Saturday, December 28, 2019

Medical Research On Animal Testing - 1736 Words

Stated by Mahatma Gandhi, â€Å"The greatness of the nation and its moral progress can be judged by the way its animals are treated†. Medical research on animals is an effective way for scientist to test different medical discoveries and experiment before using them on humans to check their result. This technique has been used for centuries dating back to people such and Aristotle and Erasistratus. What exactly is medical research on animals? When we take a deeper look into the experiment that are preformed we can conclude that animals are a living model of humans in these laboratories. It is a necessity to harm and test animals with new drugs in order to market them in the medical industry to aid human illnesses. In order to better comprehend and regulate drugs one must understand what medical research on animals is described as and its benefits to pharmaceutical companies for humans. Exposure to the trials and tribulations that animal testing reveals how important it is for scientists to understand the negative effects they contribute to an animal’s welfare and life. In contrary animal testing has been used to save many human lives from consuming or using a drug that could have caused them life threatening illnesses. A great example in the twentieth century of a drug called Diethylene Glycol (DEG) gives us great reason on why animal testing is needed for the greater good. Stated by Rachel Hajar (2011), â€Å"He simply added raspberry flavoring to the sulfa drug, which he hadShow MoreRelatedEthical Issue Of Animal Testing For Medical Research961 Words   |  4 Pageshe ethical issue of animal testing for medical testing is not new, for example the majority of the common vaccines were developed because medical research that utilized animal testing. Many philosophers have attempted to explain the rights of animals and some wrote on the lack of inherent rights. This issue is difficult because animals can’t speak for themselves but humans do have a place to play in the fight for animal rights. I will apply the principle of utility along with the moral theories ofRead MoreThe Issue Of Medical Research1548 Words   |  7 Pageseradicated in America. How? Thanks to medical research, an antidote was found for each of these diseases. There is no question that medical research is important to the medical world. However, could countries do without extensive focus on medical research? America spends the most on healthcare and medical research out of any other country yet their life expectancy is not even close to being the highest. On top of its inefficiency in America, drug trials and animal testing have been scrutinized for beingRead More Animal Experimentation: A vital role in medical reasearch Essay1035 Words   |  5 PagesAnimal experimentation has been and will continue to be a source in scientific research. Similarities between animals and humans allow for researchers to provide safer drugs and new treatments for diseases. (Foundation for Biomedical Research (FBR), 2008). Animal experiments have provided many positive outcomes in medical advancements that save human and animal lives. However, many people in today’s society have an emotional attachment to a nimals which fuels opposition to animal experimentationRead MoreAnimal Testing And Its Effects On Human Health1146 Words   |  5 PagesMillions of animals suffer and die unnecessarily each year as they become subjects for medical testing and other horrendous experiments. Although some people believe such activities are necessary to progress in medical research, in reality it does very little to improve human health and development. For decades, drug and chemical safety assessments have been based on laboratory experimentations involving rabbits, dogs, rodents, and other animals. Consequently, nine out of ten drugs proven safeRead MoreHow Do The Contributions Of Animal Testing To Global Medical1309 Words   |  6 Pagescontributions of animal testing to global medical science justify whether or not it should be banned? According to the Humane Society International (HSI), animal testing or animal experimentation for medical research refers to the experimentation on live animals for the purposes of investigation on diseases, medical treatments, or fundamental biology. Charles Gross, a former member of the History of Neuroscience committee of the global Society for Neuroscience, states that animals were used for improvingRead MoreImportance of Animal Testing804 Words   |  4 PagesThe use of animals in scientific research has made dramatic improvements in our understanding of the human race. Despite the controversies that surround this issue, without this process of testing it is certain that much of what is known today towards the quality and quantity of life would remain closed off to us. Over the years, scientists have gained the ability to solve medical problems, cure diseases, and develop vaccines all with the use of animals during scientific research. To believe thatRead MoreAnimal Testing Sho uld Not Be Banned860 Words   |  4 PagesIntroduction The use of animals in research has created a diverse range of attitudes, as some individuals support the use of animals in research and others are against it. Sometimes people do not have enough background knowledge on this topic to be involved in a discussion of animal testing. Animal testing dates back to around 400 years ago, when one of the first famous researchers William Harvey was curious to discover how blood circulates around the body. The modern era of animal testing began around 150Read MoreAnimal Testing Should Not Be Banned Essay1369 Words   |  6 Pagesheartbreaking, miserable animals: that is what comes to mind when animal testing is mentioned. While some of it may be true, testing animals for medical reasons is necessary. Animal testing has led to the advancement of medical research and has help device many medicines, it is the reason animal testing is still being used. The fact that experimenting on animals has led to great medical discoveries, does not mean that a nimal testing is not morally ambiguous. Animal testing has many flaws and reasonsRead MoreMedical Testing on Animals is Considered Animal Cruelty Essay1020 Words   |  5 PagesResearch on living animals has been practiced since at least 500 BC. Over 25 million animals are tested in labs every year. They are used for medical and scientific research. The animals used in research often undergo cruel experimentations and suffer through the pain. During medical testing, less than 2% of human illnesses are seen in animals, therefor medical testing on animals is cruel and pointless. Medical testing on animals should be illegal because products that pass animal tests end up harmingRead MoreThe Pros And Cons Of Animal Testing1725 Words   |  7 PagesEach year, more than 100 million animals are experimented on in U.S. laboratories. These experiments are for things such as biology lessons, medical training, curiosity-driven experimentation, and chemical, drug, food, and cosmetics testing.( Procon writers) Animal testing, also known as animal experimentation, is the use of non-human animals in experiments that seek to control the variables that affect the behavior or biological system under study. Animal testing is controversial and people find

Friday, December 20, 2019

The Effects Of Obesity On People, Cancers And Type 2 Diabetes

Introduction: Obesity has become a growing issue in the recent years and its increasing trend is now referred to as a ‘pandemic’ by many researchers and scientists. With a  £3.2 billion currently estimated cost of overweight and obesity to the NHS, one can understand the growing interest in this matter. This essay is going to discuss the bad effects of obesity on people, such as cardiovascular diseases, cancers and type-2 diabetes. Then, this essay will talk about the causes, and how junk food and bad diet can cause obesity. The causes of obesity are lack of exercise or inactivity and genetic genes as according to (Ebbeling, et al, (2002)), obesity can be caused due to genes, which is an unpreventable cause. Finally, this essay will give solutions for these causes and recommend some methods to prevent obesity. It is most commonly measured using a tool called Body Mass Index (BMI) that measures body fat of men and women based on their height and weight. To understand the reasons why prevention and treatment of obesity have become an urgent matter, it is essential to first examine the effects it has on health and whether its impact is limited to a particular area. Prevention and treatment methods will also need to be examined to understand their true potential and limits. Although obesity itself and the obesity related diseases are directly linked to a poorer quality of life, it has a far more dramatic impact on individuals. According to Allende and Rayner (2007), obesityShow MoreRelatedNutrition, Obesity, and Disease789 Words   |  3 Pagescan prevent some diseases from occurring. Obesity is considered to be a major health crisis all over the world, it can lead to diseases such as: stroke, heart disease, hypertension, some cancers and many more (Coe, 2010). In 2010, research shows that 24.5% of adults in England were obese and 13.9% of children were obese, this number has only risen since then (NHS Information Centre, 2009 Coe, 2010). Millions of adults are diagnosed with type 2 diabetes and that number will continue to increaseRead MoreObesity : A Serious Health Condition1452 Words   |  6 PagesObesity is a serious health condition that, if left untreated, causes serious health conditions. Contrary to popular belief, obesity is more than a condition caused by overeating and lack of exercise (Vallor 2013). Obesity is a disease (Callahan 2013); a disease that Americans are spending about $150 billion on annually (Zamosky 2013). Additionally, changing a person’s diet and exercise regimen may not be effective in some cases of obesity (Vallor 2013). Obesity is not like most well-known diseases;Read MoreEssay On St. Louis1597 Words   |  7 PagesThe health status according to the 2017 County Health Rankings, St. Louis has a homicide death rate of 33 people per 100,000 (â€Å"Crime,† 2017). The health care clinician to patient ratios for primary care physicians are 1 to 83 people, dentists are 1 to 48 people and menta l health is 1 to 272 people (â€Å"Crime,† 2017). The population that are uninsured is eleven percent and are between the ages of 18 to 65 (â€Å"Crime,† 2017). The Missouri Health Improvement Act of 2007 (Senate bill 577) seeks to makeRead MoreChildhood Obesity Is A Medical Condition1109 Words   |  5 Pages Childhood obesity is a medical condition that is found in children, teenagers and middle aged people. Everyone has a unique body shape and structure that is engineered right for them but sometimes the body will store more body fat than required. If an individual stores more fat than an average person is supposed to, then they can be categorized as obese. Childhood obesity can be identified seeing if the weight of a child is well above that of an average for a child s height and age. For anRead MoreThe Effects Of Too Much Sugar On The Body1197 Words   |  5 PagesAnnie Schindler G Period 2/2/2016 Chemistry Honors Effects of Too Much Sugar on the Body Sugar is added to almost everything we eat and drink in today’s society. It is in everything from candy and ice cream to plain crackers. It appears on nutrition labels in many different names such as high-fructose corn syrup, maltose, honey, glucose, and sucrose (Fed Up). In grocery stores, around 80% of processed foods have sugar added to them (Fed Up). Although it is obvious that overeating foodsRead MoreDiabetes : Obesity And Lack Of Physical Activity986 Words   |  4 PagesDiabetes: Due to the insane rise of obesity and lack of physical activity there is an epidemic rate of diabetes, worldwide. Diabetes leads to increased risk of heart disease, kidney disease, stroke and infections. Increased physical activity and maintaining a healthy weight plays a critical role in the prevention and treatment of diabetes. With a staggering 300 plus million people worldwide with diabetes, statistics are predicting that diabetes will be the 7th leading cause of death in the worldRead Mo reObesity s Effect On Sex Essay1623 Words   |  7 PagesObesity s Effect On Sex Image retrieved from http://panarchy-sj.com/wp-content/uploads/2016/01/low-sex-drive-woman.jpg (Imaged retrieved from ) According to the CDC website the percentage of adults at the age of 20 with obesity in the United States is 37.% from the years 2013-2014 but the percentage of adults 20 years and older with overweight and obesity is a staggering 70.7% of the United States. In women obesity was rated higher with 38.3% than in men with a 34.3% of the population fromRead MoreObesity : Obesity And Obesity Essay1169 Words   |  5 PagesObesity Obesity refers to excess body fat while overweight refers to excess body weight in terms of excess fat, muscles, bone or water. According to the National Health and Nutrition Examination Survey (NHANES) (2009–2010), about 69% of the adult population in the U.S. is overweight or obese, with more than 78 million adults being obese. Consistent with the survey, at least 2 in 3 adults are overweight or obese and more than 1 in 3 adults are obese. In addition, more than 1 in 20 adults in the URead MoreObesity And The United States1265 Words   |  6 Pages Obesity in the United States has been a serious problem affecting Americans and has been continually growing higher in numbers each year. American obesity has nearly doubled within the last 40 years and is now considered to be an epidemic that is affecting millions of people around the nation. According to the National institute of Diabetes and digestive and kidney Diseases, 31% of men and 35% of women are considered seriously overweight, along with 15% of children between the ages of six and nineteenRead MoreIn The Last Twenty-Five Years, America Has Embraced A Lifestyle1314 Words   |  6 Pagespreventable health issues that includes Type II Diabetes, high blood pressure, heart diseases, liver failure, kidney disease, stroke, cancers, and a decrease in fertility. This trend is frightening for millions of Americans because it shortens their lifespan and quality of life. As a result of the negative effects of obesity, children are being subjected to the media, marketing, and poor e ducation that promotes and leads to the lack of knowledge and acceptance to obesity. Overall, our great nation is suffering

Thursday, December 12, 2019

Technology Has Facilitated Many Advances †Myassignmenthelp.Com

Question: Discuss About The Technology Has Facilitated Many Advances? Answer: Introducation Digital technology has facilitated many advances in life, most of which are inclined to information dispensation. This dispensation also has increased the levels of data breaches throughout the world as experienced this year where multiple voter registration data has been exposed. Some of the countries affected have been Mexico, the state of Georgia and the Philippines. However, these events are minor exposures as compared to the American attack that occurred in June. In the attack over 198 million voter records were exposed to the public, a significant number that dated back to records from ten years ago(Newman, 2017). The problem Discovered by researcher Chris Vickery, the data breach exposed over 1.1 terabytes of data, holding sensitive information such as personal information and addresses. The data exposed had been previously compiled by a data analytics company called Deep Root. Deep root had been given the task to analyse voter registration details which gave them access to the names and addresses of the potential voters. Furthermore, the leaked information also gave a detailed account on how the voters felt on a wide range of issues, stemming from political climate to gun control(Bennett, 2012). Through the discovery made by the researcher, Vickery ultimately outlined the poor structures used by organizations to protect the information they hold. This conclusion is based on the method used to attack the companys systems which as outlined in the next section was caused by negligence and not by any sophisticated hacking tool. Moreover, the breach illustrated the amount of information entrusted to conservative groups who were lucky that the data was not used to conduct illicit operations more so, after a general election had been conducted. In addition to this, the data breach heightened the questions over the collaboration between the United States government and the Russian government(Uchill, 2017). How and why the attack occurred First, the data breach was not as a result of a complex or sophisticated attack, instead the responsible organization left the databases holding the data exposed to public by disabling their security protocols online. Therefore, when visited, the organizations systems were free to be accessed without any form of control be it encryption of content or authorization requests e.g. passwords. Furthermore, the data was verified and identified as the data owned by the Republican National Committee (RNC). Therefore, the exposure was not a test or hoax conducted online but a legitimate failure in cyber security systems. The RNC had contracted the data company who had subsequently leased the Amazon S3 servers to store the information. Now, the contracted company had also leased multiple database sections which at the time of the exposure had amounted to over 25 terabytes of information. All this content used the same cloud facilities which highlights the negligent actions taken by the company as they failed to protect some of the database servers. Furthermore, the depth of the intrusion was deeply rooted within the disc space of the cloud facility an outcome that determined the extensive scope of the exposed content. Therefore, the exposure did not affect minor files containing trivial details but in-depth analysis functions, a result highlighted by some of the files, which had modelled data(Whittaker, 2017). So why did the breach occur? Well, according to data experts, misconfigured online services are a common occurrence which facilitates many exposure instances but is rarely discovered as they hold trivial or worthless information. Furthermore, the misconfiguration of online systems is further intensified by cloud services and other online database systems as they require extensive security procedures which are ignored by the leasing organizations. Therefore, the events experienced were not alien to cyber attacks but were intensified by the nature of the data which possessed extensive records meant for the private eye () Possible solutions Regardless of the cause of the exposure (why the servers were unsecured), the outcome of the data breach highlights the negligence of the company at hand. Deep Root failed to implement the security procedures employed when dealing with database systems, in fact, their failure was so profound that anyone could access the content so long as they visited the website. Therefore, simple access control and authentication procedures were not implemented. Nevertheless, as a solution, the company should assess its entire security policy by conducting a new and thorough risk assessment. Through this assessment, the threats facing the organization and its system would be evaluated. In this case, the evaluation would highlight the possible loop hole and vulnerabilities that could be used to conduct attacks. Furthermore, it would establish the extent in which the existing security policy is being implemented/enforced(Booth, A, Somayaji, 2013). Secondly, the organization should implement technical security solutions to their existing online systems. In this case, encryption would be the first mitigation solution to the problem as it facilitates the confidentiality of information, by transmitting data in secure forms. Therefore, the analytics conducted by the RNC would in the future be sent using encrypted channels. In addition to this, lock down procedures should be implemented on all user endpoints i.e. computers, websites and any other access platforms. Now, in the breach, the internet was the end point used to access the information, therefore, access control procedures that limits authentication and authorization would be used. For one, the data company can develop specific access portals for RNC users, who when authorised are able to access the content. Finally, a comprehensive information management plan should be used to allocate access rights based on their clearance level. This plan would mitigate data exposure by isolating data blocks(Bennett, 2012). WannaCry A recent attack on computer systems shocks the world as it infiltrated multiple networks across the globe. The attack was facilitated by a new form of ransomware that exploited the vulnerabilities seen in Windows computer systems. Ransomware are malware programs that hold computer systems under ransom while threating to expose or destroy data. In this case, the malware in question (WannaCry) used new attack procedures that beat all the existing security measures(Wong, 2017). WannaCry worldwide infiltration started with a rouge cyber group known as The Shadow Brokers who at the start of the year released a network attack vector (vulnerability) known as EternalBlue. This group acquired the vulnerability from the United State government who through their security agency (NSA) had developed the component among other access vulnerability. The NSA has from time to time developed tools that may serve as cyber weapons, an outcome that was adequately verified by the extent of the attack. Now, this attack spread fast like quick fire affecting systems in Spain, China, Russia and United Kingdom among many other countries. In each of these countries, the malware perpetrated the same sinister actions by locking the machines it affected unless paid a ransom in full(News, 2017). Those affected and how At the beginning, the estimated number of attacks surpassed 40,000 systems across the world, affecting more than 100 countries. In some of these countries such as England, the malware infected medical systems which interrupted health facilities and the duties they conducted. These interruptions were so severe that some members of the public were casualties to the attack as they failed to access their vital medical records halting their procedures. The same problem was also experienced by the health workers and practitioners who were placed on immediate lockdown as their machines demanded a payment of $ 300 to restore operation normalcy. In other countries, the attack crippled private companies affecting businesses and their financial performance. An example of this outcome was seen in Spain where its telecommunication and electrical industries were affected by the attacks propagated on Telefonica and Iberdrola companies(Islaim, 2017). In these companies, the attacks were so severe that the organizations were forced to switch off their systems in an attempt to mitigate the losses experienced. Similarly, Russia went through the same crisis as its networks were extensively infiltrated by the attack. However, the attack on the Russian systems was worrying as it affected many sectors of service delivery. Method of attack Most malware attacks will start by identifying vulnerabilities in systems before conducting their attacks. It is only after the identification of these vulnerabilities that the actual attacks are perpetrated based on a self-replicating procedure, which in the end increases their success rate. Similarly, WannaCry exploited a serious vulnerability in Windows systems that were later solved using systems update (patches). Nevertheless, the vulnerability used stemmed from the access protocols used to access networks, commonly known as server message blocks (SMB). Now, the SMB protocol resides within the application layer of the TCP/IP model and facilitates the sharing of files. The protocol conducts this functionality by allowing devices to read or write files from networks. Moreover, the same protocol allows computers to request resources and services across networks. Therefore, when the EternalBlue vulnerability was introduced it gave intruders complete access to the networks and comput ers using the said protocol(Emling, 2017). In all a four step procedure was used to infect machines: The intruder using the SMB handshake activated the vulnerability in the machines having unprotected access ports. Next, an archived program holding the starter for the malware was transferred to the accessed machine. This program was encrypted to maintain the integrity of the malware. The third stage saw the malware program activated after being decrypted from the archive. Furthermore, after activation, the malware immediately started to scan for other connections within the host machine and only spread to the networks having unsecured access ports(Islaim, 2017). If successful in identifying the ports, the malware again utilised the EternalBlue vulnerability to deliver the starter program, commonly known as the payload. At this point, the infection procedure repeated itself and continued across all visible and unsecured network. Preventing the attack The most obvious solution to the problem would have been a patch for the vulnerability identified which based on the outcome of events was only developed after the damage had been done, therefore is an invalid option. However, in all the attacks conducted, unsecured ports were used to access the SMB vulnerability. Therefore, using basic network controls the malware could have been mitigated across the networks. For instance, the affected organization should have had firewalls to regulate the flow of traffic. This facility would have alerted the users of the intrusion. Moreover, access and port control procedures should have been used to block the unused network nodes/ports(EMC, 2016). Nevertheless, the said attacks occurred in multiple organizations and countries which outlines the complexity of the attacks as most of the organizations had strict security guidelines. Therefore, a thorough risk assessment would have been the only solution because it would have outlined the new threat. It is therefore through a risk assessment that these organizations would have identified and implemented solutions for the SMB protocols, including alerting the product developer (Microsoft)(EMC, 2016). References Bennett, S. (2012). Data Security Breaches: Problems And Solutions. Retrieved 25 August, 2017, from: https://www.jonesday.com/files/Publication/2dbb7406-ba13-4305-902a-8f2c65ef3d49/Presentation/PublicationAttachment/301495c5-31c8-4881-8202-9dd8665df004/TPL0812-Bennett.pdf. Booth, G., A, S., Somayaji, A. (2013). Cloud Security: Attacks and Current Defenses. 8 ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE, Retrieved 25 August, 2017, from: https://people.scs.carleton.ca/~soma/pubs/booth-asia2013.pdf. EMC. (2016). Preventing a ransomware disastor. EMC, Retrieved 24 August, 2017, from: https://www.google.com/url?sa=trct=jq=esrc=ssource=webcd=1cad=rjauact=8ved=0ahUKEwiwgdWRi_DVAhWIK8AKHdA9BKEQFggqMAAurl=https%3A%2F%2Fmozy.com%2Fsystem%2Fresource. Emling, S. (2017). Ransomware Attack Wreaks Havoc Globally. AARP, Retrieved 24 August, 2017, from: https://www.aarp.org/money/scams-fraud/info-2017/how-to-protect-against-ransomware-fd.html. Islaim, A. O. (2017). SMB Exploited: WannaCry Use of "EternalBlue". Fire eye, Retrieved 24 August, 2017, from: https://www.fireeye.com/blog/threat-research/2017/05/smb-exploited-wannacry-use-of-eternalblue.html. Newman, L. (2017). The Scarily Common Screw-Up That Exposed 198 Million Voter Records. Wired, Retrieved 25 August, 2017, from: https://www.wired.com/story/voter-records-exposed-database/. News, B. (2017). Massive ransomware infection hits computers in 99 countries. Technology, REtrieved 24 August, 2017, from: https://www.bbc.com/news/technology-39901382. Uchill, J. (2017). Data on 198M voters exposed by GOP contractor. The hill, Retrieved 25 August, 2017, from: https://thehill.com/policy/cybersecurity/338383-data-on-198-million-us-voters-left-exposed-to-the-internet-by-rnc-data. Whittaker, Z. (2017). 198 million Americans hit by 'largest ever' voter records leak. ZDNet, Retrieved 25 August, 2017, from: https://www.zdnet.com/article/security-lapse-exposes-198-million-united-states-voter-records/. Wong, J. . (2017). Massive ransomware cyber-attack hits nearly 100 countries around the world . Cybercrime, Retrieved 24 August, 2017, from: https://www.theguardian.com/technology/2017/may/12/global-cyber-attack-ransomware-nsa-uk-nhs

Thursday, December 5, 2019

Home Security System free essay sample

Surjit Gautum who has been a source of perpetual inspiration to us, gently guiding and our waves towards a bright career. You were ever willing to give all kind of support and encouragement. In the end we want to thankful our â€Å"Parents†, â€Å"teachers† and Almighty GOD for the entire thing that they do to us.Security is a prime concern in our day-today life. Every country as well as individual wants to be as much secure as possible. Recent activities in the major cities have made it more important than ever to take adequate steps to maintain the safety of the home and the personals. At times like a fire breakout where immediate and appropriate actions are required, things are required to be made automated because under panic conditions the response time of a normal human brain increases. There can be many solutions possible for implementing such a system. According to the U. We will write a custom essay sample on Home Security System or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page S. Fire Administration, the number of fires in residential dwellings (one and two-family homes, apartment buildings, hotels and other boarding facilities) in 2007 was 414,000 an increase of approximately 9. 2% from 1998. During the same period, the direct dollar property losses  Ã‚   nearly doubled, going from $4. 4 billion to over $7. 5 billion. It is worth noting however that the number of fire deaths and injuries over this same nine-year period have generally decreased; overall, these figures have declined by approximately 8. 3%. Still, there were 2,895 deaths and 14,000 fire-related injuries during 2007. The decline in the death and injury rate can be attributed to better fire alarm system monitoring technology, and points up the importance of such technology in your home. Although most of us use reasonable caution, home fires have been known to start from all sorts of causes including short circuits in the defective wiring of the inferior appliances now manufactured in substandard facilities in China and Mexico. In fact, older televisions can be turned off and unplugged and still cause fires for up to 24 hours because of electrical energy stored in the transducer; in 2006, a number of Chinese-manufactured Dell laptops mysteriously exploded for no apparent reason. When we are asleep, our senses are asleep as well; therefore, it is possible to burn alive (though asphyxiation usually occurs first mercifully) without ever being aware of it. Because heat, which rises and gathers toward the ceiling, is the first warning sign of a fire, a good fire alarm monitoring system should have heat detection sensors as well as smoke detection sensors. Ideally, these are mechanical and not electronic in nature, since a building fire can put the electrical system out of commission in short order. Otherwise, your heat and smoke detection systems, if hard-wired in to the home electrical system, must have battery backup; this battery should be replaced at least once every year. Security systems designed to detect unauthorized entry into a building or area. They consist of an array of sensors, a control panel and alerting system, and interconnections. Sensors detect intruders by many methods such as monitoring door and window contacts, by passive infrared motion detectors, ultrasound, vibration, electric or magnetic fields, or microwaves. Sensors may be directly wired to a control panel that provides sensor power, or may communicate wirelessly. Some alarm systems serve a single purpose of burglar or fire protection. Combination systems provide both fire and intrusion protection. .