Wednesday, October 30, 2019

Construction Materials Assignment Example | Topics and Well Written Essays - 1500 words

Construction Materials - Assignment Example 1.1. Social Buildings have to comply with social considerations of sustainability so that they must provide safe, comfortable and healthy interiors. In order to meet these objectives the major considerations are ensuring structural integrity, dealing with vibration levels, adequate weather protection, fire resistance and acoustic performance. 1.2. Economic Economic considerations play a major and often deciding role in determining what kinds of materials to use for construction purposes. The major considerations are that buildings ought to be durable, reusable, require low maintenance and energy efficient. These considerations need to be satisfied both during the building phase as well as during the operation phase. Some other considerations include the construction costs, net lettable area, building reuse value, construction programmes and whole of life value. 1.3. Environmental Environmental considerations mandate that buildings ought to be constructed in a manner that their whole- of-life energy use as well as their greenhouse gas emissions produce a small ecological footprint. The major considerations are the life cycle assessment (LCA), cooling of urban areas, thermal mass and recycling. Appendix ‘A’ shows the mutually common area that social, environmental and economic factors share to produce a truly sustainable design. 2. Sustainability of Current Lecture Centre Building Concrete has been in extensive use around the globe as a preferred construction material for residential and commercial applications alike (Goodchild, 1997). When put in perspective of sustainability, concrete has a number of advantages to offer including (but not limited to) economic considerations, durability, acoustic performance, recyclability, thermal mass, fire resistance and adaptability. The factors listed above can be optimised to achieve maximised sustainability from concrete construction based on construction techniques and other considerations. The current Lectur e Centre Building at Brunel University is made out of concrete in large part and offers a sustainable outlook based on social, economic and environmental considerations. These are discussed below in detail. 2.1. Social Concrete buildings are able to offer structural integrity along with structural requirements that are well understood by designers and builders alike. This leads to the construction of safer structures that are able to stand up to risks such as snow, earthquakes, wind base loading etc. The large mass involved in concrete construction ensures that these structures provide excellent damping characteristics that are required for minimising vibration. In addition, concrete provides exceptional fire resistance given that it does not burn at all and does not emit toxic fumes when exposed to fire (Ching, 1995). For most cases concrete structures can be described as fire proof. Similarly, concrete structures are able to offer excellent acoustic damping characteristics as well which mandates the lowest possible use of insulation materials. 2.2. Economic Concrete buildings are the most economical solution when it comes to multi-storey buildings (please see Appendix ‘C’ for a comparison). The large amount of benefits that are provided by concrete such as fire resistance, large thermal mass and durability ensure that concrete buildings have lower operating costs and maintenance requirements. Building reuse is also more common for concrete structure for example

Monday, October 28, 2019

Global Change Essay Example for Free

Global Change Essay The concept of civil society was reinvented in the late 1980s in response to the rapid market development and the end of the Cold War. The collapse of the Soviet Union marked the rapid development of global market due to higher international security. Market development gradually leads to the development of civil society for two reasons: Firstly, the middle class helps to fight more freedom from the government as they want to gain more and more control of themselves. This situation, allows spaces for civil society to develop. Some donors search for NGOs to implement their civic or economic related interests and visions. 1 Secondly, the retreat of the â€Å"welfare† states in western countries further triggers the emergence of civil society as people want to address the problem themselves instead of solely depending on the invisible hand of the free market. Hong Kong, which is recognized as a newly industrialized economy (NIE) has adopted the minimal-interventionist principle in economic development for a long Low tax rate and free market policies are the priorities of the Hong Kong government. Civil society is said to be very important in the implementation of democracy as civil society is a representation of diverse interests of the people. In the planning system of Hong Kong, though the government was willing to involve more public participation in the process with the increasing force of democratization between 1990 and 1997, the role of civil society in planning policy formulation and implementation was not yet clear. According to the experiences of some UK cities, partnership between civil society and the local governments can facilitate sustainable development. It is yet to know whether such kind of partnership is possible in Hong Kong or not. So the aim of this paper is to find out the challenges and opportunities of mobilizing partnership between the government and civil society. Aims of the study This paper aims to explore the challenges and opportunities in fostering partnership between civil society and the government in the planning system of Hong Kong. This paper is based on the central argument that civil society organizations (â€Å"CSOs†) should play significant role in the planning system to explore the challenges and opportunities. It is argued that CSOs are important for promoting more effective idea in the policy planning in terms of reflecting the needs of the locals as well as the moral values neglected by both market and the government. It is believed that the challenges and opportunities are not that straightforward to be understood as they should involve a lot of other factors. These factors are to be examined in order to provide a clearer picture for the analysis. Structure of the paper This study is composed of six sections:- Session I begins with an introduction. It states the purpose of this paper and the content structure. Section II is the theoretical framework established for understanding the theoretical meaning of civil society and the importance of partnership between the government and the CSOs. Section III is the background about development of citizenship in Hong Kong. It is found that the civil society in Hong Kong is becoming mature. Section IV discusses on the six major factors contributing to the challenges in the relationship between the government and the civil society. Section V seeks to study real-life cases to further strengthen the argument that CSOs should play significant role in the planning system. Section VI, the final section of this paper. It summarizes all the key issues discussed in this paper and highlights the importance of the role of CSOs in planning system.   Defining â€Å"Civil Society† The definitions and meaning of civil society in different mainstream theories are explored and outlined in Appendix 1. The interpretation of civil society by Aristotle is now widely recognized as autonomy, not under direct state control. It emphasized on the formation of government based on voluntary willingness of people and universal election in order to guarantee sovereignty of citizens (for Locke) and the freedom of civil society (for Rousseau). The existing political system in Hong Kong is different as the HKSAR government is not directly elected by the citizens. Hong Kong people can only elect some of the legislative councilors, who act as delegates to deal with legislative issues; and district councilors, who are serving as advisors of the government. The sovereignty is just partly in the hand of Hong Kong people. In fact, the situation of Hong Kong is closer to the idea of Hegel that civil society and family together form the state. Civil society is actually functioning as a partly autonomy body under the government of Hong Kong. However, civil society should perform a more active role in the system in order to balance the power of the state and the market for the benefit of the public. So Friedmanns definition of civil society will be applied to support the empowerment of civil society. Civil society, as an association of individual interests, should grow up to balance the power of the state. His definition also separates the concept of market from civil society, which is applicable in the situation of Hong Kong. Friedmann(1998) states that civil society must be seen as standing in â€Å"opposition† to the corporate economy. The relationship of civil society and the market should not be neglected when we understand the relationship of the government and the civil society. 2 To sum up, the combination of Friedmanns and Hegel’s definition of civil society is applied in this paper. Civil society is defined as a sphere without direct state control, but is not totally separated from the state. The participation in civil society is based on voluntary willingness and it is actually an association of various individual interests. It is different from the concepts of corporate economy and family, but they are related to some extent. Civil society may not necessarily oppose to the corporate economy, but they may interplay to produce good results. Civil society should be empowered to balance the power of the government and market.

Saturday, October 26, 2019

Innocent Man by John Grisham Essays -- essays research papers

The innocent man is the story of Ron Williamson who was unjustly convicted of murder and spent twelve years on death row before being exonerated by DNA evidence. Ron Williamson was born in Ada, a small town in Oklahoma. His future looked bright when he was young and he was an exceptional athlete who was drafted by the Oakland Athletics. After an unsuccessful career in the minors Ron Williamson became a drug addict and an alcoholic whose life steadily got worse. He could not keep any job and he began spending most of his time in bars, and living with various friends. He soon accumulated a criminal record that included DUI?s, check fraud, and two rape charges that did not result in conviction. He became a heavy user of prescription drugs on top of his alcohol abuse, and after his baseball career ended he developed several mental llnesses and began to spend brief spans of time in mental hospitals. When a waitress who worked at a bar he often frequented was raped and murdered he became a suspect. Eventually he was convicted of the crime which he did not commit and was sentenced to death. A friend of his, Dennis Fritz was also wrongfully convicted as an accomplice and sentenced to life in prison. It was a terrible ordeal that Ron Williamson and Dennis Fritz suffered being wrongly convicted of a murder. They both spent 11 years in prison, fritz serving a life sentence and Williamson on death row, locked up with heartless killers and treated like an animal. The book also has a subplot revolving around the abduction of another girl in Ada who to this day has never been found. Two men, Tommy Ward and Kurt Fontenot were convicted of a rape and murder and are currently serving life sentences. Although no concret... ...tem. It is unbelievable how lax, inadequate, and unjust the justice department can actually be in our country that we thought was civilized. It is ludicrous that many of the same people who convicted two innocent men of crimes and nearly got one killed are still working in the same offices even after they were proven unethical, and disrespectful to their duty. This book was not written help Ron Williamson or Dennis Fritz, they have already been exonerated and have received compensation. It was probably not written for money, John Grisham stated in a speech that he feared a lawsuit. (law.virginia.edu) This book was written to make a political point. Even though this book is somewhat biased against the death penalty it still should enrage an American citizen who believes that a person is ?innocent until proven guilty,? and ?has a right to remain silent.?

Thursday, October 24, 2019

Illusion of Reality in John Barth’s Lost in the Funhouse Essay

â€Å"Lost in the Funhouse† explores the many layers of the theme â€Å"illusion of reality.† This concept is first introduced in the second paragraph as the explanation of initials or blanks replacing proper names in fiction-writing. The â€Å"attempt† at disguising a place name by shortening it, is really a tool used by authors to make a place seem real, in need of disguising. John Barth explains that this tactic is merely an â€Å"illusion of reality.† In the following pages of this story, the theme â€Å"illusion of reality† is present in the funhouse and self-perception during adolescence. The illusion of reality is a concept manifested in a funhouse. The funhouse itself is an illusion, with its rooms of mirrors that distort reality, moving floors and walls that disorient you, and its mazelike qualities that take you away from the realities of life. A funhouse is an alternative world, one meant for lovers embarking on a new adventure together. Ambrose can see its falseness from his single perspective and is aware of its deceptive powers. He is aware of the perversion inherent in the funhouse, the sleazy goals of sexual gratification disguised as child-like pleasures. To be lost in a funhouse is symbolic of the confusing and disorienting aspects of adolescence and particularly the sexual aspects of puberty. One’s perception of the self during adolescence can also be an illusion of reality. At one point in the story, we are led to believe that Ambrose is to be forever lost in this funhouse. This is representative of Ambrose’s fear that he will die illusioned, never sure of who he really is. Being lost in a funhouse alone is very much like particularly painful stages of adolescence. It is a place of romance, but for Ambrose it is a scary and confusing place, where he is still too young to be a part of the romance, but old enough to recognize and have that desire. These feelings are not only contained to adolescence, the sensation of being outside the fold and being unable to make sense of one’s emotions are present throughout life. Barth puts it best, â€Å"We will never get out of the funhouse† (9).

Wednesday, October 23, 2019

Student Service Enterprise Inventory System

STUDENT SERVICE ENTERPRISE INVENTORY SYSTEM A Concept Paper Presented to The Faculty of the College of Computer Studies Central Philippine University Jaro, Iloilo City, Philippines In partial fulfilment Of the Requirements in CS318 – Research Methods in IT By JanelynGrasparil BSIT – 4 July, 2012 CHAPTER 1 INTRODUCTION Overview of the Current State of Technology With the power of technology nowadays, people get interested with computers. They tried to indulge themselves on it to have a productive result in a more efficient and time saving process.It is highly valued in institutions like business enterprises, schools, hospitals, government and non government services. However, some of them are still using manual system. In this regard, we acknowledge the value of computerized system. CPU Student Service Enterprise is a store inside the campus where students, faculty, and staffs can buy goods, books, school supplies, P. E & school uniforms, etc. Each department’s ar e also purchasing supplies for their offices. One of the problems of SSE is the manual Inventory System. The manual system is not accurate and time consuming. Quarterly, SSE is conducting their inventory.When the inventory date is near work students and staffs are listing all the goods or items that are available in yellow paper. The paper contains the quantity, unit, description, and unit price of an item. In the proper date of inventory, work students manually count the goods or items. After counting all the available items, work students will put the unit price of each item. Finding the prices is time consuming. It takes two to three weeks to finish pricing those items. Prices of the items are all in the journal book. But some of the old stocks items are hard to find their prices.After pricing all the items, the book keeper will encode that in Excel. After that, she will print it out and forward to the VPFE. Overview of the Desired State of Technology I would like to propose a co mputerized inventory system to be installed at the CPU Student Service Enterprise, a formal computerized approach to inventory storing. The system provides the user with fast, accurate data handling and retrieving. It makes adjustments for possible problems prior to their occurrence, as opposed to traditional control systems which looked at more historical demand and reacted to existing problems.Furthermore, it directly serves as the system for CPU Student Service Enterprise. This system will help keep personnel from wasting their time counting supplies and trying to manually determine which products to buy and sell. The system also includes tracking of remaining inventory, tracking when new orders should be made, tracking which items are most popular and something to help the business decide what items are most profitable and which products to remove. They could also compare the inventory available at each customer to their corresponding needs.Data on these transactions are very im portant in determining the availability of details on the products in needs of reviewing. Statement of the Problem These are the following problems encountered by CPU Student Service Enterprise: * The manual process consumes too much time for the work students and staff and rigid time to process a transaction. * Inaccurate daily updating, recording, and monitoring of inventory of productsthat goes in and out due to human errors in the manual system. * Time consuming retrieval due to manual search from numerous files. The availability of the product is difficult to identify due to lack of information regarding on files that are outdated. * Slow and inaccurate resulting to problems like lost of items and unable to track the prices of an item. Objectives of the Study General Objective: * This study aims to solve the problems encountered and to change the Manual Inventory System and develop a Computerized Inventory System for CPU Student Service Enterprise. Specific Objectives: * To hav e an accurate inventory of stocks by providing the system an interactive GUI that capable of performing and handling accurate filling. To speed up the process of searching the data from the files. * To have a back up of data by creating a copy of database. * To ease process of monitoring the inventory of products by providing the system a normalized database system for storing all updated details on the inventory. Theoretical Framework Fast, Accurate, Reliable CPU – SSE INVENTORY SYSTEM Inefficient, Slow Processing, Unorganized, Inaccurate Systems Theory Figure 1. 0 Theoretical Framework based on Systems theory Theoretical Framework The figure above shows the elements needed in the development of SSE Inventory System.It is a system that stores data of the products or an item. Significantly, the manual processes are replaced by a computerized one which utilizes data from the book storage of inventory, with the computerized inventory system, the user can easily review and monit or the current status of the products or an item, in which the overall processes are hastened using this system. System theory Systems theory  is the  interdisciplinary  study of  systems  in general, with the goal of elucidating principles that can be applied to all types of systems at all nesting levels in all fields of research.System theory is the transdisciplinary study of the abstract organization of phenomena, Independent of their substance, type, or spatial or temporal scale of existence. It investigates both the principles common to all complex entities, and the (usually mathematical) models which can be used to describe them. (http://www. utwente. nl/cw/theorieenoverzicht/Theory%20clusters/Communication%20Processes/System_Theory. doc/) Inventory system Keeping an inventory (stock of goods) for future sale or use is common in business.In order to meet demand on time, companies must keep on hand a stock of goods that is awaiting sale. The purpose of inventory theor y is to determine rules that management can use to minimize the costs associated with maintaining inventory and meeting customer demand. Inventory is studied in order to help companies save large amounts of money. (http://www. whitman. edu/mathematics/SeniorProjectArchive/2006/zapponj2. pdf Conceptual Framework SECURITY INVENTORY MANAGEMENT DATABASE MANAGEMENT SYSTEM Figure 2. 0 Conceptual Framework Conceptual frameworkThe figure above conveys the concept that composes a system. These concepts serve as the main basis of ideas on how the researchers derived and created the system design and functionalities. DBMS A database management system (DBMS) is computer software designed for the purpose of managing databases based on a variety of data models. It is a complex set of software programs that controls the organization, storage, management, and retrieval of data in a database. DBMS are categorized according to their data structures or types. Inventory ManagementInventory management i s primarily about specifying the size and placement of stocked goods. The scope of inventory management also concerns the fine lines between replenishment lead time, carrying costs of inventory, asset management, inventory forecasting, inventory valuation, inventory visibility, future inventory price forecasting, physical inventory, available physical space for inventory, quality management, replenishment, returns and defective goods and demand forecasting. (http://www. inventorymanagement. com/2007/07/inventory-management-definition. html)This will track down the stocks of materials if it’s available or not, ready to be used and if need to be ordered. Through the database, the inventory log will be used as bases of the stocks if which product is the most demand by the customer. Through this management can decide whether in what product they should focus to meet customer’s needs and expectation. Security Method of protecting information, computer programs, and other co mputer system assets which is the security of computer assets and capital equipment refers to computer location, access control, software protection, and storage procedures.The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. (www. answers. com/topic/computer-security) Data and information will be secured, especially with stock in and out of materials. This will avoid any unauthorized transaction. A username and password will be provided to track the person who will stock out and stock in a material. UsersEntity that has authority to use an application, equipment, facility, process, or system, or one who consumes or employs a good or service to obtain a benefit or to solve a problem, and who may or may not be the actual purchaser of the item. (http://www. businessdictionary. com/definition/user. html) User w ill feel all the complexity of the system, easy to use with a user friendly interface that will let user easily understand the flow of the system Scope and limitations of the study The Computerized Inventory System is intended only for CPU Student Enterprise.This study mainly focused on providing business application using computerized system that enables business to track services and aims to provide accurate and reliable process on every transaction. This study looks into a better impact of using technology today on how it affects our daily lives especially for being a customer. With these studies it can help the beneficiaries to know the differences of using manual system to a computerized generation today. An inventory system is a system used to keep track of a business products and supplies.These programs are invaluable tools for most businesses because they are able to complete tasks quickly that would take much longer if done manually. Only the administrator has the privilege to use the computerized reservation system. It also excludes maintenance and other transactions according to the system. Significance of the Study The study will be of great use to the customers and workers of CPU Student Service Enterprise. The study, through its output, can assist the SSE in accomplishing tasks in a shorter period of time. Aside from this, the proposed system has a storage system for data retrieval of previous inventories.The proposed system utilizes the best way to organize the database type of system and to improve the services of the people involve. Moreover, the computerized system will guide the management in deciding matter involving assigning process. Manager will be informed on transaction through print out reports. Thus, the VPFE can manage well its finances and more likely to have savings with the proposed system. They can also expect that computer units built within the company have basis fact with the use of the propose system. Putting up good facilit ies can ease or minimize stress experience by the staff and work students. Chapter IIREVIEW OF RELATED LITERATURE AND STUDIES Inventory control system A process for keeping track of objects or materials. In common usage, the term may also refer to just the software components. Modern inventory control systems rely upon barcodes, and potentially RFID tags, to provide automatic identification of inventory objects. In an academic study performed at Wal-Mart, RFID reduced Out of Stocks by 30 percent for products selling between 0. 1 and 15 units a day. Inventory objects could include any kind of physical asset: merchandise, consumables, fixed assets, circulating tools, library books, or capital equipment.To record an inventory transaction, the system uses a barcode scanner or RFID reader to automatically identify the inventory object, and then collects additional information from the operators via fixed terminals (workstations), or mobile computers. Applications An inventory control sys tem may be used to automate a sales order fulfilment process. Such a system contains a list of order to be filled, and then prompts workers to pick the necessary items, and provides them with packaging and shipping information. Inventory system also manages in and outwards material of hardware.Real-time inventory control systems use wireless, mobile terminals to record inventory transactions at the moment they occur. A wireless LAN transmits the transaction information to a central database. http://en. wikipedia. org/wiki/Inventory_control_system Golden Inventory System Golden Inventory System is an advanced inventory software designed for wholesale and manufacture businesses. This system has several advantages, including the Return Merchandise Authorization function, hierarchical groups for products, import and export functions for QuickBooks 2010, PDF and XML files, multi- urrencies and expiration dates features. This inventory software has the flexible security function. You can define access rights for each your employee. Golden Inventory system works with MS SQL Server and MS Access database files. Now, our system calculates item costs using FIFO and Average methods. You'll be able to create orders and invoices very fast and send them via email to your customers. This is very flexible software with a lot of options. This inventory software can handle more than 100'000 items. You can install free MS SQL Server Express Edition on your server andGolden Inventory software on your computers and you'll obtain a very powerful network inventory system for any size business. www. executivpro. com/ Just-in-time (JIT) is an inventory strategy that strives to improve a business's return on investment by reducing in-process inventory and associated carrying costs. Just In Time production method is also called the Toyota Production System. To meet JIT objectives, the process relies on signals or Kanban, between different points in the process, which tell production whe n to make the next part.Kanban are usually ‘tickets' but can be simple visual signals, such as the presence or absence of a part on a shelf. Implemented correctly, JIT can improve a manufacturing organization's return on investment, quality, and efficiency. Quick notice that stock depletion requires personnel to order new stock is critical to the inventory reduction at the center of JIT. This saves warehouse space and costs. However, the complete mechanism for making this work is often misunderstood. (en. wikipedia. org/wiki/Just-in-time_(business) Inventory ValuationDetermination of inventory cost is the major aspect of financial reporting. Whether the periodic or the perpetual system is used, it is necessary to use a specific method for the assignment of costs to the ending inventory as well as to the cost of goods sold. Assignment of costs can be complex because goods are usually purchased at different costs during the accounting period. Thus, there must be a consistent pro cedure in assigning costs which is called the cost-flow assumption (Eisen, 2007). There are three cost-flow assumptions that can be used: First-In, First-Out (FIFO) Method.This is based on the assumption that the first units brought are the first units sold. The oldest cost assigned to the inventory is the cost assigned to the goods first sold. Consequently, the most recent cost is assigned to the ending inventory. Although business organizations are free to choose among a number of inventory methods, many adopt FIFO simply because there is a tendency to dispose of goods in the order of their acquisition (Eisen, 2007). This method, though not as accurate as specifically identifying the item being sold, would give a close approximation of value.Last-In, Last-Out (LIFO) Method. This method assumes that the most recent cost of goods acquired should be charged at the most recent sales made. Thus, the assignment of the cost to the ending inventory represents the cost of all earlier purch ases, without regard to the order in which the goods are actually sold, since it is assumed that the goods are all the same and readily interchangeable(Eisen, 2007). Weighted Average Cost Method. This method yields a cost that is representative of the cost of the product over the entire accounting period. The weighted verage cost of a unit of inventory is determined and all units are assigned this cost. The average cost is weighted by the number of units purchased at each cost (Carroll, 2006 Eisen further notes that in accounting periods where costs remain relatively constant, the FIFO method is probably the most appropriate. If it is important that replacement costsrelate as closely as possible to the cost of the goods sold, the LIFO method is better. The weighted average method is a third option, even though it does not necessarily bring about the matching of costs and revenue. Its simplicity may have a ost-saving effect. Summary Every business big or small, is in need of inventor y system for keeping tracks of records and specifically storing essential data in which could be reviewed and monitored by the manager. There are many ways and approaches to the inventory strategy. Inventory system is the heart of the business. The main advantage of the system that I will be going to develop is it will provide a computer generated output of the inventory a whole lot faster and accurate. Chapter III METHODOLOGY OF THE STUDY Figure 3. 0 Modified Iterative Waterfall Model ( www. nfolab. stanford. edu) In the development of the system, the researchers followed the phases of a Waterfall Method with the combination of an Iterative Model. The model is illustrated in figure 3. System Analysis The first phase that the researchers undertake is the system analysis which includes initial investigation and data gathering to prove the viability of the system. An interview (which is an interactive tool) with the management and employees of the organization was also conducted and a t the same time the group observed how their transactions work.It is also in this phase where the group observed and interacted with the users to further understand what information users need to perform their jobs. It is in this phase wherein other forms of interactive tools were used such as observation of the users involved and the organization’s environment. Requirement Definition In the requirement definition phase includes the definition of problems, objectives and estimation of scopes and limitations after the gathered data was summarized. During this phase wherein the researchers identified the information requirements for particular users involved.As an output the group had a deeper understanding of how the business function and have the complete information of the people, goals, data, and procedures involved. Interactive tools are used to accomplish tasks in this phase, observation and interviewing the people involved. System Design System analysis leads to design d ecision, which exactly determines how the system operates in terms of process, data, hardware, network infrastructures, user Interface and other important factors in the system environment. System DevelopmentIn this stage where the coding phases will start. Application software will be used in the development of the system. It is in this phase includes the programming of the system such as coding and program testing and to add more to that this phase also comprises the development or implementation of the system design. Microsoft Visual Basic 6. 0 is used as the development tool for the front end and MySQL Server 5. 0 as the back end. Photoshop and Corel Draw serve as an enhancement tool for the GUI and with the Corel Draw it.In this phase a constant interaction with the users is done to gather comments/feedbacks, validation and suggestions of the system design and layouts. Testing and Maintenance The testing and maintenance stage includes the preliminary implementation of the syste m together with the users and programmers using sample data or accurate data of the current system. A series of test is undergone to pinpoint neglected or unseen problems of the system before it will be handed down to the organization for operational implementation. The system documentation begins in this phase.The system manual or documentation includes all the necessary information that will guide the users about the systems functionality. System Implementation This is probably the most resource, cost and time-consuming phase of all. This is when the system is actually built, tested, and finally installed. It also includes activities such as user training and system maintenance. Some experts like to separate them into different phases Deploymentand Maintenance. However the four phases are the most commonly known and accepted steps. Gantt ChartPHASE| Activities| Mar| Apr| May| Jun| July| ExpectedOutput| Planning| Understanding why the system should be built| | | | | | Give the best solution and easy access to the system| Requirements| Adjustment and changes from the users to the system being developed| | | | | | Well Developed System| Design| Architecture design of the System| | | | | | Should be user friendly| Implementation| The system is actually built| | | | | | Ensured and well runned system| Test| The System Is Being Tested| | | | | | Completely functioning | Maintenance| Undergo Some Changes| | | | | | System Run Successfully| References Internet Sources (http://www. twente. nl/cw/theorieenoverzicht/Theory%20clusters/Communication%20Processes/System_Theory. doc/ (http://www. whitman. edu/mathematics/SeniorProjectArchive/2006/zapponj2. pdf (http://www. inventorymanagement. com/2007/07/inventory-management-definition. html (http://www. answers. com/topic/computer-security) (http://www. businessdictionary. com/definition/user. html) http://en. wikipedia. org/wiki/Inventory_control_system http://www. executivpro. com/ (http://en. wikipedia. org/wiki/Just-i n-time_(business) ( www. infolab. stanford. edu What Is an Inventory System? | eHow. com  http://www. ehow. com/facts_5518826_inventory-system. tml#ixzz21dQmNn9Z What Is an Inventory System? | eHow. com  http://www. ehow. com/facts_5518826_inventory-system. html#ixzz21dR2Cuo 8 http://www. studymode. com/essays/Inventory-System-634220. html? topic http://sample-thesis. blogspot. com/2009/09/enhancement-of-pharmact-inventory. html http://en. wikipedia. org/wiki/Systems_theory Context Diagram of the Current System Staff/Work Student Book Keeper Manual Inventory System Record Record Counts items Item info Printed Inventory record VPFEData Flow Diagram Level 0 of the Current System Staff/Work Student Record Counts Item 2. 0 Counting and Classifying Of Items 1. 0 Record Item Info Record Item Info 3. 0 Determines Price List VPFE D1 Item_Journal Printed Record Recorded Item Info 5. 0 Print Inventory Record 4. 0 Encode Items in Excel Book Keeper Record Item List Recorded In Excel Item I nfo Context Diagram of the Proposed System D1Item_DBMS Item Info SSE Computerized Inventory System Book Keeper Staff/Work StudentUsername Inventory Password Records Printed Inventory Records VPFE Data Flow Diagram Level 0 of the Proposed System 1. 0 Encode Item Info 2. 0 Calculate all Item Prices Staff/Work Student Username Item List Password Item Info Calculated Price List Price List D1 Item_DBMS Book Keeper Inventory 4. 0 Print Inventory Records 3. 0 Check Inventory Records VPFE Printed Check Inventory Inventory RecordsRecords

Tuesday, October 22, 2019

The Sixties Essays - Counterculture Of The 1960s, Hippie

The Sixties Essays - Counterculture Of The 1960s, Hippie The Sixties The Sixties split the skies. Only Civil and two world wars so neatly divided our history into a Before and After. And the Sixties were more divisive than World War II, which drew more people for the war effort. The Sixties drove people apart husbands from wives, children from parents, students from teachers, citizens from their government. Authority was strengthened by World War II. It was challenged by the sixties. Relatively few Americans in 1960 would have predicted that the decade ahead was to be among the most turbulent of the century. Despite the growing restiveness of the nations African American population, and despite undercurrents of protest and discontent from many other groups, most Americans faced the future with optimism. The civil rights movement spawned social activism. Among the many effects of the civil rights movement as it gained momentum in the early 1960s was its impact on Greensboro sit-ins in 1960, accelerating with the 1961 Freedom Rides, and with the Mississippi Summer project. These movements opened up some eyes to Americans so they could see what was going on in the country at this time. Most of the things that went on in the sixties dealt with the War. The Cold war in which included the Korean War, but mostly dealt with our little rivalry the Soviet Union. There was a lot of division between people because of the War. Many people couldnt handle the thought of War. They were just scared that they had to be in a country that was involve in the War. Others thought that it was the perfect time to start their own groups. Some were Ethnic groups in which gained more power. Though much of American history, most of the nations dominant institutions had been controlled by middle-class, Protestan t, white males. Nonetheless, throughout those same years, American society was extraordinarily diverse. It included may groups whose political economic, and social outlook was very different from those of the controlling white male population. African American, Native Americans, Hispanic Americans, and members of other ethnic groups were largely excluded from the mainstream of American life. Women lived within sharply defined boundaries. People in the South and the West had different interests from those in the Northeast. The Existence of racial, ethnic, and religious diversity had been the source of many conflicts and adjustments for more than three centuries. In the 1960s, perhaps more than at any other moment in American history, that diversity erupted and helped redefine the nations life. African Americans, students and women all raised challenges to traditional practices and institutions. So did other groups who felt excluded from the centers of American life. The Counterculture rejected traditional standards and styles. The rise of political radicalism on college campuses occurred alongside an even larger change in the character of American youth: the emergence of what became known as the counterculture. Among the conspicuous features of this was a general contempt among young people for traditional standards. Youths displayed that contempt by wearing long hair, shabby or outrageous clothing, using unconventional speech, and acting in conventional standards of behavior. They also were attracted to drugs, particularly to weed(marijuana) and hallucinogens. In addition, they adopted a new and more permissive view of sexual behavior. Rock music was an increasingly important part of the counterculture. Lying behind these open challenges to traditional lifestyles were the outlines of a philosophy. Like members of the student left (with which it in many ways over lapped, the counterculture challenged the nature of modern American society for its hollowness and artificiality. It called for a more natural world in which men and women would live in closer harmony nature and would have greater freedom to vent their instincts and emotions. This was, in the end, a search for personal fulfillment. Popular phrases of the 1960s expressed something of it s character. Do your own thing or if it feels good, do it. So did the communities created by the so-called hippies. Adherents of the counterculture who attempted to withdraw from the conventional world and the live among people who shared their beliefs. Such communities emerged in the Haight-Ashbury neighborhood of San Francisco and then spread to other large cities. The hippies

Monday, October 21, 2019

Monster A critical analysis Essays

Monster A critical analysis Essays Monster A critical analysis Essay Monster A critical analysis Essay Essay Topic: Film Monster is possibly the most powerful film anyone could ever wish to see. In terms of using a punch to deliver its message this film is the Tyson of this cinematic generation of films. This movie pushes the boundaries of thematic content and attempts to do what few films are brave enough to do, i. e. humanise a serial killer. It is the performance, if calling it that does it enough justice, of Charlise Theron, which makes this boundary pushing not only possible, but also successful. This essay will take a look at this complex story and attempt to examine its relationship with the plot, specifically how the plot is constructed and how it distinctly tells this story. In attempting to create a film like monster, the filmmakers are faced with very real challenges. Now every film it can be said, is challenging to make, but a film this complex, this real, and this emotionally demanding is always going to be tricky. The filmmakers are trying to portray a specific message, that is to say monster is very thematic in its story content. It takes a look at the influences in a persons life, which might possibly lead up to that person going so far as to commit murder. The danger with this is that it could come across as though the film is justifying the murders. I feel that Patty Jenkins manages to strike a balance between overly sympathising with Aileen and making us judge her, rather giving some sense of understanding. She does this by showing Aileens human side and by telling her very complex story in a passionate, real, often hard-hitting way. The problem with telling a biographic story is that the real plot might not naturally fit a specific plot structure, but the filmmakers have managed (however accurately, Im not sure) to construct the plot of Monster in an incredibly detailed, thoughtful and emotionally engaging way. While the story itself spans perhaps twenty years, the plot highlights the most dramatic events and constructs them in such a way, in such an order so as to drive home the themes and messages of Monster in the most accessible and poignant way. The first act begins with the young Aileen. Aided by the voice over narration we learn some of the necessary background information, detailing Aileens tragic childhood. We are given clues as to how and why she started prostituting herself as well as her social/economic background. These all lay a strong foundation from which the story and our understanding can be built on. The first few scenes of the young Aileen hook us into the story. We hear about how Aileen dreamed of becoming famous, of rising out of her situation. They also hint toward the tone and mood, i. e. the genre of the film. It is through this clever use of narration that we can closely identify with, i. e. become familiar with her attitude to life, her world and history of dilemmas. We hear how she always wanted to be taken to a new life, and would do anything (anyone) who she thought might help her get where she wanted to go. These words echo with us as we dissolve forward to the life of the adult Aileen, leaving us to fill in some of the gaps, guessing how messed up her life must have got. We enter Aileens adult life with a lonely shot of her sitting by the highway. This is very appropriate as the previous shot was of her as a teenage girl getting into the car of a strange man on the side of a main road. We can guess that this pattern has been ongoing and we pick up with the adult her having just finished with a client. Soon thereafter the plot takes us right into the inticing incident. In a lonely roadside bar we meet Salvie, a lesbian girl who herself has been searching for something, love and understanding. It is this confrontational meeting of Salvie and Aileen which propels the plot forward. It introduces a brand new element into Aileens life, which sets it off on a changed course we later learn that she was contemplating suicide. At first Aileen is unsure of her how she feels about Sylvie, but it is after Sylvie has invited her out that night, that she realises she has potentially found the friend she never had and always wanted. They go out to the ice rink and soon find themselves involved in a passionate love-making session outside. Suddenly Aileen has found direction. She wants nothing more than to be with Sylvie. This leads up to the first act climax and first major turning point. Aileen returns to the highways to ply her trade, in order to make much needed money. A dubious looking customer soon picks her up. Then in a very disturbing scene, he beats and sodomises her. She manages to free herself and using his gun, shoots him, and then drives off with his car and money. This plot point sets the scene for the rest of the movie. Aileen has committed murder. The atrocities committed to her fuel her hatred for men, which will motivate her to continue her murder spree. She also discovers a means to make lots of money. She also has a goal, for the major plot of the movie is surrounding her murders, indeed, the Sylivie/Aileen plot is also a major plot, but the two plots are so intermingled that it is hard to see them as mutually exclusive. Nonetheless, this climax takes us straight into act two, as Aileen Rushes to make her appointment with Sylvie. After some convincing Sylvie agrees to run away with her and spend at least one week with her. There is a lull in the pace as we see a montage of them renting a hotel, going out, living the dream life they had both always wanted. But soon there is a minor set back. Sylvie goes home to get some cloths and is confronted by her aunt who reprimands her. Sylvie manages to not be deterred and passes the test of her character growth (or de-growth) as she chooses to go her own way with Aileen. Then comes another plot point. In an emotional, reminiscing scene, Aileen tells Sylvie how she always wanted to be president and that she was once told that all you need in life is Love and to believe in yourself. This motivates Aileen to go out and look for a real job. She is extremely unsuccessful and the old Aileen resurfaces as she loses her cool with an obnoxious potential employer. Straight thereafter Aileen is picked up by a corrupt cop who forces her into a sexual favour. These two scenes refocus the plot. We can see that Aileen can do nothing but prostitute herself and they also re-affirm her hatred for men, which will drive her onto more murders. By about the half-way point of the movie, Aileen reaches a point of no return. In a previous confrontational scene in which Sylvie accuses her of not providing for them, Aileen had told Sylvie about the first murder, but she agrees to go out and whore for money. The point of no return comes when in a car with the guy; she hesitates, hesitates, then pulls out her gun and shoots him. She is now a murderer. She knows again what her goal is; survival by murder. She feels that she is doing it for Sylvie and indeed shows us that she loves her in her own way. In a powerfully passionate scene and no-return point in the Sylvie/Aileen plot, Aileen tells Sylvie that she loves her and the two make love. The rest of act two involves a few more murders and some set backs in their relationship. Sylvie goes out to the bar attempting to meet new people, and upsets Aileen. They go to funworld and things look on track once again, as they also make plans for their trip to the Florida Keys. All good times must come to an end, and this happens as, in what is in my opinion the act two climax, they have a car crash and end up on the run. Aileen tells her about the murders and they now have a new clearly defined goal, that is to avoid capture. Act three especially the last fifteen minutes are extremely intense and engaging. The story continues as previous but at a more intense and emotionally engaging level. Sylvie in a surprising and lady MacBeth look a like scene, tells Aileen that she just needs to carry on killing as they need to live. In the most extreme depiction of the murders, Aileen kills a John who was very benign and just wished to help her. Then she mistakenly kills a cop. They realise that things are getting out of hand and Aileen sends Sylvie on ahead or home (not sure) so that she can meet up with her later. She is ultimately however picked up by the cops. The film doesnt relent there as we are dragged ever closer by the power mostly of Charlises performance and specifically the parallel editing in the jail scene. Aileen and Sylvie have a phone conversation, and they both profess their undying love. Matching the very subtle, slow camera movement away from Sylvie, is her ever more dubious questioning. It is a very sudden, very tragic moment when the pennie drops and at various times the audience become aware of the betrayal, albeit understandable, taking place. It is even more tragic to see Aileens response as she admits solely to the murders, saving her only true love of any punishment, thus conveying beautifully the films major theme of the desperation love can drive you to. In the final shot of Aileen being led to the electric chair, her narration is heard. The last hard-hitting message comes as, commenting on something she had heard when she was young about reaching your dreams, she says cynically I guess they have to tell you something. Upon first watching it, I failed to realise how structured this movie actually was. But it is through movies like this that my faith in the Hollywood formula is being reborn. This movie is by no means boring, tiresome or old. It is just perfectly structured. From the first frame it grabs you by the collar and engages you in a two-hour ride of emotions. It is an incredibly difficult story to tell. It deals with issues that many feel are better left undelt with and thus does not appeal to everyone. We are not forced to like Aileen. There are constant emotional checks that cause us to examine our sentiments. Indeed we can pity her, but not necessarily forgive or excuse her behaviour. What this movie does do and I feel this was the filmmakers intention is get us to think a little harder about our own life, our treatment of others our place in society and those less fortunate than us. It also makes us think a bit more before judging someones actions, as we dont necessarily understand their background. It makes us question what a monster is, and if indeed a monster is ever a monster or just someone similar to us who has had a life to tough for them to handle. The judgements to these philosophies are left up to the audience to make, but the reason theses themes and questions are put across so powerfully in this story is definitely in large part as a result of the construction of the totally engaging plot.

Sunday, October 20, 2019

Cultural Geography Overview

Cultural Geography Overview Cultural geography is one of the two major branches of geography (versus physical geography) and is often called human geography. Cultural geography is the study of the many cultural aspects found throughout the world and how they relate to the spaces and places where they originate and then travel as people continually move across various areas. What Is Cultural Geography? Some of the main cultural phenomena studied in cultural geography include language, religion, different economic and governmental structures, art, music, and other cultural aspects that explain how and/or why people function as they do in the areas in which they live. Globalization is also becoming increasingly important to this field as it is allowing these specific aspects of culture to easily travel across the globe. Cultural landscapes are also important because they link culture to the physical environments in which people live. This is vital because it can either limit or nurture the development of various aspects of culture. For instance, people living in a rural area are often more culturally tied to the natural environment around them than those living in a large metropolitan area. This is generally the focus of the Man-Land Tradition in the Four Traditions of geography and studies human impact on nature, the impact of nature on humans, and people’s perception of the environment. Cultural geography developed out of the University of California, Berkeley and was led by Carl Sauer. He used landscapes as the defining unit of geographic study and said that cultures develop because of the landscape but also help to develop the landscape as well. In addition, his work and the cultural geography of today is highly qualitative rather than quantitative - a main tenant of physical geography. Today, cultural geography is still practiced and more specialized fields within it such as feminist geography, childrens geography, tourism studies, urban geography, the geography of sexuality and space, and political geography have developed to further aid in the study of cultural practices and human activities as they relate spatially to the world.

Saturday, October 19, 2019

Research Instrument Essay Example | Topics and Well Written Essays - 500 words

Research Instrument - Essay Example Since these researchers are measuring suicidal potential rather than ideation the questions are broad based and include social factors such as school and home life. They carefully tested the validity of the questions, internal consistency and test-retest reliability. Test-retest reliability is an important factor in determining if a self-reporting instrument is valid over time; the CASPI had a .76 score which the authors report is consistent with other testing instruments. The retest was conducted two weeks after the initial screening, which could be a factor in its high reliability score. The CASPI instrument was measured against known suicidal potential in the population sampled in order to assess its true validity. It appears that the researchers were successful in formulating questions with enough neutrality that children and adolescents could answer them honestly. The subpopulation of young children (less than 13 years old) is notoriously hard to assess, but this instrument appears to be consistent and valid even with younger children. It was more consistent and valid with older children, however (up to 96 percent accurate in distinguishing levels of suicidal potential). This instrument was tested with a significant number of students with a diverse cross section of socio-economic circumstances and ethnicities. This is a key element which is sometimes lacking in validating other self-reporting instruments. It also asks questions about family history, which is an important indicator of suicidal potentiality that is sometimes left out of other reporting instruments. Self-reporting instruments are as accurate as the people taking them—if the participant completes them honestly, they will measure suicidal potential. Self-reporting instruments require an ability to self-reflect as well as a willingness to open up through the anonymity of a questionnaire. When self-reporting

Friday, October 18, 2019

International Business Enviornment Essay Example | Topics and Well Written Essays - 3000 words

International Business Enviornment - Essay Example (A) Analysis of National Business System and Cultural Conditions National Business System In this report, the developing nation that has been considered is India that has shown greater potential in the recent years and has been a potential market for many Multinational Corporations (NCAER, 2005). The Indian national business system is a diversified business model that has different aspects of operations. There are urban, rural, metropolitan markets and each of them differs in area with different business system of model. The national business system of India is different from other nations. In India the concept of family is highly valued within the organisations. A significant number of the organisations are owned and managed by the family members. The sense of corporate culture is present in current Indian organisations. But in the UK the business units are fully owned and managed by different personnel i.e. professionals. ... The best suited example is the Wal-Mart of the USA and Bharti Group of India in the retail sector (Bose & Et. Al., 2009). For the business development in the Indian market there are two organisations that operate. The CII (Confederation of Indian Industry) and FICCI (Federation of Indian Chambers of Commerce and Industry) operate for the enhancement of Indian organisations and for foreign investments to be attractive in the Indian market in different sectors (Sinha, 2005). Many of the world’s renowned retailers such as Tesco, Wal-Mart and Carrefour are at present provided significant amount of importance to the Indian retail sector. Carrefour in recent times has entered into the booming retail market of India. With a populace of more than a billion people and escalating middle class, India provides ample promises in the retail sector. But the Indian market is unique with different aspects that make the market challenging for the foreign players (Padmanabhan, 2010). Cultural Co ndition India has a diverse culture. Business people in India have grown accustomed to the western method of education. The business language that is primarily used in India is English, and the nation also has a similar business and legal framework to that of the UK. In India, boom in the consumer product exports are frequently modern, innovative and lower-priced adapted version of the UK. Any marketing promotion, advertisement or other promotion should be personalised and adopted to take into account the Indian culture (Medicon Valley, 2007). In business organisations of India the participation of women is comparatively lower as compared to the UK. Companies of the UK should focus on this factor before deciding to appoint

PROMOTING BETTER PATIENT CARE Essay Example | Topics and Well Written Essays - 500 words

PROMOTING BETTER PATIENT CARE - Essay Example Speech-language pathologists are certified by the American Speech-Language-Hearing Association (ASHA) and hold the masters degree or the degree certified to be suitable for the role. (McKay, 2012a, p.1) The speech therapists role is to guide and simulate the process of recovery by means of speech and language exercises. Autism, cleft palate, brain or damage disorders, voice disorder, stammering are some of the causes for the speech difficulties. There are normal swallowing and speech changes after the head and neck cancer treatment and they need assistance of the speech pathologist. (â€Å"Encyclopedia of Health†, 2010, p. 977) A social worker help patients and families cope up with the problem resulting from long term illness, injury and rehabilitation. ‘Medical and public health social worker provide psychosocial support to those affected by chronic, acute, or terminal illnesses. They work with patients, families, and caregivers.’(Mc Kay, 2012b, p. 1)The Council on Social Work Education accredits the baccalaureate and master’s degree programs in social work in the United States. (Zastrow, p. xx) Communication is an important tool for the speech therapists as it enables them to interact with the patient and develop the confidence in them. The treatment varies according to its severity and is based upon the patient’s case history and also relies on the patient’s verbal report of symptoms. There is a major concern in the availability of speech therapists and if the facility did not have this specialty, then the use of interdisciplinary team concept is appropriate. It is a group of health care professionals from diverse fields who work in a coordinated fashion toward a common goal for the patient.(â€Å"Interdisciplinary teams†, Medical Dictionary) The team includes mostly the individual with severe communication disabilities, a family member or guardian, a speech-language pathologist,

Thursday, October 17, 2019

World War One Research Paper Example | Topics and Well Written Essays - 2250 words

World War One - Research Paper Example For over twenty years, many nations in Europe had been developing alliances. The alliances were assumed to promote peace. This is because states believed that they would defend each nation in case war arose. The dangerous thing about the alliances was that a conflict between two nations would lead to all other nations joining in the war. Therefore, when a dispute arose between Austria-Hungary and Serbia it resulted to world war one1. The war originated in Balkans, a place famously known for a number of small wars. The murder of Archduke Francis Ferdinand the successor of the Austria-Hungary throne, who thought that his mercy for the Slavs would reduce the anxiety between Austria-Hungary and Balkans. The archduke and his wife had planned to visit Bosnia, as they travelled through Sarajevo on June 28 of the year 19142. An Asian better known as Gavrillo Principe jumped onto the car that carried the heir and his wife and shot them. The Archduke and his wife died instantly. The assassin w as said to be a student related with a Slav nationalist terror group famously known as block hand, which was fighting for freedom from the Austro-Hungarian Empire for the Slavic minorities. From the start, the Austrians alleged that Serbia, an independent and fundamentally pan-Slavic state bordering the Austro-Hungarian Empire was accountable for the assassination. This later was proven to be true because the Serbian chief of staff had assisted in planning the assassination3. Preliminary worldview believed that Serbia was accountable for the assassination, and the early world reaction denounced the act. This factor gave Austria a valid reason for payback. However, the Austro-Hungarian dual monarchy operated on a slow pace. This is because Austria could not do anything without being certain of German support. After getting Germany promise to support them in any action they embarked against Serbia, they sent a list of degrading needs on July 23. Serbia obliged to most of the demands a nd promised to settle the rest through an international conference. Nevertheless, Austria-Hungary refused the offer and proclaimed war on Serbia on July 28, 1914. Austria-Hungary thought the war would result to a quick victory4. Outstanding among the war origination were the imperialist, terrorist and economic battles of great powers. For instance, Germany as an empire advocated to develop itself as the greatest power on the continent. The Germans were also determined to challenge Britain on the subject of superiority. Therefore, the conflict between Austria-Hungary and Serbia paved way for nations like Germany to show their power and might5. Thus, when Austria-Hungary declared war on Serbia, other declarations followed suit. Nations controlled by other states started developing feelings of nationalism. Nations grouped together in rival military coalitions to fulfill their objectives. They fought to achieve colonies and land. In the end, a number of governments clouded international friendships by undertaking secret diplomacy. Many countries were involved in the war; however, countries joined the war in different periods. The war consisted of three sides where nations could join. One choice was â€Å"the central powers, which consisted of Germany and Austria-Hungary† who were later joined by Bulgaria and the Ottoman Empire who initially were neutral before joining the central powers. The allies consisted of Ireland, Great Britain, France, Belgium, Russia, Montenegro and Serbia. Portugal, Italy, Greece and Romania later joined the allies. The â€Å"neutral nations consisted Norway, Sweden, Denmark, Netherlands, Switzerland, Albania and Spain†6. The western front Immediately after Austria-Hungary d

Designing for organizational Effectiveness Essay

Designing for organizational Effectiveness - Essay Example Companies can adopt organization effectiveness technique as a parameter to assess growth and the rate at which goals are attained. There are numerous methods that can be used to conceptualize how organizations work. For instance, Gareth Morgan described a model that can be used to study organization effectiveness. In the model, Gareth uses metaphors to study organizational effectiveness; that is, machine, organism and brain (Morgan 17). Machine in used as a metaphor for explaining the mechanical aspect of organizational effectiveness. It seeks to investigate issues such as complexity in structure, competition and random changes that take place in the organization’s external environment. It is important to identify that the system of command within an organization influences its effectiveness. In addition, the functioning of an organization is dependent on its structure. Complex structures and systems of command are sometimes confusing and, therefore, result in dismal performance of an organization (Daft 79). Structures within an organization should be simple and easy to work with in order to boost efficiency and performance. In essence, research has shown that bureaucracy in organizational structure is a core determinate of performance in any enterprise. Organization structures that facilitate good customer relations and conducive working environment have proved to be the best in management. However, different organizational structures fit different organizations. In this regard, enterprises should conduct comprehensive research when deciding the type of structure to adopt. Competition in the market highly influences the performance of an enterprise. For an organization to survive in a competitive environment, certain measures must be put in place to ensure that operations are not interrupted. It is essential for an organization to study the surrou nding environment cognitively in order

Wednesday, October 16, 2019

World War One Research Paper Example | Topics and Well Written Essays - 2250 words

World War One - Research Paper Example For over twenty years, many nations in Europe had been developing alliances. The alliances were assumed to promote peace. This is because states believed that they would defend each nation in case war arose. The dangerous thing about the alliances was that a conflict between two nations would lead to all other nations joining in the war. Therefore, when a dispute arose between Austria-Hungary and Serbia it resulted to world war one1. The war originated in Balkans, a place famously known for a number of small wars. The murder of Archduke Francis Ferdinand the successor of the Austria-Hungary throne, who thought that his mercy for the Slavs would reduce the anxiety between Austria-Hungary and Balkans. The archduke and his wife had planned to visit Bosnia, as they travelled through Sarajevo on June 28 of the year 19142. An Asian better known as Gavrillo Principe jumped onto the car that carried the heir and his wife and shot them. The Archduke and his wife died instantly. The assassin w as said to be a student related with a Slav nationalist terror group famously known as block hand, which was fighting for freedom from the Austro-Hungarian Empire for the Slavic minorities. From the start, the Austrians alleged that Serbia, an independent and fundamentally pan-Slavic state bordering the Austro-Hungarian Empire was accountable for the assassination. This later was proven to be true because the Serbian chief of staff had assisted in planning the assassination3. Preliminary worldview believed that Serbia was accountable for the assassination, and the early world reaction denounced the act. This factor gave Austria a valid reason for payback. However, the Austro-Hungarian dual monarchy operated on a slow pace. This is because Austria could not do anything without being certain of German support. After getting Germany promise to support them in any action they embarked against Serbia, they sent a list of degrading needs on July 23. Serbia obliged to most of the demands a nd promised to settle the rest through an international conference. Nevertheless, Austria-Hungary refused the offer and proclaimed war on Serbia on July 28, 1914. Austria-Hungary thought the war would result to a quick victory4. Outstanding among the war origination were the imperialist, terrorist and economic battles of great powers. For instance, Germany as an empire advocated to develop itself as the greatest power on the continent. The Germans were also determined to challenge Britain on the subject of superiority. Therefore, the conflict between Austria-Hungary and Serbia paved way for nations like Germany to show their power and might5. Thus, when Austria-Hungary declared war on Serbia, other declarations followed suit. Nations controlled by other states started developing feelings of nationalism. Nations grouped together in rival military coalitions to fulfill their objectives. They fought to achieve colonies and land. In the end, a number of governments clouded international friendships by undertaking secret diplomacy. Many countries were involved in the war; however, countries joined the war in different periods. The war consisted of three sides where nations could join. One choice was â€Å"the central powers, which consisted of Germany and Austria-Hungary† who were later joined by Bulgaria and the Ottoman Empire who initially were neutral before joining the central powers. The allies consisted of Ireland, Great Britain, France, Belgium, Russia, Montenegro and Serbia. Portugal, Italy, Greece and Romania later joined the allies. The â€Å"neutral nations consisted Norway, Sweden, Denmark, Netherlands, Switzerland, Albania and Spain†6. The western front Immediately after Austria-Hungary d

Tuesday, October 15, 2019

A critical and thoughtful analysis of the origins of the recent Essay

A critical and thoughtful analysis of the origins of the recent financial crisis - Essay Example concerns were developed regarding the level of security of the financial products provided by financial institutions. Particular emphasis was given on the potential risk of subprime mortgage products offered by most USA banks. However, no measures were introduced for limiting the relevant risk. In this context, the appearance of the crisis in 2007 can be characterized rather as expected; it was just the issue of ‘when’ the crisis was going to appear and not ‘if’ there were chances to occur. The origins of the recent financial crisis are critically discussed in this paper. The literature published on the particular subject is presented aiming to show the different approaches used for the explanation of the crisis as a series of events, which caused severe turbulences to economies worldwide. The potential differences in the arguments used for explaining the crisis reveal the following fact: even after its end, the above crisis has not been fully understood, in all its aspects. The fact that certain theorists set the end of the crisis in 2009 while other estimate the end of the crisis in 2010 is another proof the misunderstanding in regard to the actual forms and the effects of the specific crisis. 2. Origins of the recent financial crisis – critical analysis ... they had managed to mask this risk by giving emphasis on certain characteristics of these products, for example the potential of the customer to choose the number of instalments or the level of interest. In a report published by the World Bank in 2009 it is noted that the origins of the global financial crisis of 2007-2009 can be identified in ‘the economic growth of the years 2003-2007’ (World Bank, 2009, p.94); i.e. the crisis of 2007-2009 is considered to have its roots in the economic decisions of the pre-crisis period, a claim which leads to the assumption that the crisis was unavoidable. In accordance with the above view, the financial crisis of the period 2007-2009 was not related exclusively with the banking practices of 203-2007 but, mostly, with the management of the economics of the state, for example, the investment decisions promoted by the governments worldwide. In the case of Dubai, the continuous increase of investment on construction projects led to the high increase of the relevant debt – referring to the funds used for the completion of these construction projects. It is noted that during the above period, the economic growth reached a percentage of 5% - which was unique since the 1970s (World Bank 2009). However, no measures were taken for protecting economies from potential failures. In fact, the extended use of risky financial products, a result of the radical growth of the above period, has facilitated the increase of leverage. Legislators avoided reacting on time, mostly because the actual risks were not clear. The masking practices, as mentioned above, used by financial institutions helped to hide the risks of leverage and the risk related to the ‘structured financial products’ (World Bank 2009, p.94), extensively used by USA banks

Monday, October 14, 2019

Descriptive Essay Essay Example for Free

Descriptive Essay Essay My nose is overwhelmed with the smell of hairspray, baby powder, and a fruity perfume. There are too many girls in here, all struggling and fighting for a space near the mirror that covers the entire back wall. It’s dim in here, but it’s a good kind of dim, almost calming. The only light is coming from the round vanity bulbs that line the top of the mirrors, making it so that the fluorescents don’t impair what natural light reveals. I make my way to the red lockers on the right, squeezing past two of my fellow giggling cast-members as they try to make their way out the swinging door. After opening my locker, personalized with my name stickered on the front in purple sparkly letters, I get out my bulking make-up bag and curling iron. My eyes dart across the room in search of an available outlet, hoping one even still exists within the chaos. I look around the base of the walls near the white and blue tiled floor, trying not to get annoyed at all the hair straighteners that are just sitting there unused and warming. I roll my eyes and sigh, I could be finished curling my hair by the time the straightener’s owner even picks it up to begin taming their frizzy head. I shouldn’t be surprised though, this is always how the dressing room is an hour before the first show. Arms full of beauty products, and attempting to keep my curling iron’s cord from dragging across the floor or getting stepped on by the constant rush of people moving about the small room. I finally spot someone unplugging her phone charger from the wall and jump on the opportunity to steal an outlet before anyone else notices. I set my curling iron on the highest possible heat and click â€Å"turbo-mode. † I will apologize to my hair later for the abuse. The counter beneath the mirror is covered in bronzer powder, used eyeliner pencils, and countless lost bobby pins. I slide my arm across the objects askew making them into messy pile in the corner. This isn’t my ideal â€Å"getting ready† station, but it’ll do. I’m just grateful to have secured a spot near the mirror and outlet; you’d be surprised how stressed one can become when they don’t have a place to get ready thirty minutes before it’s time to take places on stage. I look in the mirror, face naked and hair in a messy bun, and realize I have a lot of work to do. I spot my best friend and fellow lead in the corner near the sink, already in full costume and stage make-up, peering down at her script in concentration. I smile to myself; it’s so typical of her to be trying to memorize her song lyrics at the last minute, but I know she’ll be great. The stage manager walks in to announce that we only have a few more minutes to get ready before show-circle, urging us to get a move-on. In light of the excitement, I see one of my friends pull out her iPod and speakers and I know exactly what is coming. Nothing pumps you up before show more than rocking out to show-tunes and dancing while you pat blush on your cheeks and fluff your hair. One our unanimous favorites being the Disney song from Mulan, â€Å"I’ll Make A Man Out Of You,† in which literally everyone sings at the top of their lungs without hesitation or missing a beat. Mouth open wide putting on mascara, the finishing touch to my stage make-up, I start bursting out laughing as one of my friends jumps on a chair wearing nothing but a sports bra and boy-shorts and begins to dramatically sing into a hairbrush. I absolutely love these crazy theatre people. I quickly remove the hair-tie from my bun and brush out my ginger curls, swaying to the music at the same time. I’m so lucky to be playing the part of a horrible, mean, dirty, inn-keepers wife – meaning that I pretty much just have to make my hair into a rat’s nest in order to look the part. Perfect, considering I only have about ten minutes to transform. I pack up all my brushes and different shades of eye shadow, currently wearing the darkest shade of grey I could find, shove them in my bag without the intent to be organized, and head for the costume closet. Everyone is throwing off their t-shirts and athletic shorts and getting into their eighteenth century French peasant costumes. I open the door to the closet and find, not to my surprise, even more people digging around looking for lost items of clothing. The floor is covered with clothes and costume jewelry, and I can’t imagine how anyone is supposed to find anything in here. I keep my costume in the corner, all confined and zipped up in a dress-bag. Sifting through my multiple costumes I find my first outfit change. It consists of an ugly green dress with floral patterned strings lacing the top together, a white puffy shirt to go underneath, black tights, a hideous striped apron, and scraped black character shoes. I leave cramped closet and begin to feel slightly claustrophobic. Either from the heat of so many bodies in one place or due to the fact that I have to shove myself against the wall in order to have any space to lay my clothes out, I begin to get anxious and feel the need to just get this over with and escape the crowd. Once dressed and ready to go, I check myself in the mirror for the last time and apply a dark shade of lipstick that says: â€Å"I hate my life, love scamming people, and absolutely despise my husband. † A perfect fit for the role of â€Å"Madame Thenardier† whom I will be portraying shortly. I leave the dressing room to meet up with the rest of the cast, everyone looking like they just stepped out of a French battle scene in order to set the opening scene. Outside the dressing room it is open, cool, and quiet – quite a drastic change compared to the loud and stuffy dressing room. Our director announces that the show will start in five minutes and in one giant herd everyone rushes out of the dressing room, closets, bathrooms, and black-box and makes it back-stage. I can almost physically feel the energy of the cast seeping into my own skin giving me a boost. I hang back for a bit, muttering a few lines of excitement and encouragement to my friends before approaching the water fountain in attempt to cure my rather out-of-no-where dry throat. I gulp down a few mouthfuls and wipe the remaining water on my sleeve and follow the rest of the cast back-stage. It’s dark and my eyes take a while to adjust, guiding myself with the light that is coming from beneath the giant dark red curtains. Everyone is quiet, shuffling around looking for props on the labeled tables and attempting to put the finishing touches on their costumes. The only sound to be heard is the mumble of hundreds of audience members just a few yards away. A feeling in the pit of my stomach settles in, and my heart begins to race. My senses enhance, and I can hear individual conversations from across the curtain. I try to pick out any familiar voices that may be waiting behind the red wall, but I know it is unlikely with such a large amount of people. My stage manager whispers to everyone to get into place, the show is about to start. I feel my way across the dark stage and stand in my assigned position. No one says a word. Adrenaline begins to pump through my veins and I have to resist the emptation to peek under the curtain to see how many people will be watching. Silence slowly falls over the unseen audience. All I hear is the breathing of my fellow cast-members beside me, and a few footsteps as the last few people find their spots. All lights from beneath the curtain go off, and I am now standing in complete darkness. I can hear my heart pounding in my ears and my stomach feels as if it is about to fall through the floor. I rub my sweaty palms against my apron, close my eyes, and take a deep breath. The curtain opens.

Sunday, October 13, 2019

Characteristics of System Modules

Characteristics of System Modules Identify and report the names , purpose and characteristics of system modules such as mother board, power supply, CPU, Memory modules, storage devices, display devices, adaptor cards, ports and cases in the given machine.(10 marks) Name: Mother Board (P4-GA-EP45T-UD3LR {775/DDR3} w/Sound+LAN) Purpose: The purpose of mother board is to guide the computer do computations. It has buses, or electrical pathways to allow data to travel between the various components that include in a computer and it have two-chip layout that can perform with lower power consumption. Characteristics: It is the basic system of the electronic circuit of computer and all the components for the computer system are glued on it with its various slots and connectors. Moreover, CPU, panel connector slots, memory cards, the adapter cards, DDR slots, AGP, AMR and PCI slots, north and south bridges are glued on it. The back panel ports stick through the back of the case. fig 1.1 Motherboard Name : Power Supply ( ATX power supply with 550W ) Purpose: The purpose of power supply is to deliver electrical power for every connector in the system board and its expansion converter of AC current voltage to DC current voltage. Characteristics: power supply is the converter of AC current voltage to DC current voltage and it has 24 pin or 20 pin and 4 pin. Power supply of 24 pin and 20 pin is to provide motherboard and 4 pin auxiliary is for CPU fan. Name: CPU (Intel Core 2 Duo 2.93GHz {3 MB / 1066 / 775 LGA Socket}) Purpose: The CPU, the brain of the computer, is to receive data from user and it reads, interprets informations and executes commands. Characteristics: In a PC, the CPU uses its ALU (Arithmetic/Logic Unit) to carry out mathematical operation and it can change location data in memory to another address fig1.2_CPU Name : Memory Modules( DDR2 RAM 2GB 240pin 800 MHz Kingston ) Purpose: It enables computers to work faster because all the information processed by the CPU is written or read from memory, Characteristics: Memory module is a board used to refer to a series of dynamic random access memory integrated circuits modules mounted on a printed circuit board and designed use in personal computers, workstations and servers. Name : Storage Devices (such as Floppy, Hard disk, Tape, CD, DVD drives) Purpose: It can save data permanently from temporary data storage by optical and magnetic methods. Characteristics: Major magnetic devices (floppy disks, hard disks, and tape) are rigid disks that are permanently sealed in a non-removable, vacuum- tight portion of the drive unit. With the optical media (CDs, DVDs), data is stored digitally on a light-sensitive material by a powerful, highly focused a laser beam. Name : Monitor (19 LCD Color Monitor(View Sonic wide view 1932 wm with DVI+LED) Purpose: Monitor is the device to display the videos and graphics information generated by the computer through the video card Characteristic: Monitors are similar to televisions but display information at much higher quality. There are two kinds of monitor. They are CRT (Cathode ray tube) and LCD (Liquid Crystal Display).LCD monitors are much thinner, and less power consumptions than CRT monitors Name : Adaptor Cards Purpose: is to enable our computer to communicate with another peripherals such as monitor Characteristics: Motherboard Graphic Adaptors are low cost flat panel display interface card to use on board. Name : Ports Purpose: It is used to connect with electrical devices that need for personal computer system. Characteristics: It is the place where the devices needed to insert in motherboard for a computer. And there are many ports on following. Ports Name Pins Inserted Particles PS 2 6 pins Key Board, Mouse Serial 9 pins modem, mouse, joystick Parallel 25 pins printer VGA 15 pins monitor USB 4 pins mp3, memory sticks, etc. RJ 45 8 pins use to connect with network Name : Cases Purpose: It is the box or tower which can enclose the main components of a computer such as motherboard, power supply, drives and many peripherals. Fig 1.3- System unit and Casing Characteristics: Cases are usually constructed from steel, aluminium or plastic is sometimes used. And it is the largest component in computer system. Tower cases come in mini, mid and big towers and intended to stand on the floor. There are the capacities for CD-ROMs, floppy disk, hard disk drives. I/O ports can insert in back panel shield. Moreover, Cases are more than 14 inches tall. Task 1 b) Identify the names, purposes and performance characteristics of the standardized peripheral ports in the machine such as Serial, USB, Firewire, DB, RJ, Din, Mini-DIN, Centronics, Associated cabling and their connectors.(10 marks) Fig1.b Name: Serial Port(9 pin) Purpose: It is to provide a standard connector and protocol to let our attach devices, such as modems, to our computers Performance characteristics: It is the basic external connections to a computer and Integral part of most computers. The serial port completely in support of USB connections, most modems still use the serial port, and in some printers, PDA and digital cameras. Name: Parallel Port Purpose: It is to connect the PC with printer, external CD drives, Zip drive, external hard disk drive, or tape backup device. Performance characteristics: The parallel port can sends data simultaneously over 8 data lines at speeds of12,000 Kbps. Name: USB (Universal Serial Bus) Port Purpose: It can allow data to transfer between electrical devices and supply electrical power to that devices from cable without own power source. Performance characteristics: USB port is depended on by some devices to get power or charge their battery. Moreover, USB for connecting on personal computers and equipments such as network adapters, broadband and cellular modems for Internet access and USB printers to be shared on a home network. Name: Firewire Purpose: FireWire is to connect data storage devices to anything from TVs or even professional Video recording apparatus because of its high data transfer rate, its perfect for transporting video and digital playback device to a digital recording device. Performance: FireWire can provide more power than USB 2.0 and can deliver data faster. And most satellite TV and digital receivers for cable have a Firewire output and this port can recorded programming to a PC in its original MPEG2 format. Fig: 1b.1for FireWire on popular digital cable terminal used today. Name: DB Purpose: Data Bus is connections between and within the CPU, Memory, and many peripherals that used to carry data. Performance: There are 2 types of data bus, they are data bus and address bus. The data bus is the media that transfer data and address bus transfer information about where the data should go and let to be transferred data faster. Name: RJ (Registered Jack) Purpose: It is the port for twisted pair cable called LAN (local area networks), especially Ethernet or RJ-45 that can link with MODEM or Ethernet Switch. And Modem RJ-11 connectors are also to connect some types of LANs with modems. Fig 1b.2 RJ-45, RJ-11 and Ethernet switch Performance Characteristics: RJ-45 looks similar to RJ-11 that used for telephone equipment, but RJ-45 are a bit wider than RJ-11. Moreover, RJ-11 is connector that has a four or six wire connectors that used to connect telephone equipment. Name: Din Purpose: It is used in AT style of computer. DIN connectors held in place by the friction of the connector body and by pins. And it is used in PC keyboards, MIDI instruments, and etc. Performance characteristics: DIN connectors are round, with pins arranged in a circular pattern. Name: Mini-Din Fig. 1b.3 Purpose: It is the another type of DIN connector Performance: MINI-Din connectors are 9.5 mm in diameters and come in seven patterns that in the form of number of pins from 3 to 9. Name: Centronics (printer port) Purpose: Centronics port shows the bi-directional version of the port, which allows the transmission and reception of data bits at the same time. Performance Characteristics: It has 36 pin connector to connect the PC with printer. That can flow data with maximum 4 megabytes per second for faster printing and back channel status and management. And new standard of Centronics port can connect scanners, tape drives, Hard disks, computer networks adapters and other devices. Task 2 List the 3 most popular types of mother boards, their components and their architecture (6 marks) Types of motherboards XT (Extended Technology) AT (Advanced Technology) ATX (Advanced Technology Extension) The components include in motherboard are The CPU, the busses, Chipsets (controllers), sockets, connectors, etc Architecture of motherboard The motherboard is a board covered with electronics and it is just a big plastic sheet which is full of electrical conductors. And the conductors (tracks) run across and down, and in several layers in order to connect all the individual components, and transfer data between them. The cabinet and the motherboard are made to satisfy each other, so there are holes in the metal for the connectors mounted on the board. Finally, the motherboard has to be linked to the PCs power supply installed in the cabinet. b) Identify the purpose of CMOS memory in your PC and list out what it contains. Describe how and when it is necessary to change the CMOS parameters (6 marks) The purpose of CMOS in PC CMOS (Complementary Metal Oxide Semiconductor) is situated in BIOS chip It requires very little power and it can be powered by a small battery thats integrated into the motherboard hold data It will be automatically recharges while the computer is on. CMOS MEMORY contains Standard CMOS Setup Program BIOS Features Setup Program Power Management Program PNP/ PCI Configuration Program Load BIOS Defaults Program Load Setup Defaults Program Looking about Integrated Peripherals Supervisor Password User Password IDE Hard Disk Drive Auto Detection Hard Disk Drive Low Level Format Save and Exit Setup Program Exit Without Saving Program CMOS Parameters can be changed in CMOS Setup Program and this program can be entered by pressing the DEL or F2 key continuously during the Window Program is started to run. In Most Motherboards that have jumper which allows the user to return to the default CMOS setting configured by the manufacturer in CMOS restore to factory defaults. This is useful because when you cannot enter the CMOS Setup Program because of the incorrect CMOS setting or Lost CMOS Setup password. So, that make sure the power is completely off when you shorten the jumper. c) You are required to use two different types of Printers and list the following information derived from each printer: i) What are the printer technologies, interfaces and options for upgrades available for your printers (4 marks) ii) What are the 2 common printer problems which you can expect from our printers, list our remedies for the problems using appropriate references? (4 marks) Two different types of Printers are Serial Printer Page Printer In Serial Printers, Two Groups can be categorized as follow: Impact Printers (Using Ribbon) -Dot Matrix Printers b) Non- Impact Printers (Using Toner Cartridge) -Thermal Printers -Ink Jet Printers In Page Printers, Non Impact Printers Laser Printers (Mono chrome, Color laser) Interfaces Of Printer: It is a collection of hardware and software that allows the printer to communicate with a computer. It can make some printer more flexible in multiplatform environment. If the printer has several interfaces, it can usually exchange between them on the fly so that several computers can print at the same time. Reference from: A+ Fast Pass written by David Groth Options for Upgrade: Resolution Of Printer can be measured as DPI (dots per inches) Printer Buffer Two Common Printer Problems Paper Jam Cause of Toner drum on laser printers Remedies for Printer Problems If the is jammed, the first work is to pull out any remnants. Even the smallest piece of paper could cause the problem so check your printer carefully. If the problem is related with toner cartridge, check to see your printer toner cartridge that is empty or low. So, the solution is to refill the toner to your laser printer and this problem is depending on time and you must check once a year for your printer. Moreover, the major problem is the ink will dry out in the small nozzles and block if they are not use at least once a week. Task 3 For this task and subsequent task you need to set up a small Windows XP network using at least 3 computers. Produce a report with appropriate screen capture evidencing your practical work and covering the following information: Identify the types of network cables, their characteristics and the connectors which you will use for the network.(5 marks) Types of Network Cables Characteristics Connectors that use for the network Unshielded Twisted Pair (UTP) Cable It consists of several pairs of wires twisted in the insulated jacket and found in 10/100 Base T Ethernet networks. Topology: Star RJ 45 Coaxial Cable (RG) Suitable for most LANs communications that consists of copper wire sealed by insulation and metal foil shield Topology: Bus RJ 58 (use for 10base2 (Thinnet) Ethernet),RJ 8(use for 10base5 (Thicknet) Ethernet), Fiber Optic Cable A thin, flexible glass fiber covered by rubber coating and provides transmission speed from 100 Mbps up to 1 Gbps and a maximum distance of several Miles. Topology: Star ST/SC ST a barrel-shaped connector SC- square type connector Shielded Twisted Pair (STP) Cable 10 Mbps to 2 Gbps for Ethernet, 16 Mbps for Token Ring Topology: Star or Ring RJ 45 for Ethernet, IDC/UDC for Token Ring (IDC-IBM data connector, UDC-Universal Data Connector) Research and list five different technologies available for Internet connectivity for your network and list their strengths and weaknesses. (10 marks) 5 different technologies for Internet Connectivity DIAL-UP Dial up internet uses a modem and dial-up networking (DUN) in Window to establish a connection between a PC and an Internet Service Provider (ISP). It uses standard telephone lines and ties up the phone while it is operating. Dial-up speed is limited to between 52 Kbps and 56 Kbps. ISDN (Integrated Service Digital Network) it is a special type of phone line that is able to carry data faster than a regular dial-up. It also has a separate voice channel, so you can place voice calls while connected to the Internet. It requires special phone lines from the phone company. ISDN is a dial up connection and uses dial up networking. However, it establishes the connection much more quickly than a standard dial-up, usually within 5 seconds. ADSL (Asymmetric digital subscriber line) It enables Internet using existing copper wired telephone networks. It uses the main concept of DSL technology and it works by splitting the existing telephone line signal into two: one for voice and the other for data. ADSL is asymmetric as it uses most of the channel to transmit downstream to the user and only a small part to receive information from the user. http://homepages.uel.ac.uk/u0113650/DSLBASICS.html FIBER CONNECTION It can transfer data via light waves. And data transmission is incredibly fast. They are made from glass or plastic fibers in the core of the cable surrounded by a cladding layer (designed to reflect light back towards the core) and a buffer coating, BROADBAND internet access Broadband has a high rate data transmission and minimum speed that users can get is 256 Kbps. Broadband uses lower-bitrate transmission methods. Broadband technologies supply double rate than Dial-up modems and generally without disrupting telephone use. Strengths and Weaknesses for Internet Connectivity Kinds that use for Internet Connectivity Strength for using this technology Weakness for using this technology Dial-up . Cheapest type of Internet connection . Low price . Lower speed than any other . Discomfort of typing up phone line ISDN . Call setup is very quick . Low retrieval time . Can carry data and voice at the same time and voice clearness is incomparable . ISDN routers and modems are more expensive than any others . Data connections are not available in all locations ADSL . High speed connection . Use of phone line while connected . Faster download than upload . Line testing takes a long time . Home user is contented at 50:1 by sharing your 512 Kbps with 49 other people, giving you 10 bps. Fiber connection . It can transmit data over long distance without much data loss .. . Can cost more price than broadband connection cost . not susceptible radio frequency Broadband . Maximum transmission speed is 4 Mbps . Transmission capacity is faster than Primary ISDN . Bandwidth is not always reliable for customer . Not sufficient enough to provide good video quality. c) List the 5 networking capabilities of Window XP (5 marks) 5 networking capabilities of Windows XP Internet Connection Firewall (ICF) When your computer is connected to the Internet or other route for the network, there is a threat of not permission attack to approach your computer data. If the computer is connecting the external network, a Firewall can protect your home network versus the danger of unsafety network jammed to pass. Network Setup Wizard Window XP introduces us with a Network Setup Wizard for easy using of Setting up your network and it use to configure the Internet connection on your network, and supply the Internet Connection Firewall. Moreover, it can be run on the Window 98, Window ME and Window XP computers on your network using the CD or a floppy disk. Network Diagnostics Features Network Diagnostics features help diagnosing network problems increase people who is setting up small networks. The features of The Network Diagnostics Web Page and NetSh helper, Network Connections Support Tab, Network Connection Repair Link, Task Manager Networking Tab and Updated Command Line Network Diagnostics Tool, enable troubleshooting of various problems by the users. Point-to-Point Protocol over Ethernet (PPPoE) Window XP creates connections using Point-to-Point Protocol over Ethernet (PPPoE). By using this Broadband modem, LAN users can have high-speed data networks. And PPPoE provides separate connections for each user to a remote server. In addition, it also enables your internet connections join smoothly with Internet Explorer and other Window Applications. Wireless LAN Enhancements Window XP deploys some features and enhancements about Wireless LAN networks and these enhancements are summarized as follow. Enhanced Ethernet and Wireless Security (IEEE 802.1X Support) Wireless Zero Configuration Fig.3 c.1 showing about internet connections Task 4 Task 4 For this task you need to do a fresh install of Windows XP (or later operating system permitted by your tutor) on a computer. Prepare a report evidencing your practical work covering the following questions: List out the names, locations, purpose and contents of any 10 Windows XP (or later versions permitted) systems files.(10 marks) By this question, I need to install a Window XP (Service pack 2); I insert a Window XP installer disc into my CD drive. When the CD is read, the monitor screen shows the following messages. Fig 4a.1 By this message, I pressed any key such as Space, Enter, Backspace, etc Fig 4a.28 So Finally, The Window XP installation was finished and the wallpaper and Recycle Bin icon is display on the screen. Simple Reference: From Practical Room List out the names, locations, purpose and contents of any 10 Window XP (or later versions permitted ) system files (10 marks) Names of 10 Window XP system files Location: All system files are located in C: Window XP file Purposes of system files NTLDR : It usually run on primary hard disk drive and the purpose is to loading the boot process for Window NT operating system including Window XP, Window Server 2003. NTDETECT.COM : is used on computer that has BIOS firmware. In Windows Vista and later Operating Systems, NTDETECT.COM is now only to supports ACPI (Advanced Configuration and Power Interface). IO.SYS is an essential part of MS-DOS and Window 9x because it contains MS device drivers and DOS initializing Program. And it can initialize the device drivers into memo MSDOS.SYS It is a hidden system file created on the root of the boot drive. It can changed the PC environment by replacing the file contents [Paths] WinDir=C:WINDOWS WinBootDir=C:WINDOWS HostWinBootDrv=C [Options] BootGUI=1 Network=1 BootMulti=1 CONFIG.SYS can set up the memory managers in the system. It can load files, mostly TSRs and devices drivers, in turn(console, disk, serial port, etc BOOT.INI: is to protected from user configuration by having the file attributes such as system, hidden, read-only. To manually edit it AUTOEXEC.BAT contains DOS commands that executed automatically when a PC boots . This locates in the root directory of the hard drive of the computer and is used to set defaults to run programs that should be executed during setup. Contents: PROMPT $P$G COMMAND.COM is the default operating system shell file for DOS operating system and the default command line interpreter on DOS-based 16/32-bit Window versions of 9x and Me. NTUSER.DAT : it is to set the default language to instead of English and can edit file to correspond to the new language BOOT.INI it is a text file available on the computer. And it is fetched by NTLDR and displayed as OS options. Contents: [boot loader] timeout=10 default=multi(0)disk(0)rdisk(0)partition(2)WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(2)WINDOWS=Microsoft Windows XP /fastdetect C: = Microsoft Windows b) Use the following tools in Windows such as Microsoft Management Console (MMC), Event Viewer and Task Manager on the system. List out the practical uses of these tools. (10 marks) Microsoft Management Console (MMC) Fig 4b.1 First, if you want to enter the Microsoft Management Console, youll enter RUN (win key + R key) program and type MMC. And then MMC program is opened. Fig 4b.2 In Fig 4b.2, there is no program in console root and if you want to add or remove snap-in, go to the File Text Menu Bar (Ctrl+m). You can add the programs that you want to do in the same time and you can click Remove button to remove the program that you dont want to do. Fig 4b.3 Fig 4b.4 shows that you can choose the programs that you want to do and Click Add if not you can click Close Button to exit from the program. Fig 4b.4 The above example shows that the user chose the Device Manager Program to add to the Console Root. And he clicks Add. Fig 4b.5 And the message box shows on the screen to choose the kind of computer (local or another) and the user chose local computer. Click Finish to save the program in add or remove snap-in. Fig 4.6 This above Add/Remove Snap-in box shows that the program that you already add and if you want to add second program, you will click Add button for next time. Fig 4b.7 Fig 4b.7 shows that the user seems to add Disk Defragmenter, Disk Management (Local), Event Viewer (Local), Device Manager on local computer. And the picture is clicked Disk Defragmenter program. Fig 4b.8 The picture shows the Console1.msc file is saved in desktop. Fig 4b.9 Also the Console1.msc file is saved on the desktop on the screen. So, you can also see the Console1.msc file on desktop. And so, u can be use Disk Defragmenter, Disk Management (Local), Event Viewer (Local), Device Manager on local computer by clicking the Console1.msc file. Event Viewer Fig 4b.10 If you want to use event viewer software program, press Window key+R and type eventvwr and click OK. Fig 4b.11 In event viewer software program, you can see the application, Security and System software icons. Fig 4b.12 When you click Application list, you can see what happen in your Computer Operation System such as Informations, Warnings, and Errors when the computer is running. Fig 4b.13 And system list shows how many events occur date by date such as Errors and Information. Fig 4b.14 is as same as Fig 4b.13 In above picture is about System Properties and it can be opened by clicking right click on system icon. Fig 4b.15 In the box of System Properties, the user can adjust the Maximum log size, overwrite events date and clear log manually. Fig 4b.16 Fig 4b.16 shows that the user can change the Event types if the only he wanted by clicking right click and go to view and then click filter. And click OK to show them or click Cancel to get back to the Menu. Task Manager If you want to enter the Task Manager Program, press Window Key and Run key to enter Run Program and type as taskmgr. Fig 4b.17 The above message box is showing that which applications are running on the OS and has Applications, Processes, Performance, Networking and Users icons. Fig 4b.16 The above picture shows that if you want to close Windows Messenger, select it and click right click and choose End Task. Fig 4b.17 And this above picture is about if you want to open the program (eg. Window Media Player), click New Task to create New Task. Fig 4b.18 Moreover, the user can look which program takes how much memory usage in Process Option. And if you want to close Window Media Player click end process to close. Fig 4b.20 And in Performance option, the user can see the CPU and PF usages and histories. Moreover, In Networking option, the use would see the Connection between Local Area Network. Fig 4b.21 In user list, the user can see that how many user accounts in there. And he can disconnect or log off the Administrator (user) account. à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦. c) Install two new devices after you have installed the Operation system and list out the procedures which you used for adding and configuring the devices drivers. (10 marks) I installed the Printer after you have installed the Operation system. Installation of Printer First, connect the data cable with Printer port. Fig 4c.1 And, go to the control panel and click the Printer and Faxes. Then, click Add a printer dialog-box. So, the screen shows the display box Welcome to the Add Printer. And then click Next to continue. 19th August, Thursday at 9:48 AM. Fig 4c. 2 And the message box shows that you need to choose local or network printer. If you want to share a printer, chose network printer. But you must have a printers driver in computer. So choose local printer for the users computer only. 19th August, Thursday at 9:49 AM. Fig 4c.3 Select printers port such as LPT (Recommended Printer Port/Parallel Port), COM (Serial port), USB port, so chose USB port. Fig 4c.4 I think you need to choose the manufacture and models of your printer. If you dont have printers model, click Have Disk button and choose and assign as HP and add as HP Deskjet 2200 series. Fig 4c.5 Choose either share the printer or dont share the printer. So choose dont share the printer. Fig 4c.6 So, finished the installation of printer. 19th August, Thursday at 9:55 AM. Fig 4c.7 At the end of the installation of Printer, your installed Printer is in use. Moreover, if you want to share this printer, click right-click to the sharing of printer. Fig 4c.8 And in the Sharing Tab, you need to choose Share this printer. 19th August, Thursday at 9:59 AM. Fig 4c.9 At the end, the installation is finished and the printer is ready to use now. 19th August, Thursday at 10:00 AM. Installation of Scanner Fig 4c.9 First, I mounted the scanner to USB port then the message box shows Found New Hardware and I clicked the right click to My computer icon and then choose Properties to see the property of scanner. 17th August, Tuesday at 12:37 AM. Fig 4c.10 In Hardware tab, I click the Device Manager to see for the scanner installation. 17th August, Tuesday at 12:38 AM. Fig 4c.11 In Device Manager Option, the new scanner program is showing Question Mark as unknown device or other device. 17th August, Tuesday at 12:38 AM. Fig 4c.12 For the first step, I go to the My computer program and then click the Canoscanner icon to open. In second step, I chose the Setup to Install the scanner. 17th August, Tuesday at 12:41 AM. Fig 4c.13 And the CanoScan Message Box is shown to install the scanner and then some software installation notes is shown as to know. 17th August, Tuesday at 12:42 AM. Fig 4c.14 And the message box shows that the check marks will be installed and remove the check mark if some program is not unwanted by clicking next time to unwanted program. And click Install to install the marked program and click Back to go back to the main menu. 1