to be taken in order to ensure that there arent conflicting views that could possibly be damaging towards another team. But quite often it cannot be prevented. On the morning of September 5, 1972, the membersRead More The Olympic Games in Munich of 1972 Essay1617 Words   |  7 Pagespolitical, religious or racial propaganda is permitted in any Olympic sites, venues or other areas† (Advertising, Demonstrations, Propaganda* 98). This rule shows just what the Germans were hoping for, a peaceful, passive, war-free environment in which countries can get together and compete. Although we all know that quite the antithesis was upon the 1972 Olympics in Munich between September the fifth and September the sixth. The Munich Massacre, one of the worst massacres of all time, was drivenRead More Terrorism In The Olympics Essay1139 Words   |  5 PagesSecurity in the Olympics Security is a fundamental notion in sports. Nowadays athletes are viewed often through the media, therefore they are recognizable. In the Olympics security measures must be taken to protect the athletes. There are many different nationalities involved therefore security has to be taken in order to ensure that there aren’t conflicting views that could possibly be damaging towards another team. But quite often it cannot be prevented. On the morning of September 5, 1972, the membersRead MoreThe 1972 Summer Olympics in Munich Essay1719 Words   |  7 PagesThe 1972 Summer Olympics were an international multi-sport event. Another name for that Olympic Game was the 1972 Olympics Massacre. It was the 20th Olympic Games. It was held in Munich, Germany from August 26, 1972 to September 11, 1972.The 1972 Olympics were the second Olympics to be held in Germany. The first Olympic Games that were held in Germany occur in 1936 in Berlin, which occurred during the Nazi regime. The Olympic Committee in West Germany was hoping to get rid of the military image ofRead MoreMunich Massacre6185 Words   |  25 PagesRESEARCH PROPOSAL Name: Nick Karvountzis Date: 10/5/09 Topic: 1972 Munich Olympic Massacre Area of Investigation: Outline the main historical debates, perspectives or interpretations you will be discussing Discuss the role that West-German authorities played during the 1972 Munich Olympic crisis, specifically addressing their preparation prior to Black September’s terrorist, as well as their consequent actions and decisions made during the crisis. Primarily, assess whether criticisms of

Monday, December 9, 2019

OS category Management

Question: à ¢Ã¢â‚¬â€Ã‚ ¾ Based on the systems overview, identify and describe at least 3 security tools for each OS category (UNIX, open source, and Windows) that can be used at the operating system level to protect the systems, users, and data from security threats. Answer: Introduction The use of computer is consistently increasing in this modern era; the computer has great impact on every sphere of human life. In daily life, in business and in education the computer is massively used. With the ever increasing use of computer, the essentiality of proper security of the computer, the information and data within the computer is increasing (Bott and Siechert, 2002). As there are several different types of computer viruses present, and new viruses are developing constantly by the virus programmers; therefore the security of computer become foremost important. Beside this, the hacking activities are also increasing in these days as the hackers are hugely proactive in present scenario and the hackers used to theft the necessary information and data. Therefore, many sophisticated security tools are developed, for the example: firewalls, intrusion detection system, virtual private networks etc. Apart from this, the security for the operating system is most crucial and the security tools of the operating system are the most significant security components for the overall security programme. As the company AA currently using Windows, Unix and open source operating system the company has significant security threat and the security practitioner must select the correct tools to minimize the security risk (Calder, 2008). The operating system is mainly the foundation for the other software, which runs on a computer machine. Thus the security for the operating system is one of the most important aspects and one of the most significant challenges for the security practitioner. Security system for Unix The UNIX is typical operating system, which is generally made up of three essential parts, which are kernel, shell and the program. Kernel of UNIX is considered to be the primary hub of the operating system, which helps to properly allocate and distribute the time and the memory to the program, and systematically handle the overall file storage parts and core communication with the proper response to the overall system call (Wood and Kochan, 1985). On the other hand, shell clearly response at the core interface between the kernel and the users. UNIX provides multiuser operating system, which help to provide the protection to the several users and help to enable the overall protection of the core system services from the key users. UNIX system security is primarily divided into three main core areas out of which two account security and network security are considered primary as these are related with restricting the unauthorised user from getting the authorised access. The third and the most significant areas of the concern related to the security of the UNIX is the file security system which help to restrict the unauthorized access either with the help of authorised person or with the help of crackers to gain the access of the stored data in the system (Chen and Gong, 2012). Physical security is often considered to one the internal security, which is frequently, overlooked which make the security more vulnerable for someone to get the access of the authorized data and files. This is the one of the most basic and simple types of security, which is required to be implemented and should be taken care and included on the security plan. Console security is considered one of the most significant part of the security of the UNIX. Machine and console are required to be secure as any unauthorised person can get the access of the authorised document and file. For the particular reason the computer and related console should be kept on the core secure room. The security system of UNIX is systematically divided into different parts according to the function of the users. Each user contain their significant set of files which provide platform for the overall operation which eventually help to express who else can have the access (Duffy, 2003). Hence, all the users core process run according to the users. System on the other hand own a group or a set of key files which help the root users to proper defined the system core principal and grant the overall access of different significant thing which eventually help to provide a key secure environment. Core users can properly invoke the overall system services, which are required to switch the root users. Data security is one of the major issue as the companies that are concerned with data and value the data required a clearly and precise backup recovery plan (Farrokhi, Bogorodskiy and Pradeep, 2008). One of the most simple and basic step to get the access of the companies data and file is the back tapes which are required to be safe, therefore all the sensitive and authorised data of the company should be locked in a cabinet . Security system for Open source The security practitioners face a significant threat in process of protecting the computers from the open sources. The security practitioner must have the adequate security skill so that they can protect the computer from the unauthorised programs, viruses and hackers (Harrington, 2007). In order to protect the computers the security practitioners have to establish few basic defences for protecting the network from the outsider and then come the ensuring of the security of the servers and the inside part of the network. Owing to this, the security practitioners have to build a firewall system for the internet connection. For this purpose, there should be necessary configuration, which allows the machine connection only from the internal network (Howlett, 2005). Beside this, the entire incoming connections, which are not requested from the internal network, must be totally blocked. The virtual private network via the firewall system also be helpful for ensuring secure connection from the outside network. This will helpful in securing the computers from the primary attacks for the internet. After that, the security practitioners have to assess the overall security of the computers the security hole or issues and it is necessary to recognize the places, where the burglar can getting in. In this position, the firewall is quite capable to protect the internal machines from random burglary. The open source software is generally the software which source code is open as well as available to anybody. The open source software are usually freely redistributable and must permit to distribute as source code along with the compiled form. Beside this, the essential licence must permit alternation as well as in order to generated derivatives from the source code. There are various security components, which are developed for the open source community (Jaeger, 2008). The popular open source security tools are as follows: firewalls like iptables, intrusion detecting system like Snort, network monitoring components like MRTG ( multi router traffic grapher) and security assessment tools like Nikto in order to scanning web server. The features of general availability of open source software provide sufficient chance to the criminals and attackers to investigate the source code and destroy the vulnerabilities. Therefore, the open source community provide utmost efforts to enhance the quality of the software and the security of the software to minimize the vulnerabilities in the application software and the computer machine. In order to ensure the safe use of the open source products in any company, the company must maintain few security policies such as, establish a well structured software security policy and must ensure that the policy should be strictly adhered. Only from the trusted site the open source security tools can be downloaded. Download only the source code instead of downloading the complied form (Jones and Ashenden, 2005). Examine the general s ecurities vulnerabilities in regular basis. The security practitioner should adopt defence in depth strategy thus variety of threats at various stages can be completely addressed. Security system for Windows Window operating system is the most prevalent and used operating system around the globe. The users of window are more compared to other operating system. The windows operating system is therefore considered one of highly vulnerable for security breach (Vacca, 2014). Window security context is very crucial and effective. One of the simplest tenets of window security is that each single process operates on the presence of users. Therefore, each process is related with the overall security context. Security context is a bit of cached data, which is related with the user consisting of SID, group SIDs and privileges (Manzuik, Gold and Gatford, 2007). The core security principal is considered to be one of the significant entity which help to determine and identify the security with the help of proper techniques eventually termed as authentication. Security principal in window is considered to be assigned on a significant process by process system with the help of kernel object which is te rmed as token. Single users or group account in the computer is considered as the security principal on the system, which is running on window operating system. Security principal connects and receives significant permission, which helps to grant access to the overall resources present in the computer such as document, file and folders. The overall working and execution of these authorised permission and significant right is considered to define what actually security principal significance and what are their proper role and responsibilities in performing the security in window operating system (Nipkow, Grumberg and Hauptmann, 2012). In windows operating system there are three core basic types of security principal, which are user principals, machine principal and service principals. Security identifiers in the users reference is the accounts with the help of usernames however the operating systems is internally takes reference in their accounts with the help of security identifiers. SID are considered to be unique in their primary domain and locals and are never used again which eventually makes them more uniquely identified users and the group account in windows. Security related to the account used in windows operating system are considered to be core unit of network security (Silberschatz, Galvin and Gagne, 2005). Domain account are stored in significant active directory database. Onm the other hand the local account is stored in the security account manager database making it more secured for authorised personnel. Account lockout policies, password policies are some of the security tool, which are, embedded in the windows operating system to provide more security to the user of the computer. Conclusion The security for the operating system is most important as the operating system is the base for the other software of the computer system. The security means protect the computer from the unauthorized entities to do anything that the computer owner does not want (Wilfred, 2003). As any unauthorized access can harm the availability, integrity and confidentiality the internal characteristic of the computer protect the operating system of the computer from the unauthorized access. Moreover, this is essential for the security of the computer but not sufficient. For ensuring security the files must be encrypted by the users and only can be opened by providing proper password. In recent time many new inventions take places in this segment biometrics is the most advance and more powerful in this segment. Fingerprints readers are most common in these days and the iris scans are the most secure. The biometrics is most efficient if locally stored. There are several viruses and threat like Troj an horses, buggy software and login spoofing and these are significant threat for the computer system, cause severe damage to the machine (Wood and Kochan, 1985). In addition to that, as the company AA currently using Windows, Unix and open source operating system the company has significant security threat and the security practitioner must select the correct tools to minimize the security risk. References Bosworth, S. and Kabay, M. (2002). Computer security handbook. New York: John Wiley Sons. Bott, E. and Siechert, C. (2002). Microsoft Windows security inside out for Windows XP and Windows 2000. Redmond, Wash.: Microsoft Press. Calder, A. (2008). Ten rules of information security for the smaller business. Ely: IT Governance Pub. Chen, L. and Gong, G. (2012). Communication system security. Boca Raton, FL: CRC Press. Clercq, J. (2004). Windows Server 2003 security infrastructures. Amsterdam: Digital Press, an imprint of Elsevier. Duffy, M. (2003). Getting started with openVMS system management. Boston: Digital Press. Farrokhi, B., Bogorodskiy, R. and Pradeep, D. (2008). Network administration with FreeBSD 7. Birmingham, U.K.: Packt Pub. Harrington, J. (2007). Ethernet networking for the small office and professional home office. Amsterdam: Morgan Kaufmann Publishers/Elsevier. Howlett, T. (2005). Open source security tools. Upper Saddle River, NJ: Prentice Hall. Jaeger, T. (2008). Operating system security. [San Rafael, Calif.]: Morgan Claypool Publishers. Jones, A. and Ashenden, D. (2005). Risk management for computer security. Amsterdam, Netherlands: Elsevier Butterworth-Heinemann. Manzuik, S., Gold, A. and Gatford, C. (2007). Network security assessment. Rockland, Mass.: Syngress Pub. Nipkow, T., Grumberg, O. and Hauptmann, B. (2012). Software safety and security. Amsterdam: IOS Press. Silberschatz, A., Galvin, P. and Gagne, G. (2005). Operating system concepts. Hoboken, NJ: J. Wiley Sons. Smith, B. and Komar, B. (2003). Microsoft Windows security resource kit. Redmond, Wash.: Microsoft Press. Vacca, J. (2014). Network and system security. Amsterdam: Syngress. Wilfred, A. (2003). Solaris 9 security. Cincinnati, Ohio: Premier. Wood, P. and Kochan, S. (1985). UNIX system security. Hasbrouck Heights, N.J.: Hayden Book Co.

Monday, December 2, 2019

There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) Essay Example

There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) Essay Syed Hussamuddin Ahmed Course name: Instructor: Date: 04 / 11 / 2010 There is no hope of doing perfect Research (Griffiths, 1998, p97) Research implies ‘searching again’. It is a careful study of a subject, especially in order to discover new facts or information about it (http://www. oxfordadvancedlearnersdictionary. com/dictionary/research). Research can be Qualitative or Quantitative (Research, wikipedia) It is a methodical investigation into a subject in order to discover facts, to establish or revise a theory or to develop a plan of action based on the facts discovered (Research, Microsoft Encarta Dictionary, 2009). Data is collected on a particular subject from various sources. Psychology differs from person to person, because of this the synthasised information results in inaccuracy. Results derived from a research never change in a perfect research. But this is rare. Thompson laid down his atomic model resembling a water melon, and electrons embedded in an atom, as seeds in a water melon. Later, Bohr proved the electrons to be in motion, and hence Thompson’s model to be inappropriate. Dobernier discovered that the elements present during his period, when arranged in the order of their increasing atomic masses, the mass of the middle element equals the average mass of the immediate preceding and succeeding elements. Modern Periodic Table proved this theory inapplicable for all the 117 elements known presently. Inventions and discoveries seem to be perfect momentarily. But later its imperfections would be proved. Quest for knowledge, improvisation of the present inventions and discoveries, or dissatisfied nature of the human beings compels them into researching. Human minds tend to be illogical at times. We will write a custom essay sample on There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Experiments fail at times leading towards no hope of doing perfect research. Research, according to Umardaud of www. expertcolumn. com, will always have imperfections, but quality and quantity will improve in the direction of perfection. (Umardaud, p. 1) â€Å"Home assignments- a boon or a curse†, was the topic in my grade 9, in 1980. Mixed responses proved the efforts futile. Conclusion was that, studious children liked it, but the playful did not. Results of the survey stated that 80 percent did not like to be assigned any work, as only 100 colleagues exhausted with overwork were interviewed. Now, this was a biased survey. â€Å"Corporal punishments at schools†, was the topic to be researched in 1985,in my Engineering first year. Students without spankings showed marked improvement compared to the students who were not. A father of three children has noticed that his second son does wonders only when parents are firm. Youngest son just needs to be instructed. So, no research is perfect All above findings clearly prove that there is no hope of doing a perfect research. Research on a subject continues†¦ _____________________________________ Bibilography Oxford’s Advanced Learners’ Dictionary 2010 Oxford University Press www. oxfordadvancedlearnersdictionary. com http://www. oxfordadvancedlearnersdictionary. com/dictionary/research November 2, 2010. Wikipedia, the free encyclopedia 3 November 2010 at 08:47. Wikimedia Foundation, Inc. , en. wikipedia. org http://en. wikipedia. org/wiki/Quantitative_research