What Is an Fir

In: English and Literature

Submitted By ranairfan
Words 1393
Pages 6
Usage of language in the sentence structure of FIR

Submitted by: rana irfan Submitted to: Dr Athar Khurshid

University of Management and Technology

Usage of language in the sentence structure of FIR

Introduction
Filing an FIR may have become easier over the years, but what you write in it can leave both you and the policemen in a bit of a linguistic tizzy. The main reason is the customary use of Urdu/Persian words while registering an FIR. It begins at the outset with the bayan azaane (a compound Urdu-Persian word for statement description or expression) of the tehreer (complainant) being taken down. The contents usually follow with an average of six more similarly confusing words.
If a complainant is mystified, so are the policemen, both officers and the lower ranks. It is natural that trainee cops would not have used such alien terms earlier but The officers get first-hand experience of how an FIR is registered as well as how a police station works in this part of their training. It's also during this time that they learn about such words. Initially we tell them the meaning of the words but gradually they get equipped to use such words said the SHO.
Words like Daryaft (revelation) mushtaba (suspect) waqua (place of occurrence) nakal (copy) insdaad jarayam ( prevention of crime) could be easily found in the FIR copy though for the meaning you either Google it or ask someone with a grip of Urdu-Persian about the meaning. Another senior cop on the conditions of anonymity said that the last sentence of the FIR, which gives the details of initiation of the enquiry/case uses many Urdu/Persian words which is till date difficult to decipher word-wise-word. The last sentence, which basically means that the case has been registered under relevant IPC sections at a…...

Similar Documents

What

...what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what what......

Words: 391 - Pages: 2

What

...log10(P2/P1) -------------------------------------------------------------------------------------------- 1. Given the following communication diagram, identify each of the blocks appropriately as DTE, or DCE, or CC (communication channel) Personal Modem Telephone Modem Personal Computer System Computer 2. A channel has a signal to noise ratio of 2047.Shannon’s capacity for the channel is 11 kbps. What is the bandwidth of the channel? C = W log2(1 + S/N) 11000 = W log2(2048) 11000 = W * 11 W=1000 Hz 3. Which of the following is a form of software flow control? a) XON/XOFF b) RTS/CTS c) Selective ARQ d) Continuous ARQ 4. Given three channels A, B, and C with Bit Error Rates 10-6 , 10-5 , and 10-9 respectively. Which channel is better? And what is the number of errors that you will likely see on that channel when you transmit a one giga-bit file? A: 1 bit error in 10**6 bits; 1000 bit in error likely B: 1 bit error in 10**5 bits; 10000 bits in error likely C: 1 bit error in 10**9 bits; 1 bit error likely 5. This modem standard supports speed of theoretically up to 56 Kbps over an analog telephone line. a) V.42 b) V.34 c) V.90 d) V.69 6. For the network shown below, indicate the Flow of information......

Words: 1504 - Pages: 7

What??

...seek.com.au on 17 October. I believe that, with my skills, experience and attitudes, I can bring a lot to the company and am excited about the prospect. My background is in web development but in the past few years I have turned my focus to web design and hope to develop my career further within a design agency. I am proficient using HTML, CSS, PHP, Flash, ActionScript, Java and C/C++. My last project at Resin8 IT Designers involved designing an SQL database, which I was able to complete well before deadline and for which the company has had very positive feedback. The project before that involved building custom interfaces and the client was impressed with my diplomacy skills and the way I was able to communicate to find out exactly what he wanted, and then bring the planned vision to life, working under pressure. W3C standards, SEO and capabilities of different web browsers are factors I always keep in mind while designing and developing web content and my referees can speak for my excellent coding standards. I enjoy working in a team. At university I offered my IT/design skills to the Chinese Club and I was an IT volunteer at the 2006 Commonwealth Games. I regularly volunteer some time to the RSPCA for their web design/development needs. I am also productive and focussed working independently. You can see some of my work on my personal projects on my website at richardhuang.com.au. Please refer to my resume for my full skills matrix and I hope to hear......

Words: 3300 - Pages: 14

What Is

...built-in type that stores a Binary Large Object as a column value in a row of a database table. HTTP - Short for HyperText Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. Two-tier architecture - The two-tier architecture is like client server application. The direct communication takes place between client and server. There is no intermediate between client and server. The two tiers of two-tier architecture is 1. Database (Data tier) 2. Client Application (Client tier) Three-tier architecture - A special type of client/server architecture consisting of three well-defined and separate processes, each running on a different platform: 1. The user interface, which runs on the user's (the client). 2. The functional modules that actually process data. This middle tier runs on a server and is often called the application server. 3. A database management system (DBMS) that stores the data required by the middle tier. This tier runs on a second server called the database server. Answer the following: 1. What is a fat client? What is thin client? A fat client (sometimes called a thick client) is a networked computer with most resources installed locally, rather than distributed over a network as is the case with a thin client. Most PCs, are fat clients because they have their own......

Words: 1034 - Pages: 5

What

...hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what what what what what what what what what what what what what hat what what......

Words: 602 - Pages: 3

Signal Processing Fir Filters

...Department of Electrical, Electronic and Computer Engineering ESP 411 | Special Assignment Report | | Mark awarded | | Plagiarism declaration 1. I understand what plagiarism is and am aware of the University’s policy in this regard. 2. I declare that this report is my own original work. Where other people’s work has been used (either from a printed source, Internet or any other source), this has been properly acknowledged and referenced in accordance with departmental requirements. 3. I have not used work previously produced by another student or any other person to hand in as my own. 4. I have not allowed, and will not allow, anyone to copy my work with the intention of passing it off as his or her own work. Name | Student number | Signature | | | | Date | | Contents Table of Figures 3 Acronyms Used 3 PART 1 Filtering in the Frequency Domain 3 Introduction 3 Review of Prior Knowledge 4 Complex Numbers 4 Fourier series 4 Fourier Transform 4 Convolution Theorem 5 Overview 5 2-D FFT 6 DFT 6 IDFT 7 2-D FFT 7 Comparison with 1-D FFT 8 2-D FFT and Image Processing 8 Image Smoothing and Sharpening 9 Smoothing 9 Sharpening 11 Conclusion 13 PART 2 Application of Filtering in the Frequency Domain 13 Introduction 13 Gaussian Filter Theoretical Analysis 13 Gaussian Low Pass Filter 14 Gaussian High Pass Filter 14 Gaussian Filter Design 15 Practical Results 16 Conclusion 17 References 18 Table of......

Words: 4172 - Pages: 17

Post Fir Income Statement

...more than one statement will report the needed data. a. Income tax expense P1-66B ▸Requirements 1. Prepare the income statement of Post Fir, Inc., for the year ended Decemb er 31, 2012.2. Prepare the company’s statement of retained earnings for the year. 3. Prepare the company’s balance sheet at December 31, 2012. 4. Analyze Post Fir, Inc., by answering these questions: a. Was Post Fir profitable during 2012? By how much b. b. Did retained earnings increase or decrease? By how much? c. c. Which is greater, total liabilities or total equity? Who owns more of Post Fir’s assets, creditors of the company or Post Fir’s stockholders? Post Fir Income Statement Year Ended Dec 31, 2012 Revenue | | | Service Revenue | | $143000.00 | | | | Expenses | | | Property Tax Exp | $2400.00 | | Rent Expense | $13000.00 | | Utilities Expense | $2700.00 | | Interest Expense | $4650.00 | | Salary Expense | $34000.00 | | | | | Total | | $56750.00 | | | | Net Profit | | $86250.00 | Post Fir Inc Statement of Retained Earnings Year Ended Dec 3 Retained Earnings Dec 31, 2011 | $ 114,000.00 | + Net Income for the Year | $ 86,250.00 | Total | $ 200,250.00 | Less: Dividends | $ (36,000.00) | Retained Earnings Dec 31, 2012 | $ 164,250.00 | | | | | 1,2012 Post Fir Inc Balance Sheet Dec 31,2012 Assets | | Cash | $ 14,000.00 | Accounts Receivable | $ 26,500.00 | Supplies | $ 1,900.00 | ......

Words: 334 - Pages: 2

What Is the What

...Hayley Van Pelt English 1022.10 Amy Fladeboe September 26, 2014 The Importance of Setting in “What is the What” The setting of What is the What, a story by Dave Eggers, takes place roughly between the 1980s and 2000s. The first sentence at the beginning of the book, Valentino Achak Deng, the central narrator, says “What is the What is the soulful account of my life…” (Eggers xiii). Describing this book perfectly in one sentence. Valentino was born in southern Sudan in the village of Marial Bai. He fled in the late 1980s during the second Sudanese civil war, when his village was destroyed by murahaleen. Valentino spent nine years in Ethiopian and Kenyan refugee camps where he worked as a social advocate. In 2001 he resettled in Atlanta. This book shows symbolism, mood and a theme of how humans struggle to survive throughout Valentino’s life altering journey from where he came from to where he is now. Valentino stayed in Pinyudo, a refugee camp in Ethiopia, where he learned to read and write for three years. During his time spent in the camp, Valentino also had to do manual labor, farm work and other chores. Valentino was told to go into the forest to gather some kindling one day. The forest is frequently a symbol for death, danger or the unknown. “No one wanted to enter the forest, for in the forest, boys disappeared. The first two who died were well known for having been devoured by lions, and thus hunting in the forest for building materials became a job everyone chose to......

Words: 372 - Pages: 2

What to Be

...What to Be Society`s definition of a non-conformist is a person whose behavior or views do not conform to prevailing ideas or practices. To some people it is easy and simple to not conform to the proper manners of society and to others it doesn’t bother them a bit. In 2014, I could be a non-conformist by ignoring certain procedures of life, even though those certain actions can be seen as rebellion and lead to unasked for consequences. Martin Luther King Jr. fought against racial segregation and Jesus preached against Jewish tradition; both these men are seen as non-conformists by our society and both suffered serious consequences. If I were to become a nonconformist in 2014, I’d most likely do it by ignoring school rules such as not being able to use phones in school and having to ask for permission to leave the classroom with a reasonable excuse. Then at home I could ignore curfew, be irresponsible of my chores and not bother with the dress code set by my parents. But in the end I would have to suffer the consequences and eventually abide by the rules. Maybe these examples are too strong because nowadays everybody does their own thing and in teenagers, non-conformism can be seen as rebellion. In Elissa Karg`s, How To Be A Non-Conformist, she says “nonconformists smile only sardonic and sarcastic smiles.” To a grown adult a sarcastic smile can be seen as disrespectfulness and lower an image of the person. I think that non-conformism only leads to trouble for those that......

Words: 356 - Pages: 2

What

...drawers properly... for the fruits and veggies' sake! How Do the Drawers Work? Most humidity drawers are adjustable with a few clicks between low and high. These settings simply open or close a window in the drawer. For the low humidity setting the window is completely open; for the high humidity setting it is completely closed. What Should Go In Each Drawer? The general rule of thumb is to put things that tend to rot in a drawer with a low humidity setting. This includes fruits and veggies that emit an ethylene gas, like apples and pears, because leaving the window open on the drawer gives those gases a chance to escape. When the gases are released, it helps keep the fruits and vegetables from rotting prematurely. Things that wilt go in the high humidity drawer. This will be all your leafy greens like arugula, spinach, and herbs. By having the window closed, water vapor is held in the drawer and the moisture keeps the greens crisper and fresher longer. Keeping fruits and vegetables that are sensitive to ethylene gas, like strawberries, in this drawer will also keep them away from ethylene producers. Here's a handy list of what common fruits and vegetables should be kept in each drawer:...

Words: 288 - Pages: 2

What ?

...responsibilities of managers in MIC 1 2 the meaning of management and main functions and responsibilities of managers in MIC 2 3 Appropriate organizational structure for MIC 3 4 The qualities of a successful leader and different leadership styles 4 Task – 1 Describe the different users of financial statements and their needs Many individuals are interested in financial statements, from people involved in running a company (like managers and shareholders), to people who are affected by the actions of the company (such as the public). Most obviously, managers have to have an interest in financial statements. They need information about the current situation about the company in order to predict what can happen in the future. They can modify their actions and plans if the financial statements are not living up to their expectations. Shareholders, the company’s owners, are also interested in the company’s financial statements. They need to know the company’s current profits in order to withdraw their share for their own use. Of the two main financial statements, some users may be more interested in balance sheets and others more in income statements. For balance sheets, they capture the financial position of a moment, while income statements capture the record of income generated and expenditure incurred over a given period. For instance, shareholders will be interested both in the balance sheet and the income statement. At......

Words: 4622 - Pages: 19

What

...or proper adjective (or, sometimes, a trademark). In such cases, only the proper noun or adjective is capitalized. * Animals antelope, black bear, Bengal tiger, yellow-bellied sapsucker, German shepherd * Elements Always lowercase, even when the name is derived from a proper noun: einsteinium, nobelium, californium * Foods Lowercase except for brand names, proper nouns and adjectives, or custom-named recipes: Tabasco sauce, Russian dressing, pepper crusted bluefin tuna, Mandy's Bluefin Surprise * Heavenly bodies besides planets Never capitalize the moon or the sun. * Medical conditions Epstein-Barr syndrome, tuberculosis, Parkinson's disease * Minerals * Plants, vegetables, and fruits poinsettia, Douglas fir, Jerusalem artichoke, organic celery, Golden Delicious apples * Seasons and seasonal data spring, summertime, the winter solstice, the autumnal equinox, daylight saving time Rule 3. A thorny aspect of capitalization: where does it stop? When does the Iraq war become the Iraq War? Why is the legendary Hope Diamond not the Hope diamond? Everyone writesNew York City, so why does the Associated Press Stylebook recommend New York state? There aren't always easy formulas or logical explanations. Research with reference books and search engines is the best strategy. In the case of brand names, companies are of little help, because they capitalize any word that applies to their merchandise. Domino's Pizza or Domino's pizza? Is it Ivory......

Words: 1896 - Pages: 8

What

...Product and Service Strategies Marketing Mix * Blending of the four strategy elements—product, distribution, promotion, and price—to fit the needs and preferences of a specific target market * Marketers develop strategies to sell both tangible goods and intangible services What is a Product? * People buy want satisfaction, not objects * Product - Bundle of physical, service, and symbolic attributes designed to satisfy a customer’s wants and needs What are Goods and Services? * Services - Intangible tasks that satisfy the needs of consumers and business users * Goods - Tangible products that customers can see, hear, smell, taste, or touch * Goods–services continuum - Spectrum along which goods and services fall according to their attributes, from pure good to pure service Figure 12.1 – Goods-Services Continuum Characteristics of Services * Intangible * Inseparable from the service providers * Perishable * Cannot be standardized * Buyers play important roles in the creation and distribution of services * Wide variations in service standards Figure 12.2 – World’s Most Admired Companies Importance of the Service Sector * The service sector makes up more than three-fourths of the U.S. economy * Backshoring - Firms return much of their offshore work to the U.S. to save money and improve customer service efficiency * Homeshoring - Hiring workers to do jobs from their homes * Most service firms emphasize...

Words: 986 - Pages: 4

What for

...perfect. Disputes with his neighbors and court battles cause Pahom to be disliked by the Community, so even though he had more land, his position in the town was worse than ever. Pahom's life may have been improved by owning more land, but human nature prompted him to continue to be greedy, wanting even more than he already had. One day, Pahom hears word of a place where free land was given to any man who joins the Commune. Immediately the many acres of land that he does own seem unbearable and barren compared to the promise of better land. He asks himself, "Why should I suffer in this narrow hole, if one can live so well elsewhere?” Therefore, although he has plenty of good land and a good life, Pahom sells everything he owns to pursue what he thinks will complete his idea of a happy life. With the new land, Pahom was content, but soon he grew accustomed to it and began to want more once again. After renting extra land, Pahom decided it would be an even better idea if he actually owned all his land for he believed he "should be independent, and there would not be any unpleasantness". He planned to buy more land, but along came an opportunity that he would not let pass by. A tradesman passing through told Pahom of lush land, sold for nearly no money, so Pahom decided that land would be a better deal. "If I take it out there, I can get more than ten times as much for the money" he figured, so he abandoned everything he had worked for and went to check out the land. Just as......

Words: 859 - Pages: 4

What?

...HealthSouth-CEO Scrushy allegedly told underlings to make up numbers and transactions. He got caught because he sold $75 million in stock a day and people took notice. WorldCom-CEO Ebbers underreported line costs by capitalizing rather than expensing. The internal auditing department found $3.8 million in fraud. Level 1: Is the action legal? If the action is illegal, then it is unethical. Level 2: Is the action fair to all involved? Your behavior should be fair to all parties involved. Note that the concept of fairness does not mean that everyone is happy with the outcome. It only means that the decision has been made in an impartial and unbiased manner. Level 3: Does the behavior make you feel good? It is understandable that not everyone agrees on what is right and fair. This question gets to the personal aspect because your conscience becomes a consideration. 2) Legitimate power is the power that is given to you by the company. An example of this would be a manager hiring an employee. Coercive power is the power that is derived from your formal position. Reward power is the ability to influence someone with something of value. This is the opposite of coercive since it is rewarding the individual. Connection power is based on using someone else’s legitimate power. This deals strongly with networking within and outside the company. Charismatic power makes people attracted to you. They are normally energetic and social. Information power is based on an individual’s ability......

Words: 875 - Pages: 4