Saturday, December 28, 2019

Essays on How International Affairs And Business Intersect

The introduction of new technology has reduced the world to a small village. Anything that is done is one country affects the other countries directly or indirectly. International affairs and business in a country are today at loggerhead. However, there is diversity of economic resources and practices, one no longer enjoy the freedom of trade for there are international laws, regulations, and standards that must be observed and satisfied. The current international peace negotiations in various countries have seen the collapse of business since for every opportunity that arises one must satisfy certain conditions before being allowed to carry out any activity. The fight against terrorism, which forced the US military to go camping in the Middle East, has seen the oil prices rising up considerable. The US being the super power is bestowed with ensuring international peace and check cases of terrorism. Middle East being the largest producer, exporter and distributor of oil have faced many difficulties because of too much military operation in the area. It is believed that Afghanistan is the home for the most wanted terrorist Osama Bin Laden hence to restore and curb the spread of the terrorism the leader must be arrested but up to date the soldiers have not succeeded. Due to this, therefore the production of the crude oil has been very tedious and time consuming since resources like labor live in constant fear. Resources used to extract are also limited because a larger proportion was destroyed during the war that erupted during the search for Osama. Due to these factors, the oil prices generally have shoot up and businesspersons dealing on this sector have faced real difficulties. Investors on the other hand are also faced with difficult decision since Middle East is potential destination but there are restrictions never to trade with them. Investors therefore feel that their freedom of movement, expression, speech, and choice has been violated. They blame the US government decision of letting their soldier camp at this place. Business for these investors has been affected negatively and forced to operate on low income sectors of the economy. There are hard-core followers of Osama who have not been identified and they fight the US military secretly when they get a chance. The pirates also on the other hand are believed to be followers of Osama and they have invaded the oceans and sea rendering the water transport highly risk. This in turn has inflated transportation cost, affecting businesses largely since this was somehow a cheaper means of transport for exportation and importation of goods and services. Then World Trade Organization (WTO) has implemented laws and regulation governing international trade and relation but because of insecurity, the International Defense Counsel (IDC) does not allow free trade. These two forces have conflicting interests and therefore slowing down the rate of globalization. IDC is considered more powerful than WTO therefore, the decision made by IDC are more binding than those of WTO and should be followed for better international relation and peace keeping. The other current issue demonstrating how international affairs and business intersect is the issue of piracy row between United States and China. The contentious allegation is that many Chinese companies have been pirating US movies and music and making billions of money through the act while American Multinationals have strict measures to curb the vice. Violation of copyright restrictions is and international affair and US being the centre for many multinational companies is the loser on this, but the Chinese make many profits through it hence they are reluctant to arrest and prosecute violators. Due to too much pressure, the Chinese government has invested many resources and labor since the practices is deeply rooted in the country and needs time and commitment for it to be stopped.

Thursday, December 19, 2019

Charles R. Tittle s Control Balance Theory - 954 Words

The aim of this paper is to present a more comprehensive understanding of Charles R. Tittle’s control balance theory. Introduced are the assumptions about human nature and criminal behavior, hypotheses, methods for testing, empirical support, limitations, and implications. This research presents the benefits of identifying similar concepts in theories and merging them to create a broader theory. Moreover, the focus of this theory is on the claim that Tittle developed a theory that can explain both conventional criminal behavior as well as elite crime. Though more research is needed, the goal of this research is to show the positive impacts of integrating theories to create a utopian general theory. Observations, conclusions, and recommendations are described in the conclusions. Introduction The purpose of this research shall be to understand Tittle’s control balance theory and how it can be used as a sole general theory of crime and deviance. This research will focus on the understanding of the theory; and the use of concepts with similar meanings, and the fusion of them to form one common theme. Tittle’s theory can be used to explain a vast amount of deviant behavior ranging from white-collar crime, to street crime and states that the main problem is finding the balance of control. This theory is an ideal theory with massive potential because it makes sense, it is intuitive, and it is parsimonious (Akers Sellers, 2013). Findings Origins In 1995, Charles R TittleShow MoreRelatedIntegrated Theories of Criminal Justice Essay example3632 Words   |  15 PagesIntegrated Theories of Criminal Justice Abstract Two theorist and theories that have been recognized by many involved in the criminal justice field are Ross L. Matsuedas Theory of Differential Social Control, and, Charles R. Tittles Control Balance Theory. Matsuedas theory, (1) identifies a broader range of individual-level mechanisms of social control, (2) specifying group and organizational processes for controlling delinquency, (3) conceptualizing classical criminological theories as specialRead MoreSocial Controls Essay2969 Words   |  12 PagesCritically evaluate the claim that it is social controls that prevent us all from committing crime. This essay will thoroughly examine and evaluate the claim that it is social controls that prevent us from committing crimes by looking at different social control theories. Firstly we must determine what a social control theory consists of, according to Hopkins (2009) ‘social control theory is fundamentally derived from a conception of human nature that proposes that there are no natural limitsRead More Differential Association Essay3062 Words   |  13 Pagesstudies completed he began work at the University of Minnesota from 1926 to 1929 where his reputation as a leading criminologist was enhanced. At this time, his focus became sociology as a scientific enterprise whose goal was the understanding and control of social problems, including crime. (Gaylord, 1988:13) After his time at Minnesota he moved to Indiana University and founded the Bloomington School of Criminology at Indiana University. While at Indiana, he published 3 books, including Twenty ThousandRead MoreEssay on Criminological Theories13456 Words   |  54 PagesStudent Study Guide for Ronald L. Akers and Christine S. Sellers’ Criminological Theories: Introduction, Evaluation, and Applications Fourth Edition Prepared by Eric See Youngstown State University Roxbury Publishing Company Los Angeles, California 1 Student Study Guide by Eric See for Criminological Theories: Introduction, Evaluation, and Application , 4th Edition by Ronald L. Akers and Christine S. Sellers Copyright  © 2004 Roxbury Publishing Company, Los Angeles, California

Wednesday, December 11, 2019

Full Collapse free essay sample

Thursdays Full Collapse is a must-have. One of the best tracks is Cross Out the Eyes, which is one of those songs you want to hear again and again. All the riffs fit together like a puzzle and the lyrics talk about a fight: Drive through the streets as gunshots punctuate the night. The sides we take divide us from our faith The song is good, but you cant buy a CD for just one song. Hole in the World is another landmark song that has a lighter feel. Unlike Cross Out the Eyes, it doesnt call for the lead singer to scream. The music alone catches your attention and holds on. As you hear the first few lines, you are suddenly into the song. Its like you are in a trance: you cant stop listening to it. This CD also has a darker side, since all the songs talk about something very unfortunate. We will write a custom essay sample on Full Collapse or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page For example, Understanding in a Car Crash talks about watching a friend die, while Standing on the Edge of Summer is about a heartbreak. Geoff Rickly screams way too much on this CD. My guess is that he is trying to express pain and anguish, but thankfully he doesnt scream in every song; at times his voice can be almost soothing. Rickly should experiment with singing not screaming. If he did, his songs would be much better (and we could understand what he is saying). Guitarists Tom Keely and Steve Pedulla are absolutely amazing. They play with such ease that you could argue they were born playing. I only wish they would rise to their potential and stop putting such sadness and misery into their songs.

Wednesday, December 4, 2019

Why Study Economics Essay Example For Students

Why Study Economics Essay EconomicsThe study of economics is helpful in several ways . Some of these Iwill comment on . First of all , technology levels affect a societies economy ,so by learning what products are produced and how they are produced , you cansee how technologically advanced a society is . By examining where the producedgoods are sent/used you can get a better idea of what type of government thesociety is run by . By studying an economy and seeing how the economy usesresources , you can learn what resources the society controls and which ones thesociety needs . Tied in with this factor of resources you can get an idea ofwhich countries have leverage over other countries . An economist how a society or government meets the needs and wants ofthe populace , either through production or commerce . Economists see the worldas a) profitable b) unprofitable c) and they see opportunity costs . Byviewing the world in such a manner they are able to help in the decision makinginvolved with money and industry . They can help to save money , resources ,labor, and time . Microeconomics is the study of an overall economy . In studyingmicroeconomics you study a wider range of services , productions , exchanges . While not as discriminate as macroeconomics , you can get a broader picture andgrasp the basic concepts of an economy . Macroeconomics studies the study a single aspect of an economy , lets say themining of coal . You dont research the delivery , the market ; all you studyis the actual mining process . While this may be more limited in scale , you canlearn more about that specific process . You dont see the whole picture but youcan find the specifics on that subject . Personally I dont think that the physiocrats theory would work . Ithink that if we tried to follow there theory and have the government abstainfrom interference , many of the smaller businesses would quickly be closed down . I think that a great many monopolies would be created and we would have the railroad barons problem that we had in the 20th century . I feel that thegovernment is hindering at many times , and still they seem to be helpful insome areas . The business that I chose to depict was the custodial division at ChicoState University . Both of my parents work there so I chose this area ofbusiness . The factors of production pertaining to this field of work wouldinclude people/labor , cleaning liquids ( such as disinfectants and Windex ) ,and dirty rooms (joke) . For the land I would have to put down electricity , water , large amountof goods manufactured using plastics which in turn uses oil . As for the capitalof the business I will say that the cleaning machines , and large supplies ofcleaning materials would fill this category . The entrepreneurship of the custodial business is the tricky part . Iguess that you could say that the custodians risk there social lives ( becausethey work graveyard shifts ) in exchange for making a decent salary . As in thecase of my parents , it paid off . The way that I see it , our largest problem has to do with the naturalresources . People will always want and need things , but if we do not limitand reserve the resources that we have , we are not always going to have ourresources . Demands cannot be met when there is nothing to meet them with. Youcant artificially make everything . You need to start somewhere . Business

Thursday, November 28, 2019

Origins of the Cold War an Example of the Topic History Essays by

Origins of the Cold War by Expert Bella Hamilton | 29 Dec 2016 This essay about the Cold War can be summed up as a lengthy period of high tension and rivalry between the two world dominating superpowers, the USA and USSR, although which never involved direct conflict between the forces of the two powers. Starting around 1950, the Cold War kept all mankind and society on the brink of mass destruction for the best part of half a century, ending finally in 1990 with the collapse of the USSR as an empire and global superpower. The origins of the Cold War itself stem mainly from the end of the Second World War, when the two superpowers emerged victorious from the ashes of Europe and both looked to seize the advantage in gaining control in Europe. Need essay sample on "Origins of the Cold War" topic? We will write a custom essay sample specifically for you Proceed When the atomic bomb and the advent of long-range military technologies greatly increased the chance of hostilities between the two states, the fact that they occupied opposite sides of the globe became less of a barrier to potential conflict. The origins of the friction and disharmony between the two states, which served as a prelude to the Cold War disunity, can be traced back to the First World War. The War, the Russian revolution and the Russian civil war brought the armies of the two powers together for the first time, and paved the way for a continuing struggle for mutual survival, influence and dominance. The fundamental cause of the tension between America and Russia was the conflict of ideologies and incompatibilities between the two massively different societies - communism and capitalism. Therefore, perhaps the best place to start looking for the origins of the Cold War is the dawn of communism in Russia in 1917. The atrocities and mass killings by the Red Army in the Russian civil war in the period 1917 - 1921 paved the way for the first clash between the communist society and the West. It came in the form of armed intervention by the allied states of the West, including America, who landed at Vlapostok and attempted to fight back the advancing Reds. The battle was brief, yet it was one of the first events to demonstrate the growing disharmony between Russia and the West. Throughout the history of the Cold War and the pre Cold War rivalry, the general policy of 'containment' of communism by the West and specifically America remained largely unchanged. This again supports the idea that the communist revolution can be marked as the very first of Cold War origins. The most lasting and important effect Western intervention had on Russia had been the impression of the West left in the minds of the Russian people and their leaders. The Russians had just been through a terrifyingly costly war with Germany, followed by a disruptive revolution and a civil war in which millions upon millions had died from famine, disease, or fighting for the causes of the Whites or Reds. The West had intervened to crush the Red Bolshevik regime but had succeeded only in giving the Russian people the lasting impression that the capitalist powers were bent on pursuing the extermination of the Russian people. This perception of Western ideology remained in the minds of the Russian people for a long time, and the first response to this by the Red Government was to build up its armed forces into a formidable war machine. During the inter-war period, the military power of both sides increased substantially. Russia stabilized somewhat, but the communist government was reluctant to agree to any relations with America and the West. On America's part, they refused to recognize Russia as legitimate, claiming it to be only a part of the "international communist sub verse movement" until the Roosevelt administration in early 1933, when a basic agreement of mutual recognition was struck up between them. Following this were several attempts by the world powers to minimize the risk of another world war. Russia joined the League of Nations, and talked most of her satellite states into doing the same. As the threat from Germany and Japan became more apparent, an uneasy truce was struck up between the members of the League, which now excluded Germany, for mutual defense and security. In the period leading up to the war, when Hitler was making clear his plans for Europe, Britain attempted to forge an alliance with Russia to counter the Nazi threat. The treaty formed the basis for the unsure alliance that held throughout the war, uniting Russia, Britain and America against Germany, but that was as far as relations went. The Soviet-American Alliance had been a temporary one through the war, and while they had been on the same side, fighting for a common cause, they each fought their own war. The Soviets kept to the eastern front, the Americans worked with the British on the west, and little in the form of information, strategies and intelligence reports were exchanged. An interlude to this alliance occurred in the form of a Nazi-Soviet pact that assured the conquering and mutual occupation of Poland, and gave the Russians two year breathing space to prepare for a Nazi invasion. The West called Russia a traitor and when Russia latter attacked Finland, the refusal to allow the allied army passage by Norway, Sweden and Turkey only narrowly averted a war between Russia and the West. America remained neutral up to this point, until they opted to send aid to Finland. Public opinion in America and Britain was almost totally against Russia, and two decades of distrust, and exaggerated reports of the 'evil' Russian army in Western media only deepened anti Russian feelings. In summer 1941, Hitler turned his attention away from the blitz over Britain and committed all his forces to an invasion of Russia. This brought about a welcome respite from the war in Britain, and an end to the Nazi-Soviet pact. Britain claimed Russia to be an ally fighting for a common cause. America was still pided over the issue of getting involved in the war, with the isolationists pushing for America to stand back and let the two dictators grind each other down. In consideration for declaring war on Germany, and therefore aiding Russia, the American Senator Robert A. Taft declared "A victory for communism would be far more dangerous for the United States than a victory for fascism." The American involvement in the war was an interest in European security in both the east and west sectors. Roosevelt wanted a large sphere of influence as a basis for a new international system, what was to become the United Nations. After an American delegate met with Stalin and reported back that Russia's chances of winning the war were not as desperate as originally assumed, America decided to send a billion dollars (final amount totaled 11 billion) worth of supplies to Russia to turn back the Nazi war machine. While this aid was gracious and probably shortened the war by as much as two years - it was largely indecisive in the overall outcome of the war. More importantly, the Russian people suffered 26 million dead soldiers and civilians throughout their bitter four-year struggle. So although America and Russia were allied against Germany, the Russians held deep contempt for the West after they let the slaughter continue or four years before opening another front and splitting the Nazi forces in two. The wartime strategies of the American and British allies are very important considerations when tracing Cold War origins. The post war geography of Europe greatly depended on the allied conduct of the invasion of Europe, the most important factor being the timing of D-Day. The allies at long last established a beachhead at Normandy in June 1944, and opened the second front, causing Hitler to pide his forces, and begin the long fighting retreat back to Germany. After a year of fighting across the continent, the Russians won the race to Berlin, although all parties did confine themselves to their agreed zones of occupation, and the potential clash between the two liberating armies never materialized. If D-Day had transpired a year earlier, the allies could well have swept through Germany, Poland and Austria, and kept post war Europe free of Russian occupation. As it turned out, Russia ended the war occupying Eastern Europe, including its share of Germany and Berlin. Britain and America had predicted the danger this posed, yet they could not make the Russians back up and hand over the territory that so much Russian blood had been spilt to gain. The Soviet Union wanted all Eastern Europe to be under Soviet control, with replica communist governments. America thought this spread of communism was more than Russia needed for her security and Soviet control in the east would threaten Western Europe. At the end of World War Two, America saw the Soviet threat to be the danger of the use of armed force in areas where the borders of American and Soviet influence met. The fact that America never came into direct conflict with the Soviet Union was largely to do with their geographical remoteness. They split the world in half, and each had room to move in their own sphere of influence, and where the borders met, they set up buffer zones, like the Berlin Wall and the Korean Demilitarized Zone, to avoid direct contact. The year 1945, which saw an end to both the European and Pacific wars, also witnessed two more events that served as a prologue to the Cold War. The first was the death of President Roosevelt in April, which saw all the promising relations and co-operation between the American Government and Stalin go down the drain. The second event was the use of atomic bombs on Japan. The public display of the bomb's destructive capability startled the world, and its potential use for future wars was recognized by all, especially the Russians. There was very little America could do to prevent Russia from eventually gaining nuclear technology, and within five years they had tested their first nuclear weapon. In period leading up to this event, Russia and America grew further apart, and the many attempts by America to pacify and control Russia's atomic program failed. There were also several periods of high tension, like the Berlin blockade in the winter of 1948. The end of this era and the start of the atomic age of the Cold War came on September 23, 1949 when the Soviets tested their first atomic bomb. The arms race had begun, with the substantially more destructive hydrogen bomb in the pipeline, and both sides attempting to gain nuclear superiority over the other before considering any arms limitations agreements. Such was the situation nine months later when the North Korean Army invaded South Korea. America's direct and the USSR's indirect involvement in this war for the first time put to the test this new global system, where all wars fought from this point on would involve either or both of the superpowers, with the threat of nuclear holocaust always just over the horizon. The origins of the Cold War can be found by examining the history of the relations between Russia and the Western world between 1917 and 1949. There is a repeating pattern of misunderstanding of true intentions between the superpowers, and a failure on both sides to co-operate and coexist. A major cause of the tension was the failure of the American and Soviet governments to fully understand each other. They were aware of the conflict of ideologies, but did not understand the true long-term intentions of the other. This unsteady relationship experienced a temporary reconciliation when a forced alliance in the Second World War united Russia and the West against a common enemy. But the outcome of the war left Russia and America victorious and powerful, with both dominating their own liberated territories in Europe. As the alliance dissolved, the arms race accelerated, and the rest of the world was quick to choose a side to align with for protection. This bi-polar system inevitably split the world in two, and with nuclear weapons backing up all policies, relations and co-operation were delicate and risky. This common misunderstanding led to a failure to co-operate on many issues, a deep mutual distrust and several near-disaster crises, most notably the Cuban Missile Crisis. The establishment of mutual distrust in the inter-war period, the post war bi-polar system, and the threat of mutual nuclear oblivion after 1949, left the world in a precarious state of 'Cold War'. Bibliography D. Fleming, 'The Cold War and its Origins, 1917 - 1960' Volume 1, (GEORGE ALLEN AND UNWIN LTD, 1961) D. Fleming, 'The Cold War and its Origins, 1917 - 1960' Volume 2, (GEORGE ALLEN AND UNWIN LTD, 1961) J. Spanier, 'Games Nations Play, "Analyzing International Politics"', (THOMAS NELSON AND SONS LTD, 1972) G. Lewy, 'America in Vietnam' (NY OXFORD UNIVERSITY PRESS, 1978) D. Rees, 'Korea: The Limited War', (MACMILLAN & CO LTD, 1964) J. Gaddis, 'The Long Peace, "Inquires into the History of the Cold War"', (NY OXFORD UNIVERSITY PRESS, 1987) J. Gaddis, 'The Long Peace, "Elements of Stability in the Post-war International System"', (NY OXFORD UNIVERSITY PRESS, 1987)

Sunday, November 24, 2019

Trench Foot essays

Trench Foot essays It was General Sherman who coined the phrase, War is Hell. To most people when the World War I is mentioned images of destruction and casualties come to most peoples minds. Wars are fought because two sides believe that one side is right and the other side is wrong on a particular issue. When men believe these things to be true they fight with a fury most people cant imagine. World War I was such a war, when men believed in a cause, and fought very hard for that cause. A hatred was formed between the two sides, countries hating other countries, men hating men. Millions of men died because of what they believed to be right. During World War I soldiers died in many different way. Not all died with dignity and honor like most people would think. Some soldiers died in battle, while others suffered through long battles with disease, illness and hunger. Men left for the Great War proud to serve their countries, only to go into battle and be treated to some of the harshest condit ions known to man. One soldier wrote I dont know who is better off at times, my fallen comrades, or myself, I still have to live through this Hell. (Callon, www) It is amazing anyone ever lived through this terrible war, between the sniper, trench rats, dysentery, gas attacks, and many other ways a soldier could be killed. The picture quality was not always the best, but you can get an idea of what these soldiers went through. The images where so hard to look at, so graphic, but so real. War is not pretty by any stretch of the imagination. Picking just one of these images was the hardest part. The image that I did decide to choose was a simple picture, but in this photo you see so much. Its not what the picture is showing you, its what the picture isnt showing you. The picture is of a soldiers feet. The feet of this particular soldier are deformed, and look like they have b...

Thursday, November 21, 2019

What efforts have governments in Korea made to reform the chaebol Essay

What efforts have governments in Korea made to reform the chaebol since the mid 1990s - Essay Example Over the past two decades its annual growth rate in terms of gross national product (GNP) has been 9% and exports have increased 30%--the highest increase and growth rate in the world for that time span. By achieving $70 billion annually in exports, with a surplus in ordinary balance of more than $9 billion a year, Korea is now among the worlds top ten exporters. Today, Koreas per-capita income has reached $5,000--up from a meager $82 in 1961 (Chan Sup Chang, 1988). It is clear that strong leadership, sound economic planning by the government and the prodigious productivity of Koreas workers are important elements in this remarkable economic boom. As one Japanese executive said, "The Koreans are the only people who still work hard." Skilled and diligent workers have been an especially important driving force behind economic success (Ihlwan, 1998). According to the International Labour Organization, the Korean work week averages 54.4 hours--the highest in the world. However, the real catalysts in Koreas economic success have been the efforts of the private business sector, especially those of the chaebols (Korean conglomerates or financial cliques). The Bank of Korea reports that the total earnings of Koreas top 30 chaebols will reach $200 billion--about 95% of the nations GNP--in the 1990s. Clearly, the state of the Korean economy reflects the success of the chaebols; as a result, these groups have piqued international interest. In this article we shall examine the corporate values and strategies unique to chaebols. Korean chaebols--e.g., Hyundai, Samsung, and Lucky-Goldstar--emerged as major corporations during the late 1950s. The formation and growth of such conglomerates accelerated between the early 1960s (e.g., Hanjin, Korea Explosive, Hyosung, Ssangyong, and Dong-A) and the early 1970s (e.g., Daewoo, Sunkyong, Lotte, Kolon, and Doosan). Korean chaebols are often compared to

Wednesday, November 20, 2019

I want you to choose a topic from the readings Essay

I want you to choose a topic from the readings - Essay Example Sarah sparks is talking about entitlement in students and further explains some of the different scenarios that irritate students leading to aggravation. Students according to a research by Tracey Zinn, a psychology associate professor, show that teachers may be unintentionally feeding the sense of entitlement. The professor and the James Madison colleagues are researching on ways to measure academic entitlement and how it develops. Findings have surprisingly found out that students are most likely to show â€Å"serious instances of incivility† right after academic assessment, be they tests results or mid-term grades. Some of the symptoms they came up with showing entitlement in students were: knowledge is a right that should be delivered with very little effort or discomfort on the students part; a high grade should come, not from mastery of material, but in return for non-academic aspects of education; if a student does not perform well on a test, it is a sign that the test was too difficult, not that the student did not understand the material. The researchers also found out that students who scored high on assessment of academic entitlement were less able to control their own learning and had less sense of control. However; professor Zinn has not found the direct cause and effect between specific teacher behavior and student entitlement. The professor though suggests that, there are some potential ways teachers can cut down on the whine. These included options such as providing clear expectations for students and assignments, in which the effort put in is clearly related to the grade a student, will receive. They should explain why particular policies are set up and also explain the value of the task the teachers ask students to do. The teachers are urged not to respond to students request for â€Å"the right answer† but rather help students to understand the concepts and to think through their own problem solving. As

Sunday, November 17, 2019

Answering the question Essay Example | Topics and Well Written Essays - 1000 words - 1

Answering the question - Essay Example Zrich zum Beispiel ist 2000 Jahre alt. Die Berner Altstadt ist im UNESCO-Verzeichnis der Weltkulturgter. Es gibt noch viele Jahrhunderte alte, relativ intakte, kompakte Kleinstdte. Die dominanten Bauten in den Stdten (vorwiegend Regierungsgebude, Banken oder groe Hotels) errichtete man zum grten Teil im 19. Jahrhundert. Please mark or fill in the correct answer clearly. There is only ONE correct answer to each question or statement. TASK 1 Wie viel verstehen Sie Write your answers in ENGLISH (unless otherwise indicated) in the space provided. /2 1. Why do most of the Swiss people rent apartments or houses List two reasons. (2 pts.) a: There is little land for building, which makes houses and flats expensive. Many people can not afford purchasing ones. b: The rules for building are very strict. /1 2. If you made 3,000 CHF (Swiss Francs) per month, how much rent would you most likely pay per month (1 pt.) a. 650 CHF. b. 550 CHF. c. 500 CHF. /1 3. Most Swiss households consisted of how many people in 1990 (1 pt.) 1 or 2. /1 4. Why can't you easily change a building to have it look the way you want it (Explain the reason for the strict rules.) (1 pt.) The Swiss try to preserve their initial architecture style as many of their buildings are centuries old and considered significant part of the world culture. /3 5. Which three areas in villages are affected by building bylaws (3 pts.) a. The area for houses b. The area for industry c. The area for agriculture /1 6. Why is stability important for construction (1 pt.)It makes the constructions durable. /1 7. Where do most people live-in cities or in the countryside (1 pt.) About 1/3 of the population lives in the five biggest cities of Switzerland, however there...Das bedaeutet, dass man selbst ohne Erlaubniss nichts veraendern kann. Building in Switzerland is restricted by law, and there are several reasons for it. First of all, there is little land, so before building one has to make an accurate plan taking to account all the little details. Another important thing is to protect beautiful old architecture of Switzerland. This means that nobody can change anything without permission. So, there are very strict rules for building in Switzerland, which, on the one hand, makes houses and flats expensive, on the other hand, it guarantees the high quality of building works and the protection of the old architecture style.

Friday, November 15, 2019

Water Filtration And Purification And Its Effects Environmental Sciences Essay

Water Filtration And Purification And Its Effects Environmental Sciences Essay Filtering and Purifying water, before you drink it, has now become a crucial part of living in a rapidly growing, economically expanding world. In todays society water is reused over and over again. Not only to recycle but to produce enough to sustain people in their everyday lives. The process of filtration makes our water clean by removing visible and non-visible particles. The process of purification makes the water safe and clean to drink. Taking these processes seriously can keep you and the people around you safe and free of harmful substances found in water. A ten step quality process of filtering spring water begins by: Selecting a source and monitoring the water you chose (Arrowhead 7). Some drinking water such as Arrowhead source is a natural spring source (Arrowhead 7). The selection of springs is based on the natural composition, lack of bacteria, availability, and taste (Arrowhead 7). Especially trained geologists and hydrologists monitor the springs on a regular schedule at the place of the source. (Arrowhead 7). Sourcing the water receiving and monitoring the source (Arrowhead 7). Receiving the source water can be as much of a challenge and discovering the source. By following simple steps the water we buy and drink gets to the site in order to begin the filtration process. Spring water is transported by food-grade pipelines, or often by clean stainless steel tanker trucks. Which eventually go directly to the water filter plants (Arrowhead 7). Filters called One-micron filters remove sand and/or other particles that are partially visible or present in the water(Arrowhead 7). The Storage of water (Arrowhead 7) This temporary state of storing the water is done in food-grade storage tanks (Arrowhead8). The water in the tanks is tested (Arrowhead 8). Micro-Filtering the spring water (Arrowhead 8). Two-stage, micro-filters, filter the raw spring water collected from the source (Arrowhead 8). These filters are created to filter out particles and tiny as 0.2 micron in diameter (Arrowhead 8). The Ultraviolent light and Ozone disinfection stage (Arrowhead 8). The Ultraviolent process removes non-visible bacteria (Arrowhead 8). The Micro-filtration is like a second step that adds to the removal of bacteria (Arrowhead 8). Another filtration system called the HydRO-7 process is used by Aquafina Inc. Unlike companies that use spring water Aquafina reuses public water. Here are the 7 simple steps enabling a public water source to be safe and clean to drink. Step One: Removes particles with Pre-filtration. Step Two: Seizes even smaller particles. Step Three: Removes organic matter by UV. Step Four: Removes solid minerals by using reverse osmosis. Step Five: Sets apart trace elements by using an Activated Carbon Filter. Step Six: Makes the water very clear by using a Polishing Filter. Step Seven: the final purification stage is done in an Ozonized Water Tank and the Ozone Generator. (I received all of the information in the past paragraph from (http://www.aquafina.com/) Other water products similar to Arrowhead and Aquafina all have to follow the required statement under California law. These laws determine what waters are safe and what departments are allowed to develop and sell bottled water. Water in California is produced and used from sources such as; lakes, rivers, streams, reservoirs, ponds, wells, and springs. Often water that has traveled through the earth picks up natural elements, and substances that are found due to human and animals natural activities such as pollution (Arrowhead 23). Benefits following the filtration and purification process done by companies such as Suburban Water Systems include; the removal of dangerous elements such as Arsenic, Barium, Cadmium, Chromium, Fluoride, Lead, Mercury, Nitrates, and Radium. These elements are removed by an advance process of reverse osmosis. Other assets include; improvement in taste, bathing water, laundry, dishwashing, cleansing water, and maintenance as well (www.subwater.com). Filtering and purifying your water is a basic survival skill too. One basic rule of wilderness survival is; filter + purify = safe to drink. So if you are ever caught in a situation of survival remember this rule. (Bryan 1) The Earth has a system that has been around since the beginning of time, we know it as the Water Cycle. All of the earths features (including us) depend on the Water Cycle. It explains why the earth never runs out of water and only changes state or form (Usborne 51). But society today has damaged this system by polluting the land, sea, and air. Causing much of the pure water to be used and polluted. We use so many chemicals and man-made systems to make the water safe to drink. It makes you wonder whether or not this water is truly safe to be used (Usborne 51). Different types of water found in the U.S. include; Bottled water which refers to any type of water being contained in a sealed container primarily for domestic use by humans. Vended Water, meaning that it has not undergone the same advanced treatment as bottled water and is dispensed through a public water facility. Both are the two forms of clean water available in California. Each is protected under the CDPH or California Department of Public Health (www.cdph.ca.gov). When survival skills are needed finding water can be a challenge. Dehydration is a common result of lack of healthy water, leading most of the time to serious medical conditions. Make sure to note that if you are ever caught in a challenging situation in search of water that you check your source and make sure it is safe and clean to drink. Contaminated water is sometimes easily noticed if you look for obvious signs; turbidity (cloudiness of water), pesticides, fertilizers (from agricultural land nearby), and a more noticed pest called Giardia Lambia. When looking for water along a trail or when camping use your map. Most maps show any sources of water these maps are called Topo maps (Wilderness-suvival-skills.com). Water is a basic part of living. Making sure your water is clean is the first step in staying healthy. Since majority of our water is recycled we should make sure we know what types are best. Purifying water is just as necessary as filtering it, if not even more important. Purifying water is done in order to clean the water of non-visible elements. In doing this you make the water clear and able to be digested safely into our bodies. Purifying is done in water plants as mentioned before. But if you find yourself in a situation in need of water you must filter and purify it yourself. When or if this problem ever arises you must filter your water using available items and then boil the water. This makes the water somewhat clean and safe to drink. Thanks to advancements in our ways of cleaning our water, we now have clean safe water for our use at the turn of a nob. When using water we should make sure we use it wisely and are cautious to the harmful pollution in water outside. So when outdoors drink out of a water bottle and dont drink out of the stream†¦ But if found without a clean water at hand remember filter + purify=safe to drink!

Tuesday, November 12, 2019

Religious Renewal and Sexual Masochism in Batter my heart, three person

Religious Renewal and Sexual Masochism in "Batter my heart, three person'd God" In Donne's Holy Sonnet, "Batter my heart, three person'd God," themes of religious renewal and sexual masochism are abundant. While religious renewal is clearly the front-most, and most clearly defined meaning of the poem, the poet's choice of words and subtle analogies leave the poem wide open for speculation in sexual meaning. That John Donne was a preacher, the fire and brimstone, evangelical ringings of religious renewal in this poem are well founded. A man's soul, invaded by Satan's sin, must be purged by whatever means necessary by God's force. Donne associates his corrupted soul with that of an "usurp'd towne," invaded by an enemy (Satan), but "to'another due," (the Trinity). He asks God to break the impurity by force and to beat his soul clean and into repentance. While this all makes sense on the first level, there are many dualities, and sexual undertones present in the poem. Several words in the poem contain multiple meanings, further promoting the mingling of the sacred and profane throughout the poem. Particularly towards the end of the poem, these words help to justify what the reader might have guessed at earlier in the poem. 'Enthrall,' for example, used in the sense of something God does to the poet, can mean 'to hold or capture, enslave', (having a negative connotation) or 'to hold spellbound by pleasing qualities' (having a positive connotation). This makes unclear, or at least arguable, Donne's attitudes toward the emotions involved in being taken by God, as well as the possibility of pleasure found in a sexual act being described. Another, 'betroth'd,' usua... ... beating of the poet by God. "O'erthrow mee,'and bend / Your force to breake, blowe, burn and make me new," while again implying that the poet is a woman (God having to bend his force-phallic reference-to break the woman, an expression used in the taking of a woman's virginity), indicates an act of sexual violence. "Untie, or breake that knot againe" paints a picture of bondage, as does "imprison mee" and "enthrall mee." The last line, "Nor ever chast, except you ravish mee" implies the rape of the virgin, having chastity no more after being ravished, or raped. Either way you look at this poem, in the religious or sexual sense, it is powerful and controlling. Donne intertwines sexual connotations with religious renewal and the ridding of sins from the body. He has made sure not to support either reading too fully, leaving both open to speculation.

Sunday, November 10, 2019

Ray Rice vs. Solange and Jay Z

Violence against one another is not okay either way male or female. The Ray Rice, Jay Z and Collagen incident happened the exact same way Just the opposite sex. This fight within the celebrities had the world talking. â€Å"What Happened? Or is there sound to hear what they're sallying The reason this has an effect on our culture Is because both Jay Z and Ray Rice are huge role models to people. In the music Industry Jay Z Is a role model to people because people want to be just like him.Ray Rice is the man n the NFG and he has people that want to play in the league and that look up to him as their favorite player. The difference between the videos is that one is a male and one is a female whiffs doing the hitting. No one knows what really happened or what caused the fight they Just see hitting. Now since Collagen was hitting Jay Z people didn't make It a big deal, some of the peoples comments were â€Å"Collagen got them hands! Or She can fight! † people were basically worsh ipping her, not understanding that she was attacking him. What if he would have swung back?Then Jay z would have been labeled as a woman beater, but instead he didn't he Just kept moving her. In the middle of everything I still am trying to figure out why Beyond didn't do anything. Instead of people understanding that Collagen is a woman and not hitting her was the right thing to do, people are saying he's a female dog and a vagina. All of this Is because he has respect not only for women but his wife, by not hitting her sister. One thing I did find interesting while researching is that some reporters say he reason Collagen went off like that is because she found out Jay Z has been hitting Beyond.Beyond has a song out and in this song one of her lyrics say sit goes down when it's a billion dollars on an elevator. † Shocker that happened, could that be the reason Beyond wasn't fighting back? Now Ray Rice and his fiancà ©Ã‚ ©e, that whole video was disrespectful to start. Not o nly did he spit on her while she was walking past but he did It again when he got on the elevator. For Ray Rice to do something like that shows that he has no respect for any woman. One person comment was â€Å"l onto care how mad you get never spit on a lady then put your hands on her! ESP. better known as Sports Center was going crazy. Ray Rice was the trending topic all day. He ended up getting suspended and his wife ended up staying with him. She caused all that drama to be right back with him. Some people still call her a Gold- digger, because she Just wants his money. The fight between Ray Rice and his fiancà ©Ã‚ ©e grabbed more attention in the media and throughout the world because he's a football athlete. He has his whole football career ahead of him and he almost threw it al away over hitting a woman.I remember watching ESP. and one of the reporters stated, â€Å"Was he drunk? Does he know what could happen to him? † Number three of media literacy is the ability t o distinguish emotional from reasoned reactions when responding to content and to act accordingly. The emotional part was watching his sympathy for her. In closing, both fights were wrong, both fights shouldn't have happened, but everyone has their problems. No one knows everyone's problems but when you're a star or a celebrity, there is no private life.

Friday, November 8, 2019

Jackson vs. Avery Duels Essay Example

Jackson vs. Avery Duels Essay Example Jackson vs. Avery Duels Essay Jackson vs. Avery Duels Essay Andrew Jackson and Waighstill Avery, both of them lawyers, at one point found themselves in a predicament of honor that required that they engage in a duel. Like Hamilton’s feelings toward Burr, both parties, apparently, did not bear the sort of ill-wishes against their opponents that would necessitate violence, however, and both men agreed to fire into the air. The mutual distaste for actually murdering their opponent kept this duel from achieving the tragic result of the Hamilton vs. Burr affair. The Jackson vs. Avery duel erupted under predicable circumstances. Avery and Jackson were having a dispute over a book which Avery considered to be an authority on law, Bacon’s Abridgement, which Jackson criticized harshly. Avery implied that Jackson had not the requisite knowledge to criticize any book to which Jackson replied that at least he had the good sense to not accept legal fees. Insults over knowledge and competence in one’s profession, apparently delivered in a rather sarcastic manner, led to the duel being taken up as a remedy (Arthur, 1914).

Wednesday, November 6, 2019

Free Essays on Coca-Cola Ent.

COCA-COLA ENTERPRISES INC. (CCE) Introduction The syrupy Coca-Cola product was invented in May 1886 by Dr. John S. Pemberton in Atlanta, Georgia. The "Coca-Cola" name was actually suggested by Dr. Pemberton's bookkeeper, Frank Robinson. Mr. Robinson penned the name Coca-Cola in the flowing script that is famous today. Coca-Cola was first sold at a soda fountain in the Jacob’s Pharmacy (also in Atlanta) by Willis Venable. During its first year on the market, Coca-Cola sales of Coca-Cola averaged only nine drinks a day, adding up to total sales for that year of merely $50. This was not even enough to cover the year’s expenses, which were just over $70 - Dr. Pemberton took a loss. Today, products of Coca-Cola Enterprises are consumed at a rate of more than one billion drinks per day. Coca-Cola Enterprises’ holdings over the years have become diverse in the restaurants industry, supermarket industry and vending, and the soft drink industry customer base is probably the widest and deepest base in a world that is flooded with some many soft drink choices. According to Beverage Digest, the customer base for soft drinks is a whopping 95% of regular users in the United States, which represents a large field of potential customers for Coca-Cola. Coca-Cola Enterprises is very much aware of the soft drink population, and it targets heads of households. This is apparent in many of the ad campaigns that singsong catchy jingles such as â€Å"Always Coca-Cola,† which refers to the traditional beverage heritage of its product. The company also reinforces this warm and fuzzy family feeling in the â€Å"Coca-Cola Classic† advertisements, which directly targets the older consumer. This name reflects an image of wholesome values, reliability, and old time no stalgia. Throughout its years of existence, Coca-Cola Enterprises has gained momentum in the non-alcoholic beverage realm. This company that started out at very meager beginnings now po... Free Essays on Coca-Cola Ent. Free Essays on Coca-Cola Ent. COCA-COLA ENTERPRISES INC. (CCE) Introduction The syrupy Coca-Cola product was invented in May 1886 by Dr. John S. Pemberton in Atlanta, Georgia. The "Coca-Cola" name was actually suggested by Dr. Pemberton's bookkeeper, Frank Robinson. Mr. Robinson penned the name Coca-Cola in the flowing script that is famous today. Coca-Cola was first sold at a soda fountain in the Jacob’s Pharmacy (also in Atlanta) by Willis Venable. During its first year on the market, Coca-Cola sales of Coca-Cola averaged only nine drinks a day, adding up to total sales for that year of merely $50. This was not even enough to cover the year’s expenses, which were just over $70 - Dr. Pemberton took a loss. Today, products of Coca-Cola Enterprises are consumed at a rate of more than one billion drinks per day. Coca-Cola Enterprises’ holdings over the years have become diverse in the restaurants industry, supermarket industry and vending, and the soft drink industry customer base is probably the widest and deepest base in a world that is flooded with some many soft drink choices. According to Beverage Digest, the customer base for soft drinks is a whopping 95% of regular users in the United States, which represents a large field of potential customers for Coca-Cola. Coca-Cola Enterprises is very much aware of the soft drink population, and it targets heads of households. This is apparent in many of the ad campaigns that singsong catchy jingles such as â€Å"Always Coca-Cola,† which refers to the traditional beverage heritage of its product. The company also reinforces this warm and fuzzy family feeling in the â€Å"Coca-Cola Classic† advertisements, which directly targets the older consumer. This name reflects an image of wholesome values, reliability, and old time no stalgia. Throughout its years of existence, Coca-Cola Enterprises has gained momentum in the non-alcoholic beverage realm. This company that started out at very meager beginnings now po...

Sunday, November 3, 2019

Law of Evidence Essay Example | Topics and Well Written Essays - 2500 words

Law of Evidence - Essay Example This has to be done through the finding of credible evidence that proves beyond doubt that the accused person is indeed guilty. The decisions that have been made in recent years where there has been no sufficient proof from the prosecution to show that the accused individual is guilty of the crime committed have been influenced by the one golden thread rule. While this rule is still one of the most paramount in the justice system, it has come to be put aside in many cases because of the fact that many of the courts have been under immense pressure to get rid of a many cases as possible in the shortest time available. This has ensured that the quality of the evidence provided in court before a verdict was reached has been eroded. Because of this, it can be said that some of the individuals who have gone through the English justice system and have been found guilty may indeed have been sentenced falsely. If this is the case, then the gravest violation of justice by the courts may have taken place and more needs to be done to ensure that such gaps in the criminal justice system are sealed to help boost public confidence in it. ... Instead, it has been declared that it is a means through which the truth can be found, despite the fact that the truth is something that can be considered to be relative. The truth according to one individual may not necessarily be so to another and this has led to the almost total disregard for the correct and thorough examination of the evidence at hand. Judges, who are supposed to be impartial referees, have come to be directly involved in the cases because of the pressure that has been put on them to show as many results as possible; disregarding the fact that the judges have to be impartial in order to perform best. One of the biggest failures of the criminal justice system has been the absolute absence of any meaningful sanction for its failure to meet schedules.2 In addition, this lack of sanction also extends to the failure to make proper disclosure and to ensure that all the witnesses named appear at court. One would go as far as to state that the definition of finding the t ruth, according to the criminal justice system is not the seeking of the answers concerning the case, but has in reality turned into a bid to ensure the securing of a conviction as speedily and as cheaply as possible. The need for speed as well as the reduction of the expenses of the trials, while seen as being economical is among the reasons why the criminal justice system is failing to deliver justice as it should. An example of this scenario is the Woolmington case where at the trial the judge informed the jury that if it was convinced that Woolmington killed his wife, then it was up to Woolmington himself to convince the jury that the shooting was an accident. When Woolmington gave evidence, he admitted to shooting his wife but said

Friday, November 1, 2019

American history of business 1865-present Research Paper

American history of business 1865-present - Research Paper Example Each American year in the historical era is documented besides its prevailing economic, social or political phenomenon, thus these classifications are done in terms of units. The units are mainly clusters of years, each of which major transitions were taking place in all realms. However, each cluster of years since 1865 was marked by a contentious issue that required immediate response from the concerned groups (Olson, 2007). These units are investigated in regards to the following divisions: unit 1 (1865-1876) Industrial Revolution, railroads, development of corporations, finance, communication, labor, and introduction of trusts. Unit two (1877-1920) explains about the Impact of Roosevelt's "New Nationalism" vs. Wilson's "New Freedom" and welfare capitalism. Unit 3 (1921-1945) views Technology, consumer spending, introduction of the automobile, and the Great Depression. Unit 4 (1946-1976) looks into Postwar prosperity, organized labor, and the Taft-Hartley Act, while unit 5 (1976-pr esent) is regarded in terms of NAFTA, computer age, and the economic downturn in American business. The major players in regards to the transformations that were taking place in America included the political leaders, immigrated people from other continents, laborers and activists dominating various economic, political, and social realms (Olson, 2007). The discussion in this paper is aimed at the establishment of the history of American business since 1865 and up to the present date. The various units will be carefully examined to enhance the comprehension of the business issue in the aforementioned years. Unit 1 (1865-1876) In unit one, business in America consisted of Industrial Revolution, railroads, development of corporations, finance, communication, labor, and introduction of trusts. There was rapid development in America in this period, rendering America become a leading industrial continent in the global context. The industrial revolution was facilitated by the abundance of natural resources that were exploited to yield useful industrial products. Adequate land was also available that could be utilized in the production of agricultural raw materials, serving as industrial raw materials in the set up industries. The prior and prevailing construction of railroads provided an ample ground for the required industrialization, since the industrialists could penetrate to the deepest parts in search for industrial materials. Availability of adequate labor acted as a long-term rationale to the fast-paced industrial revolution that took place in America. The period was also significant in seeing the Asians and Mexicans rapidly immigrate to America in search for labor, thus the industrializing America gained a favorable ground for the required activities. The ideal presence of rivers that were navigable provided a ground for the cheap extraction of industrial energy as other related items of requirement. The Americans had also enough capital, which served as the major contributing factor to the aspect of industrialization (Ripper, 2008). The development of railroads was rapidly taking place in this period in a bid to meet the immediate needs for transport and industrial increment. The more the railroads continued to expand, the more the industrial expansions took place in America. The opening of these railroads in all places in America saw the creation of more farms, markets, towns in areas that

Wednesday, October 30, 2019

Chinese Popular Culture Term Paper Example | Topics and Well Written Essays - 1250 words - 1

Chinese Popular Culture - Term Paper Example Chinese great political icons like Mao have changed the social, political and cultural outlook of the country. Today China has surpassed major nations in economic development, education and technological advancement. Once a poor nation, China now has a population indulge in modern cars, technological gadgets, meat – based diet and luxury clothing. Moreover, the Chinese media has evolved in to dynamism that has transformed the day to day life of people of the nation. â€Å"The embrace of a market economy, with all its attendant risks, has forced the development of new governmental and social policies to stabilize China’s social structure through the conceptual category of the ‘middle class†. Today, China has become a world competitor and the super powers of world are looking up to China to understand their excellence in hard work, political strategy and social reform. Chinese Popular Culture The Chinese popular culture had been anchored due to the open door policy implement by the country in the 21st century. As per (Latham 20)â€Å" Since the open door policy and economic reform in mainland China in the 1980s tension between the two Chinese territories have gradually esed†.Westernization is the key aspect behind Chinese popular culture as new generation is imitating West in their daily life. China has a lasting cultural heritage and the emerging China is more on a conflict on adopting whether to adopt western or Chinese culture. According to (Wu 2)â€Å" With their different positions and experiences in the world, China and the west cannot establish the same culture tradition†. The Chinese popular culture has transformed its population into diverse and intensely sophisticated class. Chinese people are influenced more by popular culture rather than politics of their country. They have shifted their interest to fashion, luxury, comfort and globalization. For example, one of the examples of Chinese popular culture is hero w orship where in sports icon and other celebrities are admired overly. They worship domestic celebrities, whether it is sports, movie, music or art related. As per (Ren) â€Å"In the business realm, Chinese heroes have also arisen to carry the torch of China’s aspirations. People like Li Yan Hong and Robin Li, founders of Baidu.com, or famed entrepreneur Jack Ma, founder of Alibaba group, which owns the most popular e-commerce sites, or Pan Shiyi and wife Zhang Xin, the Donald Trumps of China†. Another example of it is the upsurge of fast food outlets in big cities of China. People have started to adapt to international fast food chains like KFC , Mc Donalds and Pizza hut in their attempt to align with western culture. Chinese Media and Popular Culture In Chinese media legacy, the Chinese writing, paper money, printing process and lithography has a prominent role to play. Preceding mass media, hand writing and printing were the main source of communication in China and as technology progressed, electrical, technical and mechanical devices replaced it. As far as Chinese history is considered, two forms of media that has shaped Chinese people’s lives are radio and computer. Radio has been the media which has influenced Socialist China greatly. In socialist China, wired radio, loud speakers and radio

Monday, October 28, 2019

Summer Reading Response Essay Example for Free

Summer Reading Response Essay 1. â€Å"His manner The quiet air around. When he turned the light on in the small, callous washroom that night, Liesel observed the strangeness of her foster father’s eyes. They were made of kindness, and silver. Like soft silver, melting Liesel, upon seeing those eyes, understood that Hans Hubermann was worth a lot.† The significance of this passage is the description of Hans Hubermann’s eyes as the color represents his worth and personality. It contributes to the characterization of Hans Hubermann. His eyes are described as â€Å"made of kindness and silver†. Silver represents riches and valuables and as seen later in the story, Hans Hubermann is someone that is very valuable and close to Liesel’s heart. He also demonstrates a quiet kindness as he agrees to take in Max regardless of the dangers that lie within harboring a Jew in those times. 2. â€Å"She remained on the steps, waiting for Papa, watching the stray ash and the corpse of collected books. Everything was sad. Orange and red embers looked like rejected candy, and most of the crowd had vanished. She’d seen Frau Diller leave (very satisfied) and Pfiffikus (white hair, a Nazi uniform, the same dilapidated shoes, and a triumphant whistle). Now there was nothing but cleaning up, and soon, no one would even imagine it had happened.† The colors in this passage, orange, red, and white, signify the destruction and death that was happening all around them at the moment even though the destruction was to a pile of books. It represents the turmoil in Liesel’s life and more to come. The â€Å"corpse of collected books† seems like a sort of foreshadowing as in the end, piles of corpses from Himmel Street. Then how everyone was completely ignorant to the burning of precious books, they are ignorant to the mistreatment of the Jews. The author’s use of similes joined together with heavy diction such as rejected, corpse, sad, and dilapidated leaves behind a mood of morose sadness. 3. â€Å"After a few seconds, he manages to scratch his head (the rustle of kindling) and he looked at her. His movements were fragmented, and now that they were open, his eyes were swampy and brown. Thick and heavy.† The author decides to focus on Max’s eyes and uses the adjectives swampy, brown, thick, and heavy. It gives the feeling of a person who has gone through much in his life. Also shown later in the book, brown represents a kind person who is close to the earth. Max always has Leisel give him the weather report as he cannot leave his hiding place to see outside. He is always kind to Liesel and even writes her a book for her birthday. His swampy, heavy eyes describe him as a person who has gone through sadness and suffering for the sole reason that he is a Jew. 4. â€Å"They keep triggering inside me. They harass my memory. I see them tall in their heaps, all mounted on top of each other. There is air like plastic, a horizon like setting glue. There are skies manufactured by people, punctured and leaking, and there are soft, coal-colored clouds, beating like black hearts. And then. There is death.† This passage is especially powerful in the way the author creates the mood and tone through the diction and description. The simile that describes the clouds as beating black hearts gives the feeling of death and evil. Black as a color represents death and evil. â€Å"There is air like plastic† gives the picture of the air suffocating the people that dwell within it. 5. â€Å"As he stood, Max looked first at the girl and then stared directly into the sky who was wide and blue and magnificent. There were heavy beams-planks of sun-falling randomly, wonderfully to the road. Clouds arched their backs to look behind as they started again to move on. â€Å"It’s such a beautiful day,† he said, and his voice in many pieces. A great day to die. A great day to die, like this.† The sky was described as blue and magnificent although the situation juxtaposes with the brightly described day. The author successfully adds in a piece of irony through the contrast of making the day beautiful while Max is think about what a great day it is to die. The cloud described as looking back gives the feeling of something of immense importance that is about to happen. The colors give off the mood of happiness and the imagery going with the sun create an image completely wrong for the situation.

Saturday, October 26, 2019

Salmonella enterica typhi Essay -- Medical Health Biology Essays

Salmonella enterica typhi Introduction: Worldwide, typhoid fever affects roughly 17 million people annually, causing nearly 600,000 deaths. The causative agent, Salmonella enterica typhi (referred to as Salmonella typhi from now on), is an obligate parasite that has no known natural reservoir outside of humans. Little is known about the historical emergence of human S. typhi infections, however it is thought to have caused the deaths of many famous figures such as British author and poet Rudyard Kipling, the inventor of the airplane, Wilbur Wright, and the Greek Empire’s Alexander the Great. The earliest recorded epidemic occurred in Jamestown, VA where it is thought that 6,000 people died of typhoid fever in the early 17th Century. This disease is rare in the United States and developed nations, but always poses the risk of emergence. History: Originally isolated in 1880 by Karl J. Erberth, S. typhi is a multi-organ pathogen that inhabits the lympathic tissues of the small intestine, liver, spleen, and bloodstream of infected humans. It is not known to infect animals and is most common in developing countries with poor sanitary systems and lack of antibiotics, putting travelers to Asia, Latin America, and Africa in a high risk group. Of the 266 people infected in the United States in 2002, approximately 70% had traveled internationally within 6 weeks of the onset of disease. Microbiological Characteristics: This gram-negative enteric bacillus belongs to the family Enterobacteriaceae. It is a motile, facultative anaerobe that is susceptible to various antibiotics. Currently, 107 strains of this organism have been isolated, many containing varying metabolic characteristics, levels of virulence, and multi-drug r... ...asters have compromised sanitation. Although the incidence in the United States is very low, outbreaks and substantial epidemics still remain possible due to worldwide travel and unknowing carriers of the disease. The development of antibiotic treatments and several vaccines have presented the possibility of worldwide eradication. Until this is achieved, however, S. typhi and its characteristic typhoid fever will remain a threat for future epidemics. References Cited: Dennis Kunkel Microscopy, Inc. Health Canada: MSDS of Infectious Substances World Health Organization: Typhoid Fever Fact Sheet Centers for Disease Control and Prevention: Typhoid Fever Disease Information University of Florida Medical Micribiology and Infectious Diseases Department: Salmonella typhi Info Wikipedia.org: Typhoid Fever U. of Maryland Medical news: Typhoid Fever

Thursday, October 24, 2019

Ethical Impacts of the Internet on Children and Teenagers Essay

As the use of internet dominates every activity in the global market, its use in homes and schools has exponentially grown raising concern on its ethical effect on children and teenagers. The nature of the youngsters’ use of internet has generated heat and anxiety among the general public as the society calls for ethical and moral guidelines that would protect children and teenagers from negative effect of the internet. This paper proposes a research that will identify the effect of internet use among the young people as the academic and policy importance concerning the opportunities and dangers of internet use continue to be raised. The paper identifies these opportunities and dangers as it proposes the methodology and limitations for the research paper. 2. 0 Introduction 2. 1 Background Internet which slowly started as a network for military officers in the cold war eventually became an important tool in the academic corridors and today the former â€Å"Arpanet† has greatly grown to become the primary platform for communication and interaction for different communities around the world. As the Internet traffic hit millions of users each day the communication technology continue to grow to allow for infinite information access and instant interaction by users, a fact that has brought about a social paradigm shift in the way societies used to live in the earlier days. This technology has particularly been embraced by children and teenagers as a way of learning, socializing and leisure. In the developed countries and many other regions around the word, internet access has ceased to being a trademark for the privileged members of the society as its use in the workplace, education institutions and leisure places continue to grow exponentially. As the use of computers and internet become more and more entrenched in our day to day routine practices, it has become a basic feature not only in the offices but also at our homes. The presence of internet at our homes has opened up a â€Å"super highway† to children and teenagers who are being referred to as the â€Å"digital generation† that incidentally predisposes them to overwhelming information and social sites that may contribute heavily in shaping their behavioural patterns. Whereas internet offers a perfect educational platform for the young people, it is also seen largely as a risk factor that could expose them to adult sites, make them more addicted and dependant on the internet and eventually instil anti-social behaviour in some of them. While this issue demands a critical stance given the consequences it has on the future generation, very little independent researches has been conducted to inform the policy makers and end the growing public anxiety. In most of the researches conducted in the recent past only a few have focused on the social consequences of the internet among the children and teenagers. The households with children or/and teenagers that have access to the internet is however more common than those without (Wigley and Clacke, 2000). 2. 2 Research Objectives The main objective of the proposed research project is to explore the impact of the internet on children and teenagers based on the expected social, cognitive and behavioural patterns in the society. The research project will aim at identifying issues that deviate from the laid down expectations both at school, home and in the society which find their root from the internet. 2. 3 Research Question The proposed paper will focus on answering the following primary question; †¢ What are the ethical impact on the use of internet among the children and teenagers? To effectively explore the primary research question the following secondary questions will be analyzed? †¢ What are the children/teenagers perceptions towards internet? †¢ What are the perceptions of the parents whose children are using internet at home or/and school? †¢ What are the important contrasts in internet activities from what is expected to what is actually practised? †¢ What are the possible impacts of these struggles between the theoretical and practical internet activities on children/teenagers’ social development? 2. 4 Research Significance A study conducted in the UK by Wigley and Clacke (2000), revealed that among the young people aged between 7 and 16 years, 75% of them have used the internet as compared to only 38% from the adult population. This explains that in the contemporary society the young are actually the pioneers of the internet culture. For a long time children and teenagers have also been regarded as a special homogenous object in other studies a fact that has made this category of population marginalised and often left out in researches on the internet. Even in the midst of growing researches on e-commerce and e-democracy very little efforts are focusing on the expanding online market driven by the young people. For these reasons children and teenagers are often left out in technological advancement as the market analysis is evaluated. As the social effects of internet on the young people become obvious in most societies it is becoming more difficult to ignore the subject and therefore many empirical projects on children and teenagers use of the internet are coming up. This makes it appropriate moment in which the research agenda on this category of population must be given priority. 3. 0 Literature Review 3. 1 Nature of Internet Usage Recent surveys reveal that children and teenagers attach high value to the usage of internet to gather information, entertainment leisure and as a medium of communication. According to Valkenburg and Soeters (2001), 73% of the children and teenagers use internet as an education tool, 59% use it for E-mails, 38% to play games, 32% for chatting with friends and 31% use internet as a hobby and an area of interest. The internet has already revolutionized the social patterns of our younger population drastically changing the earlier forms of communication and interaction among the peers. A research conducted by Valkenburg and Soeters (2001), indicates that among most households internet has continued to elicit mixed reaction between the parents and their young ones as it is considered to easily lead the young toward the wrong direction if mismanaged or taken for granted. While the parents praise the internet for its role in availing most of the information that their children would need in pursuit of their education, the children consider the opportunity more as a source of entertainment that gives them a break from the other â€Å"old fashioned† entertainment sources. The tug of war between the parents and children demonstrates an obvious digital generation gap in which children and teenagers who normally acquire and understand new internet skills faster than their parents get transformed into â€Å"family tutors†. The expertise in computer and internet skills among the children gives them a symbolic advantage over their parents that can easily be mis-used in pushing their interests that could not necessarily be approved by their parents. The current researches on the social context in which internet is focusing more in identifying ways and means in which children and teenagers are changing their homes into centres for content production, entertainment and leisure. This fact has in essence brought about new approaches in children’s activities as questions linger on whether learning has become more fun, playing is turning more and more educational and whether online chatting is part of civic participation or a way of withdrawal from the general society. This kind of researches therefore calls for the need to analyse the online content that is most preferred by children and teenagers. This raises a challenge given the large volume of online contents from which one can choose from and the fact that the hypertext content can be actualized by the user. This has in effect discouraged most of the researchers carrying out studies on the impact of internet on children and teenagers. Most of the researches today are however guided by the policy issues that are endeavouring in trying to balance the benefits that the internet offers to the young population against the harm that may be associated with some of the sites. Therefore the key agenda is on how the society in general should ethically conceptualize and balance the benefits and the dangers of the internet on the children and teenagers within there spheres of influence.

Wednesday, October 23, 2019

Effective Leadership Traits in Correcting Organizational Deficiencies

Effective Leadership Traits in Correcting Organizational Deficiencies Timothy B. Ashby Devry University Leadership and Organizational Behavior GM 591 Professor Faggione January 26, 2011 Introduction Effective Leadership Traits in Correcting Organizational Deficiencies Lexington Country Place is a rehabilitation and long-term care facility that is owned and operated by Five Star Incorporated. Five Star is a relatively new corporation that has made great strides in promoting excellence in the care and rehabilitation of those in need of nursing care that extends beyond acute hospitalization. LCP has had a long-standing reputation of excellence in the Lexington, Kentucky community. Over a period of the past two years that reputation declined as a result of several factors but primarily because of ineffective leadership. My role at LCP is the evening shift RN House Supervisor. Some of my responsibilities include effectively handling any problems that may arise during the 3-11 shift. These problems may include making adjustments in staffing, assisting with admissions, public relation concerns, and using effective nursing assessment skills and making decisions that insure the safety and care of the residents at LCP. The current Director of Nursing, Angela Staiano, RN, BSN, has a proven track record of being an effective leader with a history of improving the quality of long-term care facilities. She was offered and accepted the position of DON at LCP several months ago following a state inspection in which LCP was noted as having several deficiencies. Since inspections are a matter of public record and customers are able to make comparisons with competitors, LCP had a decrease in its census. Problem Identification The problem being addressed in this paper is how ineffective leadership resulted in a decrease in the resident population, a complacent staff who were not committed to providing high standards of care, and as a result, a decreased profit for the organization. The lack of profitability affects not only the corporate center, but also affects the organization’s ability to make improvements to the facility, provide adequate resources to the residents, and to pay wages comparable with competitors in order to retain good employees. Shermerhorn (2010) writes that â€Å"organizations depend for their success on day-to-day decisions made by (leaders). The quality of these decisions influences both the long-term performance of an organization and its day-to-day character—in the eyes of employees, customers, and society at large. The problems at LCP directly resulted from poor decisions that were made of ineffective leaders. Literature Review An search on EBSChost for the phrase â€Å"effective leaderhip† resulted in 6373 results. The term â€Å"leadership traits† resulted in 718 results. A combination of the previous terms â€Å"effective leadership traits† provided too narrow a parameter with only nine research articles. A search for â€Å"types of leaders† generated 787 articles. â€Å"Leadership paths† located 151 results. A search for â€Å"organizational leadership behaviors† generated 23 results which defined a reasonable search parameter with adequate research articles to support this paper.

Tuesday, October 22, 2019

Smith Consulting Software Essay Example

Smith Consulting Software Essay Example Smith Consulting Software Essay Smith Consulting Software Essay System Analysis of Smith Consulting System Documentation BSA/385 Contents Abstract3 System Analysis of Smith Consulting System Documentation4 Introduction4 Customer Engagement Approach4 Software Development Processes and Procedures4 Quality Assurance Processes and Procedures6 Testing Procedures7 Developer Testing8 Reliability9 Accuracy9 Developer Performance Testing10 Developer Fault Testing10 User Acceptance Reliability11 User Acceptance Accuracy11 User Acceptance Fault Tolerance11 Test System Infrastructure15 Hardware/Software Capabilities15 Formal Program Specifications Format15 Conclusion16 Attachments18 Abstract The LTA (Learning Team A) group has been asked to define, develop, and propose standards for a software testing environment at Smith Consulting. The LTA group will review several aspects of the system documentation currently being used by Smith Consulting and provide proposed solutions for each of the areas defined in this document. System Analysis of Smith Consulting System Documentation Introduction Smith Consulting (Smith) has tasked LTA (Learning Team A) with developing standardized project approach and testing procedures so that prospective clients are confident that Smith is performing their contractual obligations efficiently. These procedures will be generalized so that they can be applied to any project that Smith takes on and have sufficient documentation so that the procedures are correctly applied to each project. This ensures that Smith has repeatable processes in place and can put more resources towards completing the project rather than developing the procedures to complete the project. Customer Engagement Approach Smith is dedicated to the long-term success of the project. Smith does not approach the projects as a system to be designed and left with the client to manage. Smith offers flexible management terms from support to full-time maintenance of any application Smith designs, ensuring that our dedication to service extends through the life of the product. Smith also strives to help every end-user, helping them to fully understand and embrace the new technology. Smith understands the challenges end-users face when moving to new technology, and we want every employee to be comfortable using the system. Software Development Processes and Procedures Smith realizes that there may not be one clear-cut solution for all software development projects and seeks to use a process that takes into account as many variables as possible when developing new software. This means that Smith will first need to determine the needs for the company. The first step in this process is to identify the stakeholders and develop a project timeline and budget. These factors will help drive the project toward the estimated completion date. The stakeholders will include members of Smith so that the project is kept manageable and realistic as far as time of completion and resources needed. The next step is creating an analysis team to work with the various stakeholders to understand what the company needs the new system to do. As the analysis is completed a more formalized design will be presented to the same stakeholders in the form of a data flow diagram to ensure that all the needs are being met. At this time the stakeholders will have the ability to present changes as part of the change ontrol process described as part of the Smith quality assurance processes. Smith will also implement additional design methods as required by the specific needs of a project. These methods include the use of new models, tools, and techniques in order to fully understand the system requirements. It may be necessary to bring in third-party vendors to provide and use the tools that these methods require. These vendors will be subject to a procurement process as indicated in the contract for the project and are subject to a determination of need by the stakeholders. The next step is for a finalized data flow diagram to be presented to a design team who will then analyze and determine the best approach for implementing the design. This will include determination of a tool, and the solicitation of vendors to provide the tool as needed. The stakeholders will again be consulted before any final determinations are made. Once a tool or vendor is determined the design team will work on implementing the design. The design will be implemented as part of the project plan timeline and Smith will provide developer testing in addition to end-user acceptance testing. This ensures that the final product matches the goals of the system as laid out in the project plan. Once acceptance testing is completed the system will be implemented and the system will enter its training phase as indicated in the project plan. After full implementation, the system will enter the maintenance phase. Depending on the term of the contract, Smith will be involved in the maintenance phase of the system through its live cycle. All contracts include phone support for as-designed elements of the system. Quality Assurance Processes and Procedures Smith is dedicated to providing quality of the highest level in all its services to its clients. This quality is ensured through the use of tools put in place at the beginning of the project. The most important tool in use is the project manager. All of Smith’s project managers are qualified, experienced managers who take a hands-on approach to ensuring that a project stays on the timeline and within the budget. This includes weekly updates to shareholders as well as daily stand up meetings to ensure that everyone is on track and there are no concerns to delay the project. Any concerns are immediately made known and the manager will do his or her best to provide more resources to address the problem with minimal effects to the project plan. To ensure that the project is kept within scope, a strict change control process will be used to determine what parts of the project will be able to be changed and when. This can be different for every project; Smith approaches each project plan in a similar fashion, including setting priority, and secondary goals. The stakeholders have the ability to define these goals during the analysis phase as well as a say in the change control process. Primary goals are strictly followed and changes are made to these goals only when the outcome of the project is in jeopardy. Secondary goals are more flexible and their change control process is not as severe; however the process is strictly adhered to. This adherence to the change control process ensures that the project is a success and not dependent on the success or failure of individual parts. Testing Procedures For each level of testing that takes place, Smith will develop charts detailing the testing step to be performed, an example of the chart is shown in example 1. This chart includes sections to identify what is being tested (Actor), what is being done (Action) and a description of the testing task. In addition, a secondary chart will be provided that details each step to be performed to complete the test case in question. Actor| Action| Description| Customer/Employee/Etc. | Click Button 1| Button 1 starts the applications and takes the user to the login, etc. | Customer/Employee/Etc. | Click Button 2| Button 2 logs the current user into the system| Continue†¦| | | Step| Step Expected Result| 1. Launch Application/Etc. Application window should open and prompt user for credentials, etc. | 2. Login/Etc. | User should be logged into application and appropriate menu items should be shown based on user’s security level, etc. | Continue†¦| | Figure 1 – Sample Software Capability Testing Diagrams An additional process flow that will be followed by Smith engineers is to chart the process flow for all testing for easy review by clients and engineering staff. The format of the process flow is shown in Figure 2. Figure 2 – Sample Testing Data Flow Diagram Developer Testing Smith requires its developers to perform testing on each piece of a project that they are responsible for working on. Each of these tests ensures that the software is ready for the next step in the process, whether that is integration with other pieces or implementation. The developers are required to ensure that the testing covers reliability, accuracy, fault tolerance and performance as required by the architecture design documentation for the project. Reliability Reliability testing is important to ensure that the system is capable of handling input and output in all situations it is likely to encounter during use. This includes programming for proper error handling should a user input unexpected data, as well as for handling exceptions on the data output. Developers use the architecture document to control the input and output and use exception handling to notify the user that something has gone wrong without passing the bad data along to the next process. In order to test reliability developers will purposefully input bad data and the system is required to handle it correctly. The developers are required to check not only that the errors are thrown properly, but that they are informative and the bad data are not output. Accuracy Accuracy testing is important because the input must be received, stored, transformed and output correctly. Any failure in any of these steps will affect the accuracy of the system. Developers must develop algorithms to transform the data properly so that the output is as expected. Since system algorithms can be achieved in multiple ways that achieve the same results, it is important that the accuracy is tested as often as possible. Developers are required to develop and input use cases to ensure the data are being output as required. If the output is not what is expected the developers can roubleshoot and track down the problem and run the use cases again. The system architecture document will detail the results needs, but developers often must use creativity to develop a solution to match the requirements. Accuracy testing at the developer stage is a key step for accuracy in the implemented system. Developer Performance Testing Performance testing must be performed during the development phase to ensure that the system does not have any resource or application issues prior to deliver to the customer and conforms to the stated needs of the customer. At Smith performance testing is performed during unit testing and during integration testing. With unit performance testing the developer is able to identify issues easier than during integration testing. During the integration testing phase any module interaction that was not able to be identified during unit testing will be tested. Performance testing includes the development of test cases that test each module within the client application, if resources are required such as network connectivity or file I/O then these systems will also be tested. The expected results of performance testing will be defined during the system analysis phase and will be approved by the client as acceptable criteria. Developer Fault Testing Developer fault testing is a technique used by Smith to inject errors into the software/hardware project to test the capability of the system to handle the errors in expected ways. This method of testing aids developers in the identification of the inability of the application to respond to system conditions that are expected during the normal use of the product. By using fault testing the developers can include processes that respond to these error conditions in a meaningful way. User Acceptance Reliability Like developer reliability testing, user acceptance testing for reliability is important to ensure that the system will reliably handle inputs and outputs. In UAT, test cases will be provided to selected users from the customer’s side. These test cases will allow users to test inputting information into the system so the software can demonstrate that it is capable of handling various types of input by executing on it properly. The UAT will allow the customer to provide feedback to Smith on the test cases and anything that did not perform as expected so that Smith can make any modifications to the system. In the event that Smith has to make any changes, UAT will begin again after the system has been adjusted. User Acceptance Accuracy User acceptance testing for accuracy will provide users with tests to ensure that the system is capable of handling inputs, loading, processing, storage, and outputs accurately. These tests should be consistent with the original testing that took place in the development of the algorithms to ensure that the expected results are produced by the system to the degree of accuracy that is required by the application. All calculations that the system needs to be able to perform should be tested in the UAT to demonstrate to the customer that the system is capable of handling the calculations correctly. This is the chance for the customer to fully test the system and provide any feedback to Smith. The user tests will be developed to demonstrate the full capabilities of the system. User Acceptance Fault Tolerance Once the software has been designed and implemented, the end-user’s who will utilize the software will be able to test the software’s performance (User Acceptance Testing, 2010). Allowing the end-user’s to test the software will allow IT personnel to make any changes and fix bugs that may cause future errors. All though much software may not be productive due to errors, Smith depends on test results and test reports to ensure errors are fixed and errors in the system are debugged. Below are a few tools that are used for user acceptance testing and fault tolerance: * Test Results and Error Reports User Acceptance Sign-off (Figure 3) * Production Systems * Final Installation Procedures and Instructions * Final Documentation and Training Materials * Project Plan * Methodology Compliance Form (User Acceptance Testing, 2010) (Figure 4). Smith will use these tools to ensure the User-Interface is accurate and ready for deployment. Figures 3 and 4 are sample templates fo r some of the tools used. Figure 3 – User Acceptance Sign-Off Sheet Figure 4 Methodology Compliance Form Test System Infrastructure Hardware/Software Capabilities Smith uses QuickTest Professional 10. (QuickTest) software to perform testing on all of its software projects. The software is an automated testing environment that uses testing scripts to regression test all parts of a new software product. These testing scripts are created by a developer and ensure that as new items are added, the previously tested items maintain their same functionality. Since the testing scripts are setup in a GUI environment that uses capture technology to generate them directly from the software environment that is being tested, the time required to create them is minimal and the expected results are easy to predict (HP, 2007). This ease of use helps control the testing timeline so that the projects stay on track. In addition, QuickTest provides customizable reports about errors that can include screenshots and other information to make it easier for developer to recreate the errors so they can be resolved (HP, 2007). Smith maintains separate testing hardware to handle its testing needs. This environment utilizes quad-core Intel processors running Windows Vista and equipped with maximum memory capabilities so that the testing can run as quickly as possible. The separate environment ensures that the testing can run simultaneous to the development whenever possible so that the timeline set up for any project can be strictly adhered to. Formal Program Specifications Format The format of the specifications that will be used by the software engineers at Smith will is detailed in the attachment named: System Requirements Specification. This specification includes a complete description of the requirements of the system to be built. Detailed instructions are included to aid developers in the definition of the requirements and what will be one to satisfy that requirement. Conclusion Smith Consulting takes pride in providing professional development of systems for our clients. Having the processes and requirements in place as outlined in this document such as our quality assurance processes and our developer and user acceptance testing ensures that the systems that Smith Consulting builds remain in scope with the project plan and within budget. Our processes also help to ensure that the client and key stakeholders are engaged throughout the development lifecycle. References Everett, G. D. amp; McLeod, Jr. , R. (2007). Software Testing. Retrieved February 27, 2010, from University of Phoenix eCampus, Entire eBook. BSA385 – Introduction to Software Engineering. Frenzel, C. W. , amp; Frenel, J. C. (2004). Management of Information Technology, 4E. Retrieved February 14, 2010, from University of Phoenix eCampus, Entire eBook. BSA385 – Introduction to Software Engineering. Hewlett-Packard Development Company, L. P. (2007). HP QuickTest Professional software Data sheet. Retrieved March 5, 2010, from https://h10078. www1. p. com/cda/hpdc/navigation. do? action=downloadPDFamp;caid=3885amp;cp=54_4000_100amp;zn=btoamp;filename=4AA1-2116ENW. pdf Hewlett-Packard Development Company, L. P. (2010). HP QuickTest Professional software System Requirements. Retrieved March 5, 2010 from https://h10078. www1. hp. com/cda/hpms/display/main/hpms_content. jsp? zn=btoamp;cp=1-11-127-24^9674_4000_100__ Attachments Purpose: The System Requirements Specification (SRS ) is a complete description of the requirements of the system to be built. It is derived from Customer Requirements. It covers all the business functions, inputs, outputs, and system interfaces of the proposed project, and answers these questions: * What is the system or software supposed to do (from the customer’s point of view)? * What users, system hardware, other hardware, and other software does the system interact with? * What are the performance requirements, such as speed, recovery, and capacity? * What are any constraints on design? Scope: The System Requirements Specification must be completed for any systems development project. Instructions: Identify instructions for using the template. 1. Prior to releasing remove this template cover page. This is part of the template not part of the finished document. 2. Angle brackets (lt; gt;) indicate information to be input for specific project. Remove angle brackets (lt; gt;) when information is entered. 3. Template sections which do not apply to the system can be labeled as â€Å"Do not Apply† or removed from the document as long as the base requirement of information listed above has been recorded. 4. Template instructions are italicized and should be removed from the document. 5. Open the header/footer and update the appropriate information to the header. No information needs to be updated in the footer – this will occur automatically each time the file is closed. * lt;Project Namegt; System Requirements Specification Rev lt;1. 0, 1. x, 2. 0,gt; Revision # of document. Use 0. 1 thru 0. 9 for pre-approval drafts. Use 1. 0 thru 9. 9 for approved copies. lt;Dategt; Date of revision Prepared by: lt;Authorgt; * Approvers lt;Include a place for, and acquire approval by all critical project stakeholders, as required by the Software Development Guidelines. More approvals may be included as deemed appropriate. gt; The following â€Å"Approvers† are responsible for reviewing this System Requirements Specification and agree with the project’s requirements. The approvers understand and will support the responsibilities described herein for their organization. Note: Approver signatures are captured electronically in the Electronic Qualification Document Management System (EQDMS). lt;Namegt;| | Project Lead| | lt;Namegt;| | | | lt;Namegt;| | lt;other reviewergt;| | lt;Namegt;| | lt;Key Stakeholder #1gt;lt;lt;Titlegt;gt;| | lt;Namegt;| | lt;Key Stakeholder #2gt;lt;lt;Titlegt;gt;| | | | | Document History Date Revised| Version No. | Author| Reason for changes| | | | | | | | | | | | | | | | | | | | | Introduction7 Purpose7 Scope7 Definitions, Acronyms, and Abbreviations7 References7 Overview7 Overall Description7 System Perspective7 System Requirements7 System Interfaces8 User Interfaces8 Hardware Interfaces8 Software Interfaces8 Communications Interfaces8 Memory Constraints8 Operations8 Site Adaptation Requirements8 System Functions9 User Characteristics9 Constraints9 Assumptions and Dependencies9 Apportioning of Requirements9 Functional Requirements9 Performance Requirements9 Logical Database Requirements10 Design Constraints10 Standard Compliance10 Software System Attributes10 Supporting Information10 Introduction Purpose The SRS identifies all of the system requirements. The system requirements are derived from customer requirements as well as perceived customer needs and specific local and regulatory requirements. The SRS identifies all the system requirements sufficient for the developers to develop a system which meets customer expectations. In addition, the SRS provides sufficient detail for complete system validation. The audience is the entire project team and customer/sponsor representatives. Scope lt;Identify the software product(s) to be produced by name, explain what the software product will and will not do, include relevant benefits, objectives, and goals of the softwaregt; Definitions, Acronyms, and Abbreviations lt;Define all terms, acronyms, and abbreviationsgt; References lt;Provide a complete list of all documents referenced elsewhere in this document, identify each document by title, date, and publishing organization, specify the sources from which the reference to an appendix or another documentgt; Overview lt;Describe what the SRS contains and explain how the SRS is organizedgt; Overall Description System Perspective lt;Describe whether the system is totally self-contained or has interactions with other systems within or outside of its environment, a block diagram can be added here to show interconnections with other systems and requirements related to overall systemsgt; System Requ irements lt;The purpose of this section is to describe all of the software requirements to a level of detail sufficient to enable designers to design a system to satisfy those requirements and QA testers to test that the system satisfies those requirements. As a minimum, every requirement should include a description of every input/stimulus into the system and every output/response from the system, and all functions performed by the system in response to an input or in support of an output. gt; lt;The following sub-sections 3. 1 – 3. 15 identify different requirements categories. It is unlikely that every project will have requirements in each category. It is not necessary to identify requirements in each category, they are provided only as guidance to insure that each type of requirement is considered. All requirements should be listed in section 3 and each requirement should be uniquely numbered. gt; System Interfaces lt;List each system interface and identify the functionality of the software to accomplish the system requirement and the interface description to match the systemgt; * User Interfaces lt;Specify the logical interface between the software product and its users, including configuration characteristics such as required screen formats, page or window layouts, content of reports or menus, or availability of programmable function keys necessary to accomplish the software requirements. Specify the aspects of optimizing the interface with the person(s) who must use the system, an example would be constructing a list of do’s and don’ts on how the system will appear to the usergt;. * Hardware Interfaces lt;Specify the logical characteristics of each interface between the software product and the hardware components of the system. This includes configuration characteristics, supported devices/how they will be supported (full-screen vs. line-by-line support for a terminal for example), and protocolsgt;. * Software Interfaces lt;Describe the use of other required software products and interfaces with other application systems. Describe the purpose of the interfacing software, and the definition of interface in terms of message content and format. Reference the documents(s) defining the interface(s). Include name, mnemonic, specification number, version number, and source for each required software productgt;. * Communications Interfaces lt;Specify the vario us interfaces to communications such as local network protocols, etc. gt; Memory Constraints lt;Specify any applicable characteristics and limits on primary and secondary memory. gt; Operations lt;List the following if not already listed in the User Interface section above: the various modes of operations in the user organization (user initiated operation), periods of interactive operations and periods of unattended operations, data processing support functions, and backup and recovery operations. gt; Site Adaptation Requirements lt;Define the requirements for any data or initialization sequences that are specific to a given site, mission, or operational mode (grid values, safety limits, etc. , and the site or mission-related features that should be modified to adapt the software to a particular installation. System Functions lt;Provide a summary of the major functions that the software will perform. The functions should be organized in a way that makes the list of functions understandable to the customer or to anyone else reading the document for the first time. Graphics can be used to show the different functions and their relationships, and the logical relationships among variables. gt; User Characteristics lt;Describe the most general characteristics of the intended users of the product including educational level, experience, and technical expertise. gt; Constraints lt;Describe any items that will limit the developer’s options such as regulatory policies, hardware limitations, interfaces to other applications, parallel operation, audit functions, control functions, higher is the availability of an operating system on a specific hardware environment that is designated for the software product. gt; Apportioning of Requirements lt;Identify requirements that may be delayed until f uture versions of the system. gt; Functional Requirements lt;Describe the fundamental actions that must take place in the software in accepting and processing the inputs and in processing and generating the outputs. Examples are validity checks on the inputs, exact sequence of operations, responses to abnormal situations, effect of parameters, and relationship of outputs to inputs, including input/output sequences and formulas for input to output conversion. Partition the functional requirements into sub functions as necessary. gt; Performance Requirements lt;List requirements in measurable terms related to the following: * -Static numerical requirements: such as the number of terminals to be supported, the number of simultaneous users to be supported, and amount and type of information to be handled, and * -Dynamic numerical requirements: such as the number of transactions and tasks and the amount of data to be processed within certain time periods for both normal and peak workload conditions. gt; Logical Database Requirements lt;Specify the logical requirements for any information that is to be placed into a database such as types of information used by various functions, frequency of use, accessing capabilities, data entities and their relationships, integrity constraints, and data retention requirements. gt; Design Constraints lt;Specify design constraints that can be imposed by other standards, hardware limitations, etc. gt; Standar d Compliance lt;Specify requirements derived from existing standards or regulationsgt; Software System Attributes lt;Describe other software attributes that can serve as requirements such as factors required to establish reliability, availability, security,