Thursday, October 31, 2019

Security and Privacy Essay Example | Topics and Well Written Essays - 2000 words

Security and Privacy - Essay Example By information we indicate data that have been produced into the structure that is consequential and useful to the human beings (Kenneth, 1999). Modern technology poses innovative confronts to the protection of individual privacy which existing (Kenneth, 1999). This section will provide the basic insight in to the problem situation that leads to development of this information policy. It is observed on numerous occasions, personnel working late observed the cleaning staff reading discarded printouts. This is really wrong client information exploitation. The administration at St. John’s Hospital takes pride in its sound policies and procedures for the protection of confidential client information. In fact, it serves as a model for other institutions in the area. There is need for the protection of the information and development of the effective information policy. Privacy is the declaration of individuals to be theft alone, free from observation or intrusion from other individuals of organizations as well as the state. Declarations to privacy are also caught up at the place of work. Information technology and system pressure individual declarations to privacy by making the incursion of privacy inexpensive, cost-effective, and efficient (Kenneth, 1999). The information security risk can be defined as the concentration of affect on organization processes (encompassing operational tasks, illustrations, or status), organization possessions, or individuals ensuing from the procedure of an business information arrangement offers the possible influence of a hazard and the probability of that intimidation occurring (Rebecca, 2007). In the above section the possible hazard situations are presented. Such situations can lead us towards lot of possible information exploitation cases. For instance, several workers can take information regarding any patient and blackmail him for

Tuesday, October 29, 2019

Legal Case Analysis Research Paper Example | Topics and Well Written Essays - 1000 words

Legal Case Analysis - Research Paper Example The issue was framed on the state’s authority to control private commercial enterprises that justified itself on protecting the health of children and women. The proceedings of this case clearly elaborated how children and women worked, and conditions of the factories they worked at as found by the Chief Factory Inspector, Florence Kelley, and her staff. The hearing and testimonies presented in the court constituted the truthful record that formed the foundation of the appeal to the Supreme Court (Ritchie v. People (1895). The laws established that the case was still in effect until the Supreme Court of United State decided that the case was in favor of the National Consumers League. This was according to Muller v. Oregon judgment that was handed over on 24 February, 1908. Soon after the United Stated Supreme conclusion in Muller v. Oregon, Louis Brandeis, the attorney in the National Consumers League, claimed that before the Supreme Court had a hearing challenging the constit utionality of the recently enacted Illinois law modeled precisely upon Oregon law that was upheld by the United States Supreme Court. It was a fair decision since that case of Ritchie v. ... Fifteen years later, the decision became a legal nullity, even though the opinion in 1895 was never completely overruled by either the Supreme Court of Illinois or the United States Supreme Court (Herman, 1987). Wal-Mart Stores Inc. v. Samara Bros. Inc. (Forensic Evidence) On March 22, 2000, in an agreed decision, the Supreme Court of the United States handed a win to Wal-Mart Stores, Inc. It also gave much needed intelligibility for the involved people in the case over a specific dress type and design. In the Wal-Mart Stores Inc. v. Samara Bros. Inc. case, the court held that the plaintiff claimed a trade right following Section 43 (a) of the Lanham Act 2 for product designs that are not registered should provide evidence that the design is unique by showing that it has a secondary meaning as a source’s indication to consumers. The court refused the inherent test for inherent uniqueness raised by the owners of the dress trade in the case, the Clinton Management, and many IP a ssociations. This meant that the tests are unproductive and unworkable in cases dealing with product design and made a decision that product design can by no means be inherently unique; rather, uniqueness must every time be acquired (Lemley et al., 2007). Decision Highlights The court made its decision on the case and the following is a summary: 1. For it to give explanation for the raised question on a particular design of a product to meet the requirements for the trade dress protection in the situation where a registered trademark is non-existent, the court ruled that a petitioner should always avail proof that the design has obtained a secondary meaning. This resolved a tear in the US Circuit Appeal Courts (WAL-MART STORES INC. v. SAMARA BROS. INC). 2. The court

Sunday, October 27, 2019

MAC and Physical Layer Enhancements

MAC and Physical Layer Enhancements Abstract Communication technologies have improved a lot since the time we started using radio waves for communicating. We have seen advancement not just in the Cellular side but also on the WiFi side. The availability of limited spectrum has been the issue of the 21st century. As we have improved our technologies from the First generation which was based on analog communication to Fourth Generation which is based on Orthogonal Frequency-division multiplexing (OFDM), the free space in the spectrum has also reduced which has created the problems of congestion. We have come to the point where there is a demand for high capacity, better throughput, constant connectivity and high spectral efficiency. To cater this demand, we not only need high-end devices but equally efficient core network. This paper would focus on the converging technology enhancements at Physical and MAC (Media Access Control) layer of the Fifth generation (5G) on the cellular side and 802.11ad on WiFi side. I. Introduction With the increasing number of users, there is a spectral crunch in both the licensed and unlicensed spectrum. Licensed spectrum is the frequency chunk which is bought by the telecom companies, and a company can use its specific frequency band. The technologies in the licensed spectrum are GSM (Global System for Mobile Communication), CDMA (Code Division Multiple Access), LTE (Long Term Evolution). Unlicensed spectrum is the frequency chunk which is free and can be used by anyone. The technologies used in unlicensed spectrum are Bluetooth, WiFi. The increasing number of users have created the need for finding new spectrums and simultaneously new technologies which can be used to improve the efficacy of both cellular and WiFi communication. New standards i.e. 5G for cellular communication and 802.11ad for WiFi are going to use high-frequency bands which were never used before. This untapped potential is going to be a game changer. It will not just improve the spectral efficiency and th e throughput but will also increase the capacity. Technologies such as 802.11ac and LTE-Advanced (Long term evolution-advanced) could provide data rates as high as 1 Gigabytes per second (Gbps) [5] [6]. Also, LTE-A used 2620-2690 MHz (Mega Hertz), and 802.11ac used 5GHz (Giga Hertz) band for data transfer [1] [5]. 802.11ac and LTE-A employed technologies such as MIMO (multiple input, multiple output), beamforming which helped in achieving necessary throughput and capacity requirements, but now even these enhancements need necessary upgradation and changes to support the ever-increasing demand. Not only this but the cost of the wired backhaul is also a big concern. All these needs must be met in 5G and 802.11ad. The cost of wired backhaul can be reduced by moving towards mm-wave (Millimeter wave) which will not just decrease the cost of backhaul but will also improve the overall throughput [1]. This can be a converging point for the two technologies. 5G will be using frequency band i.e. 28 and 38 GHz, and 802.11ad will be using the 60GHz band which falls in mm-wave frequency band [1] [2]. Directional beamforming will be another addition to both 5G and 802.11ad wherein we will direct the signal towards the intended receiver that will help in reducing the power required [1] [2]. Figure 1. Improvement in performance from 4G to 5G. [8] Figure 1 gives a clarity about the targets which were set after using International Mobile Telecommunications-Advanced (IMT-Advanced Standard) i.e. 4G to enhance its performance in case of International Mobile Telecommunications-2020 (IMT-2020 Standard) i.e. the 5G standard [8]. II. Physical Layer Enhancements Here are some of the enhancements at the Physical layer of 802.11ad and 5G: 1. Millimeter Wave: (i) Millimeter wave in 802.11ad: Propagation of signal in the 60GHz unlicensed spectrum is different from that of 5GHz and 2.4GHz which were used in previous WiFi protocols. The frequency range in which the 60GHz falls is the Millimeter wave frequency band. Millimeter wave band will allow faster data transfer and will help us in using wireless docking stations. This will reduce the cost of backhaul as we will be removing the wires. The issues with 60GHz spectrum are its smaller range due to high attenuation, as the wavelength is small thus it causes blockage due to concrete walls [2]. We can also see from the figure 2. that the effect of oxygen in the atmosphere at 60GHz is high and causes atmospheric absorption of the millimeter wave. These are some of the limitations of 60 GHz band which are being looked at like the issue of absorption by oxygen can be reduced by using band Figure 2. High Atmospheric absorption at 60GHz. [1] (ii) Millimeter wave in 5G: The proposed band for 5G is 28GHz and 38GHz which falls in the region of millimeter wave. This is going to help in increase the data rate. The proposed data rate is nearly 20Gbps which is nearly 20 times that of 4G [8]. Millimeter waves can travel smaller distances as the wavelength is small which causes high attenuation due to atmospheric absorption. This can be mitigated by using the concept of small cells in our network. Cell size can be up to 200 meters. Figure 3. Attenuation Due to Heavy Rainfall. [1] Figure 3 shows the attenuation due to heavy rainfall of 25 millimeter/hour for a 28GHz band for 1 Kilometer cell size i.e. 7db which will be only 1.4db for a cell size of 200 meter [1]. 2. Beamforming: (i) Directional Beamforming in 802.11ad: In directional beamforming, the signals are directed to the intended receiver. It has been introduced instead of using an omnidirectional antenna which used to send the beam in all the directions reducing the power of the signal. But it is highly impractical to use highly-directional transmissions as there is a high chance of attenuation due to blockages. This can be prevented by using automatic gain control. MAC mechanisms are also affected due to the Highly directional communications such that the devices are not able to know that there is some other communication going on which increases the chances of collision. Golay sequences are used to reduce these chances of collisions. Golay sequences are the complementary sequences and help in synchronization and automatic gain control that in turn helps in attaining a throughput of 27.5Mbps thus making Management frames more efficient. Sum of out-of-phase Autocorrelation coefficients for Golay sequ ences being zero reduces the level of side lobes which in turn helps in reducing the chance of collision [2]. (ii) Adaptive beamforming in 5G: Beamforming is a concept in which we change the specific weights at the antenna level such that we direct the signal to a specific area by concentrating the power in the main lobe and reducing the power of signals in the side lobe. This will increase the throughput and hence will improve the user experience. In adaptive beamforming, the channel is used in an efficient manner which also helps in reducing the issue of interference. This can be achieved by using the concept of scheduling in different base stations. This can be used in a very interesting manner in 5G, and it will also help by improving the coordination between various eNodeBs. Hence the concept of adaptive beamforming will make the 5G network faster and more efficient [9]. 3. MIMO: (i) Multiuser-MIMO (MU-MIMO) in 802.11ad: At physical layer level 802.11ad works in two modes i.e. OFDM and Single carrier mode. MIMO is used for diversity in communication. In multiuser MIMO for 802.11ad, we use a matrix of a minimum of 2X2 (2 receiver antennas and 2 transmitter antennas). We can send signals to 2 or more users at one time with a very high throughput because we are employing OFDM. Previously we were employing only single user-MIMO wherein we used to send multiple signals to only one user. No doubt it gave high speed, but we were not able to use the limited unlicensed spectrum efficiently. Thus, with the advent of Multiuser-MIMO, the problem of low efficiency has been reduced [2] [10]. Figure 4. Block diagram of Transmitter in MIMO [10]. From figure 4 we can see how the data is sent using MIMO technique. Here firstly data is sent to the scrambler. After scrambling the data, it is encoded by the LDPC (low-density parity-check) encoder for tone interleaving. After interleaving the OFDM processed data we apply Inverse Fast Fourier Transform (IFFT) on the data. Finally, we add a guard interval to protect the sent data [10]. (ii) Massive MIMO in 5G: 5G will be using massive MIMO technique that will involve a large number of antennas and the number will more than 10 times larger than previous networks. This will not just give a high amount of beamforming gains but will also increase the capacity of the network. But there is a catch here. The increase in a number of streams will increase the overhead of pilot signals, and because of this, we will use some part of our spectrum. Also, there is an increase in the complexity if we use a high number of antennas. The solution to this overhead is that we can use Non-Linear Estimators and small cells which will help in reducing the effect as at high signal-to-interference-plus-noise ratio (SINR) the effect of errors in the signal is very less [4]. III. MAC Layer enhancements Here are some of the enhancements at the MAC layer of 802.11ad and 5G: 1. Beamforming Training in 802.11ad: Beamforming training is a part of directional beamforming in which we select a pair of receiver and transmitter sectors so that the network can be optimized and we can get the best coverage. Figure 5. Sector training in Transmitter and Receiver antenna [2]. Figure 5 shows the sector training process. This is done is three phases. In the first step, we try to find the best transmitting antenna. In the second step, the training of only those transmitting and receiving antennas happens for which the transponder thinks are the best for the network. In the third step, various weights for the antennas are adjusted according to the changes in the channel so as to get the maximum level of Signal to Noise Ratio which will thus be able to get the best coverage for the network. Hence the process of Beamforming training for 802.11ad is completed [2] [3] [7]. 2. Contention-Based Medium Access in 802.11ad: In IEEE 802.11 standards, enhanced distributed channel access (EDCA) is used for contention-based Medium access. But there is an issue of deafness that arises when we use the contention based medium access and directional beamforming together. This can be reduced by using Beamforming training wherein we select the best transmitter and receiver antenna for the communication. Chances of collisions are increased due to deafness because carrier sensing ability is reduced. Multiple Network allocation vector (NAV) timers are used at the MAC level. Here the channel is allocated only if the NAV is zero and will not be allocated in case the NAV is non-zero. The concept of NAV for the contention window in 802.11 standards has been used previously as well. Using this concept will enhance the capacity and efficiency of 802.11ad and will be different from previous standards as it uses direction beamforming [2]. 3. Dynamic Channel Time Allocation in 802.11ad: Dynamic channel time allocation is a polling based allocation of resources in 802.11ad at the MAC layer. The polling is done not just for one frame but for a specific time chunk of the channel. The issue of deafness is avoided due to personal basic service set (PBSS) control point/access point (PCP/AP) that reduces the chance of a collision as PCP/AP knows the path of transmitting antenna. The process of Dynamic Channel time allocation is explained in Figure 6. It shows the Beacon header interval (BHI) can be used in dynamic scheduling. Firstly, a channel is gained by the PCP/AP for the polling frames that are sent to their respective stations. Service period requests (SPRs) are used to reserve a specific channel time for their respective communication. Communication can be between Station (STA)- STA or STA Access Point (AP). Channel protection points act as the guard time between two allocated channel times adding reliability in communication [2]. Figure 6. Dynamic Channel Time Allocation [2]. 4. Full-Duplex MAC Protocol in 5G: At Physical layer level, Full-Duplex must reduce the use spectrum making the communication efficient. At MAC layer level the protocol must be defined such that it optimizes the network and reduces the chances of collision. The problem of a hidden node due to highly directional communication can also arise just like it used to happen in the case of WiFi standards. We can use the concept of Request to Send / Clear to Send (RTS/CTS) which was used in WiFi standards being a half-duplex communication. For 5G we will be using full-duplex clear-to-send (FCTS) instead of just the CTS which was used in WiFi i.e. a unidirectional communication. Figure 7 shows the channel allocation for communication between Node A and Node B. Firstly RTS is sent from Node A to check if there is the availability of the channel. After that there is a Short Interframe Space (SIFS) for which we need to wait for FCTS from Node B. Now being a bidirectional communication (Full-duplex) an FCTS is sent by Node A as wel l which makes it different from WiFi standards. After another SIFS interval, the channel is allocated, and there is a bi-directional communication between Node A and Node B. After the channel time allocated is complete, there is a small SIFS before ACK (Acknowledgement) which is kept and this ACK shows that the channel has been released [11]. Figure 7. Channel Allocation in Full Duplex 5G between Node A and Node B [11]. 5. Device-to-device communications in 5G: It is currently a part of LTE-A Release 12 of the 3gpp standards. Device to device (D2D) communication will be an inter-communication between the devices that will use 5G. There is no need to route the data from the 5G base station in D2D communication. The devices will use the same spectral resources as the 5G network. Thus, we must optimize the network to meet the requirement of the users. This will improve the spectral efficiency of the network and will increase the capacity as well. For D2D communication the devices should be in proximity. This can be very useful in case of Autonomous vehicles such as driverless cars which can communicate with each other and thus protect the passengers. D2D communication can occur in two ways. The first way is that one of the UE (User) can send a broadcast signal about its availability and what it can offer. The discoverer UE if interested in the characteristics of the broadcasting UE establishes a connection. The second way is that one of the UE will broadcast its requirements and the UE which meets these criteria can establish a connection with this UE [12]. IV. Conclusion This paper has shed light on the most recent enhancements taking place in 802.11ad and 5G. The paper has addressed the issue of spectral crunch and how these two technologies will cope up with this issue in the near future. The enhancements introduced in the paper have opened the way for the two technologies to interoperate such that the user can get 5G connectivity when outside and 802.11ad connectivity when inside their homes. Convergence of these two technologies will be made easy not just at the Physical level but at the MAC level too. At physical layer level, we have seen the use of mm-wave and directional beamforming, and at MAC layer level, we have seen full-duplex communication using RTS/CTS in 5G which will increase convergence.   Hence, the convergence of these two technologies will increase the capacity as a lot of unused spectrum will be released. V. References [1] T. Rappaport, S. Sun, R. Mayzus, and H. Zhao, Millimeter Wave Mobile Communications  for 5G Cellular: It Will Work! IEEE Access, pp. 335-349, 2013. [2] T. Nitsche et al., IEEE 802.11ad: Directional 60 GHz Communication for Multi-Gigabit-per-Second Wi-Fi, IEEE Commun. Mag., vol. 52, no. 12, Dec. 2014, pp. 132-41. [3] H. Shokri-Ghadikolaei, C. Fischione, P. Popovski, and M. Zorzi, Design aspects of short-range millimeter-wave networks: A MAC layer perspective, IEEE Netw., vol. 30, no. 3, pp. 88-96, May 2016. [4] V. Jungnickel, K. Manolakis, W. Zirwas, B. Panzner, V. Braun, M. Lossow, M. Sternad, R.  Apelfrojd and T. Svensson, The Role of Small Cells, Coordinated Multipoint, and Massive  MIMO in 5G, IEEE Commun. Mag., pp.44-51, May 2014.   [5] R. Van Nee, Breaking the Gigabit-per-second barrier with S02.11AC, IEEE Wireless Communications, vol. IS, pp. 4-4, April 2011. [6] S. Parkvall, et al., LTE-Advanced Evolving LTE Towards IMT-Advanced, in IEEE Proc.  Vehicular Technology Conference, Sept. 2008. [7] E. Perahia and M. X. Gong. Gigabit wireless lans: an overview of IEEE 802.11 ac and  802.11ad. ACM SIGMOBILE Mobile Computing and Communications Review, 15(3):23-33,  2011. [8] M.2083, Recommendation ITU-R, IMT Vision Framework and overall objectives of the  future development of IMT for 2020 and beyond, September 2015. [9] S. Chen, S. Sun, Q. Gao and X. Su, Adaptive Beamforming in TDD-Based Mobile  Communication Systems: State of the Art and 5G Research Directions, in IEEE Wireless  Communications, vol. 23, no. 6, pp. 81-87, December 2016. [10] X. Zhu, A. Doufexi, and T. Kocak, Throughput and coverage performance for IEEE  802.11ad millimeter-wave WPANs, in Vehicular Technology Conference (VTC Spring), 2011  IEEE 73rd, 2011, pp. 1-5. [11] X. Zhang, W. Cheng, and H. Zhang, Full-duplex transmission in PHY and MAC layers for  5g mobile wireless networks, Wireless Communications, IEEE, vol. 22, no. 5, pp. 112-121,  2015. [12] Z. Ma, Z. Zhang, Z. Ding, P. Fan, and H. Li, Key techniques for 5G wireless  communications: network architecture, physical layer, and MAC layer perspectives, Sci. China  Inf. Sci., vol. 58, no. 4, pp. 1-20, 2015.

Friday, October 25, 2019

Effects of the Tet Offensive Essay -- Vietnam War Essays

For nine years, the United States were hell-bent in achieving their rightful victory in Vietnam, however, destiny had different plans for them. The Tet Offensive is considered the turning point of the Vietnam Conflict because of the fact that the Vietcong and North Vietnamese Army surprised the U.S and South Vietnam with several sporadic attacks. Consequently, many effects from these attacks were expected, not only for America, but for North and South Vietnam as well. With U.S citizens’ opinions quickly turning against U.S. involvement in Vietnam, South Vietnam faced much disaster. Its government was stricken with humility because of the increased abandonment of their army, leading to the inability to protect its citizens. On the other hand, North Vietnam began accepting great amounts of land along with the power to frighten the rural population. Soon after the Tet Offensive, citizens of the United States began having second opinions about concentrating our troops in Vietnam: â€Å"Within weeks [of the Tet attacks], many average Americans who previously were supporters had turned against the war† (Omicinski 2). A small cluster of Vietcong forces made their way into the compound of the United States embassy located in Saigon, proving to Americans that even though there were hundreds of thousands of soldiers fighting in Vietnam, the U.S. had progressed only slightly (Dudley 131). The people were constantly being told that the conflict would soon end, however, increased need of military assistance had U.S. citizens questioning the veracity of our government. The phrase "credibility gap" surfaced to describe the growing public scepticism (Gerdes 14). This factor led to the government’s loss of support from most of the population. Ano... ...t.edu/central/brush/LocalForces.htm>. Dennison, John D. Tet Offensive of 1968 - A Simpler Version. 24 Aug 2004. 1st Cav Medic Radio Station. 3 May 2007 . Dudley, William. The Vietnam War: Opposing Viewpoints. San Diego: Greenhaven Press, Inc, 1998. Gerdes, Louise. Examining Political Issues Through Political Cartoons: The Vietnam War. Greenhaven Press, 2005. Omicinski, John. â€Å"Tet Offensive 30 years ago: A turning point of Last Half-Century.† USA Today. Jan. 31, 1998. SIRS Researcher. Waubonsie Valley H. S. Lib., Aurora, IL. 3 May 2007 . Vietnamization: Lasting Effects On South Vietnam. 1999. StudyWorld. 11 May 2007 . Effects of the Tet Offensive Essay -- Vietnam War Essays For nine years, the United States were hell-bent in achieving their rightful victory in Vietnam, however, destiny had different plans for them. The Tet Offensive is considered the turning point of the Vietnam Conflict because of the fact that the Vietcong and North Vietnamese Army surprised the U.S and South Vietnam with several sporadic attacks. Consequently, many effects from these attacks were expected, not only for America, but for North and South Vietnam as well. With U.S citizens’ opinions quickly turning against U.S. involvement in Vietnam, South Vietnam faced much disaster. Its government was stricken with humility because of the increased abandonment of their army, leading to the inability to protect its citizens. On the other hand, North Vietnam began accepting great amounts of land along with the power to frighten the rural population. Soon after the Tet Offensive, citizens of the United States began having second opinions about concentrating our troops in Vietnam: â€Å"Within weeks [of the Tet attacks], many average Americans who previously were supporters had turned against the war† (Omicinski 2). A small cluster of Vietcong forces made their way into the compound of the United States embassy located in Saigon, proving to Americans that even though there were hundreds of thousands of soldiers fighting in Vietnam, the U.S. had progressed only slightly (Dudley 131). The people were constantly being told that the conflict would soon end, however, increased need of military assistance had U.S. citizens questioning the veracity of our government. The phrase "credibility gap" surfaced to describe the growing public scepticism (Gerdes 14). This factor led to the government’s loss of support from most of the population. Ano... ...t.edu/central/brush/LocalForces.htm>. Dennison, John D. Tet Offensive of 1968 - A Simpler Version. 24 Aug 2004. 1st Cav Medic Radio Station. 3 May 2007 . Dudley, William. The Vietnam War: Opposing Viewpoints. San Diego: Greenhaven Press, Inc, 1998. Gerdes, Louise. Examining Political Issues Through Political Cartoons: The Vietnam War. Greenhaven Press, 2005. Omicinski, John. â€Å"Tet Offensive 30 years ago: A turning point of Last Half-Century.† USA Today. Jan. 31, 1998. SIRS Researcher. Waubonsie Valley H. S. Lib., Aurora, IL. 3 May 2007 . Vietnamization: Lasting Effects On South Vietnam. 1999. StudyWorld. 11 May 2007 .

Thursday, October 24, 2019

nt1330 unit 7 assinment1 Essay

TO: Business Manager FROM: IT Consultant I can understand how you concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose production over trying to secure your networks information. An easy measure like user names and passwords can be used to protect less sensitive information but how strong you make those usernames and passwords can have a significant effect on how well your information is protected. I will give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the Active Directory Users and Computers in the Domain icon in the left pane click on the users icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. â€Å"CCbattle1234@Domain*%#.Local† if someone hack the account and all that they knew the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper and lower case letters, should contain at least one number and one special characte r. Best Regards,  IT Consultant

Wednesday, October 23, 2019

Marketing Environment Essay

Marketing is a organizational function and a collection of processes designed to plan for create, communicate, and deliver value to customers and to build effective customer relationship in ways that benefit the organization and its stake holders. Profits and other organizational goals are achieved by creating value for customers. The creation of value is the realization of benefits that exceed the cost of products, services or other items. One important concept in marketing is the idea of utility. Utility is the satisfaction received from owning or consuming a product or service. In a market sense, utility is the value that marketers intend consumers to attach to that marketer’s product or services. A need is a necessity to meet an urgent requirement. A want is a desire for something that is not essential. Furthermore, demand is the financial capacity to buy what a person wants, for that business’s brand of products or services through marketing activities such as advertising. A brand is a promise to deliver to consumers specific benefits associated with products or services. Marketing influences you as a consumer through your current and future career choices, and through the economy. Marketing extends to a variety of tangible and intangible items; they are products, services, people, places, causes, events and ideas. Marketing concept is an organizational philosophy dedicated to understanding and fulfilling consumer needs through the creation of value. Marketing concept mainly focus on customers relationship. Customer relationship created when businesses and consumers interact through a sales transaction of a product or service. It will refer to customer relationship management (CRM). Marketing functions are activities performed within organizations that create value for specific products or services. In terms of understanding all these theory, we started Butterfly Travel Agency Sdn.Bhd to gain experience and knowledge in marketing as practically. Marketing Environment Marketing environment is a set of forces, some controllable and some uncontrollable, that influence the ability of a business to create value and attract and serve customers. Many factors influence value creation and the nature of customer relationships, including factors that are external to the business. Internal marketing is the implementation of marketing practices within an organization to communicate organizational policies to employees and internal stakeholders. Internal marketing efforts are the business’s resources, including human and financial capital. The external environment of a business involves activities, such as supplier and customer actions, that occur outside the organizational functions of a business. External marketing can be implements into microenvironment and macro environment. Microenvironment (Porter’s Five Forces) The microenvironment includes these forces close to a company, yet outside its internal environment, that influence the ability of a business to serve its customers. A tool that helps determine the power of microenvironment of a business is Porter’s Five Forces of competitive Position Model. Porter analysis can assist a business with understanding the potential for new product development the attractiveness of a particular market segment or the potential to reduce costs of supply or distribution among many applications. Macro environment The macro environment includes societal forces that are essentially uncontrollable and influence the microenvironment of a business. The macro environment contains the following variety of sub-environments are economic, social and cultural, competitive, legal, political and technological.

Tuesday, October 22, 2019

Free Essays on Phenylketonuria

Phenylketonuria, otherwise known as PKU, is a rare genetic disease that is caused by a person’s body being unable to metabolize the amino acid phenylalanine. The disease can cause mental retardation because the build up of phenylalanine in the body. When phenylalanine is not broken down and turned in a different amino acid, tyrosine, it can create other enzyme routes that build up in the blood stream and body tissue. This can be extremely harmful to the body and its development. This disease is caused by missing the enzyme phenylalanine hydroxylase, this enzyme is the one that normally breaks down phenylalanine. It is rare for this enzyme to be completely absence, but this form leads to the most severe mental retardation and neurological problems. Most cases occur when this enzyme is deficient and the amount of phenylalanine is slightly higher than usual amount in the circulatory system of a person. This is called hyperphenylalaninemia.. These disorders are different than norm ! al PKU. (Shuett; McKusick) PKU occurs immediately when a child is born. The child appears to be completely normal, but can have blue eyes and can have fairer skin and hair than the rest of its family members. If PKU is unidentified early in an infants life they can have early symptoms which can be identified. Half of untreated babies while develop symptoms such as vomiting, irritability, an eczema-like rash, and a mousy odor to their urine (Bellenir 69). They can also have nervous system problems. Increased muscle tone, and very active tendon reflexes occur from these problems. Soon after they start to undergo mental problems. These problems are severe mental retardation and seizures among other things. Other indications are a smaller head than usual, prominent cheek and upper jaw bones with widely spaced teeth, poor development of tooth enamel, and decreased body growth(Bellenir 69). PKU is passed on in a â€Å"autosomal recessive† gene. This means that a pers... Free Essays on Phenylketonuria Free Essays on Phenylketonuria Phenylketonuria, otherwise known as PKU, is a rare genetic disease that is caused by a person’s body being unable to metabolize the amino acid phenylalanine. The disease can cause mental retardation because the build up of phenylalanine in the body. When phenylalanine is not broken down and turned in a different amino acid, tyrosine, it can create other enzyme routes that build up in the blood stream and body tissue. This can be extremely harmful to the body and its development. This disease is caused by missing the enzyme phenylalanine hydroxylase, this enzyme is the one that normally breaks down phenylalanine. It is rare for this enzyme to be completely absence, but this form leads to the most severe mental retardation and neurological problems. Most cases occur when this enzyme is deficient and the amount of phenylalanine is slightly higher than usual amount in the circulatory system of a person. This is called hyperphenylalaninemia.. These disorders are different than norm ! al PKU. (Shuett; McKusick) PKU occurs immediately when a child is born. The child appears to be completely normal, but can have blue eyes and can have fairer skin and hair than the rest of its family members. If PKU is unidentified early in an infants life they can have early symptoms which can be identified. Half of untreated babies while develop symptoms such as vomiting, irritability, an eczema-like rash, and a mousy odor to their urine (Bellenir 69). They can also have nervous system problems. Increased muscle tone, and very active tendon reflexes occur from these problems. Soon after they start to undergo mental problems. These problems are severe mental retardation and seizures among other things. Other indications are a smaller head than usual, prominent cheek and upper jaw bones with widely spaced teeth, poor development of tooth enamel, and decreased body growth(Bellenir 69). PKU is passed on in a â€Å"autosomal recessive† gene. This means that a pers...

Monday, October 21, 2019

Palazzo Ruccelai essays

Palazzo Ruccelai essays The Palazzo Ruccelai was one of the first works by Leon Battista Alberti. He was an Italian architect, architectural theorist, and universal genius. Albert was the most important early Renaissance architect after Filippo Brunelleschi (Gympel, 44). The "Palazzo" originated in Florence. The monumental private building is derived from "palatium." This Latin word comes from the Roman hill which Emperor Augustus and his successors lived. During the 13th and 14th centuries, many of Italian towns were destroyed during the power struggles. This explains why the exterior of the Early Renaissance palaces were dark, defensive, raw and uninvited (Gympel, 44). Construction on the Palazzo Ruccelai began somewhere between 1455 and 1460. Leon Batista Alberti designed the original Palace to have five bays, the center being where the door was located. Later on, two more bays were added by someone else (class notes 1/19/00). There are three stories on this building. Each story is equal in height and rustication is uniform. This "evenness" is what gives the Renaissance its name. Most buildings made at this time have similar attributes. Each story has its own column capital to it. The ground floor has the Tucson order, the middle floor has Alberti's own design, and the top floor has the Corinthian order. I thought in Leon Battista Alberti's treaty, The Ten Books of Architecture, I would find out what each of the column capitals meant to him, but all I could find is dimension requirements for each order. The Colosseum has similarities with the Palazzo Ruccelai also. I believe some of Alberti's ideas came from at least the columns. It has a similar placement of the columns. They both have the Tucson order on the ground story, and the Corinthian on the top story. Where the Palazzo Ruccelai has the composite though, the Colosseum has the Ionic (Kostof 207). I wish I could find what was on the inside of this building. This could ...

Sunday, October 20, 2019

Masters Thesis

Masters Thesis Before writing a thesis/dissertation you will have to trash over a great number of materials for your research. You should start your work with a thinking stage during which you take your time to debate different ideas for your future research project in your mind. Educational institutions throughout the world are generally using words ‘thesis’ and ‘dissertation’ interchangeably. However, an educational tradition in some countries has firmly fixed the use of these terms. For instance, colleges and universities within the US use the term ‘thesis’ to denote a final project done at bachelor’s and/or master’s level, while the term ‘dissertation’ is used to signify a Ph.D.  level research project. Master’s Thesis: General Tips Writing a master’s thesis and its subsequent defense at viva voce is a mandatory requirement for obtaining master’s degree at the majority of degree awarding institutions. By completing your master’s thesis you are required to gain mastery in the chosen subfield and demonstrate your knowledge and competence in it. Working on a project of such scale is by no means an easy task. Many researchers agree that writing a masters’ thesis is more difficult than PhD because a student attempts to become an expert in a field which she or he hasn’t dealt with previously. They argue that work on a PhD is normally done by a researcher who already possesses expert-level knowledge in the field, is aware of the most recent research and is actively involved in the research process within this field. The main purpose of PhD-level writing is making a unique contribution to the existing body of knowledge. Master’s thesis doesn’t demand unique research; howe ver, its successful completion will require its author to demonstrate mastery within a given topic.   While working on a thesis one will need to cover a considerable number of resources (books, journals, periodicals, sites, databases etc), analyze them carefully, pick out the ones that are most relevant to the topic, and write, write, write. A WINNING THESIS PAPER Writing a master’s thesis might seem a daunting task because of the scale of work and the amount of research that has to be done. When you take another look at it and try to break the writing process into smaller assignments, it won’t appear intimidating anymore. To better organize the process and facilitate a  better understanding of the goals and tasks of master thesis writing, let’s take a closer look at the steps one has to take while working on the project. Masters Thesis: Selecting a Topic Selecting a topic for your master’s thesis lays the foundation of the entire project. The choice of the topic for their masters’ theses is generally left to students. As a result, topic selection becomes the first challenge in the course of writing. It is always a difficult task to achieve because students are new to the topic, have little knowledge on the subject and can easily make a mistake. Choosing a topic that is too general, for example, is one of the common mistakes. Another pitfall is selecting a topic that has not yet been researched. Despite all these academic traps, the general recommendation remains invariable: students need to choose topics they feel most interested in. As it has been previously said, writing a master’s thesis is a lengthy and a difficult process, and only your interest in the topic, as well as your academic curiosity and enthusiasm, will give you the energy to complete the project. Masters Thesis: Finding an Advisor Once the topic is chosen and before the actual writing, students are required to find a research advisor who would direct the writing process and work together with the student to strengthen the paper. Many institutions require their students to draft a plan of their thesis with a brief explanation of the issues that will be researched, abstract, bibliography and outline. Research advisors for master’s level these are usually PhD holders in their respective fields and they know immediately whether the topic is too broad or too narrow and will be able to break down the entire project into smaller bits. You will be required to see your advisor three-four times during the time you work on the paper. This is generally to discuss the thesis topic and then to review your first, second and third draft. Depending on the institution, the topic for your thesis may be approved by either your advisor personally or by the board of advisors. In case the topic gets approved by your advisor only, this is an easier case. Simply work on the topic together with him/her, and once it has been approved, proceed to research. If, however, you master’s thesis needs to be reviewed by the advisory board, you will be required to come up with a research proposal – a short extract of your future thesis. It will contain most of the sections of your actual thesis, and will briefly explain the editorial team what you are going to do your research. Once you submit the research proposal and it gets approved, you are free to proceed with further research. If the research proposal is found to be irrelevant or inadequate, the student will be required to start over: pick a new topic and come up with a new research proposal. This is normally a rare case because research advisors immediately spot topi cs that will not pass. Working on a Master’s Thesis: Structure Masters’ theses vary in structure depending on the field of study: a thesis in Arts, Economics, and Mathematics will be different. However, generally world institutions require the thesis to take five chapters. The first chapter is the thesis introduction, where the research topic and methodology are explained; the second chapter is a  review of the  literature, containing the  analysis of the literature on a given problem. The third chapter is the methodology section of the master’s thesis, explaining the methods utilized, data collected and approaches used. The ‘findings’ section is another major part of the paper presenting the reader with the results of the research. The fifth chapter of the master’s thesis should interpret the search findings and discuss them within the framework of the lit review. The final section of the paper is the conclusion, summing up the research and stating whether results have proven the hypothesis. Thesis Examination Many institutions require candidates to go through the so-called ‘thesis defense’, where students are required to present results of their research to an examining committee, consisting of senior scholars who are experts in the field. This examination, often called â€Å"viva voce† is generally done after the thesis has been completed, but before it gets submitted to the university. The committee reviews it and then makes a decision if the thesis is written at a decent academic quality level. There are four possible ‘verdicts’ a committee can come to:   Accepted without any corrections. This is rarely the case, as most theses will need a revision or a minor tuning;   Must be revised. In this case, the thesis is found to contain grammar and spelling errors that require correction. Most theses fall into this category;   Extensive revision needed. The thesis contains a series of other mistakes, including issues with methodology, literature, and some theoretical concepts;   Unacceptable. This is rarely the case in practice because academic advisors spot theses of unacceptable quality and failing a thesis at a viva voce will put his/her reputation at risk. Generally, writing a master’s thesis is a lengthy and a complicated process that requires patience, persistence, and practice. Should you need professional assistance with writing your master’s thesis, is a writing company that is your perfect choice. All our writers have at least one master’s thesis they have written and defended for getting their own degree; and at least 4-5 more that were completed for our customers. Some of them specialize in thesis writing and take only masters’ theses. THESIS STATEMENT Whenever you are using the help of our writers, you are receiving support from world class professionals, capable of crafting an effective master’s thesis to match your needs. We can be of assistance if you have completed the thesis yourself and need a major revision, proofreading service or a rewrite. It is always good for a thesis to be read by someone else, not just the author. In any case, we have the expertise required to ace your masters’ thesis. Please visit our order page or contact our support team for additional information. is the service you can trust!

Saturday, October 19, 2019

Case study Essay Example | Topics and Well Written Essays - 2000 words - 1

Case study - Essay Example o 600,000 sterling pounds, adding this amount to the working capital of 180,000 pounds amounts to an initial cost of 780,000 pounds. The overheads have been adjusted from the previous 47,000 pounds to 30,000 pounds in a year. Question One b i) Pay back Year Cash flow ? (?000) Cum. CF ? (?000) 0 (600) (600) 1 147,000 (453) 2 157,000 (296) 3 157,000 (139) 4 187,000 48 5 187,000 23 3 years and (139/ 187) x 12 3 years and 8.9 months ii) Net Present Value Year Cash flow ? DF 12% PV ? 0 -600,000 1.000 -600,000 1 147,000 0.893 131,271 2 157,000 0.797 125,129 3 157,000 0.712 111,784 4 187,000 0.636 118,932 5 187,000 0.567 106,029 The net present value is -6,855 pounds. Question One C Using NPV to make decisions regarding the investment of a project is advantageous in that the NPV takes into consideration the time value of money and gives priority to the risks that will be involved as well as the profitability of the project. A negative NPV implies zero returns therefore I would advice the ma nagers to reject the project. Question Two Whenever a bank is granting or making a loan facility to a client, a number of factors are considered by the authorizing persons. These are the factors that do determine whether the client is eligible to receive the loan or not. Factors sometimes do vary depending on whether the client is a person or a business. The bank looks at the credit history of the borrower. The history of the client’s credit situation is based on the score or the rating that is mostly done by agencies, for instance, Transition. The credit score that a client is awarded determines the eligibility to receive the loan facility. The bank acquires the commercial credit report from an agency on the company’s credit history. The reports normally comprise of the payment history information, past credit scores and information on the public filings done (Crawford 2013). Existence or occurrence of negative information from the report for instance late payments or tax liens outstanding degrades the company credit score. The most obvious response from thee bank is seeking an explanation from the company regarding the occurrence. The advice given to the company is to review a copy of the report, after requesting it from the agency responsible. This gives the company the opportunity to correct any discrepancies that exist. The business credit reports are bases on the tax allegiance (Crawford 2013). The bank also looks at the financial position of the company. The bank normally request to be provided with the latest statements that justify the working capital. Working capital ranges from the current assets to first hand cash to the availability of finances to pay the current debts without affecting the normal running of a business. Working capital defines what is left after deducting all the current liabilities. When the working capital is inadequate, the Implication of the assumptions to be made is that the firm or business is facing the risk o f collapsing. The consequence of this is facing a rejection on the

Friday, October 18, 2019

TOPIC FROM PERSONAL EXPERIENCE MUST BE FIRST HAND EXPIERENCE WRITTEN Essay - 1

TOPIC FROM PERSONAL EXPERIENCE MUST BE FIRST HAND EXPIERENCE WRITTEN IN OWN OWRDS USING THE PRONOUN I - Essay Example I happen to have a very good handwriting, too bad it never helped me in getting good grades when it came to Algebra. I looked around to see a whole lot of people were busy talking and laughing. Some were hard at work and some were simply copying stuff from the others. Thinking that I should also get to work now, I turned my attention to the textbook. I turned the book few pages back to look up some pointers on cyclic equations. Sitting right behind me, Kimberly and Amy were comparing notes about how to best avoid split ends in hair. I tugged at my ponytail, groaning inwardly at their frizzy texture. Suddenly, I realized I had been staring at the same page for past ten minutes, contemplating uselessly on hair care. Bracing myself, I got back to work and resolved not to get distracted again. To my surprise, the first few steps of the problem went well but halfway through I found myself stuck again. Mike, from the other row, chose the moment to disrupt the class with his famous imitation of buzzing bees. Fuming inwardly, I tried to concentrate but to no avail. I ended up spending another five minutes making tiny flowers around the page number and a face right above the Exercise heading. â€Å"This looks better now†, I thought looking at the page number. I looked around to find a completely engrossed Hannah, sitting next to me, had solved the problem and was already jotting down the next one. I felt the usual wave of frustration building up inside me at the difficult nature of this subject. Irritated with my lack of concentration, I compared my work with Hannah’s and learnt that the reason I was stuck with very wrong looking values was because I had made a few dumb mistakes. Taking the lead from her, I set about correcting my work. I was confident that I will be able to solve it then. Hannah was kind enough to explain the equation functions to me. Patiently bearing my occasional spacing out due to noise distractions in

Dominican Republic Essay Example | Topics and Well Written Essays - 1000 words

Dominican Republic - Essay Example Many local people, knowing there destiny fled fearing the Europeans and later on formed there own colonies, called the Maroon colonies. The colonizers brought in another change, they imported the black people and slavery was one of the most predominant features at that time. But all this changed because of the Haitian Liberation, this made sure that slavery was completely abolished from the country, as a result of which, the blacks having no where to go settled on in the country. This is the history of the country, which saw many a change taking place. The people of Dominican Republic are masters when it comes to indirect communication, they firmly believe in maintaining a good relationship with as many people as they possibly can. The people of the Dominican Republic consider themselves to be more Latin American than Caribbean. The situation of the country as of now is quite bad; the people are struggling to fight against the corrupt people, who are currently in power. Spanish is spoken in the country and the people are very proud of the purity of Spanish they speak in the country. The flag of the country is designed in such a manner that it shows national pride and patriotism. The flag consists of the colors red and blue which indicate the blood of the people who gave up their lives and liberty respectively. The Dominican coat of arms can be found in the centre of the flag. "A recent national symbol, constructed in 1992, is the Columbus Lighthouse. It was a work project conceived of by President Joaqun Balaguer when he was 85 ye ars old and blind. It is an enormous cross, flat on the ground, facing the sky and bursting with lights, and was built as a tourist attraction." (Every Culture, 14 August, 2008). The light house is in an area where there is utter poverty; people live in despair, without any electricity and without many more basic necessities. The light house is a very big attraction and can even be seen burning brightly from Puerto Rico. The native people are called the Tianos; Columbus was well greeted when he first arrived in the country. These Tianos were peace loving people and lived in the tropical forest. These Tianos lives in make shift homes and many families lived under the same roof. The villages were further subdivided into districts, each district had a chief, who took care if that particular district. During this time there was no slavery in the country and it was free from all other evils too. The Tianos were very good at growing crops, specially the root crops. They also dug and used it as ornaments. Columbus kept a close eye on the gold digging skills of the Tianos and thought that he had a good chance of paying his debts to the king and queen of Spain. The culture of the Tianos is not very clearly presented because nearly all the Tianos died after three decades of Columbus's visit to the country. Columbus is known the world over for his navigating skills but he failed in dominating these Tainos, inst ead of farming he made them dig in pursuit of gold. The natives died, as there were torturous condition, food was not available in plenty and the population decreased. The country also saw the invasion of the United States of America from 1916 to 1924. The dominance of the United States brought many changes, for instance during the rule many new classes of land owners emerged and the country also sa

Ethical Issues of Abortion Essay Example | Topics and Well Written Essays - 250 words

Ethical Issues of Abortion - Essay Example In Junes case, it is warranted to argue that she is selfish and minds herself than her baby. She does not consider the fact that the baby boy may be an exceptional case, and not succumb to the disease. Her egoist behaviors take the better part of her choices to abort the fetus and not letting nature take its course. Ann’s case is simply wrong, since all babies are equal despite the gender. In each case, the consequences of the abortion determine the fate of the women (Mackinnon, 2011). In both cases, the baby may be hurt or the mother may die. However, in the case June, she may end up bringing a child in very tough conditions of sickness, whilst Ann may bring up the child failure to abortion. This is a negative impact on the mother. Despite the conflict in opinions, the act is simply wrong according to utilitarianism (Mackinnon, 2011). The Kantian reasoning might differ in evaluating each woman’s decision since the fetus is considered one with the inability to make decisions. In this case, June’s baby may be at risk; thus, abortion may be justified on the health of the baby, whilst in Ann’s case, abortion may be justified on the grounds of the mother’s security and ability to bring up the child single

Thursday, October 17, 2019

Bussiness message Essay Example | Topics and Well Written Essays - 250 words

Bussiness message - Essay Example This message is very critical to the success of the sending supplier but the manner of its formatting and structure fails to make it comprehensible and meaningful to the recipient. The design is out of context due to its poor organization while the content is vague with a number of meaningless remarks. The sentences are randomly written with total disregard to business message rubrics and this makes the connection of ideas in the letter incomprehensible. The message ought to take this format to be relevant in the business field for which it is meant â€Å"We would like to inform you that we have received you 6 DVDs order and promises to deliver them by March 25th, 2013 as per your request. We give you 100% surety that you will be satisfied with our products and kindly mail us to this effect once you have used our products. We believe the 6 DVD’s are going to meet your desires of achieving the best from your firm’s employee appraisal project, recruitment criteria, and subsequent improved performance.Take note that each DVD has slide show Tips and techniques that will make it easy when training the employees.Each DVD is accompanied by a booklet that will assist the trainers in maximizing the value of the procurement and achieve the goals of your organization.These booklets contain participants materials that can freely be copied for in-house seminars and workshops Enclosed with this order is our catalog of the latest training DVDs materials offer which are user-friendly and have a warranty of 30 days.

Reflection of Slingshot Essay Example | Topics and Well Written Essays - 750 words - 3

Reflection of Slingshot - Essay Example All the elements to make faster cars were present including the know how to build one. It all begun in Southern California in the 1940s coming from depression with children coming out of age. In addition, United States just came from war where most of its youngsters came from the military who received education from the military on how to create hot rods. Through this education from the military, they were able to incorporate better techniques to make faster cars such as hot rods which eventually evolve to drag race cars. And of course given with a strong economy and know how about motors (cars were invented in the United States) these youths with plenty of energy, spare cash and ingenuity created fast cars which were known as slingshots. Of course, it was first built to be crude just like the Ford’s T-Model and others resembles a sedan only that they ran faster. The races were first done in the street (and therefore illegal) until it evolved to an activity in the 1950s. It further evolved where regulatory bodies were established as well the support of big companies that made the sport not only a successful spectator sport but also a successful commercial sport. The evolution of drag racing to become a spectator sport can be likened to any other endeavor be it in sport, organization or companies. It started as a hobby or a recreation and engaged by few enthusiasts. Over time and with energy and support, it eventually grew and embraced by everybody to become a successful sport. Reflecting on this development gives one an idea that anything really is possible given the talent, inclination, energy and resources. As a student, it inspires us that given the know-how, drive and resources, we can also achieve the same feat albeit at a lesser extent. The knowledge learned by those who started the sport came from the military in the same manner

Wednesday, October 16, 2019

Bussiness message Essay Example | Topics and Well Written Essays - 250 words

Bussiness message - Essay Example This message is very critical to the success of the sending supplier but the manner of its formatting and structure fails to make it comprehensible and meaningful to the recipient. The design is out of context due to its poor organization while the content is vague with a number of meaningless remarks. The sentences are randomly written with total disregard to business message rubrics and this makes the connection of ideas in the letter incomprehensible. The message ought to take this format to be relevant in the business field for which it is meant â€Å"We would like to inform you that we have received you 6 DVDs order and promises to deliver them by March 25th, 2013 as per your request. We give you 100% surety that you will be satisfied with our products and kindly mail us to this effect once you have used our products. We believe the 6 DVD’s are going to meet your desires of achieving the best from your firm’s employee appraisal project, recruitment criteria, and subsequent improved performance.Take note that each DVD has slide show Tips and techniques that will make it easy when training the employees.Each DVD is accompanied by a booklet that will assist the trainers in maximizing the value of the procurement and achieve the goals of your organization.These booklets contain participants materials that can freely be copied for in-house seminars and workshops Enclosed with this order is our catalog of the latest training DVDs materials offer which are user-friendly and have a warranty of 30 days.

Tuesday, October 15, 2019

Network effect Essay Example for Free

Network effect Essay Network effect is seen as a phenomenon where a network service (SNS or PNS) becomes more valuable as the number of users increase. This phenomenon encourages continually increasing membership within the network. This can happen when a user adopts a network service initially to connect with current users, or later, when â€Å"everyone† is using the network service. Although there may be a larger increase in new membership for SNS’s, it is stated throughout the LinkedIn case that new membership for PNS’s is likely to be more valuable to users because of the nature of the connection. Many people will not want to change PNS’s because they will lose their multiple connections already created (Yoffie et al. , 2009). The case examines the likelihood of SNS’s overlapping and taking over PNS’s. This outcome seems unlikely. By examining Exhibit 6 (Yoffie et al. , 2009, p. 16), the correlation among factors such as age, income, college education, and position within an organization sets LinkedIn squarely within its target market. Also, Yoffie et al. indicates the distinct uses of professional and social apps on Facebook. The multitude of users who use social apps vs. lower use of professional apps shows that Facebook users are less likely to make their profiles into professional networking tools, leaving PNS’s like LinkedIn for leveraging their professional careers (Author, p. 14). Question #2 Emerging companies need to generate new dynamics that are modernized, innovative, and easily adaptive to survive in this world. The new dynamics should be economically viable for the industry because they affect issues of whether to pursue a build or a buy approach to expand globally. LinkedIn Corporation, a PNS, is used by professionals globally to interact professionally. Uses include recruiting, getting expert advice, group collaboration, and more. Differentiating strategies were adopted by LinkedIn in order to separate itself from competition and answer the uestion of whether to utilize a build or buy approach. A build approach involves both monetary and other resource investments from the company. For LinkedIn, Investments in certain professional apps such as conference calendar, a tool used to indicate when certain conferences will be coming up, and which of a user’s connections will be attending, are examples of utilizing the build approach. The buying approach is where the company buys/merges with an existing SNS/PNS and integrates it within the existing systems. Although this expands a company, it constrains the ability of a company to customize the existing network with its own. Therefore, a company amp; its procedures need to adapt to the technology it buys. If they use a build approach, the company can build to their own specifications differentiating itself from existing networks (No Quote, Does not answer question). Question #3 LinkedIn’s strategy is straight to the point, be the best in the market of professional networking services (PNS). By focusing on providing a â€Å"virtual platform for professional interaction† (Yoffie et al. , 2009, p. 2), LinkedIn would provide various productive services to its users. Services provided include professional search, reference checking, recruiting, advice search, job searching amp; posting, and workgroup collaboration, which were successful because they allowed their users to become more effective in their professional careers. Also, its success was accounted for being involved with countless industries, rather than focusing on a specific industry like other PNS providers. Within its strategy, LinkedIn encompassed three premises which attributed to LinkedIn being the best in PNS, â€Å"remain a strongly differentiated category from SNS,† â€Å"maintain a hold on professional users for reasons both positive and negative,† and â€Å" embrace establishments rather than fight them† (Yoffie et al. , 2009, p. 3). LinkedIn’s success strongly accounts for maintaining a quality PNS by providing a productive atmosphere, which involves being separated from SNS. It is important for LinkedIn to remain separate from SNS capabilities in order to maintain its high PNS quality and core values. The risk of inheriting this strategy’s premise involves losing the users that want a network that hosts both professional and social networking capabilities. LinkedIn could potentially lose users to SNS businesses, like Facebook, who are starting to provide PNS services in its SNS atmosphere. In the second premise for its strategy, holding its users for positive and negative reasons also brings both success and risk. The positivity hold, having users create positive professional identity, is a success because it is a competitive advantage over SNS providers who only provide social identity or cannot separate the two. But holding onto its users for negative reasons promotes the similar risk as mentioned in the first premise. When users think to switch from LinkedIn to a SNS that provides both SNS and PNS capabilities, LinkedIn banks on the fact that they believe users would not put losing its contacts in jeopardy. This negative hold on LinkedIn users is a risk because it is quite possible that sooner or later SNS companies that promote both PNS and SNS capabilities will also have relatively the same contacts as LinkedIn. It is risky to assume that LinkedIn can keep users based on the premise of this assumption. Lastly, the third premise for its strategy brings on success. Having companies embrace the concept of LinkedIn in the end creates more users. LinkedIn is designed so that professionals will be more productive and more effective in their careers. If LinkedIn does eventually provide SNS qualities in its service, this could pose as a risk. Companies might not want to promote a network that could waste work time with their employees playing games and spending time on personal social interaction on the network. Therefore, companies would end up fighting LinkedIn. LinkedIn has always incorporated a control over its network as part of its strategy. Keeping out non-professional information and photos helps keep the quality of its PNS professional and on top. It also embeds value propositions for its professional users as well as its corporate users which revolve around a simple user interface. Although this is what maintains its quality’s success, it also brings a risk by shying away companies who do not want to be part of a network that they cannot control. Lastly, LinkedIn is successful because of its strategy of how to obtain its revenues. Its five sources of revenue include advertising, subscriptions, job postings, corporate solutions, and primary research that evenly contribute to its earnings. If one of the sources does not do as well as expected, LinkedIn has the other four methods to rely on. Question #4 Companies implement strategies to achieve a target or reach a goal that may e becoming the market leader of the industry, increasing profits by a certain percent, or even attracting new members to use a professional network service. As mentioned in the second week of classes, a company may choose one of the four Porter’s generic strategies that include differentiation, overall cost leadership, focus differentiation, and focus low cost to achieve competitive advantage (Kumar, 2010, p. 24). LinkedIn’s strategy is a focus differentiation since it was first founded, and its strategy has helped the company to become a leader in the PNS market. The differentiation strategy involves constant innovation and providing users with what they need and want in a new or better manner than what competitors can provide. Therefore, LinkedIn and many companies in other industries may ward off its competitors through innovation, quality, and reputation although overlapping products may be present. While Facebook may present threats to LinkedIn with the intent to blur the distinction between SNSs and PNSs, LinkedIn would still maintain a competitive advantage in the PNSs. LinkedIn has always focused on differentiating itself in the PNSs by providing users a different degree of privacy, standards, and quality tools to â€Å"†¦find job candidates for position in their company, to reach out to experts around the world in order to get advice and  make better decisions† (Yoffie et al. , 2009, p. 4). LinkedIn differentiates from Facebook and other SNSs not only on the type of service that is provided, but also on the value it adds to the professional identity of each user, and the reputation it maintains. SNSs such as Facebook and MySpace may be very popular and well known around the world for the types of applications available, the connectivity advantages, and the numbers of users within the network. However, the SNSs have presented privacy issues as well as reputation issues. As mentioned in class by Professor Kumar and Mehdizadeh (2010) in her article, SNSs provide a self-presentation characteristic of low self-esteem and high narcissism users. Alternately, LinkedIn targets a long-term goal in the attempt to create a different type of environment, a â€Å"professional ecosystem† with the addition of applications and modules to help users increase efficiency in their work and portray the professional self. The existence or emergence of other PNSs would increase competition for LinkedIn; however, LinkedIn already has a well-established professional networks composed of top executives, CEOs/CFOs, and other important professionals that attract individuals who seek advice or just the possibility to connecting professionally. LinkedIn’s users may have difficulty and a cost to switch networks, but they also find value in the services available. The continuous promotion of the benefits that can be obtained and the innovation of new modules such as LinkedIn news and customizable settings will help the company ward off competitors. Question #5 Question # 5a The distinction between social and professional is clear. This distinction likens LinkedIn to the Wall Street Journal â„ ¢, and SNS’s to publications like Peopleâ„ ¢, indicating that creating a more social aspect to LinkedIn will depart from the needs and wants of their target market. The expansion by Facebook into an open platform allowed third parties to develop social apps and created a â€Å"viral [spread]† across the network. Hoffman (Yoffie et al. , 2009, p. 7) stated that he wanted to prevent this within the LinkedIn network, instead insisting on stringent protocols and reviews of all new apps, so as to provide professionals with â€Å". . . the right sort of tools to interact with their network. † Maintaining a walled garden, as opposed to an open platform, is critical to continuing LinkedIns success. Like stated before, its strategy is based around being the best PNS in the industry. Users flock to this website because of how LinkedIn keeps the network professional, promotes productivity, and enables users to advance their careers success. Keeping this prestige will conserve LinkedIn’s quality and continue to attract its target market, professional users. Question # 5b LinkedIn should not broaden the scope to include elements of social networking. LinkedIn began and still operates since 2003 as a PNS. This strategy has allowed it to flourish, generating a customer base of 75 million users spreading around 200 countries, which includes professionals from all fortune 500 companies (Yoffie et al. 2009). This growth can be attributed to its departure from obtaining the majority of its revenues from advertising, like SNS’s, and creating a focused concept that does not necessarily remove innovation within the network, but instead indicates a policy of professionalism throughout with the controlled inception of professional applications. Different from SNS, of which the majority of revenue is from advertising, LinkedIn has framed its revenue model on five sources: (1) Advertising, (2) Subscriptions, (3) Job Postings, (4) Corporate Solutions, and (5) Primary Research. Steve Sordello, CFO for LinkedIn, stated â€Å"This model gives us a lot of sustainability, even if one of those revenue streams doesn’t succeed as we expect, we have others† (Yoffie et al. , 2009, p. 6). In order to sustain a competitive advantage, in 2007, LinkedIn change a policy to accommodate users who wished to upload a single professional head shot for identification. In 2008, LinkedIn launched a product called Company Groups that brought all LinkedIn users who worked for an organization into a closed forum which provides a collected, protected space for employees to talk to each other, as a part of application program interfaces (API). Other launches included Conference Calendar, as stated above (Yoffie et al. , 2009). Question # 5c LinkedIn has created a successful user base in foreign countries. This growth is attributed to LinkedIn’s concept of build not buy, using an organic growth model, giving it a competitive advantage over its main foreign rival Xing. This advantage is through LinkedIn’s ability to control segments of its business outside the U. S. , separate from Xing who buys outside networks limiting its control, in addition to Nye’s observation that â€Å"being in English first† is an advantage.

Monday, October 14, 2019

The Positives And Negatives Of Pay For Performance Nursing Essay

The Positives And Negatives Of Pay For Performance Nursing Essay The purpose of this research essay will discuss aspects concerning the effects of pay-for-performance policies on quality improvement. The pay-for-performance policies are continually a debated issue concerning quality of care. This incentive program could open doors in a positive or negative way, but P4P, may lead to results of improving the quality of care; which the research in this essay will assess and analyse these perspectives. Also, reflect on pay-for-performance programs; will be a crucial aspect in the paper. Furthermore, the results that would show the successfulness of these programs, as well. In additional, do the P4P programs meet their goals and how effective they are will be share in the research essay. Other components, that will be mention such as the impact on quality improvement, unintended or negative consequences, and implications for cost containment. Introduction The purpose of this research essay is to discuss aspects of pay for performance from a positive and negative perspective. As the health sector, continue to move toward a positive path, in efforts to improve the quality of care. This quality issue has and will continue to affect many Americans patients nationwide in a positive or negative way, based on, the quality care they are receiving. Therefore, health care providers and managed care organizations (MCO) are encouraged by the monetary incentive programs, in order to give prestige quality of care (Anderson, Rice, Komininski, 2007; Laureate Education, 2009). The strong components of payment policies, such as pay-for-performance (P4P) are aspects of health care services and the influence of patients choice; in which led to quality initiatives (Hillman, 1991). In addition, the factors will help to assess the need of care for patients, and the health organization, which is a positive reinforcement of quality initiatives. For instances, an intention of the incentives program like (P4P) would reward high-quality of care and permit growth in the way of becoming more efficient and effective; when servicing clients with their care needs (Teitelbaum Wilensky, 2007). Also, this quality initiative will help providers to figure out what they need to do; in order to continue to improve quality care procedures on a proficient level. The next step in the pay-for-performance (P4P) policy will permit health organizations JCI (2010) to benefit in aspects of financial incentives; through organizational principles. Therefore, the organizational leaders would produce documents to offer a reliable outline to carry out these accountabilities. For instances, health care organizational leaders must examine the national and worldwide norms that consist of human-beings right, quality initiatives, and professional principles when forming the framework. This pay for performance quality initiatives of services for patients, could JCI (2010) examine access, convey, patient-centred, discharge regulations; correctly bill for services; and help in resolution of conflicts, which financial incentives and payments measures maybe negotiation in patient services (JCI, 2010). Pay-for- performance programs quality initiatives were organized by governmental; Young, Conrad, and Fallot (2007) also the private ownerships and organizations, in which support the aspects of quality performances. Author suggests there are over 100 incentive programs; that focus on quality initiatives and preventive care for consumers (Young, Conrad, Fallot, 2007). Research suggests; the centres for Medicare and Medicaid services (CMS) are one of organizations that started the pay-for- performance programs (Anderson, Rice, Kominski; Teitelbaum Wilensky, 2007). Author suggests there is a lot of evidence, which implies the pay-for-performance incentive program has improved the overall quality of care initiative (Kuhmerker Hartman, 2007). Also, there is evidence that Jarlier and Charvet-Protat (2000) pay- for-performance quality initiatives, are profitable and can save in the long term for all health care services. Nevertheless, there will always be various negatives issues of barriers that hinder the quality care Datz, (2012); Galvin (2006) progress and growth of stronger incentives for quality advantage. The approach of the pay-for-performance has features that involve the amount of the incentive payment that result into, additional incentives such as of education, patient satisfaction, organizational information technology abilities, health providers level of performance, and diagnostics sources (Young, Conrad, Fallot, 2007). Furthermore, special interest groups seemed to be a particular alarm about the barriers that relates to the less effective method of (P4P) incentive programs, which have to do with the lack of those who do not invest in the continue quality initiatives for the delivery of health care (Young, Conrad Fallot, 2007; Dudley Rosenthal, 2006). Pay-for-performance impacts vary stakeholders, which involves all parties such as, health organizations, government, payers, medical providers, public, and private sectors, so the investment in the aspects of quality initiatives is crucial to the care process. Research suggests some payment incentives programs like (P4P) purpose is for cost containment (IOM, 2001). Also, the negative aspect of the pay-for-performance; there is no clear intention concerning making sure quality care initiatives, or improvement plan, in which relates to this program. Also, there should be some initiatives developed, such as perspectives and goals, in order to improve the aspects of the incentive payment of the health care services; which to provide IOM (2001) higher quality care and to focus on cost containment (IOM, 2001). In summary The positive aspect of health care delivery service can certainly be more effective through the pay-for-performance incentive programs. Nevertheless, the effectiveness of sustainability through this incentives program it has to be a constant arrangement, in which rewards quality of care effectiveness. In addition, all parties involved must be willing to help improve quality policies and make this initiative one of the focal points for the (P4P) programs. These arrangements could consist of fair adequate payment for excellence managerial services and that applies to the care process; which relates to financial incentives. Furthermore, to make sure that (P4P) programs meets its attended goals is to have other primary sources for recognizing and assessments for the performance initiatives, such as the Joint Commission, National Committee for quality assurance, and other agencies (Dudley and Rosenthal, 2006). A priority focus is to motivate and promote standards and firmed bylaws, in ord er to continuous to improve and maintain the quality of care initiatives through aspects of accreditation and licensure, in which would be a great addition to the perspective of the (P4P). Sources Andersen, R. M., Rice, T. H., Kominski, G. F. (2007). Changing the U.S. health care system: Key issues in health services policy and management (3rd ed.). San Francisco, CA: Jossey-Bass. Classen, D. C., Pestotnik, S. L., Evans, R., Lloyd, J, F., Burke, J. P. (1997). Adverse Drug Events in Hospitalized Patients: Excess Length of Stay, Extra Costs, and Attributable Mortality. JAMA. 277(4), 301-306. Clemmer, T. P., Vicki, J. S., Thomas, A. O., Susan, D. H. (1999). Results of a Collaborative Quality Improvement Program on Outcomes and Costs in a Tertiary Critical Care Unit. Crit. Care Med, 27(9):1768-74. Conrad, D., Wickizer, T., Maynard, C., Klastorin, T., Lessler, D., Ross, A., Soderstrom, N., Sullivan, S., Alexander, J., Travis, K. (1996). Managing Care, Incentives and Information: An Exploratory Look Inside the Black Box of Hospital Efficiency. Health Services Research, 31(3), 235-59. Datz, T. (2012). No improvement in patient outcomes seen in hospitals with pay-for-performance programs. Health Insurance Law Weekly. Retrieved from: http://www.hsph.harvard.edu/news/press-releases/2012-releases/pay-for-performance-patient-outcomes.html Dudley, R. A. Rosenthal, M. B. (2006). Pay for Performance: A decision guide for purchasers. Rockville, MD: Agency for Healthcare Research and Quality. Retrieved from: http://www.ahrq.gov/qual/p4pguide.pdf Galvin, R. (2006). Pay-for-performance: Too much of a good thing? A conversation with Martin Roland. Health Affairs, 25, w412 w419. Hillman, A. L. (1991). Managing the Physician: Rules Versus Incentives. Health Affairs 10(4):138-46. Jarlier, A., Charvet-Protat, S. (2000). Can Improving Quality Decrease Hospital Costs? International Journal for Quality in Health Care, 12(2), 125-31. Joint Commission International, Inc. (2010). Joint Commission International Accreditation Standards for Hospitals. (4th ed.). Illinois, Chicago: Joint Commission International. Kuhmerker, K. Hartman, T. (2007). Pay-for-performance in state Medicaid programs: A survey of state directors and programs. The Commonwealth Fund. Retrieved October 24, 2012 from: http://www.commonwealthfund.org/Publications/Fund-Reports/2007/Apr/Pay-for-Performance-in-State-Medicaid-ProgramsA-Survey-of-State-Medicaid-Directors-and-Programs.aspx Laureate Education, Inc. (Executive Producer). (2009).  Health  Policy.  Access Challenges Baltimore, MD:  Author:  Ã‚  (Dr. Gerald Kominski and Jim Lott). Institute of Medicine. (2001). Crossing the Quality Chasm: A New Health System for the 21st Century. National Academy of Sciences. Young, G.J., Conrad, D.A., Fallat, A. (2007). Practical issues in the design and implementation of pay-for-quality programs. Journal of Healthcare Management, 52(1), 10-19.

Sunday, October 13, 2019

A Study of the Healing Process from Slavery and Racism Essay -- Racial

â€Å"A battle lost or won is easily described, understood, and appreciated, but the moral growth of a great nation requires reflection, as well as observation, to appreciate it.†-Frederick Douglass When you think of slavery, you may want to consider the effects of an earthquake because that’s how powerful it was. Like many earthquakes, slavery produced various damaging ramifications to everything around it. This included devastation to family structures and in worst cases the loss of human life; and without doubt slavery claimed the lives of many just as Harriet Jacobs expressed â€Å"I once saw a slave girl dying after the birth of a child nearly white. In her agony she cried out, â€Å"O Lord, come and take me!† Her mistress stood by, and mocked at her like an incarnate friend (Jacobs 20).†The energy released from slavery is interminable and will always live on throughout African-Americans. Although, being practiced years before, slavery became well prominent in America in the 18th century. African-Americans were beaten, starved, and deprived of their rights. It was common for them to live in dreadful conditions, and work in unjust circumstances. Along w ith being raped day by day, certainly not least, they were bereaved of their freedom. They were handled as assets and dismantled from society, as well as their relatives. And if this was not alarming sufficiently, when slavery was legitimately abolished â€Å"White America† found another way to control African-Americans, through Jim Crow laws. Jim Crow laws immediately became the modernized slavery institution. Further creating a barrier between opportunities and Blacks, for they were seen as intellectually and culturally inferior to mainstream America. African-Americans needed to heal from ongo... ...all. However, society’s dividing beliefs soon began to influence all that was to become of them. Their struggles became their motivations in life, especially as they took on a new world and found what was beyond plantations and hard work. Why was slavery and racism so powerful? They were no longer just units of language, they had obtained meaning. â€Å"White America† had become aroused and attached its emotional and physical sensations to the controlling of African-Americans. They had merely separated their feelings from life. And even so, they used fear as a shield to protect their sentiments. However accordingly, through African-Americans past, present, and growing future, a wound can never be fully healed, for you will always carry it for the rest of your life. But, through mental, spiritual, physical, and emotional practices it is easier to succumb to the pain. A Study of the Healing Process from Slavery and Racism Essay -- Racial â€Å"A battle lost or won is easily described, understood, and appreciated, but the moral growth of a great nation requires reflection, as well as observation, to appreciate it.†-Frederick Douglass When you think of slavery, you may want to consider the effects of an earthquake because that’s how powerful it was. Like many earthquakes, slavery produced various damaging ramifications to everything around it. This included devastation to family structures and in worst cases the loss of human life; and without doubt slavery claimed the lives of many just as Harriet Jacobs expressed â€Å"I once saw a slave girl dying after the birth of a child nearly white. In her agony she cried out, â€Å"O Lord, come and take me!† Her mistress stood by, and mocked at her like an incarnate friend (Jacobs 20).†The energy released from slavery is interminable and will always live on throughout African-Americans. Although, being practiced years before, slavery became well prominent in America in the 18th century. African-Americans were beaten, starved, and deprived of their rights. It was common for them to live in dreadful conditions, and work in unjust circumstances. Along w ith being raped day by day, certainly not least, they were bereaved of their freedom. They were handled as assets and dismantled from society, as well as their relatives. And if this was not alarming sufficiently, when slavery was legitimately abolished â€Å"White America† found another way to control African-Americans, through Jim Crow laws. Jim Crow laws immediately became the modernized slavery institution. Further creating a barrier between opportunities and Blacks, for they were seen as intellectually and culturally inferior to mainstream America. African-Americans needed to heal from ongo... ...all. However, society’s dividing beliefs soon began to influence all that was to become of them. Their struggles became their motivations in life, especially as they took on a new world and found what was beyond plantations and hard work. Why was slavery and racism so powerful? They were no longer just units of language, they had obtained meaning. â€Å"White America† had become aroused and attached its emotional and physical sensations to the controlling of African-Americans. They had merely separated their feelings from life. And even so, they used fear as a shield to protect their sentiments. However accordingly, through African-Americans past, present, and growing future, a wound can never be fully healed, for you will always carry it for the rest of your life. But, through mental, spiritual, physical, and emotional practices it is easier to succumb to the pain.

Saturday, October 12, 2019

THE EVOLUTION OF CARIBBEAN SOCIAL POLICY Essay -- essays research pape

THE EVOLUTION OF CARIBBEAN SOCIAL POLICY: Reasons for the Changes and Shifts in the Social Policy Agenda From the 1940’s to the Present Period. Social Policy may be broadly defined as a system of social welfare that includes economic as well as non-economic objectives and involves some measure of progressive redistribution in command over resources1. Using Mishra’s typology of social welfare models (see Fig. 1 below), this paper describes the evolution of social policy in the English-speaking Caribbean. Drawing primarily from the experiences of Trinidad and Tobago and Jamaica, four chronological periods are used to highlight the factors contributing to the major developments in social policy: 1) the Immediate Post-War Period and the Moyne Commission (1940 to 1950); 2) Transition to Self-Government (1950 to 1961); 3) Ideology and the Immediate Post-Independence Period (1962 to 1973); 4) the Oil Crisis, World Recession and Structural Adjustment (1970 to 1980’s); 5) (Conclusion) The Present Period (1990 to present)2. A review of the literature revealed that a combination of social, economic, political/ideological and international factors contributed to policy development at each stage of this evolutionary process. This paper argues that as a result of these factors, Caribbean social policy gradually moved from a strong residual approach prior to the Moyne report, and tended to a more institutional approach during the transition period to full internal self-government, then to a more structural approach in the immediate post-independence period, and back to a residual approach when structural adjustment policies were instituted in the 1980’s. Of course, in reality the policies formulated in the various periods do not conform perfectly to Mishra’s types. However, this does not detract from the applicability of the model to the present analysis, as it is an inherent feature of all ideal types (as is implied by the descriptor â€Å"ideal†). Also, while the general factors contributing to the evolution of Caribbean social policy has been highlighted, the specific ways in whi ch these factors manifested in each country are extensively discussed. Fig. 1 Mishra’s Welfare Models1 Main Features Type of Welfare Residual Institutional Structural State responsibility in meeting needs (ideology of state intervention) Minimal Optimal... ... Henry, Ralph and Moesire, Alicia. â€Å"Poverty Alleviation and Reduction Programmes: the Commonwealth Caribbean Experience† in Poverty, Empowerment and Social Development in the Caibbean. Ed, Norman Girvan. Mona: Canoe Press UWI, 1997, 101 – 136. Mac Pherson, Stewart. Social Policy in the Third World: The Social Dilemmas of Underdevelopment. UK: Wheatsheaf Books Ltd. 1982. Neil, Joan. Targeting and Poverty: New Trends in Social Policy – Social Projects for Alleviation in the Republic of Trinidad and Tobago. UNECLAC, 1992. Robothom, Don. Social and Economic Policy: Starting Gates and End-States, UWI, 1995. Sinha, D.P. â€Å"Health Care of The Population† in Children of the Caribbean. CFNI/PAHO, 198 8. 123-144. Stone, Carl. â€Å"Power Policy and Politics in Independent Jamaica† in Jamaican in Independence: Essays on the Early Years. Ed, Rex Nettleford. Kingston: Heinemann Caribbean, 1989, 19-53. Thomas, Clive, Y. â€Å"The interrelationship between economic and social development† in Poverty, Empowerment and Social Development in the Caribbean. Ed, Norman Girvan. Mona: Canoe Press UWI, 1997, 20-49. Titmuss, R. Social Policy: An Introduction.

Friday, October 11, 2019

Enders Game Essay

Human beings are free except when humanity needs them. Maybe humanity needs you. To do something. Maybe humanity needs me—to find out what you’re good for. We might both do despicable things, Ender, but if humankind survives, then we were good tools.† Graff is explaining to Ender the philosophy behind everything they are doing. Although Ender does not know it at the time, this is the same reasoning that the adults will use to manipulate the children time and time again. Ender objects to this idea, because he believes that people are more than just tools, but nevertheless it is the pervading ideology of the I.F. throughout the book. This philosophy justifies doing terrible things in the name of humanity, and it also means that individuals will have to make awful sacrifices for their species. â€Å"In the moment when I truly understand my enemy, understand him well enough to defeat him, then in that very moment I also love him. I think it’s impossible to really understand somebody, what they want, what they believe, and not love them the way they love themselves.† Ender is telling Valentine why he hates himself. He is able to understand his enemies better than anyone else, but once he understands them he destroys them. With such tremendous empathy, even in coming to understand his worst enemies Ender loves them. This means that when he crushes them he is hurting himself in the process. Ender does not want to have enemies, so that he will not be forced to hurt anybody. He will love even those who seem to be his most bitter enemies when he properly understands them. But in the situations Ender has been in he has no choice other than destroying those enemies. At the end of the book, when Ender comes to truly understand the buggers, he is able to try to help them. He has already done them great harm, but now he can be happy because he has a chance to undo what he did to them. â€Å"So the whole war is because we can’t talk to each other.† â€Å"If the other fellow can’t tell you his story, you can never be sure he isn’t trying to kill you.† â€Å"What if we just left them alone?† â€Å"Ender, we didn’t go to them first, they came to us. If they were going to leave us alone, they could have done it a hundred years ago, before the First Invasion.† â€Å"Maybe they didn’t know we were intelligent life. Maybe—† This conversation occurs when Graff tells Ender his theory of why they are at war with the buggers. Graff tells Ender that since the buggers communicate through thought, they probably cannot understand that humans are thinking beings. Ender therefore wants to know why this cannot be remedied.

Thursday, October 10, 2019

Test Bank Ch1

Test Bank—Chapter One (Data Representation) Multiple Choice Questions 1. Which of the following Boolean operations produces the output 1 for the fewest number of input patterns? A. ANDB. ORC. XOR ANSWER: A 2. Which of the following best describes the NOR operation? A. An XOR followed by a NOTB. An OR followed by a NOT C. A NOT followed by a NOTC. An AND followed by a NOT ANSWER: B 3. Which of the following bit patterns cannot be expressed in hexadecimal notation? A. 11111111B. 1001C. 110011D. 100000000001 ANSWER: C 4. Which of the following is the binary representation of 4 5/8? A. 100. 11B. 10. 11C. 110. 101D. 100. 101 ANSWER: D 5. Which of the following bit patterns represents the value 5 in two’s complement notation? A. 00011010B. 11111011C. 00000101D. 11111011 ANSWER: C 6. Which of the following bit patterns represents the value -5 in two’s complement notation? A. 00011010 B. 11111011C. 00000101 D. 11111011 ANSWER: D 7. In which of the following addition prob lems (using two’s complement notation) does an overflow error occur? A. 0011 B. 0100 C. 1100 + 1010 + 0100 + 1100 ANSWER: B 8. Which of the following representations in two’s complement notation represents the largest value?A. 00000010B. 11111111C. 00000001D. 11111110 ANSWER: A 9. Which of the following bit patterns (represented in hexadecimal notation) represents a negative number in two’s complement notation? A. 7FB. 55C. A6D. 08 ANSWER: C 10. What value is represented by the bit pattern 01011100 when interpreted using floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa? A. -1 1/2 B. 1 1/2C. -3/8 D. 3/8 ANSWER: B 11.Which of the following values cannot be stored accurately using a floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and th e last four bits represent the mantissa? A. 2 1/2B. 3/16C. 7D. 6 1/4 ANSWER: D 121. Which of the following bit-patterns represents the smallest value using the floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa? A. 01001000B. 1011000C. 00101000D. 01111000 ANSWER: C 13. Which of the following data storage systems provides the most efficient random access to individual data items? A. Main memoryB. Magnetic diskC. Optical CDs and DVDs ANSWER: A 14. Which of the following storage systems is best suited for storing and retrieving long strings of data that are processed in their sequential order? A. Main memoryB. Magnetic diskC. Optical CDs and DVDs ANSWER: C 15. Which of the following mass storage system does not require physical motion? A. Magnetic tapeB. Magnetic diskC. DVDsD. Flash drives ANSWER: D 16.Assuming that each of the following bit patterns originally had even parity, which one contains an error? A. 10110100B. 11000011C. 00011000 D. 10001001 ANSWER: D 17. How many errors per pattern could be corrected when using an error-correcting code in which any two code patterns differ by a Hamming distance of 8? A. 3B. 4C. 5D. 6 ANSWER: A 18. Which of the following is a possible LZW compression of the message â€Å"xyz xyz xyz†? A. 1234B. 1234545C. 232D. 12 ANSWER: B 19. How many different symbols can be encoded using Unicode? A. 256B. 4,096C. 65,536D. 1,046,476 ANSWER: C 20.Which of the following systems is least efficient when encoding numeric values? A. Two’s complement notationB. Excess notation C. ASCIID. Floating-point notation ANSWER: C 21. Which of the following is a means of encoding music? A. ASCIIB. MIDIC. JPEGD. GIF ANSWER: B Fill-in-the-blank/Short-answer Questions 1. A computer’s main memory consists of numerous memory cells, each of which contains ________ bits. Each memory cell is identified b y a numeric value called the cell’s _________. ANSWER: eight, address 2. Represent the bit pattern 1011010010011111 in hexadecimal notation. ________ ANSWER: B49F 3. A7DF is the hexadecimal representation for what bit pattern? ____________ ANSWER: 1010 0111 1101 1111 4. How many different bit patterns can be formed if each must consist of exactly 6 bits? ____________ ANSWER: 64 5. Translate each of the following binary representations into its equivalent base ten representation. A. 1100__________ B. 10. 011__________ C. 0. 01 __________ D. 10001__________ ANSWER: A. 12 B. 2 3/8 C. 1/4 D. 17 6. Rewrite each of the following values (represented in base ten notation) in binary notation. A. 7__________B. 23__________ C. 2 1/4 __________ D. 5/8__________ ANSWER: A. 111 B. 10111 C. 10. 01 D. 0. 101 7. If the patterns 101. 11 and 1. 011 represent values in binary notation, what is the binary representation of their sum? ____________ ANSWER: 111. 001 8. Using a two’s complemen t notation system in which each value is represented by a pattern of six bits, represent the value 3. ____________ ANSWER: 000011 9. Using a two’s complement notation system in which each value is represented by a pattern of six bits, represent the value -3. ____________ ANSWER: 111101 10.What is the largest positive integer that can be represented in a two’s complement system in which each value is represented by eight bits? ____________ ANSWER: 127 (represented by 01111111) 11. In a two’s complement system, what value is represented by the pattern 11111111111111001? ____________ ANSWER: -7 12. When using two’s complement notation, what bit pattern represents the negation of 01101010? ____________ ANSWER: 10010110 13. What value is represented by each of the following patterns in excess notation? A. 10000 ____ B. 0110 ____ C. 1011 ____ ANSWER: A. 0, B. -2, C. 14. Using an 8-bit floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa, write the bit pattern that represents the value 1 3/4. (Use normalized form. ) ____________ ANSWER: 01011110 15. What is the largest value that can be represented in a floating-point system in which each value is encoded by a byte whose most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa? ___________ ANSWER: 7 1/2 (represented as 01111111) 16. Which of the following addition problems cannot be solved accurately when using a floating-point system in which each value is encoded by a byte whose most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa? A. 2 1/2 + 1 3/8B. 3 1/2 + 4 1/2C. 7 + 3/4 ____________ ANSWER: A, B, and C 17. The following is an error-correcting code in which an y two patterns differ by a Hamming distance of at least three. Symbol Representation A 000000B 001111 C 010011 D 011100 E 100110 F 101001 G 110101 H 111010 Decode each of the following patterns 010011 ________101010 ________011000 ________101101 _______ ANSWER: C, H, D, F 18. How many errors in a single code pattern could be corrected when using an error-correcting code in which each code pattern is a Hamming distance of at least seven from any other code pattern? ____________ ANSWER: 3 19. The following is a message that was originally encoded so that each pattern had odd parity. Circle the patterns in which an error has definitely occurred. 0110101 11110000 10010010 00000000 11111111 00001000 00111101 ______________________________________ ANSWER: Second, fourth, fifth, and sixth 20. Data compression techniques apply various principles to reduce the size of data. One, called _______________________, avoids repeating long strings of the same data item. Another, called _____________ __________, encodes the difference between consecutive blocks of data rather than encoding each block in its entirety. Still another, called _________________________, uses short bit patterns to encode frequently occurring items and longer patterns to encode less frequent items.ANSWER: Run-length encoding, relative encoding, and frequency-dependent encoding. Vocabulary (Matching) Questions The following is a list of terms from the chapter along with descriptive phrases that can be used to produce questions (depending on the topics covered in your course) in which the students are ask to match phrases and terms. An example would be a question of the form, â€Å"In the blank next to each phrase, write the term from the following list that is best described by the phrase. † TermDescriptive Phrase bitBinary digit Boolean operationAND, OR, XOR, NOT addressA numeric value used to identify a memory cell exadecimal notationAn efficient way of representing bit patterns sectorA segment of a track in a mass storage system zoned-bit recordingA means of increasing the storage capacity of a magnetic disk system bufferA storage area used to hold data on a temporary basis, often as a step in transferring the data from one device to another ISOAn international organization for establishing standards ANSIA major standardization organization within the United States ASCIIA system developed by the American Standards Institute for encoding text. lip-flopA digital circuit capable of holding a single digit two’s complement notationA means of encoding whole numbers floating-point notationA means of encoding numeric values that may involve fractions truncationAn error that may occur when using floating-point notation pixelA small part of an image GIFA means of compressing an image file by restricting the number of colors availableJPEGA means of compressing images by blurring the boundaries between different colors while maintaining all brightness information UnicodeA mea ns of encoding text in which each symbol is represented by 16 bits LZWAn example of adaptive dictionary encoding MIDIA means of encoding music in terms of notes and instruments rather than actual audio Key fieldA part of a logical record in a file used to identify the record. VLSIA means of constructing complex circuitry in a very small space.General Format Questions 1. Describe how a computer can produce an incorrect answer when performing numerical computations even though it has not malfunctioned. ANSWER: Most students will probably refer to overflow and truncation errors. 2. Describe ho the concept of Hamming distance is used to produce an error-correcting code. ANSWER: By designing a code in which each pattern has a Hamming distance of n from any other pattern, patterns with fewer than n/2 errors can be corrected by replacing them with the code pattern that is closest. . a. What is the output of the circuit below? [pic] b. In general, how does the three-bit input pattern across the top of the diagram relate to the circuit’s output? ANSWER: a. 0 b. The output is 0 if the input parity is odd; the output is 1 if the input parity is even. 4. If the input and output bit patterns in the circuit below are interpreted as binary representations of numeric values, what operation does the circuit perform? [pic] ANSWER: The circuit subtracts one (except for the case of the input being 000). . Explain why such terms as kilobyte, megabyte, and gigabyte have acquired double meanings. ANSWER: The prefixes kilo, mega, and giga are used traditionally to refer to units measured in powers of ten. However, due to the early misuse of the prefix kilo in reference to units of the size 1024, these prefixes are now often used to refer to units that are powers of two—especially when referring to the capacity of main memories. 6. Convert the following addition problem into two’s complement notation using four bits per value), perform the addition, convert the an swer back into base ten notation, and explain the results. 6 + 3 ANSWER: In two’s complement notation the problem is to add 0110 and 0011. The sum is 1001 which translates to -7. This answer is incorrect due to overflow. 7. Under what condition is each of the following data compression techniques most effective? a. Run-length encoding b. Relative encoding ANSWER: a. Compresses most when data consists of long strings of the same entry. b.Compresses most when each block of data differs little from the previous block. 8. What is frequency-dependent encoding? ANSWER: Frequency-dependent encoding is an encoding system that uses short bit patterns to represent data items that occur most often and longer patterns to represent less frequently occurring items. The result is that entire blocks of data can be represented in less space than would be required if each data item were represented by the same size bit pattern. 9. Construct the entire two’s complement scale in which eac h value is represented by three bits.ANSWER: 3 011 2 010 1 001 0 000 -1 111 -2 110 -3 101 -4 100 10. To what does the term â€Å"normalized form† refer in the context of floating-point notation? ANSWER: Normalized form refers to a standard for positioning the bit pattern within the mantissa field. Many values can be represented in floating-point notation by different bit patterns, only one of which is in normalized form. Hence, restricting representations to normalized form assures that each value is represented by a unique pattern. 11.Explain why the final version of the dictionary need not be transmitted with a message encoded using LZW compression. ANSWER: The dictionary can be constructed during decompression in the same way it was constructed during compression. 12. Among the Boolean operations AND, OR, EXCLUSIVE OR, and NOT, which is least like the others? Explain your answer. ANSWER: There is not really a right or wrong answer. The student’s explanation is the m ost important part. Most students will probably answer NOT because it has only one input whereas the others have two. 3. If a term paper consisted 42 pages, each containing 40 lines of 100 symbols each (counting each space as a symbol), was to be encoded using Unicode, how many bytes of storage space would be required? ANSWER: 336,000 bytes (168,000 symbols times 2 bytes per symbol) 14. Explain why adding only a few characters to a text file may increase the file’s size by several hundred bytes and at other times may not increase the file’s size at all. ANSWER: File space is allocated in terms of physical records, each of which is several hundred bytes in size.Thus, the size of a file grows by physical record units rather than by byte size units. 15. In a two’s complement system, what value can be added to any other value without causing an overflow? How many values in the system have this property? Explain your answer. ANSWER: Adding the value 0 to any other va lue will not produce an overflow. However, if m is the largest positive integer that can be represented in the system, then any value in the range 1 to m will produce an overflow when added to m, and any value in the range -1 to -( m + 1) will produce an overflow when added to -( m + 1).