Friday, November 29, 2019

The American Jeremaid Essay Example

The American Jeremaid Essay The American jeremiad is what shaped the identity of America and its values that are part of the American life. The American jeremiad adds a dimension of hope and fear. It adds tension to generate motivation for progress. It seeks to unify people by creating tension between ideal social life and its real manifestation. Bercovitch explains the Americans believe they have a mission and they are meant to be the best. He argues that America is not flawless and America has never succeeded because they continue to ask themselves When is our errand to be fulfilled?† This new land was sacred for the Puritans and this new land gave them an opportunity to define themselves and define what America should be. This new land became a secular and sacred place. The Jeremiad is what reminded America of their mission to be a â€Å"City upon a Hill.† It aimed to direct people back to God so they can fulfill their destiny. The European and American Puritan jeremiads are different. Bercovitch sums up the characteristics of the American jeremiad, â€Å"first, a precedent from Scripture that sets out the communal norms; then, a series of condemnations that detail the actual state of the community and finally a prophetic vision that unveils the promises and announces the good things to come.† It starts out by explaining how it should be, then it states the actual complaint, and finally it has a vision that the people need to work towards. It is about realizing the wrong and moving away from the negative and fixing the problems. Bercovitch relates social and religious issues to economics and politics by stating, â€Å"I am suggesting that the process of Americanization began not with the decline of Puritanism but with the Great Migration, and that the jeremiad, accordingly, played a significant role in the development of what was to become modern middle-class American culture. I hope that in sugges ting this I do not seem to be over-straining the worn links bet We will write a custom essay sample on The American Jeremaid specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The American Jeremaid specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The American Jeremaid specifically for you FOR ONLY $16.38 $13.9/page Hire Writer

Monday, November 25, 2019

Computer Ethics Essay Sample

Computer Ethics Essay Sample Computer Ethics Essay Computer ethics entails practices, values, and procedures that rule the process of access and consumption of computing technology and the linking disciplines without distorting the moral beliefs and values of people or the entire community. It is a concept in ethics that mainly focus on the ethical issues and challenges that result from the use of computers and strategies to curb them. Computer ethics majorly enforce the implementation of ethical computing procedures and usage of the computing materials and outlines the required methods that curb unauthorized transfer of digital contents. The discipline also helps to minimize other unethical processes, for instance, infringing copyrights as well as trademarks. The major aspects that relate to computer ethics mainly base on cases regarding the use of the internet, for example, privacy and user interactions with software, websites and other connected services. The common aspects of a computer ethics are such as privacy concerns, the intellectual property rights, and the impact of computers on the society. Personal data is vital when engaging in any business and thus available to other people as well as organizations. Privacy should, therefore, be upheld to protect this personal information through a technique called encryption. Privacy entails the ability of an individual to make reproductive and personal decisions w ithout any interference that is, freedom from any form of surveillance. Computer ethics describes information technology and the way to explore this technology to the users. Computer ethics also outline the challenges of running computer software and hardware as a result of misuse by the users. The modern society depends vastly on the computer networks to leverage the social and business life and thus there erupts both personal and social ethical concerns. Lack of computers would halt most of the industries today. However, most of the electronic communication between individuals and businesses, for instance, do not guarantee any privacy and security. Initially, when the computer technology was established, there was an absence of ethical standards regarding their use which resulted in challenges. However, the discussion in computer ethics brought a consensus and had solved the computer related problems. Some of the commandments regarding computer ethics dictate that one is not allowed to use a computer to harm others as it is highly unethical. It is ther efore immoral for one to access and distort other people’s files. Computer ethics also dictates that one should not interfere with another person’s work and therefore spreading and generating computer viruses to others is considered unethical. Snooping around files that do not belong to you means invading other people’s privacy and this is similar to break into others people’s rooms which are considered unethical. Using computers to steal or log into other people accounts, bank or company is similar to robbery thus ethical.It is against computer ethics to use computers to bear false witness against someone or copy any software without paying for it first. No individual is allowed to access other people’s resources without being authorized to do so and appropriating somebody else’s intellectual output is against the commandments of computer ethics. It is ethical for one to consider the consequences of any program they write and individuals are encouraged to think about computers in a broad social perspective. Compu ter ethics dictate that every person should use a computer in a way that enhances respect and consideration to ensure safety and satisfaction. Currently, we live in an era where computers are vastly used, and almost every individual has a chance to explore the internet before they commence their formal education. In this way, computers can be described as electronic devices that are human-made with the aim of maximizing welfare and convenience, with no thoughts process internally regarding moral actions.

Friday, November 22, 2019

Digital marketing presents opportunities and challenges to Essay - 2

Digital marketing presents opportunities and challenges to organisations - Essay Example 198). Yet, to obtain the advantages of digital marketing, organisations should add interactive media into their current marketing and business strategies, which is not easy to accomplish. Many companies are having difficulties developing their digital marketing strategies. Studies are being carried out to identify new marketing tools that will contribute to the development and implementation of digital marketing tools. The intention of this discussion is to describe the opportunities and challenges presented by digital marketing to today’s companies by using two concrete examples, Amazon and American Airlines’s SABRE. Various scholars and researchers have identified and described the opportunities and challenges of digital marketing. Digital marketing has created new means or outlets for advertising, selling, and buying. It allows the customer to access an incredible amount of information in an accessible and convenient way. Customers have the chance to look at products and/or services based on their wanted features, such as price, quality, functionality, and others. Customers can use it to get product reviews, or to know about the experiences, opinions, and/or ideas of other users (Urban 2004, 18). Digital marketing has given the end user some control, bringing about an enormous change in marketing processes. By using digital marketing companies can gain competitive advantage through greater customer satisfaction. In addition, digital marketing could be a simple tool for companies since the ‘digital’ feature of marketing allows further technology advances. Because the Internet facil itates two-way communication directly and quickly, implementing digital marketing strategy can occur faster than earlier marketing tools and are at times less costly. The best feature of digital marketing is its ‘instantaneousness’, hence allowing quick response from customers (Morris 2002, p. 205). On the

Wednesday, November 20, 2019

Free Will Essay Example | Topics and Well Written Essays - 1250 words

Free Will - Essay Example This leads to the realization that in deed power inflicts corruption of the mind and absolute power corrupts the mind completely (Blaug 67). The statement that power has the ability to corrupt the mind has been vividly observed in almost every part of the world. Individuals in the opposition have proven to be some of the best leaders before assuming the throne. They articulate people’s grievances and would convince that they are the best to be mandated to lead the people, ironically, when they are eventually elected to power they change to be the known despots of the world (Curra 97). In support of these, the history of Adolf Hitler can serve as an example. Hitler was German who was incarcerated for many years allegedly for castigating the regime that was in power then, after serving his sentence, Hitler was unanimously endorsed to be the Germans king on premise that he had vehemently articulated people’s voices and out rightly was the best bet then (Lewis 56). Upon ass uming the office, Hitler turn to be driven by the ever-growing need to conquer the world by claiming every part of it to be German’s territory. ... This is a clear illustration that power can corrupt the mind to an extent that it insulates critical analysis of one’s actions and impact negatively to the society or a nation at large. With reference to power as a way of corrupting the mind Hitler is not the only culprit, there are other world’s leaders who have acquired the title ‘despots’ by the way they managed power, the long list includes people like Pol Pot (Cambodian dictator) and Slobodan Milosevic of Yugoslavia (Lewis 204). At the helm of power, all these leaders demonstrated radical change in perception thus enabling us to construe that they were corrupted by power The notion that power corrupts the mind is a blanket accusation that cannot be used to include every leader who has been at the helm of power. We have very many leaders starting from grassroots level to the national level who have served in their capacities diligently with honesty and the rule of the law negating the fact that with the onset of power what follows is the corruption of the mind (Lewis 215). Again, when enumerating leaders who have shown deviance while in power, the proportion of the leaders who perfect this is negligible compared to the entire population. It is becoming necessary that we critically understand the relation between power and individuality, power itself cannot corrupt the mind, but the mind can corrupt power (Curra 198). It should then be construed the other way round. Before we relate power to the corruption of the mind, we should first have all the fundamentals of power that directly influences leader in power to depict contrary behaviors and without these, it will be elusive to admit that power affects leaders negatively. The other

Monday, November 18, 2019

No topic Research Paper Example | Topics and Well Written Essays - 1250 words

No topic - Research Paper Example The higher nature of Prakriti includes things that are regarded as life force which hold all living things on earth. Therefore, it stresses that all the living things emerges from prakriti’s two fold levels. All living things melts in a universal Prakriti at the end of their lives while at the start of creation, God breathes new life in them and they live again. The Purusha on the other hand, is responsible for creating all living or existing communities and the entire creation both in motion and stagnant. The Prakriti represents the mind and the body with all their components while Purusha represents the inside witness ego or spirit which is the clean conscience that lives beyond human mind and senses (Giles 82). Further, it is significant to note that the purusha represents the collective cosmic male whose endurance leads in the evidence of world and life. By enduring the hardships and pains, it forms the basis for one to liberate or free himself from evils of this world. The idea of purusha is well entrenched in the Vedas specifically the purushasukta which explains how the world’s were formed and how beings were given power to live in accordance to natural laws. Further, it illustrates that the social order of the worlds was build from the purusha. The purusha exists in two types; the perishable and the imperishable. In this case, the body is perceived as perishable while the soul is seen as the imperishable. An important note is that the Supreme Being does not comprise any of these features because he is beyond Prakriti. The supreme being posses the highest qualities and is above the inner self, sustains and protects the world he created by guiding them in right path. The Prakriti takes care of the dual sense and illusion of living things. Therefore, all major transformations occur because of Prakriti. Via the connection with the ‘gunas’ it binds the inner soul to the sense of objects and hence leads to birth of

Saturday, November 16, 2019

Software Development Methodologies Analysis Information Technology Essay

Software Development Methodologies Analysis Information Technology Essay The report will be divided into sections, which describe the different stages of the project life cycle and provide information about the project scope, purpose and defines project objectives. Furthermore this report investigates the different software development methodologies and examines which one would be the best to use for the purpose of the final year project. Moreover the Summary and Critical Review of the project is provided with conclusions on, possible, future changes and improvements to the project. Finally the reports Appendix section includes all relevant diagrams, testing and coding and other information related to the project. Acknowledgments I would like to thank both of my project supervisors; Jon Bennett and Matthew Wake for their help and encouragement throughout this project. Furthermore I would like to thank Karren Burrows for her help on improving my database design and Mary Spence for guidance in the complicated world of VBA. In addition I would like to express my gratitude to Kevin Potterton, a friend and co-worker at Investmaster Group ltd. for providing helpful input, recommendations and moral support in difficulties with project management. Finally my boyfriend Andrew Steer for his patience, support and proof reading. Table of content Introduction The main aim of this project was to document and develop an Order Processing Scenario for a car rental company. The system stores customer and car details, car availability, calculates rental costs and fines, prints bills, and highlights unpaid transactions. This information will be available through a user friendly interface; with clear error messages. To accomplish this, knowledge acquired throughout the years at university was used to analyse and solve problems encountered during the project. Furthermore, the information required for the project was gathered and synthesised to provide a practical and high-quality end product that could actually be used in a real world situation. Additionally, research into different software development methodologies was completed and an appropriate development methodology selected. By using techniques and tools covered during the course the requirements for an order processing system were captured, including; different users and views of customers and clerks. What is more, using the research, self-learning and additional Visual Basic tutorials enabled the use of more sophisticated and advanced coding techniques. Finally, the system was tested by users with different levels of IT knowledge and was accepted for covering the relevant HCI criteria. (Appendix14) To develop and implement a fully functioning GUI front end for the above system. Problem definition. Currently, Aleks Car Rental is a small car renting company and all record maintenance within the company is carried out manually, on paper. Customer and reservation details are written down in log books and transactions are not backed up anywhere in case of any data loss and sensitive data is quite easily accessible; making the company susceptible to data theft. This way of working is not particularly effective because the paperwork is frequently lost or misplaced, which leads to the customers being unhappy with the service provided and complaints concerning the standard of data security. The aim of this project is to produce a cheap, automated solution that will enable safe storage of sensitive customer data. It should allow permitted users to check on; the availability of cars, customer accounts and to produce relevant reports. In addition to this, the system should be easy to use with clear instructions and messages as the users (clerks) have only basic IT knowledge. Objectives To select and follow an appropriate development methodology. To capture requirements for an order processing system including different users and views of customers and clerks. Investigate different software options. Design the order processing system. To include a variety of subsystems including the maintenance of customer information, car details, clerk details and the payment of fines. To identify a variety of users for system testing against relevant HCI criteria(Appendix15). Produce a prototype with basic functionality. Conduct an evaluation of the prototype. To develop and implement a fully functioning GUI front end for the above system. Basic Project Requirements 1) Acquire and analyse user requirements. 2) Develop a working system prototype with basic functionality specified by the user. 3) Design and implement a database for the system prototype. Possible Further Enhancements 1) Add administration section to the system. 2) Develop a fully functional order processing system 3) Investigate possible security problems Deliverables 1) Report 2) Working order processing system Project Schedule The duration of each task was controlled through the production of a Gantt chart; an outline of each key task was highlighted therein. This chart can be seen in Appendix B. Nevertheless it is not always possible to stick to the produced schedule, so the second, reviewed Gantt chart was created. This chart can be seen in Appendix B. It shows the actual start and completion tasks dates presented week by week, the tasks that were completed in the different time than expected are presented in blue. Appendix C Project Development Diary and Error: Reference source not found, highlights the problems encountered during the development and times when project was feeling behind the original schedule. The main reason for running behind the schedule was that the planed amount of time to learn VBA language was an optimistic prediction and the task was much more difficult than predicted. Another factor that had a big influence on delaying the project was sudden unavailability ot the project supervisor during to his health issues. This had place in January, and caused significant suspension of the database development as the supervisor was a project client and a main source of help in using VBA code. Furthermore, accommodating for deadlines in other modules, and obligations at work lead to further delays. However by working extensively during the weekends and bank holidays all of the project objectives were fulfilled on time. Project Management Scheduling the project stages had a massive influence on the development of time management skills. Successful time management helps to increase the person productivity and overall efficiency. Setting goals, prioritising them and monitoring its execution help to gain conscious control over the project and its separate stages. Developing these skill can seriously influence the person future ability to manage the projects in the work environment. One of the techniques useful when managing the project is the MoSCoW analysis (see Error: Reference source not found). It divides the tasks into different categories to enable the decision on which of them are the most and the least important. Tasks paced high in the hierarchy are the ones that had to be completed first, when the completion of tasks placed lower in the hierarchy of importance was optional. In cases where completion of the most important tasks was taking longer than expected the less important functions were completed earlier, to ensure that there are as many working functions as possible. Furthermore to ensure that all of the good project management practices are conducted during the final year project development, weekly meetings with Jon Bennett, supervisor, were carried out. During these meetings supervisor pointed out parts of the project that might take longer to complete and highlighted the areas requiring the biggest effort concentration. Unfortunately, because of the supervisors health problems meeting in the last few month of the project development were suspended but they were resumed with the new project supervisor although not with the same frequency. 2.Software Development Methodology Software Development Methodologies Analysis When developing a system it is crucial to choose a methodology that will fulfil all of the project requirements within the allocated timescale. A successful methodology is one that enables the developer to manage, evaluate and control the system throughout its life cycle. There is a wide range of different models, which differ in; the number of iterations of the project lifecycle, the intensity of user involvement in the project and the level of evaluation. Therefore, the decision on which methodology to use for a final year project might be a very difficult one and to succeed, the complete spectrum of requirements has to be taken into account and many techniques and tools have to be considered. Agile vs. Heavyweight Methodology Project development methodologies can be divided into two main types; agile and heavyweight. Both of these methodology types possess aspects useful for the purpose of the final year project but none of them could be fully used as a separate technique. In order to find the methodology that is most suitable for the project it would be recommended to combine some of their individual aspects together. Agile Methodology Using some of the agile methodology features can significantly limit the amount of documentation produced for the purpose of the project and assure that the project will be finished in the given amount of time. Furthermore, the agile approach concentrates on good design, technical excellence and simplicity, which are the main goals whilst working on the final year project. Another argument for using an agile methodology is that it can also be used for the purpose of small, self-organised teams or individuals, helping them to adapt to changing circumstances, which is often the case in projects such as these. Heavyweight Methodology Nevertheless, using some of the aspects of a heavyweight methodology should also be considered when developing an order processing system like Aleks Car Rental. Although heavyweight methods are mainly used by large teams for the purpose of developing large projects, some of the methodology tools and techniques could be also useful when developing student project. Following a heavyweight methodology helps to identify the different stages of the project and what lifecycle would be the best to follow for the purpose of the final year project. RAD (Rapid Application Development) One of the examples of an agile methodology is Rapid Application Development (RAD). Its main advantage is that the working systems are created within a short time period, which is very useful as the time frame for the student final year project is quite restricted. Furthermore, according to the RAD methodology the project needs to be frequently reviewed by the user as new functionalities are added during the development process. This is called iterative prototyping and should be applied to the students final year project development. User participation is very important in this process as it ensures that the developed system satisfies the end users requirements. Another aim of the RAD method is to reuse existing software components. Unfortunately as Aleks Car Rental order processing system needs to be created from scratch this aspect of RAD is not suitable for the purpose of this project. Another feature of RAD is the use of Computer Assisted Software Engineering (CASE) tools and techniques, which could be extremely useful to the developer in the project planning stages and all stages that follow the development of the system. These techniques should also be used in the development of the final year project. RAD questions the use of high-level documentation, like this report, as it is very time consuming, and, instead, concentrates on the low ceremony level such as system testing, training and implementation plans. For a diagram see Appendix D. Extreme programming Another example of the agile methodology is the Extreme Programming Method. Its success depends upon the level of customer satisfaction with the system. For customer satisfaction to be optimal, this method engages the client in constant communication so that user requirements can be catered for during the development lifecycle. This could be easily applied to the final year project as contact with the client (supervisor) should be persistent throughout the whole development process. By delivering the product in modules, over short timeframes, the Extreme Programming method concentrates on short term goals instead of delivering the full product over a much longer period. The complexity is added to the project sequentially, which means that individuals will be working on something new periodically. This would be the perfect path to follow when developing the final year project as short term goals could be delivered to the project supervisor on a weekly basis. What is more, Extreme Programming allows the developer to quickly respond to changes in customer requirements, which would be highly desirable for the unstable requirements of the final year project. Another feature of the Extreme Programming method is that it is mainly used for small to medium sized projects; such as a final year project. System Development Life Cycle Methodology (SDLC) A good example of a heavyweight methodology is the System Development Life Cycle Methodology (SDLC). This methodology is mainly modelled around the Waterfall Life Cycle which breaks the project structure into stages consisting distinct goals. It is good for projects with clearly specified requirements and a large time frame. A key feature of this model is that the process needs to stay free from any overlapping or duplication. To achieve that undertaken goals always have to be accomplished before proceeding from the one phase to the next one. There is very little possibility for the designers to go back and change any of the finished stages as this would dramatically slow down the whole development process. This methodology doesnt seem to be suitable for the purpose of developing the final year project. . For a diagram see Appendix D. Structured Systems Analysis and Design Method (SSADM) Another heavy weight methodology example is Structured Systems Analysis and Design Method. It is the waterfall life cycle method which breaks the project structure into stages and rejects overlapping theses stages. Three major tools used by SSADM are Logical Data Modelling (Entity Relationship Diagram), Data Flow Modelling and Entity Event Modelling. The method combines all three techniques to enable the complete view of the developed system. Furthermore SSADM is structured from 5 complex hierarchies of stages: feasibility study, requirements analysis, requirement specification, logical system specification and physical design. As this methodology is a high ceremony method and it involves extensive planning and wide documentation, its elements should be used in a final year project to document the development process. Nevertheless SSADM doesnt really address the issue of changing requirement specifications and it doesnt allow any iteration after the project phase completion, so following this methodology rigorously might be really time consuming and not appropriate for the purpose of developing the final year project. User Centred Design methodology UCS could be described as a methodology that attempts to optimize the product around the user specifications. The main aim is to create a product that user can, want, or needs to use, rather than creating something that user will have to accommodate their behaviour around. To achieve that client has to be regularly updated with the project progress and consulted regards any changes. According to the methodology specifications there are several ways to gather required information from the users: focus groups, questionnaires, interviews, usability testing, card sorting and participatory design. Furthermore, although USC mainly replicates the waterfall life cycle method it is also focusing on its four key stages: Use Specification, Requirements Specification, Design and Evaluation. The stages are repeated until the projects usability scope is achieved. USC methodology uses many techniques that could be useful in the development of the final year project like use cases, scenarios and persona (customer for the purpose of Aleks car rental). Methodology used for this Project Time spent on the planning, documentation development and testing is often dependent on the chosen methodology and can increase or decrease accordingly to the used method. That is why, to meet the project objectives successfully the common practice is to combine different aspects of the different methodology types in the way they will suit the purpose of the students final year project. As the user (project supervisor) was consulted about the project requirements and progress on many occasions during the project development, it would indicate that aspects of Extreme Programming, UCD and RAD methodologies were used to full the project requirements. Also, using use cases, project scenario (Aleks car rental) and persona (client) taken from the UCD method made project goals easier to understand and fulfill. Furthermore, to design the order of the different stages in the project the waterfall life cycle technique was used, but as many iterations to the project throughout the different stages were made, and object oriented techniques and tools were used, this would indicate the aspects of SSADM and User Centered Design method were used in the final year project. Moreover Diagrams such as the Logical Data Model (Entity Relationship Diagram) and the Data Flow Model taken from SSADM were also used to establish the data flow in the system and what tables should be created in order for system to work as specified by the client. Additionally to confirm that all of the client requirement were covered the testing of the system was undertaken as it have place in RAD and UCD methodologies. To conclude, there is no one appropriate methodology for this project but many aspects of different methodologies combined together enabled to fulfil the requirements set by the project stakeholder. 3. Gathering Requirements 3.1 User Requirements For the purpose of this project the assumption was made that the person called system user will be the project proposer and initial project supervisor, Jon Bennett. To enable gathering of the most accurate requirements, two different data gathering methods were undertaken. Firstly, frequent consultations with the system user enable assembling essential system requirements and allows in depth research into user needs . Secondly investigation into current car hire solutions on the Internet was undertaken and features of the car renting company systems identified and reused if appropriate. 3.2Research Methods Two main research method types can be identified, quantitative and qualitative. Quantitative method is often used when the question is how many or how often. http://www.orau.gov/cdcynergy/demo/Content/activeinformation/tools/toolscontent/quantiativemethods.htm The most commonly used techniques are usually structured questionnaires and surveys. Further to that statistical data is produced and, in order to analyse and interpret the collected data, converted into charts and graphs. This method can be very time consuming and requires gathering large samples of data. As the final year project has a strict time frame and it is an individual task, quantitative method doesnt seem to be the right one to use. Second type of research methods is a text based qualitative method. In order to obtain the most accurate information, methods such as focus groups, interviews, observations, and case studies are used. The main data gathering method is to take a description of a problem from someone experiencing it or by observing the individual user. By using this method more in depth information is provided which will allow better understanding of user needs. The success of this method depends mostly on the researchers skills and should only be used if there are only a few cases to investigate. As the amount of stakeholders in the project is limited to one and it is possible to observe or interview the user, using qualitative method seems to be more suited for this project. 3.3Interviews Interview is a formal meeting and discussion with someone. http://www.thefreedictionary.com/interview Gathering information through an interview means evaluating the situation through the conversation with user. There are different kinds of interviews: structured, semi-structured, unstructured, group interviews and focus groups. In order to gather all necessary information about the required system functionalities regular weekly meetings with the user were taking place during a four month period. This is documented in appendix X. During these meetings functional and usability requirements were recognised and different methods on how to fulfil them were discussed. 3.4Functional Requirements Functional requirements indicates what actions should the system be able to do and what functions it should perform. Login Only permitted users should be able to login in to the system. Make Loan- Permitted users should be able to rent a car, and loan information should be stored in the system Add Customer- Permitted users (clerk) should be able to add new customer details. Edit Customer Permitted users (clerk) should be able to update/edit customer details. Find Customer Permitted users (clerk) should be able to find existing customer details. Delete Customer Permitted users (clerk) should be able to delete existing customer details. Add Car Permitted users (clerk) should be able to add new car details. Edit Car Permitted users (clerk) should be able to edit existing car details. Find Car Permitted users (clerk) should be able to find existing car details. Delete Car Permitted users (clerk) should be able to delete existing car details. Register car damages Permitted users (clerk) should be able to add any car damage details. Add Clerk Permitted users (manager) should be able to add new clerk details into the system. Edit Clerk details Permitted users (manager) should be able to edit clerk details in the system. Find Clerk Permitted users (manager) should be able to find clerk details in the system. Delete Clerk Permitted users (manager) should be able to delete clerk details from the system. Produce Reports Permitted users (manager) should be able to produce monthly and yearly income reports. Produce Loan Receipt Permitted users (clerk) should be able to produce client receipt with the loan details. Calculate Payment System should calculate the total payment for the loan. Calculate Fine System should automaticaly calculate fine for late returns. Notifying about overdue loans Permitted users (clerk) should be able to view details of the overdue loans. Close Option Use should be able to close all the forms. Cancel Option User should be able to cancel undertaken activity. Logout Option User should be able to logout from the system. 3.5 Usability Requirements Usability requirements measures how the software is suitable for its users, considering how easy it is to learn, how effective it is, how efficient it is, and user satisfaction. When designing a system there are ten usability principles that should be taken into consideration . Jakob Neilsenal. (2001). These 10 rules are outlined below with relevance to the order processing scenario Aleks car rental. Visibility of system status The user should be informed about any system status changes through the use of appropriate feedback e.g. When information in the system is updated a message box should be displayed informing the user whether this procedure has been successful or not. Appendix 16 Match between system and the real world Language used in the system should be appropriate and easy to understand by the user, egz meaningful error messages. Appendix17 User control and freedom -All possible activities undertaken by the user should be supported by the system (navigation). Consistency and standards To prevent any confusion the system the consistency of the interface should be kept throughout the whole system. It is reassured by using the same colours, fonts and format. Error prevention Any errors should be avoided when possible, where errors do occur, user should be clearly informed what has happened. Recognition rather than recall The interface should be informative enough for the user to understand how to navigate around the system in order to fulfil the undertaken action, egz. placing order. It should be clear to the user what they are required to do without recalling any information. Flexibility and efficiency of use The system should be designed for both experienced and inexperienced. Although the Aleks car rental system is easy and straight forward to use all of the users will be provided with user guide. Aesthetic and minimalist design Using only the basic graphics and presenting only the necessary information prevents user from getting distracted from the system. Help users recognize, diagnose, and recover from errors When an error occures, the meaningful information should be displayed to indicate what coused the error and suggest how to resolve the problem. Appendix 17. Help and documentation -A user guide, listing clear steps on how to complete the tasks should be available. Appendix 18 3.6 Requirements gathered from available solutions This section of the report studies existing booking systems, available on-line or sold to car renting companies. See Appendix 18 for screen shots of these solutions. An investigation throuought existing booking systems was carried out in order to identify any reusable features that can be used for Aleks car rental System. Furthermore, undertaken research helped to recognise problems that should to be avoided. These are discussed below: General Usability: Usability is about design focused on helping customers perform tasks, with little effort and making the experience enjoyable. It is important from both the customers perspective as it is the means by which the user interacts; it should not lead to frustration. A well designed website interface is user friendly, simple, efficient, the functionality easy to learn and use in addition to providing effective interaction. Use of Multimedia: A range of high quality multimedia through color, sound, and graphics collaborated creates a powerful impression and generates interest, making the experience enjoyable. This sets a positive expectation for the rest of the website ultimately the customers choice of place to hire a vehicle. Use of multimedia should be kept to a minimal, with lot of white space and contrasting text. The average customers computer specification and bandwidth should be kept in mind thus it affects load up and response time. Search for Information: A customer likes a booking experience that enables them to find, select and pay for the service with ease. The solution to this is efficient navigation and search facilitation. A search function by keyword can help retrieve specific information; reducing frustration. Grouping meaningful data in a structured list should be applied as it minimizes confusion. Further subcategory help narrow down relevant information making it easier for customers to find what they are looking for. Online Order: The website should support secure online payment transactions, customers should be made aware of this, also other methods of payment options should be acceptable as customers are vulnerable to carrying out online payments. Status of reservation: It is important that the customer is updated with the status of the service once the reservation has been completed i.e. confirmation of the booking. 3.7 Safety Requirements There is a wide range of safety requirements to consider when designing a system, but as specifying them is outside the final year project scope only the basic ones will be covered. Backup when additional copies of the data are make. This could be done either by the user or automatically by the system. Backed data should not be stored anywhere within close proximity of the original system in case of a natural disaster such as fire or flood was to take place where the system is located. It is highly recommended that Aleks car rental company use a backup option to secured informations stored in the system. System stability testing to minimise system failure and possible data loss the thorough testing should be always performed on any new system. 3.8 Security Requirements Personal information stored in the system should only be accessible by authorised person. Password to prevent unauthorised individuals from accessing the data, system should always be protected with the password. Encryption protects information by making it unreadable to anyone except authorised person. This is use to protect the password when login in to the Aleks car rental. 4.Software and Hardware solutions 5.Car rental Company System Prototype In order to develop a fully working system student had to design and develop a working prototype of the booking system as a part of the project development lifecycle. See Appendix G for screen shots of the prototype system. Use Case Diagrams To gain an overall view of the system to be developed a diagram was drawn using UML (Unified Modelling Language). UML is used to show the interaction between the reservation system and the several actors/users. See Appendix H for a UML diagram. User Authentication As the system is designed to stored potentially sensitive data the user identification must be in place.<

Wednesday, November 13, 2019

Solution Text Notes :: essays research papers

Chemistry Textbook Notes: Solutions Chapters 13 & 14: LH 1. Define soluble, solution, solvent, solute, suspension, colloid (p.395–398) Soluble- capable of being dissolved solvent0 the dissolving medium in a solution solute- the substance dissolved in the solution suspension- a mixture in which the particles in the solvent are so large that they settle out unless the mixture is constantly stirred or agitated colloid- a mixture consisting of particles that are intermediate in size between those in the solutions and suspensions forming mixtures known as colloid dispersions 2. Most of the time when people talk about solutions, they are referring to solids that have been dissolved in water. Describe a different type of text=solution">solution (see Table 13–1) Solutions are not limited to the liquid state, they can occur in all three main phases, gas, liquid, and solid. For example, the water in the air is a liquid solute dissolved in a gas solvent; solid solutions include brass, which is made from combining zinc with copper 3. Describe two examples of colloids (see Table 13–2). A colloid consists of small particles 1nm to 1000nm in size that are suspended in a solid, liquid or gas. Examples include common products such as gel, a solid network extending throughout a liquid, or liquid aerosol, or otherwise known as fog 4. What is the Tyndall effect? What can it be used to distinguish between? The Tyndall effect is used to distinguish between a solution and a colloid; a colloid scatters light, like fog scatters the lights of a car, while a solution does not. 5. Describe an experimental method that could be used to classify a sample as a solution, colloid, or suspension. Allowing the sample to sit for an extended period of time will reveal the suspension, as it needs to be stirred or agitated to maintain its shape. A colloid then can be differentiated from a solution by shining light through it and seeing if it scatters 6. Define electrolyte and nonelectrolyte. Electrolyte- a substance that when dissolved will conduct an electric current while Nonelectrolyte- a substance that when dissolved will not conduct an electric current 7. Define saturated, unsaturated, and supersaturated solutions. Saturated solution- a solution that contains the maximum amount of dissolved solute unsaturated solution- a solution that contains less solute than a saturated solution Supersaturated solution- a solution that contains more dissolved solute than a saturated solution contains under the same conditions

Monday, November 11, 2019

Performance Pay at Safelite Essay

Safelite was the largest nation-wide auto glass company in the United States with about 500 stores, more than 3000 employees and 3000 trucks. The company has started mobile services and gained 12% of market share. Although Safelite offered mobile service from virtually all of its stores by the early 1990s, the main focus of the company was to serve the customers at their place and the trend of the stores was decreasing so forth. The incentive was $1000 to open a new store as bonus. So every employee tried to open a new store rather working hard and improving the production. The employees of the Safelite were required to work for eight hours and according to the CEO John Barlow, they were only putting in windshields for two and a half hours. They were not putting their complete efforts and loyalty to the company. Wasting their times and not working for what they were paid. The other reason of the low productivity was the popularity of mobile service, which decreased the demand of the store-based services, and the customer’s trend was changing to mobile service rather than store services. The other reasons includes the customer was not at the location where the mobile truck was called when the technician arrived or the technician was given the bad directions of the technician failed to understand the direction given by the customers. The employees didn’t put their complete efforts to the work and they were not working hard. Another reason was the problem understanding of the customers. Many of the technicians were not able to understand the complete problem of the customers. They came to know the problem when they reached the customers place. Sometimes the technicians were not carrying their appropriate tools, which were needed in the repairing for the customers. The mobile truck was liable to travel to the location where customer calls them. The reason of that was stores were not easy to find. It was because the stores were not well located; they were simply opened for the sake of adding more locations and were not always located in the prime service areas. John Barlow also added that if the location is not well located so why a customer bothers to find and go to the store. The fleet of the trucks became unable to justify its own cost. The company was seeing one repair job per truck per day to be maintained but they thought that this is a little expense. Individual technicians were installing an averag e of only 2.5 glass unit a day. It was the very bad performance than that of they had expected. Since the installation of a single windshield generally took less than an hour to complete. And lastly, some DCC managers didn’t cared to hustle and assigned jobs equitable rather than funneling more jobs to those technicians who worked the fastest.

Saturday, November 9, 2019

Language as a Highway

There are about five thousand languages throughout the world now, and that doesn’t even include the hand languages. As a matter of fact, Languages are the most powerful inventions ever. Languages are important highways that allow people to communicate within the world of different nations and cultures. Without language we wouldn’t be able to communicate with one another and spread ideas. Languages are highways that connect the past and the present. Without language there would be no way that we would ever have known what happened in the past. â€Å"Language is a highway linking all peoples and all ages. Mama was wrong to use language as a wall. † Sometimes language can be a wall that breaks the connection between the people. In contract, Many foreign use their lack of language skills as an excuse to wrap themselves up, refusing to communicate with other people. There are positive and negative sides in language, and it depends on how well you using it. It’s really important and useful for people to use language as a highway. Undoubtedly, language is the foundation of communication, and communicating is an inseparable part of our lives. We always share our feelings and emotions through the highway of language. Can you imagine if no one in the entire world understands you, you could only talk to yourself, and all you could hear was your own voice? In addition to expressing emotions, it’s also requisite for our everyday study. We wouldn’t be able to express our ideas and thoughts without language, and we wouldn’t be able to learn. We should all use it as a convenient highway instead of a wall. There is a saying, â€Å"High thoughts must have high language. † In fact, I’m totally agreed with that. No matter how intelligent you are, without the language you wouldn’t be able to express any of your ideas. Furthermore, language is a window to our heart which could send our feelings out. Let the language be a highway for you, instead of a wall.

Thursday, November 7, 2019

Weapons Used by Pirates

Weapons Used by Pirates Pirates of the Golden Age of Piracy, which lasted roughly from 1700-1725, employed a variety of weapons to carry out their high-seas thievery. These weapons were not unique to pirates but were also common on merchant and naval vessels at the time. Most pirates preferred not to fight, but when a fight was called for, the pirates were ready! Here are some of their favorite weapons. Cannons The most dangerous pirate ships were those with several mounted cannons - ideally, at least ten. Large pirate ships, such as Blackbeards Queen Annes Revenge or Bartholomew Roberts Royal Fortune had as many as 40 cannons on board, making them a match for any Royal Navy warship of the time. Cannons were very useful but somewhat tricky to use and required the attention of a master gunner. They could be loaded with large cannonballs to damage hulls, grapeshot or canister shot to clear decks of enemy sailors or soldiers, or chain shot (two small cannonballs chained together) to damage enemy masts and rigging. In a pinch, just about anything could be (and was) loaded into a cannon and fired: nails, bits of glass, rocks, scrap metal, etc. Hand Weapons Pirates tended to favor lightweight, quick weapons which could be used in close quarters after boarding. Belaying pins are small bats used to help secure ropes, but they also make fine clubs. Boarding axes were used to cut ropes and wreak havoc in rigging: they also made for lethal hand-to-hand weapons. Marlinspikes were spikes made of hardened wood or metal and were about the size of a railroad spike. They had a variety of uses onboard a ship but also made handy daggers or even clubs in a pinch. Most pirates also carried sturdy knives and daggers. The hand-held weapon most commonly associated with pirates is the saber: a short, stout sword, often with a curved blade. Sabers made for excellent hand weapons and also had their uses on board when not in battle. Firearms Firearms such as rifles and pistols were popular among pirates, but of limited use as loading them took time. Matchlock and Flintlock rifles were used during sea battles, but not as often in close quarters. Pistols were much more popular: Blackbeard himself wore several pistols in a sash, which helped him intimidate his foes. The firearms of the era were not accurate at any distance but packed a wallop at close range. Other Weapons Grenadoes were essentially pirate hand-grenades. Also called powder flasks, they were hollow balls of glass or metal which were filled with gunpowder and then fitted with a fuse. Pirates lit the fuse and threw the grenade at their enemies, often with devastating effect. Stinkpots were, as the name suggests, pots or bottles filled with some stinking substance: these were thrown onto the decks of enemy ships in the hope that the fumes would incapacitate the enemies, causing them to vomit and retch. Reputation Perhaps a pirates greatest weapon was his reputation. If the sailors on a merchant ship saw a pirate flag that they could identify as, say, Bartholomew Roberts, they would often immediately surrender instead of putting up a fight (whereas they might run from or fight a lesser pirate). Some pirates actively cultivated their image. Blackbeard was the most famous example: he dressed the part, with a fearsome jacket and boots, pistols and swords about his body, and smoking wicks in his long black hair and beard that made him look like a demon: many sailors believed he was, in fact, a fiend from Hell! Most pirates preferred not to fight: fighting meant lost crew members, damaged ships and perhaps even a sunken prize. Often, if a victim ship put up a fight, pirates would be harsh to the survivors, but if it surrendered peacefully, they would not harm the crew (and could even be quite friendly). This was the reputation that most pirates wanted. They wanted their victims to know that if they handed over the loot, they would be spared. Sources Cordingly, David. New York: Random House Trade Paperbacks, 1996 Defoe, Daniel (Captain Charles Johnson). A General History of the Pyrates. Edited by Manuel Schonhorn. Mineola: Dover Publications, 1972/1999. Konstam, Angus. The World Atlas of Pirates. Guilford: The Lyons Press, 2009 Konstam, Angus. The Pirate Ship 1660-1730. New York: Osprey, 2003. Rediker, Marcus. Villains of All Nations: Atlantic Pirates in the Golden Age. Boston: Beacon Press, 2004. Woodard, Colin. The Republic of Pirates: Being the True and Surprising Story of the Caribbean Pirates and the Man Who Brought Them Down. Mariner Books, 2008.

Monday, November 4, 2019

Fashion and art in the last decades of the twentieth century Essay

Fashion and art in the last decades of the twentieth century - Essay Example The paper "Fashion and art in the last decades of the twentieth century" concerns the art and fashion in the context of the twentieth century. When the word fashion is mentioned, the thing that first comes to mind is the flash of colors and the dashes of glamour but fashion has more to do with ideas: ideas that pop up when one is walking in the streets, the way that we live our lives as well as what is happening of late. Fashion for many people is clothes that people wear but the truth of matter surrounding the whole concept is different as this analytic essay will further illustrate. Art can be described as an expression of the human skills as well as imaginations in a form that may either be visual, in that the art may be painted, sculptured or adored as well as appreciated for the aesthetic powers that it posses. One of the things that we can establish from the definition of art is that it comes a great deal close to what fashion can be described as apart from the way that the two are expressed physically. As an underlying similarity, we see that art and fashion are both involved in the ‘expression of one’s ideas’. By the definition what most people believe fashion is, the latest styling of hair, clothes as well as decoration and behavior, it cannot be described as an art due to the fact that an art can be described as an application or an expression of the ‘existent human skills’. As well as imagination so as to come up with something that can be described as breathtaking significance.... The world is in constant change and art as well as fashion an be in some detail be described as a culture. One of the basic things that make fashion more of an art is the sense that since the 20th century, art has been increasingly used as a form of expression as art is in a lot of ways. One of the reasons that the lines between fashion and art are blurring are due to the fact that fashion as to the levels that it has reached today since the 20th century is one of the most obtainable forms of what we can call art today due to the fact that it is one of the most basic things that we as humans use so as in the identification of the identities of others as well as an expression of our own4. Fashion or even art in this matter is difficult due to the fact that over the long periods of time that the word has been used, different implications have been used throughout times in history due to the ‘changes in social customs’ as well as the people that are existent in different st ructures of the society (Stecker, 1996). An example on the expounding of the latter statement is that presently, fashion occupies what can be described in the modern day as the center ground for the understanding of the present day culture. The evolution of art and fashion Times have evolved and as of late, everything as we know it is becoming more modern, starting from the simple basics such as the way that we think to almost all of the things that we do. Art can now be categorized as a broader term and as opposed to what many people think, it might not always have to involve the use of a paper and a pencil. Artists as well as the fashion designers throughout many instances in history have come to appreciate

Saturday, November 2, 2019

Duty of the Court and its Interpretation of Legislature Essay

Duty of the Court and its Interpretation of Legislature - Essay Example Consequently, the unnecessary strain that is being imposed on judicial system is making judiciary to do the work of the legislature. Ernest Bruncken quotes Vandereycken about the three stages in the development of judicial interpretation as the literal state, logical stage and the positive stage. The interpretation of significance finds in logical and positive stages as logical stage considers the will of lawgiver and respect for it. Whereas, the positive stage the law can be seen as the product of economic and social forces working through law giver and finding expression accordingly. Hence, in this case the question about the power and duty of the court to travel outside the law on a voyage and discovery comes to the fore. The metaphor in the above sentence deals with the nature of interpretation that deviates from the original meaning and logic of the law considered. Hence, in the context of court interpreting the law in positive stage, the exigencies of social life will be the so le consideration of the court (Ernest Bruncken, 2009). Hart's theory and concept made greater impact on contemporary positivism as he applied the radical insights of the new linguistic philosophy. According to Tebbit Mark (2000), he explained the central problems of jurisprudence with sound theoretical footing and tried to do simplify the complexity of law. As Hart acknowledged the value of Bentham and Austin's efforts of clarification and tried to expose the weaknesses of classical common law, he tried to establish the power of Courts to go beyond the intentional meaning of the law to interpret according to the social situations. As he expressed reservations about some areas of law as serious obstacles in the path of genuine understanding, he viewed the interpretation of courts about the law as the articulation of pre-existing good. Hart disagreed with Hobbes and Austin about the positive form of command theory and supported the revealing of true explanatory strength. The reason for rejection of command theory by Hart is that it did no t reflect the reality of any possible or actual legal system and its explanatory power was limited thus confining the courts to certain points while interpreting the law. In that manner he supported the power and duty of court to interpret the law according to social situations. While stating his concept Hart constructs two effective arguments. First about the essence of law that purports to explain and thus stated that the rules cannot be orders or commands. As he felt that the rules are the ones, which facilitate social transactions, the interpretation of courts plays an important role in applying the law to various social situations thus giving the power to court to go beyond the concept of the rule in law. The second argument is about the distinction between types of legal rules that talks about analysis of social practices. As he pointed out that concept of an accepted rule is missing in Austin's analysis, Hart supported the sophisticated understanding of the social practice fo llowing a rule (Tebbit, Mark (Author), 2000). The important aspect in Hart's argument is that the rules in the law are open textured. Hence, Judges have to fill the gaps by their discretion. Hence, he