Free Essay

Planet Trojan X

In:

Submitted By 17200197
Words 744
Pages 3
Planet Trojan X is approximately 110,546,002 Miles from the sun. Trojan X is very much similar to desert regions on earth with some exceptions. Such as instead of there being climate region changes, the entire planet has the same climate. Since the entire planet has the same climate type there was not much pressure on choosing the location to settle.
There were a few things that proved to be necessary though such as a reliable water source and good food source nearby. We had found a great water source with an even greater wildlife and food source nearby. The timespan between night and day is very similar to earth’s timeframe with a few exceptions. Daytime lasts for only 8 hours and nighttime last for an average time of 16 hours due to the position of the planets in between Trojan X and the sun. In the region that we settled in there is a constant breeze that occurs, but on some nights there is a greater breeze that comes through and lowers the temperature drastically. Much like how the temperature in deserts on earth would be. It is very often that it rains on this hemisphere but that doesn’t mean it never rains. There is a timespan from where we will go 12 months with no rain and then the other twelve months of almost constant rain which makes crops a bit of a hassle for half the year. With the majority of Trojan X being a desert planet, there is an overabundance of sand. There are quite a bit of mountains a wild plants growing on them but over all its almost all sand.
As the population size had started out from 1500 people originally we have grown almost too fast over the years to a total population of 50,000 people. There were many reasons that made us have to leave earth. We had taken advantage of the resources that we had like they would never run out, and eventually we had come to find out our resources were dwindling at a fast rate. Due to the lack of resources there were many people thought that the only way to survive was to fight for things they wanted and wage war upon each other. Eventually the wars got out of hand and eventually led to a nuclear holocaust. After the nuclear holocaust a zombie apocalypse broke out and forced the remaining survivors of planet earth to find refuge on another planet.
Though our economy is still pretty small for our existence on this planet, we have learned to adopt the same economic structure as the Native Americans’ had on planet Earth. Since we are still a new civilization that has adopted the Native American ways we do not have any idea of a monetary system.
As a citizen on our new planet you may have certain skills that may come useful to other people. Which has made a very good system where a favor gets you a favor? For example you may be a great hunter but you need weapons to hunt, you may make a deal for a person to make you a weapon to hunt with in return you split half of what you kill.
There are few things on Trojan X that are absolutely necessary to survive. When we were deciding where to settle we had to take into consideration if there was a reliable water source very close to the settlement. We also would need for there to be plants nearby for use of medical remedies. When we finally decided where to settle we had found all of these along with a great abundance of wildlife. There was a problem though, we would need to develop the concept of arms before we could hunt any wildlife for food. We had learned how to develop weapons and then were able to hunt for food. That had helped our civilization make new laws or rules. First law was that you may not kill another human being or you face the same punishment. The second and last law is that if you see that there is help needed just stop and help out, time is not to important when somebody needs help.

Resources:
Http://science.nationalgeographic.com/search/space/solar-system/earth/
http://www.nasa.gov/audience/foreducators/k-4/features/F_Measuring_the_Distance_Student_Pages.html
http://www.connerprairie.org/Learn-And-Do/Indiana-History/America-1800-1860/Native-Americans-In-America.aspx

Similar Documents

Premium Essay

Mythology

...everywhere! Daily you run across instances of words, city names, companies, | |literary allusions - and even planets and constellations - that take their name or borrow | |their theme from myths. Because of your many requests, I've provided a couple of thousand | |excellent examples to help you get started in your research. Remember, you're surrounded | |by mythology in today's society, whether you realize it or not!  | Mythological Influence on Modern... |[pic]Companies & Groups |[pic]Planets & Constellations | |[pic]  Words & Expressions |[pic]Literary & Pop Culture | [pic]American Cities Named From Mythology [pic] COMPANIES & GROUPS |Mythology is everywhere! There are hundreds of companies, groups and corporations that take their name, logo or theme from ancient mythology. | |I've provided a variety of examples to help you in starting your research. Some are well-known international companies, others are of a more | |local nature. | |Aegis - Zeus and Athena's protective shield; modern group of insurance companies (The Aegis Group). | |Ajax - Greek warrior in the Trojan War, who "cleaned up" in battle; popular household cleanser. ...

Words: 5942 - Pages: 24

Premium Essay

Atro Test 2

...Value Correct Response Student Response Answer Choices a. luminosity versus mass versus weight b. apparent brightness versus interior star temperature 100.0% c. luminosity versus surface temperature of a star versus size in solar radii d. radius versus weight Score: 2.5 / 2.5 Question 2 (2.5 points) What factor caused different planets to form out of different types of material? Student response: Percent Value Correct Response Student Response Answer Choices a. The angular momentum of the forming planet. 0.0% b. The quantity of dust particles in the solar nebula. c. The variation in temperature throughout the solar nebula. d. none of the above Score: 0 / 2.5 Question 3 (2.5 points) Earth crossing asteroids are termed- Student response: Percent Value Correct Response Student Response Answer Choices 100.0% a. Apollo Asteroids b. Amor Asteroids c. Jovian asteroids d. Aten Asteroids Score: 2.5 / 2.5 Question 4 (2.5 points) Unlike the terrestrial planets, the planetismals that formed the jovian planets were made up of _________ materials. Student response: Percent Value Correct Response Student Response Answer Choices 100.0% a. icy b. extremely hot c. extremely dense d. none of the above Score: 2.5 / 2.5 Question 5 (2.5 points) What are comets made of? Student response: Percent Value Correct Response Student Response...

Words: 2436 - Pages: 10

Premium Essay

The Solar System

...gravity, all of which formed from the collapse of a giant molecular cloud approximately 4.6 billion years ago. Of the many objects that orbit the Sun, most of the mass is contained within eight relatively solitary planets whose orbits are almost circular and lie within a nearly flat disc called the ecliptic plane. THE SUN The Sun is the most prominent feature in our solar system. It is the largest object and contains approximately 98% of the total solar system mass. Did you know? The Sun is big enough to hold over 1 million Earths. Many rituals and monuments are devoted to worshipping the Sun and/or marking important times in the Earth's orbit around the Sun. Mercury * Moon * No satellite * Giovanni Zupi * Has magnetic field * Mariner 10 * Revolution: 88 days * Rotation: 59 days Venus * Earth * No satellite * Galileo Galilei * No magnetic field * Mariner 2 * Revolution : 224.7 days * Rotation : 243 or (242 days) Mercury * Roman messenger of the gods * Smallest planet * Shortest year * Core: iron * Mantle: silicates * Crust: cratered terrain from meteors and small comets. Venus * Roman goddess of beauty * Hottest planet * Longest day * Core: iron and nickel * Mantle: unknown composition * Crust: Silicious rocks Mercury * Caloris Basin -largest crater * The sky of mercury is always black because it...

Words: 2153 - Pages: 9

Premium Essay

Windows vs. Linux

...systems—and computer system in general—at least in the year 2012, are not anything like those envisioned by science fictionists, novelists, and screen writers of the early and mid 20th century. For the most part, they saw computers as a single entity one system controlling everything, like a giant brain reaching out and serving each end-user anonymously. And there were surely no “blue screens of death.” Computers today come in hundreds of flavors. Let’s say you want a tablet instead of a keyboard, no problem. Need to run a multi-million dollar company with an extensive database from home? No problem. Interfaces and operating systems and software applications and hardware upgrades and I/O devices provide each and every person on the planet a customized computer experience. We should thank capitalism for many of the technological advances that have come about over the past fifty years. After all, money has a tendency to flow to the products that make our lives the most enjoyable. Three of the most notable advances in computer history are servers (formerly known as mainframes), Microsoft Windows, and the Linux operating system. Each one in its own right could fill volumes. However, the objective of this paper is to simply highlight a few of the most prominent features each of these advances has to offer. We will start with the most notorious MS Windows®. Microsoft has been in the computer industry for many years, and it is one of the most well-known companies...

Words: 2777 - Pages: 12

Premium Essay

Financial Term Paper of a Company Which Is Helpful

...Term Paper On Role of the Pythagoras in the field of mathematics Business Mathematics code Submitted By Team Harmony 1. Faisal Enayet (B1506003) 2. HafijulHasan (B1506007) 3. Plato Khisa (B1506035) 4. FarhanajAnchal (B1506075) 5. K.HusFariha (B1506120) 6. SumaiyaMeher(B1506155) Submitted To Lecturer AKTER KAMAL Business Mathematics Bangladesh University of Professionals Submission on Date: 02/05/2016 BBA 2015; SEC- C LETTER OF TRANSMITTAL 02 may 2016 Akter Kamal Lecturer Faculty of Business Studies Bangladesh University of Professionals Subject: Submission of term paper on “The role of Pythagoras in the field of mathematics” Respected Sir, We the students of BBA, section C, we are very glad to submit you the term paper on the topic of “The role of Pythagoras in the field of mathematics” that you asked us to submit, which is a part of our course requirement. For the purpose of completing the term paper we did a simple research on the provided topic. We have completed our research and assessment on our term paper topic according to your specification and regulation. We have tried our best to gather information according to the requirements and our ability. There may be a few mistakes, because we are still beginner in this line of work but we hope that in future this term paper will remind us not to make the same mistakes again and so this will become a great learning in experience. At last, we would like to thank to you...

Words: 7947 - Pages: 32

Free Essay

Code

...All rights reserved. All rights reserved, including the right to reproduce this book or ponions thereof in any form whatsoever. For information address Fireside Subsidiary Rights Depanment, 1230 Avenue of the Americas, New York, NY 10020. First Fireside trade paperback edition October 2008 • • FIRESIDE and colophon are registered trademarks of Simon & Schuster, Inc. For information about special discounts for bulk purchases, please contact Simon & Schusrer Special Sales at 1-800-456-6798 or busincss@simonandschustcr.com. Designed by 7imothy Shaner, nightanddaydesign.biz illustrations by jennifer Hendriks Manufactured in the United States of America 10 9 8 7 6 5 4 3 ISBN- 13: 978-1-4391- 1000-3 ISBN-10: 1-4391-JOOO-X Forme, • the best Bro I know • • • ' • • ' ' • • • • • • TABLE OF CONTENTS INTRODUCTION . . . . . . . . . . . . . . . . . ix WHAT IS A BRO? ................... 1 BROCABULARY .................... 3 ORIGIN . ........................... 5 THE BRO CODE .................... 9 · · AMENDMENTS .................. 188 VIOLATIONS. . . . . . . . . . . . . . . . . . . . . 191 GLOSSARY ....................... 193 .. VII • ' • • ' ' • • • • • INTRODUCTION u .... her we know it or not, each of us lives a life governed by an internalized code of conduct. Some call it morality. Others call it religion. I call...

Words: 4248 - Pages: 17

Premium Essay

Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...

Words: 71242 - Pages: 285

Premium Essay

Blackjacking Security

...Blackjacking Security Threats to BlackBerry® Devices, PDAs, and Cell Phones in the Enterprise Daniel Hoffman Wiley Publishing, Inc. Blackjacking Blackjacking Security Threats to BlackBerry® Devices, PDAs, and Cell Phones in the Enterprise Daniel Hoffman Wiley Publishing, Inc. Blackjacking: Security Threats to BlackBerrys, PDAs, and Cell Phones in the Enterprise Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-12754-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make...

Words: 83592 - Pages: 335

Premium Essay

Literature/Greek Mythology

...&KDXFHU 7URLOXVDQG&UHVVLGD (Troilus and Criseyde) 7UDQVODWHGE\$6.OLQH ã Copyright 2001 A. S. Kline, All Rights Reserved This work may be freely reproduced, stored and transmitted, electronically or otherwise, for any NON-COMMERCIAL purpose. Contents Book I Book II Book III Book IV Book V Troilus’s Love Love Returned The Consummation The Separation The Betrayal Book I 1. Troilus’s double sorrow for to tell, he that was son of Priam King of Troy, and how, in loving, his adventures fell from grief to good, and after out of joy, my purpose is, before I make envoy. Tisiphone, do you help me, so I might pen these sad lines, that weep now as I write. 2. I call on you, goddess who does torment, you cruel Fury, sorrowing ever in pain: help me, who am the sorrowful instrument who (as I can) help lovers to complain. Since it is fitting, and truth I maintain, for a dreary mate a woeful soul to grace, and for a sorrowful tale a sorry face. 3. For I, who the God of Love’s servants serve, not daring to Love, in my inadequateness, pray for success, though death I might deserve, so far am I from his help in darkness. But nevertheless, if this should bring gladness to any lover, and his cause avail, Love take my thanks, and mine be the travail. 4. But you, lovers that bathe in gladness, if any drop of pity is in you, remember all your past heaviness that you have felt, and how others knew the same adversity: and think how...

Words: 71071 - Pages: 285

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742

Premium Essay

Consumer Behavior

...Children as Consumers: Advertising and Marketing Children as Consumers: Advertising and Marketing Sandra L. Calvert Summary Marketing and advertising support the U.S. economy by promoting the sale of goods and services to consumers, both adults and children. Sandra Calvert addresses product marketing to children and shows that although marketers have targeted children for decades, two recent trends have increased their interest in child consumers. First, both the discretionary income of children and their power to influence parent purchases have increased over time. Second, as the enormous increase in the number of available television channels has led to smaller audiences for each channel, digital interactive technologies have simultaneously opened new routes to narrow cast to children, thereby creating a growing media space just for children and children’s products. Calvert explains that paid advertising to children primarily involves television spots that feature toys and food products, most of which are high in fat and sugar and low in nutritional value. Newer marketing approaches have led to online advertising and to so-called stealth marketing techniques, such as embedding products in the program content in films, online, and in video games. All these marketing strategies, says Calvert, make children younger than eight especially vulnerable because they lack the cognitive skills to understand the persuasive intent of television and online advertisements...

Words: 14381 - Pages: 58

Premium Essay

Apple's Case

...9-710-467 REV: SEPTEMBER 1, 2010 DAVID B. YOFFIE RENEE KIM Apple Inc. in 2010 On April 4, 2010, Apple Inc. launched its eagerly anticipated iPad amid great hype. The multimedia computer tablet was the third major innovation that Apple had released over the last decade. CEO Steve Jobs had argued that the iPad was another revolutionary product that could emulate the smashing success of the iPod and the iPhone. Expectations ran high. Even The Economist displayed the release of the iPad on its magazine cover with Jobs illustrated as a biblical figure, noting that, “The enthusiasm of the Apple faithful may be overdone, but Mr. Jobs’s record suggests that when he blesses a market, it takes off.”1 The company started off as “Apple Computer,” best known for its Macintosh personal computers (PCs) in the 1980’s and 1990’s. Despite a strong brand, rapid growth, and high profits in the late 1980s, Apple almost went bankrupt in 1996. Then Jobs went to work, transforming “Apple Computer” into “Apple Inc.” with innovative non-PC products starting in the early 2000’s. In fact, by 2010, the company viewed itself as a “mobile device company.”2 In the 2009 fiscal year, sales related to the iPhone and the iPod represented nearly 60% of Apple’s total sales of $43 billion.3 Even in the midst of a severe economic recession, revenues and net income both soared (see Exhibits 1a through 1c). Meanwhile, Apple’s stock was making history of its own. The share price had risen more than 15fold since...

Words: 13676 - Pages: 55

Premium Essay

Computer Science Illuminated

...N E L L D A L E J O H N L E W I S illuminated computer science J O N E S A N D B A RT L E T T C O M P U T E R S C I E N C E computer science illuminated N E L L D A L E J O H N L E W I S computer science illuminated N E L L D A L E J O H N Villanova University L E W I S University of Texas, Austin Jones and Bartlett Publishers is pleased to provide Computer Science Illuminated’s book-specific website. This site offers a variety of resources designed to address multiple learning styles and enhance the learning experience. Goin’ Live This step-by-step HTML Tutorial will guide you from start to finish as you create your own website. With each lesson, you’ll gain experience and confidence working in the HTML language. Online Glossary We’ve made all the key terms used in the text easily accessible to you in this searchable online glossary. The Learning Store Jones and Bartlett Publishers has a wealth of material available to supplement the learning and teaching experience. Students and instructors will find additional resources here or at http://computerscience. jbpub.com The Language Library Here you will find two complete chapters that supplement the book’s language-neutral approach to programming concepts. A JAVA language chapter and C++ language chapter are included and follow the same pedagogical approach as the textbook. http://csilluminated.jbpub.com eLearning Our eLearning center provides chapter-specific...

Words: 67693 - Pages: 271

Free Essay

Rute Linux Tutorial

...LINUX: Rute User’s Tutorial and Exposition Paul Sheer August 14, 2001 Pages up to and including this page are not included by Prentice Hall. 2 “The reason we don’t sell billions and billions of Guides,” continued Harl, after wiping his mouth, “is the expense. What we do is we sell one Guide billions and billions of times. We exploit the multidimensional nature of the Universe to cut down on manufacturing costs. And we don’t sell to penniless hitchhikers. What a stupid notion that was! Find the one section of the market that, more or less by definition, doesn’t have any money, and try to sell to it. No. We sell to the affluent business traveler and his vacationing wife in a billion, billion different futures. This is the most radical, dynamic and thrusting business venture in the entire multidimensional infinity of space-time-probability ever.” ... Ford was completely at a loss for what to do next. “Look,” he said in a stern voice. But he wasn’t certain how far saying things like “Look” in a stern voice was necessarily going to get him, and time was not on his side. What the hell, he thought, you’re only young once, and threw himself out of the window. That would at least keep the element of surprise on his side. ... In a spirit of scientific inquiry he hurled himself out of the window again. Douglas Adams Mostly Harmless Strangely, the thing that least intrigued me was how they’d managed to get it all done. I suppose I sort of knew. If I’d learned...

Words: 159689 - Pages: 639

Premium Essay

Real-Time Fraud Detection

...Para os meus pais, porque "o valor das coisas não está no tempo que elas duram, mas na intensidade com que acontecem. Por isso existem momentos inesquecíveis, coisas inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time...

Words: 56858 - Pages: 228