You are on page 1of 23

1|Page

INTRODUCTION TO COMMITTED
ENTREPRENEURSHIP
 Good entrepreneurs assume full
responsibility over their business.
 They give full commitment and solid
ENTREPRNEUR - a person who organizes and dedication to make the business
operates a business. successful.

ENTREPRENEURSHIP –the activity of ABILITY TO ACCEPT CHANGE


setting up a business.
 Nothing is permanent but change.
ASSESMENT OF PERSONAL  Change occurs frequently.
ENTREPRENEURIAL COMEPETENCIES  When you own a business, you should
(PECs) and Skills cope with and thrive on changes.
 Capitalize on positive changes to make
 Entrepreneurial competencies refer to your business grow.
the important characteristics that should
be possessed by an individual in order to CREATIVE
perform entrepreneurial functions
effectively.  An entrepreneur should be creative and
innovative to stay in the business and in
IMPORTANT CHARACTERISTICS/ order to have an edge over the other
TRAITS OF A GOOD ENTREPRENEUR: competitors.

HARDWORKING HAS THE INITIATIVE

 One of the important characteristics of a  An entrepreneur takes the initiative. You


good entrepreneur. must put yourself in a position where
 This means working diligently and you are responsible for the failure or
being consistent about it. success of your business.
 Hardworking people keep improving
their performance to produce good PROFIT-ORIENTED
products and/or provide good services.
 An entrepreneur enters the world of
CONFIDENT business to generate profit or additional
income. The business shall become your
 Entrepreneurs have self-reliance in bread and butter. Therefore, you must
one’s ability and judgment. see to it that the business can generate
 They exhibit self-confidence to cope income.
with the risks of operating their own
business. IMPORTANT SKILLS OF A
SUCCESSFUL ENTREPRENEUR:
DISCIPLINED
EXCELLENT PLANNER
 Successful entrepreneurs always stick to
the plan and fight the temptation to do
what is unimportant.
2|Page

 Planning involves strategic thinking and goals. A business plan lays out a
goal setting to achieve objectives by written roadmap for the firm from
carefully maximizing all the available marketing, financial and operational
resources. standpoints
 A good entrepreneur develops and
follows the steps in the plans diligently SIMPLE BUSINESS PLAN OUTLINE
to realize goals.
 A good entrepreneur knows that
1. EXECUTIVE SUMMARY
planning is an effective skill only when  Write this last. It’s just a page or two
combined with action. that highlights the points you’ve
made elsewhere in your business
POSSESSES PEOPLE SKILLS plan.
 This is a very important skill needed  It’s also the doorway to your plan—
to be successful in any kind of after looking over your executive
business. summary, your target reader is either
 People skills refer to effective and going to throw your business plan
efficient communication and away or keep reading, so you’d
establishing good relationship to the better get I just right.
people working in and out of your  Summarize the problem you are
business. solving for customers, your solution,
 In day-to-day business transactions,
the target market, the founding team,
you need to deal with people. A
and financial forecast highlight.
well-developed interpersonal skill
can make huge differences between Keep things as brief as possible and
success and failure of the business. entice your audience to learn more
about your company.
SOUND DECISION MAKER 2. OPPORTUNITY
 Successful entrepreneurs have the  Describe the problem that you solve
ability to think quickly and to make wise for your customers and the solution
decisions towards a pre-determined set that you are selling.
of objectives.  It is always a good idea to think in
 No one can deny that the ability to make terms of customer needs and
wise decisions is an important skill that customer benefits as you define your
an entrepreneur should possess. product offerings, rather than
 Sound decisions should be based on thinking of your side of the equation
given facts and information and lead (how much the product or service
towards the pre-determined objectives.
costs, and how you deliver it to the
WHAT IS A BUSINESS PLAN? customer).
 Sometimes this part of the plan will
 A Business Plan is a written document include tables that provide more
that describes in detail how a business- details, such as a bill of materials or
usually a startup –defines its objectives
detailed price lists, but more often
and how it is to go about achieving its
than not this section just describes
3|Page

what you are selling and how your TO SEGMENT POTENTIAL


products and services fill a need for CUSTOMERS INTO A TARGET
your customers. MARKET, YOU NED TO ANSWER
3. MARKETANALYSIS THE FOLLOWING QUESTIONS:
SUMMARY
 You need to know your target  How old is your ideal customer?
market—the types of customers you  How much money do they make?
are looking for—and how it’s  Is your product or service most
changing. suitable for men, women or children?
 Use this business plan component to  Are they homeowners?
discuss your customers’ needs,  Where does your target market shop?
where your customers are, how to  Where do they live?
reach them and how to deliver your  What type of education do they
product to them. have?
 You’ll also need to know who your  What problems, needs, or wants do
competitors are and how you stack they have that your product or
up against them—why are you sure service will fill?
there’s room for you in this market? 4. EXECUTION
WHAT IS A TARGET MARKET?  Use this business plan section to
 A target market is defined as a outline your marketing plan, your
specific group of potential buyers for sales plan, and the other logistics
which a business positions its involved in actually running your
products and services. business.
 It’s the group of people who are  The sales and marketing section
most the most likely buyers of your offers a detailed explanation of your
products or services. sales strategy, pricing plan, proposed
advertising and promotion activities,
Segment Market 4 COMMON and product or service's benefits.
SEGMENTATION TYPES This is where outline your business's
INCLUDE: unique selling proposition, describe
how you're going to get your goods
1. Geographic Segmentation and/or services to market, and how
2. Demographic Segmentation you're going to persuade people to
3. Behavioral buy them.
4. Psychographic
4|Page

5. COMPANY AND the assumptions you’re making


MANAGEMENT SUMMARY with your projections.
 This section is an overview of who  You may also want to include
you are. your balance sheet, your sales
 It should describe the organization of forecast, business ratios, and a
your business, and the key members break-even analysis.
of the management team, but it  Finally, if you are raising money
should also ground the reader with or taking out loans, you should
the nuts and bolts: when your highlight the money you need to
company was founded, who is/are launch the business.
the owner(s), what state your
company is registered in and where TYPES OF MARKET
you do business, and when/if your
CONSUMER MARKET- represents
company was incorporated.
individuals and families purchasing goods
 Be sure to include summaries of your
and services for personal consumption.
managers’ backgrounds and
experience—these should act like BUSINESS MARKET- market of good and
brief resumes—and describe their services to individual and organization for
functions with the company. Full- the purpose other the personal consumption
length resumes should be appended is the business market.
to the plan. GLOBAL MARKET- consists of
 This section gives an outline of your transactions that are devised and carried out
business's legal structure and across national borders to satisfy the
management resources, including objectives of individuals, companies, and
your internal management team, organizations.
external management resources, and
NON- PROFITABLE MARKET-
human resources needs. Include
Companies selling their goods to nonprofit
experience or special skills each organizations such as universities, charitable
person in your management team organizations, and need to be priced
brings to the business. If the goal of carefully because these people have lower
your business plan is to get funding, purchasing power.
it's wise to make sure that your
KEY CONCEPT OF MARKET
management plan includes an
advisory board as a management NEED – states of felt deprivation –physical,
resource. social and individual needs.
6. FINANCIAL PLAN
WANTS –form taken by human needs as
 At the very least this section
they are shaped by culture and individual
should include your projected
personality.
profit and loss and cash flow
tables, and a brief description of DEMANDS –human wants that are backed
by buying power. –demand is the quantity of
5|Page

a good that consumers are willing and able MARKET- the set of all actual and
to purchase at various prices during a given potential buyers of a products or service.
period of time.
MARKETPLACE- physical, as when one
PRODUCTS – anything that can offered to goes shopping in a store
a market for attention, acquisition, use or
consumption that might satisfy a want or MARKETSPACE- is digital, as when one
need. It includes physical objectives, goes shopping on the internet.
services, persons, places, organizations, and METAMARKET-used to describe a cluster
ideas. of complementary products and services that
VALUES, SATISFACTION & are closely related in the minds of
QUALITY consumers but are spread across a diverse
set of industries.
CUSTOMER VALUE- The difference
between the values between the customer PLAYERS IN THE MARKET
gains from owning and using a product and (COMPETITORS)
the cost of obtaining the product. CUSTOMERS- most important
CUSTOMER SATISFACTION- The organization or people in the market are
extent to which a product’s perceived your customers. This includes both current
performance matches a buyer’s and potential customers.
expectations. MAJOR CUSTOMERS- It is very
TOTAL QUALITY MANAGEMENT common for most sales to be made to a
(TQM) -Programs designed to constantly relatively small set of big customers. These
improve the quality of products, services, always need careful attention and may have
and marketing process. account/relationship managers assigned to
them. A problem is that big customers may
EXCHANGE, TRANSACTIONS & also demand big discounts and special
RELATIONSHIPS attention.

EXCHANGE- act of obtaining a desired MINOR CUSTOMERS- Minor customers


object from someone by offering something buy less, but nevertheless are useful as in
in return. aggregate they may buy quite a lot. The only
time minor customers are undesirable is
TRANSACTION- A trade between two when serving them costs more than the
parties that involves at least two things of profit gained from them. This can happen
value, agreed-upon conditions, a time of when they are angered or when they try to
agreement, and a place of agreement. gain an unfair attention for their smaller
payment.
RELATIONSHIP MARKETING- The
process of creating, maintaining and SUPPLIERS- may sell directly into the
enhancing strong, value-laden relationships market, for example selling spare parts, but
with customers and other stakeholders. largely they need to be kept aligned to your
strategy. In some markets suppliers also
supply your competitors. When supply is
6|Page

short, the supplier may hold a position of PE 4


power in the choice of who to serve.
ACQUATIC SPORTS
COMPLEMENTORS- those who sell non-
competing products and which generally AQUATIC SPORTS- refers to water-
help your sales. For example in a rock related sports like boat racing, water skiing,
musical instrument market, drum and guitar swimming, etc.
manufacturers are complementary to one LIST OF WATER SPORTS
another.
 Recreational Diving
COMPETITORS-are those who have Cave Diving
products and services similar to you and Deep Diving
where customers who are buying something Free- Diving
will compare your offerings and prices Ice Diving
directly, weighing one up against the other.
Spearfishing
SUBSTITUTORS- are like competitors but  Underwater Sports
their products are not the same. The classic Aquathlon (underwater wrestling)
substitution is replacing butter with Underwater Hockey
margarine (a battle that is still raging). Other Underwater Photography
substitutions are more evolutionary, for …………………………………………………
example where typewriters were substituted
by word processors. SWIMMING STROKES

REGULATORS- Regulation may be driven WHAT ARE THE SWIMMINGS


by collaboration between competitors. STROKES?
Regulations may also be created by
independent organizations or even Breaststroke, backstroke, butterfly
governments, whose agendas may not align and crawl (freestyle) are the most
with company profit motives. popular swim strokes.
The Breaststroke and Butterfly are
INFLUENCERS-groups and organizations more difficult to learn than the
who have no direct control but who will backstroke and crawl.
seek to promote their own agendas by
influencing players within the marketplace,  Butterfly is a swimming stroke swum
including regulators and retailers. These on the chest, with both arms moving
often have an ethical basis, for example symmetrically, accompanied by the
ecological or animal rights activists. butterfly kick.
 Backstroke (Back Crawl) uses
alternating and opposite arm
movements. As one arm pulls through
the water from an overhead position to
the hip, the other arm recovers above the
water from the hip to the overhead
position and vice versa.
7|Page

 Crawl (Freestyle) a swimming stroke; INQUIRIES, INVESTIGATION AND


arms are moved alternately overhead IMMERSION
accompanied by a flutter kick
(RETRIEVED FROM THE
INTERNET) CHAPTER 1: THE PROBLEM AND ITS
WHAT EQUIPMENT DO I NEED FOR BACKGROUND
SWIMMING? 1. Introduction
 Swimsuit 2. Background of the Study
3. Statement of the Problem
 Goggles
4. Significance of the Study
 Bathing cap
5. Scope and Delimitation
 Kickboards
6. Definition of Terms
 Pull buoy
 Fins 1. Introduction- Discusses four (4)
 Hand paddles relevant ideas
 Water dumbbells  Topic/Subject Matter: define and
 Noodle elaborate using methods of
 Aqua jogger paragraph development
 Importance of the Topic: cite the
WHAT ARE THE BENEFITS OF role that the topic plays in your life
SWIMMING? and the benefits you derive from it.
 Reasons for Choosing the Topic:
 Builds cardio respiratory fitness
emphasized what motivated you to
 Builds muscle mass
choose the topic.
 It's a break from the summer heat
 Purpose of the Study: discusses the
 It's a family affair objective of the study.
 Burns calories 2. Background of the Study: Describe as
clearly as possible the problem intended
to be addressed and refer to the relevant
literature in the field. It is an overview
of factors which have led to the
problem, compromise the problem and
historical significance relative to the
problem.
3. Statement of the Problem - There
should be a general statement of the
whole problem followed by the specific
questions or sub problems into which
the general problem is broken up.
4. Significance of the Study -The
rationale, timeliness and/or relevance of
the study. The rationale, timeliness and
relevance of the study to existing
8|Page

conditions must be explained or Before you begin to search for articles or books,
discussed. decide beforehand what areas you are going to
 Possible solution to existing research. Make sure that you only get articles
problems or improvement to and books in those areas, even if you come
unsatisfactory conditions. across fascinating books in other areas.
 Who are to be benefited and how
STEP TWO: SEARCH FOR THE
they are going to be benefited. It
LITERATURE OR STUDIES:
must be shown who are the
individuals, groups or communities Conduct a comprehensive bibliographic search
who may be placed in a more of books and articles or previous studies in your
advantageous position on account of area. Read the abstracts online and download
the study. and/or print those articles that pertain to your
area of research. Find books/studies in the
 To the school administrators, library that are relevant and check them out. Set
 To the teachers, a specific time frame for how long you will
 To the students, search. It should not take more than two or three
 To the future teachers, dedicated sessions.
 To the future researchers,
STEP THREE: FIND RELEVANT
5. Scope and Delimitation – should
EXCERPTS IN YOUR BOOKS, ARTICLES
include the following.
AND STUDIES:
 Brief statement of the general purposes
of the study. Skim the contents of each book, article and
 The subject matter and topics studied studies and look specifically for these five
and discussed. things:
 The locale of the study, where the data
were gathered or the entity to which the 1. Claims, conclusions, and findings about the
data belong. constructs you are investigating
 The population or university from which
the respondents were selected. This 2. Definitions of terms
must be large enough to make 3. Calls for follow-up studies relevant to your
generalizations significant. project
 The period of the study. This is the time,
either month or years, during which the 4. Gaps you notice in the literature.
data where gathered.
6. Definition of Terms- only terms, words 5. Disagreement about the constructs you are
or phrases which have special or unique investigating
meanings in the study are defined.
Operational and Conceptual used.
STEP FIVE: CREATE YOUR
CHAPTER 2: REVIEW OF RELATED CONCEPTUAL SCHEMA:
LITERATURE AND STUDIES
Type, in large font, the name of each of your
STEP ONE: DECIDE ON YOUR AREAS OF coded themes. Print this out, and cut the titles
RESEARCH: into individual slips of paper. Take the slips of
9|Page

paper to a table or large workspace and figure  Research Instruments- Research


out the best way to organize them. Are there instruments are questionnaires, tests,
ideas that go together or that are in dialogue interviews, observations, etc.
with each other? Are there ideas that contradict  Data Gathering Procedure- Identify
each other? Move around the slips of paper until your sources of data. If a questionnaire
you come up with a way of organizing the codes will be used, explain what kind and how
that makes sense. Write the conceptual schema it will be constructed if it is original,
down before you forget or someone cleans up how it is pre-tested, distribution,
your slips of paper. retrieval, collation, etc. Thus, your
procedures may include: Construction of
STEP SIX: BEGIN TO WRIT YOUR the questionnaire, Validation,
LITERATUR REVIEW Distribution, Retrieval, Collation,
Presentation of Data and Interpretation
CHAPTER 3: METHODOLOGY AND
of Data.
DATA GATHERING PROCEDURE
 Statistical Treatment of Data (for
This chapter presents the discussion on the quantitative research only)- Specify
research methodology of the study, the subjects, the statistical treatment/s you will use
sampling technique, research instruments, for interpreting your data and why they
procedure of data gathering that will be used for are necessary. Also, include the scale or
accurate data analysis and interpretation. verbal interpretation for the statistical
processing of your data; mention the
 Research Methodology- This section name of the office or agency, or the
specifies what method of research will person taking charge of it.
be used –descriptive, correlation,
experimental, or documentary analysis. CHAPTER 4: PRESENTATION.
 Subjects/ Respondents of the Study- ANALYSIS AND
Subjects are persons investigated in the INTERPRETATION OF DATA
study. When learning abilities of pre-
school pupils are being assessed in the
study, the pre-school pupils are the Normally, it features the following contents in
subjects. The pupils’ teachers and chronological order:
mothers who will be interviewed and
1. Statistical Tables and Graphs
asked to fill out a questionnaire are the
2. Textual Presentation
respondents of the study. Respondents,
3. Inferences or Interpretation
therefore, are providers of information
 Presentation of Data- presentation is a
needed in the study, elicited orally or in
way of arranging data into logical,
writing. It is important to state your
chronological, and significant categories
number of subjects or respondents and
and classifications
who they are.
 Sampling Technique- Explain what There are three ways of presenting data: textual.
sampling technique will be used – Tabular, and graphical
random, purposive, stratified, etc.—why
you used it, and what procedure will be A. Tabular Presentation Tables-organize
followed to carry out the technique. and compress data into standardized
10 | P a g e

forms. They facilitate the study and data in a very attractive, appealing,
interpretation. Most researchers use effective and convincing way.
tables in their textual presentation of  The common types of graphs used
data. in research are bar graph, line
 This is because (1) researchers need graph, circle graph, pictogram
to give little explanation only since and map graph. You should only
data in tables are arranged and choose the graphs which represents
grouped systematically; (2) readers best your data to avoid redundancy
can comprehend and interpret  Bar Graphs
information easily because they can  Line Graph
see relationships of data at once and  Circle Pie Chart
(3) tables can present ideas that are  Pictogram
understood even without reading the  Map Graph or Cartogram
textual presentation C. Textual Presentation of Data-
 .Constructing a Table Tables Presenting the data textually involves
includes a title, a number, heading, a using statements with number to
body and if necessary, notes. describe a given data. It aims to
 Title - The title should identify the highlight some important data and
table briefly. It need not give supplement the tabular or graphical
background information or describe presentation.
the results. The modern way of  Interpretation or inference follows
writing titles omits the words the textual presentation of each table
Frequency and Percentage in the research.
Distribution of / Distribution of /  1. Condition. This refers to the
According to. findings discovered in the research
 Table title must be written two  2. Possible Cause of the
spaces below the table number. Condition. This refers to the reason
Table title, which is normally for the existence of the condition
written in inverted pyramid discovered.
format, has content (principal)  3. Possible effect of the Condition.
words in upper case initials and  4. The Measures to Remedy the
non-content words (articles, Unsatisfactory Condition or to
coordinate conjunctions, strengthen the favorable one.
prepositions and infinitive to) in  5. Comparison of findings with
lowercase letters except those with those of previous studies.
more than 5 letters. One should
PRESENTATION, ANALYSIS AND
single-space captions with two or
INTERPRETATION OF DATA
more lines.
B. Graphical Presentation of Data – a This chapter includes the presentation, analysis,
graph is a chart representing the and interpretation of data that have been
quantitative variations of a variable gathered from the questionnaires distributed to
itself or in comparison with those of the respondents. This chapter also contains the
another variable. Graphing presents presentation of data in tabular form along with
variations, changes and relationships of their corresponding interpretations.
11 | P a g e

EMPOWERMENT TECHNOLOGY TYPES OF SPYWARE

SPYWARE -is a term given to a category of 1. Adware- is a common type of spyware


software which aims to STEAL personal or mainly used by advertisers. This
organizational information information is used to direct marketing
pop-ups and spam email.
October 1195- word “Spyware” was used for 2. Keyboard Logger- This program is
the first time publicly. designed to steal personal information
by logging the actual keystrokes you
Spybot – Search & Destroy (S&D) is a
types on your computer.
spyware and adware removal computer program
3. Modem Hijacker- it’ll ties into your
compatible with Microsoft Windows, which has
phone line to make unauthorized calls
free and paid versions. Dating back to the first
and access member websites through
Adwares in 2000,  Spybot scans the computer
your online connection.
hard disk and/or RAM for malicious software
4. Browser Hijacker – affects your
WHAT DOES SYPWARE DO? Internet access by resetting your
homepage and bookmarks.
1. Infiltrate –via malicious website or file 5. Commercial Spyware- also refers as
attachment. spy apps. -Not all spyware is
2. Monitor and capture data –via unauthorized. In some cases, companies
keystrokes, screen captures. that provide free software and social
3. Send Stolen Data –to the spyware networking platforms require you to
author, to be used directly or to sold to agree to monitor with spyware in order
other parties. to access their systems.
CONFIDENTIAL INFORMATION
THAT SPYWARE STEALS PROBLEMS CAUSED BY SPYWARE
 Login Credentials –passwords and 1. DATA THEFT AND INDETITY
usernames FRAUD
 Account PINs 2. COMPUTER DAMAGES
 Credit card numbers 3. DISRUPTIONS TO YOUR
 Monitored keyboard strokes BROWSING EXPERIENCE
 Tracked browsing habits
 Harvested email addresses HOW TO PROTECT YOURSELF FROM
SPYWARE
HOW SPYWARE INFECTS YOUR
DEVICES 1. Be cautious about consenting to Cookies.
With GDPR-compliance taking over the web,
1. Accepting a prompt or pop-up nearly every website asks for your permission to
without reading it first. create cookies. Only accept cookies from trusted
2. Downloading a software from an sites, and only if you truly desire the custom
unreliable source experience being offered.
3. Opening email attachments from
unknown senders.
12 | P a g e

2. Install an anti-tracking browser extension. texts to their targets. You’ll be safer by


Tools now exist that disconnect you from the avoiding any links and manually
constant online tracking that occurs nowadays. entering URLs into the address bar —
Even reputable tracking may be unwanted, so after you’ve verified them to be safe
these tools help you and your data remain HOW TO PROTECT YOUR
private across the web. COMPUTER FROM SPYWARE
1. Enable or download a pop-up
3. Keep all software updated with the latest blocker.
security. Malware can get installed onto your 2. Limit runnable applications to a pre-
system through operating systems and app approved allow list.
vulnerabilities. Updates commonly include 3. Avoid e-mail links and attachments
security patches to fix these natural weaknesses, when possible
so always update as soon as possible.

4. Remember that “free” software always has a


cost. Sometimes, free may mean a limited trial, COMPUTER WORMS
but it can also mean the creator is profiting from
your data. Always read the terms of use for the
software license, and only agree if you MALWARE- is malicious software that enables
understand and accept. unauthorized access to networks for purposes of
theft, sabotage, or espionage.
HOW TO PROTECT YOUR PHONE
FROM SPYWARE Malware is usually introduced into a network
through phishing, malicious attachments, or
1. Stay away from unofficial app malicious downloads, but it may gain access
stores. Third-party app stores carry through social engineering or flash drives as
many malicious spyware apps. Avoid well
downloading from these stores to lower
your risk of infection A computer worm is a piece of software that
2. Only download trusted apps from copies itself from one computer to another.
official app publishers. Some spyware Unlike a virus, it is a standalone program that
masks itself as companion services to doesn’t require a host. It usually doesn’t target
other popular apps like Facebook and files on an individual computer. Instead, it takes
Gmail. Always read the publisher's on entire networks in an attempt to create large
name and verify if they are official or a botnets. A computer worm is a malicious piece
third-party. of software that replicates itself from one
3. Be reserved about giving computer to another with the goal of overtaking
permissions to apps. Some apps have the entire network of computers. Most worms
no clear need for camera and are designed to infiltrate systems by exploiting
microphone access, or your location their security failures, while very few also try to
data. Decide whether your apps need change the system settings. Even if they don’t,
these permissions to give you an ideal they are still very dangerous as they take up a lot
user experience of bandwidth and other valuable resources
4. Do not follow links in text
messages. A popular bait method for
mobile attackers is to include links in
13 | P a g e

4. File-Sharing Worms- File-sharing and


peer-to-peer file transfers are still
TYPES OF COMPUTER WORMS used by millions of people around the
world. Doing so, they are unknowingly
1. Internet Worms -Computer worms also
exposing their computers to the threat of
target popular websites with insufficient
file-sharing worms. Like email and
security. When they manage to infect
instant messaging worms, these
the site, internet worms can replicate
programs are disguised as media files
themselves onto any computer being
with dual extensions. When the victim
used to access the website in question.
opens the downloaded file to view it or
From there, internet worms are
listen to it, they will download the worm
distributed to other connected
to their computer. Even if it seems that
computers through the internet and
users have downloaded an actual
local area network connections.
playable media file, an executable
2. Email Worms -Email worms are most
malicious file could be hidden in the
often distributed via compromised
folder and discreetly installed when the
email attachments. They usually have
media file is first opened.
double extensions. (For example,
5. IRC Worms- Internet Relay Chat
.mp4.exe or .avi.exe) so that the
(IRC) is a messaging app that is
recipient would think that they are
mostly out dated nowadays but was
media files and not malicious computer
all the rage at the turn of the century.
programs. When the victims click on the
Same as with today’s instant messaging
attachment, copies of the same infected
platforms, computer worms were
file will automatically be sent to
distributed via messages containing
addresses from their contacts list.
links and attachments. The latter was
3. Instant Messaging Worms- Instant
less effective due to an extra layer of
messaging worms are exactly the
protection that prompted users to accept
same as email worms, the only
incoming files before any transfer could
difference being their method of
take place.
distribution. Once again, they are
masked as attachments or clickable links
to websites. They are often accompanied EXAMPLES OF A COMPUTER WORM
by short messages like “LOL” or “You
have to see this!” When the user clicks  The Morris Worm - was launched in
on the link or the attachment – be it in 1988 by Robert Morris, an American
Messenger, Skype, or any other popular student who wanted to discover how
messaging app – the exact same big the internet really was. To do this,
message will then be sent to their he launched a few dozen lines of code,
contacts. Unless the worm has replicated but he didn’t know that the code was
itself onto their computer, users can riddled with bugs that would cause a
solve this problem by changing their variety of problems on affected hosts.
password  The Storm Worm- is an email worm
launched in 2007. Victims would
receive emails with a fake news report
about an unprecedented storm wave that
14 | P a g e

had already killed hundreds of people • =Emails sent to contacts without the
across Europe. More than 1.2 billion of user's knowledge
these emails were sent over the course
of ten years in order to create a botnet • =Missing or changed files
that would target popular websites.
• =Firewall warnings
 SQL Slammer- Was unique in that it
didn’t utilize any of the traditional • =Unusual behaviour of the web browser
distribution methods. Instead, it
generated a number of random IP • =Strange and unintended desktop files
addresses and sent itself out to them and icons appear
in hopes that they weren’t protected
HOW CAN I REMOVE A COMPUTER
by antivirus software. Soon after it hit
WORM?
in 2003, the result was more than 75,000
infected computers unknowingly 1. First of all, high-quality anti-virus
involved in DDoS attacks on several software should be installed. When
major websites. choosing software, reputable
manufacturers should be used, as
THE PRIMARY DIFFERENCE BETWEEN
malware often comes with fake antivirus
A VIRUS AND A WORM is that viruses must
programs.
be triggered by the activation of their host;
2. Disable System Restore to prevent
whereas worms are stand-alone malicious
Windows from creating backups that are
programs that can self-replicate and propagate
infected with the computer worm.
independently as soon as they have breached the
3. Carry out a full scan of the system with
system.
the antivirus program.
HOW DO YOU RECOGNIZE A 4. If computer worms are found, the
COMPUTER WORMDS? software usually offers to remove them.
5. If the anti-virus program does not
Users should be familiar with the signs of a automatically remove the worm, it is
computer worm so that they can quickly identify important to note the name of the worm.
an infestation and remove the computer 6. If this is the case, a suitable tool for
worm. Here are the most typical symptoms of a removing the worm in question should
computer worm: be downloaded and executed using a
search engine. The antivirus software
• =Unusual computer behaviour
should also be deactivated. If it is run
(messages, sounds, pictures)
while the worm is being removed, it
• =Programs that open and run could conflict with the removal methods
automatically and cause a system failure.
7. After the worm has been removed, the
• =Slow computing performance anti-virus program should be switched
on again. The same goes for system
• =System freezes and crashes recovery,
• =Operating system errors and system
error messages
15 | P a g e

HOW CAN YOU PROTECT YOURSELF SCAREWARE -Scareware is a malware tactic


FROM A COMPUTER WORM? that manipulates users into believing they need
to download or buy malicious, sometimes
1. Safe Behavior -Attachments and links useless, software.
should only be opened if they come
from a trustworthy source known to the - Most often initiated using a pop-up a scareware
user. E-mails from unknown senders uses social engineering to take advantage of a
should not be opened user’s fear, coaxing them into installing fake
2. Regular Updates -Operating systems anti-virus software.
and software should be kept up to date
with regular updates. The - Scareware goals can vary from selling useless,
manufacturer’s updates often contain fake tools to the installation of damaging
security patches that protect computers malware that exposes sensitive data.
from new worms and fix errors. This is SOCIAL ENGINEERING- is the
important because a computer worm psychological manipulation of people into
will benefit from the vulnerabilities. performing actions or divulging confidential
3. Antivirus Software -Antivirus software information. This differs from social engineering
is the first preventive measure to avoid within the social sciences, which does not
computer worms. It scans every file on concern the divulging of confidential
the computer and helps prevent information.
damage. Antivirus programs that are
able to scan downloads and already TYPES OF SOCIAL ENGINEERING
contain tools to remove worms are ATTACKS
particularly effective.
4. Firewall- security tool that is used to 1. Phishing - most common type of social
monitor incoming and outgoing network engineering attack. The attacker recreates the
traffic based on security rules. The main website or support portal of a renowned
purpose is to create a barrier between company and sends the link to targets via emails
internal and external network in order to or social media platforms.
protect against cyber-attacks.
2. Spear Phishing- can be assumed as a subset of
5. Protect your email inbox- Computer
Phishing. Although a similar attack, it requires
worms often attack computers via
an extra effort from the side of the attackers.
email. For example, they can get onto
the computer via a phishing 3.Vishing-Imposters or social engineers can be
email. Heretofore you can already anywhere on the internet. But many prefer the
protect before the malware au f the old fashioned way; they use the phone.
computer. This works for companies, for
example, with Spam and Malware 4. Pretexting-Pretexting is another example of
Protection or Advanced Threat social engineering you might’ve come across.
Protection from Hornet security. It’s based on a scripted scenario presented in
front of the targets, used to extract PII or some
other information.
16 | P a g e

5. Baiting. A digital variant of this technique is online. Scareware only works when you react
known as Baiting and it is one of the social with your emotions at the forefront. Legitimate
engineering techniques used by people. error messages can be verified online. Moreover,
it is rare for security suites to employ intrusive
6. Tailgating- a person takes help of an pop-ups to show detected issues.
authorized person to get access to restricted
areas where RFID authentication or some other HOW TO IDENTIFY SCAREWARE?
electronic barrier is present.
Scareware aims to frighten you into taking
7. Quid pro quo- Another social engineering immediate action, so typically you’ll see a pop-
method Quid pro quo involves people posing as up message along the lines of ‘Warning!
technical support. Spyware found!’ or ‘Warning! Your computer is
infected!
SCAREWARE EXAMPLES
HOW DOES IT GET IN?
In early 2010, website visitors for the
Minneapolis Star Tribune began seeing Best Scareware can present itself as a message or an
Western ads that were actually part of a advert in a pop-up window, an email, message
malvertising campaign sending users to or text attachment, or a link on a legitimate web
fraudulent sites and infecting them with page. Unfortunately, you can also pick up
malware. ‘drive-by’ scareware simply by visiting a
compromised legitimate website
In March 2019, Office Depot and it’s tech
support vendor, Support.com, agreed to pay the HOW TO PROTECT AGAINST IT?
FTC a $35 million settlement after allegedly
deceiving customers into downloading a free Make sure you have up-to-date, legitimate
“PC Health Check Program. comprehensive Internet security software
installed on your device. Obtain it from a
HOW TO PREVENT SCAREWARE reliable and trustworthy company, via the
official website or a well-known retailer
1. Use an Updated Browser Ensure that you
are using an updated browser. Developers are Final Thoughts-Scareware is often harmless
often aware of these threats and will include when you know how to detect them. You
mitigating measures to block such pop-ups. security suites and anti-malware applications
can filter them out even before they get to you.
2. Only Consider Trusted Sources Trusted Also, properly set-up real-time security will
sources apply to downloaded files and ensure overall protection from any threats.
security solutions. Typically, infections can
only infiltrate your system when you willingly
allow it. Whenever you need to download files,
especially software, ensure that you are
downloading it from a known and trusted
source.

3. Employ Common Sense Common sense is


the most powerful first-line of defense anyone
can have especially when dealing with threats
17 | P a g e

PHYISCAL SCIENCE supported by so much evidence that it is


accepted “without a reasonable doubt.”

SCIENTIFIC THEORY
Physical Science- the systematic study of the
inorganic world, as distinct from the study of the The term theory is used differently in science
organic world, which is the province of than it is used in everyday language. A scientific
biological science. Physical science is ordinarily theory is a broad explanation that is widely
thought of as consisting of four broad areas: accepted because it is supported by a great deal
astronomy, physics, chemistry, and the Earth of evidence. Because it is so well supported, a
sciences scientific theory has a very good chance of being
a correct explanation for events in nature.
Principles of Physical Science Because it is a broad explanation, it can explain
many observations and pieces of evidence. In
The procedures and concepts employed by those
other words, it can help connect and make sense
who study the inorganic world.
of many phenomena in the natural world.
Is concerned with describing and relating to one
SCIENTIFIC LAW is a statement that
another those experiences of the surrounding
describes an observable occurrence in nature
world that are shared by different observers and
that appears to always be true.
whose description can be agreed upon. One of
its principal fields, physics, deals with the most LAWS IN SCIENCE
general properties of matter, such as the
behavior of bodies under the influence of forces, Newton’s first law of motion
and with the origins of those forces. In the
discussion of this question, the mass and shape Law of conservation of mass
of a body are the only properties Law of conservation of energy
Inductive Reasoning- is the process of drawing Law of conservation of momentum
general conclusions based on many clues, or
pieces of evidence. Many crimes are solved ATOMIC THEORY
using inductive reasoning. It is also the hallmark
of science and the basis of the scientific method. LIST OF ATOMIC THEORY

LIMITS OF INDUCTIVE REASONING  A theory of the structure of behavior of


atoms has taken more than two
Inductive reasoning can’t solve a crime or arrive millennia to evolve, from the abstract
at the correct scientific conclusion with 100 ideas of ancients Greeks philosophers to
percent certainty. It’s always possible that some the high-tech experiment of modern
piece of evidence remains to be found that scientists. From 16th century when atoms
would disprove the conclusion. That’s why were mainly speculative, until at the end
jurors in a trial are told to decide whether the of 19th century where technology
defendant is guilty “without a reasonable became advance to allow scientists a
doubt”—not without a shred of doubt. Similarly, glimpse atom’s parts: the
a scientific theory is never really proven proton, neutron, electron and nucleus.
conclusively to be true. However, it can be
18 | P a g e

Greek origins CLASSICAL ELEMENT

-Leucippus and Democritus were the first to  Ancient Greece of earth, water, air,
propose, in the fifth century B.C., that all matter fire, and aether.
is made of tiny units called atoms came from the  Ancient cultures in Egypt,
Greek word “atomos”, meaning indivisible. Babylonia, Japan, Tibet, and India
had similar lists, sometimes
Modern Development
referring in local languages to "air"
In 1808, English chemist John Dalton further as "wind" and the fifth element as
built on the Greek notion of atoms. He "void".
postulated that: matter is made of atoms, which  Wood ( mù), Fire ( huǒ), Earth ( tǔ),
are small indivisible particles. He also proposed Metal ( jīn), and Water ( shuǐ)
that while all atoms of one element are identical,
These different cultures and even individual
they are totally different from those that make
philosophers had widely varying explanations
up other elements, compounds is the
concerning their attributes and how they related
combination of two or more different atoms and
to observable phenomena as well as cosmology.
atoms rearrange during chemical reactions.
Sometimes these theories overlapped with
Subatomic Structure mythology and were personified in deities.
Some of these interpretations included atomism
-Dalton’s work was mainly about the chemistry (the idea of very small, indivisible portions of
of atoms, but English physicist Joseph J. matter) but other interpretations considered the
Thomson proposed the "plum pudding" theory elements to be divisible into infinitely small
of the divisible atom in 1904, after pieces without changing their nature.
discovering electrons in 1897
ANCIENT TIMES
- British physicist Ernest Rutherford proposed a
nuclear model of the atom, in which a nucleus In classical thought, the four elements earth,
exists, in 1911.  water, air, and fire as proposed by Empedocles
frequently occur; Aristotle added a fifth element,
 Electron-negative charged particle aether; it has been called akasha in India and
 Proton-positive charged particle quintessence in Europe
 Neutron-neutral charge particle
 Nucleus-small region consisting of EGYPT- A Greek text called the Kore Kosmou
 Protons and neutron; center of atom ("Virgin of the World") ascribed to Hermes
Trismegistus (associated with the Egyptian god
Bohr and Beyond Thoth), names the four elements fire, water, air,
and earth
-Danish physicist Niels Bohr proposed in 1913 a
planetary model, in which electrons revolve COSMIC ELEMENT IN BABYLONIAN- In
about the nucleus just as the planets orbit the Babylonian mythology, the cosmogony called
sun.  Enûma Eliš, a text written between the 18th and
16th centuries BC, involves four gods that we
might see as personified cosmic elements: sea,
earth, sky, wind.
19 | P a g e

INDIA- The system of five elements are found Overcoming


in Vedas, especially Ayurveda, the pancha
mahabhuta, or “five great elements”, of  Wood parts earth;
Hinduism are bhūmi (earth), ap or jala (water),  Earth absorbs water;
tejas or agni (fire), marut, vayu or pavan (air or  Water quenches fire;
wind) and vyom or shunya (space or zero) or  Fire melts metal;
akash (aether or void).  Metal chops wood.

HINDUISM- The basest element, earth, created There are also two cycles of imbalance, an
using all the other elements, can be perceived by overacting cycle (cheng) and an insulting cycle
all five senses – (i) hearing, (ii) touch, (iii) sight, (wu).
(iv) taste, and (v) smell. GREECE- The ancient Greek belief in five
The higher element, water, has no odor but can basic elements, these being earth (γῆ ge), water
be heard, felt, seen and tasted. Next comes fire, (ὕδωρ hudor), air (ἀήρ aer), fire (πῦρ pur) and
which can be heard, felt and seen. Air can be aether (αἰθήρ aither), dates from pre-Socratic
heard and felt. "Akasha" (aether) is beyond the times and persisted throughout the Middle Ages
senses of smell, taste, sight, and touch. and into the Renaissance.

BUDDHISM- In the Pali literature, the In his On Generation and Corruption, Aristotle
mahabhuta ("great elements") or catudhatu related each of the four elements to two of the
("four elements") are earth, water, fire and air. four sensible qualities:
The earliest Buddhist texts explain that the four
 Fire is both hot and dry.
primary material elements are the sensory
 Air is both hot and wet (for air is like
qualities solidity, fluidity, temperature, and
vapor, ἀτμὶς).
mobility.
 Water is both cold and wet.
The four properties are cohesion (water),  Earth is both cold and dry
solidity or inertia (earth), expansion or vibration
(air) and heat or energy content (fire) EMPEDOCLEAN ELEMENT

CHINA- the Chinese had a somewhat different


series of elements, namely Fire, Earth, Metal
Fire
(literally gold), Water and Wood.

The doctrine of five phases describes two cycles


of balance, a generating or creation ( 生 , shēng)
cycle and an overcoming or destruction (克/剋, Earth
kè) cycle of interactions between the phases.

Generating

 Wood feeds fire;


 Fire creates earth (ash); Water
 Earth bears metal;
 Metal collects water;
 Water nourishes wood.
20 | P a g e

WESTERNASTROLOGY- Western astrology


uses the four classical elements in connection
with astrological charts and horoscopes. The
twelve signs of the zodiac are divided into the
Air four elements:

TIBET-In Bön or ancient Tibetan philosophy,  Fire signs are Aries, Leo and
the five elemental processes of earth, water, fire, Sagittarius
air and space are the essential materials of all  Earth signs are Taurus, Virgo and
existent phenomena or aggregates. Capricorn
 Air signs are Gemini, Libra and
The names of the elements are analogous to
Aquarius
categorised experiential sensations of the natural
 Water signs are Cancer, Scorpio, and
world. The names are symbolic and key to their
Pisces
inherent qualities and/or modes of action by
analogy. MODERN -The Aristotelian tradition and
medieval Alchemy eventually gave rise to
MEDIEVAL
modern scientific theories and new taxonomies.
ALCHEMY- The elemental system used in Some modern scientists see a parallel between
Medieval alchemy was developed primarily by the classical elements and the four states of
the Persian alchemist Jābir ibn Hayyān (Geber). matter:

The three metallic principles—sulphur to  Solid


flammability or combustion, mercury to
volatility and stability, and salt to solidity.  Liquid

ISLAMIC- The Islamic philosophers al-Kindi,  Gas


Avicenna and Fakhr al-Din al-Razi connected
 Weakly ionized plasma
the four elements with the four natures heat and
cold (the active force) dryness and moisture John Dalton – (6 September 1766- 27 July
(the recipients) 1844) was an English Chemist, Physicist and
JAPAN- Japanese traditions use a set of meteorologist. He is best known for proposing
elements called the 五 大 (godai, literally "five the modern atomic theory and for his research
great"). These five are earth, water, fire, into color blindness, sometimes referred to as
wind/air, and void. Daltonism in his honor. He was born into a
Quaker Family in Eaglesfield, near
 Earth represented things that were solid. Cockernouth, in Cumberland England.
 Water represented things that were
SCIENTIFIC CONTRIBUTIONS:
liquid.
 Fire represented things that destroy. Meteorology- Dalton’s early life was influenced
 Air represented things that moved. by a prominent Eaglesfield Quaker, Elihu
 Void or Sky/Heaven represented things Robinson, a competent meteorologist and
not of our everyday life. instrument maker, who interested hum in
problems of mathematics and meteorology.
21 | P a g e

During his years in Kendal, Dalton contributed views resting on the authority of Thomas
solutions to problems and answered questions on Thomson.
various subjects in The Ladies’ Diary and the
Gentleman’s Diary. Atomic Weights- Dalton published his table of
relative atomic weights containing six elements,
Measuring Mountains- after leaving the Lake hydrogen, oxygen, nitrogen, carbon, sulfur, and
District, Dalton returned annually to spend his phosphorus, with the atom of hydrogen
holidays studying meteorology, something conventionally assumed to weigh 1. Dalton
which involved a lot of hill-walking. Until the provided no indication in this paper how he had
advent of aero planes and weather balloons, the arrived at these numbers but in his laboratory
only way to make measurements of temperature notebook, dated September 6 1803, is a list in
and humidity at altitude was to climb a which he set out the relative weights of the
mountain. Dalton estimated the height using a atoms of a number of elements, derived from
barometer. analysis of water, ammonia, carbon dioxide, etc.
by chemists of the time.
Color Blindness- In 1794, shortly after his
arrival in Manchester, Dalton was elected a THE MAIN POINTS OF DALTON’S
member of the Manchester Literary and ATOMIC THEORY ARE:
Philosophical Society, the “Lit & Phil”, and a
few weeks later he communicated his first paper 1. Elements are made extremely small
on “Extraordinary facts relating to the vision of particles called atoms.
colors”, in which he postulated that shortage in 2. Atoms of a given element are identical
color perception was caused by discoloration of in size, mass and other properties;
the liquid medium of the eyeball. As both he and atoms of different elements differ in
his brother were color blind, he recognized that size, matter and other properties.
the condition must be hereditary. 3. Atoms cannot be subdivided, created
or destroyed.
Gas Laws- In 1800, Dalton became secretary of 4. Atoms of different elements combine
the Manchester Literary and Philosophical in simple whole-number ratios to
Society, and in the following year he presented form chemical compounds.
an important series of lectures, entitled 5. In chemical reactions, atoms are
“Experimental Essays” on the constitution of combined, separated or rearranged
mixed gases; the pressure of steam and other
vapours at different temperatures in a vacuum Dalton proposed an additional controversial
and in air; on evaporation; and on the thermal “rule of greatest simplicity” that could not
expansion of gases. The four essays, presented be independently confirmed.
between 2 and 30 October 1801, were
published in the Memoirs of the Literary and
Philosophical Society of Manchester in 1802.

Atomic Theory- may have been suggested to


him either by researches on ethylene (olefiant
gas) and methane (carbureted hydrogen) or by
analysis of nitrous oxide (protoxide of azote)
and nitrogen dioxide (deutoxide of azote), both
22 | P a g e

ATOMIC THEORY Dalton's theory of atomsrested on four basic idea


s: chemical elements were composed of atoms; 
A theory of the structure and behavior of atoms  The atoms of an element were identical
has taken more than two millenia to evolve, fro inweight; The atoms of different elements had di
m the abstract musings of ancient Greek philoso fferent weights; And 
phers to the high-tech experiments of atoms combined only in small wholenumber rati
modern scientists. os, such as 1:1, 1:2, 2:1, and
2:3, to form compounds.
However, prior to the scientific revolution and th
e development of the SUBATOMIC STRUCTURE
scientific method starting in the 16th century, id
eas about the atom were mainly speculative Dalton's work was mainly about the chemistry
Itwasn't until the very end of the 19th century of atoms—
that technology became how they combined to form new compounds—
advanced enough to allow scientists a glimpse rather than the physical, internal structure of ato
of the atom's constituent parts: the electron, ms, although he never denied.The possibility of 
nucleus, proton, and neutron. atoms' having a substructure. Modern theories a
boutthe physical structure of atoms did not begin 
GREEK ORIGINS until 1897, with J. J. Thomson's discovery of the
electron.
The idea that all matter is made up of tiny, indivi
sible particlesor atomsis believed to have origina Bohr and Beyond
ted with the Greek philosopher Leucippus
of Miletus and his student Democritus of Abdera  In 1913, Danish physicist Niels Bohr who had st
in the 5th century B.C. udied under both Thomson and
Rutherford, further refined the nuclear model by 
The word atom comes from the Greek word proposing 
atomos, which means “indivisible”. These that electrons moved only in restricted, successi
thinkers held that, in addition to being to small ve orbital shells and that the outer, higherenergy 
to be seen, unchangeable, and indestructible, orbits determined the
atoms were also completely solid, with no chemical properties of the different elements. Fu
internal structure, and came in an infinite variety rthermore, Bohr was able to explain the spectral 
of shapes and sizes, which accounted for the lines of the different elements by suggesting that 
different kinds of matter. Color, taste and other as electrons jumped from higher tolower orbits, t
intangible qualities were also thought to be hey emitted energy in the form of light. Inthe 19
composed of atoms. 20s, Bohr's theory became the basis for quantum 
mechanics which explained in greater detail the 
MODERN DEVELOPMENT
complex structure and behavior of atoms.
Modern atomic theory is generally said to begin 
Protons and Neutrons
with John Dalton, an English chemist and
meteorologist who in 1808 published a book on t Since Thomson's discovery of the electron in 18
he atmosphere and  97, scientists hadrealized that an atom must cont
the behavior of gases that was entitled A New S ain a positive charge to counterbalance the electr
ystem of Chemical  Philosophy.  ons' negative charge. In 1919, as abyproduct of h
is experiments on the splitting of atomic nuclei, 
23 | P a g e

Rutherford discovered the proton which constitu  Atoms cannot be subdivided, created, or


tes thenucleus of a hydrogen atom. A proton carr destroyed.
ies a single positive electrical charge, and every 
atomic nucleus contains one or more protons. Al  Atoms of different combine in simple
though Rutherford proposed the existenceof a ne whole-number ratios to form chemical
utral subatomic particle, the neutron in 1920, the  compounds.
actual discovery was made by English physicist 
 In chemical reactions, atoms are
James Chadwick,
combined, separated, or rearranged.
a former student of Rutherford, in 1932.
 Dalton proposed an additional
JOHN DALTON
controversial “rule of greatest
 was born in September 06, 1766 and simplicity” that could not be
died in July 27, 1844 at age 77 independently confirmed

 John Dalton was an English chemist, “When atoms combine in only one ratio,
physicist, and meteorologist. He is best “it must be presumed to be a binary one,
known for proposing the modern atomic unless some cause appear to the contrary”
theory and for his research into colour
 Atomic Weights (Mass)- is defined as
blindness, sometimes referred to as
a weighted average over all naturally
Daltonism in his honour.
occurring isotopes of the element.
 He known for atomic theory, Law of
- Dalton published his table of relative
Multiple propotions, Dalton’s Law of
atomic weights containing six elements,
partial pressures, Daltonism
Hydrogen, oxygen, nitrogen, carbon
ATOMIC THEORY -- traces its origins to sulfur, and phosphorus, with the atom of
an ancient philosophical tradition known as hydrogen conventionally assumed to
atomism. weight.

Atomic theory is the scientific theory that - Gas Laws- In 1800 Dalton presented an


matter is composed of particles important series of lectures, Entitled
called atoms. “Experimental Essays” on the
constitution of mixed gases;
The origin of Dalton’s atomic theory is not
fully understood. - The pressure of steam and other
vapours at different temperatures in a
 Main points of Dalton’s Atomic theory vacuum and in air; on evaporation and
are: on the thermal expansion of gases.

 Elements are made of extremely small


particles called atoms.

 Atoms of a given elements are identical


in size, mass, and other properties;
atoms of different elements differ in
size, mass and other properties.

You might also like