.

Friday, December 27, 2019

Understanding Delphi Project and Unit Source Files

In short, a Delphi project is just a collection of files that make up an application created by Delphi. DPR is the file extension used for the Delphi Project file format to store all the files related to the project. This includes other Delphi file types like Form files (DFMs) and Unit Source files (.PASs). Since its  quite common for Delphi applications to share code or previously customized forms, Delphi organizes applications into these project files. The project is made up of the visual interface along with the code that activates the interface. Each project can have multiple forms that let you build applications that have multiple windows. The code thats needed for a form is stored in the DFM file, which can also contain general source code information that can be shared by all the applications forms. A Delphi project cannot be compiled unless a Windows Resource file (RES) is used, which holds the programs icon and version information. It might also contain other resources too, like images, tables, cursors, etc. RES files are generated automatically by Delphi. Note: Files that end in the DPR file extension are also Digital InterPlot files used by the Bentley Digital InterPlot program, but they have nothing to do with Delphi projects. DPR Files The DPR file contains directories for building an application. This is normally a set of simple routines which open the main form and any other forms that are set to be opened automatically. It then starts the program by calling the Initialize, CreateForm, and Run methods of the global Application object. The global variable Application, of type TApplication, is in every Delphi Windows application. Application encapsulates your program as well as provides many functions that occur in the background of the software. For example, Application handles how you would call a help file from the menu of your program. DPROJ is another file format for Delphi Project files, but instead, stores project settings in the XML format. PAS Files The PAS file format is reserved for the Delphi Unit Source files. You can view the current projects source code through the Project View Source menu. Although you can read and edit the project file like you would any source code, in most cases, you will let Delphi maintain the DPR file. The main reason to view the project file is to see the units and forms that make up the project, as well as to see which form is specified as the applications main form. Another reason to work with the project file is when youre creating a DLL file rather than a standalone application. Or, if you need some startup code, such as a splash screen before the main form is created by Delphi. This is the default project file source code for a new application that has one form called Form1: program Project1;uses Forms, Unit1 in Unit1.pas {Form1};{$R *.RES}begin Application.Initialize; Application.CreateForm(TForm1, Form1) ; Application.Run; end. Below is an explanation of each of the PAS files components: program This keyword identifies this unit as a programs main source unit. You can see that the unit name, Project1, follows the program keyword. Delphi gives the project a default name until you save it as something different. When you run a project file from the IDE, Delphi uses the name of the Project file for the name of the EXE file that it creates. It reads the uses clause of the project file to determine which units are part of a project. {$R *.RES} The DPR file is linked to the PAS file with the compile directive {$R *.RES}. In this case, the asterisk represents the root of the PAS file name rather than any file. This compiler directive tells Delphi to include this projects resource file, like its icon image. begin and end The begin and end block is the main source code block for the project. Initialize Although Initialize is the first method called in the main source code, it isnt the first code thats executed in an application. The application first executes the initialization section of all the units used by the application. Application.CreateForm The Application.CreateForm statement loads the form specified in its argument. Delphi adds an Application.CreateForm statement to the project file for each form thats included. This codes job is to first allocate memory for the form. The statements are listed in the order that the forms are added to the project. This is the order that the forms will be created in memory at runtime. If you want to change this order, do not edit the project source code. Instead, use the Project Options menu. Application.Run The Application.Run statement starts the application. This instruction tells the pre-declared object called Application, to begin processing the events that occur during the run of a program. Example of Hiding the Main Form/Taskbar Button The Application objects ShowMainForm property determines whether or not a form will show at startup. The only condition for setting this property is that it has to be called before the Application.Run line. //Presume: Form1 is the MAIN FORM Application.CreateForm(TForm1, Form1) ; Application.ShowMainForm : False; Application.Run;

Thursday, December 19, 2019

Dont Just Stand There Reactions to Prejudiced Comments...

Don’t Just Stand There is an essay written by Diane Cole. It was first published in 1989 in a New York Times publication. She advises her audience about how to react to prejudice comments and jokes. However, her argument is not credible because she fails to mention vital information that would help to support her argument, and there are too many logical fallacies. Cole omits important details that may have helped to support her argument. Cole’s argument s not credible becuse she fails to give any back round information on the guy who told the joke, For example, who is he? Is he a person of authority? Is he the workplace clown? Is he an associate or friend? Who knows, maybe this guy is Jewish also. It seems a bit odd that these two†¦show more content†¦For instance, in paragraph two Cole alleges that everyone in the office knew that she was Jewish. If this were true, not only did this guy blatantly insult her, he did so in the presence of colleagues. Most workpl aces enforce a zero tolerance rule on an incident such as this. Why weren’t there any disciplinary actions taken? Cole should have elaborated more on the details in this situation. There are many fallacies Cole uses to help her achieve her purpose for writing. How ever, these fallacies help to facilitate the idea that her argument is not credible. One of the many types of fallacies used in her arguments is called false authorities, which are assumptions that because one is an expert in one particular field this person can be credible in another. For instance, in paragraph seven Cole employs an assertion from Cherie Brown who’s title is executive director of the National Coalition Building Institute which is a Boston based training program. Why would she use an assertion from some whose title does not coincide with her argument? This is like asking a plumber to install a door bell. In the attempt to persuade someone into taking action on a certain issue one should alwa ys utilize the appropriate authorities. Cole also uses another fallacy called oversimplification. This is a statement or argument that leaves out relevant considerations in order to imply that there is a single cause or solution for a complex problem.Show MoreRelatedVampire Diaries61771 Words   |  248 Pagesdance? she said softly. Im playing with fire, with something I dont understand, she thought suddenly. And in that instant she realized that she was frightened. Her heart began to pound violently. It was as if those green eyes spoke to some part of her that was buried deep beneath the surface—and that part was screaming danger at her. Some instinct older than civilization was telling her to run, to flee. She didnt move. Dont miss these exciting books from HarperPaperbacks! THE VAMPIRERead MorePeculiarities of Euphemisms in English and Difficulties in Their Translation19488 Words   |  78 Pages by contradiction, or by irrelevant statements, if any; so that the reader is forced to invent statements of his own and they are liable to conflict with one another. This type is perceived the most clearly when a joke is implied, for the reader is meant to be conscious of the joke - the intelligent reader, of the means also (Allot N.,2005,p.82). Ambiguity caused by euphemisms also occurs when the two meanings of the word, the two values of the ambiguity [or equivocality], are the two oppositeRead MoreAn Introduction to Intercultural Communication29172 Words   |  117 Pagespeople from different cultures, empathy is vital. Through putting yourself in someone elses shoes you come to see or appreciate their point of view. 3. Involve Involving others in your world and involving yourself in others empowers and educates. Dont build walls between people but learn from one another. 4. Avoid Herd Mentality Herd mentality refers to a closed and one dimensional approach. Such a way of thinking curbs creativity, innovation and advancement as people are restricted in how toRead MoreMarketing Mistakes and Successes175322 Words   |  702 Pagesselling their ideas—and defend them against critical scrutiny. This is great practice for the arena of business to come. NEW TO THIS EDITION In contrast to the early editions, which examined only notable mistakes, and based on your favorable comments about recent editions, I have again included some well-known successes. While mistakes provide valuable learning insights, we can also learn from successes and find nuggets by comparing the unsuccessful with the successful. With the addition

Wednesday, December 11, 2019

Stochastic Modeling and Quality Evaluation †MyAssignmenthelp.com

Question: Discuss about the Stochastic Modeling and Quality Evaluation. Answer: Introduction Cloud computing has been fairly new technology that permits the data to be stored , circulated in addition to exploited with considerably greater simplicity than ever before. In todays age and era the government has been looking for the best way to which they can manage challenges which affect their economies (Zheng, Zhu Lyu, 2013). Cloud computing has proven to be an ideal solution since it has allowed for e-governance. With the cloud, the government has been able to deliver their core services to its citizens all across the various parts of the globe. Moreover, even with the dwelling city populations, the governments is able to reach out to its citizens, managing on the aging infrastructure as well as addressing other challenges which are within a given span of time (Zheng, Zhu Lyu, 2013). The cloud computing infrastructure helps agencies to realize on the cost savings as well as efficiencies while modernizing along with expanding their information technology functionality withou t spending the capital resources on the infrastructure. The cloud based infrastructure is swiftly, secure, scalable as well as accessible over the web. Agencies usually pays on what you utilize. Infrastructure as a Service Infrastructure as a service is a kind of cloud computing that provides a virtualized computing assets on the internet (Almorsy, Grundy Mller, 2016). Infrastructure as a Service is the future step down from the platform as a service along with the steps down from the software as a service with regards to the cloud computing stack. The IaaS has been a consistent, extremely automated providing in which compute sources, enhanced by the storage along with networking functionality are owned and at the same time hosted by the service provider which is provided to the customer on demand (Almorsy, Grundy Mller, 2016). IaaS should be employed by the clients of enterprise to build the cost effective in addition to easily scalable information technology options in which you will find the complexities and the expenses off managing the under-lying hardware which have been outsourced to the cloud provider (Gonzales, Kaplan, Saltzman, Winkelman Woods, 2017. In the event the scale of the business clients procedures fluctuate, or perhaps they may be looking to expand , they could take advantage of the cloud resource and they need it instead of acquiring, installing or even integrating the hardware. Implementing the IaaS model which is part of the strategy could save an organization money since the users usually pay for the time as well as the data which is used (Shayegannia, 2015). In order to make most of this service model it is important to note the following: it is important to determine the needs of storage; since the infrastructure as a service incorporate on all the servers, the network and the storage needs, it is important to identify the usage requirements before the implementation (Gonzales, Kaplan, Saltzman, Winkelman Woods, 2017. Infrastructure as a service can be a significant model which is used in a company, but initially it is important to identify on the specific needs. Determining on the use of the cloud, adapting for the various pricing model and consider the security risks are all significant aspect when making any switch to the cloud computing. Government perception The cloud computing provides the government solutions to which re-imagine precisely how the services are brought to the citizens and how the business functions could be executed (Gonzales, Kaplan, Saltzman, Winkelman Woods, 2017. With the federal government Fed RAMP initiative, the government authorities currently they have got the possibility of implementing the advanced cloud alternatives. This is an integral shift in the method wherein the solutions is going to be fulfilled. Application owners could have an even greater say when selecting the elements that should satisfy on the needs of the business requirements while staying within the government business as well as security constraints. Infrastructure as a service will offer various benefits which will help drive the innovation in the government. This technological know-how will alter the method information technology providers accomplish to the business. These technologies now are designed for the use in the in-house IT providers (Gonzales, Kaplan, Saltzman, Winkelman Woods, 2017. This technology will discover its approach to the government data centers and these data centers will have a more competitive as well as capability. Offering IaaS make sense for the federal government. This cloud computing service will help in the delivery of the services on the administration dedication to offer better value to the taxpayer via making of the government more efficient. This cloud solution not only assist in the reducing of the cost to the operations of the federal government but additionally drive improvements all over the government. Every year the government, spends billions of money on the information technology services and products, with a very much focus on maintaining existing infrastructure needs in addition to the demands (Ananthanarayanan, Bhattacharya, Graf, Jayachandran, Krishnamurthy, Renganarayana Zhang, 2017). The major components to each of the federal agency information technology IT infrastructure consists of the storage, website hosting along with the computer power. The new cloud infrastructure offerings might be a method for the agencies in recognizing cost saving, modernization as well as efficiencies without requiring to spend the capital resources expanding the existing infrastructure. IaaS opportunities will certainly consist of the on demand self-service which allow the governments entities to utilize and also stop the usage of the products while they are much needed. Moreover, pooling of the resources for the practically unlimited storage as well as automatic monitoring of the resources utilization will also be crucial elements (Xin, Baldin , Chase Ogan, 2014 ) . IaaS offering is going to be provided with the much rapid elasticity for the real time, customizable scaling of the services as well as the automatic provisioning of the virtual machines, visibility into the usage of the services, storage and the bandwidth. Prior to making the devices of IaaS available through the Apps. gov, vendors really should have a complete Certification and the Accreditation process at the FISMA moderate Affect Data security level which is administered by the GSA. By means of offering IaaS GSA would provide the businesses of the government which much easy to cost saving, high value, as well as an efficient technological solutions. The program to establish the government cloud environment through provision of products for example IaaS is an enabler to transform as well as to continue improve the public service delivery in addition to help to the underpinning of the government policies ( Nguyen, Shen, Gu, Subbiah Wilkes, 2013 ) . It offers the outlook for the federal government to increase the value which the community enjoys from the substantial utilization of the information technology in the government, along with tackling the rise of the expectations of the various stakeholders- which include the citizens and governments internal users for more desirable delivery of the public program. Benefit to the government The cloud approach such as provision of application IaaS offers the synergy along with new opportunities for the program sharing and the re-use, especially to the techniques which straddle across the government departments to be able to improve on the efficiency along with effectiveness the government workforce (Rittinghouse Ransome, 2016). This software enable the implementers to majorly focus not only in enhancing the innovation which bring in the real business value rather than the platforms which are set-up and integrated to related work (Manvi Shyam, 2014). The deployment of the IaaS could lead to the facet of cost saving in both the capital as well as the recurrent expenditure on the computing resources, given that the workload might be allocated flexibility in addition to the available computer applications and less equipment is utilized. It also demonstrate the government function in the reduction of the overall carbon footprint as well as environmental effects. The government cloud environment as well as the services have made been made to the various government departments , so that they might be executed in their own information technology enabled change initiatives in a much agile, as well as cost effective and joined up manner (Manvi Shyam, 2014) . IaaS enables agencies of the government to meet both the medium and the long term goals for government ICT services through ; access of the cheaper services , as well as through a consumption model that is combined with the discounted that is accessible via the aggregated demand . Moreover, it might be by means of the provision of the foundation to transfer to the cloud computing model, productivity, allowing of more access to the cost efficiencies and the service benefits. People Perception The societies are now moving towards the innovations. Individuals now are demanding every basic necessity of the life at their door step. Every person want to avail these facilities whenever they are desired. The IaaS has provided the users access to the low level computing resources such as the storage, memory, as well as the CPU (Zheng, Zhu Lyu, 2013). Moreover, the IaaS cloud behave much like the physical computers that can reboot them as needed or shut them down in case they are no longer used. Based on the users they are seeing clear benefits which are provided by IaaS solutions (Rajan, 2013). For example, three quarter of the businesses are using the IaaS to some extent, since it makes it easier for the innovation. Moreover, it has also been associated with reducing of the cost significantly to a given level. The use of the cloud infrastructure are seeing high levels of success and satisfaction for the businesses, which is from the improved innovation to the increased agility and flexibility. Individuals have highlighted that the businesses are increasingly running their systems on the cloud infrastructure and almost on all their half plan rely on the IaaS for all or all of their information technology infrastructure in the next five years (Rajan, 2013). It is evidence that individuals are rationalizing their time and also the resources to focus more on growing their core business and make a keen to leverage IaaS which is part of the broader cloud strategy. The businesses are embracing the cloud infrastructure in order to the improve performance as well as the innovation levels. While the negative perceptions such as issues around security, complexity as well as the loss of control have been the exhibit limitations to adoption. They appears to be the obsolete misconceptions, with those that have transferred to the IaaS demonstrating the fact that is by far positive (Ouyang Zhang, 2013). More than two third of the organizations worldwide already are utilizing IaaS to some extent, to be able to reduce on the ongoing maintenance expenses. The experienced users are twice most likely feel that IaaS could offer a world class operational performance in relation to the availability, speed as well as uptime as comparison to the non-adopters. Cloud computing application such as IaaS gives one ability to access, change as well as interact with the data to any platform with an internet connection. This has resulted to more of our email being moved from the hard disks to the mail servers. For most of the users believe that IaaS is far more the best thing which has happened since it allows individuals to share documents and data without having to attack even an email to every time changes are made( Zhao, Dong, Pillay, Jin, Vivier Wentzel, 2015). Nonetheless, there are others individuals who are concerned in regards to the privacy and the legal aspects since most of the data goes to the servers which are under legal rules which differ in every country. Some regard this as a typical situation and they feels the cloud operators could use their personal data without their consent. Findings/Future Work of IaaS Based on the findings they shows that there are some interesting predication for the future of the IaaS operation and how a holistic approach to the cloud computing is becoming more critical (Montes, Ael, Pena, Uhe Wallom, 2017). It is observed that the enterprises are taking a more service centric views; with the more robust cloud services such as IaaS, organization will not be managing the infrastructure from an operational as well as service delivery perspective but they will essentially acquire it the infrastructure as the service (Khan, Navarro, Sharifi Veiga, 2013). Moreover, it will be observed that there would be fewer bodies which are needed for the maintenance, enhancements as well as operations and there would be definitely an evolutionary maturing of the roles as well as the technologies which will focus on the ITIL-like processes. Additionally, when it comes to the information technology job they will be defined based on the level of the performance which will be expec ted from the service provider and should demonstrate the fact of meeting those performance levels (Santana, 2016). Five years from now individuals will refer to lower power processors which crunches huge volumes of workloads in the cloud, right now there would be highly computerized datacenters along with supporting substantial federated and even scalable software architecture (Gonzales, Kaplan, Saltzman, Winkelman Woods, 2017). To utilize the massive armadas of the hardware that is accessible through the clouds, person software programs which are typical set to large and complex since they will be written to seize the opportunity of the scale (Gonzales, Kaplan, Saltzman, Winkelman Woods, 2017). Due to the growth in the size in addition to the complexities of individuals programs, development of the software process would place emphasis to the modular software, particularly to the huge programs with elements to be changed without necessarily shutting down program. Moreover, the cloud programs might involve whole new-modern programs mindset, because they interact with many clouds. Furthermore, r ight now there could be faster interconnection that should be developed from the IaaS applications (Khan, Navarro, Sharifi Veiga, 2013). The twinned needs for the massively distributed applications in addition to the increase in the primary count of the high-end processors will definitely integrate to be able to result in the super-fat interconnect to the datacenter. By the year 2020 the transition to the low cost hardware of IaaS is going to be in full swing as the schemes for example Open Compute project which can find their way away from the datacenters of the Facebook along with the Amazon Web services and into almost all the features which are operated by the other, smaller organizations as well (Jiang, Dou, Guo Hu, 2015). The servers along with the devices for the storage would resemble the replaceable sleds. It could possibly also be noted that the web rewards scale, together with the large capital costs which are linked to the running of the clouds , it seems almost certainly that there may be a degree of the consolidation especially in the cloud provider market ( Jiang, Dou, Guo Hu, 2015 ). Presently there could be fierce competition between the huge providers which might generate each of them to experiment with the radical technologies well (Jiang, Dou, Guo Hu, 2015). Perhaps this is in the bid to cut their internal networking costs and be able to enhance its utilization. Conclusion The cloud computing allows the customers to manage to gain access to the application , information along with the data for all sort on an online system as opposed to the use of the actual hardware or even the devices . An organization that provides dependable cloud technology provides for the computing to be undertaken in a manner that enables the sharing of the data, as the cloud offers a service instead of a product. The user get in addition to share their information in a manner which could permit them to access and give access to the whole world. The infrastructure as a service continues to be a delivery model where CSPs that provides the required hardware and the software upon which the client could be in a position to develop a personalized computing environment. This delivery model has been useful for the government agencies especially in the management of rapid urbanization, financial challenges and the reduction of the technological obsolescence. This has been possible becau se of the cloud computing which will likely bring more potential opportunities and capabilities in the near future. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107. Ananthanarayanan, R., Bhattacharya, K., Graf, F., Jayachandran, P., Krishnamurthy, B., Renganarayana, L., ... Zhang, X. (2017). U.S. Patent No. 9,742,873. Washington, DC: U.S. Patent and Trademark Office. Gonzales, D., Kaplan, J. M., Saltzman, E., Winkelman, Z., Woods, D. (2017). Cloud-trustA security assessment model for infrastructure as a service (IaaS) clouds. IEEE Transactions on Cloud Computing, 5(3), 523-536. Jiang, Y., Dou, J., Guo, Z., Hu, K. (2015). Research of marine sensor web based on SOA and EDA. Journal of Ocean University of China. JOUC, 14(2), 261. Khan, A. M., Navarro, L., Sharifi, L., Veiga, L. (2013, October). Clouds of small things: Provisioning infrastructure-as-a-service from within community networks. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on (pp. 16-21). IEEE. Manvi, S. S., Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440. Montes, D., Ael, J. A., Pena, T. F., Uhe, P., Wallom, D. C. (2017). Enabling BOINC in infrastructure as a service cloud system. Geoscientific Model Development, 10(2), 811. Nguyen, H., Shen, Z., Gu, X., Subbiah, S., Wilkes, J. (2013, June). AGILE: Elastic Distributed Resource Scaling for Infrastructure-as-a-Service. In ICAC (Vol. 13, pp. 69- 82). Ouyang, Z. H., Zhang, J. (2013). Integrating Information Resources and Public InformationData Center. In Applied Mechanics and Materials (Vol. 263, pp. 1934-1943). Trans Tech Publications. Rajan, A. P. (2013). Evolution of cloud storage as cloud computing infrastructure service. arXiv preprint arXiv:1308.1303. Rittinghouse, J. W., Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press. Santana, M. (2016). Infrastructure as a Service. Security in the Private Cloud, 37. Shayegannia, H. (2015). Secure Access Control Architectures for Multi-Tenancy Cloud Environments (Doctoral dissertation, cole Polytechnique de Montral). Xia, Y., Zhou, M., Luo, X., Zhu, Q., Li, J., Huang, Y. (2015). Stochastic modeling and quality evaluation of infrastructure-as-a-service clouds. IEEE Transactions on Automation Science and Engineering, 12(1), 162-170. Xin, Y., Baldin, I., Chase, J., Ogan, K. (2014). Leveraging semantic web technologies for managing resources in a multi-domain infrastructure-as-a-service environment. arXiv preprint arXiv:1403.0949. Zhao, Y., Dong, L., Pillay, U., Jin, Y., Vivier, E., Wentzel, M. (2015). The role of infrastructure in accelerating service delivery: lessons learnt from South Africa and China. Zheng, Z., Zhu, J., Lyu, M. R. (2013, June). Service-generated big data and big data-as-a- service: an overview. In Big Data (BigData Congress), 2013 IEEE International Congress on (pp. 403-410). IEEE.

Tuesday, December 3, 2019

Views of Men and Women on Food Essay Example

Views of Men and Women on Food Essay Food is the most important need that men and women ought to have. This is the primary need that people need in order to survive. Foods play an essential role in the growth and the development of the health of an individual. Today, food is viewed differently depending on one’s sexuality. Today, men and women have different ideas about the role of foods in their lives. Men consider food as the primary source of their strength and power for everyday lives, while women view foods as the primary factor to consider in determining the beauty that is accepted by the society. Foods are the primary source of health and power needed for humans in order to go about their everyday lives. Strength is often associated with the men in a society that is why man has to do everything to exhibit such actions. In order for man to portray strength, they do more work and consider food as the primary source of the strength and power that the society demands them to be. During the early days of their lives boys are demanded to eat more by their mothers in order to gain strength and power that they could use as they grow up (Wolf, 1997). It is here that we can see that for men, foods are considered as a necessity in portraying the role that society wants them to play. We will write a custom essay sample on Views of Men and Women on Food specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Views of Men and Women on Food specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Views of Men and Women on Food specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Foods are one’s primary need and are considered to be the main reason why people survive each and everyday. Deprivation of food will cause an individual to be weak and eventually experience different health problems. Foods are supposedly life and energy giving, but women and girls view foods as the primary factor in determining the beauty that is rightfully accepted by society. Today, more and more girls and women deprive themselves of food, and their primary reason is because of beauty. This is because in today’s society women’s beauty is solely judge according to their weight. Eating more means gaining more weight. At an early age, girls are allowed to eat more, if and only if the size they are in is the acceptable size to be considered thin (Wolf, 1997). That is why today, women eat less because ever since this is what is taught to them, to eat less in order to look beautiful and to be accepted by society (Wolf, 1997). It is clear that today; the foods play a crucial role in determining the beauty that society demands from women. Foods are the primary source of energy and of health. It is here that we could see the roles of foods to both the lives of a man and a woman. It is clearly stated that each sex views food in contradicting ideas. For men, foods are necessary for strength and power, while for women, foods could be disregarded as a basic need just to portray the beauty that is rightfully accepted by society.