Monday, September 30, 2019

Integrative Case Study †Cafe Co

Edinburgh Napier University BA Hospitality and Service Management Introduction to Human Resource Management HRM08901 Assignment Submission (Part2) Integrative Case Study – Cafe Co Lecturer:Fiona Duncan Local Tutor:Pamela Poon Student Name:Yiu Chun Hei, Jonas Matriculation No. :40075274 Year and Class:BAHSM- 1B Entry:Diploma Date of Submission: 7 March 2011 Table of Contents Page No. 1. Introduction of two-day training course3 2. Overall aims and Specific learning objective4 3. Improvement after this training course5 4. Timetable of training course6 5.Training Methods in the training course10 6. Evaluation strategy of the course15 7. Conclusion of the training course17 8. Reflective statement18 9. Appendix20 10. List of References 21 Introduction of two-day training course In view of the problem of training with line managers, it is going to hold a two-days training course to conduct the new barista. Each day takes 9 hours, there are about 12-16 new barista will attend the trai ning. The training course includes the orientation of Cafe Co, Induction of customer service skills and equipment operation skills. The reason that hold the raining course is saving time for training in daily workload, assists to train the basic skills with line manager and let the new barista experience the workplace Next chapter, it will explain the overall aims and objectives of the training course. Word count: 97 Overall aims and Specific learning objective The overall aim of the training course are new barista should be able to make five different types of coffee by making a standard taste coffee with using coffee maker via the two-day training course. Upon the completion of the training course, new barista should be able to achieve five goals. Understand the rules and history of Cafe Co * Build up team spirit * Learn a standard Cafe Co’s customer service skills * Learn characteristics of five common coffee beans in Cafe Co * Correctly use coffee maker to make a standard coffee In next chapter, it will discuss functions of training course for Cafe Co. Word count: 108 Improvement after this training course First, understanding the history, mission and vision of Cafe Co can establish loyalty, explain clear direction to new barista and drive them to have same target. Also, it can boost morale and create positive atmosphere in work place.Second, after training course, new barista already had basic skills in serving customer and making coffee. There is enough training support to line manager; it can reduce the time for training new employees. Line managers just need to give time to let new employees to gain experience and share their experience. Third, some line managers are not interest in training. The training course can provide basic skills to handle daily workload and save time in training. In chapter 4, the timetable of training course will be outline. Word count: 123Timetable of training course The training course will divide to two days, first d ay will talk about Cafe Co history and policy and second day will teach the practice in daily life. It will take about nine hours per day include one hours lunch time. Training course will hold on 24th-25th in April in one of the branch. There will be a barista and a supervisor which both have three years experience working in Cafe Co responsible for trainers and speakers in the course. Beside the standard skills, they can also share their own technique with the new barista.There is a standard dress code in the course. All attendants must wear the standard Cafe Co barista suit, black trouser and shoes. Beside the suit, trouser and shoes should bring by the attendants. And here is the Time Table. Day 1 Time| Contents| Methods | Resources| Purpose| 9:00- 9:30am| Welcome and Briefing| Lecture| Computer Projector| Welcoming and show the purpose of the training course| 9:30- 10:00am| Ice-Breaking| Games| Paper Pens| Let new barista recognize each other and build up teamwork| 10:00- 11:00 pm| History of Cafe Co| Lecture| ComputerProjectorMicrophone| -Show the organization’s history -Understand the culture and background of Cafe Co| 11:00-12:30pm| Policy of Cafe Co| Lecture| Employees Handbook Microphone| -Show the value of Cafe Co-List out strategic of Cafe Co -Clear the Mission and Vision of Cafe Co| 12:30-1:30pm| Lunch| | | | 1:30- 2:30pm| Knowing working place| Familiarization Tour| Map| -Show the working place and equipment -Familiarize the working place| 2:30- 3:30pm| Employee Compensation| Lecture| Computer Projector Microphone| -Show rest day and holidays in Cafe Co-Arrange of duty meal -Show incentive and Benefits of employees| 3:30- :30pm| Safety and Health policy| Training Video, Lecture| ComputerProjector Microphone| -Mention the safety guide in working place -Explain the important of Safety and Health in Cafe Co -Typhoon and rainstorm emergencies measure -Provide methods of managing stress at work-Show accident may happen working place| 4:30-5:30pm | Rules and Discipline | Lecture| ComputerProjector Microphone| -Mention rules in attendance -Explain rules and procedures in Cafe Co-List out discipline example -introduce disciplinary action procedures| 5:30- 6:00pm| Conclusion| Discussion| Paper Pens| -Recap the main point that the new barista learn |Day 2 Time| Contents| Methods| Recourse| Purpose| 9:00- 9:15am| Briefing| Lecture| Microphone| Point out Daily goals and expectation| 9:15- 10:30am| Standard customer services| Lecture Training Video| Microphone Computer Projector| -Training standard welcome speech -Table setting training -Understand barista’s responsibility| 10:30- 12:00pm| Products in Cafe Co| Lecture Discussion| Microphone Computer Projector| -Recognize products in Cafe Co-Understand menu and facilities -know characteristic of each coffee| 12:00- 1:00pm| Lunch| | | | 1:00- 3:00pm| Make Coffee| Demonstration Lecture| Coffee MakingCoffee Bean| -Show the procedures of making coffee -Share the skills of making coffee| 3:00- 3:15pm| Break| | | | 3:15- 5:15pm| Operation in Cafe Co| Role play| Working place and equipment | -Try to be a real barista-Try to make coffee -Experience the working place -Try to serve customer| 5:15- 6:00pm| Conclusion Evaluation| Discussion| Flip board Maker pen Evaluation form| -Refresh new barista memories -Conclude the knowledge learned -Collect data from new barista| In next chapter, it will discuss the training methods and how can the training method fulfill new barista with different learning style.Word Count: 530 Training Methods in the training course In this two-day training course, it used six methods to train the new barista. They are Lecture, Demonstration, Training video, Group discussion, Role Play and Games. Training method is an important part in training program; it links to content and purpose of the training. Using a correct training method can make a better training atmosphere and enhance the effectiveness of the training. Furthermore, there is another element that affects the effectiveness, which is the learning style of the new barista.By Honey and Mumford’s learning style (1992), learner can identify to 4 types, Reflector, Activists, Theorists and Pragmatists. Each type has their advantages and strength to learn in different training methods. Reflectors are usually stood back and observe at work, thinking what they can learn. They can produce analyses and reports without pressure. Activists are tends to involved in new experiences, problems and opportunities. They like to work in team and act first without consideration. They do not like preparation or reviewing. Theorists are like to adapt and integrate observation into complex and logically.They like solving problem step by step and think in logical ways. Pragmatists are like to try things out; they applied the job with concept. They usually have fewer patients in long process. Training method, games just involved in the ice breaking process. It is costly, need to spend time and without learning some really useful in work. But it stills an important part in the training course. Games place in the starting can drive new barista to having a positive emotion and relax atmosphere to finish the entire course. Between playing games, barista can build up teamwork and increase the interaction and communication.It is suitable for all learning style because it is not related to work but the relationship. Lecture is a passive training method, it is a talk without question and answer session, new barista just need to sit down and listen to the lecturer. All information is produce by the lecturer and no interaction between lecturer and trainers. Lecture is a single way transfer method but it still chosen to use in many sections that about theory and information. It is because those things can learn by experience and observation and no need to practice or abstraction.Using lecture to teach knowledge in a long period may cause new barista feel bored and lose their attraction. So that sometime may need to combine another method to balance like group discussion or training video. This method is suitable for Theorist to learn best because they can having time to understand the theory. Training video will not using separately in training, it looks like some assistance in training method. It is suitable in explain some technique and skills that cannot show by speech or words like customer service and safe & health guide in work place.Playing training video to new barista can attract their attention and stimulate them between the lectures. Using video as training can reinforce their memory, let the text knowledge become image, make them easier to remember the image, rules and process deeper in their mind. It is a good training method for Pragmatist because they learn best if shown a model and they can copy. Demonstration is an experiential training method, it is also like training video, and it can be combined with the lecture program. It is suitable for reflectors and pragmatists to learn because both types like to observe and copy.It is place in the â€Å"Make Coffee† part; trainer will demonstrate how to make a standard coffee and new barista learn via explanation and guidance. Beside the demonstration, new barista can join the process to enhance impact of the training and trainers can explain skills and technique to new barista. Moreover, barista can ask question immediately to reduce misunderstanding of the demonstration. Role playing will use in the â€Å"Operation in Cafe Co† part, new barista need to act out their characters and simulate the daily operation in Cafe Co. t should prepare specially in some case and test new barista confront ability. The advantage of using this method is providing a face to face situation for testing; it can develop interactive skills and gives people insight into the way in which people behave and feel but it needs well prepare and enough support to run a role p lay. It is suitable for activists learning style; they are like to action and working with others in role playing. Discussion is a method that gives chances for audience to participate active learning, sharing their experience and feeling with others.Also, it can gather others’ opinions and points to provide a clear view. It provide interaction and communication time for new barista too. It will take part in â€Å"Conclusion† and â€Å"Products in Cafe Co† because this section needs times to conversation and discuss about what they learn, it can make them devote themselves in to the course. This training method is suitable for activists because they like to work with others and leading discussion. To drive this training course to success, it should also consider Kolb’s (1974) learning cycle, experience, observation, abstraction and practice.The training course’s design base on this and ensure the methods can follow these four elements, like it will hold classroom learning like lecture, discussion and videos for experience and observation. Abstraction and practice will reach by the role play in Cafe Co and demonstration of making coffee. All the training methods designed for the content of each part and it is the most suitable method to bring out a effective result after the course. In next chapter, it will discuss the evaluation of this training course. Word Count: 930 Evaluation strategy of the courseIn a fair and success evaluation, the design of the evaluation form and the atmosphere of the place are so important. A formal evaluation should hold unless twenty minutes, and the valuator should leave the evaluation place to ensure a fair evaluation. The evaluation should hold by another person that no relationship between the course. Also, the design of the form should be quantize in marks, clearly explain the rules like 1 is the best and 10 is the worst in marks. The question in the questionnaire should use close question at most, it can be easier to analyze the data and much more fair.The questionnaire should not record the evaluator’s name which can increase the truism if the evaluators are not identified. According to Kirkpatrick’s level of evaluation (1956), evaluation should be focus on 4 stages, Reaction, Learning, Behavioral and Results. Reaction and Learning are in formative level. Reaction measure the feeling about the content and method of the evaluation. Learning measure what learner learned from the course. Behavioral and Result are in the summative level. Behavioral evaluate the change of the trainers after training course and the applicant of the trainee.Result measures the effect the organization performance and productivity. Therefore, a successful evaluation should include four stages. Evaluation is not just focus on the reaction level but need to concern summative level. Beside questionnaire (appx. 1), interview, performance review and other aspects should consider to ev aluate the success of the training course. Word count: 245 Conclusion of the training course After this training course, new barista will able response the daily operation in Cafe Co, the relationship between barista should be closer and start to build up team work in workplace.Moreover, new barista should understand the policy, strategy, mission and vision of Cafe Co; they also need to understand the rules. They need to recognize their right, benefit, compensation in Cafe Co. Word Count: 63 Reflective statement After finish this assessment, I have learnt how to collect the useful information from internet and books. Before that, I usually finish my assessment with the tutorial notes and my own knowledge, because of the marks of Reference, it pushes me to borrow books and research in internet. Also, finishing this assessment can make me know more theories and knowledge in Human Resource.It makes me interest in this subject and drive me to read more books about human relationship in work place. It makes me know the psychology of employees and employers. In the working progress, the notes from the course really help me a lot. I applied it to my assignment, it clearly explain the theories with some basic words and showing the figures of some theory which can clear my mind. The thing that hindered me is the arrangement of my answer. Some question makes me confused and I don’t know how to arrange the answer’s sequence. The question cannot clearly explain what are they asking and I am confusing about what should I answer.It might affect the quality of the assignment. In briefly, I am satisfied for my submission. Because I can finish it in time and I really do it with my heart. But one thing that I can do better is the submission date. I always finish my assignment at last day of the submission. It is very danger if there are any accident in the network, I may be able to upload my assessment to the Turnitin System lately and cause my work decrease one g rade. So that, I decided I will finish and upload my work as soon as possible before the due date. Word Count: 238 Appendix Training Evaluation Form Title of course: New barista training courseDate of training: Marking standard (Disagree)12345(Agree) 1. The direction of the course is clear__ 2. It is easy to understand the content__ 3. The course is enjoyable__ 4. The course is useful__ 5. The course can make me interest in coffee__ 6. Enough support of the training course__ 7. Trainer is clearly teach the skills and technique__ Any others opinions: ______________________________________________________________________________ ____________________________________________________________________________________________________________ Thank you for your opinions List of References Armstrong, M. 2009) Armstrong’s Handbook of Human Resource Management Practice, 11th Edition, Kogan Page Bloisi, W. (2007) An Introduction to Human Resource Management, Mc Graw Hill Dessler, G. (2011 ) Human Resource Management, 12th Edition, Pearson Messmer, M. and Bogardus, A. (2007) Human Resource Management, Wiley Pathways Demonstration training method (2007) [Online] Available at: http://traininganddevelopment. naukrihub. com/methods-of-training/demonstrations. html [Accessed: 26th March, 2012] Evaluation Forms (2011) [Online] Available at: http://www. sampleforms. org/category/evaluation-forms [Accessed: 4th April, 2012]

Sunday, September 29, 2019

Bugusa Inc Worksheet

University of Phoenix Material BUGusa, Inc. , Worksheet Use the scenarios in the Bugusa, Inc. , link located on the student website to answer the following questions. Scenario: WIRETIME, Inc. , Advertisement Has WIRETIME, Inc. , committed any torts? If so, explain. Scenario: WIRETIME, Inc. (Janet)—Brenda Has WIRETIME, Inc. committed any torts? If so, explain. Janet has signed a contract with BUGusa she is committing intentional tort because she is intentionally leaving one company knowing that she has an agreement.She is intentionally leaving them to go work for the competitor so that she can get more money. She can be held liable for any harm or money loss for BUGusa because she has left the department with a signed contract. Scenario: WIRETIME, Inc. (Steve and Walter) Discuss any liability BUGusa, Inc. , may have for Walter’s actions. Scenario: BUGusa, Inc. , Plant Parking Lot—Brenda What defenses may be available to BUGusa, Inc.? Explain your answer.In any par king lot or company if there is a crime committed on the duty most of the time the employer is liable for what happens to the employee on company time. Since the lights were out on the dock and there was no one there to help the delivery person. I think that BUGusa is liable for the mishap. The company needs to make sure that there are enough lights to keep everything lit and visible. They are strict liability because they are held liable for an act regardless of intent or willfulness and plus this is an abnormal dangerous activity.BUGusa should have signs up to say that they are not responsible for any unsupervised or stolen property on the premises if they do not want to get held responsible for what happens. Scenario: BUGusa, Inc. (Randy and Brian) What defenses may be available to BUGusa, Inc.? Explain your answer. Scenario: BUGusa, Inc. (Sally) Sally may have a successful case against BUGusa, Inc. , for what torts? Explain your answer.

Saturday, September 28, 2019

Asian American Literature Essay

The stereotype created of Japanese men as military foes combined nationalism with racism. Since their physique has always been considered small, the danger from the Japanese was perceived to come from the Japanese Superman, possessed of uncanny discipline and fighting skills. Films, often punctuated with racial slurs, were quick to paint Japan’s treachery in battle, its brutality, and disregard for international rules of war. These stereotypic images carried over to Japanese-American men outside the context of the war. Pearl Harbor and the war years enabled Hollywood to revive the yellow peril characteristics and the fear of miscegenation. By the end of the war, Americans had learned to associate brutality and treachery with a Japanese face. Caricatures of the Japanese were found in the cartoons of the period. Warner Brothers, Looney Tunes, created a duck version of â€Å"The Jap† who had glasses, buckteeth and cries â€Å"oh sorry, sorry, sorry† (with slurred r’s). They also created â€Å"Tokyo Jokio† and â€Å"Bugs Bunny Nips the Nips. † The buck-toothed Japanese became a standard cartoon figure. Max Fleischer created a Popeye the Sailor cartoon entitled â€Å"You’re A Sap, Mr. Jap†, which is a song Popeye sings over and over. This cartoon showed the Japanese deceiving Popeye, causing him to cry out righteously: â€Å"Double-Crossing Japanese† The portrayal of women during this period fared no better. The common stereotype was the â€Å"Dragon Lady,† â€Å"Geisha Girl,† and â€Å"Tokyo Rose,† who had a penchant for White men, dressed in tight dresses, and bodies on display. They are sly, cruel, exotic sex objects, or subservient and hardworking. Shirley Geok-Lin Lim, in â€Å"Feminist and Ethnic Literary Theories in Asian American Literature† comments on how â€Å"the image of Japanese-American women usually remains on the margin, invisible, mute or constrained to limited stereotypic images of passion. † The media played on these stereotypes to sell misleading images to audiences, who wanted entertainment that was different from their normal lives and were willing to see and accept anything exotic. The stereotypes of Japanese and Japanese-American women were pervasive in the media because the media perpetuated these stereotypes through their portrayal of Japanese and Japanese-Americans. Unfortunately, for some, they still carry over in the perceptions of the American people. Japanese-Americans are challenging the stereotypical images of the past and have made a voice for themselves in American society. They are fighting against the persistent racism and sexism against themselves by establishing a unifying identity as Americans and monitoring the media’s representations. Although ethnic stereotyping is less common today than it was in the last century, it persists. The images are not so obviously offensive; consequently, many people do not recognize them as stereotypes. In terms of dramatic expression, then, the Japanese film labors under a heavy burden. If it portrays emotion within the traditional Japanese framework, it may achieve authenticity, but the effect is antiquated. If it portrays emotion within the Western framework, it comes across as meretricious and unconvincing. Films that try to blend the two modes often end up antiquated and unconvincing. Yet in animation, which lacks visual realism and features de-Japanized characters to begin with, the expression of emotion paradoxically takes on a more convincing sense of reality. This may explain why most of the serious and ambitious film efforts have used the vehicle of anime. Given the serious dramatic deficiency, Japanese live-action films can no longer tackle any serious or profound subject matter. In the context of contemporary Japanese film, then, anime often conveys a greater sense of reality than live-action films. The thin, insubstantial reality of animated film, that is to say, is more alive — literally, more animated — than the flesh-and-blood reality. And if anime is perceived as more real (i. e. , closer to physical reality) than live-action, this means that, increasingly, anime embodies the Japanese consciousness of reality. The Japanese conception of reality is undergoing a process of animation. The rise of anime as well as manga is a cultural by-product of modern Japan’s tendency to promote modernization and Westernization while rejecting its history and traditions. A medium that fuses elements of East and West, and lacks a clear national identity, could be considered international in a certain sense, and this is doubtless a major reason why anime has so many fans overseas. But the current state of affairs, in which anime represents the mainstream of Japanese cinema, is by no means desirable, inasmuch as it signifies an ever-widening gap between physical reality and people’s conception of it.

Friday, September 27, 2019

CRJ Essay Example | Topics and Well Written Essays - 500 words - 1

CRJ - Essay Example There are several examples which serve as proof for the fact that children raised in households by parents who had previously committed suicides or crimes like the report in the San Diego Union Tribune about two step-brothers, whose father had committed suicide, strangling and chopping off their mother’s body. In another case a two brothers attacked their father with a baseball and followed it by setting the house on fire in order to hide the evidence. They were raised in a foster home as their mother left them and were later returned to the custody of their father as the foster parents were unable to handle them (Morse, 2003). There are several theories that support the fact that children who are raised without a father lacked maturity and in their later years they tend to assert their maleness by committing acts of delinquency. In the 1920s boys who were lodged in reformatories in New York majorly hailed from broken homes (Juvenile Delinquency, n.d). Morse has also stated that a 1994 report from the Wisconsin Department of Health and Social Service found that a majority of juvenile delinquents came from broken families or single-parents homes (Morse, 2003). The explanation given to such problems was greater exposure to criminal activities due to parental conflicts or other reasons such as alcoholism and drugs in single-parent households. Additionally in single parent households, the parent finds it difficult to supervise and control their child and prevent them from engaging in criminal activities. There is a general lack of family interaction in such households which are further burdened by emotional an d economic problems. Another criteria pointed out by Morse is the lack of educational attainment by children raised by single parents who drop out of school early. This in turn encourages them to engage in criminal activities in order to make a living. A similar

Thursday, September 26, 2019

Difference Between the Bilateral and Unilateral Contract Essay

Difference Between the Bilateral and Unilateral Contract - Essay Example Businesses either being sole proprietorship or partnership require binding deals between two partners since equal contribution between each other is expected for the business growth. Input must be equal depending on what each is bringing to the business, and a unilateral contract becomes acceptable when the other party completely performs the action (Cheeseman, 2009). A unilateral contract would be considered in a scenario in which one expects some service done to them and in return, of remuneration for the service rendered thus, a promise is made for payment or honor of service rendered upon completion. For instance, an individual in an educational situation would consider a unilateral contract. Quintessentially, private tuition where payment is done upon completion of the desired session or as agreed. Production companies often sought unilateral agreements where they are paid upon completion of a task (Cheeseman, 2009). A bilateral contract would be considered between two individuals with the desire to start a partnership business whiles each makes contributions for security and more so if the two parties do not have a close, personal relationship. Large groups can also settle for a bilateral contract in case they plan to work together thus, a percentage of contribution is expected from each party and since law binds the contract, it helps to prevent a breach of the contract by either party. A unilateral contract can be changed by one party as it only stands when the other party performs the given task. The offeree only gets to be bound once he decides to commit to the contract. A bilateral contract is beneficial to the offeree since both parties make a law binding promise. A unilateral contract for the offerer can be beneficial once achieved as they bargain for completed performance rather than a promise to perform. An example being the case of an insurance company, which expects the insurer to make a promise for future performances.  

Assess and explain the importance that human rights have attained Essay

Assess and explain the importance that human rights have attained within international law - Essay Example At a global level, the international human rights law is the body entrusted in keeping and promoting these statutes internationally, regionally and even nationally. The United Nations (UN) through the United Nations Security Council and the United Nations Human Rights Council is the only universally recognized entity that exerts jurisdiction on human rights issues. Countries adhere to international law by consenting to at least partially acquiescent to international law or jurisdiction according to the 1920 Statute of the Permanent Court of International Justice. This and subsequent statutes comprise the various international treaties, declarations, and guidelines that constitute the international human rights instruments. The United Nations Universal Declaration of Human Rights (UDHR) of 1948 form the basis of most of these human rights instruments, which have generated various international and regional instruments that guide the international laws on human rights (UNHCHR, 2009) [s ee Table 1]. Although there is no principal body entrusted with enforcing international human rights, several judicial entities exist including the International Criminal Court (ICC), which presides over war crimes and genocide, the European Court of Human Rights, and the Inter-American Court of Human Rights that normally work under the guidance of the UN Human Rights Council (OHCHR, 2009). At state level, 110 countries have set up National Human Rights Commissions to monitor and promote human rights. In many developed western countries particularly the United States, the notion of human rights has developed over time but can be traced to the influence of British political theorist John Locke who ascribed to the view of natural rights of an individual. The US Declaration of Independence and Bill of Rights have thus emphasised the importance of individual and collective rights. Western

Wednesday, September 25, 2019

Case study Example | Topics and Well Written Essays - 250 words - 65

Case Study Example Therefore, for the company to counter the effect of unreliable profits, it should start introducing some other products. For example, USB drives, this because a wide range of products will increase the company’s sales (Milkovich et al., 2013). In addition, the company can build more companies in different continents. This will reduce the risks associated with currency exchange rates. The type of reward system that the company should give this group of employees should be based on money (Milkovich et al., 2013). This is because according to recent studies, some of the best performing companies reward their employees well. Employees who are rewarded very well are motivated and tend to be more creative and work with minimum supervision (Milkovich et al., 2013). In summary, there should be a component of large incentive, if the company wishes to retain the employees. One of the human needs is to live a good life, and most psychologists have argued that employers who invest in their employees’ wellbeing always tend to have very productive

Tuesday, September 24, 2019

Strain Gauges Experiment Lab Report Example | Topics and Well Written Essays - 3750 words

Strain Gauges Experiment - Lab Report Example Wheatstone bridge and amplifier method It must be noted at first that the 3rd method is a recommended on and no actual experiments have been done on it. It has nevertheless been included here because a combination of the Wheatstone bridge and an amplifier is a very efficient method for measuring voltages as the amplifier maximizes it and makes measurement easier. Also occurrence of electrical noise and fluctuations in instrument resolutions can be better revealed by it.Theory & Apparatus In this section of the report the justifications for the three measurement methods as well as circuit diagrams of the three measurement apparatus are provided. Basic current and voltage measurement method: The experimental rig shown in Figure 1 has a cantilever beam with a pair of 120 strain gauges attached one on the upper and one on the lower beam surfaces. The strain-setting device is a bolt with a metric thread. The strain produced at the surface of a deflected cantilever beam varies along its length. Close to the gripping point (where the strain gauges are mounted) it has a maximum value of: (Eq.1) where: - deflection of the end of the beam (max of 45 mm), d - beam thickness (0.8mm in the rig) and L - beam length (250 mm in the rig). Figure 1: The experimental rig. Wheatstone bridge measurement method: The purpose of this experiment is to improve the results obtained in experiment 1 by the previous measurement method by using a Wheatstone bridge (Figure 2) that comprises of four nominally identical 120 strain gauges. Figure 2: Wheatstone bridge Ideally, if the bridge resistors are identical no voltage will be registered at the meter but this is not...It is envisaged that this would be the most efficient method of all. It must be noted at first that the 3rd method is a recommended on and no actual experiments have been done on it. It has nevertheless been included here because a combination of the Wheatstone bridge and an amplifier is a very efficient method for measuring voltages as the amplifier maximizes it and makes measurement easier. Also occurrence of electrical noise and fluctuations in instrument resolutions can be better revealed by it. The experimental rig shown in Figure 1 has a cantilever beam with a pair of 120 strain gauges attached one on the upper and one on the lower beam surfaces. The strain-setting device is a bolt with a metric thread. The purpose of this experiment is to improve the results obtained in experiment 1 by the previous measurement method by using a Wheatstone bridge (Figure 2) that comprises of four nominally identical 120 strain gauges. Ideally, if the bridge resistors are identical no voltage will be registered at the meter but this is not so practically and a small voltage of about 2 mV is detectable. This is because the resistors are not exactly identical. The amplifier needs to be able to amplify differential signals of up to about 3mV and produce an output in the range of about 1V to 5V.

Monday, September 23, 2019

Fashion in History - Bridging the Gap Essay Example | Topics and Well Written Essays - 1000 words

Fashion in History - Bridging the Gap - Essay Example The essay "Fashion in History - Bridging the Gap" gives a review of the article of McRobbie and discusses it. She says that consumption by many is considered to be a feminist character and the different aspects regarding it are left untouched by many writers. The fact regarding the production of the goods of consumption, the money which accounts for the consumption are all missed when talking about it. That is there is no reference to the difficulties women have to face for the consumption of goods. The fact that the females actually consume goods not only for themselves but also their children and their house is not seen. She says that consumption is a wide topic and that females are considered to be the main consumers just explains one part of the consumption process. The ethnicity, gender and class are also missed upon when consumption is talked about. The problem of how poor females cope up with issues of consumption, the link between consumption and production is not considered. Thus McRobbie argues that a lot of major issues are overlooked and for a proper understanding of the consumption phenomenon, all criteria and facts regarding it should be seen. Many writers like Pumphrey, Felsky and Reekie have discussed regarding the fact that consumption has been dominated by females and Pumphrey and Reekie have analyzed the issue of consumption a bit ahead but again not all aspects have been viewed. With an advance in education, the issue of consumption started to get discussed in the late twentieth century.

Sunday, September 22, 2019

Cold War Essay Example for Free

Cold War Essay How was the Cold War fought? †¢ Directions: The following question is based on the accompanying documents in Part A. As you analyze the documents, take into account both the source of the document and the author’s point of view. Be sure to: 1. Carefully read the document-based question. Consider what you already know about this topic. How would you answer the question if you had no documents to examine? 2. Now, read each document carefully, underlining key phrases and words that address the document-based question. You may also wish to use the margin to make brief notes. Answer the questions which follow each document. 3. Based on your own knowledge and on the information found in the documents, formulate a thesis that directly answers the question. 4. Organize supportive and relevant information into a brief outline. 5. Write a well-organized essay proving your thesis. The essay should be logically presented and should include information both from the documents and from your own knowledge outside of the documents. Question: How did the Cold War begin and what â€Å"weapons† were used to fight this war? Part A:The following documents provide information about the Cold War. The offensive missiles could destroy most cities in the Western Hemisphere. Consequently, he demanded that the Soviet Union remove these missiles from Cuba and â€Å"end this dangerous arms race. † Document 9 Premier Khrushchev agreed to remove the missiles because he said they were only put there to defend and protect Cuba from an attack. Since the U. S. had promised that Cuba will not be attacked by any country in the Western Hemisphere, the missiles were no longer needed. The threat of nuclear was lifted and the world stepped back from the brink of war. 127 Additional Information Beyond the Documents

Saturday, September 21, 2019

An Introduction To Cryptology Computer Science Essay

An Introduction To Cryptology Computer Science Essay Cryptography was used only for military and diplomatic communication until the development of public key cryptography. Secrecy is one of most important requirement for any communication and it becomes more important when the content of communication is for military and diplomatic purpose. Hieroglyphs used by Egyptians are earliest known example of cryptography in 1900 BC. These hieroglyphics were used to write the stories of the life of kings and describe the great acts of his life. Around 500 BC Hebrew scholars used mono alphabetic substitution cipher such as Atbash cipher. Around 400 BC the Spartans also developed a Scytale cipher that used ribbons of parchment for writing any secret message after wrapping it around a cylindrical rod named as Scytale. In second century BC Greek historian Polybius invented Polybius Square a type of substitution ciphers. Around 1st century BC the Roman emperor Julius Ceaser used the substitution cipher named after him as Ceaser Cipher. The Caesar Cipher is a Monoalphabetic type Cipher. Around 9th century AD the Arab Mathematician AbÃ…Â « YÃ…Â «suf YaÊ »qÃ…Â «b ibn Isà ¡Ã‚ ¸Ã‚ ¥Ãƒâ€žÃ‚ q al-KindÄ « popularly known as Al-Kindi published the first text book on cryptnalysis of ciphers named Risalah fi Istikhraj al-Muamma (On Deciphering Cryptographic Messages). This book can be stated as the pioneer of the medieval cryptography. In this book Al-Kindi described the frequency analysis technique for deciphering substitution ciphers and some polyalphabetic substitution ciphers. The relative frequency of symbols is used in Frequency analysis to decode the message. Al-Kindi used this technique on Quran to understand the meaning for religious purpose. The field of cryptography had not made any significant development until 15th century when the Italian mathematician Leon Battista Alberti known as The Father of Western Cryptology, developed the concept of polyalphabetic substitution. Although he had not made any practical cipher but by using this concept a practical Poly-Alphabetic substitution cryptographic system was developed by French cryptographer BLAISE DE VIGENERE, which was named after him and called as VIGENERE SQUARE. For a long time this cipher was believed to be secure but around 1854, CHARLES BABBAGE, an English mathematician and engineer, better known as father of Computer Science for his development work of difference engine that become the first mechanical computer, successfully cracked the Vigenere Square Cipher by using the method of statistical analysis. Cryptography was widely used in World War I and II. The most famous incident of World War I is of German foreign Minister Zimmerman Telegram that changed the whole World War I and involved the America in world war which was neutral till that date and Germany was finally defeated. Unlike the past cryptographic algorithms in which the main concentration was on hiding the algorithm or technique the modern ciphers needed the technique or algorithm which can be widely used and whose security should not be compromised if the algorithm is known. To encrypt and decrypt the information, a key is used in modern cryptographic algorithms which convert the message and data in such format which are senseless to the receiver through encryption and then return them to the original form through decryption process. Claude E. Shannon, father of modern cryptography has contributed his work to cryptography in the form of A mathematical theory of cryptography and A Communications Theory of Secrecy Systems which are considered as the foundation of modern cryptography. In seventies the field of cryptography has witnessed two major developments. First was the development of Data Encryption Standard (DES) by IBM, which was accepted as standard after some modification by the NSA in 1977 and it was later replaced by the Advanced Encryption Standard (AES) in 2001. The second development which is more important and that changed the whole working process and use of cryptography is the development of Public Key Cryptography. It was started with the publication of the paper titled New Directions in Cryptography, by Whitfield Diffie and Martin Hellman and similar development made by Ron Rivest, Adi Shamir and Leonard Adleman, who were the first to publicly describe the algorithm in 1977 and it was named after them as RSA algorithm. An Introduction to Cryptology: The word cryptology is a combination of two greek words, kryptos, which means hidden and logos means study. Cryptology is as old as writing itself and it has been primarily for thousands of years it had been used for securing military and diplomatic communications. The field of Cryptology can be further classified into two main fields, namely: Cryptography and Cryptanalysis. On the one hand the cryptographers try to develop a system or algorithm that will be safe and secure for communication while on the other hand the cryptanalysts seek weaknesses in the developed system and try to breach the security of the system. The two works can be considered against each other but the work of cryptanalysts cannot be always negative and they can work for the betterment of the developed system by trying to find out the weaknesses in the cryptographic algorithm and fix it. Cryptography: Cryptography is the technique for writing secretly so that the unintended recipients cannot comprehend the original message. It transforms the information into such an unintelligible form so that illegitimate or unintended users cannot devise the original meaning of the message and it looks like a garbage value for them. But the main consideration during the transformation is that the process must be reversible so that the intended user can get the original information after applying the original key and process. This is the traditional use of cryptography but in modern times the scope of cryptography has widened. Cryptanalysis: Cryptanalysis is the field of study that deals with the techniques that verify and assert the security of the protocol or system. The objective of the cryptanalysis techniques is to assess the security claims of the cryptographic algorithm or system. Cryptanalysts try to develop an attack to show that claimed security level is not achieved due to weaknesses in the cryptographic system. It is difficult to define when a cryptosystem is broken. Generally, efficiency of an attack is compared with the efficiency of exhaustive key search attack and if the efficiency of attack is less than it then it is considered an attack on the cryptographic system. Classification of attacks can be made on the basis of the amount of information available to attacker: à ¢Ã¢â€š ¬Ã‚ ¢ Ciphertext-only attack: The attacker has access to the ciphertext only. à ¢Ã¢â€š ¬Ã‚ ¢ Known-plaintext attack: In this case the attacker has access to both the plaintext and the corresponding ciphertext. This attack can be employed when the attacker has limited access to the encrypting device. à ¢Ã¢â€š ¬Ã‚ ¢ Chosen-Plaintext attack: The attacker selects a plaintext and generates corresponding ciphertext using the correct key. This can only be applied if the attacker has access to encryption device and is able to encrypt a message of choice using this device. The goal of such type of attack is to discover the secret key or algorithm for any given encrypted text. à ¢Ã¢â€š ¬Ã‚ ¢ Chosen-Ciphertext attack: The attacker selects a ciphertext and generates corresponding plaintext using the correct key. This can only be possible if the attacker has access to decryption device and is able to decrypt a message of choice using this device. The goal of such type of attack is also to discover the secret key or algorithm for any given encrypted text. The goals of such attacks in general can be classified as secret key recovery, plaintext recovery without recovering the key or the discovery of the encryption/decryption algorithm. Classification of Cryptographic primitives: Unkeyed Cryptography: Unkeyed cryptosystem is that cryptosystem which does not use any key or parameter for application. Examples of such system are one-way functions, cryptographic hash functions, and random bit generators. Public Key or Asymmetric Cryptography: Public Key or Asymmetric Key cryptography is the latest addition to the cryptographic techniques that has changed the basic uses of cryptography. Two different keys are used for encryption and decryption in Public or asymmetric key cryptography. Public key is being used for encryption and it is known to everyone and is freely distributable but the encrypted message can only be decrypted by using the private key corresponding to public key which is known only to the authorized person. Public key cryptography evolved to solve the problems of Secret key cryptography but it is very slow in comparison to secret key cryptography. Public key cryptography cannot be used for high volume encryption. Therefore we use combination of Public and Private Key cryptography for practical applications. Secret Key or Private Key or Symmetric Key Cryptography: In Symmetric Key or Secret Key cryptography, only a single key is used to encrypt and decrypt. It is also called Private Key cryptography. The main problem of the secret key cryptography is the sharing of same key by sender and receiver. In the case of unsecure channels, there is no mean to exchange key securely. The secret key must be shared using any secure channel before communication take place and for such purpose Public Key cryptography is generally used. An overview of Symmetric Algorithms: Symmetric key cryptography is still highly used due to its efficiency and is generally used where high volume of data is encrypted. Symmetric key primitives can be classified into two basic designs; namely Block Cipher and Stream Cipher. Block Ciphers: Block cipher is a symmetric key encryption which divides the input stream of plaintext into fixed size of blocks, generally 64, 128 or 256 bits long and using a fixed transformation (substitutions and permutations) on every block on by one. These transformations are repeated many times to obtain highly nonlinear output bits. The two most popular block ciphers are DES and AES. Modes of operation: A block cipher performs fixed transformations on any block of data and results in same ciphertext for same plaintext, hence can only be considered secure for a single block of data. A mode of operation is actually a way of encryption using a block cipher securely for data more than one block. The Block ciphers are used in one of the five modes to operate for breaking the linearity. A cryptographic mode usually consists of basic cipher, some sort of feedback, and some simple operations. Electronic Code Book (ECB) Mode Cipher block Chaining (CBC) Mode Cipher Feedback (CFB) Mode Output Feedback (OFB) Mode The counter (CTR) Mode Stream Ciphers: Symmetric Cryptographic systems encrypt plaintext messages unit by unit, and unlike block ciphers, which encrypt block of plaintext using fixed transformation, Stream Ciphers encrypt individual units or character of plaintext using a time-varying transformation. It takes the secret key and initialization vector (IV) as input and generates a pseudo random sequence of digits called keystream using pseudo random generator, usually part of Stream Ciphers. ciphertext digits are generated by XORing the keystream digits with the plaintext digits. The stream ciphers are classified into two parts as synchronous and asynchronous stream ciphers on the basis of application of internal state in further encryption of digits. Stream ciphers have played an important role in cryptography and still being used due to its efficiency and especially, in hardware implementations where hardware resources are restricted. Stream ciphers are the main topic of research in this thesis and it will be discussed more comprehensively in later chapters. For a general description of stream ciphers, see chapter 2. Scope of Cryptology: Today the cryptology is not just limited to data encryption and decryption as mentioned above, it has a wide range of usages. The field of cryptology is an emerging field in which continuous expansions and modifications are taking place. The field of cryptography was evolved for military usage but it has now expanded and is highly used in civilian applications also. Cryptography is the study of mathematical techniques, algorithms and protocols that can provide four basic services for information security, namely privacy, authentication, data integrity and non-repudiation. Privacy or confidentiality: The basic goal of cryptography is to keep the information secret from unauthorized persons. Cryptography is the most common mean to provide confidentiality or privacy to the information. Data Integrity: Data integrity means that system must be able to detect the unauthorized manipulation of the data. Data manipulation refers to insertion, deletion or substitution of data. Authentication: Authentication service provides the ability to correctly identify the parties in the communication and origin of the data. Non-Repudiation: Non-repudiation service prevents an entity from denying any activity done by itself or existence of a communication at any later stage in case of any dispute. Stream Cipher Standardization: Major effort towards standardization of cryptographic primitives was started by European Commission research project funded from 2000-2003 in form of NESSIE (New European Schemes for Signatures, Integrity and Encryption). In March 2000 NESSIE urged the public for submissions of cryptographic primitives, and against this call 42 primitives were submitted in February 2003. The submissions were selected in different categories for standardization. Various cryptographic primitives were standardized except Stream Ciphers and none of the six submitted stream ciphers were considered as upto standard. During this period another organization, the International Standards Organizations ISO/IEC 18033 also initiated a similar project for standardization and selected two stream ciphers: SNOW 2.0 and MUGI. Other than these two efforts a Cryptography Research and Evaluation Committee was set up by the Japanese Government which started a project CRYPTREC in 2001 to evaluate and recommend the cryptogr aphic primitives in different category for use. In the stream cipher category, three ciphers were recommended that are MUGI, MULTI-S01 and RC4 (128-bit keys only). But, Later on these ciphers were also found to be susceptible to the cryptanalytic attacks This failure on the side of cryptographic primitives in stream cipher category prompted Adi Shamir in 2004 RSA Data Security Conference to question, whether there is a need for Stream Ciphers or not. He also defined two areas were Stream Ciphers can still be useful where exceptionally high throughput is required in software and exceptionally low resource consumption is required in hardware. To explore the Stream Cipher condition and to develop a state of art stream cipher which can secure and fulfill the above mentioned requirements, ECRYPT launched the eSTREAM project in 2004. eSTREAM made a call for submission in two categories; hardware based and software based stream ciphers. In response to this call 34 ciphers were submitted in both the categories. In different phases of this project, cipher profiles were declared. The final profile issued in January 2012, seven ciphers were selected. The selected ciphers are HC-128, Rabbit, Salsa20/12 and SOSEMANUK in profile 1 (Software based Ciphers) and Grain v1, MICKEY 2.0 and Trivium in profile 2 (Harware based cipher). Even after these standardization efforts, many weaknesses were found in these ciphers. This state of Stream Ciphers has led me to involve in the research of the Stream Cipher and work towards a secure and efficient Stream Cipher.

Friday, September 20, 2019

Studying Computer Science Essay -- Computer Science

Introduction Hardware can be daunting. The following is a brief look at why every computer science major should be knowledgeable in the acronyms that abound within the computer industry. Overwhelming Factors Budding computer science majors can be thankful to Ken Thompson’s desire to travel space. It was this desire that maintained a failed attempt of an operating system by a joint venture of General Electric, Bell Labs, and Massachusetts Institute of Technology. The operating system was named Multics and was abandoned in the late sixties, yet Ken Thompson had programmed a game he named Space Travel for Multics and it still needed an operating system on which to run. As they did not have the resources they had to run Multics at the house, Ken Thompson and Dennis Ritchie worked together to produce what we know today as UNIX (Ritchie, 1984), yet UNIX now needed a platform upon which to run and yet again, another savior to computer science that we can be thankful for today, IBM mass-produced personal computers for use in the common household. Yet, thankfully, IBM failed at dominating the personal computer market and clones became yet another savior. Personal computers and their clones are comprised of standard, interchangeable components. Components such as Random Access Memory (RAM), Read Only Memory (ROM), Central Processing Unit (CPU), Hard Disk Drive (HDD), Compact Disc or Digital Versatile Disc Read Only Memory often referred to as CD-ROM or DVD-ROM, motherboards, Graphic Processing Unit (formerly known as video cards and now referred to as GPU), and the like are the norm for any typical computer whether they are of the desktop or laptop varieties. Form factors must also be taken into account terms such as XT, AT, ATX, mi... ...oring becomes a factor, shopping for RAM that interfaces with the Front Side Bus (FSB) at 800 MHZ or 1066MHZ becomes a factor, choosing CPU’s that are either dual-core or quad-core becomes a factor. Factors, there are many of them; one way to combat this is to educate and familiarize oneself with the acronyms and terms associated within the computing industry. If not properly armed, the factors can be overwhelming to any computer science major. Works Cited Krynin, M. (2010) UEFI – unified extensible firmware interface. Retrieved: December 9, 2010 from: http://compreviews.about.com/od/motherboards/a/UEFI.htm N.A. (2010) Desktop form factors. Retrieved: December 9, 2010 from: http://www.formfactors.org/searchproducts.asp Ritchie, D. (1984) Early unix history and evolution. Retrieved: December 8, 2010 from: http://cm.bell-labs.com/cm/cs/who/dmr/hist.html

Thursday, September 19, 2019

Growing Up in a Violent World Essay -- childhood, child development, v

Childhood, according to wordnetweb, is the time of a person's life when they are a child or the state of a child between infancy and adolescence. The period defined as childhood might not change, because it will always be between infancy and adolescence, but the activities and development acquired in that time changes from generation to generation. If you ask an adult how was their childhood they might tell you thousands of different stories regarding their friends, the games they used to play, the lives they used to live and the simplicity of life they had. They might tell you about how they used to run through the neighborhoods with their friends, kill bugs, eat soil and â€Å"discover† new territories. They might tell you about the time the broke their arm when they fell off a tree they were climbing or how fun it was to swim at the lake with their friends. Now, if you ask a kid born on the new millennium, the new generation, he might give you a completely different scene f or what childhood is for him. For him, childhood might mean staying up late watching TV series regarding sex and drugs, or playing Play Station, X-Box or Wii for 5 or even 6 straight hours. They might also tell you about the time they accidentally found porn on the internet or when they were grounded for using obscene language that they previously had learned from a movie. Life as we used to know it has changed, drastically. This world has become a very hostile world, were advertisement owns the streets and all the means of communication. The kids of this new â€Å"technology† era are the ones who suffer the most with his hostility, and we have to do something about it. Children are being bombarded with explicit material all the time by the media. What are all the la... ... different concept and hostility is a common environment. Bringing children to life in this era is far much more complicated than what it used to be, and parenting has become an exhausting and tough job. Being a parent in this time means having to be EXTRA-careful with what your child is exposed to these days, means taking the time to explain and correct them from all the wrong concepts of values they have learned from TV. It is in our hand to change this world for the better, we have to raise our voices and fight against the media and all these things they are causing in our children. The hostility of our world not only affects children, because adults are affected too, but our children are the men and women of tomorrow, and for that we have the responsibility to guide them, to teach them, and to make their learning and development environment as safe as it can be.

Wednesday, September 18, 2019

Theory and Practice in Post-Colonial Literatures Essay -- English Lite

Theory and Practice in Post-Colonial Literatures Introduction More than three-quarters of the people living in the world today have had their lives shaped by the experience of colonialism. It is easy to see how important this has been in the political and economic spheres, but its general influence on the perceptual frameworks of contemporary peoples is often less evident. Literature offers one of the most important ways in which these new perceptions are expressed and it is in their writing, and through other arts such as painting, sculpture, music, and dance that the day-to-day realities experienced by colonized peoples have been most powerfully encoded and so profoundly influential. What are post-colonial literatures? This book is concerned with writing by those peoples formerly colonized by Britain, though much of what it deals with is of interest and relevance to countries colonized by other European powers, such as France, Portugal, and Spain. The semantic basis of the term ?post-colonial? might seem to suggest a concern only with the national culture after the departure of the imperial power. It has occasionally been employed in some earlier work in the area to distinguish between the periods before and after independence (?colonial period? and ?post-colonial period?), for example, in constructing national literary histories, or in suggesting comparative studies between stages in those histories. Generally speaking, though, the term ?colonial? has been used for the period before independence and a term indicating a national writing, such as ?modern Canadian writing? or ?recent West Indian literature? has been employed to distinguish the period after independence. We use the term ?post-co... ...rad, Patrick White and Margaret Atwood?, World Literature Written in English 24, no. 2 (Autumn). Campbell Praed (1981). Policy and Passion. London: Richard Bentley & Sons. Howe, Joseph (1874). Poems and Essays. Montreal: Lovell. Ngugi wa Thiong?o (1972). Homecoming: Essays on African and Caribbean Literature, Culture, and Politics. London: Heinemann. Ngugi wa Thiong?o (1986). Writers in Politics. London: Heinemann. Phillips, Arthur (1958). ?The cultural cringe?. The Australian Tradition: Studies in a Colonial Culture. Melbourne: Cheshire. Said, Edward W. (1984). The World, the Text and the Critic. London: Faber. Tiffin, Chris, ed. (1978). South Pacific Images. St Lucia, Queensland: SPACLALS. Viswanathan, Gauri (1987). ?The beginnings of English literary study in British India?. Oxford Literary Review 9:1 & 2.

Tuesday, September 17, 2019

Does the Internet Have a Negative Effect on Youth or Does Its Use Need to Be Monitored More Essay

Does the internet have a negative effect on youth or does its use need to be monitored more? The Internet has become a major part of everyday life for most Americans especially today’s youth but some say that internet has a negative effect on youth more than a positive one. The question is: are all of the effects of the internet negative? The internet is used by most youth for entertainment, to find information and to connect with people. Unfortunately while the internet can be useful it has been known to cause negative effects on children. Social networking sites are very popular among today’s youth. In recent years cyber bullying has become a trend among youth because of the internet. There are also cases that youth have been exposed to inappropriate websites while on the internet and it had a negative effect on them. The internet has been known to cause a negative effect on youth but it can be prevented if their internet use is monitored. Social networking websites that are popular on the internet Twitter, MySpace, face book and YouTube. It is said by some t hat youth spend more time on websites like these than studying and doing their homework. While most of the young people in the study got good grades, 47 percent of the heaviest media users, those who consumed at least 16 hours a day, had mostly C’s or lower, compared with 23 percent of those who typically consumed media three hours a day or less (New York Times). Some youth can spend all day on social networking sites. Often times social networking sites can also become a distraction to youth. Most youth would much rather get on face book or twitter than study or write a paper. Most of the time youth can begin writing a paper but end up spending hours on face book. Social networking sites also have been known to cause children to be kidnapped or raped. Because of the amount of information that can be put on these sites it is easy for them to be tracked. There have also been cases where youth have chatted someone under the impression that they were someone else. There have been several cases where children have been harmed because someone found them on social netwo rking site. This can only be prevented if youth internet is monitored. So it seems that social networking sites can only have a negative effect if the time they spend on social networks is not being monitored correctly. Cyber bullying is another negative effect from the internet. Cyber bullying is using the Internet to  send or post texts or images intended to hurt or embarrass another person. It has been said that forty-three percent of teens have been victimized by cyber-bullying in the last year (ncpc.org).Cyber-bullying is a result of youth being mad at another peer or just trying to have fun. Cyber-bullying has been said to cause depression and sometimes even suicide among youth. It has become a major problem among youth in recent years. A lot of the time cyber bullying takes place on sites like twitter, face book and sometimes even YouTube. There have been cases all over the news where youth have said that they became depressed because of cyber-bullying.Most youth who have participated in cyber bullying thought that it was funny and not realized that it would have a negative effect on the victim. There have been steps taken to try to prevent cyber-bullying but there are still some cases where it is still happening. Cyber-bullying can be prevented if t he internet use is being monitored. Almost eighty percent of teens said they did not have rules for the internet or that it was not monitored. While browsing the internet the youth can be exposed to a lot of inappropriate websites that most would agree they shouldn’t be exposed to. Twenty five percent of youth had unwanted exposure to sexual pictures on the internet in the past year, challenging the prevalent assumption that the problem is primarily about young people motivated to actively seek out pornography according to youth and society (Protectkids.com).One quarter of these youth were upset by being exposed to pornography. In other cases when youth are exposed to pornography they become interested and begin watching it regularly. According to one study, when youth under fourteen years of age are exposed to pornography it is related to greater involvement in deviant sexual practice, particularly rape (protectkids.com). It has also been said that because pornography encourages sexual expression without responsibility it endangers children’s health. If a child were to see porn he/she may think that is okay to have unprotected sex which could then lead to std’s and unplanned pregnancy( protectkids,com ). Although porn can and has had negative effects on children it has been said that porn does not always have negative effects on children. Some children are exposed and it has no effect at all. In the end it seems that it may depend on the child if it has a negative effect or not. It also seems that the only way that this can be prevented is if their internet use is monitored. There are strategies that  can be taken to do this (Council). It seems to be proven that the internet can in fact have a negative effect on youth. Social networking sites can cause youth grades to drop. Cyber-bullying mostly takes place on the internet and it cause youth to become depressed. Youth can be exposed to several inappropriate websites which can damage their future development. The internet can be a very useful tool for youth to have access to but it can also have a very negative impact on youth if it is not monitored correctly. To ensure that the internet does not harm our youth in negative way parents/guardians must monitor their children’s internet use.

Monday, September 16, 2019

Napoleon and Snowball (Animal Farm) Essay

George Orwell’s Animal Farm is an allegorical novel that reflects events such as the Bolshevik revolution, the economic reform by Trotsky the Russian famine in 1921 and during the Stalin era before the Second World War. The pigs represent the communist leadership, and the rest of the animals on the farm symbolize the different parts of Russian society and how the communist takeover of Russia affected them. Two main characters, Snowball and Napoleon (who symbolize Trotsky and Stalin), engages in a political struggle, as both of them wanted to have the power to lead all of the animals. Although Napoleon wins the struggle in the end, Snowball’s political strategy is better than the corrupted leadership of Napoleon. Snowball cares more about the living condition of the animals. Compared to Napoleon, Snowball knows the meaning of â€Å"Animalism†, which is animals are equal and it should lead the animals to a better life. Snowball is interested in reading all kinds of books to enrich his scope of knowledge to make the animals work easier. For example, he declares the windmill idea from a book of the Jones. Also Snowball is very brave; he has studied the book of Julian Caesar and successfully led through the Battle of the Cowshed while Napoleon was hiding himself in the barn. Snowball has an intelligent and friendly character. Unlike Napoleon, Snowball never forces someone to agree with his ideas. Instead, he is good at explaining how his ideas work and persuades all the animals to believe and trust his ideas. Unlike Napoleon, Snowball does not need Squealer’s help, he can do the explaining part all by himself. Napoleon has his own ways to control other animals such as the dogs and Squealer but Snowball has different way which is the committees. Snowball seems to work better within the political system. Napoleon goes around it. Napoleon, for instance, he understands the role of force in political control and uses his attack dogs to expel Snowball from the farm. Napoleon seems to have a powerful, self-centered desire for control, while Snowball seems to think of himself as a genius who should be the one to guide the farm toward success. Snowball is the only one who knows the real meaning of â€Å"Animalism†, and he is putting out true effort to make the living standard of the animals better than before, and insists everyone is equal. After the expel of Mr. Jones, the Animal Farm is supposed to be democracy, all of the animals should decide how to do things together, any one animal to rise to greater power than any other would violate that ideal, and make Animal Farm indistinguishable from a human farm. On the other hand the only thing that Napoleon thinks about is how to gain more power and personal benefit from the farm. Snowball always comes up with some long-term plans and on the other hand Napoleon can only come up with some short-term plans. In conclusion, Snowball’s political strategy is better then the corrupted leadership of Napoleon.

Sunday, September 15, 2019

Favorite teacher Essay

My favorite teacher is Mrs. Auguste. She is a great teacher because she is nice and cares for her students. Mrs. Auguste is one teacher that will listen to her students and help them with problems that don’t just include her classroom studies. If I ever need to talk to someone about anything she’s always there. Mrs. Auguste will be greatly missed when I leave after 12th grade. She has been with Miami Jackson Senior High School for a couple of years and is very deserving of this honor. You are an exceptional teacher. When I first met you in research class you were cool and very down to earth. I love you not only as a teacher but as family. Whenever I and Stephanie need advice you kept it real with us. You were the only one of my teachers who really understood me. While other teachers do teach their classes well, you teach in a fun and exciting way. You help me learn by making your class a great learning experience and engaging at the same time. Even when I already had lunch and still was hungry you would feed me. Food is the best way to my heart but you already know that! I consider you a second mom to me. You are caring, very funny, honest, loyal and loving. There was never a dull moment in your class. One event that I still remember was when me,Stephenie, and Melissa were sitting at our favorite lab station and Keivonnis came over and started bothering us and me and him started arguing, you kept saying y’all like each other and I kept denying and me and Stephenie started laughing and called you palm tree because you had a retwist. That was the funniest day in your class but there were plenty more. We had good laughs from the start of class to the end. I use to come in class twerking everywhere LOL!! I loved your class and now I miss it. I just wanted to say thank you for being such a wonderful educator as well as a person. From the first day, I came into your class and experienced your way of teaching I knew that this was going to be a very fun and interesting class. Ever since I was in high school, I looked at Research as just being another subject that I had to pass. However, since being in your class I have seen the importance of science. I have learned that it is not only essential and beneficial. I love your demeanor of teaching. Most teachers just take the material given to them and give it to the student expecting them to understand fully. These teachers are the ones who view education and learning as a one-way street, however you are opposite. You are the true representation of a great educator. You care about the understanding of your students and actually are open to learn from them. You are the only teacher I know that puts up with my craziness. Others think I’m being rude when I am really not but you know my intentions and I love you for that. I wish you the best of luck with everything. I love you and I’m going to miss you when I graduate but you are stuck with me for another year. I’m really glad I met you. Sincerely, Your daughter from another mother Alexus!

Saturday, September 14, 2019

The Silver Linings Playbook Chapter 32

Letter #3-November 18, 2006 Dear Nikki, As soon as I read your letter, I had my mother check out The Adventures of Huckleberry Finn from the Collingswood Public Library. Eager to enjoy a literary book with a happy ending, I read the entire work in one sitting, which required me to forgo sleep for an evening. I don't know if Tiffany read you the parts in my diary about my black friend Danny, but this book would make him go wild, as Twain uses the n-word more than 200 times. I know this because after reading the first few chapters, I started over and kept a running tally. Every time Twain used the n-word, I made a mark on a piece of paper, and when I finished the book, there were more than 200 marks! Danny says that only black people can use the n-word, which is sort of a universal truth nowadays, so I am surprised the school board allows you to teach such a book. But I did like the book very much. Even though Tom Sawyer should have told Jim he was free right away, I was so happy for Jim at the end of the novel when he gained his freedom. Also, the way that Huck and Jim stuck together through bad times reminded me of Danny and Pat getting each other's backs in the bad place. What really struck me was how Huck kept struggling with the idea that God did not want him to help Jim run away, because Jim was a slave. I realize people had different values back then, and that the church and government approved of slavery, but Huck really impressed me when he said if helping free Jim meant going to hell, he would go to hell. When I read your letter, I cried for a long time. I know I was a bad husband, and I am not mad at you for cheating on me or leaving me or even remarrying. You deserve to be happy. And if you are married now, your getting back together with me would be a sin, because it would mean that we would be committing adultery, even though I still think of you as my wife. These thoughts make me feel dizzy, as if I am spinning out of control. These thoughts make me want to bang my fist against the little white scar above my right eyebrow, which itches every time I get confused or agitated. To use your metaphor †¦ since I can remember, I have been driving on a dark highway, passing endless dashes and lines. Everything else has only been a pit stop – family, Eagles, dancing, my workouts. I have been driving toward you the whole time, only desiring one thing – our reunion. And now I finally realize I'm trying to woo a married woman, which I know is a sin. But I don't think you un derstand how hard I worked for this happy ending. I am very fit, and am now practicing being kind rather than right. I am not the man you were married to for all those lonely years. I am a better man. A man who will take you dancing and will give up sports entirely – coaching and Eagles – if that makes you happy. My conscience tells me that I should not continue to pursue these feelings, but your telling me to read Twain's novel made me think that maybe you were giving me a sign. Huck thought he shouldn't help Jim escape, but he followed his heart, he freed Jim, and that is what led to the happy ending. So maybe you are telling me in an indirect way that I should follow my heart? Why else would you specifically recommend The Adventures of Huckleberry Finn to me? Also, our time together wasn't all bad. Maybe the end was grim, but remember the beginning? Remember college? Remember when we drove to Massachusetts in the middle of the night? It was the Friday after midterms and we were watching one of those travel shows on PBS, because we both thought we would travel back then. All our friends had gone to the rugby house for a party, but we stayed in together for a night of pizza and wine on the couch of my town house. We were watching that show about whale watching off the coast of Martha's Vineyard, and you asked me if they made wine in Martha's Vineyard. I said the New England growing season would be too short to get the proper types of grapes, but you insisted that there must be a vineyard there if the island was called Martha's Vineyard. We had this really heated fake argument – laughing and hitting each other with pillows – and then suddenly we were in my old Taurus, driving north. I'm sure you didn't think I was really going to drive you all the way to Massachusetts without a change of clothes or toiletries, but soon we were over the Tappan Zee Bridge, and you were smiling, and I was holding your hand. We never made it to Martha's Vineyard, but we spent a pretty wild weekend in an economy motel just outside of Cape Cod. Do you remember walking on the beach in March? Our lovemaking smelling like decades' worth other people's cigarette smoke as we enjoyed each other over and over in that motel room? Remember how when we jumped on the mattress, smoke seemed to leak out the sides? The lobster dinner we splurged for at that cheesy restaurant called Captain Bob's, where the waiters wore eye patches? We always said we were going to return to Massachusetts, take the ferry, and see if Martha's Vineyard actually had vineyards. Why didn't we do this then? Probably because we had class on Monday morning. But I wish we had taken that ferry when we had the chance. What was the worst thing that could have happened? We would have missed class. It seems so silly now to drive all the way to Cape Cod with the intention of taking the ferry to Martha's Vineyard only to spend the weekend in an economy motel on the mainland. What I'm trying to say is that maybe we can still take the ferry, Nikki. Maybe it's not too late. I know this is all so complicated right now. But there must be a reason that we are in contact again. There must be a reason that I lost my memory and then was filled with a vicious need to improve myself. There must be a reason if Tiffany was able to arrange this letter exchange. All I'm asking is that you keep the possibility of a reunion open as we continue to communicate through our liaison. My therapist Cliff says he feels as though I am poised for a breakthrough, and he feels he has stabilized my violent tendencies with medications. I know that in my writings I mentioned spitting out many of my meds when I first came home, but I am taking all my pills now and can feel my mental health stabilizing. Every day I feel as though I am getting closer to regaining my memory of our demise. And no matter what I remember – no matter what really happened between us – it will not change how I feel about you. You are living with another man, you are remarried – what could be worse? I still love you. I will always love you and am only now ready to prove my love for you. I hope this note was concise enough, as I tried very hard to keep it under five pages and was successful. I miss you so much, Nikki. Every freckle on your beautiful nose. Love, Pat, Your Sexy Stud Muffin (Remember that from the wedding video?)

Friday, September 13, 2019

Avalade XXI case study Essay Example | Topics and Well Written Essays - 1250 words

Avalade XXI case study - Essay Example When developing a project management plan, it is useful to reflect on some of the risks associated with the implementation, the expected benefits, and the technological solutions offered (Wang, 2012). More specifically, a critical look at the personnel needed in terms of their skills and capacity to fulfill the objectives of the project, how will good performance by the employees be gauged, and what measures have been established to handle any problems that may arise with employee performance. Meag was an IT supplier who had limited experience in implementing large systems. According to Xu and Quaddus (2013) one of the factors that determines the successful implementation of large systems is the presence of skilled employees at different points of the implementation plan. That is, a team of skilled employees who will manage the implementation process, to the employees who will be executing the activities of the implementation plan. Meag and Casa XX1 ought to have a management team in place that would specifically monitor the implementation of the plan, they would interact with the managers of the stadium, customers, and amongst each other. This would enable CASA XX1 to detect any problems that may arise from the system at the earliest point and take remedial action. The project management implementation team must be highly skilled and have the knowledge of the whole system and its functionality. Meag and Casa XX1 should have hired a team of competent project managers who would have stemmed the problem in time. The team would specifically lias with system developers to inform them of the emerging problem and coordinated with the developers in developing a rapid response. Besides hiring a team of highly skilled and capable project managers, Meag and Casa XX1 ought to have developed a clear organizational structure that would have established a clear framework that outlines the duties of each employee and the accompanying responsibilities and the communication

Thursday, September 12, 2019

The Day the Earth Stood Still Essay Example | Topics and Well Written Essays - 500 words

The Day the Earth Stood Still - Essay Example ajor argument in this regard is that there are a number of cold war period themes in the 1951 classic film â€Å"The Day the Earth Stood Still† that are still relevant in the contemporary post 9/11 American society Pardon has significantly employed a number of depictions in the movie to highlight some of his arguments in the movie. For example to support his argument that the post 9/11 global society is still faced with threats and fears just as during the 1950s cold war periods, the author has used the irrationality of some politicians and leaders such as Saddam Hussein and George W. Bush just as was mentioned by Klaatu in the 1951 classic film. In this context, the argument is that bad leaders are slowly destroying humanity and the universe just as were in the 1950s. As opposed to original 1951 movie which largely carried anti-nuclear message, there are a number of incidences in the movie â€Å"The Day the Earth Stood Still† which talks about the effects of our current environmental ignorance such as the current global warming as well as the fact that human beings can still change their ways for the betterment of our planet (Pardon, 145). In my opinion, the article â€Å"Revisiting a science fiction classic† demonstrates a number of strengths which have effectively helped the author to support his arguments throughout the article. For example by enacting fantasy using an alien as a champion for environmental conservation, the article highlights the urgent need for behavioral change for all the members of the contemporary society with regard to environmental conservation just as it was in the past with regard to the peaceful use of nuclear technology. The Author has also revisited the fear mongering depictions in the 1951 original classic movie in its environmental advocacy. For example, in the classic film, there are instances where the world is held ransom by the aliens unless everyone adopts the peaceful use of nuclear technology. Similarly the contemporary post

Wednesday, September 11, 2019

Behavioural finance Essay Example | Topics and Well Written Essays - 2000 words

Behavioural finance - Essay Example Incurring of additional risk helps attain high rates of return. There has been a proposal relating to the utility maxim and the general solution for the portfolio selection problem (Von Neumann and Morgenstern, 2007). The process of making an investment choice includes; choosing a unique optimum combination of risky assets and separate choice regarding to the allocation of funds. To obtain a maximum resulting satisfaction, there is combination and application of certain wants and commodities. The weakness of this model is it’s cumbersome to separate the purely technical from the ones in the conceptual nature. According to Mr. Jack Treynor, the total utility function can be given by U = f (E, a) illustrating the meters of distribution and the expected value and the standard deviation, where E indicates the future wealth and a shows the standard deviation under prediction (Markowitz, Miller & Sharpe, 1991). There is the preference of a high expected future wealth to a value which is low; this is known as ceteris paribus illustrated as (dU/dEw > 0). This leads to an upward slope as seen in the earlier graph of risk against the expected rate of return. For a simpler analysis, there is an assumption that an investor decides to commit an amount (W) of their wealth to investment. By letting R be the rate of return and W as the terminal wealth, then; R= (Wt- Wi)/Wi. The mean-variance under certain conditions leads to unsatisfactory predictions of behaviour. A model based on semi-variance is preferable basing on standard deviation and variance (Markowitz, Miller & Sharpe, 1991). There is an assumption that the curves can diminish marginal rates of substitution between E and ÃŽ ±, from the earlier equations. There is a derivation of indifference curves from the assumption that the investor wishes to maximise the expected utility and thus,

Tuesday, September 10, 2019

How convincing is Porters model of national competitive advantage in Essay - 3

How convincing is Porters model of national competitive advantage in explaining the characteristics and performance of the business systems of major economies - Essay Example There are some critical factors within this model such as demand and factor conditions, firm’s strategy, competition and structure, chance factors, supporting and related industries, and government intervention. Porter’s model of national competitiveness is regarded as an appropriate framework for evaluating firm’s competitive position. On the contrary, this model is not considered as a suitable framework from economist’s perspective. It is stated as a model that helps to determine competitive position of a company rather than a country or nation. This study would reveal real world scenarios where Porters model was beneficial enough to analyze competitive position of nations. The study has been divided into various subsections where theoretical model will be elaborated along with its application on nations. Michael Porter designed a new model to analyze the reason behind firms belonging to specific nations happen to design better strategies in comparison to other firms. Porter took into consideration ten countries such as UK, Germany, USA, South Korea, Japan, Italy, Denmark, Sweden, Singapore and Switzerland (Davies and Ellis, 2000). The main objective for designing this model was to identify why some regions possesses competitive advantage compared to rest. Diamond model was designed by Michael Porter was to predict sector’s or country’s competitive advantage. This particular model has been elaborated in figure1. As per figure1, this model helps in designing a structure required for achieving competitive position in a sector. The factors of this model play a significant role in context of achieving competitiveness for long-term (Smit, 2010). All the factors represented within diamond model are determinants of sectors. These factors encompass skills and assets which are important for competitive advantage of an industry. It even consists of information that provides guidance

Describe the Opium Wars in China that lead to the Treaty of Nanking Essay

Describe the Opium Wars in China that lead to the Treaty of Nanking. What were the most important factors that lead to the takeover by the West - Essay Example om China, but the monopolies existing among traders in China and unfair tariffs made it difficult for the East India Company to continue trading in silver and it finally resorted to trading opium for tea from China. Opium became very popular in China because during that time, there were difficulties in the economy and people in China were looking for a means of escape. The addictive drug opium provided just such an escape. Opium was prohibited but it was cheap and easy to acquire and the number of addicts kept increasing, at a substantial cost to society. People were trading silver and copper for opium, thus creating further losses to the economy. In the year 1838, Lin Tse-Hsu became the appointee of the Tao-Kuang emperor. Opium addicts were threatened, the drug dealing activities of foreigners were hindered by confiscating stores and demanding that they sign bonds guaranteeing their good conduct and other drug dealers were rounded up. However, all of these efforts did not prove to be a significant deterrent to opium trafficking, as a result of which Lin finally resorted to seizing 20,00 chests of British opium and burning it. This action was the direct cause of the Opium War, since Britain immediately declared war on China in retaliation for this gesture. The Opium War lasted for three years from 1839 to 1842. England was at a distinct advantage due to its superior naval and armed forces and it was able to defeat easily China in 1842. The Treaty of Nanking was formulated after this victory of the British and forced China to agree to several concessions. Firstly, Hong Kong was to be handed over to the British. Secondly, the ports of Foochow, Canton, Amoy, Ningopo and Shanghai were to be opened to foreign businessmen and missionaries. Thirdly, China had to pay 21 million silver dollars to the British. Fourthly, trade tariffs were to be moderated and transit inland fees were to be reduced. Fifthly, foreign officers were to be granted equal status as the Chinese

Monday, September 9, 2019

Rainforest cafe reserch project Research Paper Example | Topics and Well Written Essays - 1750 words

Rainforest cafe reserch project - Research Paper Example The management of the Rainforest Cafà © has an astute marketing plan. It adopts multiple and varied marketing strategies for new outlets. At the same time, it runs separate promotional campaigns for the mature outlets (EDGAR Online, 2013). Rainforest Cafà ©, owned by Landrys Inc., Houston, Texas, is a themed restaurant chain and offers something for all demographic profiles (Dulen, 1998). The ambience of Rainforest Cafà © stimulates the mind and emotions and appeals to the children as well as adults. Since inception, the cafà © has strived to deliver high quality proprietary entertainment to its clients and has earned a name in the marketplace. At present, the Rainforest Cafà © is a well-recognized family-oriented restaurant. The Rainforest Cafà © is an ideal place for the stimulus-hungry children. The sprawling interiors with a pulsing beat tend to leave the children in a state of awe. The sporadic thunder and lightening add to the ecstasy. Children can have a gala time at the cafà © as the elephants trumpet and chimpanzees chatter. The overall theme of the Rainforest Cafà © provides children a fun and frolic filled time. The special menu for kids adds to the craze. Parents tend to spend a lot on kids. They do not mind shelling out more money for a pleasurable experience for their offspring. Children always have that extra pestering power which tends to result in repeat visits and heightened spending at the cafà ©. There is an increasing trend of celebrating birthday parties at restaurants. The Rainforest Cafà © is in an enviable position to cash in on this trend. The total population of UK is 63.4 million. 17 percent of the population is less than 14 years old. This section of the society will obviously be dependent on their parents so far as any social outing is concerned. 41 percent of the population is in the age bracket of 25-54 years. This section of the society will have young children and

Sunday, September 8, 2019

Assignment 2-Exploring Ethnographies Example | Topics and Well Written Essays - 500 words

2-Exploring Ethnographies - Assignment Example This is observed meticulously and scrupulously. The men of any age, meeting by chance on the road or any place one or more women, not only will keep from being stopped, they will not look at them, [Page 20] 134 cont. will even turn away to look toward the opposite side, as though to indicate that they want even to escape the danger and occasion of their eyes meeting. Failure in this traditional precept is considered very grave, and the culprit would fall into the general indignation, into the censure of all, since any look or smile between persons of different sex and diverse dynasty is generally considered bad and immoral. Never will the women of one dynasty let themselves be seen eating or drinking in the presence of men of another dynasty, and vice versa. There is not, however, any prohibition of these relations between individuals of the same dynasty, be they men or women. Therefore, when one sees, a man talking to a woman, one is to understand immediately that they are from the same dynastic branch, because, even between husband and wife, the same rules are observed in public, even though not so scrupuleusly; it will, however, be difficult for the man to talk or to offer anything to his own wife in public, to place her by his side or for them to be together, except when they leave the house and both go to gather fruits, small tubers, or other things in the ferest; this is considered a private act.† 6. What aspect of the culture subject of your group differs from a practice (or aspect of a practice) in modern-day American culture? Write at least three sentences explaining how it differs, providing at least one example. America is rich in cultural diversity; one can find people belonging to different backgrounds, ethnicity, and race sharing the same space. American constitution allows full freedom to its residents to enjoy life of their own choice. A Negro can marry an Irish born, or a Latin can

Saturday, September 7, 2019

Contemporary Ethics Essay Example | Topics and Well Written Essays - 1250 words

Contemporary Ethics - Essay Example Internet and cell phone communications have been cited as tools for Cyber bullying. According to Hopline, what appalls even more is that Cyber bullying occurs during kids’ class time. Hopline cites that cyber bullying has far reaching implications on kids, so that the victims (kids) of cyber bullying only feel safe when in their bedrooms. According to Hopline, it does not under all circumstances hold that cyber bullying causes physical harm. However, cyber bullying is mostly associated with causation of harmful emotional fallout which may cumulate to other gar reaching consequences. Hopeline cites an example of Megan Meier; the girl aged 13 who committed suicide after belittlement by a hacker (her mother’s friend) that posed on MySpace as a boy aged 16 years. Hopline acknowledges that peer to peer cyber bullying is the most rampant, but its implications are not so severe. Effective curbing of cyber bullying would entail instilling of ethical morals among the youth, whic h will help them suit to information technologies. Hopline argues that there can be no an over-reactive approach as parents barring their kids from accessing technology in attempt to curb cyber bullying. Hopline suggests that an appropriate ramification procedure would entail the parents convening to open meetings, where then the parents can share and appropriately advice their kids on cyber bullying. Parents should be tactical so to dispel rebellion from their kids. Parents should not ignore the fact that all have under high risks of cyber bullying; terms such as ‘some kids are immune’ should not exist since all are sensitive to belittlement. Other intervention techniques should encompass teaching the kids on the importance of respect. In the case where kids are cyber-bullied, appropriate intervention procedures should be followed before the situation gets out of hand. It is factual that

Friday, September 6, 2019

WAN devices Essay Example for Free

WAN devices Essay Switches are very similar to hubs with the exception of containing the ability to read the packets received. This means that the device gets the packets, reads them and only forwards them to the appropriate attached device. Because switches can read the packets instead of just sending them on to all devices, it means they operate at the data link layer, layer 2. Repeaters A repeater is a simple device that boosts the signal so that it can travel much greater distances or avoid obstacles. They operate at Layer 1 of the OSI Model. Hubs A hub is simply a device that connects parts of LANs together. They are multiport devices and copy the data received from one port onto the other ports. Hubs operate at the physical layer (level 1) as they operate by using simple physical transmissions to send data from one device to the next. Hubs only use bits to send the data and cannot understand anything above bits on the OSI model. Bridges Bridges and Routers are quite similar they both direct traffic between two devices. A bridge will connect hardware together using hardware assigned MAC addresses. Bridges are a layer two device. This means that bridges cannot determine the type of network that theyre running on. Routers Routers, like hubs and switches, connect together multiple networks. Routers use headers and forwarding tables to create and send packets to determine the path through the networks and this means they operate at level 3, the network layer. Gateways Gateways are used to interface with another network that uses different protocols. This allows two different systems using two different protocols to work with each other. Gateways operate at all levels of the OSI model. Gateways can handle what can access the network and what cannot and helps to control the applications that require networks to run. LAN Connectivity Local Area Networks are very easily constructed with the use of these devices. LANs are quite easily created using; routers; hubs, switches, bridges; gateways and repeaters as well as UTP wiring. The network consists of many devices. Depending on the purpose of the network; the devices attached to it will be different. A network that needs an external connection will include a router as this makes external access possible but Local Area Networks could use hubs, switches or bridges to connect parts of the network together. Gateways are also a possibility when connecting devices together that dont necessarily know how to interface with each other. Connectivity Uses Range Main Points Copper Twisted Pair Cable Short to medium distance networks 100 meters. Â  Can have problems with interference. Â  Cheaper than newer types of technology. Â  Main different types used for many varied uses. Created when two conductors are twisted together. Â  More twists desirable less interference. Coaxial Cable TV, broadband and radio Between 750ft and 1500ft dependant on cable type Uses insulation to carry the signal with the least amount of interference. A lot of research has gone into creating the most effective systems those with space carry the signal better. Â  Extremely cheap and easily available. Â  Two types rigid and flexible. Fibre Optic Cable TV, broadband and radio 160km when used with amplifiers. Â  Light is sent down an optical cable. Â  Created in the 1980s. Â  Replacing older systems. Â  Much more reliable less chance of interference. Â  Expensive. Wireless Ethernet Sharing a connection or resources across a short distance network 30 meters. Standards known as 802. 11. G and B are the most common. Â  Requires a wireless router to project the signal to a computer or other electronic device. Satellite The internet and WWW. Worldwide signal sent across many satellites. Bandwidth of 34 Mbit/s* Ability to send large amounts of information across the world. Microwave Internet, mobile phones, networks, TV and many other uses. Line of sight unless amplification is used. Â  Transmitter and receiver need to line up. Â  Used in many ways 802. 11g is one example of a microwave. Importance to Small Office, Medium Business and Large Company on a scale of 1 to 3. Small Office Medium Organisation Large Organisation Speed 2 2 3 Size 3 2 1 Cost 3 3 2 Connectivity 1 2 3 Selecting Equipment Choosing any type of network equipment is a very important decision. Each and every organisation and office will be unique in its requirements. Speed Speed is a necessity for some offices; usually those that rely heavily on the network for day to day activities. The more computers that are connected the network, the more bandwidth the equipment must be capable of providing. A single slow device on the network is going to slow down everything as networks are only capable of running at the speed of their slowest device so ensuring that all devices are capable of carrying the correct speeds. Other networks are not going to need high speeds such as those that only connect just a few computers together, or those that will only connect to the network occasionally. Size The size of a device is not necessarily all that important for most businesses if they have the room to keep it. For a medium to large business, finding space to place your hardware is unlikely to be a major problem. Smaller businesses will usually have less space to place their hardware, particular the type of safe and secure space that is required by such important devices. Finding a device that is small enough to be stored but still fulfils other requirements is required. Cost The cost of a device is not going to be all that important to larger businesses; spending a lot of money on a useful device seems only natural. But when spending the vast majority of a networks budget on a single device, cost definitely becomes a factor. It must be the right device and it must do the job its required to do but it should also be at the right cost to the business. Connectivity Connectivity is heavily dependent on the number of computers that are being connected as well as what services the network is trying to provide and how the devices are going to be connected. The device that is eventually chosen must be a combination of the most important needs of the network. Placing a value on each of these factors should suggest the device that is needed.