Thursday, October 31, 2019

Portfolio Coursework Example | Topics and Well Written Essays - 1750 words

Portfolio - Coursework Example I went to two wards. The first ward was the Medicin Ward, meant for elderly patients, and the second one was the surgery ward. I got to see a few patients and my particular interest was to know the kind of attention they were given by the clinical pharmacist. For instance, there was a 72-year old patient who was suffering from diabetes mellitus type one, hypercholesteremia and hypertension. In my presence, he narrated to the pharmacist what he felt. He only talked of shortness of breath. The lesson I learnt in most of the cases is that as a clinical pharmacist, one needs to know what a patient feels by asking them. He/she shouldn’t stop at that, but go ahead to carry out examinations to discover other things that the patient may be unknowingly suffering from. On the basis of both what the patient says and the results of the medical examination, a pharmacist establishes if there is any need to change medication or not to. My visit to the hospital pharmacy taught me yet another lesson; that there are certain kinds of patients, like alcoholics, that require counseling more than other forms of medical attention such as drug prescription. This is a way of helping them to get around the drinking habit. In the case of an alcoholic, it may also be necessary for a pharmacist to change drugs because the patient’s problem may have got more complicated than what it was before. Any such change of medicinal prescription must be based on laboratory examination results in all cases. This means that a clinical pharmacist must work very closely with a laboratory technician, because he depends on his results to be able to prescribe drugs for the patients. Constantly checking with results helps to track the patient’s medical history, and on the basis of whether they are doing any better or not, medicine can be changed or retained. It ensures that patients receive the best medical attention and eliminating chances of prescription

Tuesday, October 29, 2019

Opening a big day care center Research Paper Example | Topics and Well Written Essays - 1250 words

Opening a big day care center - Research Paper Example We help them get ready for assimilation in big schools. At ABC, we are dedicated to provide a warm and family environment for children. Even if we are moving to larger scale of setting, we are committed to give the quality individualized care that we have been known for. At ABC, we create a family atmosphere where children are allowed to interact with each other. We follow up progress and development of each child and report it to parents regularly as part of our service to parents. ABC Day Care tries to employ best qualified people who are able to keep up with the needs of the day care center and the children under its care. Hiring is based on competence as shown in academic achievements, prior wok experience, and attitudes. We are an equal-opportunity employer. Our activities ensure that work behaviors are done in an equal manner based on individual merit and fitness of the employee regardless of color, race, sex, religion, age, nationality, or sexual orientation, or disability. We are committed to prevent sexual harassment and to confront it when it occurs. We will respond to concerns, questions and allegations of sexual harassment brought by any member of the Center. This policy is in accordance with Human Rights and Equal Opportunity Act 1986. As required by the California State for Licensing, teacher must have at least 18 with 12 postsecondary units in early childhood education and have 6 months experience, or hold a valid CDA and have a 6 months on-the-job training or work experience, or hold a Children’s Center Permit issued by the CA commission for teacher Preparation and Licensing. Once a position is offered to an applicant at the center, he/she must be able to submit several documentations such health screening and safety screening, and a free from criminal investigation record. A certificate of good physical health , a TB TEST and drug test are needed. A new employee will be

Sunday, October 27, 2019

Development of Peer-to-Peer Network System

Development of Peer-to-Peer Network System Procedures which we are followed to success this project. Task 01 Familiarizing with the equipments preparing an action plan. Task 02 Prepare the work area. Task 03 Fixed the hardware equipments and assemble three PCs. Task 04 Install NICs for each and every PC. Task 05 Cabling three computers and configure the peer to peer network with using hub or switch. Task 06 Install Windows operating system to each and every PC. Task 07 Install and configure the printer on one of the PCs. Task 08 Share printer with other PCs in the LAN. Task 09 Establish one shared folder Task 10 Create a test document on one of the PCs and copy the files to each of the other PCs in network. Task 11 Test the printer by getting the test document from each of the networked PCs. Time allocation for the tasks. Task No. Time allocation Task 01 1 hour Task 02 30 minutes Task 03 1  ½ hour Task 04 1  ½ hour Task 05 1  ½ hour Task 06 3 hour Task 07 15 minutes Task 08 15 minutes Task 09 15 minutes Task 10 10 minutes Task 11 05 minutes Total time allocation 10 hours Physical structure of proposed Peer to Peer network system. In peer to peer network there are no dedicated servers or hierarchy among the computers. The user must take the decisions about who access this network. Processors In 1945, the idea of the first computer with a processing unit capable of performing different tasks was published by John von Neumann. The computer was called the EDVAC and was finished in 1949. These first primitive computer processors, such as the EDVAC and the Harvard Mark I, were incredibly bulky and large. Hundreds of CPUs were built into the machine to perform the computers tasks. Starting in the 1950s, the transistor was introduced for the CPU. This was a vital improvement because they helped remove much of the bulky material and wiring and allowed for more intricate and reliable CPUs. The 1960s and 1970s brought about the advent of microprocessors. These were very small, as the length would usually be recorded in nanometers, and were much more powerful. Microprocessors helped this technology become much more available to the public due to their size and affordability. Eventually, companies like Intel and IBM helped alter microprocessor technology into what we see today. The computer processor has evolved from a big bulky contraption to a minuscule chip. Computer processors are responsible for four basic operations. Their first job is to fetch the information from a memory source. Subsequently, the CPU is to decode the information to make it usable for the device in question. The third step is the execution of the information, which is when the CPU acts upon the information it has received. The fourth and final step is the write back. In this step, the CPU makes a report of the activity and stores it in a log. Two companies are responsible for a vast majority of CPUs sold all around the world. Intel Corporation is the largest CPU manufacturer in the world and is the maker of a majority of the CPUs found in personal computers. Advanced Micro Devices, Inc., known as AMD, has in recent years been the main competitor for Intel in the CPU industry. The CPU has greatly helped the world progress into the digital age. It has allowed a number of computers and other machines to be produced that are very important and essential to our global society. For example, many of the medical advances made today are a direct result of the ability of computer processors. As CPUs improve, the devices they are used in will also improve and their significance will become even greater. VGA The term Video Graphics Array (VGA) refers specifically to the display hardware first introduced with the IBM PS/2 line of computers in 1987,[1] but through its widespread adoption has also come to mean either an analogue computer display standard, the 15-pin D-sub miniature VGA connector or the 640Ãâ€"480 resolution itself. While this resolution has been superseded in the personal computer market, it is becoming a popular resolution on mobile devices. Video Graphics Array (VGA) was the last graphical standard introduced by IBM that the majority of PC clone manufacturers conformed to, making it today (as of 2009) the lowest common denominator that all PC graphics hardware supports, before a device-specific driver is loaded into the computer. For example, the MS-Windows splash screen appears while the machine is still operating in VGA mode, which is the reason that this screen always appears in reduced resolution and colour depth. VGA was officially superseded by IBMs XGA standard, but in reality it was superseded by numerous slightly different extensions to VGA made by clone manufacturers that came to be known collectively as Super VGA. VGA is referred to as an array instead of an adapter because it was implemented from the start as a single chip (an ASIC), replacing the Motorola 6845 and dozens of discrete logic chips that covered the full-length ISA boards of the MDA, CGA, and EGA. Its single-chip implementation also allowed the VGA to be placed directly on a PCs motherboard with a minimum of difficulty (it only required video memory, timing crystals and an external RAMDAC), and the first IBM PS/2 models were equipped with VGA on the motherboard. RAM Random-access memory (usually known by its acronym, RAM) is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order (i.e., at random). The word random thus refers to the fact that any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data. By contrast, storage devices such as tapes, magnetic discs and optical discs rely on the physical movement of the recording medium or a reading head. In these devices, the movement takes longer than data transfer, and the retrieval time varies based on the physical location of the next item. The word RAM is often associated with volatile types of memory (such as DRAM memory modules), where the information is lost after the power is switched off. Many other types of memory are RAM, too, including most types of ROM and flash memory called NOR-Flash. An early type of widespread writable random-access memory was the magnetic core memory, developed from 1949 to 1952, and subsequently used in most computers up until the development of the static and dynamic integrated RAM circuits in the late 1960s and early 1970s. Before this, computers used relays, delay line memory, or various kinds of vacuum tube arrangements to implement main memory functions (i.e., hundreds or thousands of bits); some of which were random access, some not. Latches built out of vacuum tube triodes, and later, out of discrete transistors, were used for smaller and faster memories such as registers and random-access register banks. Modern types of writable RAM generally store a bit of data in either the state of a flip-flop, as in SRAM (static RAM), or as a charge in a capacitor (or transistor gate), as in DRAM (dynamic RAM), EPROM, EEPROM and Flash. Some types have circuitry to detect and/or correct random faults called memory errors in the stored data, using pa rity bits or error correction codes. RAM of the read-only type, ROM, instead uses a metal mask to permanently enable/disable selected transistors, instead of storing a charge in them. As both SRAM and DRAM are volatile, other forms of computer storage, such as disks and magnetic tapes, have been used as persistent storage in traditional computers. Many newer products instead rely on flash memory to maintain data when not in use, such as PDAs or small music players. Certain personal computers, such as many rugged computers and net books, have also replaced magnetic disks with flash drives. With flash memory, only the NOR type is capable of true random access, allowing direct code execution, and is therefore often used instead of ROM; the lower cost NAND type is commonly used for bulk storage in memory cards and solid-state drives. Similar to a microprocessor, a memory chip is an integrated circuit (IC) made of millions of transistors and capacitors. In the most common form of computer memory, dynamic random access memory (DRAM), a transistor and a capacitor are paired to create a memory cell, which represents a single bit of data. The transistor acts as a switch that lets the control circuitry on the memory chip read the capacitor or change its state. Types of RAM Top L-R, DDR2 with heat-spreader, DDR2 without heat-spreader, Laptop DDR2, DDR, Laptop DDR 1 Megabit chip one of the last models developed by VEB Carl Zeiss Jena in 1989 Many computer systems have a memory hierarchy consisting of CPU registers, on-die SRAM caches, external caches, DRAM, paging systems, and virtual memory or swap space on a hard drive. This entire pool of memory may be referred to as RAM by many developers, even though the various subsystems can have very different access times, violating the original concept behind the random access term in RAM. Even within a hierarchy level such as DRAM, the specific row, column, bank, rank, channel, or interleave organization of the components make the access time variable, although not to the extent that rotating storage media or a tape is variable. The overall goal of using a memory hierarchy is to obtain the higher possible average access performance while minimizing the total cost of entire memory system. (Generally, the memory hierarchy follows the access time with the fast CPU registers at the top and the slow hard drive at the bottom.) In many modern personal computers, the RAM comes in an easily upgraded form of modules called memory modules or DRAM modules about the size of a few sticks of chewing gum. These can quickly be replaced should they become damaged or too small for current purposes. As suggested above, smaller amounts of RAM (mostly SRAM) are also integrated in the CPU and other ICs on the motherboard, as well as in hard-drives, CD-ROMs, and several other parts of the computer system. Hard Disk A hard disk drive (often shortened as hard disk, hard drive, or HDD) is a non-volatile storage device that stores digitally encoded data on rapidly rotating platters with magnetic surfaces. Strictly speaking, drive refers to the motorized mechanical aspect that is distinct from its medium, such as a tape drive and its tape, or a floppy disk drive and its floppy disk. Early HDDs had removable media; however, an HDD today is typically a sealed unit (except for a filtered vent hole to equalize air pressure) with fixed media. HDDs (introduced in 1956 as data storage for an IBM accounting computer) were originally developed for use with general purpose computers. During the 1990s, the need for large-scale, reliable storage, independent of a particular device, led to the introduction of embedded systems such as RAIDs, network attached storage (NAS) systems, and storage area network (SAN) systems that provide efficient and reliable access to large volumes of data. In the 21st century, HDD usage expanded into consumer applications such as camcorders, cell phones (e.g. the Nokia N91), digital audio players, digital video players, digital video recorders, personal digital assistants and video game consoles. HDDs record data by magnetizing ferromagnetic material directionally, to represent either a 0 or a 1 binary digit. They read the data back by detecting the magnetization of the material. A typical HDD design consists of a spindle that holds one or more flat circular disks called platters, onto which the data are recorded. The platters are made from a non-magnetic material, usually aluminium alloy or glass, and are coated with a thin layer of magnetic material, typically 10-20 nm in thickness with an outer layer of carbon for protection. Older disks used iron (III) oxide as the magnetic material, but current disks use a cobalt-based alloy. The platters are spun at very high speeds. Information is written to a platter as it rotates past devices called read-and-write heads that operate very close (tens of nanometres in new drives) over the magnetic surface. The read-and-write head is used to detect and modify the magnetization of the material immediately under it. There is one head for each magnetic platter surface on the spindle, mounted on a common arm. An actuator arm (or access arm) moves the heads on an arc (roughly radially) across the platters as they spin, allowing each head to access almost the entire surface of the platter as it spins. The arm is moved using a voice coil actuator or in some older designs a stepper motor. The magnetic surface of each platter is conceptually divided into many small sub-micrometre-sized magnetic regions, each of which is used to encode a single binary unit of information. Initially the regions were oriented horizontally, but beginning about 2005, the orientation was changed to perpendicular. Due to the polycrystalline nature of the magnetic material each of these magnetic regions is composed of a few hundred magnetic grains. Magnetic grains are typically 10 nm in size and each form a single magnetic domain. Each magnetic region in total forms a magnetic dipole which generates a highly localized magnetic field nearby. A write head magnetizes a region by generating a strong local magnetic field. Early HDDs used an electromagnet both to magnetize the region and to then read its magnetic field by using electromagnetic induction. Later versions of inductive heads included metal in Gap (MIG) heads and thin film heads. As data density increased, read heads using magnetoresista nce (MR) came into use; the electrical resistance of the head changed according to the strength of the magnetism from the platter. Later development made use of spintronics; in these heads, the magnetoresistive effect was much greater than in earlier types, and was dubbed giant magnetoresistance (GMR). In todays heads, the read and write elements are separate, but in close proximity, on the head portion of an actuator arm. The read element is typically magneto-resistive while the write element is typically thin-film inductive.[8] HD heads are kept from contacting the platter surface by the air that is extremely close to the platter; that air moves at, or close to, the platter speed. The record and playback head are mounted on a block called a slider, and the surface next to the platter is shaped to keep it just barely out of contact. Its a type of air bearing. In modern drives, the small size of the magnetic regions creates the danger that their magnetic state might be lost because of thermal effects. To counter this, the platters are coated with two parallel magnetic layers, separated by a 3-atom-thick layer of the non-magnetic element ruthenium, and the two layers are magnetized in opposite orientation, thus reinforcing each other.[9] Another technology used to overcome thermal effects to allow greater recording densities is perpendicular recording, first shipped in 2005,[10] as of 2007 the technology was used in many HDDs. The grain boundaries turn out to be very important in HDD design. The reason is that, the grains are very small and close to each other, so the coupling between adjacent grains is very strong. When one grain is magnetized, the adjacent grains tend to be aligned parallel to it or demagnetized. Then both the stability of the data and signal-to-noise ratio will be sabotaged. A clear grain perpendicular boundary can weaken the coupling of the grains and subsequently increase the signal-to-noise ratio. In longitudinal recording, the single-domain grains have uniaxial anisotropy with easy axes lying in the film plane. The consequence of this arrangement is that adjacent magnets repel each other. Therefore the magnetostatic energy is so large that it is difficult to increase areal density. Perpendicular recording media, on the other hand, has the easy axis of the grains oriented to the disk plane. Adjacent magnets attract to each other and magnetostatic energy are much lower. So, much highe r areal density can be achieved in perpendicular recording. Another unique feature in perpendicular recording is that a soft magnetic underlayer are incorporated into the recording disk.This underlayer is used to conduct writing magnetic flux so that the writing is more efficient. This will be discussed in writing process. Therefore, a higher anisotropy medium film, such as L10-FePt and rare-earth magnets, can be used. Opened hard drive with top magnet removed, showing copper head actuator coil (top right). A hard disk drive with the platters and motor hub removed showing the copper colored stator coils surrounding a bearing at the center of the spindle motor. The orange stripe along the side of the arm is a thin printed-circuit cable. The spindle bearing is in the center. A typical hard drive has two electric motors, one to spin the disks and one to position the read/write head assembly. The disk motor has an external rotor attached to the platters; the stator windings are fixed in place. The actuator has a read-write head under the tip of its very end (near center); a thin printed-circuit cable connects the read-write head to the hub of the actuator. A flexible, somewhat U-shaped, ribbon cable, seen edge-on below and to the left of the actuator arm in the first image and more clearly in the second, continues the connection from the head to the controller board on the opposite side. The head support arm is very light, but also rigid; in modern drives, acceleration at the head reaches 250 Gs. The silver-colored structure at the upper left of the first image is the top plate of the permanent-magnet and moving coil motor that swings the heads to the desired position (it is shown removed in the second image). The plate supports a thin neodymium-iron-boron (NIB) high-flux magnet. Beneath this plate is the moving coil, often referred to as the voice coil by analogy to the coil in loudspeakers, which is attached to the actuator hub, and beneath that is a second NIB magnet, mounted on the bottom plate of the motor (some drives only have one magnet). The voice coil, itself, is shaped rather like an arrowhead, and made of doubly-coated copper magnet wire. The inner layer is insulation, and the outer is thermoplastic, which bonds the coil together after its wound on a form, making it self-supporting. The portions of the coil along the two sides of the arrowhead (which point to the actuator bearing center) interact with the magnetic field, developing a tangential force that rotates the actuator. Current flowing racially outward along one side of the arrowhead and racially inward on the other produces the tangential force. (See magnetic field Force on a charged particle.) If the magnetic field were uniform, each side would generate opposing forces that would cancel each other out. Therefore the surface of the magnet is half N pole, half S pole, with the radial dividing line in the middle, causing the two sides of the coil to see opposite magnetic fields and produce forces that add instead of canceling. Currents along the top and bott om of the coil produce radial forces that do not rotate the head. Floppy disk A floppy disk is a data storage medium that is composed of a disk of thin, flexible (floppy) magnetic storage medium encased in a square or rectangular plastic shell. Floppy disks are read and written by a floppy disk drive or FDD, the initials of which should not be confused with fixed disk drive, which is another term for a (non removable) type of hard disk drive. Invented by IBM, floppy disks in 8-inch (200mm), 5 ¼-inch (133.35mm), and 3 ½-inch (90mm) formats enjoyed many years as a popular and ubiquitous form of data storage and exchange, from the mid-1970s to the late 1990s. While floppy disk drives still have some limited uses, especially with legacy industrial computer equipment,[2] they have now been largely superseded by USB flash drives, external hard drives, CDs, DVDs, and memory cards (such as Secure Digital). 5 ¼-inch disk had a large circular hole in the center for the spindle of the drive and a small oval aperture in both sides of the plastic to allow the heads of the drive to read and write the data. The magnetic medium could be spun by rotating it from the middle hole. A small notch on the right hand side of the disk would identify whether the disk was read-only or writable, detected by a mechanical switch or photo transistor above it. Another LED/phototransistor pair located near the center of the disk could detect a small hole once per rotation, called the index hole, in the magnetic disk. It was used to detect the start of each track, and whether or not the disk rotated at the correct speed; some operating systems, such as Apple DOS, did not use index sync, and often the drives designed for such systems lacked the index hole sensor. Disks of this type were said to be soft sector disks. Very early 8-inch and 5 ¼-inch disks also had physical holes for each sector, and were termed hard sector disks. Inside the disk were two layers of fabric designed to reduce friction between the medium and the outer casing, with the medium sandwiched in the middle. The outer casing was usually a one-part sheet, folded double with flaps glued or spot-welded together. A catch was lowered into position in front of the drive to prevent the disk from emerging, as well as to raise or lower the spindle (and, in two-sided drives, the upper read/write head). The 8-inch disk was very similar in structure to the 5 ¼-inch disk, with the exception that the read-only logic was in reverse: the slot on the side had to be taped over to allow writing. The 3 ½-inch disk is made of two pieces of rigid plastic, with the fabric-medium-fabric sandwich in the middle to remove dust and dirt. The front has only a label and a small aperture for reading and writing data, protected by a spring-loaded metal or plastic cover, which is pushed back on entry into the drive. Newer 5 ¼-inch drives and all 3 ½-inch drives automatically engages when the user inserts a disk, and disengages and ejects with the press of the eject button. On Apple Macintosh computers with built-in floppy drives, the disk is ejected by a motor (similar to a VCR) instead of manually; there is no eject button. The disks desktop icon is dragged onto the Trash icon to eject a disk. The reverse has a similar covered aperture, as well as a hole to allow the spindle to connect into a metal plate glued to the medium. Two holes bottom left and right, indicate the write-protect status and high-density disk correspondingly, a hole meaning protected or high density, and a covered gap meaning write-enabled or low density. A notch top right ensures that the disk is inserted correctly, and an arrow top left indicates the direction of insertion. The drive usually has a button that, when pressed, will spring the disk out at varying degrees of force. Some would barely make it out of the disk drive; others would shoot out at a fairly high speed. In a majority of drives, the ejection force is provided by the spring that holds the cover shut, and therefore the ejection speed is dependent on this spring. In PC-type machines, a floppy disk can be inserted or ejected manually at any time (evoking an error message or even lost data in some cases), as the drive is not continuously m onitored for status and so programs can make assumptions that do not match actual status. With Apple Macintosh computers, disk drives are continuously monitored by the OS; a disk inserted is automatically searched for content, and one is ejected only when the software agrees the disk should be ejected. This kind of disk drive (starting with the slim Twiggy drives of the late Apple Lisa) does not have an eject button, but uses a motorized mechanism to eject disks; this action is triggered by the OS software (e.g., the user dragged the drive icon to the trash can icon). Should this not work (as in the case of a power failure or drive malfunction), one can insert a straightened paper clip into a small hole at the drives front, there by forcing the disk to eject (similar to that found on CD/DVD drives). Some other computer designs (such as the Commodore Amiga) monitor for a new disk continuously but still have push-button eject mechanisms. The 3-inch disk, widely used on Amstrad CPC machines, bears much similarity to the 3 ½-inch type, with some unique and somewhat curious features. One example is the rectangular-shaped plastic casing, almost taller than a 3 ½-inch disk, but narrower, and more than twice as thick, almost the size of a standard compact audio cassette. This made the disk look more like a greatly oversized present day memory card or a standard PC card notebook expansion card rather than a floppy disk. Despite the size, the actual 3-inch magnetic-coated disk occupied less than 50% of the space inside the casing, the rest being used by the complex protection and sealing mechanisms implemented on the disks. Such mechanisms were largely responsible for the thickness, length and high costs of the 3-inch disks. On the Amstrad machines the disks were typically flipped over to use both sides, as opposed to being truly double-sided. Double-sided mechanisms were available but rare. USB Ports Universal Serial Bus connectors on the back. These USB connectors let you attach everything from mice to printers to your computer quickly and easily. The operating system supports USB as well, so the installation of the device drivers is quick and easy, too. Compared to other ways of connecting devices to your computer, USB devices are incredibly simple we will look at USB ports from both a user and a technical standpoint. You will learn why the USB system is so flexible and how it is able to support so many devices so easily Anyone who has been around computers for more than two or three years know the problem that the Universal Serial Bus is trying to solve in the past, connecting devices to computers has been a real headache! Printers connected to parallel printer ports, and most computers only came with one. Things like Zip drives, which need a high-speed connection into the computer, would use the parallel port as well, often with limited success and not much speed. Modems used the serial port, but so did some printers and a variety of odd things like Palm Pilots and digital cameras. Most computers have at most two serial ports, and they are very slow in most cases. Devices that needed faster connections came with their own cards, which had to fit in a card slot inside the computers case. Unfortunately, the number of card slots is limited and you needed a Ph.D. to install the software for some of the cards. The goal of USB is to end all of these headaches. The Universal Serial Bus gives you a single, standardized, easy-to-use way to connect up to 127 devices to a computer. Just about every peripheral made now comes in a USB version. A sample list of USB devices that you can buy today includes: Printers Scanners Mice Joysticks Flight yokes Digital cameras Webcams Scientific data acquisition devices Modems Speakers Telephones Video phones Storage devices such as Zip drives Network connections In the next section, well look at the USB cables and connectors that allow your computer to communicate with these devices. Parallel port A parallel port is a type of interface found on computers (personal and otherwise) for connecting various peripherals. It is also known as a printer port or Centronics port. The IEEE 1284 standard defines the bi-directional version of the port. Before the advent of USB, the parallel interface was adapted to access a number of peripheral devices other than printers. Probably one of the earliest devices to use parallel were dongles used as a hardware key form of software copy protection. Zip drives and scanners were early implementations followed by external modems, sound cards, webcams, gamepads, joysticks and external hard disk drives and CD-ROM drives. Adapters were available to run SCSI devices via parallel. Other devices such as EPROM programmers and hardware controllers could be connected parallel. At the consumer level, the USB interface—and in some cases Ethernet—has effectively replaced the parallel printer port. Many manufacturers of personal computers and laptops consider parallel to be a legacy port and no longer include the parallel interface. USB to parallel adapters are available to use parallel-only printers with USB-only systems. However, due to the simplicity of its implementation, it is often used for interfacing with custom-made peripherals. In versions of Windows that did not use the Windows NT kernel (as well as DOS and some other operating systems) Keyboard Keyboard, in computer science, a keypad device with buttons or keys that a user presses to enter data characters and commands into a computer. They are one of the fundamental pieces of personal computer (PC) hardware, along with the central processing unit (CPU), the monitor or screen, and the mouse or other cursor device. The most common English-language key pattern for typewriters and keyboards is called QWERTY, after the layout of the first six letters in the top row of its keys (from left to right). In the late 1860s, American inventor and printer Christopher Shoals invented the modern form of the typewriter. Shoals created the QWERTY keyboard layout by separating commonly used letters so that typists would type slower and not jam their mechanical typewriters. Subsequent generations of typists have learned to type using QWERTY keyboards, prompting manufacturers to maintain this key orientation on typewriters. Computer keyboards copied the QWERTY key layout and have followed the precedent set by typewriter manufacturers of keeping this convention. Modern keyboards connect with the computer CPU by cable or by infrared transmitter. When a key on the keyboard is pressed, a numeric code is sent to the keyboards driver software and to the computers operating system software. The driver translates this data into a specialized command that the computers CPU and application programs understand. In this way, users may enter text, commands, numbers, or other data. The term character is generally reserved for letters, numbers, and punctuation, but may also include control codes, graphical symbols, mathematical symbols, and graphic images. Almost all standard English-language keyboards have keys for each character of the American Standard Code for Information Interchange (ASCII) character set, as well as various function keys. Most computers and applications today use seven or eight data bits for each character. For example, ASCII code 65 is equal to the letter A. The function keys generate short, fixed sequences of character codes that instruct application programs running on the computer to perform certain actions. Often, keyboards also have directional buttons for moving the screen cursor, separate numeric pads for entering numeric and arithmetic data, and a switch for turning the computer on and off. Some keyboards, including most for laptop computers, also incorporate a trackball, mouse pad, or other cursor-directing device. No standard exists for positioning the function, numeric, and other buttons on a keyboard relative to the QWERTY and other typewriting keys. Thus layouts vary on keyboards. In the 1930s, American educators August Dvorak and William Dearly designed this key set so that the letters th

Friday, October 25, 2019

Time and Cost Estimating Techniques Essays -- Project Management Obser

Time and Cost Estimating Techniques Estimating work times provides several benefits for the project manager. It gives an idea of the level of effort required to complete a project. This information then enables the project manager to produce a realistic plan based upon that effort. Estimating also helps the project manager anticipate the budget for the project. There are many formal techniques available to estimate time and cost for activities. Please refer to the Project Management Reference Section for more details on these techniques. Anyone reviewing these estimates should understand that they are approximations, not accuracies. Although the formal techniques are very specific, most of them have the following tasks in common: * Break activities down into small pieces for easier and more accurate estimation. (WBS) * Review historical information and compare to current activities. * Include a contingency buffer for potential risks. * Solicit advice from others that have previously completed similar activities. * Identify and document the assumptions and parameters used to derive the estimates. Microsoft Project Microsoft Project is project management software. Project management software assists project managers by providing a means for organizing project information. A project manager uses the software to enter and maintain a workplan that organizes activities and details. The software calculates the scheduled dates for tasks based on the time or work requirements of each task using a calendar of working days for the project and its resources. Microsoft Project is a tool to assist project managers in creating a WBS, PERT Charts, Gantt Charts, and resource histograms. Other reports and charts are also readily available for use and customization. AIS project team members and managers should use the latest version. PERT/CPM Network analysis techniques identify early and late start and finish dates for the uncompleted portions of project activities. The Program Evaluation and Review Technique (PERT) and the Critical Path Method (CPM) are examples of network analysis techniques. The Program Evaluation and Review Technique (PERT) is an event-oriented technique used to show all the project tasks, dependencies, and earliest and latest start times for each task in graphical form. It is used... ...y are achieving the task goals. This type of observation can also be useful if aspects of team performance are being investigated to understand how the team members are organised and perform their tasks. Communication and conversational analysis Investigation of the patterns in the organisation of people's interaction (it would be possible to use the principle of analysing a conversation between two travellers, or one traveller and one transport enquiry office operator in real situations, in order to identify the needs for the traveller in specific contexts, what are the difficulties encountered, how a system could resolve these difficulties,... ). One of these methods is the language / action approach which considers the language as a means by which people act. Advantage of this method : it provides a complete and logical conceptual frame in order to investigate all kinds of conversation. Disadvantage of this method : many situations are characterised by subtle communication processes not taken into account by the model. There is also a difficulty in labelling an interaction and a message especially if they do not fit into the request or promise categories.

Thursday, October 24, 2019

Chemistry Extra Credit

Tim Bruce The subject that I will be focusing on through the course of this extra credit paper, is one about the combination of Aerospace Engineering and Chemistry. Chose this particular topic because of my future life goals. Which include getting a degree in aerospace engineering. Also became interested while researching for this paper in a particular sub topic of the TV which is called aerodynamicist's.Aerodynamicist's is the study of gases which takes into account the effect of motion, heat, and chemical changes. Which is important to the field of aerospace engineering in the fact that aerospace engineers design aircraft, spacecraft, satellites, and missiles. In addition, they test prototypes to make sure that they function according to design. So you can see how the two connect. But exactly what kind of chemistry is involved?Obviously chemistry is deep rooted into Aerospace technology. Aerodynamicist's primarily focuses on molecular interactions at typically high Mach Numbers, su ch as that seen in a combustion chamber of a rocket or that of a reentry vehicle. So although aerospace engineering is typically design and building oriented you would absolutely need a chemists back round when thinking about these types of things. Anything involving materials and processes also involves chemistry.Examples include, failure analysis of microcircuit packaging contaminant analysis, corrosion problems, electroplating and conversion coating problems, paint adhesion problems, thermoses polymer failures, evaluation of urological and thermal properties of prepares, adhesives, laminates and Adair absorbing coatings, soldering problems, firing pin failures, surface cleaning, alloy analysis, and process tank analysis. All of which are inside the aerospace field.But these are only a small amount of connections that Aerospace engineering and chemistry have together. But as stated before in the examples we see that included was a lot of rockets and when you think of rockets many will tend to think about NASA- Now NASA has been synonymous with space travel since its creation. But few tend to recognize he men behind the scene, when they see a space shuttle take off into orbit.The men and women of Aerospace engineering need to take into account not only the rocket but also the astronauts that pilot the space craft. When designing these machines, biological and chemical actions that will take place in the astronauts bodies. For instance what kind of chemical changes might happen to our bodies while piloting this space craft or how to limit the amount of g force put on the pilots as they take off and many many more factors.This diagram, although very simple to what aerospace engineers use, gives you a look into how many factors such as altitude, angle, speed, and maneuver time effects g force. So as you can see chemistry is deeply involved in the field of aerospace engineering. But not only that chemistry is involved in everything we do. It is everything, and ev erywhere.

Wednesday, October 23, 2019

Acesite Corporation vs. Nlrc

Acesite Corporation vs. NLRC Facts: * Leo A. Gonzales (Gonzales) was a Chief of Security of Acesite Corporation. * Gonzales took several leaves (sick leave, emergency leave, and vacation leave), thereby using up all leaves that he was entitled for the year. * Before the expiration of his 12-day vacation leave, Gonzales filed an application for emergency leave for 10 days commencing on April 30 up to May 13, 1998. The application was not, however, approved. * He received a telegram informing him of the disapproval and asking him to report back for work on April 30, 1998.However Gonzales did not report for work on the said date. * On May 5, 1998, Acesite sent him a final telegram in his provincial address containing in order for Gonzales to report back to work. * Gonzales, who claims to have received the May 5, 1998 telegram only in the afternoon of May 7, 1998, immediately repaired back to Manila on May 8, 1998 only to be â€Å"humiliatingly and ignominiously barred by the guard (a s ubordinate of [Gonzales]) from entering the premises. * It appears that on May 7, 1998, the issued notice of termination was thru an inter-office memo. * Gonzales thus filed on May 27, 1998 a complaint against Acesite for illegal dismissal with prayer for reinstatement and payment of full backwages, etc. * Acesite claims, Gonzales â€Å"showed no respect for the lawful orders for him to report back to work and repeatedly ignored all telegrams sent to him,† and it merely exercised its legal right to dismiss him under the House Code of Discipline. LA – the complaint for lack of merit, its holding that Gonzales was dismissed for just cause and was not denied of due process. * NLRC – reversed that of the Labor Arbiter. * CA – finding that Gonzales was illegally dismissed, affirmed with modification the NLRC decision. Issue: * WON Gonzales was legally dismissed for just cause. Held: * No. there appears to have been no just cause to dismiss Gonzales from employ ment.As correctly ruled by the Court of Appeals, Gonzales cannot be considered to have willfully disobeyed his employer. Willful disobedience entails the concurrence of at least two (2) requisites: the employee’s assailed conduct has been willful or intentional, the willfulness being characterized by a â€Å"wrongful and perverse attitude;† and the order violated must have been reasonable, lawful, made known to the employee and must pertain to the duties which he had been engaged to discharge. In Gonzales’ case, his assailed conduct has not been shown to have been characterized by a perverse attitude, hence, the first requisite is wanting. His receipt of the telegram disapproving his application for emergency leave starting April 30, 1998 has not been shown. And it cannot be said that he disobeyed the May 5, 1998 telegram since he received it only on May 7, 1998. On the contrary, that he immediately hied back to Manila upon receipt thereof negates a perverse att itude.

Tuesday, October 22, 2019

A Critical Analysis of the Procurement Policy for a Local Government The WritePass Journal

A Critical Analysis of the Procurement Policy for a Local Government Executive Summary A Critical Analysis of the Procurement Policy for a Local Government ). Early engagement is crucial in maintaining savings and improvements that further reflect in transformational changes in the council’s procurement strategy. The whole lifecycle approach adopted by Leeds City Council regarding its procurement strategy assumes that service delivery should not be compromised. Other significant dimensions of this approach relate to contact management and exit which contribute to achieving extensive value for many. In addition, the recent changes observed in the procurement strategy of Leeds City Council and that of Staffordshire County Council reflect the importance of the skills and capacity of procurement professionals. They are mostly responsible for ensuring the maintenance of a relevant procurement process based on supporting the council’s business continuity needs (Niezen and Weller 2006). The latter is extensively manifested in the procurement strategy of Staffordshire County Council. Procurement professionals structure arrangements with key providers in an attempt to manage the risks pertaining to the process of supplying goods and services. Thus, professionals in the respective field are expected to set high quality processes through cross-functional strategic activities that are evident in both Leeds City Council and Staffordshire County Council (Loppacher et al. 2006). Leeds City Council’s procurement strategy considers the significance of employing common principles a nd rules which are properly designed to correspond to the needs of all included categories. Emphasis is on reflecting the needs of the specific service areas along with stakeholder needs. This recent change in the procurement strategy of Leeds City Council is in line with ensuring quality outcomes (Leeds City Council Procurement Strategy 2013). Such procurement strategy is comparable to the one of Staffordshire County Council due to the process of aligning delivery of goods and services with the corporate needs identified by Staffordshire County Council (Staffordshire County Council 2014). The respective council utilises the expertise of procurement professionals to ensure social values outcomes as well as sufficient savings achieved through a balanced scorecard used for procurement. The focus on the skills and capacity of procurement professionals is among the improved areas of Leeds City Council’s procurement strategy. Having skilled and experienced staff is important in delivering high quality outcomes to local communities. Moreover, Leeds City Council manifests its responsibility to support the development and training of procurement professionals in order to maintain high standards across the profession (Loppacher et al. 2006). There is a solid sense of accountability evident in the practice of each procurement professional working at Leeds City Council. In comparison, Staffordshire County Council emphasises the capacity of its procurement staff in terms of providing legal training packages. This indicates an ongoing process of developing the knowledge and expertise of all professionals involved in the procurement practice (Arora et al. 2007). In this way, procurement professionals can work together with other experts in the field to implement the spe cific objectives listed in the procurement strategy of both Leeds City Council and Staffordshire County Council. One of the observable recent changes in the procurement strategy of Leeds City Council is that the central procurement function is projected to serve as a flexible source of excellence and thus is accountable for providing a substantial source of expertise. Procurement professionals working in Leeds City Council and Staffordshire County Council are extensively trained to demonstrate ownership and accountability to the public in their respective communities (Kennekae 2012). Elements of structured governance and assurance make Leeds City Council’s procurement strategy rather effective. However, the procurement strategy of Staffordshire County Council is oriented towards indicating a ‘customer of choice’ model of delivering services. This implies that procurement professionals working in Staffordshire County Council are responsible for the creation of greater visibility of the council’s requirements for goods, services and provider performance (Staffordshire C ounty Council 2014). Therefore, professionals are determined to ensure proper communications and organising skills that help them in the establishment and implementation of linkage. Similarly, procurement professionals in Leeds City Council are devoted to research good practice documents and toolkits while trying to reinforce their skills and capacity. Furthermore, the procurement strategy of Leeds City Council is comparable to the one of Staffordshire County Council in the aspect of openness and transparency. Both councils indicate an ambition of being open and transparent which reflects in providing visible contracts as well as constantly updated management information (Kim and Netessine 2012). Leeds City Council places importance on presenting clear and accessible tender processes and documentation. Openness and transparency ensure the formation of a positive relationship between the council and its procurement partners. Likewise, such aspects are closely linked with instilling confidence in the public regarding the adopted procurement approach (McLean 2008). In comparison, the procurement strategy implemented by Staffordshire County Council indicates its staff’s commitment to ensure compliance and probity which may be associated with the principles of openness and transparency manifested by Leeds City Council. Recommendations   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The recent changes to the procurement strategy of Leeds City Council indicate that the respective council’s approach is comparable to the strategy of Staffordshire County Council. Yet certain recommendations are listed below to achieve further improvements in Leeds City Council’s procurement strategy: Procurement professionals should work on creating an inclusive procurement strategy in which smaller providers are presented with an opportunity to participate (McLean 2008); The council should constantly research and update its available procurement tools to guarantee competitively established standards in the field; The council should consider the removal of unnecessary restrictions which would allow the institution to evaluate suppliers in an objective manner rather than focus on limiting business criteria such as revenue (Loppacher et al. 2006); Professionals need to demonstrate sensitivity to financing issues to include established payment policies; It is fundamental to indicate potential hidden costs in terms of providing clear information on the actual insurance, liability as well as regulatory requirements; this practice would allow innovative suppliers to compete (Hawkins et al. 2011) Conclusion The paper indicated an analysis of Leeds City Council’s procurement strategy with special focus on its recent changes and how they are comparable to the procurement strategy outlined by Staffordshire County Council (Leeds City Council Procurement Strategy 2013). Thus, significant aspects of both procurement strategies have been discussed in order to identify the focus of procurement professionals working in the two councils. Certain aspects of the two procurement strategies were found similar especially with regards to category management and lifecycle approach. Moreover, the efforts of procurement professionals are equally important to the work of either Leeds City Council or Staffordshire County Council (Staffordshire County Council 2014). In this way, the paper ensured adequate arguments about the effectiveness of the procurement strategies adopted by these institutions. Tender Specification Sheet Leeds City Council is seeking tenders from various private providers for the maintenance and operation of the woodhouse car park in front of the University. The intention is that the car park will operate as a proper public amenity. There are certain standards of services that will be followed. The respective parking services are set at prices identified at proper market levels. Prices are competitive in order to encourage visitor parking regarding close distance to local businesses. Discouraging the practice of day-long parking is essential for the maintenance of the woodhouse car park. The park will be open 24 hours a day, seven days/ week. Personal security will be ensured to customers and visitors. They need to feel secure in the identified car park area. The integration of area security is a priority to the Council. All tenderers are invited to submit their applications by providing the following documentation: -Financial Proposal for a period of 3 years; -Details on the percentage of the turnover expected to be paid annually to the Council; -Evidence indicating previous experience in the area of car park projects; -Providing details of the resources available to complete the project; In order to evaluate the bids from the private players, it is important to provide a set of key performance indicators that will be consistently used (Iyer and Pazgal 2008). The first performance indicator is that the selected tender should provide the best value for money at reasonable cost. This may result from balancing cost and quality. Another key performance indicator that will be used to assess the bids is that of prequalification. Such indicator is implemented to make sure that only those who meet specific criteria will be considered for inclusion to bid (Loppacher et al. 2006). In addition, prequalification is associated with responses to a set of questions provided by the Council. Major questions should include elements of quality, capacity to supply and financial competence. The indicator of open and flexible communication is fundamental as no private player should be given preference. Even though meetings with tenderers who have placed their bids may be necessary at a cer tain point, they should take place solely for clarifying specific aspects regarding the tender (Hawkins et al. 2011). It is important to use recognised channels of communication in order to avoid confusion of private players or any misunderstanding of presented information. References Arora, P., Garg, A. K. and Vaidya, S. C. (2007), ‘Efficacy of Integrating Corporate Social Responsibility and Procurement Strategy’, South Asian Journal of Management, Vol. 14(1) pp105-119 Hawkins, T., Gravier, M. and Powley, E. (2011), ‘Public versus Private Sector Procurement Ethics and Strategy: What Each Sector Can Learn from the Other’, Journal of Business Ethics, Vol. 103(4) pp567-586 Iyer, G. and Pazgal, A. (2008), ‘Procurement Bidding with Restrictions’, Quantitative Marketing Economics, Vol. 6(2) pp177-204 Kennekae, L. (2012), ‘Procurement Strategies to Serve the Public Good,’ International Trade Forum, 2 pp11-111 Kim, S. H. and Netessine, S. (2011), ‘Collaborative Cost Reduction and Component Procurement under Information Asymmetry’, INSEAD Working Papers Collections, 33 pp1-40 Leeds City Council Procurement Strategy (2013), Leeds City Council [Online]. Available at: leeds.gov.uk/docs/Procurement%20Strategy%20V1.0%20PUBLISH%2030.09.2013.pdf [Accessed: 29 April 2014]. Loppacher, J. S., Luchi, R., Cagliano, R. and Spina, G. (2006), ‘Global Sourcing and Procurement Strategy: A Model of Interrelated Decisions’, Supply Chain Forum: International Journal, Vol. 7(1) pp34-46 McLean, S. (2008), ‘Choice in Government Software Procurement: A Winning Strategy’, Journal of Public Procurement, Vol.8(1) pp70-97 Niezen, C. and Weller, W. (2006), ‘Procurement as Strategy’, Harvard Business Review, Vol. 84(9) pp22-24 Staffordshire County Council (2014), Staffordshire Procurement [Online]. Available at: https://www.staffordshire.gov.uk/business/procurement/homepage.aspx [Accessed: 29 April 2014].

Monday, October 21, 2019

New Years Greetings in German, Region by Region

New Year's Greetings in German, Region by Region When you want to say Happy New Year to someone in German, you will most often use the phrase  Frohes neues Jahr.  Yet, when youre in different regions of Germany or other German-speaking countries, you may hear different ways to wish someone well in the new year.   Augsburg University in Bavaria conducted a study to find out which New Years greetings dominated certain regions in Germany. The results are quite interesting, with some areas of Germany sticking with tradition, while others offer variations of the greeting. "Frohes Neues Jahr" The German expression,  Frohes neues Jahr  literally translates to Happy New Year. It is widely used in German-speaking countries, particularly in the northern and western states of Germany. This phrase is most common in northern Hesse (the home of Frankfurt), Lower Saxony (including the cities of Hanover and Bremen),  Mecklenburg-Vorpommern (the coastal state along the Baltic Sea), and  Schleswig-Holstein (the state that borders Denmark). As often happens, some Germans prefer a shorter version and will simply use  Frohes neues. This is especially true in many areas of Hesse and in the wine country of Mittelrhein. "Prosit Neujahr" It is becoming increasingly more common for many German speakers to use  Prosit Neujahr  instead of the traditional Happy New Year. In German,  prosit  means cheers and  neujahr  is a compound word for new year. This phrase is scattered regionally and is often used in the area around the northern city of Hamburg and northwestern Lower Saxony. You will also likely hear it in many parts of western Germany, particularly around the city of Mannheim. There is also a smattering of its usage in the southeastern region of Germany in the state of Bayern. This may be due, in part, to an influence from eastern Austria and Vienna, where  Prosit Neujahr  is also a popular greeting. "Gesundes Neues Jahr" The German phrase  Gesundes  neues  Jahr  translates to Healthy New Year. You will hear this greeting most often when traveling through eastern regions of Germany, including the cities of Dresden and Nuremberg as well as the Franconia region in the south-central part of Germany. It may also be shortened to  Gesundes neues. "Gutes Neues Jahr" Meaning Good New Year, the German phrase  Gutes neues Jahr  is also popular. This version is most often used in the country of Austria. In Switzerland and the German state of  Baden-Wà ¼rttemberg in the southwest corner of the country, you may hear this phrase shortened to Gutes neues. Its also possible that youll hear this saying in the state of Bavaria, which includes Munich and Nuremberg. Yet, its most often concentrated to the south, closer to the Austrian border. Standard New Year's Greeting If you are unsure of which greeting to use or find yourself in an area of Germany not described previously, you can use a few standard New Years greetings that are widely accepted. They are: Alles Gute  zum  neuen  Jahr! Best wishes for the new year!Einen  guten  Rutsch ins  neue  Jahr! A good start in the new year!Ein glà ¼ckliches  neues  Jahr! Happy New Year!Glà ¼ck und Erfolg  im  neuen  Jahr! Good fortune and success in the new year!Zum neuen Jahr Gesundheit, Glà ¼ck und viel Erfolg! Health, happiness, and much success in the new year! Use one of these phrases, and you cant go wrong, regardless of where you find yourself throughout Germany or German-speaking counties.

Saturday, October 19, 2019

A Study On Detailed CAT Syllabus Education Essay

Verbal Ability and Reasoning: This subdivision of the trial accounts for more than half of the verbal subdivision. It is 50 Markss and comprises ‘verbal ability and concluding ‘ subdivision every bit good as ‘Reading Comprehension ‘ . About 25 to 30 Markss inquiries are on verbal ability while the staying 20 to 35 Markss will be by replying reading comprehension inquiries. The inquiries asked in the verbal subdivision can be categorized in one of the types mentioned below: Vocabulary Based Questions:Questions based on proving vocabulary of campaigners can be simple ‘synonyms-antonyms ‘ types. While on the other manus, inquiries asked in vocabulary can besides be in the signifier of fill in the space with the most suited word. It has appeared as portion of the Markss subdivision in the twelvemonth 2004 and the 2 Markss subdivision in the twelvemonth 2005. However, it is notable that the accent on vocabulary in the trial is worsening each twelvemonth and one is non required to larn the significances of words like ‘pleonasm ‘ etc. to check such inquiries in the trial. Correct Usage of English or Grammar:You will happen inquiries based on the sentence or grammar rectification in different signifiers. In these inquiries, you will be required to happen out the wrong par of the sentence or a portion of the inquiry will be underlined with 4-5 options. You need to do right pick to rectify the mistake in the sentence. To fix for these types of inquiries you need to hold a good apprehension of the BASIC of English grammar. Make equal figure of exercising on the assorted common mistakes which tend to look in the trial. Therefore, you will be able to sail through these types of inquiries in CAT. Verbal Reasoning:Questions in verbal logical thinking can be in different signifiers. However, the most common one is rearranging the jumble words of a paragraph. You might besides be asked to rephrase the paragraph. Besides, you can be provided 3 to 4 sentences and so asked to choose which sentence is fact, which one is an illation or a judgement. In brief you need to work on verbal logical thinking, contextual use, opposite word, fill ups, syllogisms, sentence rectification, acquaintance with common foreign linguistic communication words used in English, parlances, one word permutation. Again, as there is non as such fixed construction of CAT. The form tends to differ every twelvemonth. Reading Comprehension: Reading comprehension subdivision of CAT is typically of 100 Markss. This subdivision includes verbal ability and concluding subdivision, and the reading comprehension subdivision. Verbal ability subdivision carries 40 to 60 Markss inquiries while the reading comprehension subdivision carries 60 to 40 Markss. In the twelvemonth 2005, 15 out of sum of 25v inquiries in the verbal subdivisions were based on comprehension while the figure of 12 out the 25questions in the twelvemonth 2007. Questions based on ‘reading comprehension ‘ are frequently in groups for 4 to 8 inquiries. The length of these reading transition ranges from 250 words to 750 words. Here is a manner to make this subdivision successfully: Read the full transition for one time rapidly so t chapeau you are able to hold on the cardinal thought of the transition. Eradicate reply picks which are certain of non to be right. Make usage of outside cognition. Make usage of interior cognition Phosphorusassage Types in Cat:Passages t hat appear in the trial are fundamentally can be fundamentally from one of the types mentioned below: Social Science Passage:This type of transition is frequently about a societal or historical issue. Science Passage:This type of transition gives information on a scientific phenomenon like air power or home base tectonics. Business Passage:This transition includes a concern related subject like transitions on the denationalization of state-owned industries or the causes of rising prices. Entertainment Passage:This type of transition if of amusement, athleticss or leisure related. The transitions can be on Hollywood or Bollywood famous persons or other outstanding people in assorted Fieldss. Quantitative Skills: This subdivision of Cat which is immensely categorized as Arithmetic, Algebra and Geometry purposes to estimate quantitative ability of a campaigner from more than 25 subjects. All of these subjects are of high school degree. Let ‘s see the subjects in different classs in this subdivision: Arithmetical:Number system and figure theory, net income and loss, involvement, velocity, clip and distance, norms, ration and proportion, mixtures and alligations, pipes and cisterns Algebra:Linear and quadratic equation, inequalities, map, substitution and combination, set theory, logarithm, binomial theorem, map, chance, patterned advances Geometry:Geometry, co-ordinate geometry, measurement, trigonometry Data Interpretation: Data reading subdivision in CAT is of 50 Markss since the twelvemonth 2001. Most of the inquiries in this subdivision are of 2, 3 or 4 Markss. Date reading subdivision in CAT frequently carries two types of inquiries: Date Interpretation:In these types of inquiries day of the month is presented in the signifier of a table/pie chart/a graph. On the footing of each presentation, the campaigner is required to reply 4 to 6 inquiries. You need to construe the format and reply the inquiries consequently as per the day of the month given in the tabular array or chart. Date Sufficiency:Every day of the month sufficiency job in CAT comprises inquiries with two statements. Here the point is that you are required to make up one’s mind whether the inquiry can be answered or non on the footing of provided information in the given statements alternatively of chew overing over the reply of he inquiry. General Knowledge: For this, you need to maintain yourself updated with current intelligence and personal businesss around the universe. You need to be informed about: Current personal businesss, outstanding corporate events, punch line of companies Books and their writers ‘ name Important quotation marks Social issues, finance, car, amusement etc. Universe records Renowned awards and awards. Science, history, geographics A Study On Detailed CAT Syllabus Education Essay Verbal Ability and Reasoning: This subdivision of the trial accounts for more than half of the verbal subdivision. It is 50 Markss and comprises ‘verbal ability and concluding ‘ subdivision every bit good as ‘Reading Comprehension ‘ . About 25 to 30 Markss inquiries are on verbal ability while the staying 20 to 35 Markss will be by replying reading comprehension inquiries. The inquiries asked in the verbal subdivision can be categorized in one of the types mentioned below: Vocabulary Based Questions:Questions based on proving vocabulary of campaigners can be simple ‘synonyms-antonyms ‘ types. While on the other manus, inquiries asked in vocabulary can besides be in the signifier of fill in the space with the most suited word. It has appeared as portion of the Markss subdivision in the twelvemonth 2004 and the 2 Markss subdivision in the twelvemonth 2005. However, it is notable that the accent on vocabulary in the trial is worsening each twelvemonth and one is non required to larn the significances of words like ‘pleonasm ‘ etc. to check such inquiries in the trial. Correct Usage of English or Grammar:You will happen inquiries based on the sentence or grammar rectification in different signifiers. In these inquiries, you will be required to happen out the wrong par of the sentence or a portion of the inquiry will be underlined with 4-5 options. You need to do right pick to rectify the mistake in the sentence. To fix for these types of inquiries you need to hold a good apprehension of the BASIC of English grammar. Make equal figure of exercising on the assorted common mistakes which tend to look in the trial. Therefore, you will be able to sail through these types of inquiries in CAT. Verbal Reasoning:Questions in verbal logical thinking can be in different signifiers. However, the most common one is rearranging the jumble words of a paragraph. You might besides be asked to rephrase the paragraph. Besides, you can be provided 3 to 4 sentences and so asked to choose which sentence is fact, which one is an illation or a judgement. In brief you need to work on verbal logical thinking, contextual use, opposite word, fill ups, syllogisms, sentence rectification, acquaintance with common foreign linguistic communication words used in English, parlances, one word permutation. Again, as there is non as such fixed construction of CAT. The form tends to differ every twelvemonth. Reading Comprehension: Reading comprehension subdivision of CAT is typically of 100 Markss. This subdivision includes verbal ability and concluding subdivision, and the reading comprehension subdivision. Verbal ability subdivision carries 40 to 60 Markss inquiries while the reading comprehension subdivision carries 60 to 40 Markss. In the twelvemonth 2005, 15 out of sum of 25v inquiries in the verbal subdivisions were based on comprehension while the figure of 12 out the 25questions in the twelvemonth 2007. Questions based on ‘reading comprehension ‘ are frequently in groups for 4 to 8 inquiries. The length of these reading transition ranges from 250 words to 750 words. Here is a manner to make this subdivision successfully: Read the full transition for one time rapidly so t chapeau you are able to hold on the cardinal thought of the transition. Eradicate reply picks which are certain of non to be right. Make usage of outside cognition. Make usage of interior cognition Phosphorusassage Types in Cat:Passages t hat appear in the trial are fundamentally can be fundamentally from one of the types mentioned below: Social Science Passage:This type of transition is frequently about a societal or historical issue. Science Passage:This type of transition gives information on a scientific phenomenon like air power or home base tectonics. Business Passage:This transition includes a concern related subject like transitions on the denationalization of state-owned industries or the causes of rising prices. Entertainment Passage:This type of transition if of amusement, athleticss or leisure related. The transitions can be on Hollywood or Bollywood famous persons or other outstanding people in assorted Fieldss. Quantitative Skills: This subdivision of Cat which is immensely categorized as Arithmetic, Algebra and Geometry purposes to estimate quantitative ability of a campaigner from more than 25 subjects. All of these subjects are of high school degree. Let ‘s see the subjects in different classs in this subdivision: Arithmetical:Number system and figure theory, net income and loss, involvement, velocity, clip and distance, norms, ration and proportion, mixtures and alligations, pipes and cisterns Algebra:Linear and quadratic equation, inequalities, map, substitution and combination, set theory, logarithm, binomial theorem, map, chance, patterned advances Geometry:Geometry, co-ordinate geometry, measurement, trigonometry Data Interpretation: Data reading subdivision in CAT is of 50 Markss since the twelvemonth 2001. Most of the inquiries in this subdivision are of 2, 3 or 4 Markss. Date reading subdivision in CAT frequently carries two types of inquiries: Date Interpretation:In these types of inquiries day of the month is presented in the signifier of a table/pie chart/a graph. On the footing of each presentation, the campaigner is required to reply 4 to 6 inquiries. You need to construe the format and reply the inquiries consequently as per the day of the month given in the tabular array or chart. Date Sufficiency:Every day of the month sufficiency job in CAT comprises inquiries with two statements. Here the point is that you are required to make up one’s mind whether the inquiry can be answered or non on the footing of provided information in the given statements alternatively of chew overing over the reply of he inquiry. General Knowledge: For this, you need to maintain yourself updated with current intelligence and personal businesss around the universe. You need to be informed about: Current personal businesss, outstanding corporate events, punch line of companies Books and their writers ‘ name Important quotation marks Social issues, finance, car, amusement etc. Universe records Renowned awards and awards. Science, history, geographics

Friday, October 18, 2019

Stakeholder analysis and scope definition Essay Example | Topics and Well Written Essays - 750 words

Stakeholder analysis and scope definition - Essay Example In addition to these, an existing ERP system should be identified as one that would meet the reporting requirements of the top management. In the development of the GUI to suit the requirements of the organization, a website with the ability to host email or live interaction between customers and sales or order processing personnel (Martin, 2006). The project manager in this case is hired on merits and experience and, therefore, his attention is divided as other projects are underway. While the project manager is expected to dedicate full attention to the tasks of this project, other members are likely to have conflicts with the idea of him running other businesses. This creates the illusion that the time allocation to tasks would involve distributing management duties to supervisor and the project analyst. Other conflicts that would be foreseeable include the project manager’s interaction with other stakeholders such as the supervisor. The supervisor is likely to feel like a project analysis is not required as he does the daily analysis and control of tasks. Finally, the sponsor is likely to dispute budget changes in case initial estimation does not meet the project goals while the programmer is tasked with code writing tasks as hourly compensation in this case may not reflect the skills needed and the magnitude of wo rk done. Influence in the project management and planning is defined as the potential capacity that would enable each stakeholder to perform. Understanding the influence of each stakeholder will help the project manager to define the scope of the project while placing the stakeholders in their correct and suitable areas of expertise. In addition, the project would anticipate that stakeholders with different experiences and records are likely to perform with specific resources and have the ability to work under pressure and

Management and personal development Essay Example | Topics and Well Written Essays - 500 words

Management and personal development - Essay Example This research will begin with the MBTI types. The MBTI Inventory measure personal across FOUR dimensions: Introvert [I] - Extrovert [E]; Intuition [N] - Sensing [S]; Feeling [F] - Thinking [T]; Perception [P] - Judging [J]. ISTJ: Serious, quiet, earn success by concentration and thoroughness. Practical, orderly, matter of fact, logical, realistic and dependable. See to it that everything is well organized. Take responsibility. Make up their own minds about what should be accomplished and work towards it steadily, regardless of protests or distractions. ISFJ: Quiet, friendly, responsible and conscientious. Work devotedly to meet their obligations. Lend stability to any project or group. Thorough, painstaking, accurate. Their interests are usually not technical. Can be patient with necessary details. Loyal, considerate, perceptive, concerned with how other people feel. INFJ: Succeed by perseverance, originality, and desire to do whatever is needed or wanted. Put their best efforts into their work. Quietly forceful, conscientious, concerned for others. Respected for their firm principles. Likely to be honored and followed for their clear visions as to how best to serve the common good. INTJ: Have original minds and great drive for their own ideas and purposes. Have a long-range vision and quickly find meaningful patterns in external events. In fields that appeal to them, they have a fine power to organize a job and carry it through. Sceptical, critical, independent, determined, have high standards of competence and performance.  ... MBTI TYPES ISTJ Serious, quiet, earn success by concentration and thoroughness. Practical, orderly, matter of fact, logical, realistic and dependable. See to it that everything is well organised. Take responsibility. Make up their own minds about what should be accomplished and work towards it steadily, regardless of protests or distractions. ISFJ Quiet, friendly, responsible and conscientious. Work devotedly to meet their obligations. Lend stability to any project or group. Thorough, painstaking, accurate. Their interests are usually not technical. Can be patient with necessary details. Loyal, considerate, perceptive, concerned with how other people feel. INFJ Succeed by perseverance, originality and desire to do whatever is needed or wanted. Put their best efforts into their work. Quietly forceful, conscientious, concerned for others. Respected for their firm principles. Likely to be honoured and followed for their clear visions as to how best to serve the common good. INTJ Have or iginal minds and great drive for their own ideas and purposes. Have long-range vision and quickly find meaningful patterns in external events. In fields that appeal to them, they have a fine power to organise a job and carry it through. Sceptical, critical, independent, determined, have high standards of competence and performance. ISTP Cool onlookers – quiet, reserved, observing and analysing life with detached curiosity and unexpected flashes of original humour. Usually interested in cause and effect, how and why mechanical things work and in organising facts using logical principles. Excel at getting to the core of a practical problem and finding the solution. ISFP Retiring, quietly friendly, sensitive,

What skills and knowledge do creative entrepreneurs require in the Essay

What skills and knowledge do creative entrepreneurs require in the contemporary creative economy - Essay Example lls, quite valuable in the fashion industry, seem to be self-motivation, business-management, cooperation, understanding of cultural heritage and risk-taking. These skills are analyzed below, as involved in entrepreneurial efforts made in the fashion industry. My personal experience in the fashion industry is also explained at the level that it will help me to realize my creative practitioner career development plan; indeed, after finishing my degree, I’m planning to start my own fashion magazine. My experience in the fashion industry, as analyzed below, will help me to develop this plan successfully avoiding risks and failures, as possible. The paper aims to show that the effective involvement of entrepreneurs in the fashion industry is closely related not just to their personal skills and experience but also to their ability to respond to the needs of creative entrepreneurship, which is highly developed in the fashion industry. As already noted above, the characteristics of entrepreneurship are likely to be differentiated in each industrial sector. For example, in creative industries, emphasis is given on the ‘social culture of entrepreneurship’ (Henry and De Bruin 2011, p.30). From this point of view, the success of an individual as an entrepreneur in creative industries is depended on his ability to communicate and cooperate in order to promote a particular creative project. In other words, in the context of the Creative Economy, entrepreneurship can be considered as similar to socialization. The relationship between entrepreneurship and the Creative Economy can be understood by referring to the characteristics of entrepreneurship. According to Curran and Stanworth an effective definition of entrepreneurship would be the following one: ‘entrepreneurship is the process of creating a new economic entity centred on a novel product or service’ (Curran and Stanworth 1989, p.12, cited by Araya 2010, p.104). The above definition introduces another

Thursday, October 17, 2019

Qualitative 2 Essay Example | Topics and Well Written Essays - 750 words

Qualitative 2 - Essay Example There is particular method taken towards describing the basic elements within the data analysis and interpretation of the narratives retrieved from the interviews. The initial step entails reading and re-reading of the text provided to facilitate a better understanding of the provided data. This is the part where one has to consider the quality of the data via identifying key aspects, for example, impressions or any limitations. This is vital to the analysis to aid in eliminating any chance of collecting irrelevant data that does not make any meaning or add any value to the qualitative analysis The next step entails a directive that focuses on the analysis of the data findings via reviewing the purpose of the qualitative evaluation. The evaluation defines how one intends to use the results of the study by applying common approaches like looking into how the involved entities in all the readings related and in turn organize them to identify the similarities, consistencies and even the differences in the information. This process can also be referred to as categorization of information, which involves placing data according to identified themes or patterns that represent ideas having relevant information of coherent categories. The main focus of the data gathered and being analyzed are to aid in the re-engineering and re-development of Business Take On (BTO) and the client billing process. The readings from the data sets provided highlight on how business is conducted within the organization. The process map provided showcase how the various department or sections of the business are contingent or dependent on each other for the day to day execution of business operations. The findings in the qualitative study of the passages are sustained by the presence of the supporting conditions which show relation between all the

Proposal Argument PRATICAL PROPOSAL offering a solution to a local Essay

Proposal Argument PRATICAL PROPOSAL offering a solution to a local problem - Essay Example Add to the fact that women no matter in whatever position they work in are considered objects of titillation. What this leads to in some cases is sexual abuse physically and mentally. "BANGALORE(India): Being the largest BPO hub in the world, over 200 domestic, multinational, captive and pure-play companies in Bangalore employ two lakh call centre executives, of which women account for 50%. Like sounding a rousing call alarm I come to learn of a ghastly act committed on one of those members of the carefree lot. Utmost disbelief and fear gripped me as I read of the rape and murder of a 28-year-old city woman BPO worker in the same city. This is not the first instance that we come to hear of the exploitation of a working woman, sexually or otherwise. A woman has always been considered weak, meek and powerless. She has been imagined as an object of sexual and erotic fantasy and men have tried to exploit the fairer sex more often than not. On thinking a lot about the predicament the solutions I could think of include, as the old dictum goes, "Self defence is the best defence". Physical protection does not always mean exertion, stamina or endurance. Simple but effective methods of martial arts can stand her in good stead in moments of extreme danger. A focused effective kick with minimum exertion and maximum reflex can be used by a woman for self ammunition. Here martial arts techniques like Karate, Kung-fu, Kick boxing et al can be useful. At times self- defence training can prove to be lifesaving in prevention of rape, incest and sexual abuse. ALTERNATE PROPOSAL: Sometimes danger may take one off guard. Especially in the case of women working in night shifts as our newspaper article pointed out. The minimization o physical abuse and danger is taken care of with the use of technology and constant monitoring. An example to illustrate this point is the case of Chennai-based Perot Systems BPS India. They purpotedly have introduced a global positioning system on vehicles used for the transportation of women workers in their company. This is a foolproof system for the safety of women working late hours, the company officials claim.

Wednesday, October 16, 2019

What skills and knowledge do creative entrepreneurs require in the Essay

What skills and knowledge do creative entrepreneurs require in the contemporary creative economy - Essay Example lls, quite valuable in the fashion industry, seem to be self-motivation, business-management, cooperation, understanding of cultural heritage and risk-taking. These skills are analyzed below, as involved in entrepreneurial efforts made in the fashion industry. My personal experience in the fashion industry is also explained at the level that it will help me to realize my creative practitioner career development plan; indeed, after finishing my degree, I’m planning to start my own fashion magazine. My experience in the fashion industry, as analyzed below, will help me to develop this plan successfully avoiding risks and failures, as possible. The paper aims to show that the effective involvement of entrepreneurs in the fashion industry is closely related not just to their personal skills and experience but also to their ability to respond to the needs of creative entrepreneurship, which is highly developed in the fashion industry. As already noted above, the characteristics of entrepreneurship are likely to be differentiated in each industrial sector. For example, in creative industries, emphasis is given on the ‘social culture of entrepreneurship’ (Henry and De Bruin 2011, p.30). From this point of view, the success of an individual as an entrepreneur in creative industries is depended on his ability to communicate and cooperate in order to promote a particular creative project. In other words, in the context of the Creative Economy, entrepreneurship can be considered as similar to socialization. The relationship between entrepreneurship and the Creative Economy can be understood by referring to the characteristics of entrepreneurship. According to Curran and Stanworth an effective definition of entrepreneurship would be the following one: ‘entrepreneurship is the process of creating a new economic entity centred on a novel product or service’ (Curran and Stanworth 1989, p.12, cited by Araya 2010, p.104). The above definition introduces another

Proposal Argument PRATICAL PROPOSAL offering a solution to a local Essay

Proposal Argument PRATICAL PROPOSAL offering a solution to a local problem - Essay Example Add to the fact that women no matter in whatever position they work in are considered objects of titillation. What this leads to in some cases is sexual abuse physically and mentally. "BANGALORE(India): Being the largest BPO hub in the world, over 200 domestic, multinational, captive and pure-play companies in Bangalore employ two lakh call centre executives, of which women account for 50%. Like sounding a rousing call alarm I come to learn of a ghastly act committed on one of those members of the carefree lot. Utmost disbelief and fear gripped me as I read of the rape and murder of a 28-year-old city woman BPO worker in the same city. This is not the first instance that we come to hear of the exploitation of a working woman, sexually or otherwise. A woman has always been considered weak, meek and powerless. She has been imagined as an object of sexual and erotic fantasy and men have tried to exploit the fairer sex more often than not. On thinking a lot about the predicament the solutions I could think of include, as the old dictum goes, "Self defence is the best defence". Physical protection does not always mean exertion, stamina or endurance. Simple but effective methods of martial arts can stand her in good stead in moments of extreme danger. A focused effective kick with minimum exertion and maximum reflex can be used by a woman for self ammunition. Here martial arts techniques like Karate, Kung-fu, Kick boxing et al can be useful. At times self- defence training can prove to be lifesaving in prevention of rape, incest and sexual abuse. ALTERNATE PROPOSAL: Sometimes danger may take one off guard. Especially in the case of women working in night shifts as our newspaper article pointed out. The minimization o physical abuse and danger is taken care of with the use of technology and constant monitoring. An example to illustrate this point is the case of Chennai-based Perot Systems BPS India. They purpotedly have introduced a global positioning system on vehicles used for the transportation of women workers in their company. This is a foolproof system for the safety of women working late hours, the company officials claim.

Tuesday, October 15, 2019

Music vs. Book Essay Example for Free

Music vs. Book Essay Books and music are not a direct comparison normally but when it comes to youngsters and their lives both have a very strong influence. When we are bored, it is the time we listen to music or read a book. These two are the common things we are doing in our leisure time. People should be influenced by music and book. Music can have both a positive as well as negative impact on an individual’s life. The nature and kind of music defines that what type of message they render on the youngster. While books of any type give you either eye opening or well meaning but misguided information on subjects ranging from the simplest subjects to the more sophisticated. Books can even be used by those who are looking for answers in life. Many people report finding the perfect book to answer the burning questions in their minds. Books are more limited: fiction like novels and short stories and non-fiction like memoir, history, biography, self help, and philosophy. Reading books require a larger share of our time. We cannot also do another thing while reading a book. We cannot read a book while washing clothes. Books are more intellectually stimulating and has bigger journey than music. On the contrary, music doesnt answer questions by itself. Music answers feeling or disturbed emotions looking for an outlet. It exists in an extraordinarily wide array of genres and styles like vocal music (song, choral music, and opera), solo instrumental, chamber, orchestral, band and etc. We will listen to the music we love countless times over the course of our lives. We can multitask while listening to music. We can listen to music while running or washing clothes. Music are more passion and emotional than books. Whether you want to listen to music or read a book, they can both give positive and negative influences, affect all kinds of age groups, and cause different views of the world.

Monday, October 14, 2019

Effects of Social Networking on Everyday Life

Effects of Social Networking on Everyday Life ABSTRACT Today, the most popular and common topic of many discussions are social networking websites. The Internet connected us, made à ¢Ã¢â€š ¬Ã¢â‚¬ ¹Ãƒ ¢Ã¢â€š ¬Ã¢â‚¬ ¹us even more available, and brought us closer to each other, but at the same time, the Internet estranged us from each other. We are living in an era of expansion of online social networking, which are counting millions of members. Social networking websites are changing the basis of human relationships and communication, and it is the biggest invention since the invention of the telephone. Social networking covers all the needs of modern living: from making friends, finding lovers, through exchanging of recipes and searching for work, and all that without leaving your home. In addition, social networking websites allow us to quickly be informed, but also to be in touch with friends all across the globe. Social networking in combination with other aspects of Internet communications, gives us fulfilled social life. However, social networking websites have become inevitable or necessary part of our lives, and participation in them has become common thing. Will online social networking experience be something good or bad depends mostly on us? Chapter 1 INTRODUCTION â€Å"With social networks, there’s a fascination with intimacy because it simulates face-to-face communication. But there’s also this fundamental distance. That distance makes it safe for people to connect through weak ties where they can have the appearance of a connection because it’s safe.† —Michael Wesch, teacher of cultural anthropology at Kansas State University. (Quoted in Alex Wright, â€Å"Friending, Ancient or Otherwise,† New York Times, December 2, 2007.) (Mooney, 2009, p. 19) Nowadays, one of the most interesting and widespread phenomenon is social networking websites. The reason why they are so popular is because social networking websites are very user-friendly, are based on Web 2.0 technologies, allowing users more connectivity, personalization, and interaction, and social networking websites often involve grouping individuals or organizations together based on their particular interest. Online social networking is the biggest breakthrough since the invention of the telephone, and in this research paper, we will try to prove that. Social networking existed long before Internet came along, because humans are social beings who are socializing with each other from the beginning of their existence. Before online social networking became popular like it is today, people were socializing, creating groups based on their specific interests, hobbies similar to ones that are available today on the Internet, across social networking websites. There are many social networking websites that are focusing on some particular interest, and there are traditional websites, which are general social networking sites, without a specific focus. Before the Internet came along there was a time when if you had opinion or interest that is different from the norm, you were considered weird. Then the Internet came and changed all of that. No matter how different you are, you can find a million others just like you with just a few clicks. Communication via newsgroups eventually expanded into general use and has become one of the earliest forms of Internet meetings and public discussions. Sometime later IM clients were developed and popularized, chat applets within web portals and forums slightly different from the ones today. Those applications and applets then provided solid opportunities for user profiling and the communication with the world. However, due to very low speed connection, lack of storage of servers the true virtual meetings and / or presentations were almost impossible. (Hu Wang, 2009) The evolution of these technologies caused a rapid increase in user interest, and the number of users is growing exponentially for years. Free pictures and video clips, and writing blogs and content management have become the heralds of the new user paradigm, which are determined by those Web services that systematically have integrated all these technologies: from blogs and chat to video and photo caskets and other components mentioned above that helped in the creation of a compact system of social networks. Todays social networks are mostly free and the only prerequisite for their use is internet connection, and sometimes-peripheral devices such as webcams and headsets. (Hu Wang, 2009) Social networking has its bad and good side of the story. There are many issues regarding information we share, but most social networking services provide their users with a choice of which information they want to share and who can view their profile, which prevents other users from unauthorized access to their information. Data theft or viruses are also common issues in social networking, sexual predators, cyber bullying, etc. However, advantaged that social networking is offering are many because it allows discussion on different topics, sharing information, and exchanging files and pictures, gaining knowledge, providing feedback, etc. In addition, some people use these sites as a convenient way to meet new friends, find old friends or classmates, or even future love, to promote their blogs and services, etc. Professional people use social networking as a platform that can help them to raise their visibility in the business world, advertise, promote their business or service, or to increase their customer base because it is very efficient and cost effective. Social networking along with globalization has made the world a global village where everyone can stay connected and there are no geographical or any other boundaries. Chapter 2 SOCIAL NETWORKING What is social networking? â€Å"Social networking sites are web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system.† (Boyd and Ellison, 2007) Social networking websites are mostly free on-line services that enable different forms of communication and connectivity with the whole world and the possibility of self-presentation, free posting of pictures and video clips, writing blogs, playing games and other more or less beneficial activities through these networks. Parents can find out whom their children are socializing with, what preferences they have, etc. In addition, people are able to meet new people from all over the world, learn about their cultures, customs, renew some old friendships and gain new ones. The social networking websites are similar to real places where users can socialize with their friends, except they are on the Internet, and usually are about grouping specific individuals together based on their specific activity or interest. There are many social networking websites that are focusing on some particular interests called niche social networking sites, and there are traditional websites that are general social networking sites, without a main focus. Before the Internet came along there was a time when if you had opinion or interest that is different from the norm, you were considered weird. Then the Internet came and changed all of that. No matter how different you are, now you can find a million others just like you with just a few clicks. (Mooney, 2009) Social networking sites have implemented many technical features and applications, but their primary and most important parts are profiles and list of friends who are using the same site. After joining some social networking site and filling out all forms and information necessary, the profile is created. The visibility of a profile depends on users’ preferences and depends of a site where user is registered. By default, profiles on Friendster are visible to anyone, regardless of whether or not the viewer has an account there. On the other hand, LinkedIn controls what a viewer can see based on if the user has a paid account. Sites like MySpace and Facebook allow users to choose whether they want their profile to be public or Friends only (private). One of the primary ways that social networking sites differentiate themselves from each other is structural variations in visibility and access. (Boyd Ellison, 2007) After joining a social networking site, users are starting to create relationships with other users on the site, and most sites require both sides to confirm friendship or relationship. These relationships names are different depending on the site, and popular terms are Friends, Contacts, Fans, Followers, etc. On most social networking sites, the list of Friends are visible to all the friends with which user is connected, although that can be changed in profile settings, and user can control who can see their list of Friends. Almost every social networking site has the option for users to leave messages (comments) on their friend’s profile, and to send private messages. This feature for sending private messages is very similar to webmail. (Boyd Ellison, 2007) It is also important to say that many of today’s social networking sites were not social networking sites at their beginning. Cyworld started as a Korean discussion forum tool, Skyrock was a French blogging service before adding social networking features, QQ was Chinese instant messaging service, and LunarStorm started as a community site. AsianAvenue, MiGente, and BlackPlanet were early popular ethnic community sites with limited Friends functionality before re-launching in year 2005-2006 with social networking features and structure. (Boyd Ellison, 2007) Evolution of social networking websites It is considered that the first social networking website was created in the year 1997, under the name Six Degrees. Users of this network were able to create user profiles, create friend lists, and a year later, the ability to search lists of other users was added to the website. All these options were there in the past, before creation of Six Degrees, however, Six Degrees has brought together all these capabilities in one unit. Six Degrees was designed as a virtual place where users can exchange messages and interact with other users. The service was not rebuilt with new technologies, and users begin to lose interest in this kind of communication. Six Degrees went out of business in the year 2000, due to an insufficient number of active users and insufficient incomes. (Boyd and Ellison, 2007) From year 1997 to 2001 a number of social networking websites were created. Social networking websites like AsianAvenue, BlackPlanet and MiGente, where users were able to create personal and professional profiles, or profiles to search for partners. The possibilities of social networking websites greatly increased with age, and development of new technologies, such as creating a list of visitors (guestbook), or creating the personal notes and texts that were available to other users. (Boyd and Ellison, 2007) The next significant progress with social networking websites was the establishment of business and scientific contacts. With time, several other professional social networking websites like Tribe.net, LinkedIn, and Friendster were developed. Nowadays, LinkedIn is the only professional social networking website, which experienced significant success, and is one of the largest professional social networking website with millions of users. In the year 2002 the social networking website named Friendster was developed, which experienced considerable success and gathered a large number of users, but due to poor computer equipment and limited computer resources, customers started to leave the network. (Boyd and Ellison, 2007) Since year 2003 a large number of social networking websites were developed and available on the web. Most such social networking websites were designed to attract specific groups of people based on common interests, business opportunities, and sharing of data and media. (Boyd and Ellison, 2007) It is important to note that not all social networking websites that were developed for specific user groups achieved equal success in the targeted market. For example, Orkut (social network launched by Google) did not achieve success in the target market of North America, but the expansion of the network has achieved considerable success in Brazil. In addition, the situation is similar with network Windows Live Spaces (Microsoft) that did not achieve success in the Unites States, but in other geographic areas has gained a significant number of users. MySpace, launched in the year 2003 achieved remarkable successes only after a year of existence, mainly among teenagers. Thus, for example, Mixi achieved success in Japan, LunarStorm in Sweden, Hyves in the Netherlands, Grono in Poland, Hi5 in the Americas and Europe, etc. (Boyd and Ellison, 2007) Figure 1. shows launch dates of major social network sites from the year 1997 to 2006. The idea behind social networking website is very simple user registers on the social networking website and shares interesting information from his life, uploads photos and videos, and communicates with friends who are doing the same thing. In principle there is nothing wrong with it, moreover it can be very useful if it is used properly. The success of a social networking website depends on the number of users who are using that social networking website, and on the functionality that the website is offering. However, with increasing number of users of some social networking website, the monetary value of that social networking website is growing too, which allows the owner of the network expansion of marketing solutions available. Why is the social networking so popular? In the background lie various reasons why the online social networking is so popular and growing exponentially every day. Todays fast pace of life does not leave much time for face to face socializing, so that social networking is imposed as the easiest way for communication. However, is this really the only reason? People were alienated from each other and the use of social networking websites gives them an illusion of closeness and connectedness with other people because ultimately man is still a social being. Nobody likes to be alone, and social networks give us the feeling that we belong to the community. On the other hand, people on social networking websites can be represented in the right light, can be more fun, more popular, more communicative and more interesting. Complexes and fears that existed in the interaction with people in the real world do not exist in the virtual one. When communicating over social networking websites, no one knows if user is shy and insecure, or how many pounds he has. Social networking websites can be very seductive because the people on their profiles appear in the best light. These people want to be your friends and communicate with each other, so the temptation is especially strong when real life things do not go as well as they could. Social networking websites should help us make life easier, not take control over it. Technical background A small group of experts, at least at the beginning, developed most of the social networking websites. In most cases, they had one major server, and one backup server, and platforms that they have used were mostly open source, because they all have limited budgets at the beginning. Engineers were using the LAMP open source software stack, the Linux operating system, the Apache Web server, the MySQL relational database system, and the PHP Web programming language for development of Facebook, YouTube, and Flickr. (Kim, Jeong Lee, 2010) MySpace has been developed using Microsoft technologies, including the Windows operating system, Active Server Pages (ASP), NET 2.0, the Internet Information Services (IIS) Web server, and the SQL Server 2005 database system. (Kim, Jeong Lee, 2010) Linux operating system, the Ruby programming language on the Rails application server, the Mongrel Web server, and MySQL were used for development of Twitter. (Kim, Jeong Lee, 2010) LinkedIn has been developed using Sun Microsystems’ Solaris operating system, Java, the Tomcat and Jetty open source Java application servers, the Lucene open source search software, and the Oracle and MySQL database systems. (Kim, Jeong Lee, 2010) After these sites began exponentially growing, the engineers faced three architecture challenges: performance, scalability, and availability, so they started using system and network monitoring tools, and Web traffic and log file analysis tools. (Kim, Jeong Lee, 2010) Types of social networking sites There are many types of social networking sites available today on the web. People use these sites for many purposes. We can sort social networking sites into major categories, and according to Rdube (n.d.) major social networking categories are: Informational Professional Educational Hobbies Academic Informational social networking sites are often connected to businesses that are using social networking sites to connect with their customers. These informational social networking sites are providing their users with information about everyday things, and are mostly written by professionals. (Rdube (n.d.)) Professional social networking sites are helping their users to improve their careers or even industry, find jobs, etc. There are many professional social networking sites which can help their users with many useful advices for advancing in their professional life. (Rdube (n.d.)) Educational social networking sites are becoming very popular nowadays. These social networking sites can help users with their research materials, to communicate with other users or professors via blogs or forums, and many other educational interactions. (Rdube (n.d.)) Hobbies are reasons why many people use social networking sites. There users can find much information regarding their specific interest of hobby. Via social networking sites specified by hobbies, users can interact with others that have the same hobbies and interest. This kind of social networking sites are most popular. (Rdube (n.d.)) Academic social networking sites’ main purpose is for collaboration within the scientific communities. These social networking sites are very beneficial for academic researchers. (Rdube (n.d.)) We can also divide social networking sites by type, and according to Schrader (n.d.) social networking website types are: Forums Blogs Micro-Blogging Photo Sharing Video Sharing Professional Social Bookmarking Other formats Forums are among the first websites that allow user’s interaction. There users can exchange information, opinions, ask and answer questions about given topics. Forums are mostly comprised of users that share similar interests, and are a great way to share or gain knowledge. (Schrader (n.d.)) Blogs are very similar to traditional journals, except blogs are online journals and many people can see them. Originally, blogs are called web-logs, and more often blogs are discussing some specific topic. Main difference between forum and blog is in number of users involved in discussions. Blogs are more personal, and often only one person is writing their blog, while forum involves more users, which discuss the given topic. Blogs can be personal and professional. Professional blogs are sponsored by an organization. (Schrader (n.d.)) Micro-Blogging is very similar to blogging, i.e. it is micro journal that tells us what is happening right now. Major news events are now breaking online via micro blogs, and the most popular micro blog is Twitter. (Schrader (n.d.)) Photo Sharing websites are more and more popular, because instead of sending photos to someone, users upload them to photo sharing website and then just share links for those pictures. The user can also tag their photos with related keywords, and there is an opportunity of commenting on photos. Some popular photo sharing sites are Flickr and Picasa. (Schrader (n.d.)) Video Sharing is almost the same as photo sharing, because users upload their videos and then share links to those videos. In addition, they can tag videos with related keywords, and leave comments. The most popular video sharing website is YouTube. (Schrader (n.d.)) Professional social networking websites allow users to connect with other professionals and maintain their professional relationships. Here users can search jobs, and other professional opportunities. LinkedIn is one of the most popular professional social networking sites. (Schrader (n.d.)) Social websites are for staying in touch. They do not group users with specific of niche interests, and are of general use. Social networking sites are about being social, so there are sites purely for allowing users to stay in touch with people whom they know. The most popular social websites are Facebook and MySpace. (Schrader (n.d.)) Bookmarking social networking website’s major purpose is the sharing of information. If users read something they like, they can bookmark it, which means that they liked what they have read. The more people bookmark some site; they will attract even more people to that bookmarked site. The most popular bookmarking websites are Digg, Delicious, and StumpleUpon . (Schrader (n.d.)) Types of social networking users Now we see that there are many ways that we can categorize social networking sites, but we can also categorize social networking users, and according to website The Man Experience there are five types of social networking users: The ’simply staying in touch’ person This type of user uses their profile for staying in touch with his friends whom he knows in the real life. The ‘profiler’ This type of user is easily recognized by huge number of contacts (from which many of them he never met in real life), uploaded materials such as videos and pictures, and very frequent updates. This type of user is hoping that many people would see his updates and comment on them, which is his substitution for lack of acknowledgments in real life. The ’socially incompetent’ guy This type of user doesn’t have much of a real social life, so he substitutes it with virtual one. This type of users often is presenting themselves to be someone they are not. At the beginning they are successful if their interactions and communications, but usually at the end they are socially incompetent in virtual life just as much as they are in real life, so this type of users is exposed to risk of becoming even more lonely over time even with social networking sites. The power dater – This type of user is using social networking to date people and to enrich his life. Sometimes this type of users is trying to substitute things they don’t have in real life, but also this type of users is just using social networking for fun. The explorer – This type of user is exploring the Internet in search for information he needs. He might be looking for information about some restaurant in the city, or he is exploring his traveling options in some country. This type of user is often a member of many groups and he often contacts many people when he is in search for some information. Chapter 3 STATISTICAL DATA ABOUT SOCIAL NETWORKING WEBSITES How many people are using social networking sites? Social networks have swept the world and completely changed the way we communicate with people on the internet. Research shows that Americans spend a quarter of their Internet time on social networking websites and blogs. These numbers dramatically increased since last few years and show the real impact of social networking websites on society. For example, Facebook has over 500 million members. If we compare that number with the number of over 6 billion people in the world, we can conclude that every 12th inhabitant of the world has a Facebook profile. Subtract from that at least 40% of socially and technologically underdeveloped counties, and we got alarming figure. (Nielsen, 2010) Nielsen, a company that monitors Internet activity has revealed that Americans have, due to social networking websites, ignored the e-mail, which is logical because the platform like Facebook integrate various services that can be used to share content with family and friends. Thanks to the Facebook, there is increased consumption of videos, movies, and news, because users are sharing and recommending to each other content which they themselves might never have find and see. (Nielsen, 2010) Social networking websites are no longer reserved only for young people. America has twice as many users of social networking websites which are around fifty, than of those who are younger than eighteen. As social networking websites become more popular, their new members are on average older, of different races and from different social classes. Nielsen claims that online games are used more than e-mail and that online games have become the second most popular activity on the Internet. Users spend ten percent of their Internet time on games and overall half of Americans play them. Another favorite activity of Americans on the Internet is watching videos and films. On average, users are watching videos and films about three hours and fifteen minutes per month. (Nielsen, 2010) Perhaps the most interesting thing in this whole story is the fact that many people use the Internet from mobile phones. Mobile usage still dominates, and the second are the news portals. Nielsen predicts that by the end of year 2011 the majority of phones sold will be smartphones. Figure 2. Shows the number of users of social networking sites in the world. (Nielsen, 2010) Socialnomics have released some statistical data about social networking websites, which shows that social networking is very serious widespread activity on the web. Here are some statistical information that Socialnomics revealed (Socialnomics, 2010): Social Media has overtaken porn as the #1 activity on the Web 1 out of 8 couples married in the U.S. last year met via social media Years to reach 50 million Users: Radio (38 Years), TV (13 Years), Internet (4 Years), iPod (3 Years). Facebook added 100 million users in less than 9 months. iPhone applications hit 1 billion in 9 months. If Facebook were a country it would be the world’s third largest country behind China and India US Department of Education study revealed that on average, online students out performed those receiving face-to-face instruction 1 in 6 higher education students are enrolled in online curriculum LinkedIn has more than 100 million users worldwide 80% of companies using LinkedIn as a primary tool to find employees The fastest growing segment on Facebook is 55-65 years-old females Ashton Kutcher and Ellen Degeneres (combined) have more Twitter followers than the population of Ireland, Norway, or Panama. The #2 largest search engine in the world is YouTube Wikipedia has over 13 million articles. Some studies show it’s more accurate than Encyclopedia Britannica. 78% of these articles are non-English There are over 200 million Blogs 54% of bloggers post content or tweet daily Because of the speed in which social media enables communication, word of mouth now becomes world of mouth Facebook users translated the site from English to Spanish via a Wiki in less than 4 weeks and that cost Facebook $0 25% of search results for the World’s Top 20 largest brands are links to user-generated content 34% of bloggers post opinions about products brands People care more about how their social graph ranks products and services than how Google ranks them 78% of consumers trust peer recommendations Only 14% trust advertisements Only 18% of traditional TV campaigns generate a positive ROI 24 of the 25 largest newspapers are experiencing record declines in circulation because we no longer search for the news, the news finds us. In the near future we will no longer search for products and services they will find us via social media More than 1.5 million pieces of content (web links, news stories, blog posts, notes, photos, etc.) are shared on Facebook daily. (Socialnomics, 2010) eBiz MBA is a website that provides their users with statistical data and ranks websites in many ways, and according to them here are top 15 most popular social networking websites: Facebook, estimated with 550,000,000 unique monthly visitors Twitter, estimated with 95,800,000 unique monthly visitors MySpace, estimated with 80,500,000 unique monthly visitors LinkedIn, estimated with 50,000,000 unique monthly visitors Ning, estimated with 42,000,000 unique monthly visitors Tagged, estimated with 30,000,000 unique monthly visitors Classmates, estimated with 29,000,000 unique monthly visitors Hi5, estimated with 27,000,000 unique monthly visitors Myyearbook, estimated with 12,000,000 unique monthly visitors Meetup, estimated with 8,000,000 unique monthly visitors Bebo, estimated with 7,000,000 unique monthly visitors Mylife, estimated with 6,000,000 unique monthly visitors Friendster, estimated with 5,000,000 unique monthly visitors MyHeritage, estimated with 4,800,000 unique monthly visitors Multiply, estimated with 4,600,000 unique monthly visitors Age distribution across social networking sites in the United States Age distribution across social networking sites in the Unites States can be categorized in many ways. We can categorize users only by average age or we can compare their age with popular social networking sites. We mentioned before that trends are changing and that social networking websites are not anymore used only by younger people, and how older population is involved in social networking much more every day. Pingdom, a website monitoring service, did a research on the age distribution. The sample was 19 popular social networking sites such as: Bebo, Classmates.com, Delicious, Digg, Facebook, FriendFeed, Friendster, Hi5, Last.fm, LinkedIn, LiveJournal, MySpace, Ning, Reddit, Slashdot, StumbleUpon, Twitter, Tagged, and Xanga. If we take into consideration only the age of social networking users we can find average age distribution across social networking sites and average is: 15% of social networking users are younger than 17 years. Only 9% of users are in the range from 18 to 24 years old, 18% of all users of those nineteen social networking sites are older than 25, but younger than 34 years. Group in which users are older than 35, but younger than 44 years encounter for 25% of all social networking users, and this group dominate. 19% goes for group that is older than 45 but younger than 54, 10% of users are in a group where users are older than 55 and younger than 64 years. Age group where users are older than 65 years encounter for only 3% of total social networking users. Figure 3. shows average age distribution across social networking sites in the United States. In addition, the average age of social networking users is calculated on 19 sites that we mentioned before. The estimated average age of social networking users is 39 years. Average age of users on Bebo is 28.4 years. MySpace