SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
By : Yash Jain
 Grade 9

DISCOVERY OF RADIOACTIVITY
& ADVANCES IN THE FIELD
Discovery of   radioactivity
WHAT IS RADIOACTIVITY ?

 The atoms making up matter are
   stable, but some of them are
  spontaneously transformed by
 emitting radiations which release
       energy. This is called
            radioactivity.
There are three types of radiations corresponding to three types of
radioactivity.
alpha radioactivity corresponds to the emission of a helium nucleus, a
particularly stable structure consisting of two protons and two neutrons, called
an a particle.
beta radioactivity corresponds to the transformation, in the nucleus:
- either of a neutron into a proton, beta- radioactivity, characterised by the
emission of an electron e-
- or of a proton into a neutron, beta+ radioactivity, characterised by the emission
of an anti-electron or positron e+. It only appears in artificial radioactive nuclei
produced by nuclear reactions.
CONTD.

 gamma radioactivity unlike the other two,
  is not related to a transmutation of the
  nucleus. It results in the emission, by the
  nucleus, of an electromagnetic radiation, like
  visible light or X-rays, but more energetic.
 gamma radioactivity can occur by itself or
  together with alpha or beta radioactivity
ALPHA DECAY

Alpha decay means that a twice positive
  charged heliumion (helium atomic nucleus) is
  emited from the atomic nucleus .We find two
  protons and two neutrons less in this atomic
  nucleus, so it is lighter. The alpha radiation is
  the most dangerous of the three types of
  radiation, but a sheet of paper is enough to
  protect oneself. The skin protects us also
  from alpha radiation
BETA DECAY
There are two types of the beta decay. The one is the
  beta minus decay and the other is the beta plus
  decay. The beta minus decay a neutron decays into
  a proton, an electron and an antineutrino. The
  electron and the antineutrino are emitted. The
  radioactive particle is the electron. The number of
  nucleons do not change, but we have got one
  proton more than before the decay. 2 or 3 cm of
  wood are enough to protect oneself.
Discovery of   radioactivity
GAMMA DECAY

   When we talk about the gamma decay high-
    energy electromagnetic waves are emited
    from the atomic nucleus. This waves are
    photons, which have got a higher frequency
    and less wave long than light. A gamma
    decay can happen after an alpha decay or a
    beta decay, because the atomic nucleus is
    very energitic
RADIATION PENETRATION




Radiation is absorbed by the material through which it passes. During radioactive decay the alpha
or beta particles, and the gamma rays that are given off can all penetrate matter, although alpha-
particles can be stopped by a piece of paper or the human skin, whereas beta-particles require a
few millimetres of metal to absorb them. Gamma-rays, on the other hand, are very penetrating and
require lead shields or a metre of concrete to stop them. The dose of radiation received is the
amount of energy absorbed per unit mass of matter. Exposure to ionizing radiation can be harmful
as the radiation can cause cancers in the living population and genetic changes that may produce
heritable defects in future generations
Alpha particles can usually be stopped by a very thin barrier. Radioisotopes emitting alpha
particles are usually not hazardous outside the body, but they can cause damage if ingested.
Betas (streams of electrons) can pass through a hand, but are usually stopped by a modest
barrier such as a few millimeters of aluminum, or even a layer of clothing. As with alphas,
beta particles are more hazardous if inhaled or ingested.
Gammas can be very penetrating and can pass through thick barriers. Several feet of concrete
would be needed to stop some of the more energetic gammas. A natural gamma source found
in the environment (and in the human body) is 40K, an isotope of potassium.
Neutrons are also very penetrating. Some elements, like hydrogen, capture and scatter
neutrons. Water is commonly used as a neutron radiation shield.
CARBON DATING




The rate at which 14C decays is absolutely constant. Given any set of 14C
atoms, half of them will decay in 5730 years. Since this rate is slow relative
to the movement of carbon through food chains (from plants to animals to
bacteria) all carbon in biomass at earth's surface contains atmospheric levels
of 14C. However, as soon as any carbon drops out of the cycle of biological
processes - for example, through burial in mud or soil - the abundance of 14C
begins to decline. After 5730 years only half remains. After another 5730
years only a quarter remains. This process, which continues until no 14C
remains, is the basis of carbon dating
THANK YOU !!!

Contenu connexe

Tendances (20)

Interaction of radiation with Matter - Dr. Vandana
Interaction of radiation with Matter -  Dr. VandanaInteraction of radiation with Matter -  Dr. Vandana
Interaction of radiation with Matter - Dr. Vandana
 
Types of radiation
Types of radiationTypes of radiation
Types of radiation
 
Radioactive decay, kinetics and equilibrium
Radioactive decay, kinetics and equilibriumRadioactive decay, kinetics and equilibrium
Radioactive decay, kinetics and equilibrium
 
Radiation detectors
Radiation detectorsRadiation detectors
Radiation detectors
 
Radiation detection and measurement
Radiation detection and measurement Radiation detection and measurement
Radiation detection and measurement
 
Radioactivity
Radioactivity Radioactivity
Radioactivity
 
Structure of Atom
Structure of AtomStructure of Atom
Structure of Atom
 
Radioactivity
RadioactivityRadioactivity
Radioactivity
 
Basic radiation 061706
Basic radiation 061706Basic radiation 061706
Basic radiation 061706
 
Radioactivity
RadioactivityRadioactivity
Radioactivity
 
Radioactivity
RadioactivityRadioactivity
Radioactivity
 
Ionization chamber
Ionization chamberIonization chamber
Ionization chamber
 
Scintillation Counter and Semiconductor Detector
Scintillation Counter and Semiconductor DetectorScintillation Counter and Semiconductor Detector
Scintillation Counter and Semiconductor Detector
 
Interaction of Radiation with Matter
Interaction of Radiation with MatterInteraction of Radiation with Matter
Interaction of Radiation with Matter
 
Radioactivity
RadioactivityRadioactivity
Radioactivity
 
Geiger muller counter
Geiger muller counterGeiger muller counter
Geiger muller counter
 
Nuclear fission & fusion ppt animation
Nuclear fission & fusion ppt animationNuclear fission & fusion ppt animation
Nuclear fission & fusion ppt animation
 
Radioactivity
RadioactivityRadioactivity
Radioactivity
 
Interaction of radiation with matter
Interaction of radiation with matterInteraction of radiation with matter
Interaction of radiation with matter
 
Compton effect and pair production
Compton effect and pair productionCompton effect and pair production
Compton effect and pair production
 

Similaire à Discovery of radioactivity

C18-Radioactivity_and_Nuclear_Reactions.ppt
C18-Radioactivity_and_Nuclear_Reactions.pptC18-Radioactivity_and_Nuclear_Reactions.ppt
C18-Radioactivity_and_Nuclear_Reactions.pptJezrylleBalaong
 
Radiopharmaceuticals (PCI syllabus, B.Pharm)
Radiopharmaceuticals (PCI syllabus, B.Pharm)Radiopharmaceuticals (PCI syllabus, B.Pharm)
Radiopharmaceuticals (PCI syllabus, B.Pharm)Dr. Alex Martin
 
Introduction to Radiology
Introduction to RadiologyIntroduction to Radiology
Introduction to RadiologySzeMin Chong
 
Education.27.11 with a big boy toyzz.pdf
Education.27.11 with a big boy toyzz.pdfEducation.27.11 with a big boy toyzz.pdf
Education.27.11 with a big boy toyzz.pdfisraksiam311
 
Radioactivity ( Tajuk : Astronomi & Fizik Moden_Tugasan Kumpulan Sem 1_UTHM)
Radioactivity ( Tajuk : Astronomi & Fizik Moden_Tugasan Kumpulan Sem 1_UTHM)Radioactivity ( Tajuk : Astronomi & Fizik Moden_Tugasan Kumpulan Sem 1_UTHM)
Radioactivity ( Tajuk : Astronomi & Fizik Moden_Tugasan Kumpulan Sem 1_UTHM)Rosdi Ramli
 
Chapter 2 properties of radiations and radioisotopes
Chapter 2 properties of radiations and radioisotopesChapter 2 properties of radiations and radioisotopes
Chapter 2 properties of radiations and radioisotopesROBERT ESHUN
 
radioactivity ppt.PPT
radioactivity ppt.PPTradioactivity ppt.PPT
radioactivity ppt.PPTSamRugumamu
 
LESSON-10-COMPILATION.pdf
LESSON-10-COMPILATION.pdfLESSON-10-COMPILATION.pdf
LESSON-10-COMPILATION.pdfGeoffreyvlogs
 
Radioactivity
RadioactivityRadioactivity
Radioactivitysatisshan
 
radioactivity.ppt.org.pptx by BENNI RAKESH
radioactivity.ppt.org.pptx by BENNI RAKESHradioactivity.ppt.org.pptx by BENNI RAKESH
radioactivity.ppt.org.pptx by BENNI RAKESHBennyRakesh
 
Ionizing Radiation
Ionizing RadiationIonizing Radiation
Ionizing RadiationDeep Shah
 

Similaire à Discovery of radioactivity (20)

nuclear waves
nuclear wavesnuclear waves
nuclear waves
 
Radioactivity
RadioactivityRadioactivity
Radioactivity
 
Radioactivity.ppt
Radioactivity.pptRadioactivity.ppt
Radioactivity.ppt
 
C18-Radioactivity_and_Nuclear_Reactions.ppt
C18-Radioactivity_and_Nuclear_Reactions.pptC18-Radioactivity_and_Nuclear_Reactions.ppt
C18-Radioactivity_and_Nuclear_Reactions.ppt
 
Radioactive decay
Radioactive decayRadioactive decay
Radioactive decay
 
Radiopharmaceuticals (PCI syllabus, B.Pharm)
Radiopharmaceuticals (PCI syllabus, B.Pharm)Radiopharmaceuticals (PCI syllabus, B.Pharm)
Radiopharmaceuticals (PCI syllabus, B.Pharm)
 
Introduction to Radiology
Introduction to RadiologyIntroduction to Radiology
Introduction to Radiology
 
Education.27.11 with a big boy toyzz.pdf
Education.27.11 with a big boy toyzz.pdfEducation.27.11 with a big boy toyzz.pdf
Education.27.11 with a big boy toyzz.pdf
 
7.2
7.27.2
7.2
 
Radioactivity ( Tajuk : Astronomi & Fizik Moden_Tugasan Kumpulan Sem 1_UTHM)
Radioactivity ( Tajuk : Astronomi & Fizik Moden_Tugasan Kumpulan Sem 1_UTHM)Radioactivity ( Tajuk : Astronomi & Fizik Moden_Tugasan Kumpulan Sem 1_UTHM)
Radioactivity ( Tajuk : Astronomi & Fizik Moden_Tugasan Kumpulan Sem 1_UTHM)
 
Chapter 2 properties of radiations and radioisotopes
Chapter 2 properties of radiations and radioisotopesChapter 2 properties of radiations and radioisotopes
Chapter 2 properties of radiations and radioisotopes
 
Radioactivity.pptx
Radioactivity.pptxRadioactivity.pptx
Radioactivity.pptx
 
radioactivity ppt.PPT
radioactivity ppt.PPTradioactivity ppt.PPT
radioactivity ppt.PPT
 
Rb(mafuz)
Rb(mafuz)Rb(mafuz)
Rb(mafuz)
 
Electron Tomography (=Controlled Electron Tomography
Electron Tomography (=Controlled Electron TomographyElectron Tomography (=Controlled Electron Tomography
Electron Tomography (=Controlled Electron Tomography
 
LESSON-10-COMPILATION.pdf
LESSON-10-COMPILATION.pdfLESSON-10-COMPILATION.pdf
LESSON-10-COMPILATION.pdf
 
Radioactivity
RadioactivityRadioactivity
Radioactivity
 
radioactivity.ppt.org.pptx by BENNI RAKESH
radioactivity.ppt.org.pptx by BENNI RAKESHradioactivity.ppt.org.pptx by BENNI RAKESH
radioactivity.ppt.org.pptx by BENNI RAKESH
 
Ionizing Radiation
Ionizing RadiationIonizing Radiation
Ionizing Radiation
 
Radioactivity
RadioactivityRadioactivity
Radioactivity
 

Dernier

Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 

Dernier (20)

Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 

Discovery of radioactivity

  • 1. By : Yash Jain Grade 9 DISCOVERY OF RADIOACTIVITY & ADVANCES IN THE FIELD
  • 3. WHAT IS RADIOACTIVITY ? The atoms making up matter are stable, but some of them are spontaneously transformed by emitting radiations which release energy. This is called radioactivity.
  • 4. There are three types of radiations corresponding to three types of radioactivity. alpha radioactivity corresponds to the emission of a helium nucleus, a particularly stable structure consisting of two protons and two neutrons, called an a particle. beta radioactivity corresponds to the transformation, in the nucleus: - either of a neutron into a proton, beta- radioactivity, characterised by the emission of an electron e- - or of a proton into a neutron, beta+ radioactivity, characterised by the emission of an anti-electron or positron e+. It only appears in artificial radioactive nuclei produced by nuclear reactions.
  • 5. CONTD.  gamma radioactivity unlike the other two, is not related to a transmutation of the nucleus. It results in the emission, by the nucleus, of an electromagnetic radiation, like visible light or X-rays, but more energetic.  gamma radioactivity can occur by itself or together with alpha or beta radioactivity
  • 6. ALPHA DECAY Alpha decay means that a twice positive charged heliumion (helium atomic nucleus) is emited from the atomic nucleus .We find two protons and two neutrons less in this atomic nucleus, so it is lighter. The alpha radiation is the most dangerous of the three types of radiation, but a sheet of paper is enough to protect oneself. The skin protects us also from alpha radiation
  • 7. BETA DECAY There are two types of the beta decay. The one is the beta minus decay and the other is the beta plus decay. The beta minus decay a neutron decays into a proton, an electron and an antineutrino. The electron and the antineutrino are emitted. The radioactive particle is the electron. The number of nucleons do not change, but we have got one proton more than before the decay. 2 or 3 cm of wood are enough to protect oneself.
  • 9. GAMMA DECAY  When we talk about the gamma decay high- energy electromagnetic waves are emited from the atomic nucleus. This waves are photons, which have got a higher frequency and less wave long than light. A gamma decay can happen after an alpha decay or a beta decay, because the atomic nucleus is very energitic
  • 10. RADIATION PENETRATION Radiation is absorbed by the material through which it passes. During radioactive decay the alpha or beta particles, and the gamma rays that are given off can all penetrate matter, although alpha- particles can be stopped by a piece of paper or the human skin, whereas beta-particles require a few millimetres of metal to absorb them. Gamma-rays, on the other hand, are very penetrating and require lead shields or a metre of concrete to stop them. The dose of radiation received is the amount of energy absorbed per unit mass of matter. Exposure to ionizing radiation can be harmful as the radiation can cause cancers in the living population and genetic changes that may produce heritable defects in future generations
  • 11. Alpha particles can usually be stopped by a very thin barrier. Radioisotopes emitting alpha particles are usually not hazardous outside the body, but they can cause damage if ingested. Betas (streams of electrons) can pass through a hand, but are usually stopped by a modest barrier such as a few millimeters of aluminum, or even a layer of clothing. As with alphas, beta particles are more hazardous if inhaled or ingested. Gammas can be very penetrating and can pass through thick barriers. Several feet of concrete would be needed to stop some of the more energetic gammas. A natural gamma source found in the environment (and in the human body) is 40K, an isotope of potassium. Neutrons are also very penetrating. Some elements, like hydrogen, capture and scatter neutrons. Water is commonly used as a neutron radiation shield.
  • 12. CARBON DATING The rate at which 14C decays is absolutely constant. Given any set of 14C atoms, half of them will decay in 5730 years. Since this rate is slow relative to the movement of carbon through food chains (from plants to animals to bacteria) all carbon in biomass at earth's surface contains atmospheric levels of 14C. However, as soon as any carbon drops out of the cycle of biological processes - for example, through burial in mud or soil - the abundance of 14C begins to decline. After 5730 years only half remains. After another 5730 years only a quarter remains. This process, which continues until no 14C remains, is the basis of carbon dating