1. Standard memberwolfgang59
    Quiz Master
    RHP Arms
    Joined
    09 Jun '07
    Moves
    48793
    20 Dec '14 23:39
    Originally posted by HandyAndy
    Usage note: Phenomenon is the only acceptable singular form of this noun; phenomena is the usual plural.
    Phenomenons may also be used as the plural in nonscientific writing when the meaning is "extraordinary
    things, occurrences, or persons": They were phenomenons in the history of music.
    -- From the American Heritage Dictionary of the English Language, Fifth Edition.
    Yes if enough people consistently get something wrong it becomes right!

    My poet hate is that septagon is becoming acceptable instead of the correct heptagon.

    Am I getting old?
  2. Standard memberHandyAndy
    Read a book!
    Joined
    23 Sep '06
    Moves
    18677
    21 Dec '14 00:07
    Originally posted by wolfgang59
    Yes if enough people consistently get something wrong it becomes right!

    My poet hate is that septagon is becoming acceptable instead of the correct heptagon.

    Am I getting old?
    Getting old isn't so bad. It beats the alternative.
  3. SubscriberSuzianne
    Misfit Queen
    Isle of Misfit Toys
    Joined
    08 Aug '03
    Moves
    36633
    21 Dec '14 03:00
    Originally posted by divegeester
    My issue with GB is not the observation he makes, which is probably accurate, it is the lack of balls to name names. I think the analogy would be: you don't start a fight in a bar by writing graffiti in the toilet.
    Maybe he's more a Jack Kerouac type and less a Rocky Marciano type.
  4. SubscriberSuzianne
    Misfit Queen
    Isle of Misfit Toys
    Joined
    08 Aug '03
    Moves
    36633
    21 Dec '14 03:02
    Originally posted by HandyAndy
    Does compensatory behaviour include spelling behavior the British way?
    I had to give you a thumbs up for this.


    (pssssst, don't tell FMF.)
  5. Joined
    16 Feb '08
    Moves
    116790
    21 Dec '14 09:34
    Originally posted by Suzianne
    Maybe he's more a Jack Kerouac type and less a Rocky Marciano type.
    Yes maybe...


    “One day I will find the right words, and they will be simple.”

    Jack Kerouac, The Dharma Bums
  6. Joined
    16 Feb '08
    Moves
    116790
    21 Dec '14 09:35
    Originally posted by HandyAndy
    Does compensatory behaviour include spelling behavior the British way?
    The "English" way

    😉
  7. Standard memberredbadger
    Suzzie says Badger
    is Racist Bastard
    Joined
    09 Jun '14
    Moves
    10079
    21 Dec '14 10:17
    Originally posted by divegeester
    The "English" way

    😉
    From The Book Of Right On THE OXFORD ENGLISH (not fecking british) DICTIONARY. Bloody Yanks.
  8. Joined
    18 Jan '07
    Moves
    12449
    21 Dec '14 10:56
    Originally posted by divegeester
    The "English" way
    The correct way.
  9. Joined
    16 Feb '08
    Moves
    116790
    21 Dec '14 11:341 edit
    Exactly.

    What-ho!
  10. Standard memberredbadger
    Suzzie says Badger
    is Racist Bastard
    Joined
    09 Jun '14
    Moves
    10079
    21 Dec '14 13:38
    Originally posted by Shallow Blue
    The correct way.
    The only way.
  11. Joined
    10 Nov '12
    Moves
    6889
    21 Dec '14 14:03
    Originally posted by divegeester
    Yes maybe...


    “One day I will find the right words, and they will be simple.”

    Jack Kerouac, The Dharma Bums
    Not much of an appreciator of Kerouac, but that's a nice quote.
  12. Standard memberGrampy Bobby
    Boston Lad
    USA
    Joined
    14 Jul '07
    Moves
    43012
    21 Dec '14 16:06
    Originally posted by Grampy Bobby
    "Compensatory Narcissistic Personality Disorder

    Personality disorder is a matter of false judgments of value. Listed below are the false value judgments that are at the root of Compensatory Narcissistic Personality Disorder:

    False Good... False Bad... Personality Disorder

    to have an image of superiority and high worth an image o ...[text shortened]... hope you're ready to engage in a productive impersonal discussion of online compensatory behaviours?
    "Emotional insecurity

    Abraham Maslow describes an insecure person as a person who "perceives the world as a threatening jungle and most human beings as dangerous and selfish; feels a rejected and isolated person, anxious and hostile; is generally pessimistic and unhappy; shows signs of tension and conflict, tends to turn inward; is troubled by guilt-feelings, has one or another disturbance of self-esteem; tends to be neurotic; and is generally selfish and egocentric." (Maslow, 1942, pp 35). He viewed in every insecure person a continual, never dying, longing for security. Alegre (2008).

    A person who is insecure lacks confidence in their own value, and one or more of their capabilities, lacks trust in themselves or others, or has fears that a present positive state is temporary, and will let them down and cause them loss or distress by "going wrong" in the future. This is a common trait, which only differs in degree between people.

    This is not to be confused with humility, which involves recognizing one's shortcomings but still maintaining a healthy dose of self-confidence. Insecurity is not an objective evaluation of one's ability but an emotional interpretation, as two people with the same capabilities may have entirely different levels of insecurity.

    Insecurity may contribute to the development of shyness, paranoia and social withdrawal, or alternatively it may encourage compensatory behaviors such as arrogance, aggression, or bullying, in some cases.

    The fact that the majority of human beings are emotionally vulnerable, and have the capacity to be hurt, implies that emotional insecurity could merely be a difference in awareness.

    Insecurity has many effects in a person's life. There are several levels of it. It nearly always causes some degree of isolation as a typically insecure person withdraws from people to some extent. The greater the insecurity, the higher the degree of isolation becomes. Insecurity is often rooted in a person's childhood years.

    Like offense and bitterness, it grows in layered fashion, often becoming an immobilizing force that sets a limiting factor in the person's life. Insecurity robs by degrees; the degree to which it is entrenched equals the degree of power it has in the person's life. As insecurity can be distressing and feel threatening to the psyche, it can often be accompanied by a controlling personality type or avoidance, as psychological defense mechanisms.

    Insecurity can be overcome. It takes time, patience and a gradual realization that one's own worth is purely a matter of perspective (or subjective opinion of oneself), and so while it may be true that insecurity can follow from concerns relating to objective reality, this is by no means a necessity, but more a tendency. The first of Erikson's stages of psychosocial development details the challenge of finding security and learning to trust oneself and one's environment."
    http://en.wikipedia.org/wiki/Emotional_security
  13. Standard memberGrampy Bobby
    Boston Lad
    USA
    Joined
    14 Jul '07
    Moves
    43012
    22 Dec '14 17:01
    Intimidation

    "Threatening behaviors may be conceptualized as a maladaptive outgrowth of normal competitive urge for interrelational dominance generally seen in animals. Alternatively, intimidation may result from the type of society in which individuals are socialized, as human beings are generally reluctant to engage in confrontation or threaten violence.

    Like all behavioral traits it exists in greater or lesser manifestation in each individual person over time, but may be a more significant "compensatory behavior" for some as opposed to others. Behavioral theorists often see threatening behaviours as a consequence of being threatened by others, including parents, authority figures, playmates and siblings. “Use of force is justified when a person reasonably believes that it is necessary for the defense of oneself or another against the immediate use of unlawful force.”

    Intimidation may be employed consciously or unconsciously, and a percentage of people who employ it consciously may do so as the result of selfishly rationalized notions of its appropriation, utility or self-empowerment. Intimidation related to prejudice and discrimination may include conduct "which annoys, threatens, intimidates, alarms, or puts a person in fear of their safety...because of a belief or perception regarding such person's race, color, national origin, ancestry, gender, religion, religious practice, age, disability or sexual orientation, regardless of whether the belief or perception is correct."

    Intimidation may be manifested in such manner as physical contacts, glowering countenance, emotional manipulation, verbal abuse, making someone feel lower than you, purposeful embarrassment and/or actual physical assault. “Behavior may include, but is not limited to, epithets, derogatory comments or slurs and lewd propositions, assault, impeding or blocking movement, offensive touching or any physical interference with normal work or movement, and visual insults, such as derogatory posters or cartoons.” http://en.wikipedia.org/wiki/Intimidation
  14. Joined
    10 Nov '12
    Moves
    6889
    22 Dec '14 17:12
    ASCII

    ASCII (Lˈæski/ ass-kee), abbreviated from American Standard Code for Information Interchange,[1] is a character-encoding scheme. Originally based on the English alphabet, it encodes 128 specified characters into 7-bit binary integers as shown by the ASCII chart on the right.[2] The characters encoded are numbers 0 to 9, lowercase letters a to z, uppercase letters A to Z, basic punctuation symbols, control codes that originated with Teletype machines, and a space. For example, lowercase j would become binary 1101010 and decimal 106.
    ASCII codes represent text in computers, communications equipment, and other devices that use text. Most modern character-encoding schemes are based on ASCII, though they support many additional characters.
    ASCII developed from telegraphic codes. Its first commercial use was as a 7-bit teleprinter code promoted by Bell data services. Work on the ASCII standard began on October 6, 1960, with the first meeting of the American Standards Association's (ASA) X3.2 subcommittee. The first edition of the standard was published during 1963,[3][4] a major revision during 1967,[5] and the most recent update during 1986.[6] Compared to earlier telegraph codes, the proposed Bell code and ASCII were both ordered for more convenient sorting (i.e., alphabetization) of lists, and added features for devices other than teleprinters.
    ASCII includes definitions for 128 characters: 33 are non-printing control characters (many now obsolete)[7] that affect how text and space are processed[8] and 95 printable characters, including the space (which is considered an invisible graphic[9][10]:223).
    The IANA prefers the name US-ASCII.[11] ASCII was the most common character encoding on the World Wide Web until December 2007, when it was surpassed by UTF-8, which includes ASCII as a subset.

    History
    The American Standard Code for Information Interchange (ASCII) was developed under the auspices of a committee of the American Standards Association, called the X3 committee, by its X3.2 (later X3L2) subcommittee, and later by that subcommittee's X3.2.4 working group. The ASA became the United States of America Standards Institute or USASI[10]:211 and ultimately the American National Standards Institute.
    Bit width
    The X3.2 subcommittee designed ASCII based on the earlier teleprinter encoding systems. Like other character encodings, ASCII specifies a correspondence between digital bit patterns and character symbols (i.e. graphemes and control characters). This allows digital devices to communicate with each other and to process, store, and communicate character-oriented information such as written language. Before ASCII was developed, the encodings in use included 26 alphabetic characters, 10 numerical digits, and from 11 to 25 special graphic symbols. To include all these, and control characters compatible with the Comité Consultatif International Téléphonique et Télégraphique (CCITT) International Telegraph Alphabet No. 2 (ITA2) standard, Fieldata, and early EBCDIC, more than 64 codes were required for ASCII.
    The committee debated the possibility of a shift function (like in ITA2), which would allow more than 64 codes to be represented by a six-bit code. In a shifted code, some character codes determine choices between options for the following character codes. It allows compact encoding, but is less reliable for data transmission; an error in transmitting the shift code typically makes a long part of the transmission unreadable. The standards committee decided against shifting, and so ASCII required at least a seven-bit code.[10]:215, 236 § 4
    The committee considered an eight-bit code, since eight bits (octets) would allow two four-bit patterns to efficiently encode two digits with binary-coded decimal. However, it would require all data transmission to send eight bits when seven could suffice. The committee voted to use a seven-bit code to minimize costs associated with data transmission. Since perforated tape at the time could record eight bits in one position, it also allowed for a parity bit for error checking if desired.[10]:217, 236 § 5 Eight-bit machines (with octets as the native data type) that did not use parity checking typically set the eighth bit to 0.[15]
    Organization
    The code itself was patterned so that most control codes were together, and all graphic codes were together, for ease of identification. The first two columns (32 positions) were reserved for control characters.[10]:220, 236 § 8,9) The "space" character had to come before graphics to make sorting easier, so it became position 20hex;[10]:237 § 10 for the same reason, many special signs commonly used as separators were placed before digits. The committee decided it was important to support upper case 64-character alphabets, and chose to pattern ASCII so it could be reduced easily to a usable 64-character set of graphic codes,[10]:228, 237 § 14 as was done in the DEC SIXBIT code. Lower case letters were therefore not interleaved with upper case. To keep options available for lower case letters and other graphics, the special and numeric codes were arranged before the letters, and the letter A was placed in position 41hex to match the draft of the corresponding British standard.[10]:238 § 18 The digits 0–9 were arranged so they correspond to values in binary prefixed with 011, making conversion with binary-coded decimal straightforward.
    Many of the non-alphanumeric characters were positioned to correspond to their shifted position on typewriters; an important subtlety is that these were based on mechanical typewriters, not electric typewriters.[16] Mechanical typewriters followed the standard set by the Remington No. 2 (1878), the first typewriter with a shift key, and the shifted values of 23456789- were "#$%_&'() – early typewriters omitted 0 and 1, using O (capital letter o) and l (lowercase letter L) instead, but 1! and 0) pairs became standard once 0 and 1 became common. Thus, in ASCII !"#$% were placed in second column, rows 1–5, corresponding to the digits 1–5 in the adjacent column. The parentheses could not correspond to 9 and 0, however, because the place corresponding to 0 was taken by the space character. This was accommodated by removing _ (underscore) from 6 and shifting the remaining characters left; this corresponded to many European typewriters, which placed the parentheses with 8 and 9. This discrepancy from typewriters led to bit-paired keyboards, notably the Teletype Model 33, which used the left-shifted layout corresponding to ASCII, not to traditional mechanical typewriters. Electric typewriters, notably the more recently introduced IBM Selectric (1961), used a somewhat different layout that has become standard on computers—​following the IBM PC (1981), especially Model M (1984)—​and thus shift values for symbols on modern keyboards do not correspond as closely to the ASCII table as earlier keyboards did. The /? pair also dates to the No. 2, and the ,< .> pairs were used on some keyboards (others, including the No. 2, did not shift , (comma) or . (full stop) so they could be used in uppercase without unshifting). However, ASCII split the ;: pair (dating to No. 2), and rearranged mathematical symbols (varied conventions, commonly -* =+) to :* ;+ -=.
    Some common characters were not included, notably ½¼¢, while ^`~ were included as diacritics for international use, and <> for mathematical use, together with the simple line characters \| (in addition to common /). The @ symbol was not used in continental Europe and the committee expected it would be replaced by an accented À in the French variation, so the @ was placed in position 40hex, right before the letter A.[10]:243
    The control codes felt essential for data transmission were the start of message (SOM), end of address (EOA), end of message (EOM), end of transmission (EOT), "who are you?" (WRU), "are you?" (RU), a reserved device control (DC0), synchronous idle (SYNC), and acknowledge (ACK). These were positioned to maximize the Hamming distance between their bit patterns.[10]:243–5
    Publication
    With the other special characters and control codes filled in, ASCII was published as ASA X3.4-1963, leaving 28 code positions without any assigned meaning, reserved for future standardization, and one unassigned control code.[10]:66, 245 There was some debate at the time whether there should be more control characters rather than the lower case alphabet.[10]:435 The indecision did not last long: during May 1963 the CCITT Working Party on the New Telegraph Alphabet proposed to assign lower case characters to columns 6 and 7,[17] and International Organization for Standardization TC 97 SC 2 voted during October to incorporate the change into its draft standard.[18] The X3.2.4 task group voted its approval for the change to ASCII at its May 1963 meeting.[19] Locating the lowercase letters in columns 6 and 7 caused the characters to differ in bit pattern from the upper case by a single bit, which simplified case-insensitive character matching and the construction of keyboards and printers.
    The X3 committee made other changes, including other new characters (the brace and vertical bar characters),[20] renaming some control characters (SOM became start of header (SOH)) and moving or removing others (RU was removed).[10]:247–248 ASCII was subsequently updated as USASI X3.4-1967, then USASI X3.4-1968, ANSI X3.4-1977, and finally, ANSI X3.4-1986 (the first two are occasionally retronamed ANSI X3.4-1967, and ANSI X3.4-1968).
    The X3 committee also addressed how ASCII should be transmitted (least significant bit first), and how it should be recorded on perforated tape. They proposed a 9-track standard for magnetic tape, and attempted to deal with some forms of punched card formats.
    Use
    ASCII itself was first used commercially during 1963 as a seven-bit teleprinter code for American Telephone & Telegraph's TWX (TeletypeWrit...
  15. Joined
    16 Feb '08
    Moves
    116790
    23 Dec '14 09:20
    😴
Back to Top

Cookies help us deliver our Services. By using our Services or clicking I agree, you agree to our use of cookies. Learn More.I Agree