Thursday, October 31, 2019

LAW OF CONSUMER PROTECTION Essay Example | Topics and Well Written Essays - 2500 words

LAW OF CONSUMER PROTECTION - Essay Example Then the consequences for recovering and claiming damages with respect to the sale of goods under a hire purchase agreement will be discussed. The first problem of note appears to be a case of misrepresentation. Keith, the sales agent with whom Vic and Gaynor negotiated the purchase of the sofa from Funky Furniture with, represented to the couple that the sofa would fit through the internal doors of their home. This concern appeared to be a pre-condition of the contract for the sale of the sofa. Having convinced the pair that the sofa would fit through the internal doors of their home, Vic and Gaynor decided to enter into a hire purchase agreement for the purchase of the sofa. Under the law of contract, misrepresentation arises in situations where there is a communication of false facts which have the effect of inducing the party who is receiving the false representation to enter into legal obligations.1 A Misrepresentation can be made either negligently, fraudulently or innocently. The extent of the applicable remedies in respect of misrepresentation will depend on the type of misrepresentation made.2 In a typical case where misrepresentation is substantiated, the innocent party can if he/she desires, rescind the contract and/or make a claim for concurrent damages.3 Vic is required to prove that she relied on Keith’s misrepresentation or that she was induced to enter into the contract because of Keith’s misrepresentation.4 If however, Vic relied on her own judgment with respect to the sofa being able to fit into the internal doors of her home she cannot claim that she relied on Keith’s misrepresentation.5 On the facts of the case for discussion however, it appears that Vic did not rely on her own judgment since she questioned whether or not the sofa would fit into the interior doors. It was only after Keith assured her that it would that she entered into the contract for the purchase of the sofa.

Tuesday, October 29, 2019

Story About Pablo Picasso Essay Example for Free

Story About Pablo Picasso Essay Good artists copy, great artists steal. Pablo Picasso was born on October 25th, 1881 in Malaga, Spain. He was baptized Catholic, but would later convert into being an Atheist. His father, a painter, specialized in painting birds and other animals. Pablo Picasso showed a passion for art at an early age. According to his mother, his first words were piz piz, an abbreviation for the spanish word lapiz which means pencil. Starting from the age of seven, Picasso started receiving artistic training from his father. In 1891, the family moved to A Coruà ±a, a city in Galicia, Spain, where his father became a professor at the School of Fine Arts. Unfortunately, in 1895, Picasso lost his seven year old sister, Conchita to diphtheria. Diphtheria is an upper respiratory tract illness and an infectious disease. Despite being traumatized by his sister’s death, he managed to make it into an advanced class at the school where his father taught. At the mere age of 13, he began his first oil paintings which were portraits of his family and the same year his sister died, he began to exhibit and sell his work. His father, Ruiz, persuaded the people at the academy he was working at, to allow Picasso to take an exam to be accepted in the advanced class. Where most kids wouldve taken nearly a month, Picasso only took a week to complete all the aspects of the exam and got admitted at age 15. Picasso spent most of his adult life in France and died on April 8, 1973 in Mougins, France. Pablo Picasso had th ree, different periods throughout his career. Picasso’s Blue Period, which began in 1901 and ended in 1904, was a collection of sad paintings that was done in shades of blue and blue green. Picasso’s Blue Period was influenced by a trip he took through Spain and by the suicide of his friend, Carlos Casagemas. After his Blue Period, then came his Rose Period which lasted for about two years (1904-1906). His Rose Period was a more uplifting period with cheery colors such as orange and pink and that featured circus people like acrobats. This period began when his psychological condition began to improve. The Rose Period has been considered influenced more by the French while the Blue Period is more Spanish influenced. The harlequin, a comedic character usually drawn with patterned or checkered clothing, became a personal symbol for Picasso. Picasso had an African Period as well which lasted from 1906 to 1909. Les Demoiselles dAvignon is a revolutionary work that introduced this period of cubism. He painted in such a style that was inspired by African sculpture and artifacts. Analytic cubism is a style of painting that Picasso developed with Georges Braque using brown and neutral colors. During this period of cubism, both artists took apart objects and drew them in terms of their shapes. Picasso’s most celebrated work is his depiction of the German bombing of Guernica during the Spanish Civil War. This piece of work, which was done in 1937, displays the harshness and reality of war and how it affects those who are innocent. Picasso is normally identified as an artist who â€Å"re-invented† art. While many artists normally painted just one side of an object or person, Picasso realized that different perspectives still mattered and so, he drew them too. Picasso did a lot of artwork during his notorious career. Two of my favorite pieces of artwork by him are Jacqueline and the Old Guitarist. Jacqueline is the name of Picasso’s second wife. I think the artwork is beautiful and I feel like he did the painting out of love and dedicated it to his wife. I also love the Old Guitarist because I enjoy looking at the angle of the man and there’s so much meaning in the artwork. The piece of art shows poverty and loneliness. Pablo Picasso’s work doesn’t relate to my artwork at all. I’m not an artist or a drawer. I’ve never had a strong interest in art and I don’t think I’ll ever reach the level Pablo Picasso was at. But, just like Picasso, I have the ability to improve and develop my skills as I go. I chose Pablo Picasso as the topic of my research paper because I feel like he’s an artist that not many people know well and someone that’s more recent than Vincent van Gogh and Leonard da Vinci. I also chose Pablo Picasso because I felt like doing a research paper on a person would be much easie r than doing a paper on an art movement or a piece of artwork.

Sunday, October 27, 2019

Aluminium Metal Matrix Composites: Literature Review

Aluminium Metal Matrix Composites: Literature Review Literature Survey- Based on Aluminium Metal Matrix Composites. 1]Shilpa P.S et al They studied the effect of reinforcement of Boron Carbide with the Al2024. By adopting stir casting technique fabricated the specimen by varying the wt% of Boron Carbide. The specimens are developed as per the ASTM. In the end they come to know that as the reinforcement Boron Carbide increased by wt% increases the Hardness, Tensile strength and Yield strength. The percentage of elongation decreases with the increase of Boron Carbide in the composition. 2]F.Abdi et al-They investigated the effect of 5 wt% of TiB2 as a reinforcement with the Al356.1 metal matrix at various temperature i.e.750c, 850c, 950c using stir casting technique. They found that at temperature 950c shows best result s for Tensile strength and Hardness and the TiB2 particles are homogenously distributed. 3]Sandeep Kumar Ravesh et al(C)-They investigated the effect of the various weight fraction of SiC i.e.2.5%,5%,7.5% and 10% and 5% flyash is reinforced with Aluminium 6061 metal matrix composite by using the stir casting method. They observed that Tensile strength, Harness and Impact strength increased with the increase in weight fraction of SiC particle. A best tensile strength 115 N/mm2, hardness 93RHN and toughness value 7.8 for 10% SiC and 5% flyash reinforced composite material was obtained. 4]K.L.Meena et al(D)-They investigated the mechanical properties of the   developed SiC reinforced with Al6063 metal matrix composite material using Melt stirring technique where the experiment was carried out by varying the reinforcement particle size such as 200 mesh, 300 mesh, 400 mesh with the different weight percentage i.e..5%, 10%, 15% and 20% of SiC particle reinforced material. The stirring process was carried out at the speed of 200rpm using the graphite impeller for a period of 15min. A homogenous dispersion of SiC particle in the aluminium matrix was observed. The tensile strength, hardness and yield strength were improved with the enlargement of particulate size and weight percentage of SiC. Percentage reduction area and percentage elongation and impact strength decreases as the increase in reinforced particle size and weight percentage of SiC particle. Maximum hardness (HRB) 83 and impact strength 37.01 Nm was achieved. 5]H.G.Rana et al-They investigated the mechanical properties and wear properties of Al7075 with the reinforcement of Boron Carbide. They concluded that using the using Friction Stir casting the fabricated specimens provides uniform mixing and enhances the tensile strength and hardness. Hence the microstructure are studied with the help of Image analyser. Based on Zirconia as Reinforcement. 6]Ram Narayan et al They investigated the effect of flyash and zirconia with the mechanical properties of Aluminium 6061 alloy composite samples developed by using the technique Stir casting. They developed the specimen by varying the zirconia (5% and 10%) and kept the flyash 10% as a fixed percentage by weight fraction. They observed that due to the presence of flyash and zirconia Hardness and Tensile strength was increased where the elongation decreased as compared to the unreinforced aluminium. The characterization will be done using the scanning the electron microscope machine and image analyser. 7]S. Roseline et al They observed the mechanical properties of aluminium alloy mmc with the reinforcement of fused Zirconia alumina. They developed the specimens by varying by the weight fraction by percentage. They evaluated the mechanical properties which indicates the variations in the Hardness, Tensile strength and Impact strength. The optimum result for mechanical properties found on the reinforcement to be 90 and 10 by weight percentage of the matrix respectively. 8]Jithin Jose et al-They investigated the effect of flyash and zircon (zirconium silicate) with the mechanical properties of Aluminium 7075 alloy and the stir casting technique was adopted to develop the specimens by varying weight percentage .They after conducting the different test concluded that keeping the zircon at a fixed weight percentage and varying the flyash found that the wear rate decreases where the tensile strength and the hardness increases. 9]Adil Ahmed.S et al-They studied the incorporation of Zirconium Nano Particles in Al356.2.The stir casting technique was used for the development of composite specimen where the Al356.2 is heated at around 750c and the Zirconium Nano particles are added .Mechanical properties are increased for 15wt% of reinforcement particle developed at 750c shows homogenous reinforcement particle and through using the Scanning Electron Microscope the microstructure of the specimen shows homogenous reinforcement. 10]J.Jenix Rino et al-They investigated the mechanical properties of Aluminium 6063 alloy composite enhance i.e. strengthened by the addition of alumina particle and zircon sand with an overall reinforcement in the Al6063 material matrix. They observed the Hardness and Tensile strength of the composite having higher value at the composite developed specimen, which having reinforcement mixture of 4wt%ZrSiO4+4wt% Al2O3. 11]K.B. Girisha et al-They studied the effect of various weight fraction of zirconium oxide nanoparticle i.e. 0.5%,1%,1.5% and 2% reinforced with Al356.1 metal matrix composite by using stir casting technique. Here they observed that particle agglomeration in the composite is due to high amount of zirconium oxide nanoparticle. Hardness and wear properties are increased as the increase in weight fraction of zirconium dioxide nanoparticle. 12]M.A.Baghchesara et al They studied the mechanical properties of developed composite specimen using the stir casting method where they considered zircon and TiB2 ceramic particles with size 1 micron and the temperature 750c respectively. The microstructure were studied by using scanning electron microscopy and hence the dispersion of reinforcement as noted. Situation of compounds of the developed specimen were examined by XRD. The end results shows mechanical properties and microstructure behavior of composite was improved compared to the monolithic alloy. Microstructures of the composites in as cast conditions shows uniform distribution of the particles and reveals the better bending in case of zircon reinforced composites compared to the TiB2 composites. But increase in the amount of reinforcement shows better conditions in case of TiB2 reinforced composites. Based On Flyash with Aluminium- 13] H.C. Anilkumar et al-They investigated the mechanical properties of Al 6061 reinforced by flyash. They fabricated the composite specimens using the stir casting method. They developed three sets of composites with particle size of flyash of 4-25,45-50 and 75-100 µm was used. The three set of composites are developed by varying weight fraction of 10%, 15% and 20%. The mechanical properties are like Tensile strength, Compressive strength, hardness and Ductility are studied. They found that increase of particle size of flyash decreases tensile strength, compressive strength and hardness of the developed specimens. They also find that by increase of weight fraction of flyash increases compressive strength ultimate tensile strength, hardness but decreases with increase of flyash particle size. 14]Muruganandhan.P et al-They investigated the effect of flyash reinforced with Al6061.By varying the wt% of flyash using the stir casting method the specimens was developed. The found that increase of flyash increase the mechanical properties upto 20% of fly ash in the metal matrix but the corrosion resistance decreases with increase of flyash addition. 15] M.Sankar-They investigated the Silicon carbide and Flyash reinforced with the Aluminium 6061 alloy.They developed the specimens using the stir casting method.They found that as the reinforcement contents increased in the matrix material, the composites hardness also increased. Tensile strength decreased with increased amount of reinforcement.   The wear rate of the composites reduced with increased weight percentages of the reinforcements. Who was Responsible for the Cold War? Who was Responsible for the Cold War? When looking at the issue of who was responsible for the cold war, we have to look at what the relationship between the United States and USSR (Union of Soviet Socialist Republics) was like before the start of World War Two. By the end of the nineteenth century Marxism in Western Europe was becoming more and more national. The imperial implications of both Marxist thought and Russian history provide the broad background and context for understanding soviet involvement in cold war. The soviet worldwide had been shaped by a history that was dramatically different from that of the west  [1]  . For example the Bolshevik revolution, the civil war, and the experience of World War two all contributed to a unique soviet perspective. Furthermore after the revolution of 1917, soviet Russia assumed the responsibility of spreading the Marxist message. Stalin seen himself as the keeper of the Marxist faith, it would emancipate mankind  [2]  . In addition historians such as Zubok and Const antine suggest that history gave the Russians the reason to see themselves as saviours of the world. Due to the events that occurred before the Cold War we can see this. Furthermore historians believed that each of them would make his own intricate cold war journey, guided by the two misleading suns of empire and revolution. Many historians believe that it was because, the United States and USSR ideologies were so different and believed that to be the underlying cause for their fear of one another. For example Russia was communist which put the needs of the state ahead of personal human rights and was ruled by a dictator. The USA was a capitalist democracy which valued freedom and believed that communism was something to fear. Americans saw themselves as champions of the free world, and tyrants such as Stalin represented everything the United States opposed. At the same time, the Soviets, who believed that capitalism exploited the masses, saw the United States as the oppressor. To emphasise the difference between the two nations we can see this by looking at their visions of the world. For example Stalin saw the world as divided into two camps: imperialist and capitalist regimes on the one hand, and the Communist and progressive world on the other. In 1947, President Harry Truman also spoke of two diamet rically opposed systems: one free and the other bent on subjugating other nations. Although World War Two was meant to be the War to end all wars it was not, the repercussions and the aftermath of what the war had caused, it just lead to a more apprehensive atmosphere all over the world, and as we can see this was defiantly the case when considering the relationship between the US and USSR. Although relations went on a downward spiral after World War Two it was not always this way, they were once allies during World War Two. However things changed after WW2, once the threat of Hitler was over, they became fearful of each other, Russias hatred for capitalism deepened when they was not rewarded for their efforts during World War Two, instead they became focused back on by the world that they was the threat the red scare began to intensify. Moreover historians have suggested that because of the enormous sacrifice of the Russian people in the Second World War, had led to the soviet lea ders to believe that the allies owed them a great deal. The cold war emerged from the ruins of world war two  [3]  Stalin expected to be rewarded for their contribution in the war especially when Russia lost 27 million people. His primary task was to regain the territories lost to Russia during the war and revolution from 1915 to 1921: the Baltics, Finland, Poland, and Bessarabia. This goal was virtually fulfilled by the end of 1945. The Cold War was a period of East-West competition, tension, and conflict short of full-scale war. It was characterized by mutual perceptions of hostile intention between military-political alliances or blocs, both systems believed that they were doing the right thing. The events that happened before and after World War two had an irreversible impact on how both of these countries perceived one another. Furthermore Stalins foreign policies contributed an enormous amount to the tensions of the Cold War. His aim, was to take advantage of the military situation in post-war Europe to strengthen Russian influence, this was perceived to be a threat to the US and everything they stood for. Stalin was highly effective in his goal to gain territory, with victories for example in Poland and Romania. To the western world, this success looked as if it were the beginning of a series of Russian aggressions. The aggressive expansion in Eastern Europe was one of the main reasons for the cause of the cold war. Therefore it can be questioned that if the Soviets had not adopted the expansionist policy, then the Truman Doctrine and the Marshall Plan may not have been initiated to keep Stalin and his spread of communism at bay. Furthermore Stalins own persona could be seen as another cause for the cold war, for example when Ivan Maisky and Maxim Litvinov were appointed in 1943. Maisky wrote that the main soviet goal after the war would be to ensure a durable peace enough for the USSR to become so powerful that no combination of powers in Europe or in Asia could even think of threatening her  [4]  . This suggest that even though Russia had not got the rewards they was expecting from World War two and the contribution of the west in the civil war in 1918 all contributed to Stalins view on spreading Communism and being strong enough to not be threatened or have a fear of being invaded by any other country. In addition Stalins actions to wanting to spread communism throughout the world, lead to policies such as the china policy which historian Odd Arne Westad came to the conclusion that Joseph Stalin china policy in the fall of 1945 was as aimless and incoherent as his European policy. However much he hoped to avoid post war confrontation with the United States, Stalin could not make his mind how to achieve this aim.  [5]  This view gives important insight into the impact of Stalins persona on the origins of the cold war. In addition Historians have also wondered whether another cause for the cold war was Stalins poor diplomacy. For example the diplomatic pressure he put on turkey caused him great problems with the west and later in 1948 his attempt his attempt to remove Tito in Yugoslavia by means of communist democracy backfired and only weakened their position. The errors Stalin made and the policies he created showed him to be aggressive and wanting to expand USSRS borders spreading they way of communism. This ultimately created more of a hysteria and fear in US, therefore being a main contributor to the cause of the Cold War. In addition when the Western democracies and the Soviet Union met up to discuss World War II, and the nature of the post-war settlement at conferences in Tehran 1943, Yalta February 1945, and Potsdam July-August 1945. At these conferences the Soviets agreed to allow the nations of Eastern Europe to choose their own governments in free elections. Stalin agreed to the condition only because he believed that these newly liberated nations would see the Soviet Union as their savoir and create their own Communist governments. When they failed to do so, Stalin violated the agreement by wiping out all opposition to communism in these nations and setting up his own governments in Eastern Europe, causing the situation to intensify. To make the situation worse, Stalin deepened the estrangement between the United States and the Soviet Union when he asserted in 1946 that World War II was an unavoidable and inevitable consequence of capitalist imperialism and implied that such a war might reoccur. This resulted in an increase in world spread fear of communism due to Stain basically going towards the thought of another World war, which could have lead to a nuclear war. In addition many of the tensions that existed in the Cold War can be attributed to Stalins policy of Soviet expansion. It is necessary to consider that the role of Stalin can be seen as a catalyst to the Cold War Furthermore the situation involving Poland was that Poland had always been the key state needed from which to launch an attack against Russia. He also wanted Poland to have a pro-Soviet government. Therefore after some time, he set up a communist government in Poland. He said that his control of Eastern Europe was a defensive measure against possible future attacks to the west it appeared to them that Russias attitude went against all of the promises that Stalin had made at Yalta mainly that Stalin would permit free elections in the eastern European states. Russia argued that it needed to maintain a sphere of influence in the area for security reasons. This caused further anxiety over Stalins policy of expansion. This then lead to the West to introduce the Truman Doctrine and the Marshall Plan, both of which sought to arrest the spread of communism. The initiation of the Marshall plan for European recovery, however from Stalins point of view the marshal plan was a large scale attempt by the United States to gain lasting influence in Europe. The marshell plan was a serious challenge to Stalin vision of a future Europe as well as to German- soviet relations. Thus he had to protect his borders but by doing so it caused him to look like an aggressive bully towards countries that would not follow his lead. For example when leadership of Czechoslovakia hesitated before ending their participation in the Marshall plan it outraged Stalin, he told Czechoslovakia immediately to cancel the plans to receive aid from the US, Gottwald (leader of Czechoslovakia) complied. This just shows the intimidation Stalin was willing to put other nations through to keep them communist and not wade to the side of the US. The nations that complied with Stalin and agreed not to participate in the Marshall plan, their economies deteriorated, while those of th e western European states began to recover and see improvement in their economies. To Stalin this was a challenge of his authority in Eastern Europe, therefore his next actions was to focus on Czechoslovakia, the communist group in Prague carried out a coup in February of 1948. Shortly after the coup the Czech president was replaced by the leader of the Czech communist party, Gottwald. Furthermore it was incidents like these that caused outrage in the western world, the intimidation of another country to not take a chance that could help their economy, to stop them countries from distracting from the way of communism rather than capitalism. Thus if Russia had not behaved and acted this way due to their expansion policy , it may not have ever got out of control and there would have been no need to implement the Marshall plan which lead to the implementation of the Truman Doctrine. To further Americas fear of communism, due to their aggressive foreign policy, between 1943-46 most western European Communist parties were at a peak in the years immediately following World War Two. The French Communist Party, for example, won almost 30% of the vote in 1946 elections. Greece was in crisis they were at the brink of civil war which finally occurred in 1946 after the Greek communists tried to seize power in 1944 due to a rise in communist leg guerrillas. This resulted in an economic crisis which at the time was being supported by Britain however this was no longer possible. Therefore America stepped in because they feared that the people would look more towards communism through desperation. This then resulted in the introduction of the Truman Doctrine in March, 1947. The Truman doctrine announced that was to be given to Greece and Turkey in the stated context of a general war against communism. The US gives $400 million as aid to help Greece in their economic crisis. However it can be said that in many ways, the Truman Doctrine marked the formal declaration of the cold war between the United States and the Soviet Union .It also solidified the United States position regarding containment. However, even though this suggests that US started the war, but if Russia had not been aggressively expanding their empire and spreading communism then it would not have caused the US to intervene and introduce the Truman doctrine due to their fear of communism. By 1946, the United States and Britain were making every effort to unify all of Germany under western rule. The Soviet Union responded by consolidating its grip on Europe by creating satellite states in 1946 and 1947. One by one, communist governments, loyal to Moscow, were set up in Poland, Hungary, Romania, and Bulgaria. Stalin used Soviet communism to dominate half of Europe. This created more of a mistrust in the USSR and the US relations resulting in the build up to the Cold War, and evidently showing that the roots of the problem was the Russias expansion policy. In relation to the previous point made to show Russias expansion during the time leading up to the Cold war, we have to look at Winston Churchill Iron Curtain. Churchill said that From Stettin on the Baltic to Trieste on the Adriatic, an iron curtain has descended across the continent. Behind that line lie all the capitals of the ancient states of central and Eastern Europe -Warsaw, Berlin, Prague, Vienna, Budapest, Belgrade, Bucharest and Sofia.  [6]  Therefore showing the scale of how fast Russia was expanding through Eastern Europe. It also emphasis the split between Russia and the US creating more of an estranged relationship between the two super powers, because it is showing the spread of communism and how quick it was occurring. The United States feared the most was the Red Scare which was becoming more serious with each invasion of the countries within Eastern Europe. Stalin also set up the Berlin Blockade with the idea that he could push western power out of Eastern Berlin, which only escalated the situation. The cold War was the brave and essential response of free men to Communist aggression.  [7]  Schlesinger believes that the soviets were wrong and that the USA was trying to stop the USSR from going any further. Another view is T.A. Bailey who also believed that the Soviets were to blame; he thinks that they always had one more plan for world domination up their sleeves. In addition further actions took by Stalin which was contributing to the end result in being the cold war, was the Berlin Blockade on the 24th June 1948. Stalin decided to blockade West Berlin by cutting off road and rail links. To break the blockade armed forces would have to smash the blockade, however this would be seen as an act of war which Stalin new US wouldnt do. He believed they would abandon their zones and leave the whole of Berlin in soviet hands. However Stalin failed to gain control of Berlin. Although he failed in this case, it still antagonised America causing them to retaliate. Therefore due to Stalin wanting to gain a foot hold in Europe and to keep aggressively expanding. This shows that each action Stalin made were all catalysts in causing the Cold War. In addition the relationship between Russia and the US escalated further to the extent were another proxy war was occurring, which was the Korean War (1950- 1953). The Korean War was a military conflict between the Republic of Korea, supported by the United Nations, and the Democratic Peoples Republic of Korea and Peoples Republic of China (PRC), with air support from the Soviet Union. The war began on 25 June 1950 it was a result of the political division of Korea by agreement of the victorious Allies at the conclusion of the Pacific War. In 1945, following the surrender of Japan, American administrators divided the peninsula along the 38th Parallel, with United States troops, occupying the southern part and Soviet troops occupying the northern part. It was soviets foreign policy that lead to them being involved in the Korean War however it was China who physically participated in the war, where as Russia was acting behind the scenes to not actually cause a physical war between them and the US. By being involved in the war it just caused the US to be more wary of Russia and showed how much influence and power the USSR had gained to have that control over China and other countries that were also communist. After looking at the events leading up to the cold war, the short term and long term causes when focusing on the US perspective we see that their view was flawed because they feared what they did not understand, they did not understand how a country could be ran under a communist government and still work, especially when the US system was capitalist. The USs response was based on their misunderstanding and fear of USSR which was more commonly known as the red scare. For example the US and Britain believed that just before WW2 they seen the USSR as more of a threat than Hitler at that time. Overall some historians such as the Traditionalist believed that Russia was to blame for the Cold War. They believed that the Soviet-led governments sought to overthrow existing capitalist governments, which can be reinforced by the fact that Russias foreign policy was aggressive expansion. In addition the US and its allies were merely responding to the threats of the Soviet Union, as we can see by the Truman doctrine. I agree with traditionalists idea due to the fact that Stalin and his successors were convinced that the legitimacy of their rule depended on validating Marxist-Leninist predictions of world revolution. If they believed that they would only succeed when these predictions were completed then they were to blame for the cold war. Russia actions of aggressive expansion throughout Eastern Europe support this.

Friday, October 25, 2019

How Do You Define Advice :: Defintion Essays

How Do You Define "Advice" Advice, in my mind, is a form of one person helping another person out; whether it is in words or actions. About 90% of the time, I believe advice comes in the form of words. Advice can be verbally spoken to somebody, or typed/written and given to somebody. In either example, it's advice that's being given to help somebody out. The other way I mentioned was advice given by actions. In my own life, I'm trying to quit smoking cigarettes and finding it hard; especially when I look around and see others doing it. However, the advice I receive when I look around are from those not smoking and those hacking and spitting because they smoke. It's sort of subliminal for me in the sense that I'll be hacking and spitting if I don't quit. So they're giving advice to me in the form of their actions. In mentioning what advice is and how it's given, I ask myself how it works. This happens to be a rough question seeing how advice isn't this little piece of gum on the bottom of my shoe that I can just pick off and toss away. So know I find help in the example of John Sweat and his mechanic friend to help explain how advice works. John was stuck in a pickle jar and wasn't sure what to do. But his friend knew where he was in the jar (because he had been there himself), and decided to offer some advice. John was able to get unstuck because he listened to his friend and took his advice, believing that his friend knew what he was speaking about, and sensing his sincerity. By looking at this example, I have come to the conclusion that advice works when one person takes a conscious (or in my smoking example - an unconscious) effort, to give somebody an honest, experienced point-of-view about a situation in order to give that person help. From there, the advice will only work if the person receiving the advice takes it to heart and uses it. OK, so if this is how it works, what are some ways that it doesn't work? Well, it doesn't work when the advice giver is trying to use his advice given for his own personal gain. I believe the dark forces are at work here and therefore, they cannot succeed! Another way advice given doesn't work is when the person receiving the advice doesn't take it, like in my example of getting advice from my Dad.

Thursday, October 24, 2019

Personal Experiences As A Student About Inclusiveness Education Essay

I was born in the epoch of 1960s, during that clip the old school system do non allow inclusiveness in the chief watercourse school. Different schools were setup for different abilities of pupils, i.e. schools for handicapped, schools for low abilities, schools for rational handicapped. I have studied in a SAP school for both primary ( Pei Chun Public School ) and secondary school ( Catholic High School ) , the abilities of the pupils in these schools are about homogeneous, most of them were able to larn and understand the instruction at the same gait, there were highly rare instances of pupils with particular demands. In general, the perceptual experience for the schools during that clip was holding pupils with particular abilities will do an excess load on the instructors, i.e. the instructors need to utilize excess schemes, excess resources and clip to manage these pupils, and the gait of the acquisition will be affected excessively. Therefore, if any of the pupils were found unsuitable for the chief watercourse, they will be transferred to the schools that were able to serve their demands. Even though this old system has its virtue, but many pupils and parents felt that they were labeled and discriminated from the society. Personally, as a pupil, I besides felt that pupils with particular demands should be reassign to a particular school to make their acquisition. In the particular schools, these pupils will be larning at the same rate, same content as their equals, they will non be force per unit area to execute every bit good as their equals in the chief watercourse. Own Personal teaching method about inclusiveness in schoolroom on the content taught in this class The thought of inclusiveness in Singapore came about 2004, when the Prime Minister Mr Lee Hsien Loong in the first startup address urged our society to incorporate people with disablements into the mainstream society, get downing with the integrating of pupils with disablements into the mainstream school. To-date, more and more pupils with mild particular demands or disablements are put in the mainstream schools analyzing together with the regular pupils. Teachers played a really of import function in making a acquisition environment that include varied scholars, such as pupils with particular demands. As mentioned by Bloom ( 1956 ) , larning has 6 different phases, i.e. cognition, comprehension, application, analysis, synthesis and rating. With that in head, it is of import that different teaching methods should be employed for the 6 different phases. Therefore, effectual instructors should develop their ain personal teaching method based on their belief, values and perceptual exper iences to manage the varied scholars, I am non an exclusion. Personal beliefs and values about cognition, society, instruction, and political relations help to crisp instruction beliefs ( Kagan, 1992 ) . E.g. , if a instructor believes that different type of pupils will hold different type of ability to larn and frailty versa, this belief will be reflected in methodological analysis and instruction manner. Differences in pupils should be seen as norm instead than exclusion. My personal belief is that each pupil is alone but yet they can be grouped into a group with certain similar abilities. I need to distinguish my instructions on these different groups of pupils. Valuess are ideals that usher or one ‘s personal behavior, interaction with others, and engagement in one ‘s calling. Values besides help person to separate what is right from incorrect. Harmonizing to Cecile Peterkin ( 2005 ) , learning values is an of import portion of being parent, nevertheless instructors can besides play a portion to learn pupils about values. Valuess such as Honesty, Courage, Peace ability, Self-reliance and Potential, Self-Discipline and Moderation, Fidelity and Chastity, Loyalty and Fidelity, Respect, Love, Unselfishness and Sensitivity, Kindness and Friendliness, Justice and Mercy, aid to do the society safe and feasible. My personal values that are developed by my ain are non much different from the above. In add-on, I consciously need to learn my pupils about values through taking by illustration and besides take the clip to explicate to them. Students may develop values different from what I taught them, nevertheless, they will make so with a solid foundation, and with a footing of comparing. My actions can do a difference in the pupils ‘ life at present and future. Profile of my preferable category Even though as a instructor, one is non supposed to take and pick his or her signifier category based on the pupils ‘ ability, but in world this is non the instance. Many times, some of the instructors are given the favour to take the better category with high abilities pupils, some non so lucky 1s will be given the undertakings to manage the low ability category. But by and large, most of the instructors will be given a category with assorted ability pupils, e.g. 35 percent low-ability, 55 per centum in-between ability and 10 per cent high ability pupils. As ascertained, each pupil is alone by nature and a schoolroom may incorporate pupils with differences. Some of these differences are singular, such as an outstanding endowment in art or mathematics, or a disablement such as disableds. Some are non so obvious and harder to observe, such as a disablement of autism and low IQ. As for me, after working 2 old ages as contract teacher, I still prefer to take up a disputing category such as a foundation category or draw out category where all the pupils are with low ability. No uncertainty, the category may be a low ability category, but I still have to construct a category profile for my category. Having a category profile allows the instructor, the school direction to be able to see easy the different demographics of pupils who form the category. For e.g. , I had created a category profile with pupils holding larning disablements, wellness damages, hearing damage, dyslexia, ADHD, broken household, single-mother household, low ego regard. With the category profile on manus, I can group my pupils in footings of their strengths and failing, such as intelligence, ability, disablement and so learn them ways to leverage on their strengths or to get the better of their failing. Thingss to make as an inclusive acquisition environment in the 1st 2 hebdomads Harmonizing to Quek, Angel, Wong ( 2the 008 ) , instructors whom are successful in making an inclusive schoolroom both socially and academically, normally will utilize 2 attacks at the same time, i.e. single attack and whole category attack. For the societal inclusion facet, I will work with pupils on both single and whole category attack. At the single degree, these are things I will make. First, I will do friend with the pupils and spend clip in the deferral or after school to cognize more about the pupil in school and at place. Second, I will seek to work together with the pupil ‘s parent to assist and supervise the pupil, such as acquiring the parents to look into the pupils ‘ diary every dark for prep. Third, I will pass more clip with the pupils for guidance, giving feedback on his behaviour and past consequences, and besides to make a end puting with him. Forth, I will seek to explicit to learn pupil to get appropriate societal accomplishment, such as how to do new friends within and outside the schoolroom. Fifth, I will seek to do the possible troublemaking pupil to sit in forepart, so to supervise him more closely and halt any inappropriate behaviour every bit shortly as possible. Finally, I will seek non to bury to promote each pupil to be more independency and ego ordinance in their school plants. At the schoolroom degree, I will learn the whole category, the followers: To remind all pupils in the schoolroom to be responsible, to look after the well being and safety of all their schoolmates, e.g. no tease of schoolmate who is handicapped. To be more tolerance and respects for differences among the schoolmates, e.g. some of them may be slow in acquisition, sometimes teacher demand to explicate the construct once more, those faster 1s can go on making their exercisings. To make chances for pupils to interact, teamwork and edifice relationship among them, i.e through group works or squad athletics drama like playing association football. To give direction to larn societal and interpersonal accomplishment among the pupils, like struggle direction, bend pickings, covering with differences, like how to work with schoolmate who is holding hearing jobs. To emphasis the of import to assist one and another, e.g. through the usage of brother system, equal coachs. To explicate to the pupils about particular demands and to steer them to give equal support and direction of pupils with particular demands. To put regulations and modus operandis in the beginning, and to give wagess and penalty if they are broken. To be function theoretical account, and demo the pupils the coveted behaviour, such as â€Å" when u see a instructor, u must recognize. † To prehend learning minutes when possible, to demo the pupils what are the unsought behaviour and learn them the right behaviour instantly. Following, for the academic inclusion facet, these are the schemes that I have learnt and will use to my pupils, some of them non merely for the first 2 hebdomads but besides throughout the whole term or whole twelvemonth: As effectual instructor, I will interrupt down a construct or accomplishment and learn them in stages. This allows the pupils to understand the construct or skill more easy. Besides, I will guarantee that the pupils understand the basic construct and skill exhaustively before traveling on to more complex 1s. Sometimes, I will seek to pattern the accomplishments taught in forepart of the pupils, e.g. learning the pupils how to make a thorax base on balls for hoops. As mentioned before, every pupil is alone with their ain strength and failing. Concentrating on their strengths will increase the pupils ‘ ego regard and motive to success both academically and socially. Next, to put pupil ‘s individualised end at the beginning of the term. Goals will establish on their old public presentation and ways to accomplish them. Upon puting them, the instructor and pupil will work together to supervise them. As a instructor, I will give encouragement and feedback to the pupils non merely on their academic public presentation but besides on their academic betterment and social-emotional advancement. There are times, I will seek to utilize differentiate instruction methods for different group of pupils due to their differences in larning manners, abilities, such as utilizing ocular AIDSs to some groups and verbal direction to some. In add-on, utilizing existent universe examples to help in learning besides turn out to be an effectual tool. For e.g. , to learn how to add and deduct money, I will ever utilize the scenario of traveling to market with parents to purchase fish, eggs, poulet utilizing money. Besides, I will utilize more concerted acquisition activities as a scheme to heighten pupils ‘ experiences to work as a squad to accomplish a common end. As mentioned before, equal tutoring proved to be an effectual scheme which was widely accepted by the pupils. One of the dimensions of meaningful acquisition is to learn others, by learning other one get a opportunity to further their ain understand of a construct or accomplishment.

Tuesday, October 22, 2019

An insight into Zara as a Born Global Essay

Zara was first established just outside of Spain in1988, in 1994 Zara expanded into France and Mexico (Bhardwaj et al, 2010). Zara is owned by the INIDEX group in which it contributes to 64.8 per cent of total company sales (Inidex annual report, 2011) which was a 10 per cent growth on the previous fiscal year. Zara now has over 1830 stores worldwide across 82 markets in 64 countries, with plans to move into Korea, Egypt, Ukraine and Montenegro and a further 80 store to open in Russia. This research paper identifies Zara as a born-global company and a global leader in fast fashion by firstly differentiating between a born global and gradual global company. Secondly we investigate three main internationalisation theories which will help us gain greater understanding into the success of Zara and finally importance in which the marco-environmental factors and marketing mix play in creating a company which is unique, controlled and adaptable to new markets. Zara as a born global Understanding the difference between a gradual-global versus a born global fashion retailer is key to identifying Zara as a born global. Traditionally, firms gain knowledge over time about the marco-environmental factors and the level of investment in which they should commit to (Galvan-Sanchez, et al., 2010). Examples of companies that use the ‘gradual global process’ include Mark & Spencer and the GAP. Born-global’s, according to Bhardwaj et al, 2010 focus on early and rapid internationalization. Therefore we identify that the difference between a born global and a gradual global lies in the international process and three main theories; knowledge-sharing and entry mode, resource based, and physic distance. Let’s look at these internationalisation theories in more detail by first identify the difference between a born global and a gradual global approach. A Born global is assertive and perceives the world as one market place with utilising the local market as the core of the internationalisation process (Bhardwaj et al, 2010) whereas gradual global firms believe that domestic market is the core support and aversion and lack of knowledge results in slow learning process. Born-global maintain long-term relationships with intermediaries, are fully integrated and consider the marketplace as  homogenous whereas gradual global are partially integrated and consider the marketplace as heterogeneous (Basu, et al., 2011).. Lastly a born-global believes psychic distance is irrelevant in the internationalisation process whereas gradual global assume that the firms entry into a new market is a function of psychic distance from prior experience (Bhardwaj et al, 2010). Knowledge sharing and entry mode Knowledge sharing is the flow of information sharing within a company and is consider a major competitive advantage (Basu, et al., 2011). When a company expands into a foreign market forward knowledge flow is important (Galvan-Sanchez ,et al., 2010) as managerial experience and business structure can be communicated to newer stores from head-office. More importantly to this report lateral knowledge flow commutates vital marco-environmental information from the foreign market location back to headquarters for example Zara has three stores in Dubai in which they sell clothes predominately covering the shoulders and offer more conservative style to respect local culture (Bhardwaj et al, 2010). Communicating and integrating culture which include shared values and norms is vital in the strategy development process (Galvan-Sanchez, et al., 2010). According to Indiex 2011 annual report environmental factors also play a vital part in the success of their line limnetic difference with the stores located in the Northern Hemisphere, Zara has a team of designers who create specific fashion proposals for women, men and children. The latest trends are thus reflected in garments and textiles that are suitable for both hemispheres, in options which are continually renewed. Knowledge sharing is also crucial in selecting the appropriate entry mode into a new market which includes licensing, joint venture/subsidiaries to name a few (Bhardwaj et al, 2010). Zara is identified as selecting a licensing entry mode into new market which lowers risk on investment but increases communication and management overtime. Resource based theory Resource based theory is focused on asset exploiting foreign investment and suggests that ownership-specific advantages provide Zara with a resource based framework which is valuable, rare, imperfectly imitable and not substitutable (Bhardwaj et al., 2011). Zara is a vertically integrated  company and is not hierarchal which helps create pseudo-backward integration (Basu, et al. 2011). Zara’s success also comes from training and employing local workers in new stores which provides relevant feedback and creates job growth (Rennie, 1993) which in turn can provide valuable information for future marketing strategy and promotion (Galvan-Sanchez, et al., 2010). The Zara brand is also known for being up-to-the-minute and affordable due to its highly developed technological communication which feeds POS and store information directly back to headquarters to be analysed (Inidex annual report, 2011) and adjusted to ensure succession in the local market which ensures that price, place ment, product and type of promotion are remaining relevant and unique in the local market. These advantages have created strong positive response from foreign markets making its resource-based advantages and high-control strategy difficult to replicate (Bhardwaj et al., 2011). Psychic distance This theory deals with the relationship between the differing cultures in which a company deals with and is important in the understanding of the effects that the marco-environment have on the marketing mix. The key to Zara’s acceleration into foreign markets lies in competing in niche markets, which are flexible and move fast (Rennie, 1993) and is successful due to its knowledge gathering and sharing strategies implemented at the store level (Bhardwaj et al., 2011) in each market it enters. Understanding and respecting local political and legal powers, for example local taxes and governing powers that can effect price and product helps align the companies goals and objectives with the localised market without causing conflict of interest (Galvan-Sanchez, et al., 2010). Conclusion In conclusion, this article identifies Zara as a born global retailer which demonstrates that the companies knowledge sharing capability, unique strategy, high-risk, high-reward model based on its unique resource based advantages and psychic distance is paramount to the success of its internationalisation expansion and becoming a global leader in fast fashion. Reference List Basu, C., Cavusgil, E, Kim D., & Naidu G.M., 2011. ‘The innovativeness of Born-Globals and customer orientation: Learning from Indian Born-Globals,’ Journal of Business Research, 21/3, 879-886. Bhardwaj, V., Eickman, M., & Runyan R, C., 2010. ‘A Case study on the internationalisation process of a ‘born-global- fashion retailer: Zara,’ The International Review of Retail, Distribution and Consumer Research, 21/3, 293-307. Galvan-Sanchez, I., Riaph-Criado, A., & Suarez-Ortega S.A., 2010. ‘A configuration-holistic approach to born-global firms strategy formation process,’ European Management Journal, 28, 108-123. Inidex. 2013. Annual Report 2011. [ONLINE] Available at: http://www.inditex.com/en/shareholders_and_investors/investor_relations/annual_reports. [Accessed 10 April 13]. Rennie, M.W, 1993. ‘Born Global,’ The McKinsey Quarterly, 4, 45-52.

MLA Referencing †Citing a Website (Writing Tips from Proofed)

MLA Referencing – Citing a Website (Writing Tips from Proofed) MLA Referencing – Citing a Website Is there anything you can’t find online these days? If there is, we don’t want to know about it. Admittedly, though, the only thing we truly care about is that you cite online sources correctly! Here, then, is our guide on doing exactly that when citing a website with MLA referencing. In-Text Citations MLA typically uses an author–page number citation format. However, websites do not have page numbers, so you might not know what to include when you cite a website in a college paper. Thankfully, the solution to this is simple. All you need to do to cite a website in MLA referencing is include the first item of information that appears in the list. Usually, this will be the author’s surname, although you can use the title of the webpage if no author is named. If the author/webpage is named in the text, this is enough by itself. Otherwise, though, you would cite the source in brackets as follows: The Museum of Modern Art describes its mission as being to â€Å"present a dynamic and varied offering of some of the most thought-provoking art produced today† (â€Å"Who We Are†). We can examine whether it achieves this by collecting visitor data (McIntyre). Here, in the first citation, we’re citing the page titled â€Å"Who we are† from the MoMa website. The page does not name an author, so we use the title instead. In the second citation, we’re citing a different page from a different site and we give the author’s surname instead. List All websites cited in your work should appear in the list at the end of your document. The format here can vary a little, but you need to give enough information for your reader to find the website you’ve referenced. Typically, this will include: Author name(s) (if available) The name of the page cited The title of the overall website The date of publication or the date the page was last updated A URL (minus the â€Å"https://† bit) The date you accessed the page (if required by your school) For the pages cited in the example above, then, we’d list them as follows: McIntyre, Morris Hargreaves. â€Å"Visitor Behavior and Engagement in the Museums and Heritage Sector.† AMACultureHive, 18 Apr. 2013. www.culturehive.co.uk/resources/how-to-bridge-the-gap-between-data-and-insight-in-the-museums-and-heritage-sector/. Accessed 1 June 2018. â€Å"Who We Are.† MoMa, 2018. www.moma.org/about/who-we-are/. Accessed 14 June 2018. You may notice that, as well as the lack of an author, we don’t have a precise date for the â€Å"Who we are† page from the MoMa website. This is because the page does not have an upload date, so we have used the copyright date for the site as a whole instead. The most important factor is that we’ve given the exact URL of the webpage, which will allow the reader to find the source used.

Sunday, October 20, 2019

The Brothers Grimm Brought German Folklore to the World

The Brothers Grimm Brought German Folklore to the World Almost every child knows fairy tales like Cinderella, Snow White, or Sleeping Beauty  and not just because  of the watered-down Disney movie versions. Those fairy tales are  part of Germanys cultural heritage, most of them originating in Germany and recorded  by two brothers, Jacob and Wilhelm Grimm. Jacob and Wilhelm  specialized in publishing  the folklore, myths, and fairytales they  had collected over many years. Although most of their stories take place in a more or less medieval world, they were collected and published by the Brothers Grimm in the 19th century, and have long retained their grip on the imagination of  children and adults all over the world. Early Life of the Grimm Brothers Jacob, born in 1785, and Wilhelm, born in 1786, were sons of a  jurist, Philipp Wilhelm Grimm, and lived in Hanau in Hesse. Like many families at the time, this was a large family, with seven siblings, three of whom died in infancy.   In 1795, Philipp Wilhelm Grimm  died of pneumonia. Without him, the familys income and social status declined rapidly. Jacob and Wilhelm could no longer live with their siblings and their mother, but thanks to their aunt, they  were sent to Kassel for a higher education.   However, because of their social status, they were not treated fairly  by the other students, an unfortunate situation that continued even at  the university they attended in Marburg.  Because of those circumstances, the two brothers became very close to one another and deeply absorbed in their studies. Their law professor awakened their interest in history and especially in German folklore. In the years following their graduation, the brothers had a hard time taking care of their mother and siblings. Simultaneously, both started to collect German sayings, fairy tales, and myths. In order to collect those well-known and widely spread fairy tales and sayings, the brothers Grimm talked to many people in many places and transcribed the many stories they had learned over the years. Sometimes they even translated the stories from Old German into modern German and adapted them slightly. German Folklore as Collective National Identity The Grimm brothers were not only interested in history, but in uniting a disparate Germany into one country. At this time, Germany was more of  a conglomeration of about 200 different kingdoms and principalities. With their collection of German folklore, Jacob and Wilhelm tried to give the German people something like a collective national identity.   In 1812, the first volume of Kinder-  und Hausmrchen was finally  published.  It  contained many of the classic fairytales still known today like Hnsel and Gretel and Cinderella.  In  subsequent years, many other volumes of the well-known book were published, all of them with revised content. In this process of revision, the fairytales became more and more suitable for children, similar to the versions we know today.   Earlier versions of the tales were rather crude and filthy in content and form, containing explicit sexual content or harsh violence. Most of the stories originated in rural areas and had  been shared by farmers and among lower classes. The Grimms revisions made these written versions suitable for a more refined audience. Adding illustrations made the books more appealing to children. Other Well-Known Grimm Works Besides the well-known Kinder-und Hausmrchen, the Grimms continued to publish other books about German mythology, sayings, and language.  With their book Die Deutsche Grammatik (The German Grammar), they were the first two authors who researched the origin and development of the German dialects and their grammatical circumstances. Also, they worked on their most lavish project, the first German dictionary. This Das Deutsche Wà ¶rterbuch was published in the 19th century but was really completed in the year 1961. It is still the largest and most comprehensive dictionary of the German language. While  living in Gà ¶ttingen, at that time part of the Kingdom of Hannover, and fighting for a united Germany, the Grimm brothers published several polemics criticizing the king. They were dismissed from the university along with five other professors and also kicked out of the kingdom. First, both lived again in Kassel but were invited to Berlin by the Prussian king, Friedrich Wilhelm IV, in order to continue their academic work there. They lived there for 20 years. Wilhelm died in 1859, his brother Jacob in 1863. To  this  day, the Grimm brothers literary contributions are known all over the world and  their work is tightly bound to the German cultural heritage.  Until the European currency, the Euro, was introduced in 2002, their visages could be seen on the 1.000 Deutsche Mark bill.   The themes of Mrchen are universal and enduring: good versus evil in which the good (Cinderella, Snow White) are rewarded and the wicked (stepmother) are punished. Our modern versions- Pretty Woman, Black Swan, Edward Scissorhands, Snow White and the Huntsman, and others show just how relevant and powerful these tales remain today.

Saturday, October 19, 2019

Important Court Cases - 20th century american history Research Paper

Important Court Cases - 20th century american history - Research Paper Example History tells us about the things we should never forget. How civil rights in America were properly respected and enforced by both the courts and the government is something we need to understand fully. It is the cornerstone of America's greatness today and into the future. The legal history of civil rights goes back many decades, but the most important cases appear after the Second World War when increased urbanization was reshaping American demography and social situation (Marable 1984, 14). The first and most significant landmark case was Brown vs. Board of Education. Few can dispute the historical role played by this case which almost certainly is the most famous American court case of the 20th century. This case effectively ended segregation in the United States and proved very controversial at the time (Kluger 1975, 12). The case involved parents in Kansas and elsewhere who wanted to send their children to the schools closest to them, but because of their race were forced to se nd their children to black schools a great distance away. They launched a suit arguing that having separate schools for different races was unconstitutional and a violation of their rights. The Supreme Court agreed with them 9-0. A book by Myrdal showed the court that the state of black schools was inferior (Myrdal 1944). The court realized that schools were separate but not equal. A second case involving similar issues, often referred to as Brown II, led to the Court declaring that the desegregation of American schools should be done soon and quickly (Ogletree 2004, 8). This gave impetus to changes that began to happen across the country. But that was not the end of the consequences of this decision. This was not a court case decided in a vacuum. In its wake, the governor of Arkansas used the national guard to try to block black students from entering white schools (Kluger 1975, 90). He refused to accept the ruling by the Supreme Court of the United States. Instead, he wanted to pl ay to his racist base. President Eisenhower was forced to send in the army to ensure the rule of law. He nationalized the Arkansas guard and saw that the law was enforced. In Alabama, a similar event occurred involving the governor there. These dramatic confrontation set the stage for much of the civil rights movement and the rise of people like Rosa Parks and Martin Luther King Jr. Civil rights leaders saw that the Constitution could protect them even if local sheriffs and lawmakers did everything they could to prevent changes from being made. Inspired by these cases, they pressed their issues by using non-violent protests. Education was just one legal battle fought during the civil war movement. People wanted to have less government control over their personal lives. Who was the government to say who a person could marry in a free country? And yet racist laws in much of the South prevented blacks and whites from marrying. Another significant case in the history of the civil rights movement was Loving vs. Virginia (1967). This was a case involving the marriage between a black woman and a white man, which the state of Virginia held to be illegal under their anti-miscegenation laws. These laws were in place based on a biblical conception of creation and marriage. Many people at the time believed that God had placed the races on

Friday, October 18, 2019

FINANCIAL MANAGEMENT assignments 1-4 Essay Example | Topics and Well Written Essays - 500 words

FINANCIAL MANAGEMENT assignments 1-4 - Essay Example It is an indispensable tool for the economists, investors and analysts to measure the well-being of an economy. Real GDP is different from nominal GDP as it takes into account the inflation, thus producing a better scale of measurement. 2) Define and indicate the significance of the LIBOR. What was the LIBOR at the time you completed the assignment? LIBOR is the London Interbank Offered Rate and it is the rate at which the most creditworthy banks lend funds to each other. It is considered as a benchmark rate in the major countries of the world such as US, UK and Canada. LIBOR is considered as of paramount importance in the corporate world because when the LIBOR increases it creates a financial panic, which tightens the flow of credit and erodes the trust between the banks for their ability to pay each other. In addition to that, all the credit loans such as credit card, mortgages and student loans are dependent on LIBOR therefore it has a direct impact on the consumers. It is estimat ed that $360 trillion of international financial products are based on LIBOR (Reynolds, 2010). Current LIBOR LIBOR 1-Month 3-Months 6 Months 0.26% 0.31% 0.46% Source: LIBOR, other interest rate indexes (Bankrate.com) 3) Define and indicate the significance of the prime rate.

Should Women be allowed in combat Research Paper

Should Women be allowed in combat - Research Paper Example with, the skeletal system of the women is less dense and is more prone to fracture (Journal of the American College of Nutrition Journal of the American College of Nutrition, 2011). According to Center for Military Readiness, most of the female soldiers are shorter and smaller than men. Their upper body strength is less than 45-50% compared to males, and their aerobic capacity is lesser of 25-30%. (Center for Military Readiness, 2004) Physiological Concern. It is nature to women about their menstruation that happens monthly. At this state, they are believe to be incapacitated during that period as they are prone to accidents due to their limited action. This was observed during World War II. However, there are some sectors who refute the claim with certain evidences and studies that women do perform equally even during their menstrual period. (Poulos, 1996) Psychological Concern. Relationship could develop between a man and a woman soldiers. This projection could put the unit at risk in an actual combat. Thus, women are banned in the front-line combat situations. The fear to be in the front-line of combat might drive women to get impregnated so as to avoid being in it, which is far very critical for the combat attack plan. (Center for Military Readiness, 2004) Female soldiers could also be objects of capturing, torture, and sexual assailment that will make the combat unit vulnerable. Males on the other hand have no record of sexual assailment but high percentage on physical abuse. Females have the highest percentage of sexual assailment in units. (Louise Slaughter, 2011) Conclusion. With physical, physiological, and psychological concerns that are based on facts reveals that women should not be allowed in a combat. Their presence in the combat will put at risk the combat units and make them

Key concepts of culture and leadership. Problem statement Essay

Key concepts of culture and leadership. Problem statement - Essay Example The success that Gene One has had in eight short years has presented a quandary concerning the strategic path Gene One’s future. Should Gene One execute of strategy of constancy and continuity? Will this type of strategy keep Gene One’s competitors from gaining ground on Gene One’s share of the market place over the next several years? After careful consideration of these perplexing questions, the leadership of Gene One has decided an alternate strategy, as Gene One has not achieved all that they have by continuity alone. Gene One has taken risks that were founded on sound strategy and faith that intelligent men and women with innovative ideas and unsurpassed drive and passion cannot be stopped. These type of people are winners and they accomplish their goals. These factors set the stage for constantly evolving ideas that provided multiple benefits that were accomplished in record time. Seldom has this type of success been achieved in the biotech industry which i s considered a risky business in some cases. That said, the Gene One leadership has decided that Gene One must be given an opportunity to experience its maximum growth potential before some piggy back organization with lucrative investors siphon off strategic market areas previously held by Gene One. As with any strategy, there are risks involved. However, due to Gene One’s financial stability, strong leadership and growth potential, these risks are just obstacle that can be turned into positive opportunities. Please note the following: While IPO capital is of extreme importance concerning Gene One’s preparations to go public, this topic can not be considered if it does not include job security and economic packages that reward the founders, board members and essential personnel at Gene One for their contributions that have led to the meteoric rise of Gene One over an eight-year timeframe. This is not a difficult problem to solve due to the strategy that

Thursday, October 17, 2019

Life is like mountain climbing Essay Example | Topics and Well Written Essays - 750 words

Life is like mountain climbing - Essay Example The air and the atmosphere is equally beautiful and enriching. The overall experience has enabled me interacting and coming across new people and getting to exchange views on various topics. People from all walks of life head there. Even the elders head there and show their resolve to valuing the natural beauty. The mountain ranges have short term stay points in there and I resort to them during my hiking experience every time I get tired. Finally when I reach the top of the mountain, it is one real soothing experience and it gives a panoramic view of the surroundings and everything appears so small yet so beautiful. The very scene reminds me of the old time adage which states that "When you get to the very top of the mountain, all the other hills will be smaller". At this point, one feels a sense of accomplishment and acknowledgement altogether. During the nice experience I often come across the individuals who give up on the initial hard work that is attached to it. The overall experience of climbing through the mountains can be correlated to that of life observation and experiences. It tells of how different processes are undertaken such as educational pursuit, individual struggle, overcoming negativity and various other similar facets of life. Life, like the mountain is a constant challenge and a up way directed concept. Just as those people who give up on hope, cannot climb the mountains, the same way, the people in life who do not brace up the challenges and hardships cannot go on. This struggle and this activity in itself is the beauty of life and living. Those people who show courage overcome the obstacles such as surmounting the mountains. It is through this self believe that people overcome the challenges of life. This courage enables them overcoming all the obstacles and challenges faced by them. Those people who through their hard work make it to the mountains and through the obstacles of life make full use of their time, their energy and also

The Image of American Rock Culture in 1960s Research Paper

The Image of American Rock Culture in 1960s - Research Paper Example Rock music is a genre of music that emerged in the United States in the 1950s and spread to different parts of the English-speaking world by the 1990s (Frith Para 1). Rock music emerged as Rock and Roll and it was modified over the years with the inclusion of different genres and styles of music that culminated in a completely different from of music that served various minority interests and popular streams of music. Due to Rock Music’s diverse components, it has split into different types of genres that are active today. One of the notable definitions of Rock music is presented by the Canadian government who define it as music characterized by â€Å"a strong beat, the use of blues forms and the presence of rock instruments such as electric guitar, electric bass, electric organ and electric piano† (Britanicca Developmental Association 2). This presents a set of distinct sounds and it is characterized by the fact that the music is of a distinct nature and of a distinct sound which is somewhat different from other forms of music. The British legislators identified that rock involves all forms of music characterized by â€Å"a strong rhythmic element and a reliance on electronic amplification for their performance† (Britanicca Developmental Association 2). Therefore, like other music forms that were traditionally known to the British society, Rock music comes with some kind of electronic inputs and electronic instruments that makes it different and unique. This provides various forms of influence over listeners that is somewhat different from the effects of the different kinds of songs that existed before Rock music. The distinction between Rock music and other forms of music showed that it was a style of music that was not known prior to its emergence. And it created various forms of performance approaches that were distinct from other

Wednesday, October 16, 2019

Key concepts of culture and leadership. Problem statement Essay

Key concepts of culture and leadership. Problem statement - Essay Example The success that Gene One has had in eight short years has presented a quandary concerning the strategic path Gene One’s future. Should Gene One execute of strategy of constancy and continuity? Will this type of strategy keep Gene One’s competitors from gaining ground on Gene One’s share of the market place over the next several years? After careful consideration of these perplexing questions, the leadership of Gene One has decided an alternate strategy, as Gene One has not achieved all that they have by continuity alone. Gene One has taken risks that were founded on sound strategy and faith that intelligent men and women with innovative ideas and unsurpassed drive and passion cannot be stopped. These type of people are winners and they accomplish their goals. These factors set the stage for constantly evolving ideas that provided multiple benefits that were accomplished in record time. Seldom has this type of success been achieved in the biotech industry which i s considered a risky business in some cases. That said, the Gene One leadership has decided that Gene One must be given an opportunity to experience its maximum growth potential before some piggy back organization with lucrative investors siphon off strategic market areas previously held by Gene One. As with any strategy, there are risks involved. However, due to Gene One’s financial stability, strong leadership and growth potential, these risks are just obstacle that can be turned into positive opportunities. Please note the following: While IPO capital is of extreme importance concerning Gene One’s preparations to go public, this topic can not be considered if it does not include job security and economic packages that reward the founders, board members and essential personnel at Gene One for their contributions that have led to the meteoric rise of Gene One over an eight-year timeframe. This is not a difficult problem to solve due to the strategy that

Tuesday, October 15, 2019

The Image of American Rock Culture in 1960s Research Paper

The Image of American Rock Culture in 1960s - Research Paper Example Rock music is a genre of music that emerged in the United States in the 1950s and spread to different parts of the English-speaking world by the 1990s (Frith Para 1). Rock music emerged as Rock and Roll and it was modified over the years with the inclusion of different genres and styles of music that culminated in a completely different from of music that served various minority interests and popular streams of music. Due to Rock Music’s diverse components, it has split into different types of genres that are active today. One of the notable definitions of Rock music is presented by the Canadian government who define it as music characterized by â€Å"a strong beat, the use of blues forms and the presence of rock instruments such as electric guitar, electric bass, electric organ and electric piano† (Britanicca Developmental Association 2). This presents a set of distinct sounds and it is characterized by the fact that the music is of a distinct nature and of a distinct sound which is somewhat different from other forms of music. The British legislators identified that rock involves all forms of music characterized by â€Å"a strong rhythmic element and a reliance on electronic amplification for their performance† (Britanicca Developmental Association 2). Therefore, like other music forms that were traditionally known to the British society, Rock music comes with some kind of electronic inputs and electronic instruments that makes it different and unique. This provides various forms of influence over listeners that is somewhat different from the effects of the different kinds of songs that existed before Rock music. The distinction between Rock music and other forms of music showed that it was a style of music that was not known prior to its emergence. And it created various forms of performance approaches that were distinct from other

Integer Programming Problem Formulation Essay Example for Free

Integer Programming Problem Formulation Essay This approach is advantageous compared to SVMs with Gaussian kernels in that it provides a natural construction of kernel matrices and it directly minimizes the number of basis functions. Traditional approaches for data classi? cation , that are based on partitioning the data sets into two groups, perform poorly for multi-class data classi? ca- tion problems. The proposed approach is based on the use of hyper-boxes for de? ning boundaries of the classes that include all or some of the points in that set. A mixed-integer programming model is developed  ¤Computer Scientist, Defence RD Org. , Min of Defence, Delhi-110054. email:[emailprotected] drdo. in, dhamija. [emailprotected] com, a k [emailprotected] com. Home- page:www. geocities. com/a k dhamija/ for representing existence of hyper-boxes and their boundaries. In addition, the relationships among the discrete decisions in the model are represented using propositional logic and then converted to their equivalent integer constraints using Boolean algebra. Image Contrast Enhancement and Image Recon- struction are being used for extracting knowledge from satellite images of the battle? ld or other terrains. This method has already been described in LP problem formulation in I semester assignment. Keywords: Integer linear Programming ,Pattern Classi? cation ,Multi Class data classi? cation , Image Reconstruction ,radial basis function (RBF) classi? ers , sigmoid function , SVM , Kernel and propositional logic 1 Pattern Classification Via Integer linear Programming Given the space in which objects to be classi? ed are represented, a classi? er partitions the space into dis- joint regions and associates them with di ®erent classes. If the underlying distribution is known, an optimal artition of the space can be obtained according to the Bayes decision rule. In practice, however, the underlying distribution is rarely known, and a learning algorithm has to generate a partition that is close to the optimal partition from the training data. The RCE network (1) is a learning algorithm that constructs a set of regions, e. g. , spheres, to represent each pattern class. It is easy to see that, with only a few spheres, there is a great chance that the training error will be high. With an excessively large number of spheres, however, the training error can be reduced, but at the expense of over? ting the data and degrading the performance on future data. Similar problems also exist in the radial basis function (RBF) networks and multi-layer sigmoid function networks. Therefore, a good learning algorithm has to strike a delicate balance between the training error and the complexity of the model. Existing Methods Used Various existing methods like Simulated Annealing , Neural Networks , Genetic algorithms and other classi- ?cation methods of supervised as well as unsupervised learning are being used. 1. 2 Proposed Method : ILP Problem Formulation Given a set of training examples, the minimum sphere overing approach seeks to construct a minimum num- ber of spheres (3) to cover the training examples cor- rectly. Let us denote the set of training examples by D = f(x1; y1); :::; (xn; yn)g where xi 2 Rd and yi 2 f? 1; 1g: For notational simplicity, we only consider the binary classi? cation problem. The task is to ? nd a set of class-speci? c spheres S = S1; :::; Sm such that xi 2 [ y(Sj)=yi Sj and xi =2 [ y(Sj )6=yi Sj ; 8i = 1; :::; n (1) where each sphere Si is characterized by its center c(Si), its radius r(Si) and its class y(Si). An exam- ple xi is covered by a sphere Sj , i. e. , xi 2 Sj , if d(xi; c(Sj))  · r(Sj ). A set of spheres S that satis? es the conditions in Eqn. (1) is called a consistent sphere cover of the data D. A sphere cover is minimal if there exists no other consis- tent sphere cover with a smaller number of spheres. We restrict ourselves to constructing a consistent sphere cover with spheres that are centered on training ex- amples, although in general spheres do not have to be centered on the training examples. In order to mini- mize the number of spheres in the sphere cover S, each sphere in S should cover as many training examples as possible without covering a training example belonging to a di ®erent class.

Monday, October 14, 2019

Difference Analysis Between IS And IT

Difference Analysis Between IS And IT Introduction: Information technology (IT) and management information systems (MIS) are interchangeable terms (Kearns, 1997). They are a set of interrelated computerized components that work together to collect, retrieve, process, store, and distribute information for the purpose facilitating planning, control, coordination, analysis and decision-making in organizations (Laudon Laudon, 1998). In the foodservice industry IT is commonly used for order processing, marketing, accounting, and site selection of new restaurant units. Whether a small independent or part of a large chain, many restaurants use established point of sale systems and accounting packages to process financial data. The Study is running with fully computerised and IS philosophy based so that the company is controlled in IT infrastructure and IS strategy will be described here for the future benefit of the company. By adopting frameworks necessary in characterising comprehensiveness, focus and formulation, firms may be able to incr ease rationality, while inducing increased participation and enhanced consistency. Improving the planning cycles of IS and SDLC (System Development Life Cycle) activities have also been proven instrumental in enhancing planning effectiveness. In some cases, such difference manifests itself through policies to save all enterprise information indefinitely, or to delete all data after brief periods of time. Traditional approaches to information management are often designed to mitigate risk; firms respond to regulatory and compliance requirements. Information compliance investments, for example, should be cost-managed, as providing compliance in excess generally adds little value and can be an inhibitor. The information to answer such questions often exists within an organizations IT systems, and requires minimal effort to answer once the key questions are identified by the senior executive team and business leaders. Answering key questions often requires minimal information and invest ment. Using an experimental approach similar to statistical sampling can provide the answers to key business questions quickly and dynamically. Aims And Purpose Of The Study: Many firms are focusing on using integrated databases and end-user computing which some experts believe threatens the role of the information provider in organisations. However, providers of data have contributions to make associated with decision making which are beyond just interpreting or supplying information. Some common decision-making-linked roles include facilitating a common database for group decisions; supplying effort and expertise in gathering information; and providing audit trails of data associated with certain decisions. Firms interested in maximising the contributions of information providers are advised to clarify and incorporate providers roles into the development of significant information systems within firms The explosion of data is most apparent in the realm of unstructured data. As businesses strive to automate processes and extend the IT environment to the point of service, an ever increasing amount of data is being retained electronically. Lowering the overall cost of ownership associated with storing and retrieving a growing volume of structured data assets is a challenge, and requires data and content servers that enable innovation while delivering rock-solid reliability. Flexible storage options and the know-how to put it all together round out a solution that helps you leverage information — lots of information. Deploy powerful servers that scale to meet your growing needs. Reduce the time spent searching for information. Escalating information volumes put your infrastructure to the test. Delivering high performance while lowering costs requires. IBM solutions-simple, flexible and optimized-will help you find the right content and get it to the right people and business processes at the right time, so you can improve efficiencies, increase responsiveness, and gain greater insights into your customers, the market and your business. Leverage and analyze information on demand to optimize all transactions in the call centre or in the field, when helping customers or when taking orders. Overcome the complex architectural and usability issues associated with traditional data warehouse and business intelligence approaches. Leverage information for competitive advantage and get more value out of your information Understanding computer hardware When you talk about computer hardware, you have to talk about the specifications. On a given desktop systems describe the speed and capability of that particular computer. If you are about to buy a computer, you should at least understand enough about each heading below to make an informed comparison between two different machines with different configurations. CPU central processing unit At the core is the processor. Speed is measured in Mhz. One other parameter of the CPU to investigate is the L1 cache, commonly from 256 kilobytes and up. RAM random access memory This determines how many files you can open at once; also ram is a form of computer data storage. So if ram is high computer performance should be better. Hard disk capacity Hard disk is measured in MB (megabyte) or GB (gigabyte). With the advent of so many mass-storage devices (zip drive, CD-R, super drive, etc) and networks where files and applications can be archived, huge disks (many GB) are very handy, but hardly necessary for most users. No matter what size your hard drive, you should keep it clean by weeding out outdated, redundant, and useless information (files and folders). Cache memory Check the upgradeability of your cache memory to fine tune your computer. The cache memory is a special type of RAM which the processor uses to store data in while it is working. The level 1 cache (or L1) is physically located on the CPU chip (and hence cannot be upgraded, unless you upgrade the CPU), whereas the level 2 cache (L2) is located on the motherboard, and can be upgraded separately. Video card/VSA card The amount of RAM and quality (and number) of microprocessors on the video card determine things like how big a monitor you can use, how large a window you can display video on, and the speed with which large complex graphic images display. Some of the newer video cards have 4 MB, 8 MB or more. Sometimes it is possible to upgrade a video card by adding a graphics accelerator card rather than replacing the video card with another newer version. Sound card The MIDI standard is used to convey music from computer to computer, (or keyboard to computer etc) and most good soundcards will play at least 32 MIDI voices. The other aspect of a soundcard is how well it plays digital sound files (like from a CD). Most of them do this extremely well also. If you are interested in music or sound, you want to investigate the software that comes bundled with your soundcard (or whatever software you have purchased to work with your soundcard). Traditionally, the sound card also has a port on it to plug in your joystick(s) if you play games on the computer. Removable storage Choices range from 3.5 1.44MB floppy drives, 100MB zip drives, 120MB super drives, 650MB CD-R, and on up to 1.5GB removable hard drive cartridges and higher now. Of course there are thousands of other choices including tape, optical drives, and surely many more available. Remember to price the storage media per Megabyte when buying. I personally like the CD-R idea since more people have CD-ROMs to read the recorded data. A programmable machine, two principal characteristics of a computer are: It responds to a specific set of instructions in a well-defined manner. It can execute a pre-recorded list of instructions (a program). Modern computers are electronic and digital. The actual machinery wires, transistors, and circuits is called hardware; the instructions and data are called software. A computer network is a collection of computers and devices connected to each other. The network allows computers to communicate with each other and share resources and information. The Advanced Research Projects Agency (ARPA) designed Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defence. It was the first computer network in the world in late 1960s and early 1970s. Computers can be generally classified by size and power; as follows, though there is considerable overlap: Personal computer: A small, single-user computer based on a microprocessor. In addition to the microprocessor, a personal computer has a keyboard for entering data, a monitor for displaying information, and a storage device for saving data. Workstation: A powerful, single-user computer. A workstation is like a personal computer, but it has a more powerful microprocessor and a higher-quality monitor. Minicomputer: A multi-user computer capable of supporting from 10 to hundreds of users simultaneously. Mainframe: A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously. Supercomputer: An extremely fast computer that can perform hundreds of millions of instructions per second. Computer networking is the engineering discipline concerned with communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data. Local area network (LAN), which is usually a small network constrained to a small geographic area. Wide area network (WAN) that is usually a larger network that covers a large geographic area. Wireless LANs and WANs (WLAN WWAN) are the wireless equivalent of the LAN and WAN. Difference Analysis Between IS And IT In a general sense, the term Information System (IS) refers to a system of people, data records and activities that process the data and information in an organization, and it includes the organizations manual and automated processes. In a narrow sense, the term information system (or computer-based information system) refers to the specific application software that is used to store data records in a computer system and automates some of the information-processing activities of the organization. Information technology (IT), as defined by the Information Technology Association of America (ITAA), is the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware. IT deals with the use of electronic computers and computer software to convert, store, protect process, transmit, and securely retrieve information. The new information technology (IT) infrastructure: The new IT infrastructure links desktop workstations, network computers, LANs, and server computers in an enterprise network so that information can flow freely between different parts of the organization. The enterprise network may also be linked to kiosks, point-of-sale (POS) terminals, PDAs and information appliances, digital cellular telephones and PCS, and mobile computing devices as well as to the Internet using public infrastructures. Customers, suppliers, and business partners may also be linked to the organization through this new IT infrastructure. Understand Computer-Aided tools Computer-Aided Software Engineering (CASE), in the field of Software Engineering is the scientific application of a set of tools and methods to software which is meant to result in high-quality, defect-free, and maintainable software products. It also refers to methods for the development of information systems together with automated tools that can be used in the software development process. The term Computer-aided software engineering (CASE) can refer to the software used for the automated development of systems software, i.e., computer code. The CASE functions include analysis, design, and programming. CASE tools automate methods for designing, documenting, and producing structured computer code in the desired programming language. This is the model for an extra net. IS (information system) design for a mobile phone company: As I have to design one companys IS design I choice the phone company. In this IS design everything is shown as far I know. This mobile company will be connected intranet system to every department. We know that intranet system will work with the internal system. With the intranet system every department will be very helpful as if they need any information they can easily get via the computer. Also they need the pc to every department. It is also connected to the internet to communicate. Using the internet they also benefitted to get the information. They need to build up a website where they can put all the information. So customer relationship will be build via the internet. Also customer can know the product and offer via internet. 1 a) What information would you require to make such decisions? Strategic planning deals with the determination of the objectives, resources, and policies of the organization. In this case, management has their planning and control of their restaurant business. The system provides up-to-the-minute information on the food items ordered and breaks out percentages showing sales of each item versus total sales. This helps management plan menus according to customers tastes. The system also compares the weekly sales totals versus food costs, allowing planning for tighter cost controls. Managerial Control is one of the managerial functions like planning, organizing, staffing and directing. It is an important function because it helps to check the errors and to take the corrective action so that deviation from standards are minimized and stated goals of the organization are achieved in desired manner. Control in management means setting standards, measuring actual performance and taking corrective action. Thus, control comprises these three main activities. In this case, this system helps management plan menus according to customers tastes. The system also compares the weekly sales totals versus food costs, allowing planning for tighter cost controls. In addition, whenever an order is voided, the reasons for the void are keyed in. This may help later in management decisions, especially if the voids consistently related to food or service. Operational control serves to regulate the day-to-day output relative to schedules, specifications, and costs. The most difficult task of management concerns monitoring the behaviour of individuals, comparing performance to some standard and providing rewards or punishment as indicated. Sometimes this control over people relates entirely to their output. For example, a manager might not be concerned with the behaviour of a salesman as long as sales were as high as expected. In other instances, close supervision of the salesman might be appropriate if achieving customer satisfaction were one of the sales organizations main objectives. In this case study, acceptance of the system by the users is exceptionally high since the waiters and waitresses were involved in the selection and design process. All potential users were asked to give their impressions and ideas about the various systems available before one was chosen. This is their Operational control part. After studying this case I find that up-to-the-minute information on the food items ordered and breaks out percentages showing sales of each item versus total sales. Whenever an order is voided, the reasons for the void are keyed in. This may help later in management decisions, especially if the voids consistently related to food or service. And all potential users were asked to give their impressions and ideas about the various systems available before one was chosen. b) What would make the system a more complete MIS rather than just doing transaction process? This business can be more MIS if management provide and use more information related to the business. This system helps management to taka decision. Its ‘out of stoke process shows that which items is doing more business and which is doing less. Then they can decide which product they need to emphasize more. End of month they can analyse the data of four week. Other features such as order void system check listing, item sales, total sales, customer opinions etc. can make this system more complete MIS rather than transaction process. c) Explain the probable effects that making the system more formal would have on the customers and the management A waiter takes an order at a table, and then enters it online via one of the six terminals located in the restaurant dining room. The order is routed to a printer in the appropriate preparation area: the cold item printer if it is a salad, the hot-item printer if it is a hot sandwich or the bar printer if it is a drink. A customers meal check-listing (bill) the items ordered and the respective prices are automatically generated. When the kitchen runs out of a food item, the cooks send out an ‘out of stock message, whenever an order is voided, the reasons for the void are keyed in. This may help later in management decisions, especially if the voids consistently related to food or service. All potential users were asked to give their impression and ideas about the various systems available before one was chosen Above mentioned functions make this system more formal on customer and the management. 2 a) What security loopholes come to the fore in the situation described? How can these be plugged? If we plunged in to this case we find that while assessing hardware and software requirements, it was found that out of the 364 desktops at the corporate office; more than half did not have their antivirus software updated with recent virus signature files. Three fourths had not changed the default e-mail password (it was the user name) and no one had installed OS patches. And one of its local mail servers seemed to be an open relay! For a fleeting moment, system manager of SystemX wondered about the situation at the seven branch offices across the country. SystemX used the Net extensively in dealing with its branches, customers and suppliers. Information like contract documents, marketing plans, Cheque and Draft numbers, bank account details and collection details were regularly transmitted by e-mail. These loopholes come into our mind. These loopholes can be plugged, if they update their antivirus which is virus signature files free. Because they use e-mail, and Net extensively so they need strong security measure in order to secure their system. b) What is the importance of a â€Å"security budget† in the context of the given situation? Security budget is one of the important parts of every business. In this context â€Å"Security Budget† is very important. They need to provide security to their system. If manager recommends for appointing a new security consultant then it may not be granted because of budget. Any how they need to provider security. 3 a) What systems propose that would serve the companys need? The multibase company limited has so many manufacturing products. It is very difficult to control the whole companys activities. On the other hand now it is the age of information technology so we should use this technology to everywhere. I propose that we can use the CBIS means computer base information system. b) Complete overhaul of the systems or add functionalities of the existing systems? Justify the line of action. This company has a CBIS which are prepared the performance of every unit though weekly and monthly reports. With this reports headquarters always analyze and make the decision such as capacity expansion, procurement of new technology involving substantial investment, etc. This helps the companies planning and control. c) Justify the requirement of chief information officer (CIO) in the context given case let. The cio of the company has thus propose to develop suitable computer base systems which might be helpful in understanding the current status of various manufacturing units in terms of their overall performance, the type of environment constraints that operate in the three business that exist for enhancing capacity in these business areas. 4 a) Is that digital systems are unreliable and carries enormous risks? Yes. It is. No digital system can be guaranteed to be _PERFECT_ and hence may have any type of problems. This is actually because human beings are not perfect in their design and work. b) Explain three situations to minimize damages due to failure of digital system. For case 1: There should be transaction logging mechanism so that it can roll back upon administrators command. A manual book-keeping can be used too for all types of transactions so that in case of failure it can be used. For case 2: There should be manual communications used when digital systems delay for some reason. For case 3: Enough communications with service users should take place before upgrade policy. In all communication channels there should be advertisements and assumed timeline for the probable disaster. Decision Support Systems welcomes contributions on the concepts and operational basis for DSSs, techniques for implementing and evaluating DSSs, DSS experiences, and related studies. In treating DSS topics, manuscripts may delve into, draw-on, or expand such diverse areas as artificial intelligence, cognitive science, computer supported cooperative work, data base management, decision theory, economics, linguistics, management science, mathematical modelling, operations management psychology, user interface management systems, and others. The common thread of articles published in the journal will be their relevance to theoretical, technical DSS issues. Group Decision Support Systems (GDSS) are a class of electronic meeting systems, a collaboration technology designed to support meetings and group work. GDSS are distinct from computer supported cooperative work technologies as GDSS are more focused on task support, whereas CSCW tools provide general communication support. Group Decision Support Systems (GDSS) were referred to as a Group Support System (GSS) or an electronic meeting system since they shared similar foundations. However todays GDSS is characterized by being adapted for a group of people who collaborate to support integrated systems thinking for complex decision making. Participants use a common computer or network to enable collaboration. Who is the typical user of the system currently? For the organization manager mainly takes the decision. Suppose to open a new account there should be some criteria (credit score). It is also used in agriculture section. Dss is well-established tradition within agriculture. Holsapple takes a different view. Decision-support systems are so pervasive in their use that people dont even think of them as DSS, he says. He points to the spreadsheet as one of the most common ones used in business today. And, he says, most executives use corporate planning tools with DSS capabilities in them. Graphical User Interface Design Process For The Decision Support System In general, the GUI design process can be split into twelve steps (Galitz, 1997): 1. Know your user 2. Understand the ‘business function 3. Use good screen design 4. Select the proper types of windows 5. Develop the system menus 6. Select the proper device-based controls 7. Choose the proper screen-based controls 8. Organize and layout the windows 9. Choose the proper screen colours 10. Create meaningful icons 11. Provide meaningful messages 12. Test, test, and retest Following the design process, a questionnaire was prepared to better understand the ‘typical environmental professional who would be using the GUI. Questions were divided into several Categories: computer hardware and software literacy, user profile, and talk analysis. Some of the questions, although basic in nature, were required to ascertain the type of computer operating system to design for and the types of support system that would be incorporated in the design. I am not using any dss system for my academic career yet. But it will be very helpful to use in my future career. Questions no Questions Answers 1 Employee name: Employer name: Work place address: Work telephone no: Job title: No of years on current job: Years of computer experience: Md. Ayub Ali Saleh Z Rahman 12th floor, national scout bhobon, kakrail,Dhaka-1000. 0088029335395 Chief software architect and developer. Five months 10 yrs 2 What kind of computer system do you use? Apple MacBook Laptop, Mac OSX Leopard, programming software (compiler (gcc) and other Unix system administration tools), printer, Scanner, Mobile phone (for Internet through it), Apple Time Capsule (for backup), etc. 3 What kind of training have you received in order to use computer system effectively? Do you find the IT technical staff in your firm to be helpful and easy to work with? I have received B.Sc. in computer science and Engineering from a reputed university. I am self learner for using computer systems effectively. Our IT Technical Staff are helpful. 4 What business processes are supported by the IT systems in your workplace? Structured model of software development. 5 How does management use the IT system to support their activities? Management use intranet and internet to support their activities. 6 Is your system part of a network? Who is the network administrator? How often do you interact with the administrator? What kinds of issues do you discuss with the administrator? Yes, my system is part of a network. We have more than one network in our office. I am network administrator. There is different system administrator. I dont interact with system administrator that much. Very rare case I need him solve problems. Mainly we discuss about Internet connectivity issues with system administrator. 7 Are your computer systems connected to your customers, suppliers or partners? Describe how the system is used to connect to these entities. Our workstations are not connected to customers. But our servers are connected to mobile operators for providing services to customers. The servers are connected to operators via the Metronet network who provides connectivity with all major mobile companies and content/service providers. 8 As your career has progressed, what changes in IT have you noticed and how have these changes in IT contributed to your performance? Every time IT is changing as the new technology comes. So there need to be trained for the new technology. 9 Has using the computer system at work influenced your life outside of work? What way? Yes, my work has influenced my life outside of work. I have learnt how the telecommunication systems work and how services are provided to customers. Also I learnt how the communication between operator and service providers are established. 10 What advice would you give to a new employee about the IT supported workplace? The new employee should have eagerness to learn the underlying system well to provide good service to customers. Also he should be hard working and should be habituated to self-learning. 11 Which service provider do you use for internet? Grameen. 12 What is internet rate of communication speed? 10-20 kbps. 13 Which search engine do you use? Google. 14 Do you like to use internet for online business transaction? Yes. But security issue is main problem here. 15 Do you think internet is essential for daily life or not? Yes. Everyday life internet is very essential. I can communicate via email trough the world. The assignment is divided into four parts. All the four parts is done in here. I have done this assignment by using the books, lectures and from websites.