task
stringlengths 18
98
| input
stringlengths 5
2.61k
| output
stringlengths 1
9.08k
| options
sequence | pageTitle
stringlengths 0
264
| outputColName
stringlengths 1
242
| url
stringlengths 19
216
| wdcFile
stringlengths 70
75
|
---|---|---|---|---|---|---|---|
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT | [CHARACTERISTIC] Fire Resistance [FOAM INSULATION] Yes, but ... [CELLULOSE INSULATION] Yes [COMMENT] | See “Smoke Developed” above. | [] | Cellulose Insulation vs. Foam Insulation | COMMENT | http://www.tasconindustries.com/CelluloseVsFoam.html | 3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json |
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT | [CHARACTERISTIC] Fire Block & Ignition Barrier [FOAM INSULATION] No [CELLULOSE INSULATION] Yes [COMMENT] | Cellulose approved as both. Can reduce cost considerably. | [] | Cellulose Insulation vs. Foam Insulation | COMMENT | http://www.tasconindustries.com/CelluloseVsFoam.html | 3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json |
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT | [CHARACTERISTIC] Flame Spread [FOAM INSULATION] ≤ 25 [CELLULOSE INSULATION] ≤ 25 [COMMENT] | Widely-used Class 1 foam insulation failed the 15 minute NFPA 286 Test in 44 seconds. See also“Smoke Developed” above. | [] | Cellulose Insulation vs. Foam Insulation | COMMENT | http://www.tasconindustries.com/CelluloseVsFoam.html | 3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json |
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT | [CHARACTERISTIC] Cost (R-30 Attic) [FOAM INSULATION] $2.75/sq. ft. [CELLULOSE INSULATION] $0.60/sq. ft. [COMMENT] | Foam costs are 2 to 3 times higher than the cost of installing cellulose without providing any offsetting benefit. | [] | Cellulose Insulation vs. Foam Insulation | COMMENT | http://www.tasconindustries.com/CelluloseVsFoam.html | 3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json |
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT | [CHARACTERISTIC] Cost (2X4 Wall) [FOAM INSULATION] $1.20/sq. ft. [CELLULOSE INSULATION] $0.55/sq. ft. [COMMENT] | Foam costs are 2 to 3 times higher than the cost of installing cellulose without providing any offsetting benefit. | [] | Cellulose Insulation vs. Foam Insulation | COMMENT | http://www.tasconindustries.com/CelluloseVsFoam.html | 3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json |
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT | [CHARACTERISTIC] Sound Reverberation Control [FOAM INSULATION] NRC = 0.70 [CELLULOSE INSULATION] NRC = 0.80 [COMMENT] | Cellulose reduces sound reverberation (echoing) more than foam. | [] | Cellulose Insulation vs. Foam Insulation | COMMENT | http://www.tasconindustries.com/CelluloseVsFoam.html | 3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json |
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT | [CHARACTERISTIC] Sound Transmission Control [FOAM INSULATION] STC = 39 [CELLULOSE INSULATION] STC = 49+ [COMMENT] | Cellulose has greater sound blocking capability than foam on similar wall assemblies. | [] | Cellulose Insulation vs. Foam Insulation | COMMENT | http://www.tasconindustries.com/CelluloseVsFoam.html | 3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json |
5a5b00f7_Insulation_vs__Foam_Insulation__COMMENT | [CHARACTERISTIC] Thermal Barrier Required [FOAM INSULATION] Yes [CELLULOSE INSULATION] No [COMMENT] | Foam must be separated from the interior of a building by an approved thermal/fire barrier. | [] | Cellulose Insulation vs. Foam Insulation | COMMENT | http://www.tasconindustries.com/CelluloseVsFoam.html | 3/1438042988317.67_20150728002308-00078-ip-10-236-191-2_739383498_1.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] CART [COOKIE Description] | The association with your shopping cart. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] CATEGORY_INFO [COOKIE Description] | Stores the category info on the page, that allows to display pages more quickly. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] COMPARE [COOKIE Description] | The items that you have in the Compare Products list. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] CURRENCY [COOKIE Description] | Your preferred currency | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] CUSTOMER [COOKIE Description] | An encrypted version of your customer id with the store. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] CUSTOMER_AUTH [COOKIE Description] | An indicator if you are currently logged into the store. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] CUSTOMER_INFO [COOKIE Description] | An encrypted version of the customer group you belong to. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] CUSTOMER_SEGMENT_IDS [COOKIE Description] | Stores the Customer Segment ID | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] EXTERNAL_NO_CACHE [COOKIE Description] | A flag, which indicates whether caching is disabled or not. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] FRONTEND [COOKIE Description] | You sesssion ID on the server. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] GUEST-VIEW [COOKIE Description] | Allows guests to edit their orders. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] LAST_CATEGORY [COOKIE Description] | The last category you visited. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] LAST_PRODUCT [COOKIE Description] | The most recent product you have viewed. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] NEWMESSAGE [COOKIE Description] | Indicates whether a new message has been received. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] NO_CACHE [COOKIE Description] | Indicates whether it is allowed to use cache. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] PERSISTENT_SHOPPING_CART [COOKIE Description] | A link to information about your cart and viewing history if you have asked the site. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] POLL [COOKIE Description] | The ID of any polls you have recently voted in. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] POLLN [COOKIE Description] | Information on what polls you have voted on. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] RECENTLYCOMPARED [COOKIE Description] | The items that you have recently compared. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] STF [COOKIE Description] | Information on products you have emailed to friends. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] STORE [COOKIE Description] | The store view or language you have selected. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] USER_ALLOWED_SAVE_COOKIE [COOKIE Description] | Indicates whether a customer allowed to use cookies. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] VIEWED_PRODUCT_IDS [COOKIE Description] | The products that you have recently viewed. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] WISHLIST [COOKIE Description] | An encrypted list of products added to your Wishlist. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
9518a99e_y_Policy___The_Scottish_Grocer__COOKIE_Description | [COOKIE name] WISHLIST_CNT [COOKIE Description] | The number of items in your Wishlist. | [] | Privacy Policy - The Scottish Grocer | COOKIE Description | http://www.thescottishgrocer.com/privacy-policy-cookie-restriction-mode | 19/1438044160065.87_20150728004240-00019-ip-10-236-191-2_752260674_0.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 1 [Level of Activation] Dormant [Description] | Only the centers of the Conscious mind are operating. The contents of your higher vehicles of the Subconscious, Metaconscious and Superconscious mind do not enter your conscious awareness. Your attention is stabilized in the waking state of awareness. Your functioning is automatized and seamless, with no withdrawal of functioning. This is the fully grounded state of kundalini shakti. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 2 [Level of Activation] Low activity [Description] | Some of the kundalini energy is drawn up and activates a higher vehicle. This operates in the background of your conscious awareness. There is no withdrawal of functioning and your attention is not drawn up into the higher vehicle. This stage typifies activation of vehicles in your Subconscious or Metaconscious when you are carrying out habitual tasks and your attention is on other things. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 3 [Level of Activation] Moderate activity [Description] | More of your kundalini energy is raised into a higher vehicle so that this higher vehicle is stirred into heightened activity. The contents of this higher vehicle's activity enter your conscious awareness, and your attention may begin to become absorbed in this content. This stage typifies activation of your vehicles when you are deeply absorbed in thought, trying to work out a problem, or listening to your intuition. You may become absent-minded in this stage, not paying attention to what is happening around you in the environment. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 4 [Level of Activation] High activity [Description] | This is the first stage of true kundalini awakening. The kundalini energy becomes powerfully focalized. Your attention is irresistibly caught up in its energy. Your higher vehicles begin to become suffused with light and are stirred into full activity. The content of this higher vehicle becomes the focus of your attention. You begin to experience the first stages of withdrawal of functioning: fascination, dissociation, numbness and tingling of your extremities, and an inability to speak. You may begin to feel the sensations of the "rising serpent" as you palpably feel this energy rise up through the spinal tube in your Subconscious mind. You may also feel your chakras begin to awaken. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 5 [Level of Activation] Activation of the unconscious mind [Description] | As kundalini rises into the unconscious bands of your awareness between the Subconscious and Metaconscious mind, you may begin to experience emergence phenomena. There is strong withdrawal of energy at this stage, and you may begin to spontaneously express the content of your unconscious mind by re-living emotions, making involuntary movements, or talking irrationally. You enter a powerful hypnotic trance at this stage, and your attention is riveted on the content of your unconscious mind. A variety of painful and unpleasant physical sensations may accompany this state. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 6 [Level of Activation] Metaconscious activation [Description] | As kundalini ascends into your metaconscious vehicles, your attention is powerfully drawn up into them and you become aware of their contents. As the serpent rises through each vehicle, it is suffused with energy, and shuts down into a resting state. At this stage your entire personality is submerged in this energyyou cannot move your body, you cannot think, you cannot speak. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 7 [Level of Activation] Superconscious activation [Description] | Kundalini will then cross another veil of unconsciousness between your Metaconscious and Superconscious mind. Here you may experience more emergence phenomena. The kundalini will then progressively rise through the vehicles of the Subtle and Planetary bands, and will gain union with your Soul. The culmination of this ecstatic state confers the state of enlightenmentthe awakening of the Soul's knowledge of its own nature with full awareness. Your personality is here fully shut down and your attention is caught up in the visionary cascade of the Superconscious mind, progressing to complete union with the Soul. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 8 [Level of Activation] Higher Unconscious activation [Description] | Kundalini then rises into the higher unconscious separating your Soul from liberation. You may gain glimpses of the state of liberation and higher stages of the Path. You may witness the chakras of the Planetary Man and gain temporary union with your Monad. This union with a universal, all-pervading consciousness has been referred to as Sabikalpa Samadhi. Your personality is fully shut down and your attention is carried along with the rising kundalini. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 9 [Level of Activation] Higher Octave activation [Description] | Next the kundalini travels upward into the higher octave vehicles of the Transplanetary, Cosmic, Supracosmic, and even Transcendental bands of the Superconscious mind. You gain union with the nuclei of identity and ensouling entities of these realms. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
da617d09_eflections_on_Kundalini_Shakti__Description | [Stage] 10 [Level of Activation] Return to the Origin [Description] | Finally the energy of the kundalini merges again with a great ocean of Peace. This confers multidimensional awareness of all levels of the mind. Your attention is drawn into a great, peaceful void. | [] | Reflections on Kundalini Shakti | Description | http://www.mudrashram.com/reflectionsonkundalini.html | 13/1438042989891.18_20150728002309-00096-ip-10-236-191-2_596356341_2.json |
663c9033_Basic_Node_Structure___Emitrom__Description | [Attributes] primarySizeX [Description] | Width of the primary grid cells | [] | Basic Node Structure - Emitrom | Description | http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure | 47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json |
663c9033_Basic_Node_Structure___Emitrom__Description | [Attributes] primaryLineX [Description] | Line used for drawing the vertical primary lines | [] | Basic Node Structure - Emitrom | Description | http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure | 47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json |
663c9033_Basic_Node_Structure___Emitrom__Description | [Attributes] primarySizeY [Description] | Height of the primary grid cells | [] | Basic Node Structure - Emitrom | Description | http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure | 47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json |
663c9033_Basic_Node_Structure___Emitrom__Description | [Attributes] primaryLineY [Description] | Line used for drawing the horizontal primary lines | [] | Basic Node Structure - Emitrom | Description | http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure | 47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json |
663c9033_Basic_Node_Structure___Emitrom__Description | [Attributes] secondarySizeX [Description] | Width of the secondary grid cells | [] | Basic Node Structure - Emitrom | Description | http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure | 47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json |
663c9033_Basic_Node_Structure___Emitrom__Description | [Attributes] secondaryLineX [Description] | Line used for drawing the vertical secondary lines | [] | Basic Node Structure - Emitrom | Description | http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure | 47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json |
663c9033_Basic_Node_Structure___Emitrom__Description | [Attributes] secondarySizeY [Description] | Height of the secondary grid cells | [] | Basic Node Structure - Emitrom | Description | http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure | 47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json |
663c9033_Basic_Node_Structure___Emitrom__Description | [Attributes] secondaryLineY [Description] | Line used for drawing the horizontal secondary lines | [] | Basic Node Structure - Emitrom | Description | http://wiki.emitrom.com/wiki/index.php/Basic_Node_Structure | 47/1438042987034.19_20150728002307-00244-ip-10-236-191-2_266257842_3.json |
16df13bc_Your_Ps____Campbell_University__The_Question | [The P] PURPOSE [The Question] | Why are you sharing this information? | [] | Mind Your Ps! - Campbell University | The Question | http://[email protected]/academics/interprofessional-education/mind-your-ps/ | 38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json |
16df13bc_Your_Ps____Campbell_University__The_Question | [The P] PRIVACY [The Question] | Who is going to see it? Where else might it go? | [] | Mind Your Ps! - Campbell University | The Question | http://[email protected]/academics/interprofessional-education/mind-your-ps/ | 38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json |
16df13bc_Your_Ps____Campbell_University__The_Question | [The P] PATIENT [The Question] | If the patient saw this, would they recognize themselves? | [] | Mind Your Ps! - Campbell University | The Question | http://[email protected]/academics/interprofessional-education/mind-your-ps/ | 38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json |
16df13bc_Your_Ps____Campbell_University__The_Question | [The P] PERSONAL [The Question] | If someone posted this about you, how would you feel? | [] | Mind Your Ps! - Campbell University | The Question | http://[email protected]/academics/interprofessional-education/mind-your-ps/ | 38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json |
16df13bc_Your_Ps____Campbell_University__The_Question | [The P] PROFESSIONAL [The Question] | How might this impact the image of your profession? | [] | Mind Your Ps! - Campbell University | The Question | http://[email protected]/academics/interprofessional-education/mind-your-ps/ | 38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json |
16df13bc_Your_Ps____Campbell_University__The_Question | [The P] PROTECT [The Question] | Are your privacy settings the strictest available & checked regularly? | [] | Mind Your Ps! - Campbell University | The Question | http://[email protected]/academics/interprofessional-education/mind-your-ps/ | 38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json |
16df13bc_Your_Ps____Campbell_University__The_Question | [The P] PERMISSION [The Question] | Have you obtained permission & cited others’ work? | [] | Mind Your Ps! - Campbell University | The Question | http://[email protected]/academics/interprofessional-education/mind-your-ps/ | 38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json |
16df13bc_Your_Ps____Campbell_University__The_Question | [The P] PERMANENT [The Question] | You can never get it back. | [] | Mind Your Ps! - Campbell University | The Question | http://[email protected]/academics/interprofessional-education/mind-your-ps/ | 38/1438042991019.80_20150728002311-00316-ip-10-236-191-2_110923734_0.json |
37b1ebc9_CIPE_Manual__1 | [0] Name [2] Req [1] | Type | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] device [2] no [3] Name of the CIPE device. If not given, the system picks a free one. [1] | String | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] debug [3] Don't go background, use stderr instead of syslog. (Independent of the kernel driver debug option.) [1] | Bool | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] ipaddr [2] yes [3] IP address of the CIPE device. [1] | IP | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] ptpaddr [2] (yes) [3] IP address of the peer device (i.e. the CIPE device on the other end). For protocol 3. [1] | IP | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] mask [2] no [3] Netmask of the CIPE device. For protocol 4. [1] | IP | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] bcast [2] no [3] Broadcast address of the CIPE device. For protocol 4. [1] | IP | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] mtu [2] no [3] Device MTU (default: ethernet standard MTU minus all necessary headers) [1] | Int | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] metric [2] no [3] Device metric (not sure if this is used anywhere...) [1] | Int | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] cttl [2] no [3] Carrier TTL value. If not specified or 0, use the payload packet's TTL. Default recommendation is 64. [1] | Int | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] me [2] no [3] Our carrier UDP address. If either IP or port are not given, the system picks one and reports it via `ip-up'. [1] | UDP | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] peer [2] yes [3] The other end's carrier UDP address. [1] | UDP | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] key [2] (yes) [3] The link key. For security reasons, the key has to be set via an options file, subject to the restrictions described above. The key should be 128 bits in hexadecimal encoding. (To generate such a beast from random, try ps -auxw | md5sum.) [1] | String | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] nokey [3] Don't encrypt at all, just encapsulate in UDP. Only with this option, key is not needed. [1] | Bool | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] socks [2] no [3] Address (port required!) of the SOCKS5 server. See section Working with SOCKS. [1] | TCP | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] tokxc [2] no [3] Timeout (seconds) for key exchange. Default: 10. [1] | Int | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] tokey [2] no [3] Dynamic key lifetime. Default: 600 (10 minutes). [1] | Int | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] ipup [2] no [3] Script to run instead of `/etc/cipe/ip-up'. [1] | String | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] ipdown [2] no [3] Script to run instead of `/etc/cipe/ip-down'. [1] | String | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] arg [2] no [3] Argument to supply to `ip-up', `ip-down'. [1] | String | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] maxerr [2] no [3] Maximum number of errors before ciped exits. See section Error handling in @command{ciped}. [1] | Int | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] tokxts [2] no [3] Key exchange timestamp timeout. Default: 0 (no timestamps). Set this to 30 to prevent key exchange replay attacks, but only if the peer runs CIPE 1.2 or later and both system clocks are reasonably synchronized. [1] | Int | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] ping [2] no [3] Frequency (in seconds) for keep-alive pings. Default is don't send any pings. The "ping" used here is internal to CIPE, not ICMP ping. [1] | Int | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] toping [2] no [3] Timeout for pings. If no answer is received on a keep-alive ping in this time, it counts as an error, See section Error handling in @command{ciped}. Default is no check for answers. [1] | Int | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] dynip [3] Assume the carrier is on a dynamic IP address. See section Dynamic carrier addresses. [1] | Bool | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] hwaddr [2] no [3] Set the dummy MAC address used in Ethernet mode (protocol 4). [1] | String | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] ifconfig [3] Require an external @command{ifconfig} call to configure the interface. [1] | Bool | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
37b1ebc9_CIPE_Manual__1 | [0] checksum [3] Use checksummed UDP carrier packets. Only necessary if the network does not like unchecksummed packets. [1] | Bool | [
[
"T",
"y",
"p",
"e"
],
[
"S",
"t",
"r",
"i",
"n",
"g"
],
[
"B",
"o",
"o",
"l"
],
[
"I",
"P"
],
[
"I",
"n",
"t"
],
[
"U",
"D",
"P"
],
[
"T",
"C",
"P"
]
] | CIPE Manual | 1 | http://homepage.smc.edu/morgan_david/vpn/cipe-1_5_1.html | 19/1438044160065.87_20150728004240-00024-ip-10-236-191-2_117236777_0.json |
d0c83bc4__Training_Toolkit___Math_Tools__0 | [1] - [2] x [3] / [0] | + | [
[
"+"
],
[
"a",
"d",
"d",
"i",
"t",
"i",
"o",
"n"
],
[
"p",
"l",
"u",
"s"
],
[
"a",
"d",
"d"
],
[
"t",
"o",
"t",
"a",
"l"
],
[
"m",
"o",
"r",
"e"
]
] | Afterschool Training Toolkit | Math Tools | 0 | http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html | 3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json |
d0c83bc4__Training_Toolkit___Math_Tools__0 | [1] subtraction [2] multiplication [3] division [0] | addition | [
[
"+"
],
[
"a",
"d",
"d",
"i",
"t",
"i",
"o",
"n"
],
[
"p",
"l",
"u",
"s"
],
[
"a",
"d",
"d"
],
[
"t",
"o",
"t",
"a",
"l"
],
[
"m",
"o",
"r",
"e"
]
] | Afterschool Training Toolkit | Math Tools | 0 | http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html | 3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json |
d0c83bc4__Training_Toolkit___Math_Tools__0 | [1] minus [2] times [3] half [0] | plus | [
[
"+"
],
[
"a",
"d",
"d",
"i",
"t",
"i",
"o",
"n"
],
[
"p",
"l",
"u",
"s"
],
[
"a",
"d",
"d"
],
[
"t",
"o",
"t",
"a",
"l"
],
[
"m",
"o",
"r",
"e"
]
] | Afterschool Training Toolkit | Math Tools | 0 | http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html | 3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json |
d0c83bc4__Training_Toolkit___Math_Tools__0 | [1] subtract [2] multiply [3] divide [0] | add | [
[
"+"
],
[
"a",
"d",
"d",
"i",
"t",
"i",
"o",
"n"
],
[
"p",
"l",
"u",
"s"
],
[
"a",
"d",
"d"
],
[
"t",
"o",
"t",
"a",
"l"
],
[
"m",
"o",
"r",
"e"
]
] | Afterschool Training Toolkit | Math Tools | 0 | http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html | 3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json |
d0c83bc4__Training_Toolkit___Math_Tools__0 | [1] remainder [2] product [3] quotient [0] | total | [
[
"+"
],
[
"a",
"d",
"d",
"i",
"t",
"i",
"o",
"n"
],
[
"p",
"l",
"u",
"s"
],
[
"a",
"d",
"d"
],
[
"t",
"o",
"t",
"a",
"l"
],
[
"m",
"o",
"r",
"e"
]
] | Afterschool Training Toolkit | Math Tools | 0 | http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html | 3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json |
d0c83bc4__Training_Toolkit___Math_Tools__0 | [1] fewer (less) [0] | more | [
[
"+"
],
[
"a",
"d",
"d",
"i",
"t",
"i",
"o",
"n"
],
[
"p",
"l",
"u",
"s"
],
[
"a",
"d",
"d"
],
[
"t",
"o",
"t",
"a",
"l"
],
[
"m",
"o",
"r",
"e"
]
] | Afterschool Training Toolkit | Math Tools | 0 | http://www.sedl.org/afterschool/toolkits/math/pr_math_tools.html | 3/1438042988250.59_20150728002308-00249-ip-10-236-191-2_699849210_0.json |
08868a47_d_Social_Perception_Structures__4 | [1] Focus of body of knowledge [2] Direction & degree of exchange [3] Ability to change [5] Type of relationship [6] Deceptiveness [7] Breadth of learning [8] Tolerance [9] Methods [4] | Structure of persuasion | [] | Belief Systems and Social Perception Structures | 4 | http://trufax.org/general/beliefsystems.html | 32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json |
08868a47_d_Social_Perception_Structures__4 | [0] Education [1] Many bodies of knowledge, based on scientific findings in various fields. [2] Two way pupil-teacher exchange encouraged. [3] Change occurs as science advances; as students and other scholars offer criticisms; as students & citizens evaluate programs. [5] Instruction is time-limited: consensual. [6] Is not deceptive. [7] Focuses on learning to learn & learning about reality; broad goal is rounded knowledge for development of the individual. [8] Respects differences. [9] Instructional techniques. [4] | Uses teacher-pupil structure; logical thinking encouraged. | [] | Belief Systems and Social Perception Structures | 4 | http://trufax.org/general/beliefsystems.html | 32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json |
08868a47_d_Social_Perception_Structures__4 | [0] Advertising [1] Body of knowledge concerns product, competitors; how to sell and influence via legal persuasion. [2] Exchange can occur but communication generally one-sided. [3] Change made by those who pay for it, based upon the success of ad programs by consumers law, & in response to consumer complaints. [5] Consumer/buyer can accept or ignore communication. [6] Can be deceptive, selecting only positive views. [7] Has a narrow goal of swaying opinion to promote and sell an idea, object, or program; another goal is to enhance seller & possibly buyer. [8] Puts down competition. [9] Mild to heavy persuasion. [4] | Uses an instructional mode to persuade consumer/buyer. | [] | Belief Systems and Social Perception Structures | 4 | http://trufax.org/general/beliefsystems.html | 32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json |
08868a47_d_Social_Perception_Structures__4 | [0] Propaganda [1] Body of knowledge centers on political persuasion of masses of people. [2] Some exchange occurs but communication generally one-sided. [3] Change based on changing tides in world politics and on political need to promote the group, nation, or international organization. [5] Learner support & engrossment expected. [6] Can be deceptive, often exaggerated. [7] Targets large political masses to make them believe a specific view or circumstance is good. [8] Wants to lessen opposition. [9] Overt persuasion sometimes unethical. [4] | Takes authoritarian stance to persuade masses. | [] | Belief Systems and Social Perception Structures | 4 | http://trufax.org/general/beliefsystems.html | 32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json |
08868a47_d_Social_Perception_Structures__4 | [0] Indoctrination [1] Body of knowledge is explicitly designed to inculcate organizational values. [2] Limited exchange occurs, communication is one-sided. [3] Change made through formal channels, via written suggestions to higher-ups. [5] Instruction is contractual: consensual [6] Is not deceptive. [7] Stresses narrow learning for a specific goal; to become something or to train for performance of duties. [8] Aware of differences. [9] Disciplinary techniques. [4] | Takes authoritarian & hierarchical stance. | [] | Belief Systems and Social Perception Structures | 4 | http://trufax.org/general/beliefsystems.html | 32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json |
08868a47_d_Social_Perception_Structures__4 | [0] Thought Reform [1] Body of knowledge centers on changing people without their knowledge. [2] No exchange occurs, communication is one-sided. [3] Change occurs rarely; organization remains fairly rigid; change occurs primarily to improve thought-reform effectiveness. [5] Group attempts to retain people forever. [6] Is deceptive. [7] Individualized target; hidden agenda (you will be changed one step at a time to become deployable to serve leaders). [8] No respect for differences. [9] Improper and unethical techniques. [4] | Takes authoritarian & hierarchical stance; No full awareness on part of learner. | [] | Belief Systems and Social Perception Structures | 4 | http://trufax.org/general/beliefsystems.html | 32/1438042988650.53_20150728002308-00179-ip-10-236-191-2_253399696_6.json |
2dd297b9_hic___about_us_and_our_mission__Cookie | [Name] _utma _utmb _utmc _utmz [Purpose] These cookies are used to collect information about how visitors use our site. We use the information to compile reports and to help us improve the site. The cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come to the site from and the pages they visited. [Further information] Privacy at Google [Cookie] | Google Analytics | [
[
"G",
"o",
"o",
"g",
"l",
"e",
" ",
"A",
"n",
"a",
"l",
"y",
"t",
"i",
"c",
"s"
],
[
"R",
"e",
"f",
"e",
"r",
"r",
"a",
"l",
" ",
"t",
"r",
"a",
"c",
"k",
"i",
"n",
"g"
],
[
"A",
"u",
"t",
"o",
"m",
"a",
"t",
"i",
"c",
" ",
"l",
"o",
"g",
"i",
"n"
],
[
"S",
"o",
"c",
"i",
"a",
"l",
" ",
"m",
"e",
"d",
"i",
"a",
" ",
"l",
"o",
"g",
"i",
"n"
],
[
"D",
"i",
"s",
"q",
"u",
"s",
" ",
"b",
"l",
"o",
"g",
" ",
"c",
"o",
"m",
"m",
"e",
"n",
"t",
"i",
"n",
"g"
],
[
"C",
"h",
"o",
"s",
"e",
"n",
" ",
"a",
"r",
"e",
"a",
"s",
" ",
"a",
"n",
"d",
" ",
"t",
"a",
"g",
"s"
]
] | The Daily Chic - about us and our mission | Cookie | http://thedailychic.com/page/privacy | 21/1438042988840.31_20150728002308-00267-ip-10-236-191-2_240320467_0.json |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.