Monday, September 30, 2019

Record Management System

ACKNOWLEDGEMENT We would like to express our sincerest appreciation and heartfelt gratitude to the following who in one way or another, made this research possible. Above all, to our almighty God, for giving us His divine providence through the course of this subject; for providing us with talents, enthusiasm, and strengths needed to accomplish this thesis. To our family and friends, who provided priceless love and support. To our adviser Prof Jayson R. Hermognes, for his unending patience and guidance during the entire process of the study.Director Lualhati for her approval to conduct our research for our study. To the administrator and owner of 4K Garden Resort headed by Mr. Anatole A. Mendoza. The president of the company, Cymbeline M. Filoteo,for providing the necessary documents to make our thesis possible. To our beloved university, who shared with us their precious time to extend their guidance and efforts at various stages of this project, Prof. Leonardo Correa and Prof. Sagi sag P. Cruz faculty member of the PUP-SMB; we offer our sincerest gratitude. The Researcher DEDICATION This thesis is lovingly dedicated†¦.To our Almighty God for unconditional love and blessings, for giving us strength, good health and knowledge while doing this research study. To our beloved parents who supports our financial expenses and always believe in our skills and knowledge. To our respective professors, Mr. Jay-Arr Tayao and Mr. Joel Palad for giving us drive and discipline to tackle any task with enthusiasm and determination for us to finish this study. To the company, Paraiso ng Pagmamahal Memorial Park for giving us information and the permission to make a system that will help them in the future. TABLE OF CONTENTSTITLE PAGE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. i CERTIFICATION AND APPROVAL SHEET†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ ii ACKNOWLEDGEMENT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. iii TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. iv CHAPTER I THE PROBLEM AND ITS BACKGROUND†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 Background of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 10 History of the Company †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 12 Conceptual Framework†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 Statement of the Problem†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦16 Objective of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 Scope and Limitation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦17 Significance of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8 Definition of Terms†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 CHAPTER II REVIEW OF RELATED LITERATURE AND STUDIES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 22 Foreign Literature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦. 22 Local Literature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 29 Foreign Studies†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 30 Local Studies†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 31 Synthesis and Relevance to the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 32 CHAPTER III RESEARCH METHODOLOGY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 33 Method of Research†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 33 Population, Sample Size and Sampling Technique†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦. 34 Description of Respondents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦. 35Research Instrument†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 36 Data Gathering Procedures†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦ 38 Statistical Treatment of the Data†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦39 CHAPTER IV PRESENTATION, ANALYSIS, AND INTERPRETATION OF DATA†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦40 CHAPTER V SUMMARY, CONCLUSIONS AND RECOMMENDATION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 56 Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 56 Findings†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦. 56 Conclusions†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦.. 59 Recommendations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 59 Bibliography†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦60 LIST OF TABLES Table 1 Problems Encountered by the Respondents †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 40 Table 2 Mean Summary of the ExistingAnd the Proposed System †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 45 LIST OF FIGURES Figure 1 Administrator Login Window †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 47 Figure 2 Security Unlock Code Window †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 48 Figure 3 Main Menu Window †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 49 Figure 4 Map Window †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦. 50 Figure 5 Transaction Form Window †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦50 Figure 6 Update Balance Window †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 51 Figure 7 Database Window †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 52 Figure 8 Price List Window †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦. †¦.. 52 Figure 9 Print Window †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦.. 53 LIST OF APPENDICES Appendix A Evaluation Form Appendix B QuestionnaireAppendix C Interview Guide Appendix D Clients/ Organizational Chart Appendix E Developers Org Chart Appendix F Office Layout (Proposed & Existing) Appendix G Data Flow Diagram Appendix H Program Flowchart Appendix I System Flowchart Appendix J Entity Relationship Diagram Appendix K Visual Table of Contents Appendix L Computation of Evaluation Appendix M Organizational Flowchart of Proposed System Appendix N Cost Benefit Analysis Appendix O Gantt Chart Appendix P Users and Tra ining Manual Appendix Q End User License Agreement Appendix R Program Codes Appendix S Supporting Details Appendix T Curriculum Vitae

Sunday, September 29, 2019

Persuasive paper on video game violence Essay

Today’s youth live in a time where video games are a fixture of entertainment. Video game consoles are found in almost every home, including a child’s bedroom. I believe that the portrayal of violence in video games is not the reason for the increase of violent acts committed by and against youth. Parents and the government should understand it is not the fault of the game itself. Modern parents should be engaged in the messages their children are receiving from video games and the images they are allowing them to witness. Creating more laws and legislations surrounding the sale and content of video games will not provide the protection that parents think they will. I believe that parents who refuse to engage in the content their children are exposed to must educate themselves actively and be aware of what their children are observing when they play video games. They need to actively seek out information about the game and what types of content it contains before their children start to play. Parents should not solely rely on the rating provided by the Entertainment Software Rating Board (ESRB), an independent board that provides ratings to video games. Games with the rating of Everyone, or â€Å"E†, contain mild violence. According to a study from the Journal of the American Medical Association where 55 video games were played, â€Å"27 games (49%) depicted deaths from violence† (Thompson and Haninger). Parents who do not take the time to learn about a game first risk their children killing in the game that is rated for â€Å"Everyone†. Children need their parents to talk with them and explain that what they are seeing is not real and that violence like that is not appropriate behavior. A study by the American Psychological Association found that game players self-reported that â€Å"game playing was found to elicit more fear than anger, depressed feeling, or pleasant relaxation, and respectively; however it elicited more joy than fear† (Ravaja, Saari and Turpeinen). Desire to commit violence was not one of them. Parents also need to set clear boundaries on what is appropriate and what is not for their children, based on their own beliefs. The violence portrayed in video games exists without a call to action. The games do not command players to go outside of the game and commit the same acts. It is also not the duty of lawmakers to limit accessibility or ban content all together because they fear that the violence could incite an incident. The British Medical Journal originally published findings from the United Kingdom Millennium Cohort Study. The study was conducted over 10 years and included more than 11,000 children. It â€Å"did not find associations between electronic games use and conduct problems, which could reflect the lower exposure to games and/or greater parental restrictions on age-appropriate content for games† (Parkes, Sweeting and Wright). Parents should determine what is right for their children and what is not. The boundaries of every family are different and need to be enforced by the parents. The creators and retailers of video games often become the scapegoat for lawmakers and government officials when a violent act occurs that involves or is perpetrated by youth. Parents rely on their legislators to take up their causes and seek out laws that will promote their cause. Regulating video games on their behalf is one of those causes. Legislative bodies across the country are looking for ways to prevent incidences of violence, especially gun violence like what occurred in Sandy Hook Elementary in Newton, Connecticut and the movie theater in Aurora, Colorado. The state of New Jersey outlined a plan last year that included measures to limit and restrict how retailers merchandise games in retail outlets and would require parental consent for kids to purchase games rated â€Å"Mature† or â€Å"Adults Only† (Friedman). The state of Massachusetts also considered legislation that would assemble a group to â€Å"investigate the influence of violent video games and to find if there is a connection with real world violence† (GamePolitics Staff). However, these, and other laws being debated across the country, face a significant legal road block. Video game retailers already take precautions and preventative measures to keep certain games from being purchased by children and further regulation on a legal level is not needed. The Supreme Court heard Brown v. EMA, a case against California’s laws that restricted the sale of certain games to teenagers based on state’s determination that they were violent. The basis of the case came down to a First Amendment issue because California’s specifically singled out video games and no other form of media. The Court struck down California’s law and ruled â€Å"the games, like books and movies, are protected under the First Amendment’s guarantee of freedom of speech. The Supreme Court also said it found no convincing link between the games and real world violence† (Friedman). Justice Antonin Scalia stated, â€Å"Psychological studies purporting to show a connection between exposure to violent video games and harmful effects on children do not prove that such exposure causes minors to act aggressively† (Friedman). Regulation by the government is a clear-cut defense for parents who battle with their kids about certain games being purchased and played. It is easier to tell a child that they cannot have something because someone else restricts it and not because the parent forbids it. It means the child is not upset with the parent and diverts their displeasure. Parents do not have to be the â€Å"bad guy† because a law takes care of that for them. I have personally witnessed parents telling kids that they cannot purchase a particular game because it is too graphic or not for their age. Most of the children are less than pleased by the response and show it. I imagine most parents want to avoid that reaction from their child in a store. Creating legislation that the Supreme Court found infringes on the collective’s First Amendment rights or circumventing the current self-regulation of the video game retailers is not the solution. Today’s parents should stop seeking a solution for interference outside of their own decisions as a parent by increasing legislation on games. Parents to the next generation are severely taxed by the demands of day to day life. The one item that they cannot be relaxed about is the entertain they choose for their children. Buying a video game console and unleashing a child into the world of gaming is almost a rite of passage for parents, especially parents that grew up playing Super Mario Bros. It is unwise to do so without rules, boundaries, and some due diligence on their part. They should be educating themselves on the games and need to be reviewing game content information available from web sites like IGN. com. Parents should be supervising their kids playing the games that they may not be familiar with yet many do not. They should also be looking at what they can control in their own home, including utilizing parental control settings on the consoles themselves and restricting online and downloadable content. Parents should not lean on lawmakers to establish those confines for them nor does not lie in society’s hands. The ultimate responsibility lies with parents who are willing to unplug what video game content they do not want their child to play. Works Cited Friedman, Matt. â€Å"Game over? Christie’s plan to restrict video games would likely be overturned, experts say. † 24 April 2013. NJ. com. Web. 3 March 2014. GamePolitics Staff. Massachusetts State Senator Proposes Study on Violent Video Games. 14 November 2013. Web. 3 March 2014. Parkes, Alison, et al. â€Å"Do television and electronic games predict children’s psychosocial adjustment? Longitudinal research using the UK Millennium Cohort Study. † British Medical Journal (2013). Web. Ravaja, Niklas, et al. â€Å"The Psychophysiology of James Bond: Phasic Emotional Responses to Violent Video Game Events. † American Psychological Association (2008): Vol. 8, No. 1, 114-120. Thompson, ScD, Kimberly M. and Kevin Haninger. â€Å"Violence in E-Rated Video Games. † Journal of the American Medical Association (2001). Web.

Saturday, September 28, 2019

An analysis of emerging markets

An analysis of emerging markets Introduction According to Jensen, T.H and Larsen, J.A.K (2004) from Denmark National Bank, emerging markets are defined as â€Å"sets of markets where by its economic and financial potential become sharper, an average of 5% of annual growth, an improving purchasing power-adjusted exchange rate due to lower price levels in these emerging markets and a fluctuated economic growth which explains a relatively larger share of the global cyclical fluctuations than their economic weight would indicate†. According Cavusgil, S.T (2002) the main characteristic of an emerging economy is it has started economic reform process to alleviate problems and have achieved steady gross national product (GNP) per capita growth, regional economic powerhouse with large populations, large resources bases, and large markets, increasing middle income population and governments tend to promote easy fiscal and expansion monetary policy to encourage Foreign Direct Investments (FDI) and improve the living standards of its people. In this assignment, I have chosen China and Brazil as my choice of emerging markets. In my findings, I will discuss about business environments when doing business in these countries, suitable entry modes when dealing with different emerging markets and major business issues when entering emerging markets. In my conclusion, I will provide a conclusion and some recommendation when entering different emerging markets and justification on using different entry modes when dealing with different emerging markets. Findings These days, multinational companies are rushing into emerging markets for very obvious reasons. Emerging markets are full of potential with its untapped markets which has the ability to create new demand for consumer goods. This new wave of demand would help these multinational companies to gain more market shares and profits as liberalisation and globalisation forces are bringing the competition for customers into a higher level. With the satur ation of markets in developed economies such as US, multinational companies such as Ford’s Motor has turn to emerging markets such as India to maintain its position as one of the leaders in the automobile industry. (The Economists, 2009). Why are emerging markets so attractive to international companies? the worthiness of these emerging markets. PEST analysis will be conducted on China and Brazil. Political China has a fairly stable political stand these days. Its central government went through a political reform in 1978 and since promote openness in having political relationship with foreign countries. However even with its political reform, China remained as a communist State with high intervention by the central government on economy issues. (CIA FactBook, 2009). With its political reform, liberalisation forces sweep through the country where by exports, imports and FDI are moving in and out smoothly without much interference from the central government comparing to befor e its political reform. China also gained entry into World Trade Organisation (WTO) in 2001 and this represents that China has the obligation to act within the context of WTO when dealing with trade issues. China is country which emphasize on â€Å"guanxi† or good relationship. According to Financial Times Limited (2002), having bad relationship with the government officials mean cutting down the chances of entering China or having any good business prospects in this country as can be seen in the PepsiCo case.

Friday, September 27, 2019

Why did the Renaissance occur Essay Example | Topics and Well Written Essays - 1000 words

Why did the Renaissance occur - Essay Example About this era, historians hold two different opinions like it was either extension of Middle Ages or dawn of a new era. The Renaissance age is known for new thinking and creativity. Between 1350 and 1550, the classical period of Europe was revived to a large extent. The cultural activities that occurred during Renaissance were mostly motivated by the Greco-Roman civilization. The Italian Renaissance was not just limited to the accomplishment of Italians artists and intellectuals but rather was reflection of the upper classes that comprised only small proportion of the European population. However, the impact was equally strong on the common people especially in the cities where the cultural movement was most prominent (Spielvogel, 340-341). Birth of Renaissance As already mentioned, Renaissance is essentially a literary movement of the upper classes. Writers from that era especially Petrarch, had held an indomitable passion for ancient Rome including classical architecture, art and especially the Latin language. He attempted to emulate ancient Rome’s literary men like Cicero who was highly fluent in the language. His passion for the classical era was so engrossing that he even tried to dismiss the span of hundred years between the Ancient age and Renaissance era. According to Petrarch, that era that he belonged was more an awakening of new age than Renaissance which means rebirth. In order to study ancient Rome, Petrarch introduced curriculum termed as studia humanitates which included humanism as philosophy. Humanism is not just a philosophical or religious concept, but basically â€Å"an attitude toward learning and toward life† (Wiesner et al., 248). This new approach slowly spread from Italy to other parts of Europe like France, Germany and Spain, and this was the birth of the Renaissance era. Renaissance was not a singular event like the French revolution and occurred over a period of two centuries in various parts of Europe (Wiesner et al., 248-249). The impact of Renaissance is not only restricted to literature and art, but also equally on language with humanist schools adopting Classical languages like Latin, Greek and Hebrew in their curricula. In northern Europe, humanists focused on bringing back the faith and morality in the values of the Church which got lost mainly after the Black Death tragedy. For many historians, Renaissance era was continuation of the Middle Ages like family remained the most important social recognition of an individual. Moreover, in spite of people becoming more materialistic, religion remained an important aspect of lives of both elite class and the common people. For instance, although artists began to get their true recognition worthy of their skills, they were still expected to pay taxes like other common people of the community (Wiesner et al., 269-270). Slavery which was a common practice in the Early Middle Ages but ceased in the eleventh century was revived during the Renaissance era more because of lack of workers after Black Death. The import of foreign slaves was legalized in the Italian city Florence (Spielvogel, 345). Renaissance happened as a result of reverence for the classical era mainly ancient Rome, and in the fifteenth century the humanists began to focus on Greek philosophy, art, architecture and literature. Renaissance culture was essentially a result of product of emulation of the classical philosophy and literature (Wiesner et al., 249). The birth of Renaissance era also happened from a shift of social perspective. In the medieval age, family was considered the smallest unit of society, and it was the group efforts and accomplishments that emerged as popular rather than individual successes. Even objects of art were attributed to group

Thursday, September 26, 2019

Multicultural organization Research Paper Example | Topics and Well Written Essays - 1500 words

Multicultural organization - Research Paper Example This research paper studies the various characteristics of the multicultural organizations that practice diversity principles and how they contribute to the competitive advantage of the organizations. Which characteristics comprise a multicultural organization? Globalization has brought together people from different countries in a single platform especially through the use of the internet. The concepts and the dimensions of Multicultural organizations have been reflected in the works of Milton Gordon. There are mainly various dimensions from which the facets of multicultural organizations should undergo analysis (Gordon, 1964). The aim for any organization should be contributing to the integration of the society by and large. Every multicultural organization by the process of acculturation would bring in the dominant culture of the organization in tune with the other cultures which may not be so prominent. Due to the presence of different types of people in the organization cultural conflicts is to some extent inevitable. An ideal multicultural organization would aim at integration of the cultural norms of both the minority and the majority at the same level so that the employees maintain a uniform code of conduct. At the same time all the cultural groups should be able to maintain their own identities. In other words there would be coexistence of all the cultural practices. Along with this the organizations should also aim for a structural integration in which people from different cultural backgrounds can work under the same roof in a healthy atmosphere. There should be uniform and equal growth and promotion policies for all the employees irrespective of their nationality, race, religion or gender. This diversity and equal opportunity measures should exist not only in the top hierarchy but also across the different lower or middle levels of the organization pyramid. Not only during the course of the daily work but also outside the predefined work hours shoul d this integration be a practice. This informal process of integration would make it possible for the employees to develop the social and business relationships beyond the premises of the office. If the people from one background participate in the social events of people of another culture, it would make them behave in a bounder less fashion and new ideas would be generated. Thus the unofficial channels of communication between the employees should also be developed and nurtured in multicultural organizations (Cox, 2001). A multicultural organization should not have any bias towards a particular culture. Any kind of discrimination should be banned and if any employee is found to be exhibiting such behavior legal measures should be taken against that entity. Cultural prejudices should also not be encouraged. Conflicts may arise due to such prejudices which would hamper the equilibrium of the organization which in turn would have an adverse effect on the productivity of the employees . This conflict may take the form of interpersonal conflict or intergroup conflict. In case of intergroup conflict the problem is accentuated and it gives rise to an atmosphere of intolerance and hatred. This kind of attitude should not persist in any organization that has much higher goals to achieve. Thus the human resources department especially has to take a

History of Film Genres Essay Example | Topics and Well Written Essays - 1250 words

History of Film Genres - Essay Example Although that is the truth of the situation in the entertainment industry, the reality of the film-making world is that all of these films are actually categorized per genre. These genres include but are not limited to historical subject, intended impacts, formal criteria, subject matter, and finally, film style. Films generally classify their type of film per genre. By doing so, the movie aficionados and film buffs are given a chance to fully grasp and understand the evolution of our society via films. The slow but sure evolution of film, from the silent films to the colored talkies, to the high tech 3-D films that we have in the cinemas today all focus on the changes and development of culture or historical period within which certain films are produced (â€Å"The History and Evolution of Genres†). It is through this developmental context that Hollywood managed to produce such a diverse set of films stemming from the Western hero in the 1940's and 50's which eventually evolv ed into group heroism as explored in the 1960's and 70's. This group heroism exposed the shift in our society from the open land, pioneering work place of man towards the more organized group of working people in corporations and companies. Eventually, the increase of interest from within our society in the urban crime and international espionage era of the 1970's and 1980's gave way to the current trend of police/detective and spy / thriller genres (â€Å"The History and Evolution of Genres†). As seen in the above listing of film genres, one can note that films are composed of various forms which are identifiable by type. This means that the film categories or classifications can be done based upon a specific criteria. These criteria could be based upon films that have recurring/similar/familiar/instantly recognizable patterns, syntax, film techniques/conventions. content and subject matter, themes, mood, period, plot, central narrative events, motifs, styles, structures, si tuations, recurring icons based upon influence on society, stock characters, or even film stars. Some of these films could even by hybrid type and therefore employ the use of several genres in one film, this is what is known as a hybrid film in Hollywood (Dirks, Tim â€Å"Main Film Genres†). Historically, one of the most popular film genres includes are epic films such as The Ten Commandments, Quo Vadis, and Gone with the Wind. These types of films cater mostly to audiences that have a keen interest in costume dramas, historical dramas, war films, medieval romps, or period pictures. Although epic films have been known to share the elements of an adventure film due to their shared need for a vast, panoramic backdrop, epics still tend to stand under its own spotlight due to the uniqueness of the production values. These production values include but are not limited to: ... an historical or imagined event, mythic, legendary, or heroic figure, and add an extravagant setting and l avish costumes, accompanied by grandeur and spectacle, dramatic scope, high production values, and a sweeping musical score (Dirks, Tim â€Å"Main Film Genres†). Although the epic and war films share certain contexts when it comes to the story being told due to the lavish budgets, costumes, and settings, these two particular genres tell two different stories. While the epic can tell the story of an imagined event or heroic war figure, the war film depicts the cold-hearted brutality and heart breaking real life events

Wednesday, September 25, 2019

Major paper 1 Essay Example | Topics and Well Written Essays - 1750 words

Major paper 1 - Essay Example I hope to gain more from the university and the American society in general. The essay examines my learning experience, not just in education, but also in other areas of culture. The paper, therefore, attempts to provide a comprehensive narrative of my experience as a Chinese student in America, forming a potential foundation for others in my position to adjust and gain maximum benefits from the American society. Before coming to America, I always had a dream to study abroad in the hope of pursuing high quality education. In addition, I hoped to experience other people’s cultures, while getting a global point of view of issues surrounding the modern society. My parents and peers encouraged the move, terming it as a path towards self-discovery and exploration of my career options. Given all these factors, my move to America was filled with high expectations, hopes to make friends immediately, and enjoying all the things that the new culture had to offer. Even though I was slightly nervous during my flight from Beijing, my excitement was more than any concerns. For this reason, I did not take possible challenges into consideration and as a result, I was not fully prepared for the American life. On arrival from China, I was welcomed quickly but warmly at the airport. It is here that I began observing the differences between China and America. For example, while back at home people take their time to show you around or at least give you directions to wherever you want to go, majority of Americans do not have the patience for that. I also came to realize that many people in America are highly suspicious of strangers and therefore, interact cautiously with them. I also noted that unlike in China, where taxi drivers keep to themselves, in America they tend to ask many questions. It was rather difficult to keep up with the basic conversation after arrival, since I only understood a few English words. In consideration of these observations, it would perhaps be

Tuesday, September 24, 2019

To be discussed with writter Essay Example | Topics and Well Written Essays - 5000 words

To be discussed with writter - Essay Example In the proposed research study, the extent to which celebrity endorsement influences the consumers will be determined. The report will not only discuss the impact of celebrity endorsement on consumers but it will also compare the consumer purchasing behaviour as a result of celebrity endorsement in the past, present and future. The primary research objectives will be to evaluate the influence of celebrity endorsement on perceptions and attitude of consumers towards the brand, celebrity and advertising. To investigate the research question, both the qualitative and quantitative research methodology will be used. In the qualitative research methodology, the theoretical concepts and published research work will be used. Primary data will be collected through a survey which will be conducted in location and a total of 250 participants belonging to different professions will be asked to fill the designed questionnaires. The questionnaire will be designed to collect data on demographics an d selected variables. The identified dependent variables are perception of consumers about the brand, perception of consumers about the brand, attitude of consumer towards endorser, attitude of consumer towards brand, attitude of consumer towards advertisement, Popularity of advertisement, effectiveness and sales and the independent variable are Trustworthiness, characteristics of endorser, attractiveness, likeability and awareness. The collected data will be analysed through SPSS software tools such as cross tabulation, frequency analysis, correlation and internal consistency analysis. The potential problems that can emerge while conducting this research study include the unwillingness of consumers to cooperate, socially acceptable answers, self interest of public and geographical limitation. It is expected that findings of this research study will provide insights to the consumer buying behaviour and the impact of celebrity

Monday, September 23, 2019

Voluntourism Research Paper Example | Topics and Well Written Essays - 2250 words

Voluntourism - Research Paper Example Voluntourism comes from a desire to contribute something, however small, to the wellbeing of people who are otherwise disadvantaged. It gives those who get involved in it the opportunity to visit new countries, experience new environments, and most of all, to learn about the cultures of those people among whom they will be living. Voluntourism provides regular people the chance to visit places, which they would otherwise not normally visit, such as the slums in less developed countries. Some types of voluntourism involve people visiting places for the purpose of studying their environment, or being able to conduct other scientific studies. Those who participate in voluntourism projects have to provide a fee whose purpose is to cover the expenses during their travels in different parts of the world. Furthermore, the participants are required to participate in projects within the countries, which they visit, and this is usually based on their location and their personal interests. The people who originally went for voluntourism tended to have a direct connection to the causes in which they were going to volunteer. The organizations that facilitated their travel considered the duration of their travels to be of the short-term, volunteering in projects in the countries, which they were visiting. ... These often gave people the opportunity to contribute to these projects for short periods before going back to their home countries. The origins of what came to be voluntourism can be traced back to the United States Peace Corps, which created a path for volunteers (voluntourists) to travel all over the world (La Prensa San Diego, 2011). Later, the need to travel, while contributing something to the less advantaged communities in the world, became immensely popular among college students; this led to the development of exchange programs, which enabled students, to tour to and study in the countries of their preference. Not only did these students get to know more about these countries and enjoy themselves, some even volunteer in local projects (Wagner, 2009). Voluntourism also came to affect the scientific field because some scientific organization saw it as a way through which they could get the public interested in science. These organizations facilitated the bringing collectively of scientists and unpaid assistants in various locations around the world, which had scientific projects. This served a dual purpose as it provided free labor for scientists in the field, that is, the volunteers while it was also a source of additional funding to the projects, through the fees paid by the volunteers. Voluntourism picked up pace in the 1990s when companies in the travel industry developed means through which individuals could go on vacation, and while on it, also volunteer in various projects. These companies targeted those people who wanted to travel and had no prior experience with causes. The products provided by the travel industry attracted a large number of young people, who tend to be the most adventurous of all age groups (Hansen, 2009).

Sunday, September 22, 2019

WiFi RealTime Location Tracking Systems Essay Example for Free

WiFi RealTime Location Tracking Systems Essay Wrireless networks has affected large and small companies alike. While Radia Frequency Identification (RFID) tags based networks have gained popularity over the years, there are also other wireless networks available that are being tested in order to provide same functionality and more. Wi-Fi and blue tooth are two of the examples of such networks. This short paper discusses the use of Wifi. Wi-Fi Networks WiFi generally comes under the umberalla of RFID. WiFi ID is actually an active RFID system that uses the air communication standard 802. 11. There are also other active RFID systems that use standards other than 802. 11 and operate on different frequencies. One of the important aspect of this scenerio is to understand thje difference between the RFID tags and Wifi tags. RFID Tags vs. WiFi Tags In order to use passive RFID tags, you need to have reader after every few feets to read the tag. For active RFID tags a radio sensor needs to be deployed that uses different technologies to sense the tags in order to determine the location of the tag. Antennas are also required. This means that you need to built an infrastructure to deploy both types of systems. Like Best Buy is doing. When you are using a WiFi based system that are aslo called Real Time Location Systems (RTLS), you only need to set up the WifFi network in the company and can use any underlying technology in order to make it work. RFID tags can also be used here, but adavnatge is that you dont need to set up the RFID network infratsurcture that you needed to incorporate before. In RFID tags, for short range identfication, High frequency tag is used and for short range identification, active UHF tags are used that operate on 900 MHz or 433 MHz. Both these type, as discussed require a complete insfrastructure to be built. However, WiFi operates on 2. 4 GHz. These 2. 4 GHz can be used in the network. For a company like BestBuy, choosing WiFi has an extra advantage that it will already have 802. 11 network infrastructures in place and this will save money for the company. The only things they need to buy are the WiFi tags. Applications The WiFi network infrastructure can provide many application to the companies like BestBuy and some of them include location-based network access, intelligent information management and wireless asset tracking. The WiFi tags can exactly point out the location of the tag. This can also mean that customer walking into the store can have the contents on his PDA according to the position where he is standing. Statistical reports can be generated n the basis of information of how much time a customer spends at a particular location and what consequences this can have using data mining techniques. Once the tagging has helped a customer locate items and a shopping list has been completed, the system can store this list for future reference to the particular customer. The underlying software can prepare a probable list of items for that particular customer. Another important application of WiFi tags can be theft prevention. For example, if a certain item is to be protected, the system will attach a flag to it whenever it is taken from the shelf and added to a cart. The system can then track the item until it reaches the check out line. If the item does not reach the check out line and leaves the store, it will be an indication of a theft and action can be taken against the customer. Therefore, the WiFi network can be employed for security of valuable assets as well. Therefore, WiFi tags can be used beyond item tracking systems such as inventory control systems to easily manage large inventory. References ABI Research. (2006, October 23). Active RFID and Wi-Fi in the RTLS Market: Asset Management for Automotive, Defense, Healthcare, and Transportation Vertical Markets. Retrieved March 13, 2008 from http://www. abiresearch. com/products/ market_research/Active_RFID_and_Wi-Fi_in_the_RTLS_Market Garfinkel,S. Rosenberg, B. (2005) RFID: Applications, Security, and Privacy, Addison Wesley Professional. Kowalke,M. (2006, October 23). RFID vs. WiFi for Hospital Inventory Tracking Systems. Retrieved March 13, 2008 from http://blog. tmcnet. com/ wireless-mobility/rfid-vs-wifi-for-hospital-inventory-tracking-systems. asp RFID Radio. (2007, July 17). Episode 005 Making Business Sense of Real Time Location Systems (RTLS). Retrieved March 13, 2008 from http://www. rfidradio. com/? p=12 Sullivan, L. (2005, October 17). InformationWeek. BEST BUYS SPIN ON RFID. Retrieved March 13, 2008 from http://www. informationweek. com/ story/showArticle. jhtml? articleID=172300921

Friday, September 20, 2019

Gender Differences in Communication | Essay

Gender Differences in Communication | Essay ‘For men and women, communication can be a very long drive, using different roads often to get to the same place.’ Men and women differ in many ways. They view the world through different lens. One of those differences is that they have different styles of communicating with others. Women are said to have expressive characteristics and men instrumental characteristics. There are lot of factors on which depend the way one communicate, such as where people are from, where they have been brought up, their educational background, their age and it surely depends on their gender. Communication is known as to be a two-way process involving individuals trying to seek mutual understanding. It does not involve only the process of exchanging information, news, ideas and feelings, but also helps to develop and share meaning. It generally connects people or places in society. In an organization, communication is an essential key function for the management of individual; it cannot operate effectively if there is no communication between the levels, departments and employees. Gender is an important factor that creates a gap between males and females. Gender refers to the attitudes, feelings and behavior that a given culture associates with one’s biological sex. Men and women know about the gender roles they have to adopt at a very early age. Most women and many men communicate differently and adopt different speech skills according to the situation they are facing, the purposes and the roles they have in society and at work. Gender differences emerge from both social and professional settings. Within an organization, gender is an important factor influencing communication. These gender differences in communication are often revealed during conflict, or even serve as a cataclysm for conflict. However, it is not only a threat to society and installs non-understanding at work. Those gender differences might benefit the whole society as well as the organization. The importance of communication maybe noticed in everyday life, for instance, a little connection can have a large impact and influence in one whole life. Communication problems can make a working environment unpleasant, uncomfortable and unproductive. The origin of conflicts that arouse can come from anything such as personal management styles, educational background to personality conflicts and cultural differences. In the book, Men are from Mars and Women from Venus, John Gray(2004) wrote: Men mistakenly expect women to think, communicate, and react the way men do; women mistakenly expect men to feel, communicate and respond the way women do. People tend to forget that men and women are supposed to be different. As a result the relationship between men and women is filled with unnecessary friction and conflict. He goes on saying that men and women are so different in their approaches to communication that they might come from different planet. They do not have similar goals, needs and values in their communication styles. One main difference he has highlighted is that men are goal-oriented; they define their sense of self through their ability to achieve results. On the other hand, women are relationship-oriented as they define their sense of self by their feelings and by the quality of their relationship. Males grow up learning some essential elements considered as being the center of masculinity, such as not being female, be successful, be aggressive, be sexual, be self-reliant, embody and transcend traditional views of masculinity (Wood, 2011). On the other hand, females are taught that appearance is important, showing sensitivity and care is a must, and that they should also expect negative treatment from others, superwoman abilities are anticipated and there is no single meaning of feminine. Wood believes that ‘through communication with others, we come to understand how society defines masculinity and feminity.’ Both men and women differ in the way they manage people and give orders. Many well-respected studies have shown that women have the tendency to soften their demands and statements, as compared to men who tend to be more direct. Women for example, use tag lines, phrases like ‘don’t you think’ preceding the presentation of an idea, ‘if you don’t mind’ following a demand or ‘this may be a crazy idea, but’ followed by a suggestion, trying to make their opinions and ideas be accepted and understood by others. Most women are conditioned by culture to maintain harmonious relationships with others. That condition is revealed in softened demands, constrained statements and a generally more tentative or lack confidence speech. In some circumstances, women tend to have direct conversation like men. This does not mean that the person is arrogant, bossy or feels superior compared to others but these are nothing more than learned ways of communicating. Another difference that has been brought up when talking about gender communication between men and women is that women most of the time ask more questions as compared to men. Asking questions have different meanings when it comes to gender differences. Men ask questions for only one reason; to gather information. For women, asking questions have purposes to gather information, but as it can be noticed, women will also ask questions when they already know the answer. The reason behind this is that they want to seek interest in what the other person has said to cultivate the relationship. The managing styles and the ways of asking questions bring up fundamental matters about women’s role in the workplace. There is nothing wrong in having different ways of communicating. Men have the perfect right to be more direct and ask fewer questions, while women and some men are simply more at ease with a softer style of communicating. The problems and conflicts then can emerge when those differences lead to misunderstanding and misinterpretations, which can sooner or later disrupt teamwork and even ruin someone’s opportunities for upward mobility. People should try to understand each other way of communicating and particular way of speaking in order to build better mixed gender teams. Someone may be crude. This does not mean that the person is cold, uncaring or uninvolved. On the other hand, a more tentative approach does not necessarily indicate a sign of weakness, fear or lack of confidence. People communicate the way they do, because they are taught to do so since the very beginning of their childhood. What really matters is that men and women give each other a chance, that they get to know what lies behind the communication style, and most important, that they resist the urge to jump to premature conclusions about the meaning of particular style. There are two main ways of studying gender differences in communication styles; the academic research and popular literature. Men and women differ psychologically in the way they act, from the style in which they communicate, to the way in which they attempt to influence others. The most obvious difference between men and women ways of communication comes to the fact that men and women view the use of conversation differently. Academic research on psychological gender differences has proved that women use language to promote social connections and create relationships, men use communication as a means to bring to bear dominance and achieve tangible goals. This is such as women are, overall, more expressive, tentative, and polite in conversation, while men are more assertive, and power hungry. (Basow Rubenfield, 2003) Popular works by John Gray and Deborah Tannen show that while men view conversations as a way of establishing and maintaining status and superiority in conversation, women see that the motivation behind communication is to create and foster an intimate bond with the other party by talking about tropical problems and issues they are communally facing. (Gray, 1990. Tannen, 1990) Other academic research stated that women are less used to powerful speech. They tend to swear less, speak more politely, and use more tag questions and intensifiers. (Lakoff, 1975) Women tend also to interrupt less than men do. Researchers have concluded that maybe it is because of their perceived lower status compared to men. (Thorne Henley, 1975) This can also be because of the societal norms which enforce this gender status hierarchy. Pearson, 1985 also bring up the fact that women often weaken their statements. One explanation he gave for this is their low self-confidence in what they are saying and their fear of being wrong, which can be associated to their perceived inferior status to male managers in the workplace. Some theorists have given their point of view on the gender communication differences. They have suggested that these styles of communicating put are disadvantageous for women when they interact with others. The breakdown in communication occurs because men and women occupy different roles in society. Social roles are reflected through language and demonstrate unequal relations based on gender. The man’s language is discriminatory toward women and this leaves the impression that men are more capable and confident as leaders. (Lakoff, 1975) Gender communication difference is a worldwide issue. Communication between men and women differ in many ways, affecting their speech and outcomes. In Japan, men and women have different ways of communicating. Women in Japan speak more politely as compared to men. The Japanese language features elements that make women’s speech sound polite and feminine. In the meanwhile, men’s speech sound less polite and masculine. The language difference between genders reinforces Japanese social norms. Where women are the subordinates of men. In England modern society, it would therefore appear that women  are equal with men. However the harsh reality tells us that women are not provided with an equal opportunity even for discussion, due to the fact that the two sexes respectively command different communication styles. In other words, the language women use is different from the one that men use. Tabooed words and slang can be found more frequently in men’s language than in women’s though they are of the same educational level. For example, ‘Get a life, Facts be damned’. Men and women have been socialized within their gender roles since the very beginning of childhood. The educational level does not determined the communication styles of both men and women. ICT Project: Failure And Success Factors ICT Project: Failure And Success Factors The monthly news papers announce the ICT project are developed, failures of astronomical proportions in developed and developing countries. For failure of the project the common reasons are delay in deadline, cost overburden, and some of the projects will not reach the expectation levels. In developing countries the ICT literature shows that the planning and management of projects has a very poor record, the issues for failure of ICT projects can be analyzed by assuming that learning from IS failures will provide the important lessons for formulating the success plan for the planning, developing, implementation and management of information system While discussing dimensions of ICT failure, both horizontal and vertical dimensions of the informatics model considers by Beynon-Davies. The difference between development failure and use failure is expressed in terms of horizontal dimension and the vertical dimension expressed the failure at the level of ICT systems, IS project, or organisation, or at the level of the external environment. There are six types of IS failure are Identified listed below Technical failure Project failure Organizational failure Environmental failure Developmental failure Use failure Beynon-Davies supports the argument with several case studies and quotes other models for IS failure Factors for failure: The failure factors will occur when the proper implementation of ICT projects in government. These factors can be barrier or inhibitors by these factors as observed in this section can be social-culture, institutional and political, funding, infrastructure and technology. Barriers can be considered as those occurrences that hinder ICT implementation some of those factors for failure Infrastructure Finance Poor data system and lack of compatibility Skilled personnel Leadership style, culture Attitudes Inhibitors do not necessarily prevent the implementation of the ICT projects but they do prevent advancement and restrict successful implementation and sustainability. Some of these factors for failures user needs technology coordination ICT policy Transfer of ICT idolisers Donor push Those above factors are used for the purpose of design a theoretical framework (ref 1) Partial failure of an idea, in which main objectives are unattained or in which there are significant undesirable outcomes. Connected with partial failure is the sustainability failure where a project first succeeds but is then abandoned after a year or so. Sustainability Failure Model (partial failure) This model provides a better structure for examining sustainability longitudinally. There is five principal consist of sustainability failures, they are listed below: Financial/economic sustainability failures : Example: if the client supported program loses its funding after some fixed time of process and has to shutdown. Cultural/social sustainability failures: Example: from the project some stakeholders will gain but others are hurt. This tension is not reasonable over time and results in the subsequent sustainability failure. Technological sustainability failure: Example: The field hardware and software are outdated and no longer companionable with the equipment within the central offices. These also look at the importance of the content provided. Political failure: Example: the local winner leaves and without larger institutional arrangements in place the project fails. Environmental sustainability failure: Example: if the project will lose their usefulness then the project plan could be reusable, if the projects without plans for reusing then the environmental sustainability failure. . Critical Success and Critical Failure Factor Model: The CSF and CFF model will explain success or failure of an ICT projects can be understand in terms of several CSF and CFF factors. Ten critical factors can be organized listed below Information factors relating to provision of content Technical factors such as user-friendliness of hardware and software, the capacity of use different hardware and software platforms, etc People factors such as availability of knowledge persons, proper guidance in use of hardware and software, etc Management factors, such as proper administration and organizational practices for bringing the required modifications through ICT projects Process factors, such as desired changes or to make the project successful in reaching its objectives a new process will design Cultural factors, such as improvement in organizational culture for successful implementation of new projects Structural factors, such as structural inflexibility in traditional organizational structures that may be a cause for failure of ICT projects Strategic factors, such as assessments that cover a wide range of services Political factors, such as political and stakeholders support Environmental factors, such as changes in the overall external environment of the project : The ten critical factors categories into seven critical dimensions: they are Technology, Information, Processes, Objectives and values, Staffing and skills, Management and structures, and other resources. This framework requirement consider the gaps that exist in the design of the project and the authenticity along these seven dimensions (ref 2) CASE STYDY: Gyandoot project The Gyandoot project started in the year 2000, the government of Madhya Pradesh initiates this project. The aim of the project is to set up intranet based kiosk in villages to providing information about the agricultural practices and update the market prices and also providing some Government services like cast and income certificates online application, land records copies, and online systems to know about the computer awareness and access all this services. This project is failed to reach its goal and the user usage is low. Reasons for the failure of the project The back end processes is not computerized In the rural areas lack of supporting ICT infrastructure, In proper plans for better services delivery Financial problems for the owned kiosks Lack of relevant content critical Lack of Computerization of the back-end processes: The Gyandoot project has computerized only front-end but not the back end. The management is not yet successful in the electronically transmitting the services request to all departments from its intranet server. Almost all transaction are handled manually at the back end of the Gyandoot intranet server, because all govt departments currently perform their tasks manually Example: The citizen will submit the online application and waiting at telekisok for a response, but at the back end the government department levels are not computerised so they will print out the application or request or complaints and send to the government department to further action, after receiving report from the govt departments the data entry operators will enter the response in the gyandoot intranet. For this process the time frame is seven days To make better and speed service response time, the all departments required to undertake the significant changes reengineering exercise to improve the information process methods and quality of services, that will possible when all departments introduce the computers in the different departments levels. The gyandoot smaiti have the authority and financial power to change the individual departments the authority exists only with the state government (ref 3) Lack of supporting ICT infrastructure in the villages: Introducing E-government project in any poor rural area it is a huge challenge of the technology point of view. Presently there is lack of supporting infrastructure available for Soochnalaya as all of the Soochanalayas (Kiosk) are in villages. In the DhÄ r district the Tele-communication infrastructure is quite low and telekisoks are unable to provide the voice services and electric power supply is less, the systems and kiosks are working with the help of the UPS which having battery and the capacity to work four hours if it is charged fully. It takes eight to ten hours to charge but most of the villages current supply will break down every three or four hours. A number of technical approaches to provide the basic network were initially evaluated. Gyandoot rejected both LAN and VAST approaches as being too costly and using dial-up network using modems over existing telephone lines which is not speed and many times the connection will break down in between a process. And the pr ocess will get delay due to weak connectivity, that connection was found to be unreliable and many kiosks are suffering huge problems of connecting to the intranet server (ref 4) Lack of relevant content is critical: The farmers are getting loss for not updating the market prices and they are selling the outdated prices and the number of services offers by kiosk but only some of them are using, the information should be in local language then the user can easily understand, and the user can visit Soochanalaya to know the update information about the agriculture, and market price etc, if the content is in local language then the women can understand the information about the healthcare and childcare and to increasing the usage of Soochanalaya Issues The kiosks made up with low investment because infrastructure bottlenecks, and the slow network is using which is dialup connectivity and not stable power supply at least 6- 8 hours power supply will be cut so for working the kiosks added additional power backup, the availability of electrical power determines the times during which the soochanalaya can be opened. Encourage the privately owned kiosk owner to offer other services like computer training, photocopying and public telephone to cover the loss of revenue, so that the owner can focus on other services. In Dhar district the awareness of the gyandoot still quite low level among the villagers, especially the poor and labours, in spite of significant media attention and publicity in Dhar district, the 60% of the non-users did not use gyandoot because they thing that no need, and 35% of people are not aware about the services offered by gyandoot and 5% of citizen have negative impression about the gyandoot. Even though grievance filing has been structured through a list of options, many complaints are sent using the e-mail facility in local languages, which make them difficult or impossible to address. Transfer of senior staffs: the main key factors of the project is the initial team of the project and the team of the district officer has conceived the plan and implemented it and they know the total project but once the government official is getting transferred and the new members will come and takes a time to understand the project (process) and slowly reverted to their unresponsive attitude to citizens. (ref 5) The govt of MP could be including these techniques to make project success: (in my opinion) May it is possibly to judge the viability of the gyandoot system, it take some time in the rural areas. To building awareness about the project and the usage of the ICT application in rural areas may take more time than expected by the project team. This holds true especially when the value proposition for the citizen is weak as in the case of gyandoot project in which one part of the entire process is computerized, To provide speed service, the district level department need to computerize and significantly reengineering in terms of having built up software application that processes and monitors the progress of applications or complaints received. The roles and responsibilities of government officers need to be clearly divided. In each department, IT enthusiasts could be recognized who could be in charge for a complete end-to-end delivery of a service to the citizen. In the Gyandoot project the dial-up telephone lines is using to connect the gyanddot intranet and district head quarters, which is slow process and interrupt in between the process. If wifi or LAN will use in the place of dial-up telephone lines then the project might be success in speed delivery, update information , The women user is not visiting the gyandoot soochanalaya, but some services will very useful to women like healthcare and childcare, few experiment have to designed to encourage them to visit the kiosk. Example: there is an online contest of finding the healthiest child, so the mother bring the children of one to three years of age to the kiosks and provide all relevant data online to district headquarters, the selection was made from the basic data received from all the kiosks and result will announce in the kiosk intranet. My opinion about the gyandoot project failed: This factors might be reasons for failure of gyandoot project: Literacy: The literacy percentage in INDIA is low especially in rural areas the literacy percentage is very low this might be a reason for the ICT project failures, and the citizen have no idea about the services provided by the projects like in the case of the Gyandoot project in Dhar district, in Dhar district the literacy rate is very low and the people dont know about the services offered by the Gyandoot Soochanalaya. Womens (users and soochak) This could be a reason for the Gyandoot project failure, not encouraging womens to work as Soochak(manage person), because there is a some useful services for womens like healthcare, childcare, etc if the manage person is women then she can attract the user(womens) and explain about the services that offered by Gyandoot Soochanalaya Trust: Trust is one of the social concept that helps the service centres (soochanalaya), the service provider and user need to trust each other, to develop the user trust the Soochanalaya need to provide speed service and update information and also provide some free services to attract the user and develop the user trust. In the gyandoot project the user trust is low because delay in work, not updating market prices, etc Management: The management should maintain the Soochanalaya, and update the information up to date, if any new service is included in gyandoot then the management have to arrange the meeting with soochak and explain about the service, so that soochak can inform to user about the service and benefits. In the case of gyandoot project the management has failed to update the information up to date. (Market prices has not updated on up to date for that framers getting loss with selling old price) Staff and skill: The staff should be well trained about the IT and uses of the technology, so that they can provide good service and trained the rural people to aware about the computer and technology, so that they can easily use all services which are available on internet. The govt official the staff changes then appoint the trained staff to easily understand the projects. But in the case of gyandoot project in place of old district officer appoint a new district officers, and he/she had took a good time to understood the whole process and delay in the service providing to citizen Language: the literacy is poor in the rural areas and some citizen can read only in the local language, and in the rural areas people are unaware about the internet and its uses, and the internet is dominated by the English language this also a reasons for the ICT projects failures in rural areas. Communication: the communication gap between the employees and users might be a reason for project failure, Example: the employs have to communicate with each other so that they can develop the knowledge and skills, if the employs have good communication with government departments then the services will speed and with the communication only we can develop the trust and explain about the services available in the project so the usage of the services will increase. Conclusion: The number of ICT project failure in developed and developing countries, and it is not possible to judge the project is success/failure on the basic factors like technical, organizational, etc. If the user satisfies the services provided from the project and its usage always helps the project to move towards success, some project are completed within the time and budget but failure to reach the objective (goals) or the project is completed within the time and budget and reach it all requirements but, lack adaptability at the present condition this is also one reason for the project failure To develop a successful project the Project Manager should have a clear vision and proper planning. And the developing part of the project should be clear (means easily understand the process) if the client requested to merging with new technologies then reusing the developed plans and add the new technologies softwares, and no one can judge the IT project is success or failure It depends upon the end user satisfaction. Like in the gyandoot project, the project completed in time and on budget but the user usage is quite low, and the users are not satisfied with services.

The Fellowship Of The Rings :: essays research papers

The Fellowship Of The Rings BOOK I J.R.R Tolkien As the story begins we find the lovable Bilbo Baggins having his going away birthday party. He would leave his precious magic ring behind him and leave for Alderaun. 17 years would pass and the ring remains under the safe- keep of Bilbo's nephew, Frodo Baggins. Gandalf Stormcrow has returned and has need of one from the shire. The both discuss the workings and the history of the ring. And conclude that one thing must be done. Frodo and his party must journey to the land of Mordor, where the shadows lie. And destroy the ring by which the very fires from which it was once forged. And so the quest begins, steered by Gandalf and Frodo's party of Sam, Mary, and Pippin. Together they travel the winding roads and through a great blizzard until nightfall. Where warmth and comfort are found in a local tavern. The Hobbits were well to entertain and were taken notice by a man, a warrior by the name of Strider. He took aim on their quest and was reluctant to aid in their cause. Gandalf had departed them to seek the wisdom of another wizard. With Strider and the remaining party they traveled the broad expanse if terrain. Where they would befriend new adventurers along the way. Many a time would they be tempted to misuse the ring. But Frodo's will held strong. Up unto the climax of events, when the ring raids came to take what once belonged to them. In a moment of weakness, Frodo placed the ring on his finger. He vanished from his party's sight. "Take the ring off Frodo!", they yelled. But he was frozen in his steps. Determind to get it they approached him. In a brave attempt to protect the ring, Frodo ran up to them, held the sting high in the air, attempting to strike one of them. But he failed. And instead he took a wound in his side. He then somehow managed to mount back on his horse and ride away across a shallow stream. All that separated them now was the stream. "The ring, the ring..", carried through the crowd of riders. Frodo was weary, he shouted out, "By all the Shire you will have neither I nor the ring! Go back to the

Thursday, September 19, 2019

To Kill a Mockingbird by Harper Lee - Themes :: Kill Mockingbird essays

To Kill a Mockingbird - Themes Although the character of Boo Radley does not reveal himself until the end of the novel, he is important to all of the themes present in `To Kill a Mockingbird' One of the more dominant themes is prejudice. There are three main types of prejudice that are explored in the novel; racial prejudice, social prejudice and fear of the unknown. Racial prejudice is present throughout the novel in the people of Maycomb's everyday life, as it is a novel set in the `deep south' of America in the 1930's. This is a period shortly after the American civil war, so slavery's abolishment had occurred not long ago. Because this had not been around for long, most people's attitudes towards Negroes had not changed, despite efforts towards change. The situation that shows the best examples of racial prejudice is the trial of Tom Robinson. In his trial, Tom Robinson is misjudged and mistreated because he is black. One of the most prominent examples of this is the way in which Mr. Gilmer, Tom's prosecutor, calls Tom "boy." He uses a tone of voice, which one would use when talking to the lowest creature on earth, towards Tom and makes him look foolish. This is all because Tom is Black. The worst example of racial prejudice is Tom Robinson's trial verdict. All of the evidence produced by Atticus makes it clear that Tom is innocent, yet Tom is found "guilty". This verdict is clearly based on the fact that Tom is black, but also that he, a black man, felt sorry for a white woman. "I felt right sorry for her" This statement would have brought any jury of Southern America to outrage in the 1930's. To them it was not right for a Negro to feel pity for any member of the white community. Another example of racial prejudice in the novel is at Aunt Alexandra's `lady's meeting'. It also shows the hypocrisy that took place in Maycomb. Miss Merriweather goes on to explain the "sin and squalor" that is suffered by "those poor Mrunas" and makes herself seem most ethnically aware, but the she refers to Helen Robinson as; "That darky's wife" The way that Miss Merriweather uses this term as if it is everyday language shows that Negroes are not respected, and are given quite offensive names.

Wednesday, September 18, 2019

Thomas Hardy Essay -- essays research papers

Thomas Hardy Thomas Hardy, written by Trevor Johnson, is the detailed journey through the life of one of England’s greatest writers. This biography describes some of the major details of his life such as his family, his education, and his major works. Thomas Hardy was born in 1840 at the Village of Upper Bochampton. He was the child of a country stonemason. Hardy was the third Thomas of his family. His mother’s maiden name was Jemima Hand and she and her husband led Hardy to have an unusually happy childhood. His early years were a seed-bed to his later creative development. His mother knew what real poverty was when she was young because she lost her father. Hardy said ‘ she read every book she could lay her hands on’ and she grew up to be a woman of ability, judgment, and ‘ an energy that might have carried her to incalculable issues!’ Many thought she was the dominant influence in Hardy’s life but his father was a man of character also. Even though he didn’t ‘ possess the art of enriching himself by business,’ he was a fine craftsman, and a lover of music. Hardy’s family was never poor and he summed up his happy childhood in a tiny lyric: She sat here in her chair, smiling into the fire; He who played stood there, 2 Bowing it higher and higher. Childlike, I danced in a dream; Blessings emblazoned that day; Everything glowed with a gleam; Yet we were looking away! As a young child, Hardy mastered the violin learning over 100 tunes. He also sang in the Stansford Church every Sunday. It seems to be that Hardy and his parents had a good relationship. In 1867 Hardy met Tryphena Sparks who was 16 and a daughter to a family related to his. She was intelligent and made her living as a teacher. She bore a child in 1868 and Hardy fell deeply in love with her. But in 1872 she broke his heart by returning her engagement ring. She then remarried and had two more children before dying in 1890. Tryphena had a great influence on his writing. On March 7, 1870 Hardy took an architectural trip to a church named St. Juliot. He stayed at the rectory and met the rector’s sister-in-law, Emma Lavinia Gifford. She was younger and attractive, and they walked hand in hand through the countryside. They fell half in love and Hardy made many trips back to St. Juliot. In 1874 they were married and proceeded to wander about Europe until they settled in S... ... as the greatest English author of his time. He received an Order of Merit and many doctorates from universities. His achievements stemmed further from writing by receiving two architectural awards. He was even popular enough to get pestered by nosy neighbors. His relationships with other writers were few but important. When he was with Florence Ellen Dugdale, his home was a pilgrimage to young writers like, Edmund Blunden, Robert Graves, T.E. Lawrence,, and Siegfried Sassoon. But perhaps the greatest honor he ever received was when he died. His ashes were scattered in Poet’s Corner in Westminster Abby next to the great Charles Dickens. Thomas Hardy by Trevor Johnson is a well written, thorough, and easy to follow biography. Leaving out only ancestry and condemnation, it provided a lot of information on major topics. This book is a good description of Hardy and it is a good research reference. By reading this and The Mayor of Casterbridge it is easy to tie together Hardy’s life and Michael Henchard’s. It is clear that Hardy knew of lost love and experienced the surrounding hardships. Thomas Hardy is a good writer and by Trevor Johnson’s description, he led a good life.

Tuesday, September 17, 2019

Frankenstein Essay

In the novel Frankenstein, Mary Shelley creates an interest in human life but the interest in human life comes after death. Human life has lengthened due to the successes of scientists in the region of medical science. Extending human life became the goal of an scientist named Victor Frankenstein. Beyond wanting to extend life, he also desired to prevent future deaths of countless innocent people and to diminish the concept of death itself. Following Frankenstein, scientists at MIT began researching ways to advance life. After many years Frankenstein’s goals and ambitions of extending human life continue, as scientists conduct research on cloning and regenerating body parts to help mankind live longer. As an scientist, Victor knows his responsibility is to help mankind; however, if he is unable to discover something that will, at least his research should lay a base for other scientists. â€Å"My operations might be incessantly baffled, and at last my work be imperfect; yet, when I considered the improvement which every day takes place in science and mechanics, I was encouraged to hope my present attempts would at least lay the foundations of future successes† (P 43). By that quote, the reader can see that Frankenstein’s desire to interfere with nature can not be blamed, because his job as a scientist is to guarantee the survival of humankind. His commitment and ambition should be praised as he explains that, â€Å"In other studies you go as far as others have gone before you, and there is nothing more to know, but in a scientific pursuit there is continual food for discovery and wonder† (P 62). He understands there are many possibilities in the field of science and he knows all he has to do is experiment with those possibilities. If Frankenstein had not experimented in the 1800s, scientists would not have achieved as much as they have today in the areas of cloning and creating human body parts. To prove the importance of testing science to its limits, he boldly states, â€Å"yet with how many things are we upon the brink of becoming acquainted, if cowardice or carelessness did not restrain our inquiries† (P 65). The scientist within Frankenstein prompts him to create his monster, and does not see himself as playing God whereas Shelley portrays him as playing God. Shelley believed that science does help mankind in multiple ways but theres a line that many scientist cross and end up going too far. She interprets this feeling towards science with Frankenstein by creating an driving force within him to  help mankind conquer death and diseases. But when he finally reaches his goal of his efforts and sees his creature and its ugliness, he turns away from it and flees the monstrosity he created, â€Å"How can I describe my emotions at this catastrophe, or how delineate the wretch whom with such infinite pains and care I had endeavoured to form?† (P 72). From that moment on he tries to suppress the consequences of his experiments and wants to escape them by working in other sciences. Victor even withdraws from his friends and psychological changes are visible. Shelley seems not to condemn the act of creation but rather Frankenstein’s lack of willingness to accept the responsibility for his deeds. His creation only becomes a monster at the moment his creator deserts it. Thus Frankenstein warns of the careless use of science. On the other hand, scientists at MIT begun working with human tissue to create artificial human body parts for replacement therapy, where scientist carefully and thoroughly monitor the factors of this creation. â€Å"We can use this heart tissue and use it on a person who is having problems with his heart† states a researcher in an MIT documentary (The Science of IPS Cells). The quote emphasizes that although scientists seem to change the way of God creations, this benefits the human race by saving lives. Frankenstein wants to stop people from dying, and after discovering the secret of life, he experiments, so someone else can be saved. Scientists today almost do the same thing as Frankenstein; they have found ways to extend life but if they fail at this, they retrace their steps and go through the process again to fix mistakes unlike Victor. In conclusion, Dr. Victor Frankenstein became a founder for the successes in medical science today. He should not be criticized for playing God and tampering with nature, instead he should be credited for experimenting to extend human life today. Without his experiments medical science would not be as advanced as it is now, and scientists would not have the challenge to start their research. Researchers at MIT know that Frankenstein is right in his ambition to advance human life, thus they and other scientists today continue to research in the field of life. Shelley successfully places herself in the mind of an scientist with the creation Franken stein.

Monday, September 16, 2019

An Insight into Addressing Behavioural Problems

Typically, in the field of behavioral studies, the objective of intervention has been to diminish a challenging behavior (i. e. aggression, property destruction, self-injury). Nonetheless, as research and practice in behavior analysis have matured to address the point of behavioural functions, there has been an analogous shift in the selection of target behaviors and interventions (Horner and Carr, 1997).Within the last few years, investigators and practitioners applying competent supportive technologies within characteristic school and community settings have been established to identify and to teach socially covetous alternative behaviors such as communication, social skills, and choice-making (Koegel, Koegel, Harrower, and Carter, 1999). Accordingly, practitioners have increasingly identified significant outcomes of behavioural interventions to be not only declines in problem behavior but also rise in one or more substitute behaviors.Therefore the measurement of multiple outcomes for a person with problem behaviors has started to reflect a more complex evaluation model (Carr, Levin, et al, 1999). In effect, I think that the role of the nurse is to help in drafting more proactive approaches in resolving problem behaviour. One possibility for the nurse is to consider the significance of a team based approach to this issue. The team must also be multidisciplinary, one which probably call for the involvement of a behavior specialist with expertise in the practical approach to behavior as a member of the team employed in addressing behavioral issues.Intervention plans based on the practical behavior evaluation of target behaviors have a higher probability of positively influencing the individual’s behavior over the long term (Lalli, Browder, Mace, and Brown, 1993). The involvement of a cooperative team early in the procedure of assessing behavior and designing interventions will surely aid in enhanced intervention fidelity and promoted positive changes in patients’ behaviour (Hieneman and Dunlap, 1999).The nurse should also be involved across the phases of evaluation, intervention establishment, and succeeding program monitoring. Nurses may also be involved in formulating interventions that could be realistically executed (Lentz et al, 1996). I also think that the nurse must take on proactive approaches and techniques seek to decrease the possibility that undesirable behavior will be derived by analysing environmental contexts and the patients’ behavioural repertoires (O’Brien and Repp, 1990).The proactive factors of interventions must stress reliable communication, access to typical environments, and examination of demands. Generalisation of communication skills and alternative behaviors may be fortified during interactions with typical peers during participation in regular activities. Interactions and participation not only allow for opportunities to generalise prosocial behaviors but likewise serve as a encour aging incentive. In all these activities, nurses like myself may take on a critical role.We must not be limited to providing physical care, but also take in careful consideration the other factors that may influence problematic behaviour, and take an active stance in trying to help the individual develop. In taking on a holistic stance, I can make a real difference. References Carr, E. G. , Levin, L. , McConnachie, G. , Carlson, J. I. , Kemp, D. C. , Smith, C. G. , et al. (1999). Comprehensive multisituational intervention for problem behavior in the community: Long-term maintenance and social validation.Journal of Positive Behavior Interventions, 1, 5-25. Hieneman, M. , & Dunlap, G. (1999). Issues and challenges in implementing community-based behavioral support for two boys with severe behavioral difficulties. In J. Scotti & L. Meyer (Eds. ), Behavioral intervention: Principles, models, and practices (pp. 363-384). Baltimore: Brookes Horner, R. H. , & Carr, E. G. (1997). Behavior support for students with severe disabilities: Functional assessment and comprehensive intervention. The Journal of Special Education, 31, 84-104.

Sunday, September 15, 2019

The Broken Spears by Miguel Leon-Portilla

In the book originally written by Miguel Leon-Portilla, mirroring the event way back in 1519 when Hernan Cortes sailed from Cuba to Mexico and entered the capital of the Aztecs, there were accounts that he gathered from the basic viewpoint of the Aztec tribe. ‘The Broken Spears’ talks about the conquest of Cortes, although it dates back ten years before his arrival in the east coast of Mexico, in a place called Tenochtitlan. From the voices of the tribes, there was defeat and destruction with the arrival of the Spaniards†¦ years after they saw eight omens that, for them, were warnings by the gods on the end of the world.Main Body They first heard the invasion from a common man who reported to King Motecuhzoma: â€Å"Our lord and king, forgive my boldness. When I went to the shores of the great sea, there was a mountain or small mountain floating in the midst of the water, moving here and there without touching the shore† (13). Moctezuma, then, sent people to inspect, and when he received word on the beings that appeared on the shores of his land, he was terrified and was sure that this was the god Quetzalcoatl, who had come back from his journey.Thus, he sent gifts of turquoise and gold to the Spaniards to pay homage to the returning gods. When Cortes recognized this, he frightened the messengers by firing off a canon, and then ordered them to fight in combat to prove their bravery. Cortes announced that he wanted to see Moctezuma. When Cortes, together with hundreds of soldiers, arrived at Tenochtitlan, King Motecuhzoma told Cortes: â€Å"Our lord, you are weary / The journey has tired you, but now you have arrived on the earth / You have come to your city, Mexico / You have come here to sit on your throne, to sit under its canopy† (63).Motecuhzoma was frightened and even thought of escaping, which led him to offer human sacrifices with the coming of the gods, against the advice of his counselors, and to the disdain of the Spani ards. He held a meeting with his nephew Cacama, his brother Cuitlahuac, as well as the other lords and leaders of the tribes on whether or not they should open their doors to the new arrivals in their land. In the end, Motecuhzoma decided to make friends with the Spaniards, and it led to the destruction of his throne, land, wealth, and his people.It is evident that this book should be required for Latin-American Studies, since it gives a very detailed description of the events. Most of the materials used are on the side of the Spaniards. To present a material that would reveal the side of the Aztecs, and how they viewed the event, would be very helpful because it will dramatize how the Aztecs took the invasion in the light of their beliefs, their culture, and their tradition. The style of writing is not really biased.In fact, more of the negatives could be drawn on the description of their king, Motecuhzoma—what his weaknesses were, and which mistakes made him lose his throne and his land. The Spaniards, however, were taken as greed, ruthless men who craved for gold and treasures. It would be best to include this book in Latin-American Studies, but together with the other versions that were written on the side of the Spaniards. This would paint the picture from all sides†¦ for a good sense of balance. Conclusion The story is presented more as a work of literature, with the use of imagery and figures of speech.Having been arranged in chronological order, it presents history from the side and beliefs of the ancient Aztecs. It is well written and easy to understand, which ends up being really fascinating because of the descriptions of things that would relay how ancient human beings view things and people, which they have not seen in the past. Having used a constricted point of view, though, it should be regarded more as literature than as history. Works Cited Leon-Portilla, Miguel. The Broken Spears: The Aztec Account of the Conquest of Mexico. Bosto n, MA: Beacon Press.

Saturday, September 14, 2019

Design of a steel skew cantilever followed by construction and testing to destruction

Design of a steel skew cantilever followed by construction and testing to destruction. Analysis and improvements section included. Aiming for minimum weight and structural costs, while achieving a working load of 1kN and a failure load of 2kN. Statement of the Problem: To design and build a steel skew cantilever that is required to show no visible deformation at a vertical working load of 1000N and to fail at 2000N. The objective is to design a structure that satisfies the loading conditions, while keeping weight to a minimum and maintaining design simplicity; to reduce drawing and fabrication time, and making the structure more predictable through analysis. The load is at a horizontal distance of 815mm from a rigid vertical plate. The line of action of the load is 407mm to the right of the normal to the wall through the centre of the main plate when viewed from the front of the main plate. The load is applied through a rig with a 13mm diameter bolt. The main plate has 4 pairs of M6 tapped holes to which the structure may be attached. Designs Considered: The main design considered apart from the 4 main member triangulated cantilever, was based around a 3 main member design with cross bracing shown in the diagram to the right. The advantage of this structure is a reduction in weight, holes and rivets thus a huge reduction in cost. However, the design that we came up with was too difficult to analyse and predict during in failure, due to the side planes not being vertical. Also, construction would have been quite difficult because all cross braces would have to attach to the main members at an angle, thus additional plates would have be constructed which would have raised the price dramatically. The other design considered was based on the 4 main member design but flipped upside down. However, this would mean that the compression member would be comparatively long, increasing the need for cross bracing due to potential buckling. Thus the structure would be no better than the one we have selected only it would cost more due to the additional cross bracing. The box design was considered, however, it is not very suitable for a skew cantilever as construction would be immensely hard. Design considerations: The rig to which the structure was to be attached was inspected to see whether the load plate would fit and to get a general feel for the vertical constraints of the jack. To prevent a bending moment within the structure, lines of actions of forces in members must cross at a point. Hence in the drawings, lines of actions for every joint are shown to meet at a point within the material. For single cross braces, this line of action is 3/4 of the way in from the edge parallel with the edge. To make members act as though they were in mode B, the struts had to be rivet together. This was done 40mm from the edges of the struts in question and subsequently the remaining length was divided up into 3 sections at which the boundary of each division was riveted. This was performed on all the double angled struts. Where possible, the struts coming into connecting plates were made to touch the plate with their edge so that they would be transferring their load in a more direct manner. We attempted to make the base as wide as possible, for stability hence the connecting plates should go up to the edge of the main plate. Construction Phase: The base was the first thing to be constructed as it was easier than the upper members, thus by the time it had been built, experience had been gained and could applied to a more complex construction step (the upper members). The upper members were then constructed and both sets were fitted to the base plate. An additional plate was put in between the connecting plate and the main plate for the tension members to prevent the bolts from tearing out. The partially completed structure was taken to the measurement deck, where the alignment was checked. It was within 5mm in respect to the horizontal plane, thus we could slightly bias connections so that the alignment became closer to about 3mm. It was then noted that the rig that would connect the load to the load plate needed the load plate to have parallel edges, thus a double bend and an extension of 40mm in the load plate was required to allowed the rig to connect to the load plate. See right hand page for diagram. The load plate was then attached and the structure was checked that it aligned to about 3mm. The cross braces were than fabricated and attached. An attempt was made to work efficiently during construction, my laboratory partner and I finished with 6 hours to spare. Modifications: To M4 bolts were used to help keep the two sections of the load plate in alignment to achieve ease of rig attachment. These are attached as shown on the diagram to the right. A small cross brace was also placed between the two tension members at the top to attempt to prevent rotation of the structure. See right for the diagram. Also there was not enough space for the smallest cross brace connecting the compression members, thus it was not included. Some minor changes in the lengths of some of the members was required to improve alignment. Also some edges of struts had to be cut so that they could rest flat against others to transfer load more effectively. Cost and Mass of Structure: The mass was 2.52kg, which is heavy in comparison to the other groups, but not the heaviest. The material cost was 120.5 and the labour cost was 282 giving a total of 452.5, once again the cost ranked high amongst the other groups. However, considering the magnitude of the mass, if the cost saving strategies had not been applied then the cost would have been about 30 higher. These cost saving techniques consisted of using a hole to not only mount the members to connecting sheet metal but also a cross brace, thus saving a rivet, a hole and some time during fabrication. Depending on the forces, this technique could be slight disadvantage, the joint would now be in double sheer, and the rivet would be under greater loading. However, this effect would be small due to the small forces in the cross braces. Test results and Observations: The structure had a very slight amount of visible deformation at the working load of 1kN, and finally failed at 2.57kN. This was mainly due to the rightmost (looking at the front plate) compression member 5 buckling inwards at a position closer to the wall than the intersection between member 10 and 11. Another noted deformation was that the metal plates (A and B) connecting the main plate to the compression members had been bent inwards towards the main plate as the corners of the A and B were not touching the main plate. This meant that as the compression force in member 10 and 11 grew the force on the corner increased and cause deformation of the connecting plate. If the buckling in the compression member had not occurred, it would be conceivable that this would be the next location for failure. Suggested Modifications to Improve Performance: Using another cross brace in a sense parallel to the main plate between the lower main compression members 10 and 11 would have prevented the buckling that caused the main failure from occurring. The geometry of the proposed cross brace would force the member to become stockier thus its critical stress would be much higher, allowing us to once again us mode A with a 9.5mm by 9.5mm of thickness 0.8mm. If the holes for the bent plates that connects the main compression members 3 and 5 to the main plate were moved such that the corner of the connecting plate lay within the normal of the edge of the main plate, then this would reduce deformation of the connecting plate and hence the structure. If these connecting bent plates were to be the first point of failure, the modifications described would increase the failure load by postponing the tearing of the connecting plates. Conclusions: The main failure as discussed was mode B buckling of the longest compression member due to insufficient cross bracing. It would be interesting to rebuild the cantilever with the improvements and even have an entire redesign. One can learn many things from analyzing a failure. For example how to improve the structure and more importantly how to go about design in the first place.