Thursday, December 26, 2019

What Makes A Great Leader - 1271 Words

Mahatma Gandhi, Mike Krzyzewski, Pope Francis, and Abraham Lincoln. All great leaders, all posses the same characteristics. When it comes to leadership many different names can be added to the long list. If you were to take a closer look on those people you will find what makes up a great leader. Being a leader is meant for only a certain breed of people. To be a great leader a person must consist of Confidence, Intelligence, and they must be versed. Great Leaders are all alike in someway. A Great leader is always a canny person. A person of great intelligence on the thing that they are trying to lead. Mike Krzyzewski is considered one of the best coaches of all time in the sports world. When younger, Coach Krzyzewski enrolled into the†¦show more content†¦A coach is a leader. Another great leader who shows that great leaders need to have intelligence is Pope Francis. Pope Francis is the head of the Christian Religion. He is of huge importance when it comes to maintaining wo rld peace. A task that requires a great amount of knowledge. Pope Francis attended Colegio Of San Josà ©. One of the top christian academies in the world. Pope Francis thrived at this school (Biography.com). This shows that Pope Francis knows a lot about the Christian religion and the world. He contains great intelligence, a characteristic that all great leaders need to posses. Knowing the answer is only the start, a great leader needs the confidence to present the answer. Confidence is key. A clichà © that everyone in the world has heard at one point in their lives. The only difference is that when it comes to being a notorious leader, confidence is actually key. Without confidence in what they are doing and why they are doing it, a leader would not be considered a leader. To help show this better, let us look back at one of the best leaders the world has ever seen. Mahatma Ghandi. Mahatma Gandhi was the leader of the indian independence movement. A movement to help the people o f India gain independence from Great Britain. During this movement Gandhi gained many followers and support by practicing peaceful protests. These protest were ways of hurting Great

Tuesday, December 17, 2019

The Imperial Presidency By Arthur Schlesinger Jr. S....

Throughout history, the term â€Å"Imperial Presidency† has been used in the 1960s to portray the United States presidents and their utilities. â€Å"Imperial Presidency† is grounded on many citations, observations that are devised by many historians. A numerous number of presidents follow the footsteps of presidents before them, in order to live in the shadow, they leave behind. Residing by the thought of, given that the president achieved his successes during his office, they try to repeat the same idea in order for the same successful outcome. However, there is a high chance for bad outcomes to occur, making it discreditable for the president in the current office. Historian Arthur Schlesinger Jr’s use of â€Å"imperial† president is aimed to convey a president with noble personality with his constant accumulation of power in his presidency. The executive power given to the president, sanctions him to be totalitarian and may create a war-like decision t hat affects the country as a whole. The government holds a crucial status to its citizens, executive branch specifically, is overlooked to symbolize leadership. Nowadays, the president’s office is believed to exemplify the values of the American people. There are certain powers allocated to the president by the United States Constitution, however; the responsibility and vacancy of the President tend to evolve from one president to the next. Characteristics of presidents and their effect on political decisions has beneficial aspectsShow MoreRelatedOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesTwentieth-Century World Bonnie G. Smith 83 4 The Gendering of Human Rights in the International Systems of Law in the Twentieth Century †¢ Jean H. Quataert 116 5 The Impact of the Two World Wars in a Century of Violence †¢ John H. Morrow Jr. 161 6 Locating the United States in Twentieth-Century World History †¢ Carl J. Guarneri 213 7 The Technopolitics of Cold War: Toward a Transregional Perspective †¢ Gabrielle Hecht and Paul N. Edwards 271 8 A Century of Environmental

Monday, December 9, 2019

New Security and Privacy Challenges System †MyAssignmenthelp.com

Question: Discuss about the New Security and Privacy Challenges System. Answer: Introduction Internet of things (IoT) is the interconnection of everyday devices and objects with the internet of computing which allows them to collect and exchange information. Every object has a unique identity, but the computer system can interoperate such identity with internet infrastructure. The IoT enables users to control their devices remotely across the existing infrastructure of the internet, which provides the option of direct integration of computer system in the physical world which improves the competence, accuracy, and advantages of the objects. Convergence means a combination of multiple different technologies into a single device or system. The IoT technology has numerous advantages, but they are vulnerable towards the risk of cyber-attack such as lack of information security, data analytics, hacking, and lack of data protocol standards. The popularity of IoT technology increases the threat of cybercrimes which can be dangerous for the privacy and security of its users. This essay will focus on analysing the benefit of IoT in convergence and convenience. Further, the article will evaluate potential risk in the IoT technology and its impact on users privacy. The essay will recommend measures that can minimise the potential threat of cyber-attack while using IoT technology. The internet of things is the connection of everyday usable devices to the internet such as car, appliances, kitchen, and others. According to Xia et al. (2012), in this technology, the objects are connected to the computer-based system through a single network which allows them to send and receive data with each other. The devices connected to the internet of things can interact with each other and share the information of users which improve their usability. The devices are connected through sensors which assist them to communicate with each other and user can control them using though existing network infrastructure, it allows for a direct integration of the physical world with computer systems. The combination resulted in improved usability of the products because it increases their efficiency, accuracy, and advantages. With the advancement of technology, the technology will be able to use in devices such as smart grids, virtual power plants, home appliances, automatic transport system and smart cities. As per the research firm Gartner, more than 25 billion devices will be connected to the internet of things technology by the year 2020 (Gartner 2015). The internet of things concept was first introduced in the article of Scientific American by Mark Weiser in 1991; the report provided the idea that reducing cost, size, and energy consumption of objects such as microprocessors, electronic appliances, and communication devices will assist in creating a ubiquitous computing experience (Press 2014). The term was attributed by Kevin Ashton, who was the co-founder of MIT Auto-ID center (Maney 2015). Governments and international organisation have recognised the development of the internet of things technology as an essential factor of growth. US National Intelligence Council added the internet of things technology to their list of Six Disruptive Civil Technologies in 2008 (Taylor 2008). The mass usage and popularity of Internet-based smart devices assist in the growth of intent of things technology. Although, the first use of internet of things technology was found in1980s in Coca-Cola machine which was situated in Carnegie Melon Universi ty. Local programmers connect the device to the internet which allows them to check whether the drink is available and cold, before making their trip to the machine (Smith 2015). In modern times, the internet of things technology is used in appliances and wearable, with due to their popularity, more companies are using them in their products. Siriram (2011) provided that convergence means integration of different technologies into single computer network structure; it can also be defined as coming together of communications, computing and broadcasting technology into a single connection to the network infrastructure. The future of internet of things technology can be described as the integration of real-world infrastructure with devices which are connected to the internet-based system. The internet of things technology assists in the convenience of the people by improving the efficiency, accuracy, and usability of devices. In the development of new IP protocol IPv6 eliminate the limit of 4.3 billion addresses to trillions upon trillion, it increases the number of devices connected to the internet from 32 bits to 128 bits (Carpenter et al. 2015). The reduction in the cost of hardware, inexpensive high-speed internet accessibility, cloud service, increased capability of sensors and IPv6 allow more consumer devices to connec t to the internet and improve the convergence and convenience in modern methods. There have been several cases of success and failure of the internet of things technology. Currently, the internet of things technology is prevalent in cloud-based and wearable technology, but it will be widespread in different devices by 2025. As per Kiritsis (2011), the devices use by individuals such as car, headphones, lamps, washing machine, refrigerator, coffee machines, smartphones, wearable products, kitchen appliances and almost every other device will be connected to the internet to share and collect information from other devices. There have been many cases of IoT failure, for example, Target has one of the worst security breaches due to using IoT technology. The company was using HVAC contractor for granting trusted access to their heating and cooling systems, the hacker uses the credentials and installed a credit card skimming software on the sales devices, which causes a data breach. In 2013 cybercriminals were able to hack thousands of IoT refrigerators by using defaul t passwords. The refrigerators was connected to a single network with allowing then access to a large number of devices. They use such devices to send thousands of spam emails to the users (Gubbi et al. 2013). There have been various cases in which IoT was a success, especially in home security market IoT devices has dominated the industry. Security devices such as Ring, SimpliSafe, and DropCam improve the security of houses and provide various other benefits to the users. Many companies are using IoT technology in benefiting consumers, for example, while going to a meeting, a persons car will be able to collect information from the calendar to know the timing of meeting and it can provide the best route to take. While stuck in traffic, a car can send a text to other party stating the approx. The time it will take to get at the location of the meeting. The alarm clock can notify the coffee maker to start brewing coffee once a person turns off his/her alarm. In a business environment, the office equipment knew when the inventory is running low, and it can automatically reorder it. Philips Hue is one of the most popular IoT devices, it allows users to change the colour of their lights with j ust one click, and they can also turn it on or off. Ninja Block adds may sensors to the house which tracks things such as water pipe burst and any motion inside the home; it automatically sends a notification to the users regarding the same. HarvestGreek is an IoT application that saves peoples time by feeding and watering plants based upon their actual growing requirements; it is an automating device which improves the growth of plants without any human interaction (Bandyopadhyay and Sen 2011). As per Miorandi et al. (2012), in case of infrastructure management, the IoT technology can benefit by controlling the operations of bridges, railway tracks, and roads in urban and rural areas. The IoT devices can monitor the process and report any change in the situation which can compromise the security of operation and increase risk in the procedure.A significant portion of the internet of things products are developed for the consumer use. Companies such as Bosch, IBM, Dell, Amazon Web Services, ATT, and Cisco, are making IoT consumer gadgets which include smart wearable, medical gadgets, connected cars, home automation, and smart appliances such as refrigerator, washer, and ovens which are connected through Wi-Fi network. In the manufacturing sector, the IoT technology assists the companies, such as Airware, Sigfox, and MetroMile, in automating the manufacturing equipment, assets, and the procedure. According to Atzori, Lera, and Morabito (2010), the corporations can monitor the practices in real-time which improve the security of the processes. Digital control system assists in automating the overall operation of manufacturing via predictive maintenance, arithmetical assessment, and measurements to maximize dependability of devices. The integration of smart grid can enable real-time power optimisation, evaluation of work, automatic controlling and safety management. As per the research of Daugherty et al. (2016), the development of IoT technology in manufacturing industry will generate more than $12 trillion of worldwide GDP by 2030. In the agriculture sector, wireless sensor can be integrated into the devices which provide necessary information such as temperature, wind speed, soil nutrition, humidi ty, and pest infection to the farmers which can assist in the improvement of the quality and quantity of the crops by reducing risk and wastage. Innovations in the internet of things technology are advancing industries such as military, medical, business, supply chain, education and smart cities. As per Khoo (2011), with the immense advantages provided by the internet of things technology to individuals and society, there are several privacy issues and threats from proponents of cybercrimes. According to Weber (2010), the cybercriminals can use lack of proper security guidelines and weaknesses of the operating system to access the sensitive data of corporations and individuals which imposes a significant risk of their privacy. The threat of internet of things technology includes data security, lack of global standards, analytics complexity, and cyber-attacks. The right of privacy is significant for individuals, as conflict always occurs between modern technology and privacy of users in the industry. With the popularity of social media sites, the risk of privacy exposure has become a considerable threat to many peoples. Caron et al. (2015) conducted a study in Australian context which provided that the privacy regulations in Australia are not adequate to protect the private data of internet of things technology. As per Roman, Zhou, and Lopez (2013), in IoT technology, the sensors in devices collect a significant amount of data naturally which is unrelated to their primary purpose, and such information is distributed to other devices without the requirement of an individual to activate the sensor each time. In past few years, the automation and driverless technology have increased in the automotive industry, companies such as Tesla, Google, Apple, and Uber are testing and producing self-driving cars (Gibbs 2017). The driverless vehicles, such as Tesla Model S, Lexus GS 450h and Audi RS 7, can perform ordinary driving actions such as back from the garage, parallel parking, analysing the road for potential accidental risk and even making call or messages through phones. All these features maximise the users driving pleasure and improve safety while driving, but these functions are not without any flaws. The awareness regarding cybersecurity is rapidly increasing in the automotive industry. Firstly, the security flaw was found in Jeep Cherokee by Charlie Millar and Chris Valasek in 2015; the two experts provided that hackers can easily manipulate connected cars (Greenberg 2016). The cybercriminals can hack essential functions of the vehicle such as brakes or speed; they can apply changes t o the car while sitting miles away from the actual vehicle. Another risk of automated cars is that they are easier to unlock by hackers which makes them a potential target for theft. The connected car cybersecurity risks increase potential risk for individuals and public which reduces their global development. Safety, data confidentiality and lack of interoperability are among the primary risks which can reduce the development of intent of things technology. The lack of robust and modest resource crunching accessibility, complex safety mechanism cannot be embedded in the IoT devices which make them vulnerable towards cyber-attacks by hackers (Vermesan et al. 2011). The DDoS cyber-attack over IoT system is denial to sleep in which hackers target specific IoT devices and machines which are attached to limited power supply sources and access them repeatedly to drain their power (Zargar, Joshi and Tipper 2013). The attack of denial to sleep can threaten the functioning of IoT technology, and it causes data gaps. The cyberterrorist can target particular operating systems on which malware can be processed, which makes the weak operating system and low-security devices vulnerable towards the cyber-attacks. The security breaches conducted by hackers reduce the trust of the public from the IoT syst em, and it exposes its vulnerabilities which can adversity influence the customer's perception. The user of IoT technology might use low quality sensor and sell their data to large corporations. As per Kopetz (2011), the significant amount of data collected by IoT devices can become tradable as an asset; the consumers can sell their personal information to data aggregators, thus turning data into currency. Weber and Weber (2010) provided that the cybercriminals can install malware in IoT devices and control them for their unfair advantage which can be dangerous for the individual and public safety. There is lack of international law which applies to worldwide entities regarding the cyber-attacks, the privacy regulation of states are insufficient as the application of IoT technology is worldwide. The government finds it difficult to capture and punish the cybercriminals due to lack of proper regulations regarding their crimes. Laws and judicial interventions regarding the violation of privacy over the internet are ambiguous, and legislation regarding the security of public lags behind as the technology develops rapidly. The risks of IoT technology reduce its development worldwide; several theories can be applied by companies to ensure the security guideline in IoT devices. In case of DDoS attacks, the companies can use various software applications to protect themselves from the attack. The security site KrebsOnSecurity suffered a DDoS attack which delivers them staggering 620 gigabits per second network traffic; another French web host receives 1.1 terabits per second attack. The common username of hackers has been leaked by the research of Ankit Anubhav, who works with NewSky Security. The DDoS attack uses default passwords for IoT devices to hack and control thousands of devices, companies such as KrebsOnSecurity, now uses randomly generated passwords to avoid the attack of DDoS attacks. The random number generator machine provides various unique passwords to the businesses which they can use to protect the IoT devices, by using this method, IoT devices working on same networks will be protected from cyber-attack. Another theory that can be applied by companies to protect IoT devices of people from year attacks is Nudge Theory. According to Yang (2014), this theory focuses on changing the behaviour of individuals by nudging them towards better security decisions. For example, Facebook privacy nudge prevented users from unintentionally disclosing things which they might regret in future, such as a nasty comment or personal details. The users should continuously change their IoT devices passwords, and the passwords must be unique and difficult to ensure a high level of protection. The IoT devices should be continuously updated because companies can provide new security against malware in updates. The corporations and industry can apply various measures to protect the IoT technology from cybercriminals. As per Wortmann and Fluchter (2015), while decentralising the data, such as cloud service, procedure, gadgets and corporate bodies, it is necessary that such integration is systematic to provide s afety to the data. IoT technology requires real-time interoperability in the devices and security measures need to adapt and prevent data islands. Encryption of data is necessary while implementing an IoT technology while transmitting the data through different IoT gadgets it is necessary that such information is not leaked in the process. Suo et al. (2012) provided that encryption algorithm turns standard text into cipher text which makes it difficult for hackers to understand the data; it ensures the security of information while it transfers between different internets of things devices such as refrigerator, air conditioners, and lights. The encryption procedure is significantly crucial while using smart homes devices because these gadgets continuously send and receive information with each other, and breach in one device can compromise the security of the entire system. Another method is hash-based cryptography theory which uses a digital signature scheme to secure the data of users. This theory ensures that while sharing the information, IoT devices decide whether an application can be trusted or not. Therefore, the proper authentication credentials are required to enter by an application to connect and share with IoT gadgets. As per Vlacheas et al. (2013), there is a considerable lack of identity and access manag ement tools in authentication framework of IoT gateways. The implementation of global structures for authentication will be difficult to establish because solutions are created for the traditional environment, and they did not apply to the varied, heterogeneous and dispersed environment of IoT. Firewall or deep packet inspection theory is required to be embedded in the IoT devices because they have unique protocols which are different from enterprise IT protocols. According to Ning, Liu, and Yang (2013), these protocols assist in recognising malicious payloads which are hidden in non-IT protocols. The Intrusion Prevention System (IPS) is a risk prevention application that examines the flow of network traffic; the examination assists in detection and prevention of vulnerability exploits. The firewall and IPS technology should be embedded in the IoT devices for filtering the network traffic to make optimal use of resources. Secure booting theory is also required in IoT devices by using cryptographically generated digital signatures; these signatures improve the integrity and authenticity of software. The strict regulation of government is also necessary to ensure that proper security measures are taken by companies while creating IoT products. These measures will reduce the r isk of IoT technology and improve its usability for the users. Conclusion In conclusion, the internet of things technology brings various benefits to the convergence and convenience, the efficiency and accuracy of devices increased by using IoT technology. These devices share and collect information with each other to improve their usability, the convergence of technology increase the function of devices which enhance the experience of the user. The IoT can be used in building appliances, automobiles, security devices and smart cities. The use of IoT technology can improve the procedure of various devices, but along with benefits, there are several disadvantages of IoT technology as well. There are several potential risks in IoT technology such as cybersecurity issues, breach of security, data theft, lack of information protocols, and high level of complexity. The companies can implement various security theories to reduce the impact of risk in IoT technology such as using secure booting, firewalls, updates, encryption, and authentication. With proper secu rity measures, IoT technology will provide various benefits to companies are individuals and transform multiple industries and their procedures. References Atzori, L., Iera, A. and Morabito, G., 2010. The internet of things: A survey.Computer networks,54(15), pp.2787-2805. Bandyopadhyay, D. and Sen, J., 2011. Internet of things: Applications and challenges in technology and standardization.Wireless Personal Communications,58(1), pp.49-69. Caron, X., Bosua, R., Maynard, S.B. and Ahmad, A., 2016. The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective.Computer Law Security Review,32(1), pp.4-15. Carpenter, B., Chown, T., Gont, F., Jiang, S., Petrescu, A. and Yourtchenko, A., 2015.Analysis of the 64-bit Boundary in IPv6 Addressing(No. RFC 7421). Daugherty, P., Banerjee, P., Negm, W. and Alter, A.E., 2015. Driving unconventional growth through the industrial internet of things.Accenture (https://www. accenture. com/us-en/_acnmedia/Accenture/next-gen/reassembling-industry/pdf/Accenture-Driving-Unconventional-Growth-through-IIoT. pdf Downloaded 15 July 2016). Gartner., 2015. Gartner Says By 2020, a Quarter Billion Connected Vehicles Will Enable New In-Vehicle Services and Automated Driving Capabilities. Gartner. Retrieved form https://www.gartner.com/newsroom/id/2970017 Gibbs, S., 2017. Samsung self-driving cars take fight to Apple, Uber and Google's Waymo. The Guardian. Retrieved from https://www.theguardian.com/technology/2017/may/02/samsung-self-driving-car-challenge-google-waymo-apple-uber Greenberg, A., 2016. THE JEEP HACKERS ARE BACK TO PROVE CAR HACKING CAN GET MUCH WORSE. Wired. Retrieved from https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/ Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions.Future generation computer systems,29(7), pp.1645-1660. Khoo, B., 2011, October. RFID as an enabler of the internet of things: issues of security and privacy. InInternet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing(pp. 709-712). IEEE. Kiritsis, D., 2011. Closed-loop PLM for intelligent products in the era of the Internet of things.Computer-Aided Design,43(5), pp.479-501. Kopetz, H., 2011. Internet of things. InReal-time systems(pp. 307-323). Springer US. Maney, K., 2015. MEET KEVIN ASHTON, FATHER OF THE INTERNET OF THINGS. Newsweek. Retrieved from https://www.newsweek.com/2015/03/06/meet-kevin-ashton-father-internet-things-308763.html Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I., 2012. Internet of things: Vision, applications and research challenges.Ad Hoc Networks,10(7), pp.1497-1516. Ning, H., Liu, H. and Yang, L.T., 2013. Cyberentity security in the internet of things.Computer,46(4), pp.46-53. Press, G., 2014. A Very Short History Of The Internet Of Things. Forbes. Retrieved from https://www.forbes.com/sites/gilpress/2014/06/18/a-very-short-history-of-the-internet-of-things/#26a687c910de Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and privacy in distributed internet of things.Computer Networks,57(10), pp.2266-2279. Siriram, R., 2011. Convergence of technologies.South African Journal of Industrial Engineering,22(1), pp.13-27. Smith, G., 2015. From 1982 Coca-Cola vending machine to latest trend: What the Internet of Things means for business. Real Business. Retrieved from https://realbusiness.co.uk/tech-and-innovation/2015/07/15/from-1982-coca-cola-vending-machine-to-latest-trend-what-the-internet-of-things-means-for-business/ Suo, H., Wan, J., Zou, C. and Liu, J., 2012, March. Security in the internet of things: a review. InComputer Science and Electronics Engineering (ICCSEE), 2012 international conference on(Vol. 3, pp. 648-651). IEEE. Taylor, D., 2008. The World in 2025, According to the National Intelligence Council. Old-Thinker News. Retrieved from https://www.oldthinkernews.com/2008/06/26/the-world-in-2025-according-to-the-national-intelligence-council/ Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., Jubert, I.S., Mazura, M., Harrison, M., Eisenhauer, M. and Doody, P., 2011. Internet of things strategic research roadmap.Internet of Things-Global Technological and Societal Trends,1, pp.9-52. Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Foteinos, V., Poulios, G., Demestichas, P., Somov, A., Biswas, A.R. and Moessner, K., 2013. Enabling smart cities through a cognitive management framework for the internet of things.IEEE communications magazine,51(6), pp.102-111. Weber, R.H. and Weber, R., 2010.Internet of things(Vol. 12). New York, NY, USA:: Springer. Weber, R.H., 2010. Internet of ThingsNew security and privacy challenges.Computer law security review,26(1), pp.23-30. Xia, F., Yang, L.T., Wang, L. and Vinel, A., 2012. Internet of things.International Journal of Communication Systems,25(9), p.1101. Yang, S.H., 2014. Internet of things. InWireless Sensor Networks(pp. 247-261). Springer London. Zargar, S.T., Joshi, J. and Tipper, D., 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks.IEEE communications surveys tutorials,15(4), pp.2046-2069.

Monday, December 2, 2019

Yachts Australia Economic Problems

Introduction Background Yachts Australia operates a small fleet of charter yachts in Australia. The business operates in the Great Barrier Reef on the coast of Queensland, with eleven members of staff. It has several sailing boats with varying number of Berths. The business employs temporary employees and backpackers to handle consumer demand during peak seasons and to deal with excess capacity requirements.Advertising We will write a custom essay sample on Yachts Australia Economic Problems specifically for you for only $16.05 $11/page Learn More A number of problems with the existing business systems are stifling expansion prospects. In addition to the primary business of charter yachts, the business also refurbishes yachts and sailboats for resale, and issues franchise agreements to people interested in the yacht charter business across Australia’s waters. This report relates to the exploration of the feasibility of a new system that should han dle the challenges of Yacht Australia. Current Problems The main challenges that Yachts Australia needs to deal with come from the rapid growth that the company has seen in the last few years. It has been expanding operations without expanding the systems supporting the expansion. These problems include information security, human resource management, managing reservations currently characterised by double booking, and managing the commercial aspects of franchises. The problem with information security is that the only computers used to store information do not have secure passwords. Both permanent and temporary employees have access to the information stored there. On the human resource side, the main challenge that the business faces is the high number of temporary staff it employs. They present a huge risk to the business system at several levels. Management of reservations has also been a big issue for the business because of overreliance on manual systems leading to eventualiti es like double booking. In addition to these problems, there is no formal information storage and retrieval system, which causes frustration among the staff. At a strategic level, there is no way of telling whether the business is growing at the same rate as the rest of the industry.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The Opportunities The opportunities that exist in the current business include expanding the business by improving the business system. With the desire to expand the business northwards to capture the market there, there is a clear business opportunity. The company can also benefit a lot by implementing IT based systems to enhance its capacity to handle the new opportunities Minimum System Requirements The system that yacht Australia needs should meet the following requirements. It must enhance information security while at the same time availing relevant informat ion to the members of staff that need it. The idea here is that the business needs to have a secure and efficient information management system. Secondly, it should assist the management with staffing decisions. This will address the current dangerous trend of using backpackers by helping to determine the optimum number of permanent employees required to run the business efficiently. The next requirement is that it should solve the reservation bottlenecks because this has a big impact on service provision, and hence profitability. Double bookings can result in lost business opportunities, or embarrassing lapses in service provision. The fourth element of the system requirements is that it should avail information to help with strategic planning. Technical Feasibility The question to answer while dealing with technical feasibility is whether it is possible to develop a system that can meet the design specifications. On the issue of information security, there are simple procedures su ch as using a system of passwords as opposed to one password. Other measures that can enhance information security such as multilevel passwords or passwords related to sections of the data. The issue of staffing depends on decisions taken after analysing data relating to the human resource management patterns. It is possible to collect that information by preparing appropriate data forms each time the company hires new people, especially the backpackers and those on contract. Dealing with the reservation issues can happen if the business uses an electronic reservation system. It can be a simple online electronic diary.Advertising We will write a custom essay sample on Yachts Australia Economic Problems specifically for you for only $16.05 $11/page Learn More In the area of strategic planning, it depends on information gleaned from sources, but related business decisions require thought. In this sense, a business system cannot make decisions but can faci litate the decisions. Economic Feasibility The economic feasibility of this project aims at establishing whether there will be sufficient economic benefits to justify pursuing the options. Investing in information security will reduce the chances of loosing vital information about business processes, opportunities and contacts because of espionage. Ease of access to information puts the business at the risk of losing vital business opportunities to competitors. Therefore, it makes economic sense to invest in information security. On the other hand, the information should be available to employees that need it for them to make good business decisions. On the issue of staffing, removing the existing bottlenecks will make it possible for the business to streamline its staff requirements by retaining the minimum number of employees required for profitable business. Fixing the problems with the reservation system will improve the capacity of the business to meet the financial objectives. It will be easier to schedule many more bookings compared to the current capacity. This is a desirable economic outcome. Finally, the capacity to make strategic decisions is desirable for any business because it assures long-term success. In an overall sense, these solutions will bring about more economic benefits compared to the costs. Organizational Feasibility Analysis of organisational feasibility aims at finding out whether the organization has the capacity to implement the proposed solutions. Yacht Australia has only nine employees without an established IT department. This means that the institutional capacity to handle this project is lacking. A situation like this one increases the project risks associated with handling the project internally. There are two options available to handle this situation. The first one is to develop capacity internally or secondly, to hire external contractors to develop the solutions. Developing capacity internally has better long-term results because it has the potential to keep down system administration costs.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More However, the lead-time is normally greater which may delay the project. On the other hand, using contractors increases the cost of the project especially if the contract includes a maintenance component. As the situation stands, the project lacks organizational feasibility. There are ways to deal with that, but it will be at a cost. Schedule Feasibility Managing a project schedule is one of the most challenging aspects of project management. The main issues to consider when looking at schedule feasibility include the opportunity cost related to a quick or a slow implementation of the solutions identified. In this case, a long implementation time will increase the likelihood of the business suffering the risks identified. However, a hasty implementation may also lead to the implementation of solutions that are not well developed. Considering that there are no external parties to this process such as regulators, the business should develop a schedule that addresses the concerns as soo n as possible. However, there is no crisis as such since the business has a working system in place. Depending on severity of the current bottlenecks, the project can work with any schedule that solves its most pressing problems first. The choices in the hands of Yacht Australia depend on the company’s priorities hence the feasibility of a schedule does not arise. Resource Feasibility There are two types of systems required to solve the problems at Yacht Australia. There are business process support systems and there are decision support systems. Implementing the decision support systems will require more than just IT applications. They will require greater resource outlay to handle. On the other hand, business process support systems such as the scheduling solution or data security require fewer resources hence they will need fewer resources. Therefore, they have greater resource feasibility. Secondly, the business has several income streams and appears to be in good financi al standing. It therefore means that the business can access the resources for this project. Considering that the business has only two computers, and four locations, it is necessary for it to invest in more computers to meet its emerging needs. In addition, the business will need to develop an IT department to cater for its business needs. For a start, a single person can take up IT duties alongside other duties, and later specialize as business expands. Reference List Kerzner, H 2009, Project Management: A Systems Approach to Planning, Scheduling and Controlling, 10th edn, John Wiley and Sons, Hoboken, NJ. This essay on Yachts Australia Economic Problems was written and submitted by user Yamilet Cervantes to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, November 27, 2019

Egg and Soda Dental Experiments

Egg and Soda Dental Experiments If you have a hard time getting your child to brush his teeth, it might be time to try the egg and soda experiment to explore the concept of dental health. In theory, a hard-boiled egg’s shell works similarly to the enamel on a child’s tooth. It’s there to protect the soft inside, or dentin, from damage. Unfortunately, some of our eating and drinking habits make it difficult for the enamel to protect our teeth from damage, and the egg and soda experiment demonstrates how our dietary choices can impact our bodies. What You Will Need This simple experiment doesnt need a lot of expensive supplies. In fact, they are affordable and youll likely have most of them already in your home. If not, you can easily find them at your local grocery store. 3 white-shelled hard-boiled eggssodadiet sodawatera toothbrush and toothpaste3 clear plastic cups Before the Egg and Soda Experiment Start by talking to your child about good dental hygiene practices and how important it is to brush their teeth every day, making sure to explain how certain foods, drinks, and activities can stain and damage teeth. You might also want to discuss how drinking a lot of acidic beverages can erode the outside of teeth. Ask your child to come up with a few types of drinks that might hurt their teeth. They might have answers like soda, coffee, or juice because of sugar and acid. You might also want to ask your child to think of drinks that might be better for their teeth. Most likely, theyll come up with something like milk and water. You can also ask your child if they think brushing after drinking some of the drinks that could hurt their teeth could reduce the risk of damage. Explain the Experiment Tell your child you have a way to find out what might happen if he left those drinks on his teeth overnight. Show him a hard-boiled egg and ask him how it reminds him of his teeth (a hard but thin outer shell and a soft inside). Take some time to ask your child what might happen to the egg if you leave it soaking in soda overnight, as compared to water. You might also consider different types of soda and if dark sodas, like colas, might have different effects on teeth than clear sodas, like lemon-lime sodas. Perform the Experiment Boil the eggs, making sure to have a few extra in case some of them crack while you boil them. A cracked shell will change the results of the experiment.Help your child fill each of the plastic cups, one with regular soda, one with diet soda, and one with water.Once the eggs have cooled, have your child put one in each cup and leave it overnight.Ask your child to check the eggs the next day. You may need to pour the liquid out of the cup to see how each egg has been affected. Most likely, the eggs in the cola have been stained by the liquid overnight.Discuss the changes you see in each egg and ask your child what they think happened. Then ask what they think you can do to â€Å"help† the eggs that have been immersed in soda get back to their original state (no stains).Give your child a toothbrush and some toothpaste to see if he can brush the stains off the eggshell. As a variation, you might also want to boil a few extra eggs and add cups with clear soda, orange juice, and coffee for comparison. Conclusions There are two main things you and your child can take away from this experiment. The first is that, as reported in the journal General Dentistry, the citric and phosphoric acid contained in soda has enormous potential to erode tooth enamel. In fact, one study reported that soda is 10 times more erosive than fruit juice in the first few minutes after drinking it. The second takeaway, and easier for your child to see, is that it takes more than just a couple of quick swipes of the toothbrush to get teeth clean. Try helping your child time to see how long it takes to brush the majority of the egg stains.

Saturday, November 23, 2019

current-traditional rhetoric - definition and examples

current-traditional rhetoric - definition and examples Definition Current-traditional rhetoric is a  disparaging term for the textbook-based methods of composition instruction popular in the U.S. during the first two-thirds of the 20th century. Robert J. Connors (see below) has suggested that a more neutral term, composition-rhetoric, be used instead. Sharon Crowley, professor of rhetoric and composition at Arizona State University,  has observed that current-traditional rhetoric is a direct descendant of the work of the British new rhetoricians. During the greater part of the 19th century, their texts constituted a fundamental part of rhetorical instruction in American colleges (The Methodical Memory: Invention in Current-Traditional Rhetoric, 1990). The expression current-traditional rhetoric was coined by Daniel Fogarty in  Roots for a New Rhetoric  (1959) and popularized by Richard Young in the late 1970s. See Examples and Observations below. Also see: Five-Paragraph EssayModels of CompositionModes of Discourse Composition, Composition-Rhetoric, and Composition Studies New Rhetoric Rhetoric Examples and Observations In The Principles of Rhetoric and Their Application (1878), the first and most popular of his six textbooks, [Adams Sherman] Hill emphasizes features that have come to be identified with current-traditional rhetoric: formal correctness, elegance of style, and the modes of discourse: description, narration, exposition, and argument. Persuasion, for Hill, becomes only a useful adjunct to argument, invention only a system of management in a rhetoric devoted to arrangement and style.(Kimberly Harrison, Contemporary Composition Studies. Greenwood, 1999) Characteristics of Current-Traditional RhetoricCurrent-traditional rhetoric is  characterized by its emphasis on the formal features of the finished product of composing. The current-traditional essay employs a rigorous movement from general to specific. It displays a thesis sentence or paragraph, three or more paragraphs of supporting examples or data, and a paragraph each of introduction and conclusion.(Sharown Crowley, Current-Traditi onal Rhetoric.  Encyclopedia of Rhetoric and Composition: Communication from Ancient Times to the Information Age, ed. by  Theresa Enos. Routledge, 1996) A Non-RhetoricDespite the name given it by historians,  current-traditional rhetoric is  not a rhetoric at all. Current-traditional textbooks display no interest in suiting discourses to the occasions for which they are composed. Rather, they collapse every composing occasion into an ideal in which authors, readers, and messages are alike undistinguished. What matters in current-traditional rhetoric is form. Current-traditional pedagogy forces students to repeatedly display their use of institutionally sanctioned forms. Failure to master the sanctioned forms signals some sort of character flaw such as laziness or inattention. . . .Current-traditional textbooks nearly always began with consideration of the smallest units of discourse: words and sentences. This suggests that their authors, and the teachers for whom they wrote, were anxious to correct two features of students discourse: usage and grammar.(Sharon Crowley, Literature and Composition: Not Separate but Certainly Unequa l.  Composition in the University: Historical and Polemical Essays.  University of Pittsburgh Press, 1998) A Convenient Whipping BoyCurrent-traditional rhetoric became the default term for the tradition of rhetoric that appeared specifically to inform the composition courses of the latter nineteenth century and the twentieth century up through the 1960s. . . . Current-traditional rhetoric as a term seemed to indicate both the outmoded nature and the continuing power of older textbook-based writing pedagogies. . . .Current-traditional rhetoric became a convenient whipping boy, the term of choice after 1985 for describing whatever in nineteenth- and twentieth-century rhetorical or pedagogical history any given author found wanting. Got a contemporary problem? Blame it on current-traditional rhetoric. . . .What we have reified as a unified current-traditional rhetoric is in reality, not a unified or an unchanging reality.(Robert J. Connors, Composition-Rhetoric. University of Pittsburgh Press, 1997)

Thursday, November 21, 2019

Labor Economics Essay Example | Topics and Well Written Essays - 1000 words - 2

Labor Economics - Essay Example However, the situation becomes quite altered when we compare it to the present day since those who could have been said to be living comfortably 50 years ago would today be considered as living below the poverty line. Brewer (2007) quotes John E. Schwarz who says: â€Å"In the early 1950s, fully two fifths of American households had no automobile, about a third did not have a private telephone or a television, and the homes of about a third of all Americans were dilapidated or were without running water or a private toilet and bath. Only a small minority of families enjoyed such basics as a mixer or had a hot-water heater (Brewer, 2007, Pg. 1)†. Thus, in comparison to the life lived in the 1950s, people living as a part of the middle class or even the lower classes today have a higher standard of living. In the 1950s, a person working full time at a middle class standard would have been able to afford to keep a family of four. Surprisingly, the same could be done today by an individual who is working at minimum wage but only if s/he is willing and able to give up ‘luxuries’ such as hot running water, an automobile and private toilets (Brewer, 2007). The situation and the comparison becomes more complicated when we consider the 1970s since it was a time where the country experienced a rising standard of living coupled. Automobiles, televisions and other items which were considered luxuries became more common but the nation experienced a falling standard of living towards the end of the decade. It thus became the beginning of the time where the family which had only one breadwinner could find itself in economic trouble and this prompted the rapid entry of women into the work field in large numbers (Gruber, 2005). However, political and economic forces such as the policies enacted by the government, the high levels of inflation, unemployment and low productivity growth are blamed for a lack of growth in real income in the

Tuesday, November 19, 2019

Practicum Learning Agreement Assignment Example | Topics and Well Written Essays - 250 words

Practicum Learning Agreement - Assignment Example Help student to under stand their professions this by motivating the students to solve most tasks and get new ideas of their professional activities through research, Help to solve emerging negative issues of different categories for example communities, groups and individuals. This is through the discussions exhibits where one gets to know the problems the society is facing; it helps create good relationships of different people at different levels. By understanding their way of reasoning, levels of work, their exposure to the new technology and their educational level, Enable one in exhibition. This will help curb the social problem through one on one insertion due to demonstration in discussion thus improving the society and find solutions to the problems faced due to more research and achieve the objectives. The knowledge that the student will get will enable the student to fit well in the marketing industry and to make him become successful in everything that he/she

Sunday, November 17, 2019

How to Write a Case Study Essay Example for Free

How to Write a Case Study Essay A case study example is a case study that is intended to be used as a model text or a reference guide for writers unfamiliar with how to write case studies. Case study examples may be distributed by professors, educational resource organizations, or professional writing services. The primary audience for a case study example is typically college pupils. Case study writing comes in two forms: annotated and un-annotated. An annotated case study example features notes in the margins and within the text itself that point to important elements of the form, style, and content of the case study. Annotated examples are particularly helpful for students who are unfamiliar with the case study genre in general, since they provide commentary explicitly noting the important elements of the genre. Un-annotated case study examples will not feature this commentary; the example viewer is intended to identify the important elements and conventions of the case study on his or her own. These examples are best viewed after a student is somewhat familiar with the genre or has already studied an annotated example. Whether using annotated or un-annotated case study examples, learners should pay particular attention to the ways in which the writer of the case study presents and analyzes information, as this is the primary objective of any case study. In a case study, a writer interprets, analyzes, and synthesizes data presented from a real or fictional situation or problem. For instance, in business school a student may be required to read about a particular business proposed advertising model and then, based on knowledge he or she has gained through his or her study of business and advertising, suggest the ways in which the company should execute its advertising campaigns. To do this effectively will require the student to work carefully with the provided information about the case and then draw on his or her creativity and knowledge reserves to propose a practical solution. When writing case studies, all proposed solutions must be bolstered by accepted techniques and theories within the students field. Students using case study examples should note how the example writer makes use of this external knowledge. Case study examples are intended to be model texts. As such, they are meant to provide students with a general idea of the common conventions of case study writing and are not meant to serve as templates. Students should study and use case study examples to determine the important elements of case study writing, but should ideally look at multiple examples to see how the case study form can be flexible depending on its particular objective and audience.

Thursday, November 14, 2019

The Importance of Being Human :: Philosophy Philosophical Essays

The Importance of Being Human ABSTRACT: In this paper I will defend a kind of human-centered perspective regarding ethical questions wherein the interests of humans and nonhumans alike are involved. Compared to other species, however, the idea that there is something special about being human is commonly vague. For example, it is unclear whether the thought is (1) being a human being is important in itself, or (2) it is important to be like a human being — that is, to have the capacities which a normal adult human being enjoys. I build my defense of human dignity on the claim that we regard a biological human being as a being of intrinsic importance, which is what (1) is about. However, I also consider the ethical implications of (2), which concerns the moral significance of personhood. I argue that the idea of a special intrinsic value of being a human is applicable only to cases where we deal with nonpersons. I claim that in spite of this qualification, we might defend a substantial principle of human di gnity founded upon this generalization. Traditionally in the West we regard the property of being a human as something morally significant. In what does this significance consist? Is membership in our species important in itself, or does the importance lie in having the properties that a normal grown-up human being has? I believe that this distinction is commonly neglected in discussions about a special human value or a human dignity. It is a distinction between the direct and indirect importance of a property. What I want to claim is that there is a way of arguing for the existence of a value which proceeds from the assumption that most of us believe that being human is something important per se. The advantage of founding the idea of a human dignity on this kind of reasoning is of course that it allows all human beings to have a share in this value. In the traditional view, however, it is not only important to regard all human beings as having a share in a special human value, it is normally important as well to regard all human beings as having this share to the same extent. Not only is it the case that human beings are more valuable than non-humans, all human beings are equally valuable. This second aspect of the importance of being human will be given no treatment here.

Tuesday, November 12, 2019

Earned value management Essay

What is meant by an integrative project management process and why is this so important? What are the pitfalls if such an approach is not taken? The main goal of the integrative project management process is to take a project and design it around the specific needs of a company. This process can sometimes force companies to change how they conduct business, who they advertise too and how they attract new customers. What makes the integrative project management so important to companies is success. When a company spends millions of dollars to implement a new strategy, they want to ensure things go smoothly, especially if they are changing the direction of their business. These projects can take a bit longer to complete because the project manager will have to take the time to get to know the company, and how the conduct business, but in the end a business is usually more successful if they use an integrative project management strategy. When companies don’t follow this stringy, and go with a generic project template it usually ends up wasting time, money and resources. The final project, even though it is complete won’t meet their needs and usually more money is spent on small adjustments to finalize the project. I see this at work all the time, now one ever looks at our computer system as a whole, and designs a plan around what we already have in place. This can become frustrating because we end up with three and four different networks, and none of them ever seem to work correctly. Why is the traditional project management approach less effective when project scope is not clearly understood? Provide examples to illustrate your points. Our text refers to the triple constraint of scope, schedule, and budget. It’s a triple constraint in the sense that variability on any one of the constraints affects the other two. Effective project management must maintain scope, schedule and budget in a relative equilibrium or balance. That is, scope change, either to expand or contract it, will by necessity affect schedule and budget. For example, if an organization wants to make more narrow the scope of a project that is underway, it should require fewer resources and/or less time to accomplish. On the other hand, if the organization wants to expand the scope, it will have a direct effect on resources and schedule in that it will require more resources to finish on schedule, or the schedule will have to slip to accommodate finite resources spread across more project tasks. If project scope is poorly or improperly defined at project initiation, the schedule and budget will also be less valid because of the triple constraint nature of scope, schedule, and budget. Later in the project management timeline when additional requirements may expand the scope, schedule and budget will be impacted. For example, when a former employer was planning a new downtown office building as a company headquarters, they expanded the scope of the project to include a retail shopping and restaurant area. This necessitated arrangements with the city government to expand an adjacent public parking structure and allow a below-street-level tunnel between the building and the parking structure. This scope change resulted in a six-month schedule slip and required additional resources. Wk1 summary (Monday) Typical first week; rather steep curve as the learning teams form, I get into a â€Å"battle rhythm† so I can meet my individual and team requirements, and I figure out what software/tools I need to get the work done. This is only my second online course, and I am reminded that one of the advantages of being a ground student in a particular cohort is that the learning teams stay more or less intact from one course to the next, and we can really hit the ground running. Online is a different dynamic. Reading load is okay so far; I have some familiarity with the material since I have been working in a project environment for some time now.

Sunday, November 10, 2019

Leadership Challenges at Coastal Bank Essay

Coastal Bank is a large bank in a southeastern city. As a part of a comprehensive internal management study, senior vice president, Harris Meade, examined the turnover, absenteeism, and productivity figures of all work groups in the organization. The results Meade obtained contained no real surprises except in the case of the check-sorting and data-processing departments. In general the departments displaying high turnover and absenteeism rates, such as the clerical department had low production figures, and those with low turnover and absenteeism were highly productive. No surprise there. When analysis began on the check-sorting and data-processing figures, however, Meade discovered that both departments were tied for the lead for the lowest turnover and absenteeism figures. What was surprising was that the check-sorting department ranked first as the most productive unit, whereas the electronic data-processing department ranked last. That inconsistency was further complicated by the fact that the working conditions for check-sorting employees are extremely undesirable. They work in a large open room that is hot in the summer and cold in the winter. They work alone and operate high-speed check-sorting machines requiring a high degree of accuracy and concentration. There is little chance for interaction because they all take rotating coffee breaks. The computer room is air-conditioned, with a stable temperature year round; it has perfect lighting and is extremely quiet and comfortable. It was known that both groups are highly cohesive and that the workers generally function well with others in their department. This observation was reinforced by the study’s finding of the low levels of turnover and absenteeism in both departments. In an effort to understand what was happening, Meade decided to interview the members of both departments. Meade hoped to gain some insight into the dynamics of each group’s behavior. It was discovered that the check-sorting department displayed a great deal of loyalty to the company. Most of the group was unskilled or semiskilled workers; although they have no organized union, each person felt that the company had made special efforts to keep their wages and benefits in line with unionized operations. They knew that their work required team effort and were committed to high performance. A quite different situation existed in the data-processing department. Although the workers liked their fellow employees, there was a uniform feeling among this highly skilled group that management placed more emphasis on production than on staff units. It was their contention that pay increases had been better for operating departments and that the gap between the wage earners and salaried employees did not reflect the skill differences. Because of that, a large percentage of the group displayed little loyalty toward the company, even though they were very close among themselves. There is some degree of urgency to improve productivity. A major competitor in the region is increasing its market share, while Coastal Bank’s market share is trending downward in the last two quarters. You are Harris Meade and you are tasked with improving productivity throughout the bank. Case Study Analysis Assignment Requirements Your 1,200-1,700-word analysis of the Coastal Bank case should demonstrate the application the various leadership approaches, principles, and theories discussed during the course to create a solution to the dilemma. Your solution must refer to and cite the information covered in the textbook. Your analysis of the case should include the following: 1. Problem statement 2. Key facts 3. View point analysis: †¢Who are the key participants in this problem? State their viewpoint of the problem 4. Solution(s): †¢How does the course content support acting on this issue? †¢What are the challenges and benefits (individual, organizational) to the proposed solution? †¢Based on the course content, who should be involved and why? †¢How do you decide on the best course of action? †¢What is the best method to make the decision? †¢How do you implement any change that may be needed? Evaluation of the case study will be based on the following criteria: †¢ Clarity and organization of the possible solution. †¢ The solution demonstrates an application of the leadership approaches, principle and theories covered in the textbook. †¢ The solution demonstrates the synthesis of additional relevant and credible leadership resources. †¢ Adherence to appropriate use of writing conventions, coherence and adherence to APA standards.

Thursday, November 7, 2019

Free Essays on DRAM

INTRODUCTION Three years ago, there wasn't much to say about sytem RAM. Almost all PCs came with fast page mode (FPM) DRAM, which ran at speeds between 100ns and 80ns. However, escalating CPU and motherboard bus speeds outstripped the ability of FPM DRAM to deliver data in a timely manner. Nowadays there are a lot of different memory designs. Due to cost considerations, all but the very high-end (and very expensive) computers have utilized DRAM for main memory. Originally, these were asynchronous, single-bank designs because the processors were relatively slow. Most recently, synchronous interfaces have been produced with many advanced features. Though these high-performance DRAMs have been available for only a few years, it is apparent that they will soon be replaced by at least one of the protocol-based designs, such as SyncLink or the DRDRAM design from Rambus, Inc. and Intel. RANDOM ACCESS MEMEORY Random access memory (RAM) is the best known form of computer memory. RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell. The opposite of RAM is serial access memory (SAM). SAM stores data as a series of memory cells that can only be accessed sequentially (like a cassette tape). If the data is not in the current location, each memory cell is checked until the needed data is found. SAM works very well for memory buffers, where the data is normally stored in the order in which it will be used (a good example is the texture buffer memory on a video card). RAM data, on the other hand, can be accessed in any order. RAM BASICS Similar to a microprocessor, a memory chip is an integrated circuit (IC) made of millions of transistors and capacitors. In the most common form of computer memory, dynamic random access memory (DRAM), a transistor and a capacitor are paired to create a memory cell, which represents a single bit of data. The... Free Essays on DRAM Free Essays on DRAM INTRODUCTION Three years ago, there wasn't much to say about sytem RAM. Almost all PCs came with fast page mode (FPM) DRAM, which ran at speeds between 100ns and 80ns. However, escalating CPU and motherboard bus speeds outstripped the ability of FPM DRAM to deliver data in a timely manner. Nowadays there are a lot of different memory designs. Due to cost considerations, all but the very high-end (and very expensive) computers have utilized DRAM for main memory. Originally, these were asynchronous, single-bank designs because the processors were relatively slow. Most recently, synchronous interfaces have been produced with many advanced features. Though these high-performance DRAMs have been available for only a few years, it is apparent that they will soon be replaced by at least one of the protocol-based designs, such as SyncLink or the DRDRAM design from Rambus, Inc. and Intel. RANDOM ACCESS MEMEORY Random access memory (RAM) is the best known form of computer memory. RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell. The opposite of RAM is serial access memory (SAM). SAM stores data as a series of memory cells that can only be accessed sequentially (like a cassette tape). If the data is not in the current location, each memory cell is checked until the needed data is found. SAM works very well for memory buffers, where the data is normally stored in the order in which it will be used (a good example is the texture buffer memory on a video card). RAM data, on the other hand, can be accessed in any order. RAM BASICS Similar to a microprocessor, a memory chip is an integrated circuit (IC) made of millions of transistors and capacitors. In the most common form of computer memory, dynamic random access memory (DRAM), a transistor and a capacitor are paired to create a memory cell, which represents a single bit of data. The...

Tuesday, November 5, 2019

Platinum Facts on the Periodic Table of the Elements

Platinum Facts on the Periodic Table of the Elements Platinum is a transition metal that is highly valued for jewelry and alloys. Here are interesting facts about this element. Platinum Basic Facts Atomic Number: 78 Symbol: Pt Atomic Weight: 195.08 Discovery Its difficult to assign credit for the discovery. Ulloa 1735 (in South America), Wood in 1741, Julius Scaliger in 1735 (Italy) all can make claims. Platinum was used in relatively pure form by the pre-Columbian Indians. Electron Configuration: [Xe] 4f14 5d9 6s1 Word Origin: from the Spanish word platina, meaning little silver Isotopes Six stable isotopes of platinum occur in nature (190, 192, 194, 195, 196, 198). Information on three additional radioisotopes is available (191, 193, 197). Properties Platinum has a melting point of 1772 Â °C, the boiling point of 3827 /- 100 Â °C, the specific gravity of 21.45 (20 Â °C), with a valence of 1, 2, 3, or 4. Platinum is a ductile and malleable silvery-white metal. It does not oxidize in air at any temperature, although it is corroded by cyanides, halogens, sulfur, and caustic alkalis. Platinum does not dissolve in hydrochloric or nitric acid but will dissolve when the two acids are mixed to form aqua regia. Uses Platinum is used in jewelry, wire, to make crucibles and vessels for laboratory work, electrical contacts, thermocouples, for coating items that must be exposed to high temperatures for long periods of time or must resist corrosion, and in dentistry. Platinum-cobalt alloys have interesting magnetic properties. Platinum absorbs large amounts of hydrogen at room temperature, yielding it at red heat. The metal is often used as a catalyst. The platinum wire will glow red-hot in the vapor of methanol, where it acts as a catalyst, converting it to formaldehyde. Hydrogen and oxygen will explode in the presence of platinum. Sources Platinum occurs in native form, usually with small amounts of other metals belonging to the same group (osmium, iridium, ruthenium, palladium, and rhodium). Another source of the metal is sperrylite (PtAs2). Element Classification Transition Metal Platinum Physical Data Density (g/cc): 21.45 Melting Point (K): 2045 Boiling Point (K): 4100 Appearance: very heavy, soft, silvery-white metal Atomic Radius (pm): 139 Atomic Volume (cc/mol): 9.10 Covalent Radius (pm): 130 Ionic Radius: 65 (4e) 80 (2e) Specific Heat (20Â °C J/g mol): 0.133 Fusion Heat (kJ/mol): 21.76 Evaporation Heat (kJ/mol): ~470 Debye Temperature (K): 230.00 Pauling Negativity Number: 2.28 First Ionizing Energy (kJ/mol): 868.1 Oxidation States: 4, 2, 0 Lattice Structure: Face-Centered Cubic Lattice Constant (Ã…): 3.920 References Los Alamos National Laboratory (2001)Crescent Chemical Company (2001)Langes Handbook of Chemistry (1952)CRC Handbook of Chemistry Physics (18th Ed.)

Sunday, November 3, 2019

Corporal Punishment on School Research Paper Example | Topics and Well Written Essays - 1500 words

Corporal Punishment on School - Research Paper Example Corporal punishment induces fear in minds of many young people, which can eventually create harm to the physical growth of their brain. The plan to abolish corporal punishment came into implementation as from far as 1970s to 1980s. According to Human Rights Watch, pupils who are under the subject of corporal punishment are nearly a quarter a million. Alternatively, the U.S department did research by interviewing and the result they came up with illustrates that if pupils do not get corporal punishment, this is the commencement of their behavior rotting. Subsequently, education is a bit challenging, and that is why corporal punishment is still in operation. Maintenance of order is difficult too; therefore, corporal punishment is quick to be put in practice since some schools may be unable to train an alternative method of embossing punishment. In addition, corporal punishment is free, that is it does not need money to train teachers on how to administer punishment in school and so it is cost effective to use such kind of punishment. On contrary, medical society for the adolescents has put into documentation with the most prominent consequences that result from corporal punishment. On the aftermath is the name of the activator and that it includes hemorrhaging and whiplash. More so, corporal punishment did lead to decline on the family life by the forceful removal of pupils at schools by the parents. The Lowdown Hitherto, in the U.S, corporal punishment is still under ban in many of the facilities of juvenile correction, but on the contrary, public schools still exercise it. Supreme Court ruling did state that cruel punishment only protects animals that are in conviction and not the students who are in classroom confinement. Hence, there is the plea to lawmakers not to manipulate ban nationally, and this is evident in the paradox of a special students teacher in Mississippi. He did say that in order to teach a child who engages in fights is possible by not to hit , it is not done by hitting them. The effects of corporal punishment This punitive act inflicts pain because of slapping, hitting, and spanking of forcing the pupil to maintain comfortable position. A proposal Title A proposal for the research projects on how corporal punishment undergoes administration. Corporal punishment (CP) Corporal punishment is the induction of physical pain to a child, in order to rectify his/her behaviors so that he/she may grow in up right manner. Research questions How do teachers administer corporal punishment? How do children find it when under the punishment? What punishment do they prefer? Can corporal punishment cease? How do teachers administer corporal punishment in your school? How can a teacher administer punishment other than using a cane? Is it mandatory to cane a pupil in order to correct his/her behavior? Literature review In general, corporal punishment is good if it is put in administration, there is a need to revive it in order to get good reliable men and women at the end. Methodology Methods applied are questionnaire and interview. The results, after a thorough analysis, can be the submission to the ministry of education or the organization for human rights and the lawmakers. This can be done face to face or through email. Significance of the result Consequential result helps in the data analysis and the decision of whether to implement punishment or not. Time line The timeline for the above

Friday, November 1, 2019

Porter's Five forces model goes some way towards guiding managers how Essay

Porter's Five forces model goes some way towards guiding managers how to make capacity decisions under uncertain demand. Howev - Essay Example Porter’s Five Forces model, a strategic analysis tool, allows organisational leadership to examine consumer and supplier characteristics, market trends, and competitive activity to determine what market-related factors maintain the most probable characteristics to disrupt or otherwise impede strategic advancement. The PESTEL/SWOT template of evaluation allows a firm to examine its internal strengths and weaknesses, based on the tangible characteristics of the external market, including political, economic, and social forces relevant to the strategic plan and new business direction. An organisation cannot determine capacity without first understanding what dynamics of the internal and external market environment will demand either flexibility in operations or create some degree of resistance toward meeting a specific strategic goal. This report utilises data uncovered using Porter’s Five Forces model and PESTEL/SWOT to determine how a solar panel manufacturing company ca n assess new strategic commitments and ensure the organisation is aligned with market conditions to achieve profit success with key target markets. 2. Porter’s Five Forces Analysis There are five forces that influence or shape competition that include competitive rivalry, threat of new market entrants, the degree of substitute products on the market, as well as both supplier and consumer buying power on the market (Porter 2011). A solar panel manufacturing plant, in order to achieve a new strategic goal or market positioning strategy, must be concerned with establishment of a partnered and adaptive supply chain network (as one example) in order to achieve maximum business outputs. In this scenario, the plant management must examine whether the existing supply network is sufficient for adaptability to meet just-in-time demands (in a lean environment) or whether the supply partners are able to reduce their switching costs to defect to other high-profit-building buyers in the sa me industry. The framework of the Five Forces Analysis is to give the business a strategic snapshot of current, external market conditions so as to translate such findings into internal operational restructuring or human capital development (as two examples) necessary to achieve strategic results. Bennet and Rundle-Thiele (2004) remind the business world that the nature of today’s markets make it easy for competition to replicate existing products and services. The only feature of a business that cannot be replicated is the firm’s brand image (Nandan 2005; Bennet and Rundle-Thiele 2004). In the solar panel industry, products are largely homogenized, meaning that they have similar features, benefits, pricing and function that are easily replicated by competitors maintaining strong capital resources and manufacturing know-how. This is why, to this industry, the degree of competitive rivalry as well as consumer characteristics are so vital to establishing a strong competi tive edge. Porter (2011) iterates the importance of understanding the potential risks of buyer brand defection. In the solar panel industry, consumers have a great deal of buying power. This market is characterised by concentrated markets, where there are actually few buyers that maintain the majority of market share (Porter 2011). Further, solar

Wednesday, October 30, 2019

Aggregate planning in manufacturing and aggregate planning in services Assignment

Aggregate planning in manufacturing and aggregate planning in services - Assignment Example Companies dealing in manufacturing processes use a variety of strategies. The most common methods are the Level plans or the Chase strategies (Maropoulos, McKay & Bramall, 2002). The Chase method entails corresponding capacity and demand depending on the market situations. This method triggers a significant movement of human resource, increased costs associated with inventory carriage and labor union issues associated with human resource movement. This method ensures minimal inventory levels, saving large sums of money for the company. The Level method entails a constant production level, not dependent on the demand levels in the market. Companies that apply this method, therefore, maintain a constant employment rate. Organizations are, therefore, able to control inventory depending on market demand forecasts or future anticipations. Service provision does not involve tangible goods and, therefore, does not involve inventory accumulation. Organizations that provide services do not have the luxury of adjusting their "inventories" in periods of low or high demand. Therefore, services are regarded as fragile or consumables, whereby the services available but unused are regarded as wasted. A good example is in the transport industry, where companies offer bus services between destinations. An empty seat cannot be sold to another individual at a later period, and therefore considered as wasted. Aggregate planning is best suited for the manufacturing industry because organizations have the capability to create, hold and put up for sale stock at any period. On the other hand, aggregate planning in service provision varies significantly because services cannot be stocked. Both the capacity and the demand for service provision are difficult to assess and predict respectively. Labor is regarded as the most limiting factor in service

Sunday, October 27, 2019

Factors Affecting The Frequency Of Digital Oscilloscope Information Technology Essay

Factors Affecting The Frequency Of Digital Oscilloscope Information Technology Essay Oscilloscopes are measuring equipment which displays electric waveforms on a screen like a small Television.   An oscilloscope is known as CRO, DSO, scope or an O-scope. Its common usage is to observe wave shapes of signal. There are four sections in an oscilloscope: the vertical and horizontal controls trigger controls and finally the display screen (the screen consists of cathode ray tube).   The research on oscilloscope has been done through books, internet, magazines etc. Karl Braun was the inventor of oscilloscope in 1897 (http://inventors.about.com/od/bstartinventors/a/Karl_Braun.htm). The main sector oscilloscopes used in are engineering, medicine, telecommunications and science. In October 2010 Tektronix Inc manufacturer of oscilloscopes discovered that Series of digital and mixed signal oscilloscopes that now deliver 100 GS/s sampling rate performance. This enables lower noise along with increased data points on 5x oversampled 20 GHz acquisitions (http://www.prlog.org/11 013155-tektronix-raises-bar-for-oscilloscope-sampling-rates-signal-integrity.html) There are several numbers of oscilloscope e.g. digital, analogues, dual beam, mixed signal etc.   This reports main focus will be the design and operating principle of digital storage oscilloscope.   Firstly the report will look into how the oscilloscope works, and then it will follow on to how its designed and finally how to set it up. A digital oscilloscope is a measuring instrument that uses binary numbers which writes to samples of the voltage.   ADC (analogue to digital converter) is used to change the analogue data into digital data then it makes the signal digitally.   For it to be displayed in the screen its then converted back to analogue. A digital oscilloscope has its limitation to performing just like an analogue oscilloscope.   There is a limit to the frequency which it can work up to. The limits of frequency are affected by analog bandwidth front-end section which is known as -3 dB point  and sampling rate of the oscilloscope,  the samples is taken in regular breaks.   When the sample rate is high, the frequency increases on screen.  Ã‚   Factors affecting the frequency of digital oscilloscope: Bandwidth specification Oscilloscope sample rate Bandwidth specification The bandwidth specification determines the frequency range which the scope (oscilloscope) measures accurately in the display. As the frequency is increasing the oscilloscope accuracy decreases. The bandwidth is mainly defined as a drop of 3 decibels (dB) or sensitivity at lower frequency at 0.707. Bandwidth in Hz x rise time in seconds = 0.35. E.g. to resolve an oscilloscope pulses with the rise of 2 nanosecond would have a bandwidth of 700MHz. but for a digital oscilloscope the sampling rate would have to be ten times higher frequency to resolve. E.g. 10megasample/second would measure up to 1 megahertz of signals. Oscilloscope sample Rate The oscilloscope sampling rate indicates on digital oscilloscopes how many samples per second the analog to digital converter can gain. The quicker it can sample, the accurate the results are displayed for fast signal. The maximum sample rate is given by MS/s which is mega samples per second. The minimum sample rate might come in handy if you need to look at signals changing slowly. The sampling rate can be change by the controls (sec/div) on the oscilloscope. Digital storage oscilloscope The digital storage oscilloscope is of the three digital oscilloscopes but DSO is the conventional form of digital oscilloscope. Its screen is like a computer monitor or TV screen as it uses raster type screen. By using the raster screen its helps to display images that fill the whole screen and it may include text on the screen. (www.Radio-electronics.com). First you have to store the waveform in the digital format to get the raster type display on screen. As a result of storing the waveform form digitally it can be processed by the oscilloscope or by connecting to a computer. This enables a high degree of processing to be achieved, and the required display provided very easily and often with a very cheap processing platform. It also enables the waveform to be retained indefinitely, unlike the analogue scopes for which the waveform could only be stored for a very limited time. (www.Radio-electronics.com). The operation of the digital storage oscilloscope is pretty simple, The first stage the signal enters within the scope is the vertical amplifier where some analogue signal conditioning is undertaken to scale and position the waveform. Next this signal is applied to an analogue to digital converter (ADC). (www.Radio-electronics.com). The samples are taken at regular intervals. The sampling rate is important because it determines the resolution of the signal. The samples are taken in per second or MS/s (mega sample rate). All the samples are stored within is the oscilloscope as waveform points, and several samples of waveform make up a single waveform point. The overall waveform is stored as a waveform record and its start is governed by the trigger, its finish being determined by the horizontal time base time. (www.Radio-electronics.com). The digital storage oscilloscope is an in the digital format which means there is a signal processor. With having a signal processor it helps to process the signal in different ways, before it passes the display memory and the display. Digital storage oscilloscope www.doctronics.co.uk Controls of digital storage oscilloscope Screen this is where all the waveform signals are displayed by using the X axis and Y axis. www.photoshelter.com Switch to turn ON the oscilloscope and to turn OFF. X-Y control its used to display component characteristic curves. Its mainly used for output position. TV-separation it allows the display to be shown on TV system so it can compare signals different points. TIME / DIV by using this control V/t graph horizontal scale can be changed. Trigger controls it allows the oscilloscope display to be coordinated with the signal you want to look into. Intensity and focus this control is used to change the brightness of the scope by adjusting it. X-POS by using this control the whole V/t graph can be moved side to side. X-MAG horizontal scale of the V/t graph is increased by 10 times in the IN position. CAL outputs -the top terminal gives square wave at 0.2  V peak to peak but the lower terminal gives square wave of 2  V peak to peak at 50 Hz. Component tester A changing voltage is provided by the output socket to allow component characteristic curves to be displayed. Y-POS I and Y-POS II this control allows the resultant outcome to move up or down Invert when its invert the waveform signal on the screen is turned upside down. CH I and CH II inputs using the BNC plugs the signals are connected to the BNC input socket. The smaller socket is called earth or ground. VOLTS / DIV independently the vertical scales for CH I and CH II can be adjusted. DC/AC/GND slide switches In the DC position, the signal input is connected directly to the Y-amplifier of the corresponding channel, CH I or CH II. In the AC position, a capacitor is connected into the signal pathway so that DC voltages are blocked and only changing AC signals are displayed (www.doctronics.co.uk) Trace selection switches settings of control switches for oscilloscope screen. How to set up an oscilloscope First you warm up the oscilloscope by switching it on. At this stage do not connect any input leads. Select the DC/AC/GND switch to DC (the Y-input) Select the X-Y/SWP to SWP (sweep) Put the trigger level to AUTO Select the trigger source to INT (the Y input, internal) Put 5V/cm at the Y-AMPLIFIER Put the TIMEBASE to 10ms/cm Select 1 or Cal for the time base VRIABLE control. to map out the middle of the screen adjust the Y-SHIFT (up/down) and X SHIFT (left/right) to brighten up the focus adjust the INTENSITY and FOCUS now the oscilloscope is ready to go http://www.kpsec.freeuk.com/cro.htm Digital storage oscilloscope Digital Phosphor Oscilloscope Bandwidths 100  MHz 200  MHz 500 MHz, 300 MHz, 100 MHz Sample rate 2  GS/s Real Time 5 GS/s Channels 2 or 4 Channels 2 or 4 Channels 8 Hours of Continuous Battery Operation with Two Batteries Installed, Hot Swappable for Virtually Unlimited Freedom from AC Line Power Full VGA Color LCD on all Models Optional Power Application Software offers the Broadest Range of Power Measurements at its Price Point Built-in Floppy Disk Drive for Easy Storage and Documentation Measurement Quickly Document and Analyze Measurement Results with OpenChoice ® Software or Integrated CompactFlash ® Mass Storage 21 Automatic Measurements Fast Fourier Transform FFT Standard on All Models FFT for Frequency and Harmonic Analysis Triggers Advanced Triggers to Quickly Capture the Event of Interest Advanced Triggers, such as, Glitch, Width, and Logic Traditional, Analog-style Knobs and Multilanguage User Interface for Easy Operation Multi-Language User Interface Quick Setup and Operation with Auto set Menu, Auto range, Waveform and Setup Memories, and Built-in, Context-sensitive Help Quick Menu User Interface Mode for Quick, Easy Operation Backlit Menu Buttons for High Visibility 9-bit Vertical Resolution 11 of the Most Critical Automatic Waveform Measurements Telecommunications Mask Testing (TMT) Centronics Port Standard on all Models for Quick, Convenient Hardcopies Extended Video Application Module Support for Active Probes, Differential Probes, and Current Probes that Provide Automatic Scaling and Units Digital Phosphor Oscilloscope http://infrared.als.lbl.gov/content/PDF/equipment/Tektronix_TDS3052_Data_Sheet.pdf Digital storage oscilloscope http://www2.tek.com/cmswpt/psdetails.lotr?ct=pscs=psuci=13304lc=EN

Friday, October 25, 2019

Vermeer :: essays research papers

Seventeenth-Century Art Writing Assignment  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Jan Vermeer’s career spread over a century of great change- in art, technology, and social customs. In art, subject matter ceased to be the most important component of great paintings. This allowed artists to discover how to appreciate and portray the sheer beauty of the world. One of the greatest of these masters was Jan Vermeer, born a generation after Rembrandt. Vermeer did not paint many pictures in his life, and few of them represent important scenes. Specializing in genre paintings (subjects of everyday life), he mainly painted ordinary figures engaged in ordinary tasks, such as a lady reading a letter or a young lady playing a lute. Yet what made these paintings such masterpieces was the way Vermeer achieved meticulous precision in the presentation of textures, light, and colors without the paintings ever looking unnatural or harsh.   Ã‚  Ã‚  Ã‚  Ã‚  In his life, Vermeer painted in two distinct styles: the first style (from 1653-1664) was characterized by brilliant use of color and an aggressive painting technique, whereas the second style was smoother and more refined with pale and softer colors. In other words, his style moved from one more characterized by a more masculine vigor to one of refined delicate subtlety. What remained throughout both styles was his exquisite combination of color and precision that harmonized figures and space.   Ã‚  Ã‚  Ã‚  Ã‚  Johannes Vermeer was born in Delft, Holland in 1632. As a youth he was apprenticed to Carl Fabritus and in 1653 he entered the Guild of Saint Luke of Delft wherein he became director. Although art was his main focus, he was also an innkeeper and kept a tavern in the Market Square. This area was a very rowdy place to live and work, and Vermeer apparently enjoyed painting as an escape from the crowded market and noisy tavern. Many historians are still uncertain as to where all his paintings went, but some say he was hired by Van Ruijven, a rich liberal protestant, who was the master of the Delft Charity Commissioners. Due to slow production, he suffered from financial difficulties despite his success in selling his works, and in 1675 at the age of 43 he died leaving his wife and eight children in abject poverty.   Ã‚  Ã‚  Ã‚  Ã‚  The Procuress was painted in 1656 and is a good example of Vermeer’s first style. This scene is painted with remarkable strength of color and light around the soldier and the woman who obviously hold center stage.

Thursday, October 24, 2019

The Presentation of Self in Everyday

In his book, The Presentation of Self in Everyday Life, Erving Goffman compares life to acting. He argues that â€Å"when the individual is in the immediate presence of others, his activity will have a promissory character† (Goffman 2). I think it is ironic because I always thought that movies or theaters have always tried to imitate reality and not the other way around. In order to clearly show his analogy, Goffman presents elements of acting such as the front. We are all familiar with the term front act.† In Goffman’s opinion, people are all playing an act. This is such a bold claim to make because he is saying that we are all just performing and not being our real selves, though there are some truths to his claim. What is confusing is when do we really act, or when do we be ourselves? Most of us would not acknowledge his belief that we are playing a character, but then again, the person that denies this may also just be playing a role, and so the question remai ns unanswered.One idea of Goffman that caught my attention is his theory that people cooperate in an act to cover, say, something embarrassing. I have experienced it myself—I would pretend that I have not witnessed someone undergo an embarrassing moment, although unconsciously, I was not trying to make that person feel the embarrassment more, but rather, I was just trying not to be mean.It did not occur to me that by pretending (and therefore joining in the scene, or rather excluding myself from the scene) not to see the embarrassing act, I have helped in saving that person’s face. What follows is an array of lectures, as it were, like that of a professor teaching a theater or film student, only that his lectures are philosophical and are related to our everyday lives. After reading Goffman’s work, I found myself smiling because of the truths in his analogies that never crossed my mind before.

Wednesday, October 23, 2019

Prepare Environments and Resources for use during healthcare activities Essay

1.1 When going into a call the first thing that should be done is to get all the materials that you need together in order to provide care. For example, if someone is bed ridden and you are changing their pad then you will need to get the clean pad, carrier bag, toilet roll, baby wipes, towel, cream if applicable and usually the slide sheet ready. By not having everything ready you will have to stop what you are doing and go and get things. The individual during this time is rolled on their side and no doubt in some discomfort and delaying the proceedings to go and get things only increases this discomfort. After providing care all materials should either be disposed of or put away ready for the next use. Any soiled clothing or bedding should be changed and put into the washing machine ready for the next wash. When preparing food all dirty dishes should be washed, dried and put away so that they are ready for the next use and all kitchen surfaces should be wiped clean. Any foods that have been opened should be stored correctly either in the cupboard or fridge so that they do not go off and can be used again. 1.2 It is important that team members work together in the management of the environment and resources. The carers who go into the homes and provide care need to be considerate not only of the individual but also of the next carer who is going into that call by leaving the environment ready for use. Care managers need to respond immediately to any problems to ensure that carers can continue with their work without delays. 1.3 Any problems with the environment should be investigated to the extent that no harm comes to the person doing the investigation. For example , if the problems are related to something such as gas, or electricity then the gas or electric board should be called immediately as interfering with this could cause harm. If the problem is something minimal such as changing a light bulb than this can be done as long as no harm can come to the person changing it. For example, if the light bulb can be reached whilst standing on the floor then it is safe to do so but if it requires step ladders or a chair then further assistance is required. All problems should be recorded in the care plan and reported to the care manager. 1.4 The impact of environmental changes on resources including their storage and use largely depends on the setting in which these resources are being used. For example,  in hospitals and nursing homes, there are specific storage rooms, refrigerators’ etc which are temperature controlled at all times and therefore do not specifically undergo environmental changes. However, in individual’s homes environmental changes have a greater impact as the impact as the ability to control certain factors such as storage is reduced. An example of this would be if pads were kept in a shed outside due to lack of storage space in the home. This would be fine in the summer months but once the temperature started to drop damp could set in making the pads wet and non-useable. Another example would be where certain medication was prescribed which needed to stored in the refrigerator. If it is not kept refrigerated it may not work as well as if it had been. OUTCOME 2 2.1 With regards to preparing environments, medical equipment, devices and resources for use during healthcare activities the health and safety measures relevant to the healthcare activity and environment are as follows: Wearing gloves, aprons and masks when necessary  Ensuring that there are no objects in the way which can cause harm, Ensuring all medical equipment, devices and resources are functioning correctly and if they are not report the problem and not use them. Ensuring the equipment, devices and resources are still relevant to the individual e.g. if eye drops were prescribed for use over 5 days are the still required. Ensuring that all equipment, devices and resources are to hand before starting the healthcare activity. 2.2 Gloves and aprons (where necessary) are worn during all calls involving personal care and food preparation. Different gloves should be used for personal care and food preparation to avoid cross contamination. Gloves and aprons should be disposed of at the end of each call. Hands should be washed on entering and leaving each call and after smoking and eating. Hair should be tied back if it is mid length or long. Tissues should be used if coughing or sneezing and disposed of and then hands should be washed. 2.3 The main conditions that affect individual comfort within the environment are warmth, lighting, food and cleanliness. With regards to warmth it is important to ask the individual whether they are comfortable especially in the winter months when the thermostat may need to be turned higher up. A change to the blankets on the bed will be  necessary according to the seasons and particularly in winter a blanket over them while they are sitting in the chair or a hot water bottle may be required. Lighting is more often than not unchangeable and it is important to ensure that light bulbs work. I do care for a lady who felt that the lighting in her front room was to bright so we brought lamps down from of the spare bedrooms to create a softer feel to the room which she is now pleased with. Food is extremely important in affecting individual comfort as we all need to eat and drink and we also like to have snacks to eat between meals or while watching TV. We can ensure that the fridge is stocked up with foods that the individual likes to eat and, if they have mobility problems, leave snacks out for them within easy reach. The same applies to drinks with regards to cleanliness, most people like to sit in a room or lie in bed in which the immediate surroundings are tidy and clean. 2.4 The main resource that I am personally responsible for are gloves and aprons. I can ensure that these are available in advance of planned healthcare activities by ensuring that I have a sufficient supply at all times with regards to essential resources within the individuals home I can ensure that these are available in advance by keeping my eye on stock levels and where levels are running low then advise either the individual, their family or the care manager that stocks need reordering. It is the duty of myself and my colleagues to report any shortages immediately. 2.5 Medical equipment, devices and resources should be checked before they are used each and every time they are used to ensure that no malfunction can harm the individual who is using them or on whom they are to used. Any defects should reported immediately to the care manager and the equipment not only used but put out of the way of the service user who may not understand or realise that there is a problem. If a defect is noted it is important to leave clear instructions for colleagues both in the care plan and also by putting a sign with the equipment, devise or resource so that it can be easily be seen. 2.6 Any problems with medical equipment, devices and resources would be immediately reported to my care manager who would then look into the matter. 2.7 Refer to 2.5 above. 2.8 Clinical governance is the term used to describe a systematic approach to maintaining and improving the quality of patient care within a health  system. Resources are prepared in line with clinical governance by following the standard codes of practice as described in unit 201- preparation to work – 1.1 and also unit 208 preparation to work -1.1. OUTCOME 3 3.1 It is important to ensure that the environments are ready for their next use as it ensures that the area has been left clean and tidy. It also ensures that the next carer who comes in to the call does not have to spend time cleaning up the environment before they can begin their work. For example, if an individual needs to use the commode desperately it is not acceptable for the carer to have to tidy up or move things out of the way that the previous carer left before the individual can use the commode. 3.2 The factors that influence the readiness of environments for use in healthcare activities are as follows: How the previous carer left the environment. How mobile the individual is. Whether the individual lives alone or with family. Whether supplies/equipment has been ordered and is there. 3.3 All equipment must be cleaned and stored correctly once they have been used so that the next colleague can use them straight away. For example, when giving someone a bed bath, the bowl used must be cleaned and rinsed and put back in the place it is stored. Flannels and towels must be put into the washing basket or directly into the machine ready to be washed. Razors must be rinsed and checked to ensure that any unsafe or worn blades are removed and disposed of. If clean blades are needed then these should be put on ready for use the next day. 3.4 Used, damaged or out-of-date items should be disposed of immediately. With regards to soiled pads and catheter bags these should be placed in a carrier bad and disposed of in the outside bin. Damaged items should be removed from the property as they can cause harm to the individual if they continue to be used (the individual may not be aware that something is damaged). Out-of-date items such as medication should be placed in the bin out of the service users sight/reach as the medication may have changed and out-of=date items are no longer in use. Taking the wrong medication can cause serious harm to an individual’s health. 3.5 Un-opened and surplus resources should be returned to the correct location for storage  so that they are not in the way. Leaving them lying around can be a hazard for an individual with regards to mobility, for example , boxes of pads left in the hallway . It also ensures that all opened items are used first. 3.6 It is important to monitor levels of consumable materials used in healthcare activities so that the individual does not run out of things which they need on a regular basis. Examples of things which need to be monitored are pads, creams, catheter bags. Whoever orders these supplies, such as the individual themselves, their family or the care manager, need to be advised in advance so that they can get the order in before supplies run out. 3.7 Consumable materials are replenished by either advising the individual, or their family (or whoever does this for them) what they need more of, or advising my care manager of the individuals requirements. This does not always happen of course. I care for a man who is bed ridden and we visit him four times a day. We use baby wipes when changing his pad in order to ensure that he is clean, however, he never has any wipes as his family don’t bother with him. The office has been informed on a number of occasions yet still the family do not provide what is needed. It is often the carers who will provide these as it make our job very difficult not having them especially when he only has one flannel which we use to wash his body in the morning. 3.8 All information is accurately recorded as specified in local protocols in the care plan. For example under the heading â€Å"household duties† I always state that the pad has been correctly disposed of. If additional supplies are needed I enter this in the â€Å"comments† box and state who I have advised.