Annotated diagram of a virus

Moronavirus

2020.03.04 13:11 thirumali Moronavirus

Its a virus. All sorts of idiocy related to Coronavirus.
[link]


2020.03.01 23:51 DJ_Hamster Corona Virus Texas

The purpose of this subreddit is to track the progression of Corona Virus, or COVID-19, specifically in Texas.
[link]


2009.06.06 19:06 apozo ape

A subreddit for discussion and pictures of primates. NO HUMANS!!!
[link]


2024.06.01 06:20 sshiypill Step 2 notes — anyone used notability ? If so how ?

Was anyone able to develop an efficient way to organize their Step 2 notes? I’m finding that the information is a bit scattered and it’s hard to know what information we are help accountable for between different shelves because of the overlap.
Which resource tends to get it right based on shelf exam?
Should I just drag my existing Step 1 Notes over? I basically took all of First and broke it down by subtopic and made all of these diagrams found questions and annotated them! I did a lot, but now it seems like the information is so scattered
submitted by sshiypill to notabilityapp [link] [comments]


2024.05.30 00:01 Lazy-Citron-643 CompTIA Security+ test questions

Here are some sample test questions for the CompTIA Security+ exam:
If you are unable to pass your CompTIA Certification Exam, get paid help from Online Helpers at Hiraedu!
Contact Details for Hiraedu Helper:
WhatsApp: +1 (213) 594-5657
Call: +1 727 456 9641
Website: hiraedu. com
Email: info@hiraedu. com
Network Security
1: What type of network attack involves sending large amounts of traffic to a network in an attempt to overwhelm it?
A) Phishing B) Malware C) Denial of Service (DoS) D) Man-in-the-middle (MitM)
Answer: C) Denial of Service (DoS)
2: Which protocol is used to securely authenticate users to a network?
A) HTTP B) FTP C) SSH D) Kerberos
Answer: D) Kerberos
Compliance and Operational Security
1: What is the primary goal of the General Data Protection Regulation (GDPR)?
A) To protect personal data of European Union citizens
B) To regulate the use of artificial intelligence
C) To ensure the security of financial transactions
D) To promote the use of open-source software
Answer: A) To protect personal data of European Union citizens
2: Which of the following is an example of a security policy?
A) A firewall rule B) A password policy C) A network architecture diagram D) A incident response plan
Answer: B) A password policy
Threats and Vulnerabilities
1: What type of malware is designed to encrypt files and demand payment in exchange for the decryption key?
A) Ransomware B) Trojan C) Virus D) Worm
Answer: A) Ransomware
2: Which of the following is a type of vulnerability that occurs when a user is tricked into revealing sensitive information?
A) SQL injection B) Cross-site scripting (XSS) C) Social engineering D) Buffer overflow
Answer: C) Social engineering
Application, Data, and Host Security
1: What type of software is designed to detect and remove malware from a computer?
A) Antivirus software B) Firewall software C) Encryption software D) Backup software
Answer: A) Antivirus software
2: Which of the following is a type of encryption that uses a public and private key pair?
A) Symmetric encryption B) Asymmetric encryption C) Hashing D) Digital signature
Answer: B) Asymmetric encryption
Access Control and Identity Management
1: What type of access control model assigns access based on a user's role within an organization?
A) Mandatory Access Control (MAC) B) Discretionary Access Control (DAC) C) Role-Based Access Control (RBAC) D) Attribute-Based Access Control (ABAC)
Answer: C) Role-Based Access Control (RBAC)
2: Which of the following is a type of authentication factor that uses something a user knows?
A) Something you are B) Something you have C) Something you know D) Somewhere you are
Answer: C) Something you know
Note: These are just sample questions and are not actual questions from the CompTIA Security+ exam.
submitted by Lazy-Citron-643 to CompTIA_ [link] [comments]


2024.05.28 09:33 eefyjeff [Original Series Concept] Project Canaan

[Original Series Concept] Project Canaan
"Towards the last star; our exodus."
This idea popped when I was on a short holiday trip and after listening to Mili's "Grown-Up's Paradise" in the car for the twentieth time. To put it in a nutshell, it's the middle part of the Venn diagram between Blue Archive, Limbus Company, and Arknights.
SUMMARY On a distant Star, in a distant future, humanity had survived the end of the world that was prophesized by the religions of old. Having past the endpoint, the people of the Star kept on advancing with no God to guide them anymore. Technological advancements, rampant political conquests, and the total reshaping of civilizations; only pride and ego alone could motivate them as humanity sought for total control over the land, sky, and sea.
Yet in the midst of a world so keen on tearing itself apart, a singular choice could hold the key to free the people from this hell. With a promise of a new utopia, the turning point was set: “Canaan”. The question remains: will you be the one who will reshape the destiny of the forsaken people?
WORLD
· The Endpoint
In the last millennium, a cataclysmic chain of events unfolded, leading many to believe it was the true end of mankind. The world was engulfed in devastating calamities: natural disasters, famine, pestilence, unnatural biological deformities, endless war and conquest, and even cosmic calamity. For 70 years, humanity endured relentless suffering. Then, as if the Gods had finally given up, everything suddenly came to a halt. The world fell silent, and humanity remained.
· Hearth
The burning essence of all life. The Hearth is a specialized function integrated within the thalamus of all humans born after the Endpoint. Like the branches of a tree, it extends its function throughout the nervous system, encompassing the brain and the entire body. Although it lacks a tangible form, the Hearth operates as a newly developed neural mechanism, which grants post-Endpoint humans with enhanced physical and mental capacities, and in some cases, even supernatural abilities.
The most basic enhancement gained includes an increased resilience to otherwise fatal injuries, such as falling from great heights or sustaining damage from projectile weapons. Due to its intangible and deeply integrated nature, the removal of the Hearth without causing death is virtually impossible. To date, there has been no documented case of successful extraction… Except for one, of course.
· Leech
Creatures of the end times. Since the start of The Endpoint, anomalous organisms known as "Leeches." had been plaguing the planet. The first recorded sighting occurred during the initial year of calamity, marked by the appearance of three monstrous entities: "Behemoth," "Ziz," and "Leviathan." These primordial beings, born from scorn and impurity, heralded the arrival of the Leeches.
Leeches exhibit biological structures akin to viruses, with their vital components comprised of pure mineral elements and a mysterious, otherworldly substance known as "Terminal Cell AR.", a blot-like material that’s integral to their existence. Exceptionally hostile, the Leeches possess a form of near-immortality. When killed, their bodies disintegrate, releasing the Terminal Cell AR into the atmosphere. This substance then coagulates and disperses, allowing the Leeches to reconstruct themselves into new off-springs, perpetuating their relentless infestation.
· Reset Laboratory
A multilateral conglomerate dedicated to research and technological advancement. Established as early as the third year of The Endpoint, Reset's mission is to ensure humanity's well-being, survival, and future. Their contributions have been pivotal, making them one of the key pioneers in humanity's drastic reconstruction following The Endpoint.
Reset's achievements cannot be understated. Successful research into the inner workings of the Hearth, biological augmentations, creation of groundbreaking technologies, and development of effective methods to counteract the negative effects of Leech encounters; these are all to name a few of Reset's critical role for the new age of humanity.
· Yehoshua Incorporated
A private military company operating under the supervision of ‘Talitha’. Independent and autonomous, the company positions itself as the primary third-party mediator in international disputes, be it political or military. Naturally, Yehoshua Inc. possesses control over advanced technology and specialized military expertise to execute complex operations across the globe. Due to its lack of formal allegiance to any nation or political entity, Yehoshua Inc. benefits from a perception of neutrality, allowing it to operate without being held accountable for any violations committed by its clients. From this company’s executive decision, the Canaan Initiative is born, funded, and maintained.
· Canaan Initiative
A classified project initiated by Yehoshua Inc. that aims to reshape the world and stir the wheel into the ideal direction. Working alongside you will be the Prodigies, ten capable agents scouted by Yehoshua to aid in this endeavor. As the Mentor of the Prodigies and leader of this project, it is your responsibility to guide them properly and fulfill the various missions requested by the company. Missions carried out by Canaan includes studying the true nature of Hearth and Leeches, recovering undiscovered technologies, be in the frontlines of international conflicts, and etching your name in the heart of all nations. You may make enemies, and your life will always be at stake, but that is the cross you need to bear if you wish to free us from this hell. Godspeed, dear Mentor.
PREMISE This is still a rough draft, but we'll just have to go with it. You are a convict who's held captive by the government for a few decades. All files regarding your crimes, all memories you and others have about you have been erased, even your Hearth, something that's known to be intangible and irremovable, was taken from you. Even if you have forgotten everything, there's something that you won't let go: your hatred towards this world and your violent tendency. Which is why you are recruited by Yehoshua for their new project; promising to give you back your Hearth and reshape the world you despise so much. And thus, you take the role of "Mentor" for your ten "Prodigies".
TL;DR, it's basically Blue Archive, but sensei is a deranged and unstable psychopath.
I will work on this more once I'm no longer busy. For now, here's a concept for the Nameless Mentor and the "Shiroko" stand-in (Made with this picrew)
The Nameless Mentor, no introductions needed.
Kannari Eru, the soon-to-be main girl of the series
submitted by eefyjeff to u/eefyjeff [link] [comments]


2024.05.28 09:01 Legitimate-Square-21 Seeking Recommendations for an eInk Tablet with Camera for Study Purposes

Hey everyone,
I'm currently on the lookout for an eInk tablet that suits my study needs, and I could really use some recommendations or insights from those in the know. Here's what I'm specifically looking for:
  1. Camera Functionality: I need a tablet with a camera so I can snap pictures of the board during lectures, especially when the instructor writes equations or diagrams. This is crucial for me as I like to annotate these images with my own notes.
  2. Note-taking Capability: It's essential that the tablet allows me to take notes directly on the screen. I want to be able to write over the images I capture, as well as on any PDF files I import.
  3. PDF Compatibility: The ability to import and annotate PDF files is a must. A lot of my study material comes in PDF format, so I need a tablet that can handle this seamlessly.
    Thanks in advance for any help or suggestions you can provide!
submitted by Legitimate-Square-21 to eink [link] [comments]


2024.05.28 08:31 Omologist What is Heatmap Analysis?

What is Heatmap Analysis?
What is Heatmap Analysis?
Understanding Heatmaps
Heatmaps provide a visual summary of complex data, utilizing color to represent different values and help analyze user engagement patterns on web interfaces.
Definition and Overview of Heatmaps
A heatmap is a data visualization tool that uses color coding to represent various values across a two-dimensional plane. This graphical representation is particularly useful for identifying trends and patterns within data sets. Typically, the color variations—from cool to warm—indicate the range of values, with a color legend acting as a key to decipher the heatmap.
Types of Heatmaps
There are several types of heatmaps, each serving a specific analytical purpose. Perhaps the most known are web heatmaps, which track user activity on a page, providing insights into user behavior. Other types include:
Geographical heatmaps: Display data over a map layout.
Matrix heatmaps: Utilize a matrix format to show correlations among variables.
Density heatmaps: Highlight concentrations of data points within a specified area.
Each type applies a distinct color palette to communicate data efficiently.
Components of a Heatmap
The effectiveness of a heatmap in visualizing data lies in its components:
Color Palette: A carefully selected range of colors represents different data values, where the choice of color can significantly impact readability and interpretation.
Legend: The legend or color bar is crucial for understanding the heatmap as it explains the data value associated with each color.
Annotations: Textual notes that explain specific parts of the heatmap, providing context and clarifying details for the viewer.
Scale: Indicates the quantitative relationship between the data values and the colors used on the heatmap.
These elements work together to provide a comprehensive data view, making heatmaps an essential tool for visual data analysis.
Heatmap Construction
Constructing a heatmap involves careful planning and execution to ensure meaningful visualization of data. The process necessitates attention to data selection, normalization practices, color scale choices, and the use of appropriate software for turning data matrices into vivid, insightful maps.
Selecting the Right Data
The foundation of a heatmap lies in selecting the right data. Heatmaps are particularly useful for displaying a large matrix of values, such as gene expression levels or website scroll maps. One must define clear variables, ensuring that the data to be visualized is suitable for a heatmap layout, representing individual values within a table as varying shades of color.
Normalization and Scaling
Before visualization, normalizing and scaling the data is crucial. This process adjusts the varying ranges of data points to a common scale, enabling fair comparison across the matrix. Normalizing functions in software like R ensures that outliers don't skew the representation, and scaling preserves the relative differences between data points.
Choosing a Color Scale
Selecting an appropriate color scale is an integral part of heatmap design. The color palette or colormap should provide sufficient contrast to make patterns distinguishable. Color gradients can represent different magnitudes; for instance, warm colors can indicate high values, while cool colors suggest lower values. Consistency in the color palette ensures the heatmap conveys information effectively.
Software and Tools for Heatmap Creation
Various libraries and tools facilitate heatmap creation. R heatmap functions, ggplot2, d3heatmap, and heatmaply are popular among data analysts for crafting heatmaps. They offer normalization features, customizable color palettes, and support for complex data sets. Software selection may depend on data complexity, required interactivity, and the analyst's familiarity with the tool.
Using software like R and ggplot2 ensures that heatmaps are accurate and aesthetic, inviting in-depth exploration of matrices and maps.
Heatmap Analysis in Various Domains
Heatmap analysis transcends a single application, providing insights across various fields by visually representing data where colors correspond to values. This powerful tool can illuminate patterns in user behavior on websites, gene expression in bioinformatics, and financial market information.
Heatmaps in User Experience (UX) Design
In UX design, website heatmaps are indispensable for understanding how users interact with a website's pages. Designers use these heatmaps to track where users click most frequently, which can highlight which aspects of a page are the most engaging or need improvement. By aggregating user behavior data, UX professionals can make data-driven decisions to optimize websites for better user engagement and satisfaction.
Applications in Bioinformatics and Genomics
Heatmap analysis is pivotal in studying complex gene expression data in bioinformatics and genomics. Using heatmaps, scientists identify clusters of genes with similar expression patterns, facilitating the discovery of associations and genetic markers. These heatmaps often incorporate dendrograms to illustrate the clustering relationship between genes, helping to detect outliers and understand the genetic architecture of traits within a population density.
Heatmaps for Financial Market Analysis
Analysts rely on heatmaps to visualize vast amounts of financial market information in financial markets. They can quickly identify correlations between different assets, spot market trends, or detect outliers in stock performance. By presenting real-time data in a heatmap, one can observe the market's pulse and make informed investment decisions amidst the complexities of big data.
Interpreting and Reading Heatmaps
Interpreting heatmaps involves extracting meaningful insights by visualizing complex data sets. The patterns and colors represent variations and correlations, allowing for a comprehensive analysis of how users interact with specific web page elements.
Recognizing Patterns and Correlations
Heatmaps are invaluable for pinpointing patterns in user behavior across a webpage. One can discern high and low activity areas indicative of user engagement and interaction by assessing the colors. These visual cues enable the identification of correlations between different areas of the page—brighter colors typically indicate higher interaction levels, while darker colors suggest the opposite. This form of cluster analysis unveils how different page elements correlate with user interest and behavior.
Identifying Clusters and Trends
Identifying clusters within heatmaps is key to understanding user trends. Clusters are areas where similar data points converge, often represented by contiguous regions of similar color intensity. Recognizing these areas helps uncover trends, such as which parts of a webpage are most engaging or which sections are frequently overlooked. Assessing these clusters helps make data-driven decisions to enhance user experience on the site.
Understanding Dendrograms
In the context of heatmaps, dendrograms accompany hierarchical clustering to showcase the relationships between clusters. These tree-like diagrams represent data structures that are not immediately visible from the heatmap alone. Dendrograms provide a visual summary of the data, enabling a clearer comprehension of the multi-level hierarchy within complex data sets and further assisting in the analysis of user interaction and the identification of correlation between different metrics.
Advanced Heatmap Customization
Advanced heatmap customization includes applying interactive elements, ensuring accessibility, and enhancing visualizations for publication. These enhancements leverage the latest visualization tool innovations for a more user-friendly and analytical experience.
Interactive Heatmaps
Interactive heatmaps use tools like Plotly to engage users with scrollable, zoomable, and clickable charts. These charts allow for exploring data points on two axes with high-resolution color graphics. Geom_tile from the tidyverse package facilitates the creation of these customizable and interactive visual elements in a heatmap.
Accessibility Considerations
When customizing heat maps, one must prioritize accessibility. This involves choosing color palettes that accommodate color blindness and providing text alternatives for visual information. Users of bioinformatics tools like those found in Bioconductor benefit from applying accessible design principles in heatmap visualizations.
Publication-ready Visualization
The final step in customization is ensuring heatmaps are ready for publication. This requires implementing high-resolution color graphics and crisp, clear borders. Tools within tidyverse offer the functionality to refine visual elements, such as titles and borders, ensuring that the final product is informative and visually appealing for publication.
submitted by Omologist to PithyPitch [link] [comments]


2024.05.27 03:53 Icy-Statistician3568 Complex Theory of Interconnectedness With A Metaphoric Numeric Diagram Explanatory

I begin this topic by describing an example diagram that is annotated as a basic math and equation type square format pattern system. The system of numbers is known as the Magic Square equation where a set of numbers all have a common factor that they equal out unto outside the square itself & the quotient of the sum of the numbers in a row equal out to the same number mapped out just on the other line of the square.
This metaphoric diagram gives a semi indepth and detailed descriptive if used to describe the way certain things are mapped out in thorough detail based descriptive & how they are overall connected through each singular factor that would connect them to an specific outcome. A way this can be applied is to understand how a killer would in each victim claiming even as an unsub connect their crimes together, themselves being the final conneting factor along with the death of the victim.
The descriptive itself would specify that each number within the square in a row which maps out the quotient of those numbers into the matching number as a list of row outside the square defines the complexity of how things are interconnected, not only in conspiracies but in collected detail cause and effect scenarios. Several forms of the sabatoge use this methodogy, such as setting up the framing of an individual by placing them as the eventual suspect & then wrongfully convicted victim in some cases. Conspiracies that have panned out which where planned by teams of many different very desceptive intellectual thinkers derive from this methodology of thinking as they plan out ways to spread connectedness of a great list of crimes that acquire them some form of a collectively desired outcome. Many crime families when investigated can be accurately studied using this form of causality based singular interconnected factor graph.
Often times investigators could use this Scientific Theory of connected factors to figure out what it was that would undo the conspiracy caused outcome and or in depth connect the many different types of behaviors to a particular unsub. The theory itself or scientific equation could adaquetly describe the way a teacher successfully teaches a group of students whom all succeed. The quantative addition of each factor required per individual for them to comprehend and sufficiently understand then in turn learn the teaching would be accurately described by each marker number that caused them to understand further until the teaching itself was entirely understood. The final outcome number described by this single simple diagram magic square scenario to the right of the magic square would be that the end outcome linking all of the factors together can be summed up to the students all learning the teaching correctly and fully. Each student with this methodology used in effective deployment would mean that the system itself would be fool proof. Though this seems very complicated at first what the teacher would have in end goal with this scientific methodology being a way they understood teaching as a list of barriers that must me surpassed for each student for every one to completely and adaquately learn the subject & acquire a passing grade. In practice this system can be further perfected upon and thorougly described in annotative practice with another much more complex magic square that in itself is used to definitively describe study, and dictate the act of teaching and also the pattern or style of doing so in a long term teaching environment.
End outcomes that are no longer statistically defined as possible or more or less true become facts that someone could consider the ensured outcome of using this equation pattern & statistics for an outcome based predictive system theoretically as well. The very same equation diagram could be used to describe how a preventative measure could be set in place to void any attempted change to these facts that would through this step by step causality diagram in deployed fashion be placed to happen & presumed definite not just possible. Any factor that did not meet the criteria for adaquete definitive rounding though given the proper amount of conditioning would be considered the subject of numerical disintegration through variable factor that caused this inadaquecy. Following the numberic map as closely as you could. In the scenario of this numerical disintegration or statistically exact innacuracy you would then round up if the goal number outside the magic square graph was at least 14.5 or higher and the goal number was 15. This system safely places the pedicted possiblilty into the hands of the statistical presumptive and therefore is further manipulated by extenuating factors that would modify and perfect the further controlled scientifically controlled environment the magic square facilitate & contain. The 95% factor unto the 100% factor margin change in effected outcomes is another complex application of this idea system. The complex linking system this could set into motion can connect together an outcome and then in proven theory be used to ploy two individuals effected by the initial squares decided position of that individual after the factors had adaquately linked them together. The scenario the person or persons that are represented by the number which is the same outside the square itself that would all of course be the same quantative measurement would place them in a position where the square built next to this one would help an individual ploy these parties or entities lives like pawns in a story they could control and write in theory. The factors mapped out by the secondary and third magic square diagram would definitively use statistics and controlled environment through scientific process to build a controlled scientific environment in which those in control of the conspiracy or of those in the scenario would be forced to choose 7 out of 9 of the decisions that the magic square itself would through magic square equation and statistics place before them & control them loosely but adaquately to make. 7 out of 9 decisions made would be the imperfect magic square crowds and power individual life micromanaging causality system. Essentially the likelihood of each factor being not only presumed to happen but accurately defined as most likely to occur are key to understand. What ties everything together in this deployed magic square system is protocol basd good conditions which all rely each in themselves and on one another with their supporting factors incase of the very small statistical percentage possibility the bad condition factors success. Though this system is very serene looking until the system itself is fully deployed and the final product can be produced the variable remains. In the end however, each detail is boiled down to decided & predicted by this data system. The perfected square involves very complex statistics and practice with this system. As previously state crime families and different military agencies have used this methodology to control outcomes and even singular choices they placed an individual unto & hands free where able to force them through scientific thinking to make. This is how you can map out the Puppets and strings control system in which many people as I have earlier mentioned are forced into a situation where they are thoroughly and absolutely framed for a particular thing that was the result of predisposposed complex thought analytically speaking. The resulting square to trap them into the outcome further extenuates the situation.
Once again, the choices can be placed into decided possibility categories or predictable outcomes for the individual or subjects involved in these scientifically constructed environment. Control of known possible outcome through statistic analysis is achieved through this theory. In reflection of these ideas also we can discern that when deployed this scientifically controlled environment can enact unique causality in a deployed predicted statistically dictated set of possible choices. You'll understand if you can imagine a metaphoric geographically modified possibility map where predicted & in theory dictated decisions are even entirely chosen by those that set up a scientifically controlled environment in which they place the subject or subjects into, in order to control the events & the outcome of those events & in turn the subject or subjects nearly completely or entirely in the long run.
This methodology of continious causalities once placed into a deployed state as a weaponized system is something to both fear and consider a superior calculated system of controlling an environment or mass group of people as well & major events. This is achieved as a possibility or posisibilities by outcome through converting that environment whatever it may be from an uncontrolled natural environment into a more chosen directed constructed one & eventually an exclusively scientifically controlled environment and still is created. Statistics can prove this theory entirely.
I will update this post as I am able to continue studying this format of scientific thinking and map it out further with a diagram explanatory as time permits.
Link to Equation Diagram Example.
submitted by Icy-Statistician3568 to ScientificTheories [link] [comments]


2024.05.25 20:20 FewPomegranating Recommended e-ink notebook for a researcher?

I’m looking for something to handle reading PDFs, EPUB, and web articles, annotate, and make notes from scratch.
I am very ADHD so a traditional iPad has too many distractions with all its features, but the idea of sideloading does sound appealing for maybe specific things.
My current form of note taking is mainly through ObsidianMD on a laptop with a file synced vault but it’s not great for literature review, drawing diagrams, using in random places, or using in the sun.
Battery life and reliability is important.
I am in the EU if that factors into it.
What might you guys suggest best fits my use case in 2024? I’d probably be willing to wait if something is just about to come out too.
submitted by FewPomegranating to eink [link] [comments]


2024.05.24 14:33 CrossThatSection7878 UW: 55% correct > PASS ON REAL DEAL

Okay here it is the ultimate ultimate step 1 write up from an average medschool graduate. This WILL NOT BE coming from someone who has been soaring through med-school. Most of the time it’s been a tip toe across the pass line so the resources I have used are aimed specifically for the underdogs out there just trying to round up that pass. So lets get this!
Exam day experience:
Brought everything in clear zip-locks so check-in would be smooth. They make you take out any tissue papers or papers from your food items so make sure whatever lunchables you prepare from home aren’t wrapped in that bcs you’ll be struggling to dismantle your sandwich in security line up from that. Otherwise the process was smooth enough the people at my prometric know you’re spooked enough so don’t bother you too much and guide you step by step.
Once my first block started the questions were long I was prepared because people have been ranting about that on reddit for weeks on weeks but was it anything out of the ordinary N O P E it was exactly like the new free 120 in terms of length like it literally felt like I was giving it bcs in terms of pacing myself and the time constraints it was the same thing to the dot!
So at home make sure you guys are well versed in practicing how to complete the free 120 on time. The length of the questions and tbh the approach with the longest questions that works best imo is READ THE LAST SENTENCE OF THE QUESTION STEM and skim the answer choices>> most the time I was running out of times on blocks and I did this and I didn’t even need to read the 30 liner opening statements on top and I could easily tell what the answer was just from the last line so keep this strategy in mind to maximize your testing time and skills!
Block 1 for me I would say was the longest and hardest bcs I wasn’t sure what I was supposed to expect due to this general notion of how crazy out of this world this test is. Its. Really. Not
Most of the questions tested on the blocks that followed were NBME PATTERNED single liners straight like just tell me the mechanism of action of this or that and stuff that you see over and over again to the point you stop revising like oh this I know at the back of my hand. Please don’t do that bcs I was like sitting there trying to recall the most basic of stuffs bcs of a concept I had stopped revising months ago bcs it was as simple abc. Its free points don’t lose them.
I’m not saying there weren’t wild questions on the exam but you could tell for the life of me no matter even if they gave me the internet I would not have been able to attempt those questions so I would safely say e x p e r i m e n t a l s and tbh save yourself the mental distress even during the exam you’ll be like O SHIT what was that cross-section or that graph ive never seen before what will I do MOVE ONTO NEXT BLOCK FORGET THE PAST you have so many questions to do so much room to make up for that odd couple questions you didn’t know.
My testing strategy was to not waste time on the wild wack questions I would never get but instead, go over the moderately difficult ones making sure I’m getting those right.
I didn’t have enough time to go over marked questions like maybe 3-4 on some blocks but per block, I would say easily I was unsure about a good 15-17 questions with a good 5-7 no idea what they were talking about and this is completely normal. So expect it going into the exam. Don’t be spooked.
There will also be question answer choices you will not know so don’t lose sleep on them and go with your gut on familiar choices as opposed to the wild answer choices bcs I came home and googled some I was like hMmMm never heard of that one before to mix it up let me select that. It was wrong .-.
There were a lot of neuro gross sections, some histo diagrams, not too many calculations let me address that on resources I used that helped and what would I would suggest to do more below:
Resources
>Highly highly recommend going knees deep into the mehalman pdfs esp the high yield arrows, endo, renal, NEUROANATOMY. If you have the time please skim the rest but prioritize these first.
>Bootcamp videos are good if you’re in your very initial stages of preparation. Or even as a revision tool I would say I used them to brush concepts I forgot during my last month. The subscription doesn’t cost a lot and some of the sections like renal rly helped sort out acid base disorders and the pressure-volume loops in cardio. Plus they have rly nice assessment tools after each video and sections that BnB doesn’t offer which I found super helpful too its worth a shot to see if it suits you instead of browsing through a lot of youtube content to find a source online.
Neuroanatomy: I printed out the cross sections from mehalman pdfs and any other I could find from UW, free 120, NBMEs so that I could go over them over and over again and get familiar with content. They show up fairly a lot and most are straightforward easy points so familiarize yourself with these cross sections. Also pull up gross locations of different views of other structures for e.g. thalamus etc just so that you know how things look from different angles and not just one.
>Biostatistics and Ethics:
Dr. Randy Neil on Youtube Videos
I also purchased the UW Biostats rapid review (This helped me with the ROC and Kaplan Mier tested questions that came up a lot)
I would highly recommend not to overlook the Bradford Hill Criteria that Dr Randy Neil discusses in his videos. Like it seems step 2 content but I T S N O T AT ALL pls pls revise these and know what the individual concepts mean and try to work out problems in terms of smokers and alcoholics. I think in terms of scenarios those are the safest ways to practice.
For the models of precontemp and contemplation questions every scenario always tests you on either smokers or alcoholics so sitting at home just practice these models and the way you would counsel.
>General Pharmacology:
Dr. Randy Neil again god send
>General Pathology:
Watched Pathoma and annotated it a long time ago didn’t rmmr much from the videos tbh but what I did was annotate any new info onto my FA don’t sweat too much tho if you don’t get the time to do them they are useful y e s but only if you’re struggling in your UW gen path blocks!
For a l o t of misc topics I used DIRTY MEDICINE for instance anything on the top of your head you think is hard and will be hard to retain. Dirty will have it. Familial Dyslipidemias, Hepatitis markers, Glycogen Storage Diseases etccc
What I would highly recommend to do is print out pages from the FA pdf of high high yield pages like that Immunodef disease table, or the gen path table and have it pinned on a soft board as your daily revision list. I’m not an Anki person so this is my make shift anki agenda for stuff ik will be tested and need to go over and over again because its just plain old memorization nothing wild or smart about it.
*If anyone is struggling with a particular topic please drop a comment below I’ll look through my notes and drop a link or a resource that helped me bcs there are too many to list down at the top of my head but tbh whatever you think you struggled with I have too and I found a solution to memorize it by some video online so please done hesitate*
Scores
UW % correct 55% (completed 100%)
NBME 16: 48%
NBME 26: 52%
NBME 27: 53%
NBME 28: 59%
NBME 29: 55%
NBME 30: 69%
Old Free 120: 62%
New Free 120: 72%
I know it’s a long and difficult journey but whoever is tested tomorrow or the next 3 days or next week or next month promise the test is super super doable it was nothing we haven’t seen before just need to believe in yourself and not freak out!!! YOU GOT THIS 30304723% OK
if you need any more help pls drop your questions in the comments below
Double also if you found this write up like even 0.2% useful pls upvote this post I need all the karma I can get my technologically challenged self-deleted my old account and it’s just been downhill on Reddit since.
submitted by CrossThatSection7878 to step1 [link] [comments]


2024.05.23 20:02 healthmedicinet Health Daily News May 22 2024

DAY: MAY 22 2024
5-22-2024

HOW RISKY IS TURBULENCE ON A PLANE? HOW WORRIED SHOULD I BE?

The Singapore Airlines turbulence incident that has sadly left one person dead and others hospitalized has made many of us think about the risks of air travel. We’ll hear more in coming days about how the aircraft came to drop so suddenly on its route from London to Singapore earlier this week, injuring passengers and crew, before making an emergency landing in Thailand. But thankfully, these types of incidents are rare, and much less-common than injuries from other types of transport. So why do we sometimes think the risk of
5-22-2024

WHAT FACTORS PREDICT WHEN OLDER ADULTS WILL STOP DRIVING?

What factors lead older adults to stop driving? A new study followed older adults who had no memory or thinking problems to examine this question. The study is published in the May 22 online issue of Neurology. “Alzheimer’s disease develops over a long time—people may have a 10- to 15-year period where they have no symptoms, but the disease process is developing in the brain,”
5-22-2024

EATING MORE ULTRA-PROCESSED FOODS TIED TO COGNITIVE DECLINE, STROKE

People who eat more ultra-processed foods like soft drinks, chips and cookies may have a higher risk of having memory and thinking problems and having a stroke than those who eat fewer processed foods, according to a new study. The study does not prove that eating ultra-processed foods causes memory and thinking problems and stroke. It only shows an association. Ultra-processed foods are high in added sugar, fat and salt, and low in protein and fiber.
5-22-2024

STUDY REVEALS ALARMING LEVELS OF DRUG RESIDUE ON US CURRENCY

A new study led by Thomas Jefferson University researchers has found that American currency carries much more than germs on its surface. The study used a new method of analysis to examine one-dollar bills collected from 13 cities across the U.S. Fentanyl, a potent opioid, was detected on 63% of the bills, shedding light on the widespread presence of this dangerous substance in everyday transactions.
5-22-2024

RESEARCH TEAM IDENTIFIES A NEW WAY TO TREAT PROSTATE CANCER

Active Stat5 increases protein levels of full-length androgen receptor (AR-FL) and AR variants (AR-Vs) through the induction of AR mRNA levels in PC. The American Cancer Society estimates there are nearly 300,000 new cases of prostate cancer every year in the U.S., and approximately one in eight men will be diagnosed with prostate cancer in their lifetime. Prostate cancer is often treated with androgen deprivation therapy, which lowers testosterone levels to shrink tumors. However, this treatment has side effects including sexual dysfunction and weight
5-22-2024

BRAIN IMPLANT IN CONJUNCTION WITH AI APP ALLOWS NEARLY MUTE MAN TO SPEAK IN TWO LANGUAGES

Schematic diagram of the bilingual decoding system. In each trial, the participant is presented with a target phrase in English or Spanish. The participant volitionally activates the system by attempting to speak, and this attempt is identified from the neural features by a speech-detection model. A team of neurosurgeons and AI specialists at the University of California, San Francisco, has found some success in restoring speech to a patient who lost the ability after a stroke.
5-22-2024

A DEADLY NEW RISK FOR OVERDOSE

Fentanyl, typically sold in compressed powder chunks, (and a few methamphetamine shards) and the materials commonly used to consume them via inhalation. Now that smoking has replaced injecting as the most common way to consume fentanyl, UCSF researchers have uncovered an increased risk of fatal overdose from the residue that accumulates in smoking equipment. The researchers found that people both shared fentanyl resin and consumed it accidentally. This may be increasing the risk of overdose, especially among those who use
5-22-2024

WEARABLE ULTRASOUND PATCH ENABLES CONTINUOUS, NON-INVASIVE MONITORING OF CEREBRAL BLOOD FLOW

This soft and stretchy ultrasound patch can be worn on the temple to provide continuous monitoring of blood flow in the brain. During use, the patch is connected through cables to a power source and computer. Engineers at the University of California San Diego have developed a wearable ultrasound patch that can offer continuous, non-invasive monitoring of blood flow in the brain. The soft and stretchy patch can be comfortably worn on the temple to provide three-dimensional data on cerebral blood
5-22-2024

HIGH BMI LINKED TO REDUCED BRAIN VOLUME AND INCREASED WHITE MATTER LESIONS

A recent study published in Health Data Science reveals the significant impact of high cumulative body mass index (BMI) on brain health. The research, led by Associate Professor Han Lv from Beijing Friendship Hospital, Capital Medical University, found that high BMI is associated with smaller brain volume, larger white matter lesions, and abnormal microstructural integrity. The study analyzed data from a 16-year population-based cohort to investigate the effects of cumulative BMI on neuroimaging features in adults
5-22-2024

STUDY FINDS NEW METHOD FOR DIAGNOSING SLEEP DISORDERS IN CHILDREN

Research at the University of Oklahoma, in collaboration with The University of Tulsa, has resulted in a new method of screening for sleep disorders in children. The tool, the first of its kind, allows health professionals to assess children for multiple sleep problems at once, resulting in a quicker evaluation and more targeted treatment recommendations. The research that created the tool, called a structured clinical interview, was published recently in the journal Behavioral Sleep Medicine. The publication details the effectiveness of the interview questions across several types of sleep disorders,
5-22-2024

DOGS PLAY A KEY ROLE IN VETERINARY COLLEGE’S BRAIN CANCER TRIAL

Lucy, with her boundless puppy-like energy even at 12 years old, is more than just a pet to Susan Ketcham. She’s now part of a research project that could transform the way we treat brain cancer—in both dogs and humans. This study at Virginia Tech’s Virginia-Maryland College of Veterinary Medicine explores an innovative therapy called histotripsy. It’s a leap forward from traditional cancer treatments, harnessing the power of focused ultrasound to break
5-22-2024

NEW STUDY SHOWS HOW CANCER CELLS EXPLOIT THE IMMUNE SYSTEM

New research has discovered an important breakthrough that may overcome cancer treatment resistance. The immune system has a naturally occurring ‘brake’ that tells the body to silence key killer immune cells called CD8+ T-cells as a safeguard to restrain excessive immune responses. Cancer cells are known to exploit this process, called exhaustion, by hijacking the immune system at this ‘off-switch’ to dampen down the immune attack on cancer, enabling cancer growth.
5-22-2024

STUDY FINDS ULTRAVIOLET RADIATION MAY AFFECT SUBCUTANEOUS FAT REGULATION, COULD LEAD TO NEW OBESITY TREATMENTS

The radiation enhances norepinephrine secretion, which not only decreases leptin thereby increasing food intake, but also increases energy expenditure through the browning of subcutaneous fat. Obesity and metabolic disorders are increasingly significant global public health issues. In a novel study, a team of dermatologists has evaluated the effect of ultraviolet (UV) exposure on appetite and weight regulation. They found that UV exposure raises norepinephrine levels, decreases leptin levels, and induces the browning of subcutaneous fat, thereby increasing energy expenditure. These results potentially pave the way
5-22-2024

NEW BIOMARKERS FOUND TO PREDICT KIDNEY FAILURE IN TYPE 1 DIABETES PATIENTS

In a paper published in Science Translational Medicine, researchers from City of Hope, a U.S. cancer research and treatment organization and a research center for diabetes and other life-threatening illnesses, report that they have discovered advances in predicting kidney failure in type 1 diabetes (T1D) patients. By performing the first epigenome-wide association analysis in patients with diabetic kidney disease, a research team has identified novel associations between DNA methylation activity—a biological
5-22-2024

SOME PATIENTS TAKE SECOND AT-HOME FECAL TEST TO DELAY COLONOSCOPY

A study of 316,443 patients shows that 7.4% of these patients repeated fecal testing rather than proceeding directly to colonoscopy as guidelines recommend, and of those who repeated home tests, over half did not have a colonoscopy within 1 year. The work is published in the Journal of General Internal Medicine. The study showed that among repeat testers, only 41% went on to receive a colonoscopy within one year of their initial positive fecal test. To learn more, researchers interviewed patients who had been tested twice rather than go in
5-22-2024

YOUNG PEOPLE ARE INCREASINGLY USING WEGOVY AND OZEMPIC, STUDY FINDS

Public interest in weight loss drugs like Wegovy and Ozempic is surging, but national data on dispensing patterns in the United States is surprisingly scarce. Now, a national study from Michigan Medicine shows that the use of these weight loss drugs is increasing rapidly in adolescents and young adults aged 12–25 years, especially females. Using 2020–2023 data from a national database representing 92% of pharmacies, the study team found a 594% increase in the monthly number of adolescents and young adults
5-22-2024

STUDY ANALYZES THE IMPACT OF SUMMER HEAT ON HOSPITAL ADMISSIONS IN SPAIN

A research team has carried out an analysis of hospital admissions related to high summer temperatures in Spain over more than a decade. The study concludes that the causes of hospitalization in which the heat has the most notable impact are: Metabolic disorders and obesity Renal failure Urinary tract infection Sepsis Urolithiasis Poisoning by drugs and other non-medicinal substances The research included data of more than 11.2 million
5-22-2024

NEWBORNS WHOSE MOTHER SPOKE IN A MIX OF LANGUAGES DURING PREGNANCY ARE MORE SENSITIVE TO A RANGE OF SOUND PITCHES

It’s well established that babies in the womb hear and learn about speech, at least in the third trimester. For example, newborns have been shown to already prefer the voice of their mother, recognize a story that had been repeatedly told to them while in the womb, and tell apart their mother’s native language. What wasn’t known until now was how developing fetuses learn about speech when their mother speaks to them in a mix of languages. Yet this is common: there are 3.3 billion bilingual people (43% of the
5-22-2024

RESEARCHERS DISCUSSES 25-YEAR STUDY THAT SHOWS MOTHERS’ EMPATHY FOR TEENS MAY PREDICT TEENS’ EMPATHY

A new Child Development study from researchers at the University of Virginia provides the first long-term, longitudinal evidence for the transmission of empathic care across three generations: from mother to teen to child. The findings suggest that interactions with close friends in adolescence may provide a “training ground” in which teens can practice providing care in their peer relationships and pay forward the empathy they experience from their mothers, which may help strengthen their future parenting skills. For families and service providers, supporting one generation of parents to model empathy
5-22-2024

SCIENTISTS CREATE TAILORED DRUG FOR AGGRESSIVE BREAST CANCER

Scientists have used breast cancer cells’ weakness against themselves by linking a tumor-selective antibody with a cell-killing drug to destroy hard-to-treat tumors. The research, published in Clinical Cancer Research by a team from King’s College London, marks a new method in cancer treatment. The discovery is particular to triple negative breast cancer, which makes up 15% of all diagnosed breast cancer. This type of breast cancer is typically aggressive, resistant to chemotherapy, has a lower survival rate and is more common in women under 40. Usual treatment involves surgery, chemotherapy
5-22-2024

URBAN GARDENING MAY IMPROVE HUMAN HEALTH—RESEARCH SUBJECTS BENEFIT FROM MICROBIAL EXPOSURE

It’s easy to start growing in pots indoors in spring when the weather is still cool, and then move out e.g. onto the balcony when the weather warms up. Either way, you don’t need much space. A collaborative study between the University of Helsinki, Natural Resources Institute Finland and Tampere University demonstrated that a one-month indoor gardening period increased the bacterial diversity of the skin and was associated with higher levels of anti-inflammatory molecules in the blood.
5-22-2024

DAILY MARIJUANA USE OUTPACES DAILY DRINKING IN THE US, A NEW STUDY SAYS

Daily and near-daily marijuana use is now more common than similar levels of high-frequency drinking in the U.S., according to an analysis of survey data over four decades . Millions of people in the U.S. report using marijuana daily or nearly every day, according to an analysis of national survey data, and those people now outnumber those
5-22-2024

GENITAL TALC USE POSITIVELY LINKED TO OVARIAN CANCER

There is a positive association between use of intimate care products, including genital talc, and ovarian cancer, according to a study examined the association between intimate care products and female hormone-related cancers using data from a U.S.-based cohort study enrolling 50,884 women who had a sister with breast cancer. Data on genital talc use and douching were obtained at enrollment in 2003
5-22-2024

EPIDURAL LINKED TO REDUCTION IN SERIOUS COMPLICATIONS AFTER CHILDBIRTH

Having an epidural during labor is associated with a marked reduction in serious complications in the first few weeks after giving birth, finds a study published by The BMJ. Doctors refer to these complications as severe maternal morbidity (SMM), which can include heart attack, heart failure, sepsis, and hysterectomy. Epidural analgesia is recommended for women with known risk factors for SMM, such as obesity, certain underlying conditions, or having more than one baby. These women are said to have a “medical indication” for epidural analgesia in labor. Women delivering prematurely
submitted by healthmedicinet to u/healthmedicinet [link] [comments]


2024.05.22 20:39 VT_Squire Soliciting strategies to assist with an unbreakable code [Zodiac Killer]

Soliciting strategies to assist with an unbreakable code [Zodiac Killer]
Context:
In June of 1970, the Zodiac killer mailed a map and a cipher to the San Francisco Chronicle, claiming that the map coupled with the cipher would reveal the location of a bomb intended to blow up a school bus full of children.
The cipher is as follows:
https://preview.redd.it/1tsdxr6bb02d1.jpg?width=783&format=pjpg&auto=webp&s=ba8e9dcde934eb5ba8e763856279d2782b4df677
Transcripted:
C 1 J I 2 O K 3 A M 4 5 6 O R T G
X 7 F D V 8 9 H C E L ! P W 1
Unfortunately, this cipher is too short, and has such a diversity of characters, virtually anything can be shoe-horned to fit and appear as if it were the valid solution. Consequently, some sort of 3rd party information is necessary to distinguish the intended solution from other possible solutions.
A separate examination of the map and the facts of the case have led me in a direction where I have possibly identified what that third party information is, and I am looking for some help in translating that information into a strategies for solving the cipher.
The extra information is as follows:
https://preview.redd.it/zmxu3xvgc02d1.jpg?width=375&format=pjpg&auto=webp&s=66029db1c3b28ba989d8f5c3fb6e651787e8a57d
This is the killer's annotation on the map itself. Just by looking at it, it's evident that the compass rose departs from traditional compass roses in a curious way. Most are divided by some power of 2. You may see 4 directions, 8, 16, even 32. 12 is the odd duck out. You just don't see that anywhere else.
However, the Zodiac has previously mailed in a similar diagram.
https://preview.redd.it/smgi52u2d02d1.jpg?width=714&format=pjpg&auto=webp&s=351929b09bbd72b4c33806477446e6a776b5e19b
People have noticed that this comports exceptionally well to a list of months that the Zodiac has mailed in just the day before he sent this picture. The Months he gave were: December, July, August, September and October. Beginning with December at the south position and proceeding counter-clockwise, the X-marks on this diagram line up with those months. There are 4,096 unique ways to depict a number of X's along a circle like this. 24 of those ways will line up with the given list of months, so a little more than 1/2 of a percent. It seemed the natural course of investigation to apply this logic to the map itself by first listing out the months, but in a clockwise direction so as to mimic the numbers given on the killer's note. March = 3 because it's the third month, June = 6, September = 9, and so forth.
Then, I turned the map 17 degrees clockwise so the Zero written on it would now appear as if it were pointed at Magnetic North as it was in the San Francisco Bay Area back in 1970. I then then drew lines that intersect the crime locations in red.
Here is the end result with degrees and a calendar.
https://preview.redd.it/au4pzjp3k02d1.jpg?width=817&format=pjpg&auto=webp&s=cbf6d16ed98c6cd7946aca8a36c94382d4d6f938
Those crime areas depicted on the map occurred on December 20th, 1968 and October 11th, 1969.
Both are "correct" in regard to having been associated with a specific month through the process of mimicking the killer's previous diagram. One of them is accurate to the exact day.
My take away from this is that the map serves as a mode for which the killer communicated something about his choice of locations to engage in criminal activity, and when.
He later wrote in a letter that the solution to the Mt. Diablo code had something to do with Radians, and a # of inches along the radians, so I examined the case for the most specific data I could find which came directly from the killer. That was 6:30 PM on September 27th, 1969. He wrote the time of day down on the victim's car at Lake Berryessa.
https://preview.redd.it/0t2wsmnmr02d1.jpg?width=866&format=pjpg&auto=webp&s=ed2dc793d4fc368f9dce77b09a2ab420544a6dd2
With this in mind, I depicted a radian angle on the compass, and just rotated the calendar to see what another associated date would be. What I found is that this describes the relationship to July 31st, 1969, which is the same day the killer mailed in the first cipher.
https://preview.redd.it/1gxlzf0xr02d1.jpg?width=647&format=pjpg&auto=webp&s=4806cf828e02aeda54f9b2d9e41eb1da917dca13
I was able to extend this model, examining the postmarks on various letters he sent in and any content which might seem pertinent.
A card mailed in on October 27th, 1970 featured the word "Paradice" on the back. When I depicted this as I had with the crime scenes, it turned out that the date happens to also intersect Paradise Drive in Tiburon, Ca.
https://preview.redd.it/zak9bzwcs02d1.jpg?width=805&format=pjpg&auto=webp&s=d503882a7fffaf71f52ab04fae589cda8fdef4de
And here is how that ports over to the Calendar (In the upper left)
https://preview.redd.it/z0kxwrygs02d1.jpg?width=1114&format=pjpg&auto=webp&s=1421acb35f92d6a6430c855e1c3a75b5798ae67f
Closer examination of that area revealed the presence of a school, a school bus route, terrain that appears to be a reasonably close match for what the killer depicted in drawing, and the school was only 50 feet from a church which -like the killer- utilizes a prominent circled cross for brand recognition.
Here's a google street view of the church next to the school.
And here is a picture of the killer's drawing contrasted to the terrain of the school, with the school building visible in the upper right.
https://preview.redd.it/bysw5gjru02d1.jpg?width=707&format=pjpg&auto=webp&s=dd2e5fdb5b9d3656b67ff79237f6857c6a91d8e2
The school and the church both date back to several years before the Zodiac began his campaign of murder.
Where I am stuck is in translating this information into relevant strategies to decode the cipher that kind of break free of this condition where "anything could be a valid solution."
Any and all input is welcome.
submitted by VT_Squire to codes [link] [comments]


2024.05.22 16:43 paulrony Kosmik 2.7 - 🌚 Dark mode, 💠Shapes, and 🧲Snap Grids

Kosmik 2.7 - 🌚 Dark mode, 💠Shapes, and 🧲Snap Grids
Dear Kosmonauts,
What a ride! On May 8th we released Kosmik 2.6 and its new web browsing workflow. The answer from the community has been stellar, with almost 60k views on the YouTube video that introduced this version of the app. today we’re releasing Kosmik 2.7 and adding some features that we’ve been working on for quite some time:
  • Snap grids to organize your content.
Snap grids
  • Shapes to create diagrams and more complex documents.
  • New drawings tools, cursors and colours.
  • A completely new dark more that syncs with your operating appearance.
If you want to see Kosmik 2.7 in action, head over there: https://youtu.be/wm5Nfklu1kw?si=1WJagfTmzNeT--U7
🔎 Making Kosmik the best app for visual research
With the release of Kosmik 2.6 and now Kosmik 2.7, we believe that we’ve now built the most comprehensive visual research app. It’s not only about making your browser a little different or a little better but also about giving new powers to your files, like your PDF articles, course material or references. You can now extract text, snap parts of a file, annotate them, share them and combine them with material from the web. Here’s a demo of Kosmik as a PDF reader for students, let us know what you think!
✅ Kosmik 2.7 changelog
This week the changelog is particularly full, have a look:
🚀 Major new features
  • Dark mode: Kosmik now follows you operating system theme and updates its UI according to the current mode.
  • Vector shapes: You can either drag and drop them from the top bar or use the following keyboard shortcuts:
    • R : rectangle
    • E : ellipse
    • P : polygon
    • X : star
  • Snap grid: makes it easier to align objects, as it allows you to automatically snap your selection to set positions on drop.
✨ Minor improvements
  • New help panel redirects you to kosmik.app/faq.
  • New shortcuts :
    • cmd+A to select all your item on the canvas
    • after selecting an item, shift+cmd+A will elect all the sticker of the same type
    • opt+F for zoom to fit (if an item is selected, opt+F will focus on the item)
  • If you copy several items on the canvas, they’ll keep their position after you paste them.
  • The right-click menu has been redesigned.
  • Text fields like the search panel, the description of your universe, etc., are automatically focused so you can write immediately in them without having to click.
⚡️ Bug fixes
  • You can login or finish to signup even if you encountered network issues during the process.
  • The “replace” button in picture’s edit dock is now properly clickable.
  • Files drag and dropped from the web now have the correct size.
  • Toggles don’t change into checkboxes after a reload.
  • When you chose an already existing tags, it’s immediately applied to items.
  • Special character like & or + are taken into account in web searches.
  • You can undo a cut (cmd+X).
🔮 Realising our vision, one update at a time.
Two weeks ago we told you about Kosmik 2.6 being a stepping stone toward realising our vision. Our goal with Kosmik is to create create one, simple space where users can come and do everything they needed to. Browse the web, write notes, save and store images, paste text from an article, read PDFs and extract paragraphs, mindmap, brainstorm. It’s why we took the unusual route of building an integrated browser, PDF reader, and annotation tools into a canvas.
Our vision is coming to life, and you can now feel how much more enjoyable using Kosmik is. And it’s a great feeling that we can make people's lives a little better by making their time at their computer more enjoyable. If you want to learn more about how we’re going to realise this vision, you can also subscribe to our substack newsletter. The latest issue is about doing more with less.
See you very soon,
Paul 🧑‍🚀
submitted by paulrony to kosmik_app [link] [comments]


2024.05.21 23:45 WhatCanIMakeToday ComputerShare Confirms DSPP Details (Both in DTC and Beneficially Owned)

ComputerShare Confirms DSPP Details (Both in DTC and Beneficially Owned)
ComputerShare has generously updated their FAQ on holding registered shares and Paul Conn has generously answered some questions on video about DRS and DSPP shares. [1]

Chain Of Custody

A chain of custody [Wikipedia] represents the documentation of ownership and/or control as an item may pass through various parties. Applied here to registered shares, a chain of custody can detail who owns a share and through whom, if applicable. As is generally well known on this subreddit, “street name” shares all have a chain of custody from Cede & Co through DTC to broker to a “street name” shareholder as the ultimate beneficial owner. Based on ComputerShare’s answer outlining the chain of custody and ownership for Pure DRS and DSPP shares, we can identify 3 separate categories of ownership with 3 different chains of custody as shown and described here with color coding:
Illustrating Chain Of Custody For DRS & DSPP Shares per ComputerShare
1. DRS or Pure DRS shares (Purple) have no “chain of custody” as “investors hold the shares in their own name” with “no intermediary”. This is as clean and clear as you can get for ownership of property where investors have both title and possession (see below for more details on these terms).
2. DSPP Shares @ ComputerShare (Light Purple) For DSPP shares, there can be 2 different chains of custody for shares which I’ll denote as “DSPP @ CS” or “DSPP @ DTC”. The “DSPP @ CS” shares comprise 80%-90% of Plan shares which are “held on the register in the main class”. The chain of custody for this “DSPP @ CS” group of shares is “CPU Nominee” to Investor where CPU is shorthand for ComputerShare as their ticker symbol is CPU [Wikipedia]. ComputerShare’s nominee is Dingo & Co. For this group of 80-90% of DSPP shares, ComputerShare’s ledger identifies ComputerShare’s nominee. As ComputerShare (or their nominee) are the only intermediary, title and possession of these shares is clean and clear.
3. DSPP Shares @ DTC (Light Pink) For DSPP shares held via ComputerShare’s broker at DTC (denoted as “DSPP @ DTC”), the chain of custody is Cede & Co to ComputerShare’s broker to ComputerShare to Investor. For this group of 10-20% of DSPP shares, ComputerShare’s ledger identifies Cede & Co (who holds shares for the DTC which is a subsidiary of the DTCC).

DSPP Shares @ DTC ARE Beneficially Owned By Investors

We can build upon that Overview diagram with more detailed information from ComputerShare who directly answers questions about DSPP shares held at DTC for Operational Efficiency and which, if any, shares may be beneficially owned.
For the DSPP @ DTC shares, “Computershare holds the title for the benefit of the underlying plan participants” where shares are held with ComputerShare’s broker who has an account at the “DTC [who] holds shares on the register through Cede & Co”. (Red)
ComputerShare also says a “portion of shares will be beneficially owned by the investors” referring to “any portion of the Plan shares in a brokerage account through DTC”, which corresponds to the DSPP@DTC category. (No other chain of custody meets that description and there are only two possibilities for Plan shares.) Thus, the DSPP@DTC shares are beneficially owned by investors. (From the previously available FAQ text, we also know that “[t]hese particular shares are maintained by [ComputerShare’s] broker (for the benefit of Computershare, and in turn, for the benefit of plan participants” so the line from Broker to ComputerShare is also labeled FBO designating “for the benefit of” for beneficial ownership [Wikipedia].
Detailed Illustration Of Chain Of Custody for DRS & DSPP Shares per ComputerShare
To be abundantly clear regarding the “DSPP shares held at the DTC for Operational Efficiency” (denoted DSPP@DTC), “On the ledger, the title for this specific portion of the shares falls within the Cede & Co holding”.

TADR: ComputerShare Has Confirmed

  • Approximately 10-20% of DSPP Shares can be held at the DTC (“DSPP@DTC”) for Operational Efficiency.
  • DSPP@DTC shares are beneficially owned by investors.
  • Title on the ledger for DSPP@DTC shares is to Cede & Co who holds shares for DTC.

Title & Possession

Title identifies who has rights to ownership and possession of property.
https://preview.redd.it/6ja7ax0piu1d1.png?width=1732&format=png&auto=webp&s=d951547572ffa97cebdc72e025596c96961a41cd
Title is distinct from possession)” where “possession and title may each be transferred independently of the other.” [Wikipedia: Title (property))]
The concept of separating title from possession for property (including securities) may not be well known or familiar to everyone and, I suspect, was a huge fundamental source of confusion. Title basically identifies who owns property while possession is who holds property. Here are a couple (hopefully) relatable examples to illustrate this concept to help clear up confusion:
Example 1: Your Wife’s Boyfriend Driving Your Car
Imagine your wife and her boyfriend are speeding down Lover’s Lane when they’re pulled over by a cop. The cop will ask for license and registration because those two documents identify who is in possession of the car (i.e. your wife’s boyfriend as the driver) and who is the registered owner with title to the car (i.e., you), respectively.
Applying this to stocks, we can ask the “license & registration” question of every party in possession of GameStop stock to determine who has title and/or possession. Apes have title and possession of pure DRS shares. But for DSPP@DTC shares, title for shares begin at Cede & Co passing down to ComputerShare; while apes only have possession of beneficial rights to shares. (See, e.g., “On the ledger, the title for this specific portion of the shares falls within the Cede & Co holding”, “Computershare holds the title for the benefit of the underlying plan participants”, and “that portion of shares will be beneficially owned by the investors”. [Updated FAQ])
Example 2: Your Home
Imagine you are renting your home. As a renter, you probably tell people the place is “yours” because you have possession by renting even though your landlord is the owner with title to “your” home. This is an example where we use the term “your” to refer to having possession without title.
At the same time, if someone were to ask your landlord if the place you rent is theirs, your landlord would also say yes.
Me to Your Landlord: Is that your place where the ape lives?
Landlord: Yep! I got some really regarded apes renting from me.
In this case, the same term “your” refers to having title without possession.
Which means that two different parties, you and your landlord, can simultaneously claim ownership of your home depending solely on having either title or possession; without needing both.
Applying this to the various Chains of Custody shown above for GameStop, we can see how both Cede & Co and ComputerShare have title to DSPP@DTC shares (see, e.g., “On the ledger, the title for this specific portion of the shares falls within the Cede & Co holding” and “Computershare holds the title for the benefit of the underlying plan participants”). And for DSPP@CS shares, we can see how both Dingo and apes hold shares (i.e., possession; see, e.g., “Dingo holds assets but does not own any of them” and “all plan holders are treated as registered holders of the company”) with ownership by apes (see, e.g., “As a nominee, Dingo & Co has no interest in and no rights to the property it holds in its name on behalf of Computershare” and “While Dingo & Co holds plan shares on the registers of Computershare’s issuer clients, the owners are treated as the registered owners of the plan shares”). [Updated FAQ]

DSPP in TWO PARTS

Based on the above, we can visualize the aggregate DSPP “Plan” shares as divided into two parts: (a) 80-90% held by ComputerShare through their nominee, Dingo, and (b) 10-20% held in DTC; with the corresponding chain of custody.
DSPP Holdings Are Split In Two Portions

BUT BUT BUT… SEC email!

A previous post summarized an email response from the SEC as “PLAN SHARES ARE OUT OF DTC” [SuperStonk]. Unfortunately, that was a mis-reading of the SEC email with a misleading post title. We can illustrate the SEC response with color coding as shown below (and with comparison to ComputerShare's disclosure):
Slightly different words, but similar overall description
The SEC clearly states that “the overall count of issuer plan shares includes” (orange) two parts (a) investor shares held at the transfer agent (light purple) and (b) non-investor shares (light pink); thus we can divide up a box representing issuer plan shares (orange) into two parts labeled investor shares (light purple) and non-investor shares (light pink). The investor shares portion is described by the email with two statements: “The investor’s shares are not held at DTC” and “investor shares held at the transfer agent”. We can annotate the investor shares portion with both of those statements. The non-investor shares portion is described by a single statement: “The non-investor shares are held by the transfer agent’s broker at DTC in order to facilitate settlement for plan sales that occur” which can be similarly annotated for the non-investor shares portion (light pink).
Visualizing statements in the SEC email allows comparing the SEC’s description and ComputerShare’s description, where we see striking similarities for the description of Plan shares.
  • Both descriptions split Plan shares into two (and only two) parts.
  • Part 1 (light purple) having shares held by the transfer agent (ComputerShare); thus not at DTC.
  • Part 2 (light pink) having shares held at DTC (by the transfer agent's broker).
Part 1, the shares held by the transfer agent, is described by the SEC as “investor shares”. Investors (e.g., 🦧) have title to these shares and possession of them through ComputerShare and their nominee.
Part 2, the shares held at DTC, is described by the SEC as “non-investor shares” (where the prefix non- literally means “not” so literally "not investor shares"). Part 2 of the Plan shares is quite clearly described by ComputerShare and the SEC as held at DTC by ComputerShare’s broker; corroborated by the Chain of Custody above with the ledger identifying Cede & Co as holding these shares for DTC who holds shares for ComputerShare’s broker where Plan Participants are beneficial owners of these shares (per ComputerShare, above).
The main difference between the two descriptions is that ComputerShare says they typically have 10-20% of Plan shares in DTC, which yields a split between 80-20 or 90-10, whereas the SEC provides no information on the proportion of the two portions (thus illustrated simply as 50/50).
Hopefully, this settles the long-running debate once and for all.

One last thing… BE NICE

Apes are not exactly making friends with Wall St and the securities industry; and most are not the kind of friends we would want anyway. ComputerShare works as a transfer agent for issuers like GameStop so ComputerShare is pretty much the closest thing we have to a friend in industry. Paul Conn pretty clearly doesn’t like how some are accusing them of wrongdoing.
Transfer Agents, like ComputerShare, are in a fairly heavily regulated industry. There’s been no indication ComputerShare is breaking any regulations. If there’s a failure, check for gaps in the regulations first. Don’t hate the player, hate the game.
And, instead of blaming transfer agents, the SEC has already directed responsibility to the DTCC and NSCC in the SEC GameStop Report. [SuperStonk DD see section “So… who’s bag holding?”] Not the transfer agent.
Paul Conn and ComputerShare have provided time and resources engaging with and answering questions from the community. Be nice and don’t fling brown semi-solids until you’re 110% sure it’s deserved. (We must be better than Wall St.)
To Paul Conn & ComputerShare, thank you for having answered our community questions. We appreciate the clarity provided especially given the position you’re in. s/WhatCanIMakeToday/
[1] All quotes and citations within (including the post and images) are to ComputerShare’s updated FAQ on holding registered shares (which are corroborated by Paul Conn’s Q&A video); unless otherwise noted.
submitted by WhatCanIMakeToday to Superstonk [link] [comments]


2024.05.20 15:48 OilSubstantial1222 Geometry spot

Geometry Spot is a feature in Foxit PDF Editor that allows users to add precise annotations to geometric shapes within a PDF document. With this tool, users can highlight specific angles, lines, or shapes, providing clarity and emphasis to technical drawings, diagrams, or architectural plans. Geometry Spot enables accurate communication of geometric information, making it particularly useful in industries such as engineering, architecture, and design. Users can add spot words or text annotations to these geometric elements, enhancing collaboration and understanding among team members or clients.
submitted by OilSubstantial1222 to u/OilSubstantial1222 [link] [comments]


2024.05.20 07:34 TheGoblinCrow 「RAGE AGAINST THE MACHINE」

Namesake:

The band Rage Against the Machine

Appearance:

Naturally the stand takes the shape of small green sparks of electricity made of shifting lines of code. Once it enters a piece of technology the lines of code on their own take the shape of an orb with 2 eye stalks and 3 arms with a pincer claw on one hand, a plug another, and a vacuum nozzle on the third. With concentration the user can shift the shape of of the lines of code while in a piece of technology, for instance into a talking face to converse with someone, or into a rocket ship to move faster through a piece of technology

Ability:

Rage Against the Machine, while in its electrical state, has the ability to travel through any surface that is capable of conducting electricity, until it finds a piece of technology. Once it finds a piece of technology it is capable of entering the piece of technology through a point where the technology is powered, like a plug for instance. While inside it can control the technology, allowing it to function independently and perform its functions (visualized by the claw arm “controlling” it’s functions, like lowering the temperature of a refrigerator, or raising the temperature inside an oven) It also learns how the piece of technology functions, as well as any information that is involved with that, and stores that information inside itself (visualized by it using the vacuum arm to “absorbing the information”) For instance, we’re he to enter a computer it would not only store info on exactly how all the parts of the computer work, what they do, how well they do it, etc, but also any information stored on the computer drives. The amount of information it can store is based on how complex the technology it is storing the info on was. So, for something simple like a toaster, it could enter many before reaching its information “capacity”. But if it were to enter the large hadron collider, that would be the only thing it could store at that moment. Once it leaves the piece of technology (visualized by it using its plug arm to connect itself into the inside of the power source area and draining out through the “plug”) the piece of technology it was In breaks apart In several ways and is destroyed. After that it can enter another piece of technology (if it isn’t at its information capacity) or return to the user. Once it returns the user can then “deactivate” his stand, at which point the “information” inside transforms into a usb drive, which the user can access from any computer with a usb port

Stats:

Power: E
Speed: A
Range: A
Persistence: B
Precision: E
Potential: E

User:

The user’s name is Holden Maxon. As a child he was as very sick and confined to home much of the time. In order to keep him entertained Holden was allowed a lot of access to a small laptop. Naturally inquisitive, Holden would often spend his time looking up diagrams of how things worked and functioned, as well as viewing internet tutorials on how to fix various appliances and technologies around him. Over time he developed not only a knack for fixing things, but also with making them work better and function more efficiently. His greatest joy was using his knowledge and skills to find why something “didn’t work” and then not only fixing it, but making it work better. As he desired to learn more to fix things he found that he developed a mystical ability that helped him obtain and store information, his stand.
However his beloved computer had a downside, as his only social interaction was through various online forums and social media sites, where people usually aren’t at their best. He began to think of people as naturally rude, self centered, and confrontational. However, everything changed once he grew up, overcame his illnesses, and went to college. Though he was an awkward and standoffish individual, he observed that people in person were often far nicer and less volatile than online. The disconnect between what he saw of people online vs in person confused him. Upon trying to figure this disconnect he was interested by the very short amount of time social media and the internet had been in the world, as well as the rapid pace at which technology had progressed in the 20th century. He was also shocked to find the how the scale of war and international conflict had increased in this exact same timeline.
He came to the conclusion that technology had evolved at a far too fast a pace, and humanity’s evolution. In his mind, the only way to “fix” this would be to give information and technology to people at the right time, when they were more able to handle it. It was then that he felt he knew why he had developed his ability. He would obtain and store the information on the technology and knowledge that humanity amassed, then destroy that technology, until it could be redistributed to humanity when they could handle it.
Throughout the course of his mission he found the task far more daunting than he thought, and world tensions far more intense. Ever the one to want to make things work better, Holden has now begun to focus his studies in his spare time on the topic of biology, with the intent to forcibly evolve humanity (perhaps through a virus ;) I’m not apologizing for that joke) into a better state where they can handle the ever increasing technological advances.
I hope this isn’t too much, I got really into this prompt and making Fallout references work. If this wins, I want the flair, and next week's theme shall be stands with powers based on other anime series!
submitted by TheGoblinCrow to fanStands [link] [comments]


2024.05.19 22:25 wellnowholdon Preserving SketchFab Viewer Experience Offline, with Annotations

Hello hello,
If this is in the wrong place let me know.
Recently, I subscribed to a website with some embedded SketchFab models available for viewing and interaction. Resultingly, it appears that I have been granted (for an expensive and limited time) indirect access to a very rich repository of engineering models that feature various diagrams, cutaways, animations, and annotations.
This access allows for interacting with a variety of models, viewing associated educational annotations, and watching demonstrative animations that illustrate the working principles of the modeled object.
Using Chrome, via the Network tab, I am able to see some line items of interest. These are firstly, *.binz files, alongside what appear to my eye to be associated texture maps, normal files, and so on as a variety of .jpeg files. There are also links to the sketchfab.com domain and similarly structured API calls.
I am aware and have investigated the path leading to .binz extraction and conversion. That is not what I'm interested in. It is not a raw 3D model that I am seeking, it is this comprehensive experience. Having access to the base model is all well and good, but what I would like to do is preserve this "SketchFab Viewer" experience even after my membership ends with this website.
So, I would like to ask assistance.
If possible, could pointers be provided to a way for me to preserve offline the material I currently have access to? Alternatively, is there a method to somehow extract a SketchFab link that will persist after my membership expires?
Thank you.
submitted by wellnowholdon to DataHoarder [link] [comments]


2024.05.19 16:04 ezwookie12 Is hand-written text indexed & searchable on ipads

Hello folks, I'm avid reader of physical books and take lotes of notes, using highlighters & written annotations with colored pens as I read through different chapters. However this has become cumbersome as I have to carry lots of physical books with me everywhere along with stationary.
I've heard you can instead use new devices like tablets to store pdf's, epub's etc which I'm thinking to purchase one. Lots of good folks suggested me to get an ipad.
However I wanted to know whether ipad offers below features before I make purchase:
  1. Allow me to highlight text in pdf's, epub's using highlighter color of my choice
  2. Add hand-written notes/ Free-draw different diagrams within pdf using pencil
  3. Allow me to search for words which are handwritten in the pdf
What other features do you look out for before making a purchase for tablet used for reading books!
submitted by ezwookie12 to ipad [link] [comments]


2024.05.18 09:44 TheMrSanta Trying to use Create Fabric, getting this error

Crashes after hitting play on the minecraft launcher during initialization
---- Minecraft Crash Report ----
// Daisy, daisy...
Time: 2024-05-18 03:39:56
Description: Initializing game
java.lang.RuntimeException: Could not execute entrypoint stage 'main' due to errors, provided by 'create'!
at net.fabricmc.loader.impl.FabricLoaderImpl.lambda$invokeEntrypoints$2(FabricLoaderImpl.java:388) at net.fabricmc.loader.impl.util.ExceptionUtil.gatherExceptions(ExceptionUtil.java:33) at net.fabricmc.loader.impl.FabricLoaderImpl.invokeEntrypoints(FabricLoaderImpl.java:386) at net.fabricmc.loader.impl.game.minecraft.Hooks.startClient(Hooks.java:52) at net.minecraft.class\_310.(class\_310.java:458) at net.minecraft.client.main.Main.main(Main.java:211) at net.fabricmc.loader.impl.game.minecraft.MinecraftGameProvider.launch(MinecraftGameProvider.java:470) at net.fabricmc.loader.impl.launch.knot.Knot.launch(Knot.java:74) at net.fabricmc.loader.impl.launch.knot.KnotClient.main(KnotClient.java:23) 
Caused by: java.lang.ExceptionInInitializerError
at com.simibubi.create.foundation.data.CreateRegistrate.registerBlockModel(CreateRegistrate.java:267) at com.simibubi.create.foundation.data.CreateRegistrate.lambda$blockModel$11(CreateRegistrate.java:233) at com.tterrag.registrate.fabric.EnvExecutor.runWhenOn(EnvExecutor.java:10) at com.simibubi.create.foundation.data.CreateRegistrate.onClient(CreateRegistrate.java:255) at com.simibubi.create.foundation.data.CreateRegistrate.lambda$blockModel$13(CreateRegistrate.java:233) at com.tterrag.registrate.AbstractRegistrate$Registration.lambda$register$0(AbstractRegistrate.java:124) at java.base/java.util.ArrayList.forEach(ArrayList.java:1511) at com.tterrag.registrate.AbstractRegistrate$Registration.register(AbstractRegistrate.java:124) at com.tterrag.registrate.AbstractRegistrate.onRegister(AbstractRegistrate.java:217) at com.tterrag.registrate.AbstractRegistrate.lambda$register$1(AbstractRegistrate.java:189) at com.tterrag.registrate.fabric.RegistryUtil.forAllRegistries(RegistryUtil.java:12) at com.tterrag.registrate.AbstractRegistrate.register(AbstractRegistrate.java:188) at com.simibubi.create.Create.onInitialize(Create.java:115) at net.fabricmc.loader.impl.FabricLoaderImpl.invokeEntrypoints(FabricLoaderImpl.java:384) ... 6 more 
Caused by: java.lang.RuntimeException: Mixin transformation of com.simibubi.create.content.schematics.client.SchematicHotbarSlotOverlay failed
at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.getPostMixinClassByteArray(KnotClassDelegate.java:427) at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.tryLoadClass(KnotClassDelegate.java:323) at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.loadClass(KnotClassDelegate.java:218) at net.fabricmc.loader.impl.launch.knot.KnotClassLoader.loadClass(KnotClassLoader.java:119) at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:525) at com.simibubi.create.content.schematics.client.SchematicHandler.(SchematicHandler.java:77) at com.simibubi.create.CreateClient.(CreateClient.java:70) ... 20 more 
Caused by: org.spongepowered.asm.mixin.transformer.throwables.MixinTransformerError: An unexpected critical error was encountered
at org.spongepowered.asm.mixin.transformer.MixinProcessor.applyMixins(MixinProcessor.java:392) at org.spongepowered.asm.mixin.transformer.MixinTransformer.transformClass(MixinTransformer.java:234) at org.spongepowered.asm.mixin.transformer.MixinTransformer.transformClassBytes(MixinTransformer.java:202) at net.fabricmc.loader.impl.launch.knot.KnotClassDelegate.getPostMixinClassByteArray(KnotClassDelegate.java:422) ... 26 more 
Caused by: org.spongepowered.asm.mixin.throwables.MixinApplyError: Mixin [raised.mixins.json:mods.CreateMixin$SchematicHotbarSlotOverlayMixin from mod raised] from phase [DEFAULT] in config [raised.mixins.json] FAILED during APPLY
at org.spongepowered.asm.mixin.transformer.MixinProcessor.handleMixinError(MixinProcessor.java:638) at org.spongepowered.asm.mixin.transformer.MixinProcessor.handleMixinApplyError(MixinProcessor.java:589) at org.spongepowered.asm.mixin.transformer.MixinProcessor.applyMixins(MixinProcessor.java:379) ... 29 more 
Caused by: org.spongepowered.asm.mixin.injection.throwables.InvalidInjectionException: Critical injection failure: u/Redirect annotation on redirectRenderOn could not find any targets matching 'Lcom/simibubi/create/content/schematics/client/SchematicHotbarSlotOverlay;renderOn(Lnet/minecraft/class_4587;I)V' in com.simibubi.create.content.schematics.client.SchematicHotbarSlotOverlay. Using refmap raised.refmap.json [PREINJECT Applicator Phase -> raised.mixins.json:mods.CreateMixin$SchematicHotbarSlotOverlayMixin from mod raised -> Prepare Injections -> -> redirect$fnb000$raised$redirectRenderOn(Lnet/minecraft/class_1041;)I -> Parse]
at org.spongepowered.asm.mixin.injection.struct.InjectionInfo.validateTargets(InjectionInfo.java:658) at org.spongepowered.asm.mixin.injection.struct.InjectionInfo.findTargets(InjectionInfo.java:589) at org.spongepowered.asm.mixin.injection.struct.InjectionInfo.readAnnotation(InjectionInfo.java:330) at org.spongepowered.asm.mixin.injection.struct.InjectionInfo.(InjectionInfo.java:316) at org.spongepowered.asm.mixin.injection.struct.InjectionInfo.(InjectionInfo.java:308) at org.spongepowered.asm.mixin.injection.struct.RedirectInjectionInfo.(RedirectInjectionInfo.java:44) at jdk.internal.reflect.GeneratedConstructorAccessor65.newInstance(Unknown Source) at java.base/jdk.internal.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) at java.base/java.lang.reflect.Constructor.newInstanceWithCaller(Constructor.java:499) at java.base/java.lang.reflect.Constructor.newInstance(Constructor.java:480) at org.spongepowered.asm.mixin.injection.struct.InjectionInfo$InjectorEntry.create(InjectionInfo.java:149) at org.spongepowered.asm.mixin.injection.struct.InjectionInfo.parse(InjectionInfo.java:710) at org.spongepowered.asm.mixin.transformer.MixinTargetContext.prepareInjections(MixinTargetContext.java:1329) at org.spongepowered.asm.mixin.transformer.MixinApplicatorStandard.prepareInjections(MixinApplicatorStandard.java:1053) at org.spongepowered.asm.mixin.transformer.MixinApplicatorStandard.applyMixin(MixinApplicatorStandard.java:395) at org.spongepowered.asm.mixin.transformer.MixinApplicatorStandard.apply(MixinApplicatorStandard.java:327) at org.spongepowered.asm.mixin.transformer.TargetClassContext.apply(TargetClassContext.java:422) at org.spongepowered.asm.mixin.transformer.TargetClassContext.applyMixins(TargetClassContext.java:403) at org.spongepowered.asm.mixin.transformer.MixinProcessor.applyMixins(MixinProcessor.java:363) ... 29 more 
A detailed walkthrough of the error, its code path and all known details is as follows:
-- Head --
Thread: Render thread
Stacktrace:
at net.fabricmc.loader.impl.FabricLoaderImpl.lambda$invokeEntrypoints$2(FabricLoaderImpl.java:388) at net.fabricmc.loader.impl.util.ExceptionUtil.gatherExceptions(ExceptionUtil.java:33) at net.fabricmc.loader.impl.FabricLoaderImpl.invokeEntrypoints(FabricLoaderImpl.java:386) at net.fabricmc.loader.impl.game.minecraft.Hooks.startClient(Hooks.java:52) at net.minecraft.class\_310.(class\_310.java:458) 
-- Initialization --
Details:
Modules: ADVAPI32.dll:Advanced Windows 32 Base API:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation COMCTL32.dll:User Experience Controls Library:6.10 (WinBuild.160101.0800):Microsoft Corporation CRYPT32.dll:Crypto API32:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation CRYPTBASE.dll:Base cryptographic API DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation CRYPTSP.dll:Cryptographic Service Provider API:10.0.22621.2506 (WinBuild.160101.0800):Microsoft Corporation DBGHELP.DLL:Windows Image Helper:10.0.22621.3593 (WinBuild.160101.0800):Microsoft Corporation DNSAPI.dll:DNS Client API DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation GDI32.dll:GDI Client DLL:10.0.22621.3085 (WinBuild.160101.0800):Microsoft Corporation IMM32.DLL:Multi-User Windows IMM32 API Client DLL:10.0.22621.3374 (WinBuild.160101.0800):Microsoft Corporation IPHLPAPI.DLL:IP Helper API:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation KERNEL32.DLL:Windows NT BASE API Client DLL:10.0.22621.3374 (WinBuild.160101.0800):Microsoft Corporation KERNELBASE.dll:Windows NT BASE API Client DLL:10.0.22621.3374 (WinBuild.160101.0800):Microsoft Corporation MpOav.dll:IOfficeAntiVirus Module:4.18.24040.4 (aa69a05caa955e1cebcc4d2dd249082d41b510c2):Microsoft Corporation NSI.dll:NSI User-mode interface DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation NTASN1.dll:Microsoft ASN.1 API:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation OLEAUT32.dll:OLEAUT32.DLL:10.0.22621.3527 (WinBuild.160101.0800):Microsoft Corporation Ole32.dll:Microsoft OLE for Windows:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation POWRPROF.dll:Power Profile Helper DLL:10.0.22621.3374 (WinBuild.160101.0800):Microsoft Corporation PSAPI.DLL:Process Status Helper:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation Pdh.dll:Windows Performance Data Helper DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation RPCRT4.dll:Remote Procedure Call Runtime:10.0.22621.2506 (WinBuild.160101.0800):Microsoft Corporation SHCORE.dll:SHCORE:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation SHELL32.dll:Windows Shell Common Dll:10.0.22621.2792 (WinBuild.160101.0800):Microsoft Corporation UMPDC.dll:User Mode Power Dependency Coordinator:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation USER32.dll:Multi-User Windows USER API Client DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation USERENV.dll:Userenv:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation VCRUNTIME140.dll:Microsoft® C Runtime Library:14.29.30139.0 built by: vcwrkspc:Microsoft Corporation VERSION.dll:Version Checking and File Installation Libraries:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation WINHTTP.dll:Windows HTTP Services:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation WINMM.dll:MCI API DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation WS2\_32.dll:Windows Socket 2.0 32-Bit DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation WSOCK32.dll:Windows Socket 32-Bit DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation amsi.dll:Anti-Malware Scan Interface:10.0.22621.3527 (WinBuild.160101.0800):Microsoft Corporation apphelp.dll:Application Compatibility Client Library:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation awt.dll:OpenJDK Platform binary:17.0.8.0:Microsoft bcrypt.dll:Windows Cryptographic Primitives Library:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation bcryptPrimitives.dll:Windows Cryptographic Primitives Library:10.0.22621.3374 (WinBuild.160101.0800):Microsoft Corporation clbcatq.dll:COM+ Configuration Catalog:2001.12.10941.16384 (WinBuild.160101.0800):Microsoft Corporation combase.dll:Microsoft COM for Windows:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation dbgcore.DLL:Windows Core Debugging Helpers:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation dhcpcsvc.DLL:DHCP Client Service:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation dhcpcsvc6.DLL:DHCPv6 Client:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation fwpuclnt.dll:FWP/IPsec User-Mode API:10.0.22621.2506 (WinBuild.160101.0800):Microsoft Corporation gdi32full.dll:GDI Client DLL:10.0.22621.3527 (WinBuild.160101.0800):Microsoft Corporation glfw.dll:GLFW 3.4.0 DLL:3.4.0:GLFW java.dll:OpenJDK Platform binary:17.0.8.0:Microsoft javaw.exe:OpenJDK Platform binary:17.0.8.0:Microsoft jemalloc.dll jimage.dll:OpenJDK Platform binary:17.0.8.0:Microsoft jli.dll:OpenJDK Platform binary:17.0.8.0:Microsoft jna4234201223904327453.dll:JNA native library:6.1.4:Java(TM) Native Access (JNA) jsvml.dll:OpenJDK Platform binary:17.0.8.0:Microsoft jvm.dll:OpenJDK 64-Bit server VM:17.0.8.0:Microsoft kernel.appcore.dll:AppModel API Host:10.0.22621.2715 (WinBuild.160101.0800):Microsoft Corporation lwjgl.dll management.dll:OpenJDK Platform binary:17.0.8.0:Microsoft management\_ext.dll:OpenJDK Platform binary:17.0.8.0:Microsoft msvcp140.dll:Microsoft® C Runtime Library:14.29.30139.0 built by: vcwrkspc:Microsoft Corporation msvcp\_win.dll:Microsoft® C Runtime Library:10.0.22621.3374 (WinBuild.160101.0800):Microsoft Corporation msvcrt.dll:Windows NT CRT DLL:7.0.22621.2506 (WinBuild.160101.0800):Microsoft Corporation mswsock.dll:Microsoft Windows Sockets 2.0 Service Provider:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation napinsp.dll:E-mail Naming Shim Provider:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation ncrypt.dll:Windows NCrypt Router:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation net.dll:OpenJDK Platform binary:17.0.8.0:Microsoft nio.dll:OpenJDK Platform binary:17.0.8.0:Microsoft nlansp\_c.dll:NLA Namespace Service Provider DLL:10.0.22621.3593 (WinBuild.160101.0800):Microsoft Corporation ntdll.dll:NT Layer DLL:10.0.22621.3374 (WinBuild.160101.0800):Microsoft Corporation perfos.dll:Windows System Performance Objects DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation pfclient.dll:SysMain Client:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation pnrpnsp.dll:PNRP Name Space Provider:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation profapi.dll:User Profile Basic API:10.0.22621.3527 (WinBuild.160101.0800):Microsoft Corporation rasadhlp.dll:Remote Access AutoDial Helper:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation rsaenh.dll:Microsoft Enhanced Cryptographic Provider:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation sechost.dll:Host for SCM/SDDL/LSA Lookup APIs:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation shlwapi.dll:Shell Light-weight Utility Library:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation sunmscapi.dll:OpenJDK Platform binary:17.0.8.0:Microsoft ucrtbase.dll:Microsoft® C Runtime Library:10.0.22621.3593 (WinBuild.160101.0800):Microsoft Corporation vcruntime140\_1.dll:Microsoft® C Runtime Library:14.29.30139.0 built by: vcwrkspc:Microsoft Corporation verify.dll:OpenJDK Platform binary:17.0.8.0:Microsoft win32u.dll:Win32u:10.0.22621.3593 (WinBuild.160101.0800):Microsoft Corporation windows.storage.dll:Microsoft WinRT Storage API:10.0.22621.3527 (WinBuild.160101.0800):Microsoft Corporation winrnr.dll:LDAP RnR Provider DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation wintypes.dll:Windows Base Types DLL:10.0.22621.1 (WinBuild.160101.0800):Microsoft Corporation wshbth.dll:Windows Sockets Helper DLL:10.0.22621.3374 (WinBuild.160101.0800):Microsoft Corporation zip.dll:OpenJDK Platform binary:17.0.8.0:Microsoft 
Stacktrace:
at net.minecraft.client.main.Main.main(Main.java:211) at net.fabricmc.loader.impl.game.minecraft.MinecraftGameProvider.launch(MinecraftGameProvider.java:470) at net.fabricmc.loader.impl.launch.knot.Knot.launch(Knot.java:74) at net.fabricmc.loader.impl.launch.knot.KnotClient.main(KnotClient.java:23) 
-- System Details --
Details:
Minecraft Version: 1.20.1 Minecraft Version ID: 1.20.1 Operating System: Windows 11 (amd64) version 10.0 Java Version: 17.0.8, Microsoft Java VM Version: OpenJDK 64-Bit Server VM (mixed mode), Microsoft Memory: 224617272 bytes (214 MiB) / 687865856 bytes (656 MiB) up to 11744051200 bytes (11200 MiB) CPUs: 32 Processor Vendor: GenuineIntel Processor Name: 13th Gen Intel(R) Core(TM) i9-13900KF Identifier: Intel64 Family 6 Model 183 Stepping 1 Microarchitecture: unknown Frequency (GHz): 3.00 Number of physical packages: 1 Number of physical CPUs: 24 Number of logical CPUs: 32 Graphics card #0 name: Virtual Desktop Monitor Graphics card #0 vendor: Virtual Desktop, Inc. Graphics card #0 VRAM (MB): 0.00 Graphics card #0 deviceId: unknown Graphics card #0 versionInfo: DriverVersion=15.39.56.845 Graphics card #1 name: NVIDIA GeForce RTX 4070 Ti Graphics card #1 vendor: NVIDIA (0x10de) Graphics card #1 VRAM (MB): 4095.00 Graphics card #1 deviceId: 0x2782 Graphics card #1 versionInfo: DriverVersion=31.0.15.5222 Memory slot #0 capacity (MB): 16384.00 Memory slot #0 clockSpeed (GHz): 4.80 Memory slot #0 type: Unknown Memory slot #1 capacity (MB): 16384.00 Memory slot #1 clockSpeed (GHz): 4.80 Memory slot #1 type: Unknown Virtual memory max (MB): 76441.78 Virtual memory used (MB): 21619.83 Swap memory total (MB): 43840.00 Swap memory used (MB): 148.09 JVM Flags: 4 total; -XX:HeapDumpPath=MojangTricksIntelDriversForPerformance\_javaw.exe\_minecraft.exe.heapdump -Xss1M -Xmx11200m -Xms256m Fabric Mods: advancementplaques: Advancement Plaques 1.4.11 ambientenvironment: Ambient Environment [11.0.0.1](http://11.0.0.1) animatica: Animatica 0.6+1.20 appleskin: AppleSkin 2.5.1+mc1.20 architectury: Architectury 9.1.12 balm-fabric: Balm 7.1.4 betteradvancements: Better Advancements [0.3.2.161](http://0.3.2.161) bettercombat: Better Combat 1.8.5+1.20.1 betterstats: Better Statistics Screen 3.0.0-alpha.2+fabric-1.20.1 tcdcommons: TCD Commons API 3.0.0-alpha.2+fabric-1.20.1 bettertaskbar: Better Taskbar 1.7.0 betterthirdperson: Better Third Person 1.9.0 bhmenu: BHMenu-Fabric 2.4.1 blur: Blur (Fabric) 3.1.0 midnightlib: MidnightLib 1.4.1 satin: Satin 1.13.0 bobby: Bobby 5.0.1 com\_typesafe\_config: config 1.4.2 io\_leangen\_geantyref\_geantyref: geantyref 1.3.13 org\_spongepowered\_configurate-core: configurate-core 4.1.2 org\_spongepowered\_configurate-hocon: configurate-hocon 4.1.2 bookshelf: Bookshelf 20.0.4 brandedlogs: Branded Logs Fabric 1.0.1 bsvsb: Better Sodium Video Settings Button 3.0.3 camerautils: Camera Utils 1.20.1-1.0.5 capes: Capes 1.5.2+1.20 chat\_heads: Chat Heads 0.10.20 cherishedworlds: Cherished Worlds 6.1.2+1.20.1 chunksfadein: Chunks Fade In 1.0.5-1.20.1 com\_moandjiezana\_toml\_toml4j: toml4j 0.7.2 crowdin-translate: CrowdinTranslate 1.4+1.19.3 citresewn: CIT Resewn 1.1.3+1.20 citresewn-defaults: CIT Resewn: Defaults 1.1.3+1.20 cleanview: CleanView 1.20.1-v1-fabric cleardespawn: Clear Despawn 1.1.13 clienttweaks: Client Tweaks 11.1.0 cloth-config: Cloth Config v11 11.1.106 cloth-basic-math: cloth-basic-math 0.6.1 collective: Collective 7.57 connectivity: Connectivity Mod 1.20.1-4.5 continuity: Continuity 3.0.0-beta.5+1.20.1 controlling: Controlling For Fabric 12.0.2 craterlib: CraterLib 1.0.2 create: Create 0.5.1-f-build.1417+mc1.20.1 com\_electronwill\_night-config\_core: core 3.6.6 com\_electronwill\_night-config\_toml: toml 3.6.6 com\_google\_code\_findbugs\_jsr305: jsr305 3.0.2 flywheel: Flywheel 0.6.10-2 milk: Milk Lib 1.2.60 
dripstone_fluid_lib: Dripstone Fluid Lib 3.0.2
 porting\_lib\_accessors: Porting Lib Accessors 2.3.2+1.20.1 porting\_lib\_base: Porting Lib Base 2.3.2+1.20.1 
porting_lib_attributes: Porting Lib Attributes 2.3.2+1.20.1
porting_lib_common: Porting Lib Common 2.3.2+1.20.1
porting_lib_config: Porting Lib Config 2.3.2+1.20.1
porting_lib_lazy_registration: Porting Lib Lazy Register 2.3.2+1.20.1
porting_lib_mixin_extensions: Porting Lib Mixin Extensions 2.3.2+1.20.1
porting_lib_utility: Porting Lib Utility 2.3.2+1.20.1
 porting\_lib\_brewing: Porting Lib Brewing 2.3.2+1.20.1 porting\_lib\_client\_events: Porting Lib Client Events 2.3.2+1.20.1 porting\_lib\_entity: Porting Lib Entity 2.3.2+1.20.1 porting\_lib\_extensions: Porting Lib Extensions 2.3.2+1.20.1 porting\_lib\_models: Porting Lib Models 2.3.2+1.20.1 
porting_lib_core: Porting Lib Core 2.3.2+1.20.1
porting_lib_fluids: Porting Lib Fluids 2.3.2+1.20.1
porting_lib_model_loader: Porting Lib Model Loader 2.3.2+1.20.1
 porting\_lib\_networking: Porting Lib Networking 2.3.2+1.20.1 porting\_lib\_obj\_loader: Porting Lib Obj Loader 2.3.2+1.20.1 porting\_lib\_tags: Porting Lib Tags 3.0 porting\_lib\_tool\_actions: Porting Lib Tool Actions 2.3.2+1.20.1 porting\_lib\_transfer: Porting Lib Transfer 2.3.2+1.20.1 reach-entity-attributes: Reach Entity Attributes 2.4.0 registrate-fabric: Registrate for Fabric 1.3.62-MC1.20.1 
porting_lib_data: Porting Lib Data 2.1.1090+1.20
porting_lib_model_generators: Porting Lib Model Generators 2.1.1090+1.20
porting_lib_gametest: Porting Lib GameTest 2.1.1090+1.20
porting_lib_model_materials: Porting Lib Model Materials 2.1.1090+1.20
 cupboard: cupboard 1.20.1-2.0 dark-loading-screen: Dark Loading Screen 1.6.14 dcch: DCCH 1.2 debugify: Debugify 1.20.1+2.0 detailab: Detail Armor Bar 2.6.3+1.20.1-fabric distanthorizons: Distant Horizons 2.0.4-a-dev dynamic\_fps: Dynamic FPS 3.1.0 e4mc\_minecraft: e4mc 4.0.1 easyanvils: Easy Anvils 8.0.2 easymagic: Easy Magic 8.0.1 eatinganimationid: Eating Animation 1.20+1.9.61 enchdesc: EnchantmentDescriptions 17.0.8 enhancedblockentities: Enhanced Block Entities 0.9+1.20 advanced\_runtime\_resource\_pack: Runtime Resource Pack 0.6.7 spruceui: SpruceUI 5.0.0+1.20 entity\_model\_features: Entity Model Features 2.0.2 entity\_texture\_features: Entity Texture Features 6.0.1 org\_apache\_httpcomponents\_httpmime: httpmime 4.5.10 entityculling: EntityCulling-Fabric 1.6.2-mc1.20.1 equipmentcompare: Equipment Compare 1.3.7 cardinal-components-base: Cardinal Components API (base) 5.2.0 cardinal-components-entity: Cardinal Components API (entities) 5.2.0 exordium: Exordium 1.2.1-mc1.20.1 fabric-api: Fabric API 0.92.0+1.20.1 fabric-api-base: Fabric API Base 0.4.31+1802ada577 fabric-api-lookup-api-v1: Fabric API Lookup API (v1) 1.6.36+1802ada577 fabric-biome-api-v1: Fabric Biome API (v1) 13.0.13+1802ada577 fabric-block-api-v1: Fabric Block API (v1) 1.0.11+1802ada577 fabric-block-view-api-v2: Fabric BlockView API (v2) 1.0.1+1802ada577 fabric-blockrenderlayer-v1: Fabric BlockRenderLayer Registration (v1) 1.1.41+1802ada577 fabric-client-tags-api-v1: Fabric Client Tags 1.1.2+1802ada577 fabric-command-api-v1: Fabric Command API (v1) 1.2.34+f71b366f77 fabric-command-api-v2: Fabric Command API (v2) 2.2.13+1802ada577 fabric-commands-v0: Fabric Commands (v0) 0.2.51+df3654b377 fabric-containers-v0: Fabric Containers (v0) 0.1.64+df3654b377 fabric-content-registries-v0: Fabric Content Registries (v0) 4.0.11+1802ada577 fabric-convention-tags-v1: Fabric Convention Tags 1.5.5+1802ada577 fabric-crash-report-info-v1: Fabric Crash Report Info (v1) 0.2.19+1802ada577 fabric-data-attachment-api-v1: Fabric Data Attachment API (v1) 1.0.0+de0fd6d177 fabric-data-generation-api-v1: Fabric Data Generation API (v1) 12.3.4+1802ada577 fabric-dimensions-v1: Fabric Dimensions API (v1) 2.1.54+1802ada577 fabric-entity-events-v1: Fabric Entity Events (v1) 1.6.0+1c78457f77 fabric-events-interaction-v0: Fabric Events Interaction (v0) 0.6.2+1802ada577 fabric-events-lifecycle-v0: Fabric Events Lifecycle (v0) 0.2.63+df3654b377 fabric-game-rule-api-v1: Fabric Game Rule API (v1) 1.0.40+1802ada577 fabric-item-api-v1: Fabric Item API (v1) 2.1.28+1802ada577 fabric-item-group-api-v1: Fabric Item Group API (v1) 4.0.12+1802ada577 fabric-key-binding-api-v1: Fabric Key Binding API (v1) 1.0.37+1802ada577 fabric-keybindings-v0: Fabric Key Bindings (v0) 0.2.35+df3654b377 fabric-lifecycle-events-v1: Fabric Lifecycle Events (v1) 2.2.22+1802ada577 fabric-loot-api-v2: Fabric Loot API (v2) 1.2.1+1802ada577 fabric-loot-tables-v1: Fabric Loot Tables (v1) 1.1.45+9e7660c677 fabric-message-api-v1: Fabric Message API (v1) 5.1.9+1802ada577 fabric-mining-level-api-v1: Fabric Mining Level API (v1) 2.1.50+1802ada577 fabric-model-loading-api-v1: Fabric Model Loading API (v1) 1.0.3+1802ada577 fabric-models-v0: Fabric Models (v0) 0.4.2+9386d8a777 fabric-networking-api-v1: Fabric Networking API (v1) 1.3.11+1802ada577 fabric-networking-v0: Fabric Networking (v0) 0.3.51+df3654b377 fabric-object-builder-api-v1: Fabric Object Builder API (v1) 11.1.3+1802ada577 fabric-particles-v1: Fabric Particles (v1) 1.1.2+1802ada577 fabric-recipe-api-v1: Fabric Recipe API (v1) 1.0.21+1802ada577 fabric-registry-sync-v0: Fabric Registry Sync (v0) 2.3.3+1802ada577 fabric-renderer-api-v1: Fabric Renderer API (v1) 3.2.1+1802ada577 fabric-renderer-indigo: Fabric Renderer - Indigo 1.5.1+1802ada577 fabric-renderer-registries-v1: Fabric Renderer Registries (v1) 3.2.46+df3654b377 fabric-rendering-data-attachment-v1: Fabric Rendering Data Attachment (v1) 0.3.37+92a0d36777 fabric-rendering-fluids-v1: Fabric Rendering Fluids (v1) 3.0.28+1802ada577 fabric-rendering-v0: Fabric Rendering (v0) 1.1.49+df3654b377 fabric-rendering-v1: Fabric Rendering (v1) 3.0.8+1802ada577 fabric-resource-conditions-api-v1: Fabric Resource Conditions API (v1) 2.3.8+1802ada577 fabric-resource-loader-v0: Fabric Resource Loader (v0) 0.11.10+1802ada577 fabric-screen-api-v1: Fabric Screen API (v1) 2.0.8+1802ada577 fabric-screen-handler-api-v1: Fabric Screen Handler API (v1) 1.3.30+1802ada577 fabric-sound-api-v1: Fabric Sound API (v1) 1.0.13+1802ada577 fabric-transfer-api-v1: Fabric Transfer API (v1) 3.3.4+1802ada577 fabric-transitive-access-wideners-v1: Fabric Transitive Access Wideners (v1) 4.3.1+1802ada577 fabric-language-kotlin: Fabric Language Kotlin 1.10.10+kotlin.1.9.10 org\_jetbrains\_kotlin\_kotlin-reflect: kotlin-reflect 1.9.10 org\_jetbrains\_kotlin\_kotlin-stdlib: kotlin-stdlib 1.9.10 org\_jetbrains\_kotlin\_kotlin-stdlib-jdk7: kotlin-stdlib-jdk7 1.9.10 org\_jetbrains\_kotlin\_kotlin-stdlib-jdk8: kotlin-stdlib-jdk8 1.9.10 org\_jetbrains\_kotlinx\_atomicfu-jvm: atomicfu-jvm 0.22.0 org\_jetbrains\_kotlinx\_kotlinx-coroutines-core-jvm: kotlinx-coroutines-core-jvm 1.7.3 org\_jetbrains\_kotlinx\_kotlinx-coroutines-jdk8: kotlinx-coroutines-jdk8 1.7.3 org\_jetbrains\_kotlinx\_kotlinx-datetime-jvm: kotlinx-datetime-jvm 0.4.0 org\_jetbrains\_kotlinx\_kotlinx-serialization-cbor-jvm: kotlinx-serialization-cbor-jvm 1.6.0 org\_jetbrains\_kotlinx\_kotlinx-serialization-core-jvm: kotlinx-serialization-core-jvm 1.6.0 org\_jetbrains\_kotlinx\_kotlinx-serialization-json-jvm: kotlinx-serialization-json-jvm 1.6.0 fabricloader: Fabric Loader 0.15.10 mixinextras: MixinExtras 0.3.5 fabricskyboxes: FabricSkyBoxes 0.7.2+mc1.20.1 fallingleaves: Falling Leaves 1.15.6 fancymenu: FancyMenu 2.14.9 fastload: Fast Load 3.4.0 conditional-mixin: conditional mixin 0.3.2 fastload-119-0-1-2-compat: Fastload 1.19-0-1-2 Compatibility 3.4.0 fastload-1193-compat: Fastload 1.19.3 Compatibility 3.4.0 fastload-1194-compat: Fastload 1.19.4 Compat 3.4.0 fastload\_fapi\_forward: Fastload Fabric-api Forwarding 1.0.2 fastquit: FastQuit 3.0.0+1.20+ ferritecore: FerriteCore 6.0.0 forgeconfigapiport: Forge Config API Port 8.0.0 iceberg: Iceberg 1.1.15 immersive\_aircraft: Immersive Aircraft 1.0.1+1.20.1 org\_mariuszgromada\_math\_mathparser\_org-mxparser: MathParser.org-mXparser 5.2.1 immersive\_melodies: Immersive Melodies 0.1.0+1.20.1 immersive\_paintings: Immersive Paintings 0.6.7+1.20.1 indium: Indium 1.0.30+mc1.20.4 inventoryprofilesnext: Inventory Profiles Next 1.10.7 iris: Iris 1.7.0+mc1.20.1 io\_github\_douira\_glsl-transformer: glsl-transformer 2.0.0-pre13 org\_anarres\_jcpp: jcpp 1.4.14 org\_antlr\_antlr4-runtime: antlr4-runtime 4.11.1 irisflw: Iris Flywheel Compat 0.2.5 itemswapper: ItemSwapper 0.5.3-mc1.20.1 java: OpenJDK 64-Bit Server VM 17 konkrete: Konkrete 1.6.1 lambdynlights: LambDynamicLights 2.3.2+1.20.1 pride: Pride Lib 1.2.0+1.19.4 languagereload: Language Reload 1.5.8+1.20.1 lanserverproperties: Lan Server Properties 1.11 legendarytooltips: Legendary Tooltips 1.4.4 libipn: libIPN 4.0.0 lilac: LiLaC 1.0.0-beta.2 litematica: Litematica 0.15.3 lithium: Lithium 0.11.2 loadmyresources: Load My Resources 1.0.4 make\_bubbles\_pop: Make Bubbles Pop Mod 0.2.0-fabric malilib: MaLiLib 0.16.2 maptooltip: Map Tooltip 3.0.0 minecraft: Minecraft 1.20.1 minihud: MiniHUD 0.27.0 mkb: ModernKeyBinding 1.2.1 modelfix: Model Gap Fix 1.14 modmenu: Mod Menu 7.2.2 mousetweaks: Mouse Tweaks 2.25 namepain: Name Pain 1.5.2 nochatreports: No Chat Reports 1.20.1-v2.2.2 notenoughanimations: NotEnoughAnimations 1.7.3 optigui: OptiGUI 2.2.0-alpha.1 org\_apache\_commons\_commons-text: commons-text 1.10.0 org\_ini4j\_ini4j: ini4j 0.5.4 pickupnotifier: Pick Up Notifier 8.0.0 player-animator: Player Animator 1.0.2-rc1+1.20 presencefootsteps: Presence Footsteps 1.9.4+1.20.1 kirin: Kirin UI 1.15.6+1.20.1 prism: Prism 1.0.5 puzzleslib: Puzzles Lib 8.1.19 puzzlesaccessapi: Puzzles Access Api 8.0.7 raised: Raised 1.2.3 realisticsleep: Realistic Sleep 1.10.2+mc1.20-1.20.1 server\_translations\_api: Server Translations API 2.0.0+1.20 
packet_tweaker: Packet Tweaker 0.4.0+1.19.4
 replanter: Replanter 1.3 roughlyenoughitems: Roughly Enough Items 12.0.652 error\_notifier: Error Notifier 1.0.9 roughlyenoughprofessions: Roughly Enough Professions 2.0.1 roughlyenoughresources: Roughly Enough Resources 2.9.0 searchables: Searchables 1.0.1 shulkerboxtooltip: Shulker Box Tooltip 4.0.4+1.20.1 simple-rpc: Simple RPC 3.2.2 me\_hypherionmc\_simplerpc\_simple-rpc-common: simple-rpc-common 5.0.0 skinlayers3d: 3d-Skin-Layers 1.6.4 smoothchunk: Smooth chunk save Mod 1.20.1-3.2 smoothswapping: Smooth Swapping [0.9.3.1](http://0.9.3.1) sodium: Sodium 0.5.8+mc1.20.1 starlight: Starlight 1.1.2+fabric.dbc156f status-effect-bars: Status Effect Bars 1.0.3 tectonic: Tectonic 2.3.4 terralith: Terralith 2.5.1 toms\_storage: Tom's Simple Storage Mod 1.6.6 toolstats: ToolStats 16.0.3 tweakeroo: Tweakeroo 0.17.1 villagernames: Villager Names 7.3 visuality: Visuality 0.7.1+1.20 visualworkbench: Visual Workbench 8.0.0 voicechat: Simple Voice Chat 1.20.1-2.4.24 waterdripsound: Drip Sounds 1.19-0.3.2 waveycapes: WaveyCapes 1.3.2 xaerominimapfair: Xaero's Minimap 23.6.3 xaeroworldmap: Xaero's World Map 1.34.1 yet\_another\_config\_lib\_v3: YetAnotherConfigLib 3.1.1+1.20 com\_twelvemonkeys\_common\_common-image: common-image 3.10.0-SNAPSHOT com\_twelvemonkeys\_common\_common-io: common-io 3.10.0-SNAPSHOT com\_twelvemonkeys\_common\_common-lang: common-lang 3.10.0-SNAPSHOT com\_twelvemonkeys\_imageio\_imageio-core: imageio-core 3.10.0-SNAPSHOT com\_twelvemonkeys\_imageio\_imageio-metadata: imageio-metadata 3.10.0-SNAPSHOT com\_twelvemonkeys\_imageio\_imageio-webp: imageio-webp 3.10.0-SNAPSHOT yosbr: YOSBR 0.1.2 zoomify: Zoomify 2.11.2 com\_akuleshov7\_ktoml-core-jvm: ktoml-core-jvm 0.4.1 dev\_isxander\_settxi\_settxi-core: settxi-core 2.10.6 dev\_isxander\_settxi\_settxi-kotlinx-serialization: settxi-kotlinx-serialization 2.10.6 Flywheel Backend: Uninitialized Launched Version: fabric-loader-0.15.10-1.20.1 Backend library: LWJGL version 3.3.1 SNAPSHOT Backend API: Unknown Window size:  GL Caps: Using framebuffer using OpenGL 3.2 GL debug messages:  Using VBOs: Yes Is Modded: Definitely; Client brand changed to 'fabric' Type: Client (map\_client.txt) CPU:  
submitted by TheMrSanta to fabricmc [link] [comments]


2024.05.15 09:14 papajhonspro14 THE BIGGEST CLUTCH OF MY ACADEMIC LIFE

THE BIGGEST CLUTCH OF MY ACADEMIC LIFE
I WAS LITERALLY SO BURNT OUT YESTERDAY DUE TO THE HEAVY LOAD OF PHYSICS AND CHEMISTRY PAPERS. DIDN'T EVEN HAVE THE ENERGY TOO LOOK AT THE BOOK😭😭. SO I DECIDED TO STUDY THROUGH THE MARK SCHEME OF LAST YEARS SPECIMEN AND MAY JUNE VARIENTS. I ALSO FOUND OUT YESTERDAY THAT ANNOTATION DIAGRAMS 💀💀WARE A THING TOO 😭😭😭😭😭. TODAY'S PAPER WAS EXTREMELY EASY AND WAS LITERALLY 50% OF THE MARK SCHEME I SAW. CAN'T EXPRESS HOW HAPPY I AM. I LITERALLY SCREENSHOTED THIS DIAGRAM YESTERDAY AND LEARNED IT AS IT IS. ITS A MIRACLE THAT SOMETHING YOU LEARN WORD TO WORD APPEARS IN YOUR EXAM 😍😍😍😍😍
submitted by papajhonspro14 to Olevels [link] [comments]


2024.05.14 16:07 ProfessorPorg CCEA AS1 Physical Geography

Bro what even was that lol. One of the 15 mark questions (which have been essay based in every previous paper) asked to draw 2 annotated diagrams to support your answer which is new I guess but I really didn't expect that as it has never been done before. Feel free to share opinions below. I think it was a fun challenge that was unexpected but the wording of the question was a bit confusing making it sound like you were supposed to already have diagrams to use at first, but no you had to draw and annotate them yourself.
submitted by ProfessorPorg to alevel [link] [comments]


2024.05.14 15:55 IWillCube Questions / Suggestions for LaTeX workflow using iPad (for notetaking)

Hi, I am studying maths and currently use LaTeX to take my notes in class in real time. This has been effective so far, however the main drawback appears to be when my lecturer draws diagrams to make examples clearer, I have no real way of doing this in LaTeX at the moment. For context, here is a snippet from my notes. I have a few potential methods:
Some ideas I have had yet not been able to find anything about online:
If anyone has had any similar experience, please let me know.
submitted by IWillCube to LaTeX [link] [comments]


2024.05.13 23:12 A-TierTutoring A Comprehensive Guide to the LSAT: Insights from a 174-Scoring 0L

Hey everyone! I thought I'd repost this on my new profile (previously u/-Legal-Eagle-) for your reference before it is removed from my old profile. Also, if you find my advice useful, please check out my profile for more advice or tutoring services. Feel free to comment or DM me if you need anything.
With my LSAT and law school admissions journey complete, I wanted to take the time to share my journey and hopefully provide some useful tips along the way. I'm sure you will have heard a lot of what I am about to say a thousand times over, but I thought it might be useful to provide a holistic and comprehensive guide that attempts to bring together some of the best advice that I have picked up throughout this process.
Also, this is meant for anyone and everyone including those who haven't even began to think about the LSAT and those with multiple official exams already under their belt. I am going to use some more specific LSAT jargon meant for those with some familiarity with the test, but there will be many general tips for everyone scattered throughout.
I would like to preface by saying that this is largely based on my own personal experience self-studying, tutoring, and working with others. Please consult with many different sources and do your due diligence as you consider each tip I provide. Without further ado, here is my humble attempt at a guide to the LSAT.
When I first began the LSAT grind, I scored in the low 150s on my diagnostic exam, and while this was disheartening at first, I eventually achieved an official exam score of 174 after approximately 5 months of studying. Since I self-studied for the large majority of my journey, I found myself running into various obstacles and having to continuously refine my roadmap to success. Rather than go through the same process of trial and error that I went through, here is the roadmap outline that I would follow if I were to start all over again from blind diagnostic to test day success:
1. Start with a BLIND Diagnostic Exam:
While this might seem quite obvious to the more experienced of you, many beginners, including myself at the start of this process, do not know where to begin and might be stuck in a paradox of choice. The best way to get started is to take a completely blind practice exam. Try not to expose yourself to any LSAT study materials beforehand and go into the diagnostic exam knowing as little about the exam as possible. You might be tempted to study beforehand to avoid the disappointment of a low diagnostic score, but you must resist this temptation to avoid any misguided preconceptions or bad habits. Through this diagnostic, you will be able to truly identify your foundational strengths and weaknesses which you could and should revisit throughout your studying journey.
2. Decide on your plan of attack:
A mistake that many beginners make after deciding to take the LSAT is jumping into studying without having a structured and thoughtful plan, leading to inefficiencies, lack of focus, and inconsistency. One of the most important factors of success on this exam is the formation of good habits, and you cannot form good habits without a consistent, efficient, and disciplined study plan. There is no one size fits all approach to studying for this exam. However, here are some questions you should ask yourself to find the right plan for you:
What is your goal score? Your answer to this question depends on your long-term goals. Research which law schools would be most suitable for you based on their location, employment data, faculty, administration, student groups, journals, etc. After you put together a tentative list of law schools, look up what their median GPA and median LSAT is for their most recent enrolled class. If your undergraduate GPA (and law schools mainly care about your undergraduate GPA, so do not include any further education) is below their median GPA, then you should probably aim to surpass their median LSAT by at least a few points. However, if your undergraduate GPA is at or above their median GPA, then you should still aim to surpass their median LSAT, but you will still be in a strong position if you score at their median LSAT. After this research, you should have a goal score range by which you can gauge your progress and adjust your studying.
What is your timeline for taking the exam? Setting a timeline for your studying is important to staying focused and disciplined. Decide on which official exam you will be sitting for and then make a study schedule that allows for at least 150-300 hours of studying leading up to the exam. For example, if you are planning to take the August exam, you have approximately 13 weeks to study. Hence, you should dedicate yourself to studying 15-25 hours per week until the exam. Of course, the number of total hours you study depends on your diagnostic score and your goal score, as well as how quickly you progress while studying. If you find that halfway through your study schedule, your score has not substantially improved or you still have to make significant progress to reach your goal score, you may decide to ramp up your study time to 30 hours per week. The most important step here is that you commit to consistent study time, and that you remain flexible as you gauge your progress throughout the journey.
What learning styles/mediums work best for you? This is a matter of both preference and accessibility. Not all learning resources are equally available to everyone. However, many learning programs and materials are becoming increasingly affordable, giving everyone at least some choice in their method of study. Most importantly, you should do research into what your options are and weigh them accordingly. There are a variety of LSAT books available both new and used including but not limited to the LSAT Trainer, the Loophole, and the PowerScore Bibles. Of course, using a book requires a higher degree of discipline and self-accountability. On the other hand, there are a variety of online programs as well which provide a similarly structured curriculum and will even integrate your personal study schedule such as 7Sage and the LSAT Demon. You may even be able to find a relatively inexpensive tutor through Reddit or Wyzant if you require a bit more external accountability or a more personalized approach.
Lastly, what study methods are most effective for you? Everyone should incorporate a mix of foundational concepts, drilling, and practice in their studying, but it's important to recognize which method is most effective for you. Perhaps you find taking PTs (practice tests) garner the greatest score increases. Hence, you should dedicate more study time to taking PTs. Throughout your journey, you should constantly be aware of which study methods are most effective and adjust accordingly.
Once you have definitively answered these questions, you will have prepared yourself to optimize your study time and decrease your exam anxiety. Those preparing for the LSAT might be overwhelmed by the sheer amount of content and their limited timeline, but, by crafting a practical and efficient study plan, you won’t be inundated with content and will be assured that you are making the best use of your time.
3. Learn the Material:
Now that you’ve set yourself up for success, it’s time to actually sit down and do the work. In the following, I’ll outline some of what I found to be the most important strategies and concepts for each section of the exam:
Logical Reasoning:
Logical Reasoning is the core of the LSAT. The lessons learned from this section are essential throughout the exam and need to be learned inside and out. To succeed in this section, you need to learn the language of the test makers, argumentation. Every question contains an argument, and you need to be able to translate those arguments by learning to identify their building blocks: background information, premises, sub-conclusions, and conclusions. Once you’re fluent in argumentation, every stimulus becomes substantially easier to simplify and understand. Second, your argumentation toolbox is not complete without the ability to identify flaws in argumentation. A large proportion of the arguments put forward in LR questions are not foolproof, in fact, some of them are really bad. Additionally, these arguments are only flawed in a limited number of ways, and you need to be able to identify each of the fallacies that the test makers have at their disposal such as ad hominem, causation, and circular reasoning flaws. The ability to identify these flaws will allow you to answer the majority of questions on the exam since, by knowing the flaw, you will be better able to attack it, resolve it, or point it out. Last, but not least, know your question types. There are only a limited number of question types that the test makers will put forward and you can easily look up what these question types are. For each question type, you should have a unique approach and understand what reoccurring signals to look for in the stimulus and answer choices. While I won’t repeat this for the other sections, this is true of every section.
Reading Comprehension:
You will hear from many people that reading comprehension is the hardest section to learn, and this is true in some sense. Success in this section relies on skills that are developed throughout one’s education. However, there are many strategies that can boost your performance and bolster your skills. Developing a reliable shorthand/note-taking system is a priority when learning this section. A shorthand system can reduce the time you spend on questions and also allow you to better retain crucial details. Your system depends on your preferences, strengths, and weaknesses, and discovering your approach will require some trial and error as you test different note-taking strategies. For me, I would write a very short (4-5 words) summary of each paragraph as I finished reading it. I would also utilize the LSAC interface’s highlighters to color code different components of the passage’s argument (e.g., orange = conclusion/main idea). This system was designed in order for me to easily distill the most important aspects of the passage and allow me to easily reference the text for smaller details. There’s no way of getting around this next obstacle though and it has to be faced head on: your reading speed. Reading comprehension requires a balance between reading speed and information retention (i.e., the faster you read, the less information you retain and vice versa). However, if you can increase the speed at which you read without sacrificing any information, there is no downside. That is why I’d recommend reading non-LSAT material in your free time through magazines, novels, and newspapers. Of course, this will help you to both increase your reading speed and your reading stamina. Lastly, this next tip that I utilized during every reading comprehension section I took is more focused on your mindset when approaching the section. No matter what the substance of the article, convince yourself mentally that you are incredibly interested in the subject matter. It may be difficult to trick yourself into enjoying some of the drier topics, but simply telling myself that I wanted to know more about the subject and actively asking questions about the material led to increased focus and closer analysis.
Logic Games:
If you are registered for the June LSAT, then this especially applies to you. If you are planning to take the exam at a later date, you will not have a logic games section, but you should still read the following. These skills as well as previously mentioned skills/tips apply across the entire exam and do not exclusively apply to any one section. First, master formal logic. Your mastery over the rules of formal logic and your ability to apply them is the difference between -5 and -0 on logic games. When I say master, I mean that if someone were to wake you up in the middle of the night and ask you to identify the necessary and sufficient condition in ,”I will not go outside unless it is sunny”, you should be able to answer in under five seconds. This will allow you to easily unravel and represent convoluted language in a significantly more understandable and digestible way. Along with this, develop a foolproof diagramming method that does not consume too much time but also is easily understood in a high-pressure environment. Before I had perfected my diagramming, I would often represent rules, game boards, and pieces in a confusing manner which led to me forgetting about certain aspects of the game or misapplying a rule. Your game diagrams should be compact and excessively clear in what they represent. Logic games are already difficult as is so do not make it more difficult by making a confusing diagram. Last but not least, make deductions. I have heard that some people choose to make deductions as they work through the questions, but I found it much easier to make as many deductions as possible before jumping into the questions. At first, I struggled to uncover key inferences which led to wasted time and wrong answers. However, after diagramming a game, I began to move through each rule one by one, and examined how each interacts with the game board as well as every other rule. Another rule of thumb for making inferences is identifying rules in which a game piece repeats (e.g., “A is before B” and “B is before C” both include B) and seeing if you can uncover any resulting conclusions.
These tips are in no way exhaustive, but I hope that they provided a good overview to guide your studying and help you make incremental improvements.
Step 3: PRACTICE
Now that you have learned all of the fundamentals of each section, it’s time to put them to use. After all, learning all of this material is pointless if you can’t apply it on test day. Practice is an essential component of your test preparation for two primary reasons. First, it allows you to develop a standardized routine. When I say routine, I mean every logistical/strategic aspect of the exam including but not limited to your pre-exam preparation, your logic games diagramming method, your reading comprehension note-taking/shorthand method, time management strategies, and more. You should have deliberated upon, tested, and habituated each of these routines prior to your official exam by implementing them during PTs under test-day conditions. The LSAT is already a very stressful exam so you do not want to waste the precious time you have on exam day thinking about how you should annotate a reading comprehension passage, for example, and tinkering with different strategies. No, your strategies should already be tried and true on exam day. Second, if you never practice taking the exam, you will never know where you need to improve. Taking PTs are incredibly important as they allow you to evaluate your progress and signal which concepts, sections, or questions you need to work on or revisit.
Now, how should you practice? There’s no getting around it. You need to take practice exams under simulated official exam conditions. Set a timer for each section, take the required break between sections, and only use the equipment that will be allowed on test day (i.e., authorized computer, water, scrap paper, writing utensils, etc.). This is the only way for you to estimate how you will perform on test day and accustom yourself to the conditions of the official exam. I completed approximately 2-3 practice exams every week leading up to my official exams. It is even better if you save the more recent practice exams for the week or two before your official exam since those are going to be most similar to your exam. However, it is important that you do not just mindlessly take practice exams which leads me to my next point: blind review.
I know, I know, blind review is extremely time consuming and tedious, but it was essential to my success on this exam. If you do not know what blind review is, it is basically when you do not reveal the correct answers of a practice exam after you have completed it, but instead complete the exam over again by checking and revising your answers. At the end of this process, you will have two scores: your actual score and your blind review score. The main reason for this is that you will now be able to see more clearly where your weaknesses lie. If you corrected a previously incorrect answer during blind review, then you likely got it wrong due to the time constraint or testing anxiety rather than a fundamental misunderstanding of the question. If you failed to catch an incorrect answer during blind review, you need to make it your priority to fully understand your error, analyze the question, and then revisit the concept that the question covers.
Once your weaknesses are exposed during blind review, you can target those weaknesses by reviewing the conceptual material and then drilling the question/game/passage type. If you do not know what I mean by drilling, I mean that you can create and complete custom problem sets that focus on your weakness until you have addressed the weakness.
Step 4: Profit
Now it is time to take your official exam. First, you have to register for the exam and decide on whether you will take it in-person or online. There are benefits and drawbacks to each and you have to decide based on your personal circumstances. For the online format, you are going to need a very quiet room with a strong internet connection. You will need to remove all prohibited material from this room including books, posters, electronics, etc. Additionally, the online proctoring system can be quite a hassle and very finicky. It requires you to download a program prior to test day and then share your screen, video, and audio with a remote proctor. Proctors may interrupt your exam due to compliance issues (e.g., your face is not in full view). Additionally, there is a small but nonzero chance that your exam is placed under review due to suspected noncompliant activity during your exam period and possibly even canceled as a result of said review. However, there are obvious benefits to online testing. You can take the exam in the comfort of your own home if that is an option for you, and you generally have much more control over your environment. You take the exam on a computer of your choice that you are comfortable with. You use your own scrap paper and writing utensils. For the in-person format, there is little to no preparation required beforehand except for scheduling an appointment at a nearby test center and bringing a valid ID. You will be ushered into an office-like room filled with a number of small cubicles. In each cubicle, there will be a desktop with a monitor, mechanical keyboard, and mouse. There will be a pair of noise-canceling headphones, and you will also be given a booklet of scrap paper and writing utensils. A very compelling benefit of the in-person exam is that your exam is much less likely to be placed under review/canceled for suspicious activity. Your test session isn’t recorded and you do not have to connect with a remote proctor. You will not have to worry about the internet connection or whether or not your test-taking equipment is prohibited or not. Basically all you have to do is show up and take the exam. However, there are definitely drawbacks to the in-person exam as well. You will be in a new environment that you are unfamiliar with. There will be the noise of the other test takers in the room with you typing on keyboards, clicking their mouse, coughing, sneezing, leaving/entering the room, etc. There are definitely inconsistencies between the testing centers as well. Some minor, but noticeable issues that I experienced during my in-person exam included audible conversations coming from outside of the room, dark orange scrap paper on which I could barely see pencil marks, dull/broken pencils provided by the testing center, and barely functional noise-canceling headphones. Do not expect the testing centers to be a perfect, controlled environment and anticipate issues/annoyances.
Once you’ve registered and exam day has arrived, it's time to do exactly what you practiced. I would not recommend that you make any last-minute changes to your testing routine/strategies. You have put so much work into perfecting your routine, and it would be a shame to throw that away when it really matters. After about 3 hours, you’ll have officially taken the LSAT. Congratulations! Now, it is a waiting game. Despite the exam taking place on a digital platform and being graded instantly, you will still have to wait about a month to receive your results. It is up to you whether you would like to continue studying during this wait depending on how you felt about your exam performance although I would keep any studying very light. Enjoy your well-deserved break.
Step 5: Score Release
You’ve now waited for what feels like forever and you receive the score for your first official exam. If you reached your goal score, congratulations! You have now finished a crucial component of the law school admissions process. You’re not done yet though. It’s time to start thinking about putting together your law school applications (which I may write another guide about soon). If you did not reach your goal score, don’t worry! Appreciate the fact that you are now more familiar with the official exam process and jump right back into studying/practicing again. If you were very close to your goal score, then I would recommend registering for the soonest upcoming exam and focusing on practicing through drills and PTs. If you were quite far away from your goal score, it might be worth evaluating your weakest sections/question types and jumping back into foundational concepts. Whatever you do, DO NOT cancel your first official exam. First, law schools only really care about your highest exam score, so do better on the next one and this one won’t hurt you. Second, you need to have at least one non-canceled score in order to even apply to law school. Let’s say you cancel your first test and then do even worse on your second test, then what? I would only recommend canceling a score if it is not your first exam (and you did not cancel your first exam) and it is lower than one of your other scores (e.g., you scored a 165 on your first exam and then a 162 on your second).
The End!
I know that was a lot. I could probably think of more to write, but you are probably already overwhelmed with information so I’ll leave the rest to you. I want to reiterate that these are all tips that I’ve picked up over my studying journey and I cannot guarantee a score increase based solely on these tips. After all, the most important thing is that you put in the work yourself and do your own due diligence to find what works best for you. If you have read everything up until now, you may be certifiably insane (the mark of a great law student) and thank you so much for considering what I have had to say. Remember that this is just a small part of your journey. Your LSAT score is not only just a single part of your law school applications, but it is an even smaller part of your career in the legal profession. I am not diminishing the importance of the exam, but please maintain a sensible perspective when you are feeling stressed and anxious about the LSAT. Make sure that you maintain a healthy work-life balance, keep pursuing hobbies and interests that you enjoy, and give yourself a break every once in a while. Your mindset and mental health is half the battle. See you in law school!
submitted by A-TierTutoring to LSAT [link] [comments]


2024.05.12 14:32 AdmiralStone96230-A MURDER DRONES: Fall of Earth -Chapter XI: Truth Seeking and Corporate Divides-

"Wade! Good to see you back buddy!" Nathan said aloud as he and F approached Wade and Tina, the two breaking their embrace before looking to their friends.
Wade chuckled a bit as he responded to Nathan's greeting, Tina giving a pleasant smile as she stood behind him. "Same to you, man. How're things here?"
"Better than any words I could use for the situation!" Looking behind him, he gazed at a group of the worker drones that were rescued from the factory, having been brought aboard in order to transport them to a safer location. Their faces were of varied gratefulness and smiles as they made conversation with some of the troops onboard. "The rescue-ees are happy to be out of that place, far as I can tell!"
"They sure look like it." Wade said with a pleased smile, admiring the success of his and the Coalition's efforts as Nathan's friend Kurtis came over to the four.
Catching sight of Tina, the veteran drone gave a sly look as he correctly guessed the identity of Wade's accomplice. "Oh, and I see you found your girl you were telling me about."
The drone in question gave a blush of embarrassment as Wade held her hand, chuckling smugly as he introduced Tina. "Ah, yeah. Nathan, Kurtis, F, this is my girlfriend Tina. She's one of the best pilots I've met and known in my life, along with her sister Jasmine."
Tina's blush intensified heavily at Wade's words, a laugh breaching her mouth as she spoke to Wade's colleagues. "Well, I don't like to boast, but my sister and I DID fly for the military a while back."
Nathan and Kurtis gave impressed laughs as F chuckled at the amusing meeting, the former of the duo speaking as he shook Tina's hand. "Heh, well it's a proud pleasure to meet you, Miss Tina! You've got quite the partner with you, I'd say. He helped save F and Gerard from an accident during our time on Ceres."
Tina raised a hand to her mouth in shock as she looked to Wade, surprised by the news of his heroics at his new job before chuckling. "Well, it's not too surprising, I'd probably be dead if he didn't come in to help us." Remembering that F was involved in her rescue too, she glanced to the disassembly drone before quietly adding, "You too, darling."
F gave a thankful smile at the pilot drone as Wade spoke up on Tina's statement on her rescue. "Well, I'd also be done for if you didn't save me back there, with that disassembly drone squad." Tina nodded as Nathan looked to the drone couple in surprise at their stated feat.
"More of them? How many? Three? Fo-" The miner drone asked as Wade answered him mid-sentence.
"Three, and they put up a nasty fight. One almost got me before Tina shot at her with one of those guns these militia guys brought. A trooper must've dropped it during the fighting." Nathan gave an uncomfortable look of shock as Wade added, "One of them looked kinda like you too."
Tina pulled out her gun before holding it at attention, Nathan nodding in admiration of her efforts as she spoke up. "Think I could keep this one? We pilots usually carry sidearms like these, but I lost mine when they kidnapped me aboard the station in orbit."
Nathan and Kurtis looked to each other before nodding in agreement. "Sure, gonna need a holster though. Wouldn't want it to fall out that nice coat there, would we?" While Nathan gave his answer, Kurtis was already heading to the storage bays at the back of the ship, planning on grabbing the sizable holster wrap for Tina's weapon.
"Of course." Tina replied as Kurtis grabbed the desired gear, shutting the cargo door as he returned to the group. Taking the holster in her hand, she handed the pistol to Wade before speaking in between her efforts to attach the holster to her upper leg. "Thanks for the compliment, by the way."
"Don't mention it." Nathan replied back as F stepped up in between the group, wanting to add her own praise as the group looked to her.
"Glad to see so many together in arms here, especially when it's work colleagues like the boys here." Looking to Tina, she continued. "And Nathan's right, Miss Tina. Your partner is quite the guy, I'm a little surprised he didn't join the service. Him and his brother would've made great men if they fought in the ranks."
The positive air was quickly shattered upon the mention of Ron. Nathan, Wade, and the others all looked to F as her eyes became golden rings, the warrior drone realizing her mistake too late as she began to raise a hand to her face.
"...Yeah. Yes, we sure would have." Wade said solemnly, nodding lightly with a slight smile in his attempt to lighten the comment and, in turn, the mood. His smile faltered once again as he saw the others still frowning in sorrow, Wade joining them shortly after before remembering something. "Uh... Nathan? You did bring his body back here, right?"
Nathan nodded hesitantly as he glanced to the cargo bays at the back of the ship. "Yeah, I uh... We put him near the others we managed to recover before we left."
Tina listened with concerned eyes as she held tightly onto Wade's hand, the former worker drone tightening his own grip while speaking further to Nathan. "Good. Maybe, after this is all over, we can... Make preparations for a service. Ron deserves that at the least."
"So... h-he's in one of... those?" Tina asked dreadfully, observing the body bags lying next to each other in front of one of the cargo bay doors before looking back to Nathan, who looked down at the floor before replying.
"...Yep." Initially, Tina started to move, morbidly concerned over Ron's exact fate before stopping herself, still holding Wade's hand as she stood next to him again. Catching a glimpse of her attempt to see Ron, Nathan raised a digital eyebrow at her. "You, uh... want to see him?"
Wade looked down to Tina, who returned the gesture as they pondered over the uncomforting idea. She admittedly didn't want to see Ron, fearful of seeing what was left of him after that battle, but in a twisted way, knowing Wade wouldn't lie to her about a close relative like Ron being dead, she desperately felt the need for even the slightest sense of closure.
Looking to each other, Tina finally built her strength up, giving the faintest nod to Wade as her answer. Accepting her willingness, Wade slowly looked to Nathan, who needed no further gestures or words as he slowly walked over to the body bags, Wade, Tina, and their colleagues in tow. Upon reaching the bags, Nathan knelt down as his friends stopped behind him, Wade and Tina watching as he slowly unzipped the bag open. Despite her effort to be brave, Tina couldn't help but let out a horrified gasp upon seeing Ron's body, immediately noticing the large wound with dark, dried blood at his chest.
Nathan shook his head in dismay as he looked upon the sight of his fallen friend in the flayed bag. "It was when we made our second attempt in raiding the factory back there. We... We managed to pass through most of the halls without much trouble, but... we we're ambushed as we got close to the conversion room."
"G, the disassembly drone that helped the company abduct me, attacked us, along with several other troopers he brought with him." Wade added, him and Tina holding each other tightly as he continued. "We fought them off well enough, but G got an upper hand on me. He almost killed me, but.... Ron got in the way." Tina felt herself beginning to cry as she collapsed into Wade's chest, the former worker drone embracing her ever more tightly as she wept for their friend.
F shook her head in dismay, disappointed in herself as she spoke up. "I could've saved him, if I hadn't let myself get beat down like that. I-"
"F!" Wade said sternly, F ceasing her self-degrading as he tried to ease her guilt. "We did the best we could. If anything, it could've gone a lot worse."
Kurtis patted F on her back as he spoke up on his co-worker. "He was a good man, tried to bring out the best in people. Taught Wade that ideal well, too." He looked to Wade with a smile, the drone taking the compliment with the same gesture as he lightly patted Tina on her back too.
"*sniff* Y-Yes... He d-did try to make life brighter with his actions." Tina croaked as she slowly lifted her head up off of Wade, wiping the digital drops off her face as she added, "He... Him and Wade did well to so many with their farm they had back home, Jasmine and I helped transport their harvests all across the colonies."
The group gave looks and nods of admiration at the labor Tina described, Wade nodding in affirmation as he added, "Yeah, we held that place up for a long while. But if it weren't for the recent storms that ran through this place, we probably would still be farming." He began to chuckle slightly as he noted the events after the storm. "Heh, then again, we probably wouldn't have gone to Ceres if that was the case. So, I'm quite glad life changed our course on that endeavor."
Nathan was about to speak on the matter, but was stopped as Kelly walked out of the cockpit area, speaking to Wade specifically. "Mr. Wade? Our operative and her boss wants to see you and some of your team, says it's about the trouble you and the others went through."
Wade and Tina looked to each other with raised eyebrows before looking to their friends, F raising a hand as she spoke to the couple. "Well, you heard her. Let's get up there." Looking to Nathan, she motioned for him to follow her before glancing to Kurtis, who nodded to her before kneeling down to seal Ron's body bag.
Turning back to Wade and Tina, F smirked at them as they quickly made their way up to the small bridge of the ship, Tina speaking to Wade about the interior and where to go. "I do remember these ships a bit, now that I think about it. There should be a smaller room at the top above us. Come on."
Holding her hand, Wade and Tina made their way into the cockpit, F and Nathan close behind as the four walked up the small steps to the pilot seats. Right next to the ascending steps were another set of such steps, albeit going the other way into another room as Tina mentioned. The lover drones walked up the second set of steps as they entered the room, catching the sound of a conversation in their ears.
"Yeah Tess, they did a number on the security forces from what I've been told by Mr. Kurtis. He seems quite pro-" J stopped as she heard a startled gasp coming from the entrance near the cockpit, spotting her requested visitors as they took notice of her.
Wade, however, was immediately in shock, Tina also spooked by the familiar face as her love drew a sword before holding it out defensively. F and Nathan looked to the two in surprise as the former raised her arms slightly as to calm down Wade, knowing this J wasn't an enemy.
"Whoa there, easy now." The human hologram said with her hands raised as Wade and Tina gave a faint glare at J, who stared unamused with her hands to her hips.
Easy, Mr. Wade. I'm a friend." J stated as Wade kept his blade trained at her.
"Didn't we just kill you out there earlier?" Tina asked as she held onto Wade's arm, J smirking as she took in the amusing detail.
"Oh, yes. I believe you must've taken out one of my clones, not surprised. I killed a few myself back there." The corporate drone replied as Wade lowered his sword, surprised at J's words as she looked to him.
"Clones?" Tina said in bewilderment, confounded by the idea of multiples of the same drone running around.
"So, there's more of you?" Wade asked as he swapped his sword back for a hand.
"Indeed there are, Mr. Wade. Effective disassembly drones get cloned more often." J answered as she cringed slightly, remembering part of the reason she ended up here. "Though, admittedly I wasn't efficient enough recently. I'm a clone of one of the old units dispatched about two decades ago, before the Disassembly Division was officially instated."
Tina raised an eyebrow at J's explanation. "Recently? If you were away all that time, what could've possibly stopped you now?"
The murder drone groaned in slight annoyance as she reluctantly explained her answer. "Well, the colony we were supposedly sent to wipe out was quite persistent. During one of our raids, some brat with a ray gun blasted me in two." Regaining her composure, J flicked her hair with a smirk. "Then again, my clones should be better than they are, the Administrator seems to have a dislike towards me, as far as I can tell."
Wade and Tina glanced at each other as they took in the news, perplexed at the story they were hearing as the former spoke up. "Well, I sure hope so. Your clone didn't put up as much of a fight as I was expecting."
"Right..." J said with a look of disappointment before clearing her throat. "But besides that, we don't have time for THAT kind of backstory. We've got a lot of talk to do, Mr. Wade."
The holographic human raised a finger, drawing Wade and Tina's attention as she spoke. "Say, didn't J tell me about a human friend you had? A 'brother' guy?"
J nodded as she now also became curious over their missing acquaintant. "Ah yes, Ron, I believe. Do you know where he is, Wade?"
The two drones looked down in sorrow as Wade answered in dismay. "He uh... he didn't make it."
J allowed a concerned look to breach her shield of confident pride as her human friend spoke up, sounding sad at the news. "Oh, I uh, I'm sorry to hear that, Mr. W- er... Carter."
"It's alright," Wade replied as he held Tina's hand, looking up to J and the hologram before continuing. "at least he's not hurting anymore."
"My... condolences, Mr. Carter." J said, calling Wade by his last name now as she recovered from the tragic news. "But, it seems you've found someone else important. Who's your friend?"
Wade perked up a bit as he prepared to introduce Tina again. "Ah, yes. This is Tina Fowley, my girlfriend. She was among those captured by the company, I got her out before they could turn her, however."
"She's a pilot too." Nathan chirped from behind Wade, J and her boss stifling laughs as they took in the amusing description of Wade's partner.
"Well, she's quite the cutie, I'll say." The holo-human said in amusement, Tina blushing at the compliment as J spoke as well.
"Indeed she is, good find, Mr. Carter." Chuckling to herself, she remembered that she hadn't even formally met Wade earlier, prompting her to return the effort. "Well, now's as good a time as any to introduce ourselves." Looking to the hologram, J spoke. "Though you probably know who I am, name's J. And this is my boss, Tessa."
Looking to the human girl with a pleasant smile, he spoke to her. "Well, pleased to meet you, Mrs. Tessa."
"Good to meet ya too, Wade!" Tessa replied energetically before bringing herself back to a more serious stance, Wade and Tina feeling a bit surprised by the change of air as she spoke further. "And as much as I hate to cut the pleasantries so short, J and I have some important things to brief you on. So, take a seat and get comfy, everyone."
Noting the pair of chairs in front of the small table J and Tessa were standing on the other side of, the couple took them as Nathan and F stood behind them, simply listening in as J began to explain the matter at hand. "So, you both are probably wondering what this whole mess was all about, correct?"
The two drones nodded as Tina spoke up. "I heard it was having to do something with being recruited for the Disassembly Division, that group you spoke of a second ago. Why did they need to steal me away from my sister up there?"
"Well, the thing is, they didn't." Tessa answered, putting her hands to her hips as her companion explained further.
"Indeed, a simple memory transfer and body scan would've sufficed, but it seems the Administrator was in a bit of a rush." Crossing her arms, J continued in disgruntlement. "From what we gathered, this was done by her as per request by the company CEO, Mr. Jenson. He wanted the Administrator to recruit more drones under a new model of disassembly drone, with slight upgrades that would presumably remove most of the persistent issues each of us have." Shaking her head in disappointment, J finished with, "But, it's clear she cared little for how they were acquired, and way too far overboard with her efforts."
Wade held back his anger as he felt his certainty on the ones responsible grow with J's explanation. "So, it's true? Your people did all this? Got my brother and countless others killed for us?"
The corporate drone seemed to give a sluggish wave of her hand as she replied to Wade. "Well, you see, this whole ordeal is much more complex than it seems." Readying a holo-projector from her hand as it showed the image of a worker drone, dressed in a maid uniform. The hair was silver, two strips of it going down the sides of its head, as well as bearing a bow at the top of it all. Though the hologram made it hard to tell certain details, the drone's eyes appeared faintly as yellow through the blue hue from the hologram light.
Wade, Tina, and their companions eyed the seemingly innocent worker drone in puzzlement as J spoke again. "Now, you should count yourselves lucky, cause what I'm about to tell you is something corporate wouldn't let me spew out to anyone under certain statuses." Looking to Tessa, she continued with a sly smirk. "Then again, it'd probably be forced out of us anyway later on even if we didn't decide to tell you. So, now would be the best time to give you a run-down of the truth we have to share."
"Truth?" Wade asked with a raised hand, J nodding in affirmation before replying.
"Yes." Clearing her throat, J began. "You see, the Administrator was not a creation of JCJenson. At least, not in the way they intended. In fact, she was once a normal worker drone, just like you and I were." Wade raised an eyebrow as J's holo-projector shifted to show a building, a large, very old looking manor that went up a couple of stories high. As Wade and his cohorts observed the structure, J continued her story about her and this Administrator's origins.
"A long time ago, at this place we'll call Elliott Manor, my boss, who was still a child at the time, brought in a few worker drones left outside in a dump near the mansion, mostly composed of scrapped worker drone bodies. Upon bringing us in, Tess would fix us up so we could be her friends. I myself, along with three other drones, were her closest companions. Her family weren't so keen on having us around, but, to keep their daughter happy and to make us useful, Mr. and Mrs. Elliott put us to work keeping the place tidy." The disassembly drone's projector shifted again to show J and her three fellow workers, dressed in the same maid attire J was shown in earlier. Wade and Tina stared at two of them, as they resembled the disassembly drones they fought earlier, most notably N and V.
"Among the four of us here, THIS one would be the biggest problem." The hologram zoomed into the worker drone displayed earlier, postured in a strange, slouched over posture.
"Her name is Cyn, and, unlike J, V and N there, she was more broken than I had surmised back then. Spoke like some old artificial voice generator thing." Tessa stated, pointing at the highlighted drone before Tina decided to speak up on the backstory.
"How broken? Was there something wrong with her coding?" She said as she put a hand to her core.
J nodded lightly as she gave her answer. "Most likely. Do you remember the protocol tape for proper disposal of worker units? Seen it at all?"
Tina and Wade shivered a bit as they thought of the presumed tape J spoke of, dread creeping in from their memories of seeing it as the latter of the duo answered. "I think so, once during a little maintenance time I had years back. I think it was called... 'Zombie Drones'?"
"That's exactly the one." J said with a nod before continuing. "Well, if you saw it all the way through, the pie chart diagram points out the outcomes for OS complications should a worker core be improperly terminated. Out of those outcomes, the smallest, least likely one was 'potentially hazardous mutations'." Pointing to Cyn on the hologram, J continued further. "As for Cyn here, she befell said mutations, and they would come to not only affect her, but all of us at the manor too."
Tina's eyes went wide as she started to click the pieces together, recalling herself reading up on the incident J was hinting at years earlier during a class she took at the college she and Wade attended. "Wait... You, you don't mean SHE was the one who caused the Elliott Gala Massacre?"
J nodded in affirmation as Wade spoke up, confused at the revelation. "Wait, I remember looking into that too. Didn't the news say it was some mass murderer that did it?"
"That they did." Tessa replied as she added to the story. "However, that was a cover-up by the company to hide part of what really happened."
Pulling up what appeared to be a large room full of people inside, J explained the tragedy shown on the projector. "Tessa's parents didn't treat the drones under their service well, and Cyn seemed to despise them for it. On that day during a gala hosted by the Elliotts, Cyn, utilizing the mutations I mentioned, slaughtered the entire attending party there." Glancing to Tessa, J finished with, "Tess and I tried to stop her, but... it was too late."
Holding their hands to their mouths, Wade and Tina looked on in horror, Nathan and F sharing similar dismay as the four looked to Tessa. Knowing their desire to hear how she was spared, Tessa spoke to them. "Despite seeing her kill my parents and everyone in that room with my own eyes, Cyn spared me from the carnage. Took me away to some place so I could be kept quiet."
Raising a hand, F spoke up. "Well, wait a minute, how did Cyn join the company after all that?"
"Good question." J replied, pulling up an image of Cyn and a man, whom Wade recognized as Halloway before the corporate drone explained. "Upon the arrival of law enforcement and agents sent by the company, they found Cyn, who had already turned me and the other worker drones from the manor into the first disassembly drones. After some chatter between the two, Dr. Edgar Halloway, a simple materials recovery officer at the time, struck a deal with her. Talking with the authorities, they managed to convince them to keep the incident on the down low while they took Cyn and her drones in for study. Through said study, addition of protocols and official installation of Cyn into higher company positions, not to mention the creation of the Disassembly Drone Division, the rest is history."
The four drones looked on in stunned shock, taking in Tessa and J's story with unease as Wade spoke up. "So, this new body, the crazy shit that we just went through... it's all cause of this Cyn being? And those who are helping her?"
"That's right." J answered as Tina raised a finger, still concerned over the capabilities of the Administrator as she spoke.
"But, how did she convert you all into what you are now? What were these 'mutations' exactly?"
Tessa sighed a bit as she prepared to explain the origins of this horrible program. "Well, from what information I could gather before I got out of Cyn's clutches a while back, the researchers put to work studying Cyn and her abnormalities came to regard the latter as some kind of program, which grew stronger and more capable quite fast as it was kept under the company's leash. Eventually, they gave it a name: AbsoluteSolver." Pulling out what looked like a smartcomm, Tessa flicked her finger over it as she explained further. "Despite all logic, the AbsoluteSolver program, or, Solver, could generate various things out of thin air, as well as manipulate objects and living beings in many ways. To be blunt, it's like some kind of freaky magic powers for drones.
"Seeing that they could learn a lot from this program, as well as use Cyn's abilities to wring out all kinds of products and items for them to sell and use, the company instated the Solver Project, a research group dedicated to understanding the AS and its potential." Raising a finger, Tessa looked to Wade as she finished her explanation on the Solver. "Said program has been branched out to several other planets over the years, helping to spread this virus as far as possible for purposes we're certain aren't good, given that one of those planets got devastated by an experiment one of the teams did involving the virus."
The news that this infection brought harm to one of the colony worlds didn't sit well with the lover drones, both of them looking on in dismay as J gave more details. "And with that in mind, this recent effort has only cemented our belief that Cyn is up to something sinister. So once we reach the base here in Nevada, we have to make preparations for bringing this Solver Project to a halt... BEFORE it can harm any more people."
Smirking deviously, Tessa raised a finger as she glanced to Wade, who looked to her with concern as she spoke. "By the way Mr. Carter, that Halloway guy you ran into earlier? He leads one of the main teams working on the project."
Wade scoffed in annoyance he was reminded of that man. "Doesn't surprise me, seemed like he was really close to the Administrator from what I saw." Then, thinking on the reason for this briefing he was attending, Wade looked to J and Tessa curiously. "Why are you telling us this?"
J crossed her arms as she explained. "Because, Mr. Carter, YOU are the only disassembly drone we managed to recover from that place. And, given your exceptional performance there, your help would be much appreciated in our mission."
"Mission?" Tina said with a raised eyebrow. "So we're not done yet?"
"For us, not in the slightest. We've got some explaining to do with the government officials stationed at the base we're heading to. As for you all," J answered before looking to the four, all of them returning the glance as she continued. "...that depends on what you all have to say. Can you lend us a hand?"
Glancing to each other, Wade and Tina gazed into one another before nodding in agreement, turning back to J and Tessa before giving their decision. "Well, after what I just went through, and what happened to my brother... I'm sure as hell gonna bring those bastards to justice in one form or another."
"Yes, Wade and I have some talking to do with this 'Dr. Halloway' fellow before this is all over." Tina added, her and Wade holding each others hand as J gave a smirk at their vigorous determination.
"I'm glad to hear you two feel the same on the matter." J said as Tessa put her hands to her hips, slumped slightly as she spoke in a disappointed tone.
"Unfortunately, it may be a minute before we see some action. Once we reach the base, you all will find a place to rest for the time being. Since it's a military base, it should be safe from any major retribution attempts by those blokes at the company." Pulling out her smartcomm again, she continued once more. "As for us, we'll talk to the leaders there and see what their decision will be on the matter."
The quartet seemed to grow concerned over that last part, Nathan raising a hand before speaking his mind. "So, if they say no? Does that mean...?"
J and Tessa glanced to each other before the former answered the veteran drone. "Well, in that case, while it will be harder without official military support, the Coalition will take us wherever we need them to in order to put a stop to the Administrator. Shouldn't be much to worry about."
Taking this somewhat comforting news to heart, Tina and Wade nodded in understanding before the latter spoke to the operatives. "Well, that's good to hear. Whenever you do get an answer, give us a heads up."
"We will, Mr. Carter." J replied to Wade before shifting in her stance, Wade and his friends standing up together as their disassembly drone superior spoke once more. "With all that said, you're all dismissed. If you have any more questions, don't hesitate to ask."
"Thanks for clearing this up, Mrs. J. You too, Tessa." Wade said gratefully before turning to the exit, Tina walking with him as F and Nathan walked over to the operatives.
"Wade? Do you mind coming down to the bay below? I... I have something to show you." Wade nodded to her before they made their way down, the four people behind them continuing the chatter as the couple went to have their long overdue privacy.
Stepping out of the cockpit behind them, Wade and Tina sighed in comfort as they saw the troops busy with their tasks, not giving a glance to the two as they walked close to the sealed door of the transport. Admiring the enormous view the large window in the door gave for a moment, the two drones looked to each other as Tina dug into her pocket. "I was hoping to do this when we got back home, but... I got this from Eridanus while I was visiting." Finding her token of love to Wade, she pulled out the small box she showed off on the call earlier, opening it to reveal her present.
Wade admired the blue gemstone with wide eyes as Tina pulled it out with great care. "Wow... It's beautiful."
Tina chuckled as she extended the gem's necklace band out. "I knew you would, I just happened to stumble upon it while exploring the forest during a tour." Putting the two necklace bands around Wade's neck, she clipped the present together before pulling her arms back, adoring Wade's new add-on as she finished her sentence. "I felt it would be something nice for you to remember me by, while we're away from each other."
Wade smiled at Tina as he expressed his appreciation for the gift. "It certainly will." Stiffling a chuckle, the former worker drone held Tina's hand holding the box as he spoke further. "But, no matter how far apart we are, nothing could fill the space you hold in my heart."
"Same in mine, dear." Tina replied as she gazed into Wade's eyes, noting the faint green in his yellowed visor as she looked on in hopeful amusement. "And yet, even after all they did, I can still see those eyes. Changed from the soft, cool grass to the warmth of a blazing sun." She said while putting the box away, then placing a hand onto Wade's face as he looked off with a blush.
"Tina, I..." Wade began, unsure of how to put his thoughts to words as he tried to find them. "I don't know what they did to me, but I won't let it ruin our relationship." Holding her shoulders, Wade spoke to Tina further. "You're the most beautiful being I've seen in the whole universe, your warmth, your flight prowess... I want to protect that. I want to protect you."
"Oh, Wade." Tina murmured as the two touched their heads to one another, holding each other close in their efforts to provide affection. Such affection intensified as the two joined their metal lips, sharing a long kiss as they enjoyed their moment of awkward romance together.
...
Location: New Nellis Staryards, Nevada
The Chameleon transports zoomed over the large military air base as they arrived at their destination, several A-20 planes flying about over the base as they either carried out flight sorties or, more likely, investigated the arriving craft coming towards the base. After about an hour of flying over the country, the Coalition-USN task force finally arrived at the designated area to begin unloading their rescued drones to an area they could be protected more efficiently.
As the transport began to descend, Wade, Tina, and their friends observed the sight outside the window, spotting several landed aircraft and even a few docked warships. They admired the many ships resting for repair and refurbishment while they prepared to land and disembark for the base outside.
In the small bridge of the dropship, one of the two pilots tapped a button on the control panel, putting a microphone to their mouth before speaking into it. "Base Control, this is Transport Chi-729-B, we've got assets from the recent op lead by Captain Preston aboard. Request permission to land."
"Permission granted, Chi-729. Welcome back." The officer on the other end replied as the transport descended further, two lightningrod jets breaking off as they permitted the craft to land on their grounds below them.
submitted by AdmiralStone96230-A to MurderDrones [link] [comments]


http://activeproperty.pl/