Thursday, October 31, 2019

What are the advantages and disadvantages of EDCT's You Essay

What are the advantages and disadvantages of EDCT's You - Essay Example In such case, the airline company has to be assigned again with a new EDCT which maybe much later than the other airplanes. This is due to the fact that the issuance of EDCT’s is on the â€Å"first come, first serve basis.† Hence, the passengers may become upset and feel frustrated on the transport service of the airline company due to extension of holding time. Considerably, an airplane company may opt not to fly in accordance with the EDCT for the reason that they only have few passengers aboard and it will expectedly result to an unfair loss of profits. On the other hand, the assigning of EDCT’s significantly helps the air traffic controllers to accurately accept or deny any suggested arrivals or departures by airline companies. This allows them to regulate the air traffic more efficiently and orderly (FAA 21). On the contrary, the assignment of such adds burden to the work of the air traffic controllers. The air traffic controllers are expected to be attentiv e and available at all times. In fact, in times wherein there is a continuous weather disturbance, they are forced to work overtime just to ensure the safety departure and arrival of

Monday, October 28, 2019

Types of Introductory Paragraphs Essay Example for Free

Types of Introductory Paragraphs Essay According to world statistics, the level of air pollution has been steadily increasing throughout the years. Though the result is not alarming, it is important for us to take measures in controlling activities that lead to air pollution. Only by doing so, will we be able to have better quality air. Therefore, the first thing to do is to find out what causes air pollution and its outcomes. Based on my observation there are two major causes and effect of air pollution. Type: Anecdotal Topic 2: Arguments I used to live next door to a couple who always argued. They argued over even the smallest matter. Sometimes, they argued the whole day, and sometimes the argument even continued to the next day. After sometime, I learned to ignore the shouting and name calling that they used to do to each other. Sometimes, just for fun, I would listen to their arguments and made up my own refutations; my own answers to their accusations. When I was older and began to understand more, I started thinking about the reasons why people argue. From what I have heard from my neighbours, arguments can be caused by two main issues; money and jealousy. Type: General to Specific Topic: AIDS According to Oxford Advanced Learner’s Dictionary, AIDS stands for Acquired Immune Deficiency Syndrome. It is an illness which attacks the body’s ability to resist infection. It is a lethal disease that everyone fears. However, in some countries where sex trade is rampant, this deadly disease is unavoidable especially for those directly involved. Why is AIDS deadly and how does it affect the victims? Based on scientific researches done, there are two deadly outcomes of AIDS. Samples of Concluding Paragraph : Causes and/or Effects Essay Topic 1: Air Pollution In summary, air pollution is caused by increase in population and industrial activities. Due to these reasons, the world is suffering from global warming as well as higher lung diseases. In my point of view, more preventive measures must be taken in order to improve the air quality in our nation. Only by doing this, will we be able to see healthier population and better environment. Topic 2: Arguments In a nutshell, arguments can break out at anytime and anywhere. The main reasons why people argue are usually because of financial difficulty as well as personal feelings towards each other. I think, it is wise for people to find time to talk about things that are causing these arguments in a mature manner or else, they will create animosity instead of unity in their relationship. Topic: AIDS To cut it short, people who suffer from AIDS will experience lower immunity as well as public criticism. In order to protect ourselves from AIDS, we need to educate our generation and future generations about the dangers of having unprotected sexual intercourse, taking drugs and to increase their awareness of general health.

Saturday, October 26, 2019

Impact of Directly Observed Treatment on Tuberculosis

Impact of Directly Observed Treatment on Tuberculosis Description of the condition Multidrug-resistant tuberculosis (MDR TB) is defined as Mycobacterium tuberculosis strains with in vitro resistance to at least both isoniazid (INH) and rifampicin (RFP) (Johnston 2009;WHO;WHO 2013). Emergence of this strain since the 1980s has represented a major barrier towards successful TB control (Johnston 2009;WHO 2013). Among the newly diagnosed TB patients in 2012, 3.6% had MDR TB while the percentage was approximately six times higher among those previously treated cases (20.2%) (WHO 2013).In 2012, it was estimated that 450000 incident cases and 170000 mortality cases of MDR TB occurred globally (WHO 2013). Compared with drug-susceptible strains, treatment of MDR TB is much more complex. According to the WHO guidelines, MDR TB treatment regimen requires a minimum duration of 18 months with two treatment phases, the intensive and the continuation phase (WHO). The first six months of treatment is usually considered the intensive phase since a patient needs to receive both oral and injectable drugs (WHO). After this period, the injectable agent is discontinued and patients receive the oral drugs for another 12-18 months (termed as the continuation phase) (WHO). Management of MDR TB is challenging for that patients are normally in advanced stages of disease with thick-walled cavities and chronic lung lesions which are hard for the drugs to penetrate (Orenstein 2009). Also, the longer treatment duration, high out-of-pocket cost, together with the more frequent adverse reactions that are associated with second line drugs are all contribution factors to poor treatment adherence (Bassili 2013;Toczek 2012;Volmink 2007). As a result, treatment success rate of MDR TB was much lower compared to drug sensitive strains. According to the WHO, the pooled treatment success rate of MDR TB patients diagnosed in 2009 was about 48%, whereas it exceeded 85% among non-MDR TB patients (Johnston 2009). Description of the intervention Directly observed treatment (DOT) refers to the use of an appointed agent (a professional health worker, a community volunteer, or a family member) to directly monitor people taking their anti-tuberculosis drugs (Mukherjee 2004). Initially, this concept was proposed as a key component of Directly Observed Therapy, Short Course (DOTS) by the WHO in 1994 to ensure cure of TB (WHO). In addition to the provision of standardized 6-8 months short-course directly observed chemotherapy regimen, other components of DOTS include: political commitment, case detection through quality-assured bacteriology, maintenance of an effective drug supply and management system, and evaluation of performance and impact (WHO). Implementation of DOTS in non-MDR TB treatment demonstrates significant effectiveness, as the strategy has helped to treat 37 million TB cases and cured more than 80% of them by 2007(WHO 2013). However, the standardized short-course chemotherapy is usually not applicable to cases of MD R TB. To improve patients’ adherence to MDR TB treatment, in 2000, WHO and its international partners further developed DOTS-Plus strategy by adding the components of MDR-TB diagnosis, treatment and management into the DOTS (WHO 2008;WHO 2011). In this DOTS-Plus strategy, DOT is highly recommended by the WHO to be delivered to all MDR-TB patients (WHO 2008;WHO 2011). However, treatment of MDR-TB patients requires at least 18 months, therefore, delievering DOT to MDR-TB patients would be more challenge than for drug-suspectible TB patients. There are two types of DOT according to its implementation length. In full DOT, anti-TB drugs were administered under direct observation throughout the treatment duration (including both the intensive and continuation phase) whereas it is directly observed only during the intensive phase for partial DOT (WHO 2008;WHO 2011). Effectiveness of DOT is commonly demonstrated through comparison with SAT, a traditional management modality in which anti-TB drugs were self-administered by patients without any observation (WHO 2008;WHO 2011). Currently, many countries have incorporated full DOT into their national TB control programs (NTPs) according to suggestions from the WHO guidelines (Bassili 2013). However, there are still countries that adopt partial DOT or even self-administrated treatment (SAT) as the management modality in their NTPs. How the intervention might work A better understanding of how DOT improves treatment outcomes of MDR TB could have important management implications. First, knowing the type(s) of DOT provider and location that is associated with a higher treatment success rate could allow one to make evidence-based decisions when designing DOT for MDR TB treatment. Second, studying the influence of other characteristics on successful treatment outcomes of MDR TB could provide a conservative yet more objective conclusion of the effectiveness of DOT. Third, comparing DOT with other strategies for the improvement of treatment adherence could advise policy makers to balance resources between DOT and these other strategies so that treatment could be delivered in a more cost-effective way. Why it is important to do this review Impact of DOT on successful TB treatment has been controversial throughout the years. Previous observational studies suggested that DOT ensured timely adherence management as well as day-to-day monitoring of adverse effects (Orenstein 2009). One meta-analysis revealed that treatment completion rate among pulmonary TB patients could exceed 90% when DOT was implemented throughout the treatment course(Bassili 2013). However, results from a recent meta-analysis of randomized controlled trials showed no significant difference in treatment success rate between DOT and SAT among drug-susceptible TB cases(Mukherjee 2004). Moreover, previous meta-analyses almost exclusively focused on the role of DOT in the treatment of non-MDR TB; little has been examined systematically regarding its role in effective MDR TB treatment.

Thursday, October 24, 2019

The Odyssey - Comparing The Ro :: essays research papers

Odyssey vs. Rustling Rhapsody Comparison of the Role of Women 'A woman is very unpredictable. She is romantic, sensitive and caring; however, underneath she is convoluted, deceptive and dangerous.';   Ã‚  Ã‚  Ã‚  Ã‚  -Erin Perrizn (1963 -) One would automatically assume that the female character in a heroic story takes the preconceived role of an object at the disposal of the male protagonist. The female character in a heroic story holds the stereotype that she is obtuse, and will repeatedly flock to the most handsome man. 'Rustler's Rhapsody'; is a sardonic parody of the western film stereotypes: the women play very small roles other than Rex O'Herolan's personal cheerleaders. However, in the epic poem, The Odyssey, Homer gave souls and personalities to his female characters. Women are not in the story just to please Odysseus; they are important and independent characters that help him on his heroic journey. The women in The Odyssey are essential in Homer's poem: they not only act as a voice of reason and care, but are the deceptive and deceiving characters that add an intangible mystery. In 'Rustler's Rhapsody';, Miss Tracy and the C.B.'s daughter are the only female characters. They both portray the stereotype of incipit debutantes who are instantly attracted to the handsome hero. The C.B.'s daughter is an inept character who gets dragged across the desert by her horse 'Wildfire';, only to be saved by Rex O' Herolan. In that particular scene, she attempts to seduce Rex by flirting and engaging in small talk about a blanket. Miss Tracy, the town prostitute, is even more direct than the C.B.'s daughter. She comes in her underwear trying to persuade Rex to sleep with her. Although this may seem like some characters in The Odyssey, Miss Tracy has no other role in the plot other than to sleep with Rex. The two women did not shed a tear when Rex said good-bye: they had almost no feeling at all. The two weren't jealous of one another; it seems strange that two girls could share one hero. Miss Tracy and the C.B.'s daughter both have identical shallow character. Personality is a characteristic missing from to their female stereotype; they are merely used as the Rex's trophies after defeating Bob. Other than that, the two women had no role in the story. On the other hand, Homer uses the female character to provide reason and care for the protagonist, Odysseus. Despite the number of unimportant female characters, Penelope, Circe, Calypso, and Pallas Athene all have unique personalities that are essential to the development of Odyesseus and Telemachus.

Wednesday, October 23, 2019

IT ethics: Hacking And Copyrights Essay

IT ethics is a new branch of ethics that is growing and changing rapidly as IT technology also grows and develops. The term â€Å"IT ethics† is open to interpretations both broad and narrow. On the one hand, for example, IT ethics might be understood very narrowly as the efforts of professional philosophers to apply traditional ethical theories or virtue ethics to issues regarding the use of IT technology. On the other hand, it is possible to construe IT ethics in a very broad way to include, as well, standards of professional practice, codes of conduct, aspects of IT law, public policy, corporate ethics – even certain topics in the sociology and psychology of computing. In the industrialized nations of the world, the â€Å"information revolution† already has significantly altered many aspects of life – in banking and commerce, work and employment, medical care, national defense, transportation and entertainment. Consequently, information technology has begun to affect community life, family life, human relationships, education, freedom, democracy, and so on. IT ethics in the broadest sense can be understood as that branch of applied ethics, which studies and analyzes such social and ethical impacts of information technology (Bynum). In recent years, this robust new field has led to new university courses, conferences, workshops, professional organizations, curriculum materials, books, articles, journals, and research centers. The introduction of the World Wide Web in 1990 has catalyzed the expansion of the Internet, which is still growing today at unprecedented rates and IT ethics is quickly being transformed into â€Å"global information ethics†. The recent growth of the Internet has resulted not only in an increase in the amount of available knowledge, but also in an increase in the problems inherent to its usage and distribution. It has become clear that traditional rules of conduct are not always applicable to this new medium, so new ethical codes are now being developed. Edward F. Gehringer gives broad and wide-ranged classification of ethical issues in information technology area. He distinguished following main aspects of IT ethics (Gehringer): Basics; Commerce; IT Abuse; Intellectual Property; Privacy; Risks; Social Justice Issues; Although, in practice every case involves at least two of those issues. At first, let us discuss problems of copyrights in present-day IT industry. It seems that this issue deals with almost every aspect listed above and it will be good example of ethics implementation in IT. In article â€Å"Napster, DVD cases raise copyright questions in digital age†, we can observe some problems concerning copyright issues of IT industry. The article discusses this problem on example of Napster, the Internet search engine which allows over 60 millions consumers to find and download free music. â€Å"Experts say the high-tech context in which copyright questions are being raised – as exemplified by the Napster case in California and a DVD-encryption case out of New York – also shows that the law is always a few steps behind technology.† The Recording Industry Association of America filed a lawsuit against Napster in December 2000, accusing the company of encouraging the illegal copying and distribution of copyright music on a massive scale. Author asserts that the case raises fundamental questions about freedom of information and activity on the Internet and what copyright protections musicians have or do not have in cyberspace. â€Å"For th ose and other reasons, legal experts point to the Napster case as crucial to the future of cyberspace and copyright law in the United States, the world’s leader in high-tech issues†, he states. In this article, the writer also describes how copyright law needs revision because it has become so complicated and counterintuitive. He also maintains that many content providers and copyright lawyers tend to propagate â€Å"made-up rules† that purport to clarify ambiguities such as the legality of sharing music on peer-to-peer file sharing networks. Author asserts that copyright rules, however, are in considerable flux these days and very little is clear about these new technologies. According to article, we surely have no obligation to follow made-up rules, although it is sometimes easy to confuse these specious requirements with real ones. Given this confusion, it concludes that the need for copyright reform is urgent. With the dawning of the Internet and other highly advanced technology, people all around the world are now able to copy, download, and distribute copyrighted material with ease. Unfortunately, the use of the Internet has increased the conflict with copyright laws.   In 1998, Congress passed the Digital Millennium Copyright Act to address the tricky issue of copyright protections in a digital environment. An important aspect of that law was anti-circumvention protection, which barred people from circumventing password-protected and other secure Web sites that provide access to creative works. The law said the copyright owners could file civil lawsuits against those who break into such secure Web sites. This is the directly applicable law in the DVD case. At its core, copyright law says that the creators of certain literary and artistic works have the right to ensure that unauthorized people do not use their work for unauthorized purposes. The creators hold the copyright. They can gi ve up their exclusive right to publishers or other authorized entities for a limited time or permanently. Legislation and court rulings have held that people have a significant right to make use of exceptions within the copyright law to avoid lawsuits. On the other hand, if the overwhelming majority of actors regulated by the copyright law are ordinary end-users, it makes no sense to insist that each of them retain copyright counsel in order to fit herself within niches created to suit businesses and institutions, nor is it wise to draw the lines where the representatives of today’s current stakeholders insist they would prefer to draw them. Extending the prescriptions and proscriptions of the current copyright law to govern the everyday acts of non-commercial, non-institutional users is a fundamental change. To do so without affecting a drastic shift in the copyright balance will require a comparably fundamental change in the copyright statutory scheme. In a whole, issues in article raised very well, opposing two different views on copyright problem – from creator’s and from consumer’s side. Undoubtedly, both the Napster and DVD cases raise free speech, fair use and copyright issues, which makes them important to future legal and legislative action in the high-tech area. Using those cases writer shows controversial issues and concludes that the need for copyright reform is urgent. On the other hand there is no strong support for reasons in which way legislation concerning copyrights could be established. In my opinion, the eloquence surrounding digital copyright in general, and peer-to-peer file sharing and DVD encryption in particular, heated in article, inspires great confusion about what the copyright law does and does not prohibit. In general, most of the key legal questions are still unsettled, in part because copyright defendants have run out of money and gone out of business before their cases could go to trial. In that vacuum, some copyright owners are claiming that their preferred rules of conduct are well-established legal requirements. There may be an ethical obligation to follow real rules, even when they seem unreasonable. But there is any ethical obligation to follow made-up ones. Indeed, in this context, we may have an ethical obligation to resist them. When considering this new and advanced way of sharing information, with regard to copyright laws, the following factors must be assessed: the legality of the situation, financial losses and gains, and moral issues. Two different views can be inevitably argued over this controversial issue; those who think the downloading of copyrighted material, without the permission of the author is theft, and those who believe file sharing of copyrighted material is their right in the information age.   Although the digital age has made advanced technology available to everyone, the principles of justice and fairness should still prevail. As an IT professional, we have the moral responsibilities to point out when necessary about copyrights. We should be aware that copyrighted material on the Internet is available for free download only if the creators give consent to its publication and distribution. It can be certain that the debate on copyright in the digital age will continue, and that a definitive solution will take a while to reach for each side.   Technology will always be here and will continue to advance, but the industries must be willing to work with the technology to meet the demands of the consumer in the information age. Hacking is also one of the most significant issues nowadays, which involves almost every aspect of IT ethics. Second article I have submitted for hacking ethics topic is â€Å"Under the skin of digital crime† from BBC News. The article discusses issues of â€Å"positive† and â€Å"negative† hacking. It claims that there was a time when hacking was something positive. It was done in the name of intellectual curiosity rather than financial reward. Now hacking has become an activity that holds two positions and is therefore both solemnized for its insightful inventiveness and defamed for its devious acts. Article claims that the ethics behind hacking and the actions taken by hackers constitute a manifesto that transcends ordinary understanding of this activity. Hackers argue that their actions promote a means for tighter security by way of detecting flaws and patches for systems and software. However, these very actions are viewed as violations of the rights to privacy and security for both individuals and organizations. Consequently, this establishes a cautionary attitude toward ethical issues such as, privacy, security and the future of the Internet. Another trend that article raises is the creeping criminality of hacking, much of which is now carried out for explicitly financial reward. Some criminal hackers are threatening to bombard some web-based businesses with gigabytes of data unless large amounts of cash are handed over. It is extortion with a hi-tech gloss. In author’s experience, many of these criminal hackers have full-time jobs in technology. â€Å"Professional hackers are professional in all senses of the word,† he states, â€Å"they work in the industry.† The fundamental doctrine or ethic that hackers use in order to justify their behavior is the idea that hacking offers a mode of investigation, which allows an individual to gain knowledge necessary to infiltrate systems that contain vulnerabilities. Acquiring this knowledge allows one to develop strategies that facilitate exploration of their functions and the inner components of the systems. The â€Å"hacker ethic† states in part that all information belongs to everyone and there should be no boundaries or restraints to prevent disclosure of this information. This philosophy that is upheld by the hacker community introduces ethical questions regarding the freedom of information and the loss of privacy. One more argument supported by the hacker ethic is that break-ins elucidate security problems to those who can do something about them. Hacker intrusions into systems surpass the traditional understanding of violating the laws of trespassing. Hacking involves the exploitation, or the manipulation of a bug, or a backdoor that is inherently present within the system. In this view, hacking is not a threat against the integrity of the system being exploited, but instead is a means of implementing corrections and enforcing tighter security. Although issues in article risen well, the writer did not make a conclusive support argument of the statement that many of criminal hackers have full-time jobs in technology. There is not strong support for causes of criminal actions by hackers. The only reason that they carried out hacking, he argued for explicitly financial reward. Concerning hacking ethics, problem discussed very particularly, and the common statement depicts real situation. Undoubtedly, hackers and hacking problems are real ones, but how might they be solved? Security requires much more than designing a secure technical infrastructure that resembles an impenetrable fortress. The key to a secure network is the development of real time enforceable policies that take advantage of security bulletins and published security holes. â€Å"It is ethically wrong to wait until systems under protection are compromised in order to begin patching up the holes. Securing a network doesn’t begin with high cost software and security firewalls aimed at halting the intruders, but begins with utilizing available knowledge that calls for improvements made by ethical hacking.† (Mikkkeee). Whatever the case, hackers believe that when they compromise a system they are in effect introducing fixes that force the system administrator to take the necessary precautions in patching up the hole, thereby tightening the security of the system. From this position, the hacker is actually doing a service to the system administrator who is unfamiliar with the bugs that can lead to a system compromise. If there is any criminal intent on the part of the hacker, then they should be held legally accountable for violating the security of the system and their actions should be punishable by law. From the point of view of IT professional, we have the moral responsibilities to point out when necessary about hacker activities. Even though hacking undoubtedly has led to productive improvement in IT and software security, it has in effect created many disruptive problems online and offline. Hacking is an activity that introduces a method of analysis that targets and works on various components. Therefore, hacking has the potential to cause harm and to violate legitimate privacy and property rights. By ethical standards hacking does introduce crucial security fixes, but does so at the expense of violating privacy and the security of individuals. Furthermore, hacking activities lead to disruptive and dangerous problems for society, which tend to be difficult to eradicate. But, with awareness of those problems, we also should take into account that hacking is underside of technical progress, and could not be considered apart of it. As The Mentor warns in the conclusion to his manife sto, â€Å"I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all† (Mentor, 1). Even if the authorities catch a hacker, as long as there is a motivation, hacking will persist. On the other hand, IT professionals should clearly recognize boundary between real professionalism and hacking in their own activity, because that line is very transparent. In conclusion, we should note, that significant attention paid to issues erected above in public press. Many publications leave negative impression about hacking and copyrights, as those are lawless anyway. The Napster and DVD cases received the most publicity because it involves highly popular software that millions of people around the world use to share music and films. Concerning hacking issue, media tend to use the word â€Å"hacker† as a synonym for cyber vandal, digital criminal and basically any person who uses digital means to perform criminal or malicious activities. Nevertheless, it would be better to consider not only consequences, but causes as well. For the first look hacking and copyrights are on the contrary sides of ethics, but when we examine details, there are much more common between them. These problems are permanent topics of news nowadays. With penetration of information technology into mass media, which now functioning very closely related with World Wide Web, moreover, when Internet becoming a main media, issues of hacking and intellectual property ethics are affecting mass media itself noticeably. Thus those problems widely covered now in press and will cover on with spreading of information technology. The question is in qualitative impact of subjects on mass media. Bibliography: Bynum, Terrell, IT Ethics: Basic Concepts and Historical Overview. The Stanford Encyclopedia of Philosophy (Winter 2001 Edition), Edward N. Zalta(ed.), Gehringer, Edward. â€Å"Ethics in Computing.† Ethical Issues. Homepage. 2001 Chebium, Raju. â€Å"Napster, DVD cases raise copyright questions in digital age.† CNN.com News. August 7, 2000 Ward, Mark. â€Å"Under the skin of digital crime.† BBC News Online. 11 May, 2004 Mikkkeee. â€Å"Hacking: Ethical Issues of the Internet Revolution.† New Order Portal. March 29, 2003 The Mentor, â€Å"The Conscience of a Hacker,† Phrack, Vol One, Issue 7, Phile 3, January 8, 1986. February 10, 2003.

Tuesday, October 22, 2019

The Four Porqués of Spanish

The Four 'Porquà ©s' of Spanish Although porque, por quà ©, por que, and porquà © have related meanings, they are not interchangeable. If you find them confusing as a Spanish student, youre in good company: Native speakers often write them incorrectly as well. Por Quà © Por quà © typically is used in questions, meaning why:  ¿Por quà © celebramos el 16 de septiembre? (Why do we celebrate September 16?) ¿Por quà © estamos aquà ­? (Why are we here?) ¿Por quà © no citas tus fuentes? (Why dont you cite your sources?) Por quà © is also sometimes used in statements that form an indirect question. In such cases, it usually is still translated as why. Dime por quà © las noches son tan largas. (Tell me why the nights are so long.)Quiero saber por quà © se usa el prefijo www en las pginas Web. (I want to know why the prefix www is used for Web pages.) Porque Porque typically means because: Es simple porque se basa en el concepto de igualdad. (It is simple because it is based on the concept of equality.)Perdà ³nalos, porque no saben lo que hacen. (Forgive them, because they dont know what theyre doing.)Voy al restaurante porque tengo hambre. (Im going to the restaurant because Im hungry.)-  ¿Por quà © sales? - Porque estoy aburrida. (Why are you leaving? Because Im bored.) Por quà © and porque are far more common than the following two usages. If youre a beginner at Spanish you can probably safely stop here. Por Que Por que occurs when que as a relative pronoun follows the preposition por. If that sounds confusing, think of por que as meaning for which, although it is often translated as that or why. Esa es la razà ³n por que he querido salir. (That is why I wanted to leave. Literally, that is the reason for which I wanted to leave.)El motivo por que llegà ³ tarde fue el paro de buses. (He arrived late because of the bus stoppage. Literally, the reason for which he arrived late was the bus stoppage.) Por que also occurs when que follows a verb phrase using por. For example, the phrase for to worry about is preocuparse por. Here is an example where the phrase is followed by que: Se preocupa por que las soluciones sean incompatibles. (She is worried that the solutions will be incompatible.) Porquà © Finally, porquà © is a masculine noun, meaning reason, much like using why as a noun in English: No comprendo el porquà © de la violencia domà ©stica. (I dont understand the reason for domestic violence.)Estn acostumbrados a tomar decisiones, no a explicar los porquà ©s. (They are used to making decisions, not at explaining the reasons.)