task
stringlengths
18
98
input
stringlengths
5
2.61k
output
stringlengths
1
9.08k
options
sequence
pageTitle
stringlengths
0
264
outputColName
stringlengths
1
242
url
stringlengths
19
216
wdcFile
stringlengths
70
75
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT
[CHARACTERISTIC] Fire Resistance [FOAM INSULATION] Yes, but ... [CELLULOSE INSULATION] Yes [COMMENT]
See “Smoke Developed” above.
[]
Cellulose Insulation vs. Foam Insulation
COMMENT
http://www.tasconindustries.com/CelluloseVsFoam.html
3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT
[CHARACTERISTIC] Fire Block & Ignition Barrier [FOAM INSULATION] No [CELLULOSE INSULATION] Yes [COMMENT]
Cellulose approved as both. Can reduce cost considerably.
[]
Cellulose Insulation vs. Foam Insulation
COMMENT
http://www.tasconindustries.com/CelluloseVsFoam.html
3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT
[CHARACTERISTIC] Flame Spread [FOAM INSULATION] ≤ 25 [CELLULOSE INSULATION] ≤ 25 [COMMENT]
Widely-used Class 1 foam insulation failed the 15 minute NFPA 286 Test in 44 seconds. See also“Smoke Developed” above.
[]
Cellulose Insulation vs. Foam Insulation
COMMENT
http://www.tasconindustries.com/CelluloseVsFoam.html
3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT
[CHARACTERISTIC] Cost (R-30 Attic) [FOAM INSULATION] $2.75/sq. ft. [CELLULOSE INSULATION] $0.60/sq. ft. [COMMENT]
Foam costs are 2 to 3 times higher than the cost of installing cellulose without providing any offsetting benefit.
[]
Cellulose Insulation vs. Foam Insulation
COMMENT
http://www.tasconindustries.com/CelluloseVsFoam.html
3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT
[CHARACTERISTIC] Cost (2X4 Wall) [FOAM INSULATION] $1.20/sq. ft. [CELLULOSE INSULATION] $0.55/sq. ft. [COMMENT]
Foam costs are 2 to 3 times higher than the cost of installing cellulose without providing any offsetting benefit.
[]
Cellulose Insulation vs. Foam Insulation
COMMENT
http://www.tasconindustries.com/CelluloseVsFoam.html
3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT
[CHARACTERISTIC] Sound Reverberation Control [FOAM INSULATION] NRC = 0.70 [CELLULOSE INSULATION] NRC = 0.80 [COMMENT]
Cellulose reduces sound reverberation (echoing) more than foam.
[]
Cellulose Insulation vs. Foam Insulation
COMMENT
http://www.tasconindustries.com/CelluloseVsFoam.html
3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT
[CHARACTERISTIC] Sound Transmission Control [FOAM INSULATION] STC = 39 [CELLULOSE INSULATION] STC = 49+ [COMMENT]
Cellulose has greater sound blocking capability than foam on similar wall assemblies.
[]
Cellulose Insulation vs. Foam Insulation
COMMENT
http://www.tasconindustries.com/CelluloseVsFoam.html
3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT
[CHARACTERISTIC] Thermal Barrier Required [FOAM INSULATION] Yes [CELLULOSE INSULATION] No [COMMENT]
Foam must be separated from the interior of a building by an approved thermal/fire barrier.
[]
Cellulose Insulation vs. Foam Insulation
COMMENT
http://www.tasconindustries.com/CelluloseVsFoam.html
3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] CART [COOKIE Description]
The association with your shopping cart.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] CATEGORY_INFO [COOKIE Description]
Stores the category info on the page, that allows to display pages more quickly.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] COMPARE [COOKIE Description]
The items that you have in the Compare Products list.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] CURRENCY [COOKIE Description]
Your preferred currency
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] CUSTOMER [COOKIE Description]
An encrypted version of your customer id with the store.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] CUSTOMER_AUTH [COOKIE Description]
An indicator if you are currently logged into the store.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] CUSTOMER_INFO [COOKIE Description]
An encrypted version of the customer group you belong to.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] CUSTOMER_SEGMENT_IDS [COOKIE Description]
Stores the Customer Segment ID
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] EXTERNAL_NO_CACHE [COOKIE Description]
A flag, which indicates whether caching is disabled or not.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] FRONTEND [COOKIE Description]
You sesssion ID on the server.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] GUEST-VIEW [COOKIE Description]
Allows guests to edit their orders.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] LAST_CATEGORY [COOKIE Description]
The last category you visited.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] LAST_PRODUCT [COOKIE Description]
The most recent product you have viewed.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] NEWMESSAGE [COOKIE Description]
Indicates whether a new message has been received.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] NO_CACHE [COOKIE Description]
Indicates whether it is allowed to use cache.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] PERSISTENT_SHOPPING_CART [COOKIE Description]
A link to information about your cart and viewing history if you have asked the site.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] POLL [COOKIE Description]
The ID of any polls you have recently voted in.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] POLLN [COOKIE Description]
Information on what polls you have voted on.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] RECENTLYCOMPARED [COOKIE Description]
The items that you have recently compared.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] STF [COOKIE Description]
Information on products you have emailed to friends.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] STORE [COOKIE Description]
The store view or language you have selected.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] USER_ALLOWED_SAVE_COOKIE [COOKIE Description]
Indicates whether a customer allowed to use cookies.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] VIEWED_PRODUCT_IDS [COOKIE Description]
The products that you have recently viewed.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] WISHLIST [COOKIE Description]
An encrypted list of products added to your Wishlist.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description
[COOKIE name] WISHLIST_CNT [COOKIE Description]
The number of items in your Wishlist.
[]
Privacy Policy - The Scottish Grocer
COOKIE Description
http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode
19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 1 [Level of Activation] Dormant [Description]
Only the centers of the Conscious mind are operating. The contents of your higher vehicles of the Subconscious, Metaconscious and Superconscious mind do not enter your conscious awareness. Your attention is stabilized in the waking state of awareness. Your functioning is automatized and seamless, with no withdrawal of functioning. This is the fully grounded state of kundalini shakti.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 2 [Level of Activation] Low activity [Description]
Some of the kundalini energy is drawn up and activates a higher vehicle. This operates in the background of your conscious awareness. There is no withdrawal of functioning and your attention is not drawn up into the higher vehicle. This stage typifies activation of vehicles in your Subconscious or Metaconscious when you are carrying out habitual tasks and your attention is on other things.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 3 [Level of Activation] Moderate activity [Description]
More of your kundalini energy is raised into a higher vehicle so that this higher vehicle is stirred into heightened activity. The contents of this higher vehicle's activity enter your conscious awareness, and your attention may begin to become absorbed in this content. This stage typifies activation of your vehicles when you are deeply absorbed in thought, trying to work out a problem, or listening to your intuition. You may become absent-minded in this stage, not paying attention to what is happening around you in the environment.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 4 [Level of Activation] High activity [Description]
This is the first stage of true kundalini awakening. The kundalini energy becomes powerfully focalized. Your attention is irresistibly caught up in its energy. Your higher vehicles begin to become suffused with light and are stirred into full activity. The content of this higher vehicle becomes the focus of your attention. You begin to experience the first stages of withdrawal of functioning: fascination, dissociation, numbness and tingling of your extremities, and an inability to speak. You may begin to feel the sensations of the "rising serpent" as you palpably feel this energy rise up through the spinal tube in your Subconscious mind. You may also feel your chakras begin to awaken.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 5 [Level of Activation] Activation of the unconscious mind [Description]
As kundalini rises into the unconscious bands of your awareness between the Subconscious and Metaconscious mind, you may begin to experience emergence phenomena. There is strong withdrawal of energy at this stage, and you may begin to spontaneously express the content of your unconscious mind by re-living emotions, making involuntary movements, or talking irrationally. You enter a powerful hypnotic trance at this stage, and your attention is riveted on the content of your unconscious mind. A variety of painful and unpleasant physical sensations may accompany this state.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 6 [Level of Activation] Metaconscious activation [Description]
As kundalini ascends into your metaconscious vehicles, your attention is powerfully drawn up into them and you become aware of their contents. As the serpent rises through each vehicle, it is suffused with energy, and shuts down into a resting state. At this stage your entire personality is submerged in this energy—you cannot move your body, you cannot think, you cannot speak.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 7 [Level of Activation] Superconscious activation [Description]
Kundalini will then cross another veil of unconsciousness between your Metaconscious and Superconscious mind. Here you may experience more emergence phenomena. The kundalini will then progressively rise through the vehicles of the Subtle and Planetary bands, and will gain union with your Soul. The culmination of this ecstatic state confers the state of enlightenment—the awakening of the Soul's knowledge of its own nature with full awareness. Your personality is here fully shut down and your attention is caught up in the visionary cascade of the Superconscious mind, progressing to complete union with the Soul.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 8 [Level of Activation] Higher Unconscious activation [Description]
Kundalini then rises into the higher unconscious separating your Soul from liberation. You may gain glimpses of the state of liberation and higher stages of the Path. You may witness the chakras of the Planetary Man and gain temporary union with your Monad. This union with a universal, all-pervading consciousness has been referred to as Sabikalpa Samadhi. Your personality is fully shut down and your attention is carried along with the rising kundalini.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 9 [Level of Activation] Higher Octave activation [Description]
Next the kundalini travels upward into the higher octave vehicles of the Transplanetary, Cosmic, Supracosmic, and even Transcendental bands of the Superconscious mind. You gain union with the nuclei of identity and ensouling entities of these realms.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
da617d09_eflections_on_Kundalini_Shakti__Description
[Stage] 10 [Level of Activation] Return to the Origin [Description]
Finally the energy of the kundalini merges again with a great ocean of Peace. This confers multidimensional awareness of all levels of the mind. Your attention is drawn into a great, peaceful void.
[]
Reflections on Kundalini Shakti
Description
http://www.mudrashram.com/reflectionsonkundalini.html
13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json
663c9033_Basic_Node_Structure___Emitrom__Description
[Attributes] primarySizeX [Description]
Width of the primary grid cells
[]
Basic Node Structure - Emitrom
Description
http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure
47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json
663c9033_Basic_Node_Structure___Emitrom__Description
[Attributes] primaryLineX [Description]
Line used for drawing the vertical primary lines
[]
Basic Node Structure - Emitrom
Description
http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure
47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json
663c9033_Basic_Node_Structure___Emitrom__Description
[Attributes] primarySizeY [Description]
Height of the primary grid cells
[]
Basic Node Structure - Emitrom
Description
http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure
47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json
663c9033_Basic_Node_Structure___Emitrom__Description
[Attributes] primaryLineY [Description]
Line used for drawing the horizontal primary lines
[]
Basic Node Structure - Emitrom
Description
http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure
47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json
663c9033_Basic_Node_Structure___Emitrom__Description
[Attributes] secondarySizeX [Description]
Width of the secondary grid cells
[]
Basic Node Structure - Emitrom
Description
http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure
47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json
663c9033_Basic_Node_Structure___Emitrom__Description
[Attributes] secondaryLineX [Description]
Line used for drawing the vertical secondary lines
[]
Basic Node Structure - Emitrom
Description
http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure
47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json
663c9033_Basic_Node_Structure___Emitrom__Description
[Attributes] secondarySizeY [Description]
Height of the secondary grid cells
[]
Basic Node Structure - Emitrom
Description
http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure
47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json
663c9033_Basic_Node_Structure___Emitrom__Description
[Attributes] secondaryLineY [Description]
Line used for drawing the horizontal secondary lines
[]
Basic Node Structure - Emitrom
Description
http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure
47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json
16df13bc_Your_Ps____Campbell_University__The_Question
[The P] PURPOSE [The Question]
Why are you sharing this information?
[]
Mind Your Ps! - Campbell University
The Question
http://[email protected]/academics/interprofessional-education/mind-your-ps/
38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json
16df13bc_Your_Ps____Campbell_University__The_Question
[The P] PRIVACY [The Question]
Who is going to see it? Where else might it go?
[]
Mind Your Ps! - Campbell University
The Question
http://[email protected]/academics/interprofessional-education/mind-your-ps/
38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json
16df13bc_Your_Ps____Campbell_University__The_Question
[The P] PATIENT [The Question]
If the patient saw this, would they recognize themselves?
[]
Mind Your Ps! - Campbell University
The Question
http://[email protected]/academics/interprofessional-education/mind-your-ps/
38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json
16df13bc_Your_Ps____Campbell_University__The_Question
[The P] PERSONAL [The Question]
If someone posted this about you, how would you feel?
[]
Mind Your Ps! - Campbell University
The Question
http://[email protected]/academics/interprofessional-education/mind-your-ps/
38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json
16df13bc_Your_Ps____Campbell_University__The_Question
[The P] PROFESSIONAL [The Question]
How might this impact the image of your profession?
[]
Mind Your Ps! - Campbell University
The Question
http://[email protected]/academics/interprofessional-education/mind-your-ps/
38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json
16df13bc_Your_Ps____Campbell_University__The_Question
[The P] PROTECT [The Question]
Are your privacy settings the strictest available & checked regularly?
[]
Mind Your Ps! - Campbell University
The Question
http://[email protected]/academics/interprofessional-education/mind-your-ps/
38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json
16df13bc_Your_Ps____Campbell_University__The_Question
[The P] PERMISSION [The Question]
Have you obtained permission & cited others’ work?
[]
Mind Your Ps! - Campbell University
The Question
http://[email protected]/academics/interprofessional-education/mind-your-ps/
38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json
16df13bc_Your_Ps____Campbell_University__The_Question
[The P] PERMANENT [The Question]
You can never get it back.
[]
Mind Your Ps! - Campbell University
The Question
http://[email protected]/academics/interprofessional-education/mind-your-ps/
38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json
37b1ebc9_CIPE_Manual__1
[0] Name [2] Req [1]
Type
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] device [2] no [3] Name of the CIPE device. If not given, the system picks a free one. [1]
String
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] debug [3] Don't go background, use stderr instead of syslog. (Independent of the kernel driver debug option.) [1]
Bool
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] ipaddr [2] yes [3] IP address of the CIPE device. [1]
IP
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] ptpaddr [2] (yes) [3] IP address of the peer device (i.e. the CIPE device on the other end). For protocol 3. [1]
IP
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] mask [2] no [3] Netmask of the CIPE device. For protocol 4. [1]
IP
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] bcast [2] no [3] Broadcast address of the CIPE device. For protocol 4. [1]
IP
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] mtu [2] no [3] Device MTU (default: ethernet standard MTU minus all necessary headers) [1]
Int
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] metric [2] no [3] Device metric (not sure if this is used anywhere...) [1]
Int
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] cttl [2] no [3] Carrier TTL value. If not specified or 0, use the payload packet's TTL. Default recommendation is 64. [1]
Int
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] me [2] no [3] Our carrier UDP address. If either IP or port are not given, the system picks one and reports it via `ip-up'. [1]
UDP
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] peer [2] yes [3] The other end's carrier UDP address. [1]
UDP
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] key [2] (yes) [3] The link key. For security reasons, the key has to be set via an options file, subject to the restrictions described above. The key should be 128 bits in hexadecimal encoding. (To generate such a beast from random, try ps -auxw | md5sum.) [1]
String
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] nokey [3] Don't encrypt at all, just encapsulate in UDP. Only with this option, key is not needed. [1]
Bool
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] socks [2] no [3] Address (port required!) of the SOCKS5 server. See section Working with SOCKS. [1]
TCP
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] tokxc [2] no [3] Timeout (seconds) for key exchange. Default: 10. [1]
Int
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] tokey [2] no [3] Dynamic key lifetime. Default: 600 (10 minutes). [1]
Int
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] ipup [2] no [3] Script to run instead of `/etc/cipe/ip-up'. [1]
String
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] ipdown [2] no [3] Script to run instead of `/etc/cipe/ip-down'. [1]
String
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] arg [2] no [3] Argument to supply to `ip-up', `ip-down'. [1]
String
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] maxerr [2] no [3] Maximum number of errors before ciped exits. See section Error handling in @command{ciped}. [1]
Int
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] tokxts [2] no [3] Key exchange timestamp timeout. Default: 0 (no timestamps). Set this to 30 to prevent key exchange replay attacks, but only if the peer runs CIPE 1.2 or later and both system clocks are reasonably synchronized. [1]
Int
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] ping [2] no [3] Frequency (in seconds) for keep-alive pings. Default is don't send any pings. The "ping" used here is internal to CIPE, not ICMP ping. [1]
Int
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] toping [2] no [3] Timeout for pings. If no answer is received on a keep-alive ping in this time, it counts as an error, See section Error handling in @command{ciped}. Default is no check for answers. [1]
Int
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] dynip [3] Assume the carrier is on a dynamic IP address. See section Dynamic carrier addresses. [1]
Bool
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] hwaddr [2] no [3] Set the dummy MAC address used in Ethernet mode (protocol 4). [1]
String
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] ifconfig [3] Require an external @command{ifconfig} call to configure the interface. [1]
Bool
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
37b1ebc9_CIPE_Manual__1
[0] checksum [3] Use checksummed UDP carrier packets. Only necessary if the network does not like unchecksummed packets. [1]
Bool
[ [ "T", "y", "p", "e" ], [ "S", "t", "r", "i", "n", "g" ], [ "B", "o", "o", "l" ], [ "I", "P" ], [ "I", "n", "t" ], [ "U", "D", "P" ], [ "T", "C", "P" ] ]
CIPE Manual
1
http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html
19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json
d0c83bc4__Training_Toolkit___Math_Tools__0
[1] - [2] x [3] / [0]
+
[ [ "+" ], [ "a", "d", "d", "i", "t", "i", "o", "n" ], [ "p", "l", "u", "s" ], [ "a", "d", "d" ], [ "t", "o", "t", "a", "l" ], [ "m", "o", "r", "e" ] ]
Afterschool Training Toolkit | Math Tools
0
http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html
3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json
d0c83bc4__Training_Toolkit___Math_Tools__0
[1] subtraction [2] multiplication [3] division [0]
addition
[ [ "+" ], [ "a", "d", "d", "i", "t", "i", "o", "n" ], [ "p", "l", "u", "s" ], [ "a", "d", "d" ], [ "t", "o", "t", "a", "l" ], [ "m", "o", "r", "e" ] ]
Afterschool Training Toolkit | Math Tools
0
http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html
3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json
d0c83bc4__Training_Toolkit___Math_Tools__0
[1] minus [2] times [3] half [0]
plus
[ [ "+" ], [ "a", "d", "d", "i", "t", "i", "o", "n" ], [ "p", "l", "u", "s" ], [ "a", "d", "d" ], [ "t", "o", "t", "a", "l" ], [ "m", "o", "r", "e" ] ]
Afterschool Training Toolkit | Math Tools
0
http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html
3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json
d0c83bc4__Training_Toolkit___Math_Tools__0
[1] subtract [2] multiply [3] divide [0]
add
[ [ "+" ], [ "a", "d", "d", "i", "t", "i", "o", "n" ], [ "p", "l", "u", "s" ], [ "a", "d", "d" ], [ "t", "o", "t", "a", "l" ], [ "m", "o", "r", "e" ] ]
Afterschool Training Toolkit | Math Tools
0
http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html
3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json
d0c83bc4__Training_Toolkit___Math_Tools__0
[1] remainder [2] product [3] quotient [0]
total
[ [ "+" ], [ "a", "d", "d", "i", "t", "i", "o", "n" ], [ "p", "l", "u", "s" ], [ "a", "d", "d" ], [ "t", "o", "t", "a", "l" ], [ "m", "o", "r", "e" ] ]
Afterschool Training Toolkit | Math Tools
0
http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html
3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json
d0c83bc4__Training_Toolkit___Math_Tools__0
[1] fewer (less) [0]
more
[ [ "+" ], [ "a", "d", "d", "i", "t", "i", "o", "n" ], [ "p", "l", "u", "s" ], [ "a", "d", "d" ], [ "t", "o", "t", "a", "l" ], [ "m", "o", "r", "e" ] ]
Afterschool Training Toolkit | Math Tools
0
http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html
3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json
08868a47_d_Social_Perception_Structures__4
[1] Focus of body of knowledge [2] Direction & degree of exchange [3] Ability to change [5] Type of relationship [6] Deceptiveness [7] Breadth of learning [8] Tolerance [9] Methods [4]
Structure of persuasion
[]
Belief Systems and Social Perception Structures
4
http://trufax.org/general/beliefsystems.html
32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json
08868a47_d_Social_Perception_Structures__4
[0] Education [1] Many bodies of knowledge, based on scientific findings in various fields. [2] Two way pupil-teacher exchange encouraged. [3] Change occurs as science advances; as students and other scholars offer criticisms; as students & citizens evaluate programs. [5] Instruction is time-limited: consensual. [6] Is not deceptive. [7] Focuses on learning to learn & learning about reality; broad goal is rounded knowledge for development of the individual. [8] Respects differences. [9] Instructional techniques. [4]
Uses teacher-pupil structure; logical thinking encouraged.
[]
Belief Systems and Social Perception Structures
4
http://trufax.org/general/beliefsystems.html
32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json
08868a47_d_Social_Perception_Structures__4
[0] Advertising [1] Body of knowledge concerns product, competitors; how to sell and influence via legal persuasion. [2] Exchange can occur but communication generally one-sided. [3] Change made by those who pay for it, based upon the success of ad programs by consumers law, & in response to consumer complaints. [5] Consumer/buyer can accept or ignore communication. [6] Can be deceptive, selecting only positive views. [7] Has a narrow goal of swaying opinion to promote and sell an idea, object, or program; another goal is to enhance seller & possibly buyer. [8] Puts down competition. [9] Mild to heavy persuasion. [4]
Uses an instructional mode to persuade consumer/buyer.
[]
Belief Systems and Social Perception Structures
4
http://trufax.org/general/beliefsystems.html
32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json
08868a47_d_Social_Perception_Structures__4
[0] Propaganda [1] Body of knowledge centers on political persuasion of masses of people. [2] Some exchange occurs but communication generally one-sided. [3] Change based on changing tides in world politics and on political need to promote the group, nation, or international organization. [5] Learner support & engrossment expected. [6] Can be deceptive, often exaggerated. [7] Targets large political masses to make them believe a specific view or circumstance is good. [8] Wants to lessen opposition. [9] Overt persuasion sometimes unethical. [4]
Takes authoritarian stance to persuade masses.
[]
Belief Systems and Social Perception Structures
4
http://trufax.org/general/beliefsystems.html
32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json
08868a47_d_Social_Perception_Structures__4
[0] Indoctrination [1] Body of knowledge is explicitly designed to inculcate organizational values. [2] Limited exchange occurs, communication is one-sided. [3] Change made through formal channels, via written suggestions to higher-ups. [5] Instruction is contractual: consensual [6] Is not deceptive. [7] Stresses narrow learning for a specific goal; to become something or to train for performance of duties. [8] Aware of differences. [9] Disciplinary techniques. [4]
Takes authoritarian & hierarchical stance.
[]
Belief Systems and Social Perception Structures
4
http://trufax.org/general/beliefsystems.html
32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json
08868a47_d_Social_Perception_Structures__4
[0] Thought Reform [1] Body of knowledge centers on changing people without their knowledge. [2] No exchange occurs, communication is one-sided. [3] Change occurs rarely; organization remains fairly rigid; change occurs primarily to improve thought-reform effectiveness. [5] Group attempts to retain people forever. [6] Is deceptive. [7] Individualized target; hidden agenda (you will be changed one step at a time to become deployable to serve leaders). [8] No respect for differences. [9] Improper and unethical techniques. [4]
Takes authoritarian & hierarchical stance; No full awareness on part of learner.
[]
Belief Systems and Social Perception Structures
4
http://trufax.org/general/beliefsystems.html
32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json
2dd297b9_hic___about_us_and_our_mission__Cookie
[Name] _utma _utmb _utmc _utmz [Purpose] These cookies are used to collect information about how visitors use our site. We use the information to compile reports and to help us improve the site. The cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come to the site from and the pages they visited. [Further information] Privacy at Google [Cookie]
Google Analytics
[ [ "G", "o", "o", "g", "l", "e", " ", "A", "n", "a", "l", "y", "t", "i", "c", "s" ], [ "R", "e", "f", "e", "r", "r", "a", "l", " ", "t", "r", "a", "c", "k", "i", "n", "g" ], [ "A", "u", "t", "o", "m", "a", "t", "i", "c", " ", "l", "o", "g", "i", "n" ], [ "S", "o", "c", "i", "a", "l", " ", "m", "e", "d", "i", "a", " ", "l", "o", "g", "i", "n" ], [ "D", "i", "s", "q", "u", "s", " ", "b", "l", "o", "g", " ", "c", "o", "m", "m", "e", "n", "t", "i", "n", "g" ], [ "C", "h", "o", "s", "e", "n", " ", "a", "r", "e", "a", "s", " ", "a", "n", "d", " ", "t", "a", "g", "s" ] ]
The Daily Chic - about us and our mission
Cookie
http://thedailychic.com/page/privacy
21/1438042988840.31_20150728002308-00267-ip-10-236-191-2_240320467_0.json