Monday, September 30, 2019

Depictions of Death and Disease

The use of the word â€Å"plague† is reserved for only the most momentous and devastating diseases in history. This word has been specifically set aside for diseases that strike a certain type of fear into the masses as with the Bubonic Plague, also called the â€Å"Black Death†, and the AIDS epidemic. The word has an effect of biblical proportions and epidemics like AIDS and the Bubonic Plague both display the social reaction to these maladies in the religious connections or rejections made toward both.There is, also, evidence of the unraveling of complete societies due to these illnesses in the abandonment of the sufferers to their fates and the perpetuation of causation of these â€Å"plagues† to stories that confuse and confound communities into states of despair and disillusionment. The swiftness by which the â€Å"Black Death† struck victims to death is opposed to the lengthy period between the contraction of AIDS and a death that is not always certa in or imminent. The words and descriptions of these diseases, however, did spread quite quickly and served as a lens by which society at the respected times viewed the chaos in the world.The Bubonic Plague quickly sickened and killed its sufferers and this swiftness of the disease left little time for people to react, there was no predicting it‘s path, no preventions, and no remedies. People expected death and the â€Å"Black Death† struck the consciousnesses of the people before the illness ever did. â€Å"‘And no bells tolled’, wrote a chronicler of Siena ‘and nobody wept no matter what his loss because almost everyone expected death†¦. and people said and believed, This is the end of the world’† (Tuchman, 413).People also were cited as living joylessly, attending funerals with no tears and weddings with no cheer. With the feeling that this was indeed the end of the world, it was as if an ominous black cloud had accompanied this b lack plague, leaving much room for superstition and little for hysteria. There was little emotional and physical energy left for the afflicted communities to remain gripped in a hysterical frenzy for long periods when death became so commonplace. The feeling at the time was that an evil presence was surrounding the affected areas and this apocalyptic, creeping fear soon was replaced by emptiness.There was no sense in tending to religious ideas, as many people died without being given their rites of death. In this way, many of the positive ideas of God and heaven were abandoned, as the people’s sentiment was that God must have been responsible for attempting to exterminate the human race altogether. In the collective imaginations of religious persons all through the world, the â€Å"Black Death† was proof that the devil had won and God was no longer in support of the once devout.There was little mercy for the sick and parents were even found to abandon their own childre n to their fates. The callousness of the living was written about in such a way that existence during these times was made to seem like a hellish tribulation, those who did tend to their families and the sick however were made to seem like saints. There seemed to be these pious individuals, who were revered as the sober and saintly men at a time when â€Å"men and woman wandered around as if mad†¦.. because no one had any inclination to worry themselves about the future† (Tuchman, 417).The â€Å"Black Death† concept, then became a metaphor for the darkness, disorder, dementia, and despair that was part of the fear that the world was at it’s end and there was no future. The horror of both AIDS and the Bubonic Plague was fueled mostly by the uncertainty of each disease’s origin. Those in the â€Å"Black Death† era looked to astrology and employed adjectives that referred back to nature itself as the culprit. According to Tuchman, the plague was said to be spread by â€Å"sheets of fire†, â€Å"a vast rein of fire† and â€Å"foul blasts of wind†.The metaphors here were probably not so much intended to be metaphors, but instead were parts of folklore that spread just as the disease did. The uncertainty of it’s origin certainly led to wild imaginations and a need for storytelling to put the horror into words, however magnificent and impossible these Eastern stories were. With AIDS, just as with the Bubonic Plague, the idea was that this disease originated from somewhere else, it presented itself as both geographically transcending and personally transforming. In this sense both were socially viewed as an invasion of a community and of the bodies of the afflicted.The wording surrounding AIDS and the â€Å"Black Death† made these afflictions seem like a retribution, as well. With the Bubonic Plague, it was the poor that were looked upon as being the most at risk while AIDS had and continues to have it’s own risk groups. Though both diseases proved indiscriminate in it’s victims with the idea of disease as retribution, there must be scapegoats to cognitively connect this reality. Sontag believes that the way AIDS is portrayed â€Å"revives the archaic idea of a tainted community that illness has judged† (683).The scapegoats, however, are also the so-called â€Å"third world† countries of disease origin, such as AIDS. The same type of confusion and calamity surround the explanations of the origin of the disease. If it is not God’s wrath or some other supernatural event, then a more modern version of the â€Å"Black Death† stories can be found in the belief by some that AIDS was manufactured by man. This is truly the hallmark of AIDS as a modern â€Å"plague†, as the idea of the Bubonic Plague being manmade would not have been possible. This points to the collective imagination of those in fear of both disease and technology, a new phenomenon.Many Africans subscribe to the idea, according to Sontag, that AIDS was manufactured in the United States by the CIA proving their suspicion toward technology and the American government. Americans, conversely, look at the spread of AIDS as originating from a primitive place, where the spread of the disease cannot be stopped by American, conventional technology. In either sense, the fear is projected toward the disease from an origin of an already instilled cultural belief. For Americans it is that what is â€Å"foreign† that is dangerous and to Africans what is American and technological is alarming and suspicious.Sontag effectively explains the outcome of the plague metaphor in that no matter where a person resides geographically or what their beliefs may be as to the origin of what is deemed to be a plague, the malady becomes understood socially as inescapable. She does offer, however, the idea that Europeans tended to believe that they held some moral su periority over the origin of disease, condemning other countries for spreading disease, but failing to observe their own role in spreading disease to indigenous peoples during colonization.However, the diseases spread by Europeans were not viewed as plague-like or morally reprehensible. The idea that morality can be traced to disease and it’s afflictions is an interesting social phenomenon that equates â€Å"sick† with â€Å"dirty† or â€Å"immoral† and â€Å"healthy† with â€Å"moral†. â€Å"Health itself was eventually identified with these values, which were religious as well as mercantile, health being evidence or virtue as disease being evidence of depravity† (Sontag, 686).This is evidence of the cultural values of the early twentieth century, according to the author, in the fact that middle class values and religious observation was seen as a deterrent from disease. Those, who led a life of supposed depravity, however where view ed as not only more likely to become ill, but more deserving of their suffering. AIDS has been portrayed in such a moral sense, that homosexuality and it’s immorality to some is the blame for the â€Å"plague† and a deserved consequence.Sadly, the same callousness that was displayed in the abandonment of suffering children still occurs today in the social abandonment and outcasting of AIDS victims. According to Sontag, the disease metaphor is especially beneficial to anti-Liberals and those that which to address issues of supposed moral decay. Therefore, Conservative opportunists have laden the language associated with AIDS to further political aims. In conclusion both the Bubonic Plague and the AIDS epidemic illustrate the ability of communities and cultures to transmit feelings of fear and the value of many social institutions within the context of a disease spread.Religion, politics, and the accusations and scapegoating of disease origin and spread permeate the spec trum of the social scene when such a heavily laden word as â€Å"plague† is perpetuated. With the fast spread of the first â€Å"plague† the idea that the end of the world was near was common. With the slower spread of AIDS in the Western world, however, a fierce anti-foreign, pro-technology, and anti-Liberal stance has been taken. Just as these diseases can devastate, so can the words and the world as it can slip into disorder and darkness.

Sunday, September 29, 2019

Cross-Cultural Competency Essay

You have no choice about which culture programs you from birth. So don’t judge others because of their cultural differences from you. All complex societies (such as our own) contain subcultures that share the larger cultural outlook, but have significant differences. The culturally savvy Soldier will take an active interest in any culture he or she works in. ReALLIT: read, ask, look, listen, investigate, and think. Look for styles of interaction/proper behavior, greeting rituals, local dress, daily routines and movements, transportation, eating habits, treatment of children, major or common ceremonies and rituals, and frequencies of young men visible on the street. Soldiers who are not culturally savvy compromise the mission by alienating the locals, or even by creating major crises. All cultures impart huge amounts of information to their members—but often it is information of a different type than we focus on in our culture. Cultures vary greatly around the world. Any generalizations about culture have exceptions. Knowledge of the specific culture is necessary. Individual characteristics and personalities vary greatly within one culture. To attribute one characteristic to everybody in a culture is called stereotyping. Cultural relativism is critical for understanding the locals among whom you work, but some cultural differences, particularly regarding ethics, cannot be brushed aside. Things we hold to be fundamentally wrong—abrogation of human rights, for example—may require us to impose our outsiders’ ethical standards on locals’ behavior. Read materials from the TRADOC Culture Center (like Smartbooks and online trainings), published ethnographies, and popular media of the area; Ask locals already available to you on the FOB, such as interpreters, or culture experts around you, as well as people you meet on patrols; Look at the behavior of locals in markets, on the roads, in meetings on post; Listen to the conversa tions you have access to, as well as local media; Investigate in more depth any questions that come up; and Think about what you know and what you don’t yet know, and how you can find out what you don’t know. Often in non-Western society’s beliefs are not â€Å"beliefs† in the way we think of them and as such are more or less open to modification. Things that we would call beliefs are often thought of by other cultures as just the way things are – matters of fact, not opinion.  Religious belief systems in particular and other aspects of locals’ world view can be driving motivators for conflict; economics is not the only reason people fight. Power Systems In most cultures, any visible formal power structure will lie over a more fundamental, less formal, structure of influence. This underlying power system will often be based on patron-client relations, in which patrons become influential by acquiring clients who owe them favors. Often, this takes a pyramid form as more powerful patrons acquire clients who have clients of their own. Interacting directly with this patron-client power system can be more effective than trying to deal with people in overt formal positions of power. Kinship Kinship is usually much more of a cohesive social force in non-Western societies. Kin group members internalize a corporate identity – the family is viewed as an extension of the self. Often large, pyramid-shaped kin groups – usually descendants of one man (or, rarely, woman) and their dependents – serve to organize political, military, economic, and religious activities. City vs Country People in the city generally have much different ways of living and worldviews than people in the country. Adherence to rural customs may begin to slacken, groups of acquaintances and awareness of the outside world broaden, and people may become more tolerant of others’ beliefs. In the countryside, no matter how remote the region, there will probably be considerable awareness of the outside world, often from men travelling outside to work. Do not underestimate the importance of language in establishing good relations with locals. Taking the time to learn even basic greetings can make a huge difference in establishing rapport. Usually, you are starting at a disadvantage, seen as a stranger with a gun. Using greetings in their own tongue shows locals that you have enough respect for them to make an effort to speak in their language. Failure to communicate is often interpreted as hostility or at least a lack of interest. Learn some of the local language and avoid that misimpressi on. Knowing some of the local’s language can be invaluable in helping you determine if your interpreter is  doing his or her job well. Knowing the language can also give you insights into locals’ conversations, which they may presume you cannot understand. The language barrier is often used as a disguise of local intentions and a tool to maintain separation from outsiders—a sort of built-in everyday code. Switching languages in the course of conversation is known as code switching. In many regions of the world, most people can speak two or even three languages. Use of a second language in the context of a conversation often helps locals maintain ethnic or otherwise specialized identities during social interaction. Generally, use of a particular language in these code-switching contexts shows insider knowledge and positive sentiment toward the culture of the language used. If you use local phrases in your communication, it can send a signal that you value local culture and want to become an insider. Demonstrating that you want to speak the local language will be much more important than your degree of expertise. Impression Management World views can make you or the locals misinterpret behavior Enemy information operations (IO) tactics will strive to take advantage of this fact You need to be very clear and vocal as to why you undertake any action Seek feedback from those impacted by the action (stakeholders) Seek out local’s concepts about Army motivations Hostile IO efforts will seek to spread negative stereotypes of the Army. They may assert that we’re all greedy and looking for material gain, we are ignorant and hostile to all the locals, we are dirty, we are sexually promiscuous, we are excessively violence prone, we don’t really care about the locals, and so on. The best way to combat such stereotypes is to consistently show, by your actions, that they are inaccurate. Most important is the development of trust. Never promise something you are not sure you can deliver. Do everything you say you are going to do and follow up with the locals to be sure they know you did it. In a chaotic environment, be the element of consistency, truthfulness, and reliability. In short order, deception erodes relations with locals. Be aware of and help inform Army IO campaigns in your AO. Have talking points ready if locals argue with you, particularly when there is an audience. Redirect the conversation to local  cultural practices or, if necessary, break off contact once you have made your points, or if a local adversary gets the best of you. Be willing to admit to yourself when this is happening. Though you want to be as conversational as possible with the locals-be transparent enough that they can read for themselves your genuine good intentions-do not continue an argument about military or political issues if it gets too heated, or if you are clearly losing. â€Å"Better to keep your mouth shut and be thought a fool than to open it and remove all doubt.† It is much easier for your enemy to malign what you said than to malign what you did not say. Remember, from the point of view of the locals, you are the Army. Mission success often depends on your behavior presenting the Army in the best light. Locals in your area may be receiving propaganda broadcasts and leaflets in foreign languages you do not understand. Usually enemy propaganda campaigns will be carried out in the locals’ language, but often they will be in a language that is secondary but known to the locals. If you notice foreign language broadcasts or print media in your area, make sure the G2 is aware of it. Local insurgents may use clandestine means of communicating with and intimidating locals, such as the infamous â€Å"night letters† left by insurgents in local mosques in Afghanistan. Look for such means of communication if you notice a sudden about-face in the locals regarding U.S. Army initiatives or agreements. Just being attuned to subtleties and complexities of local social situations usually gives the locals the upper hand in assessing the overall situation in the area. Acknowledge this and try to get the locals to share their understanding with you. There are many non-threatening ways to elicit explanations that may substantially change your perception of what is going on in your area. Asking about such non-sensitive subjects such as proper behavior; greeting rituals; local dress; daily routines and movements; transportation; eating habits; treatment of children; and major or common ceremonies, and rituals can help give you a general picture of social life in the area and a backdrop against which to gauge your situational awareness Probe all the methods used by people in your area to make sense of what is going on around them. They may use completely unexpected means of assessing their environment. In Afghanistan, for example, most people can tell what region any given person comes from based solely on facial and bodily features. Help your Soldiers maintain their cool and reserve judgment An uncertain and probably harsh future adds a huge psychological burden In situations of extreme poverty, the power of money increases dramatically. For example, insurgents may be able to influence locals to take what might seem like insane risks for paltry material gains. If we maintain a proper perspective on the impacts of poverty, we can use this fact to our own advantage, winning the cooperation of locals and demonstrating our good will with economic development programs of relatively small scale that will provide tangible benefits quickly. The Practical Implications of Poverty (continued) The perception of poverty can be powerful Relative poverty can have significant psychological and social impacts People who are unable to afford symbols of material success may suffer feelings of personal inferiority People who have relatively low incomes may choose to invest in highly visible items Additional Reading: Perceived disparity in wealth can fuel problems between social groups, particularly when the material differences are not in line with hereditary markers of social status. If a particular racial or ethnic group, for example, suddenly hits on a way to make money that elevates them â€Å"beyond their station† in the traditional hierarchy, the traditionally higher-status folks may become angry and take steps to keep the upstarts â€Å"in their place.† Commonly, those who feel the most resentment are others of the same traditional social status as their lucky, newly wealthy neighbors-â€Å"They’re no better than us, who do they think they are?† Community Influence Power of Wealth Often the power of wealth is used to obtain other, more formal, types of power. In India, for example, it is not uncommon for politicians to send buses out to their rural constituents to take them all for a large feast in the city. It is understood that in exchange for this largesse, the voters will vote the powerful man into political office, whereby he can exert still more influence Influence One can have influence by holding an important position in various types of groups: kinship groups, religious or healing-related groups, groupings based around occupation or land use, age set groups or groups based around education. For example, the most important person in your AO may derive their status in part from being able to perform divinations. If you are not aware that divinations – making decisions, explaining situations, or telling fortunes based on seemingly random occurrences, such as flipping a coin – are important in your AO, you could fail to recognize the most important person for you to influence City and the Country Forms of community influence will differ markedly between the city and the country. Cities tend to be more oriented toward impersonal, economically based influence or western-style â€Å"democratic† governance. At least in the city these things may be more visible. But don’t underestimate the effects of neighborhood-level influence based on patron/client relations, kinship, religion, healing, or trade guilds in the city. As always, take a cultural ReALLIT check to give you the basic lay of the social situation. The more you know about the locals, the smoother your relations with them will progress. Social Stratification Most societies separate their people into ranks of social worth Commonly, one is born into the group and its status Differences in status are often subtle and difficult for an outsider to detect It is important that you try to discover such differences when you deploy Low-status individuals may be the most eager to engage you and try to enter into agreements with you in order to gain what they can from you and enhance their local status. You should engage them and learn what you can from them, but do not be hasty to enter into agreements until you understand the relative status of the people you are dealing with. In South Asia, for example, to enter into an agreement with a low-caste man could discourage later agreements with more influential high-caste men. Long-standing resentments between high-status and low-status groups can fuel conflict Genocidal conflicts have usually centered on co-residing ethnic, religious, or kin groups The group with the superior social status attempts to inflict genocide on those of lower status On a smaller scale, insurgents may exploit  resentment over status differences to recruit locals or to incite destabilizing violence between locals. Since few, if any, Army missions call for destabilizing an area, you generally want to be careful to take local social stratification into account for all of your operations. Simple awareness can help you avoid worsening existing ill feelings between groups. Levels and Sources of Internal conflict These complex webs of allegiances and grievances can make working with locals a very tricky business. This is especially true since disagreements are usually the last thing anybody wants to talk about to outsiders. Particularly in cultures, which place a high value on saving face or public honor, people may not want to say anything that could be taken as disrespectful of their neighbors, even though they may have big problems with them. For this reason, it is desirable when possible to talk to locals out of earshot of others so they may feel freer to hint at conflicts with their neighbors. Any information you can pick up about who gets along and who has a beef with who could be very helpful in carrying out successful engagements and initiatives with the locals. For example, if you know that members of one subgroup are in collusion with insurgents, you will be more likely to find willing partners among that group’s current detractors in a lower-level conflict. Disagreements and cross-purposes regarding ethnicity, politics, religion, kin groups, or economics are likely to exist in even the most placid-seeming community. Such conflicts can revolve around material concerns such as land, inheritance, water rights, death re-compensation, or bride price. Likewise, they may be centered on purely ideational (non-material) concerns such as religious disagreements, a history of fights between groups in the distant past, or discord over the ways children should be educated. Since people in different cultures have different worldviews than our own, elements which might seem insignificant to us could be worth killing or dying for, to them. So do not discount farfetched-sounding explanations for local conflict until you have learned enough about the culture to judge. In fact, if you can get locals talking about any conflict past or present, you can learn a great deal about their culture in a short time.

Saturday, September 28, 2019

Iraqi ommunity in Saudi Arabia Essay Example | Topics and Well Written Essays - 3250 words

Iraqi ommunity in Saudi Arabia - Essay Example He planned to introduce various aspects of modern administration and western technology not contradicted by the principles of Islam (Abir, 1988: 4) including modern education in its various disciplines. The lack of Saudi professionals, therefore, necessitated the employment of foreign teachers and experts. To develop integrated urban cities, various measures were taken. For instance, to fulfill one aspect of this purpose, schools and hospitals were built, telephone lines and electricity were introduced, running water, roads and airfields were constructed all of which were carried out by foreign manpower and expertise, employed from all over the world. The skills of Muslim professionals as well as non-Arabs and non-Muslims were also employed in Saudi development. Most of them were recruited as teachers in universities and schools, engineers, chemists, physicians, doctors, contractors, nurses, and businessmen. There are undeniable common interests between Saudi Arabia and other countries that entailed the flow of all the skilled laborers, teachers and businessmen to Saudi Arabia during the oil boom era. Despite the turbulent relations between Saudi Arabia and Iraq until the monarchy era until the fall of Saddam regime, Saudi Arabia managed to be diplomatic and remain cautious in dealing with Iraq’s political and socio-economic issues. With the tense Saudi-Egyptian relations and the support of Nasirs to the Republic in Yemeni war, suspension of dealings with the Egyptian labor occurred. As an alternative, Saudi administration considered the feasibility of bringing qualified professionals in from Iraq. Hundreds of them arrived and occupied various professions. In addition to working as the state’s representative staff in embassies and consulates, these specialists received contracts from competent authorities which found a lack of local qualified employees.

Friday, September 27, 2019

Theater Essay Example | Topics and Well Written Essays - 250 words - 3

Theater - Essay Example between her and her sister Becca because her sister thinks it is not fair for Izzy to have a child and she does not, ever since her son Danny died from a motor accident. Izzy has been portrayed in the play as a moody person as evidenced in Act 1 Scene 1 where she is telling Becca how she punched another woman in a bar (Rabbit hole,p.10). Izzy is also portrayed as a very irresponsible person where she bends the rules and gets pregnant from her relationship with a musician named Auggie. The family is a middle class unit and worse of all; Izzy is no longer working at her usual place. Becca has a steady relationship with her man Howie but she is affected by grief ever since their son Danny died. Howie has a rigid time controlling and understanding her spouse and this brings lots of tension in the family. Izzy is also in a relationship with Auggie the musician, though not from a wedding setting, and this intensifies tensions in the family unit. I like the fact that Howie is a loving and caring person, but I dislike Becca’s attitude towards him. I also like that Izzy is in search of happiness from her musician boyfriend but I dislike the fact that she got pregnant too fast without getting to know her boyfriend and his previous relationships better. Izzy’s overall goal in the play is to show that she is an agent of change in the family setup where people like Becca should not live a life of regrets and grief. Izzy’s objective in Act 1 Scene 1 is to show herself a strong woman who can not be intimidated anyhowly by anyone she cant recognize. She also portrays herself as a woman who will bend the existing notions and perceptions that seem to hinder her path to happiness as evidenced by her relationship to Auggey, the musician. Izzy would wear trendy clubbing attire in the set to portray her fun-loving nature as evidenced in her act coming from the bar where she picked a fight. She is a woman who has never grown up despite her twenty-something years of existence in

Thursday, September 26, 2019

DEPRESSION Research Paper Example | Topics and Well Written Essays - 1500 words

DEPRESSION - Research Paper Example Sleeplessness, feelings of helplessness and hopelessness, Loss of interest in daily activities, Appetite or weight changes etc are some of the major symptoms of depression. Depression can be treated effectively with the help of a psychologist and a psychiatrist. This paper analyses various dimensions of depression. Depression Depression is one of the major psychological diseases which prevent people from leading a normal life. Most of the psychological disorders originated from depression. It is difficult to assess how severely a person is affected by depression. Unlike physical diseases, psychological diseases cannot be assessed with the help of any laboratory testing. The major symptoms of depression can be witnessed in the behaviors of the patient and the severity of the disease can be assessed only through the evaluation of the behavioral pattern of the patient. Chronic depressive patients may cause physical injuries to themselves and others. â€Å"It has been estimated that per haps somewhere between 10 and 30 percent depressives and manic depressives kill themselves† (Klein, & Wender, 2005, p.1). Even though the actual causes of depression is still unknown, psychologists believe that heredity and environment plays an important role in making a person depressive. ... Many of them may not sleep well and mood changes occur to them constantly and continuously. It is difficult for depressive patients to concentrate longer on a particular topic. They often complain about unrealistic problems they are facing. For example, it is quite possible that a depressive patient may complain about body pain, head ache etc even though they have no such real problems. Fatigue or tiredness can be witnessed in every activities of a depressive patient. Depressive patients often avoid the company of others and they will try to lead a lonely life. Anxiety is another major symptom of depression. Causes of depression Heredity and environment are the major reasons which contribute heavily to the psychological disorders like depression. A person with family history of psychological disorders is more vulnerable to depression. Same way, a person living in a tough environment can also develop depression. According to Chan et al (2010), â€Å"as many as 38% of cancer patients suffer from major depression, with a mean of 24% and median of 22%† (Chan et al, 2010, p.46). In other words, many of the chronic physical diseases can contribute to the development of depression among people. Man is a social animal who likes to interact with others. These interactions often create stresses in the minds of a person. Personal, family, social and professional commitments of the current generation are more than that of the older generation. The failure in fulfilling these commitments may often make the person depressive. Klein &Wender (2005) have mentioned that depressive illness is often triggered by a real event like the death of a loved one (Klein, & Wender, 2005, p.13). It is possible that people develop close relationships with some others.

Wednesday, September 25, 2019

How Germany Went from a Collection of Smaller Nations to a Strong, Essay

How Germany Went from a Collection of Smaller Nations to a Strong, Unified Nation in the Second Half of the Nineteenth Century - Essay Example The Prussian emperor further frustrated these unification attempts by refusing to accept the title of Emperor of Germany. In the Seven Week War between Austria and Prussia, Austria was defeated and therefore technically excluded from German affairs. The French, who had assisted the Prussians to subdue Austria, later had a diplomatic disagreement with Prussia and they went into war over the ‘Ems Telegram’ which insinuated that the French ambassador had been insulted by the Prussian King. The Prussian troops led by General Von Moltke led them into victory against the French troops led by Napoleon III and later Marshal Bazaine. When the French finally lost, the German unification was completed with the Prussian King being crowned emperor of Germany. Prussia added the French provinces of Alsace and Lorraine to Germany. German ethnolinguistic nationality finally saw people with the same language, identity and history belong to the same nation.

Tuesday, September 24, 2019

Political Science questions Essay Example | Topics and Well Written Essays - 1750 words

Political Science questions - Essay Example These reflected into two that is extreme realism and moderate realism that all provide a different opinion on realism. Extreme realists William of Champeaux related realism as a position in which the universals exist through an independence of the humans and other particular things related in the field. On the contrary, other philosophers viewed this realism as so extreme and considered realism in the eyes of God as the relation through which particular things are created. This moderate theory as proposed by St. Thomas Aquinas and John of Salisbury. In relation to political realism, international relations come to consideration. These relate to general theories of political realities of the world. The aspect of political realism on this international perspective reflects aspects of competiveness within international communities and conflicting aspects that relate to the ultimate security aspects. Idealism and liberalism are part of this realism parameters. Idealism and liberalism deal more with the emphasizing of cooperation’s on an international level. It is therefore fair to conclude the position of the world based on realist as a connection of different states with regard to competition that has raised conflicts through which security has soured.

Monday, September 23, 2019

What is Art The Art of Jackson Pollock Essay Example | Topics and Well Written Essays - 3750 words

What is Art The Art of Jackson Pollock - Essay Example This statement can be limited to just the expression of an emotion about something of interest to the author, or it can be the expression of a specific social topic that someone feels is important. A good example of art is the cave paintings that primitive man made (Getlein 5). The reason this is art to me is because someone is capturing the event of hunting as they saw it. They are recording something about their everyday life and it is on the cave for anyone to see. These paintings have been seen by many different people over many years. In one sense, this art has lasted through time. Stonehenge (Getlein 6) is also a fascinating aspect of art because it is similar to architecture . It is much like the Pyramids because people are wondering how these were built and why. Stonehenge makes people think and wonder about who put these stones together and why. This is another essential part of art in my opinion: It must make people think and wonder why the artist created this piece. I thin k that art must make people feel something, even if it is something small. In the example of the cave paintings, I wonder why these hunters thought it was important to make the drawings. Were they bragging about the hunt that day? Were they counting their hunts? Only they would know. Stonehenge makes me wonder about why these stones were dragged to this particular spot and arranged in the way they are arranged. It is interesting to me that the book said that this was a graveyard and that it marked about 240 graves (Getlein 6); this is much like our cemeteries today. Many people go to our graveyards and do etchings of the older gravestones because they consider it art. When I pick art myself, I look for symmetry and the way it feels to me. Some pieces of art speak to me differently than others. As an example, I may pick a piece of art for my wall that has vibrant colors that are symmetrically placed in a abstract form. I also have picked pieces because they look interesting or becaus e the scene describes something that is interesting to me. I cannot say that I like the kind of art that the Masters created. I am not sure why, but I think it is because it is usually of some scene, people or subjects that I find uninteresting. I can say that I like some of Picasso’s work because it was very strange and it does make a person wonder why he did what he did. Was the fractured way that he looked at this the way that he saw the world? I do believe that anything can be art. The unfortunate issue is that there are art critics who decide what art is and what art is not. I think that everyone becomes an art critic when they look at a piece of art and they do not need others to define what art is for them. In other words, there are so many different ways that art can be interpreted, that it seems a shame that art critics are allowed to define art. I enjoy looking at art and I hope that this class will bring me more knowledge about what I am looking at on a deeper leve l than I have seen in the past. Essay 2: Discuss Two-Dimensional Media. Give example of artist, media and a piece that appeals to you. The book describes two-dimensional art as something very simple and easy to read. The media can be anything from drawing with pencil and ink on paper to creating images on clay or the cave wall. The book mentions many media that include graphite, metalpoint, charcoal, pastels and more. I have seen many artists pencil drawing (graphite) which creates an interesting effect when the artist uses shading and contrast in their drawing. I think metalpoint provides a beautiful array of interesting and eye-catching symmetrical shapes. I can understand why most people do not use this method

Sunday, September 22, 2019

Malaria Essay Example | Topics and Well Written Essays - 1000 words - 3

Malaria - Essay Example According to statistics given by the Centers for Illness and Prevention, 1925 cases of malaria were detected. This constituted approximately 70% of the population that was affected. The 70% cases were from people who had tours to outside U.S predominantly West Africa and others from India. In U.S, only five cases were reported, and this was approximately 0.25% of the population. Of the five cases reported, one was as a result of blood transfusion, another one from a lab accident, one from a traveler and the remaining two cases from born children whose mother had traveled. Yes, there has been historical case of malaria in the U.S. Back in the year 1930’s, malaria was endemic and concentrated in the 13 states of America. For instance, in the year 1933, malaria had prevailed approximately 30% of the population in the Tennessee River Valley. Another instance of malaria outbreak was recorded in the year 1942, this was during the World War II. Malaria cases were heavily recorded in military base camps. The disease was handled and controlled. Programs like the National Malaria Eradication Program (NMEP) and centers for Disease Control and Prevention (CDC), were initiated in the year 1947 and 1946 respectively, to suppress and help in the eradication of malaria. Preventive measures like spraying of insecticides, DDT, and application of the same to the interior walls of the houses, were used to thwart spreading of malaria. The goals and objectives of the public education plane to control malaria were as follows. One, educate the community about transmission and the causative agent of malaria. Two, provide methods and ways of reducing the spread of disease, in case there is an outbreak (Speybroeck, 2011). Three, give ways in which people can prevent malaria and eradicate it from their vicinities. Four, educate the public on the various organizations that have been established

Saturday, September 21, 2019

English Banking Law Essay Example for Free

English Banking Law Essay INTRODUCTION: There are three types of cheque frauds exists in UK viz. forged, counterfeit and fraudulently altered cheque fraud. In 2005, the cheque fraud in U.K was estimated about  £ 40.3 million – a 13% decrease from the 2004 total of  £ 46.2 million. The earlier year figures also revealed a steady increase totaling  £ 36million in 2002 and  £ 45million in 2003.In U.K during 2005, counterfeit cheque fraud was estimated at  £ 3.23m, forged cheques fraud was estimated at  £ 30.9 m in 2005 and fraudulently altered cheque fraud was estimated at  £ 6.2 millions. SOURCE: FRAUD FACTS -2006 APACS- UK This paper studies the various protections available to banks and customers when using cheques as opposed to cards, as method of payment. PROTECTION AVAILABLE TO CHEQUE PAYMENTS UNDER BILL OF EXCHANGE ACT, 1882, UK (BEA) AND CHEQUES ACT 1957 Under Bill of Exchange Act, 1882, under section 81 A, a non-transferable cheques has been defined as follows†   Ã¢â‚¬Å"81 A (1). Where as cheques is crossed and bears across its face the words ‘account payee’ or a/c either with or without the word ‘only’, the cheques shall not be transferable but shall only be valid as between the parties thereto. (2) A banker is not to be treated for the purpose of section 80 above as having been negligent by reasons only of his failure to concern himself with any purported endorsement of a cheque which under subsection (1) above or otherwise is not transferable. (Cheques Act, 1992). One risk associated with the cheques bearing forged or unauthorized endorsements’. However protection is available under the English Bills of exchange Act, (BEA, or the Act). Under BEA, a legitimate holder of a cheques payable to bearer attain a good title to the instrument overcoming thereby any adverse claim of ownership that might have been hold good against his predecessor. Accordingly, the payment by the drawee bank to those acquirers discharges the cheques as well as the drawer’s engagement thereon so as to permit the drawee bank to debit the drawee’s account. But this is not applicable to cheques payable to order. In the case of payable to order cheques, effect of an unauthorised or an absence of endorsement or forged endorsement shall have to be looked into under the circumstances of forged endorsements. One of the ways to prevent forged endorsement or loss due to stolen cheques is to use crossed cheques or cheques payable in account. Cheques crossing are available under the BEA, UK. The crossed cheques requires to deposit the cheques into account rather than payable to bearer does not reallocate the cheques theft losses but it minimizes the loss and thus benefits the party on whom the loss falls. Further the losses arose due to stolen cheques or loss cheques payable to bearer fall on the dispossessed owner under BEA. Thus under BEA , reallocation of loss away from dispossessed owner may not be successful in case of crossed cheques payable to bearer as the onerous shifted to bank for its negligence. If a bank has acted in good faith and it is protected under BEA for the payment made to open cheques to bearer.    In the case of crossed cheques, if the bank seeks protection, it should have acted without negligence and in good faith. Under BEA, if forged endorsement losses fall on the taker from the forger who is naturally a bank. Further, the cheques payable to the order under the BEA, loss reduction thus seems to be mainly advantageous to the collecting bank. Further the collecting bankers of the crossed cheques are protected under the BEA over forged endorsements as long as they acted in good faith and without negligence. Further under BEA, the drawee bank is protected and this shifts the reallocation of forged endorsement losses to the first innocent party prior to the collecting bank.   Where the one who grabbed the payment through a bank account was the conman, such innocent party is construed to be dispossessed owner. Thus the crossing has reassigned the loss to the dispossessed owner, thus excluding the collecting bank that took the cheque from the conman. Thus under BEA, protection is available to banking channel had they acted in good faith and without negligence even in case of crossed cheques .If an open or crossed stolen cheque has been collected by or paid to the conman , the loss is assigned to the dispossessed owner .Under UK laws , where a cheque is payable to order is collected or paid over a forged endorsement for or to a non-bank situated in the chain of title subsequent to the conman, loss is assigned to the non-bank from that of the conman. This is apart from of whether the cheque was collected for or paid to the innocent taker from the conman or someone obtaining title from the conman despite of crossing.   Where the cheque is crossed and it has to be paid into a bank account and then only it can be encashed as it will be convenient for the dispossessed owner to trace that person and assign the loss to him. Thus the crossing of cheque becomes more helpful to the true owner. However thus the innocent endorser has to bear the loss as the benefit is not in the reallocation of losses. The best example of the above is the Nigerian gangsters operating in UK and taking the gullible students who are in the poverty to carry out cheque fraud worth  £ 50 million a year. These Nigerians conman recruit poor students with promises of good cash reward for just providing the conman with their bank account particulars. By using stolen corporate cheque books, they then deposit huge amount of British pounds through the accounts. No sooner the account is credited with the collection amount from the fraudulent cheques, the account will be emptied before the firm or bank realizes what has happened. The major lion’s share goes to the conman and only a very meager amount goes to the innocent, poor student who has provided the bank account number to the conman. When the fraud comes to light due to alerting by the bank to the police, it is the poor, innocent student who will become the scapegoat. The conman mainly selects the students from Camden in North London where thousands of students from the capital’s universities congregate. Conman liberally offer them up to  £ 5000 for doing nothing. Then the conman approaches an insider who is working in the royal mail and induces them to steal a company’s cheque book. Then the conman visits the company office to collect the director’s signature from the dustbin and thus they scrupulously copy the same in writing the bogus cheques.   Thus the conman had a fortune by sharing a lion’s share in the booty leaving the innocent, poor account holder to face police and possible fraud investigation.[i] Banks and building society’s in UK from September 2006 onwards is not to accept the cheques that are issued in favour of the banks itself in a move to avoid frauds. Bank is to insist to issue the cheques payable to an individual or to include the individual’s name on the payee line after the name of the institution. This strategy is mainly designed to ensure that the money lands in the right account and to bring to an end to cheque fraud which reached to a height of  £46.2 million in 2004 which includes counterfeit and stolen cheques. This modification is being launched following a case in which an independent financial advisor informed his clients to draw cheques out to the financial institutions where the money was going to be invested. He then paid them in to his own account, rather than the customers account.[ii] Under the BEA , there is a provision with a bill containing words prohibiting transfer or indicating an intension that it should not be transferable and these instruments is termed as ‘ not negotiable’. As such these instruments can not be negotiated by the payee to another holder. In UK, an account payee or a/c payee and with or without the words only can be encashed only by the account holder and thus it can not be encashed other wise than by an endorsement. Further, under the BEA, the consequence of an unauthorised or forged assignment is similar to that of forged endorsement as both do not convey title. Under BEA, in there is no acceptance, the drawee can not be held liable on the instrument and it does not exclude in tort or in receipt of money provided elements of such liability are present. If the drawer has given sufficient notice well in advance informing the drawee about the forged endorsement and the remedy available to the drawer against drawee for the forged endorsement is under contract and this arises regardless of any particular provision of the BEA. Further under BEA , no remedies is specified for the misappropriation under forged endorsement but the injured can avail the common law remedies for the embezzlement of property in chattels generally rather than stipulating specific recourse to the true owner of misappropriated cheques. Further the loss of cheque does not forfeit the action on it under the BEA. Under BEA, no title is passed on under the forged endorsements and one who derives the title under forged endorsement can not enforce payments against a prior party to the forgery. Further no payment is made under due course so as to discharge the cheque and to preclude drawee’s liability against the drawer. Thus the original owner from whom the cheque was stolen and forged inherits the right to and on the cheque and he has a right to sue for the wrongful interference with his rights. Further under BEA, an endorser is barred from refuting the authenticity and promptness of all previous endorsements and at the time of endorsement, he had a good title and this denial will be advantageous for the holder in due course later. Further under BEA, the drawee bank can base its reliance on laws governing mistake and restitution for the payment made over a forged endorsement. Further, under BEA provisions, true owner may recover on the lost cheque from any party prior to the falsification till up to the drawer. Under BEA, cheques payable to fictitious or non existing persons is deemed to payable to the bearer. A collecting bank can not be held responsible for payment made to a thief if it is drawn on fictitious name and if they have acted in good faith which absolves the collecting from its liability. In Fok Cheong Shing Investments v. Bank of Nova Scotia, the president of the drawer who turned to be the authorised signatory of the company issued a cheque to a real person with an intention for misappropriation. The loss was allocated to the drawer under the fictious payee provision. Thus the drawee bank is being protected under the BEA if it has paid a cheque over forged endorsement in the ordinary course of business under good faith. Thus the statutory protection is extended to the collecting bank which collects in good faith and without negligence a cheque bearing a forged endorsement. S 60 of the BEA does not warrant that drawee bank should act with out negligence. However one may assume that a bank has to act without negligence in the ordinary course of business. The UK Review Committee on Banking Services Law and Practice considered provisions ss.60, 80 and s.1 of the Cheques Act 1957. The committed recommended to combine these provisions under single enactment so that statutory protection may be extended to a paying bank acting in ’good faith’ and without negligence. Both the s 82 and s.1 of the Bills of exchange (crossed cheques) Act were repealed by the Cheques Act 1957 in UK which mainly extended the protection to open cheques and other payments documents. In UK, the drawee is primarily liable to payment, the endorser is liable secondly and the drawer is the ultimately liable to payment upon dishonor. Not withstanding this, the drawer and the endorser may sign without recourse. The United Nations Convention on international Bills of exchange and International Bills of Exchange and International promissory notes , 1988( UNCITRAL Convention) specifies that the drawer may exclude his own liability for acceptance or deferment by an express stipulation in the Bill. Such stipulation will hold of use only where another party is or becomes liable on the bill. PROTECTION AVAILABLE TO PAYING BANK: Section 24 of the BEA states that a forged signature is no signature. In Brown v Westminster Bank (1964), the estoppel caused from the misleading facts from the client. In this case , the bank has reminded a old lady , the customer against the veracity of the signature as her signature was forged more than in 300 cheques and in turn she certified that the signature was her own.   When the bank was sued by her son later, it was held that bank was not liable and they were estopped from denying the genuineness of the cheques. In Tai Cotton Mills Ltd v Liu Chong Hing bank (1985), it was held in this case that a customer of a bank needs to check his bank statement to keep on watch that the forged cheques were processed. The bank’s express condition to the contrary in the contract with customer can absolve the banks from the wrongful debit. Like wise if a bank pays a cheque in breach of a mandate by oversight, it has the right of subrogation and the bank has the right to take the possession of a title or good that it effectively paid for. PROTECTION IN THE CASE OF CONVERSION: It is not necessary for the bank to check every endorsement on the cheque and it would be time consuming and onerous to do so. So as to assuage the liability of banks, BEA (1882) and the Cheques Act (1959) offer defense for the paying bank. Bank of Ireland v Hollicourt (Contracts) limited (2000) EWCA Cir 263. A suit was filed against a bank which continued to pay on cheques against the company’s bank account even after filing of a petition for bankruptcy. It was held that the bank had acted as an agent and didn’t have any beneficial interest and the legislation made the disposition void but that did not operate the way claimed. Roger Smith and Christopher Trimothy Esmond Hayward and Lloyds Bank TSB; Harvey Jones Ltd and Woolwich Plc (2000). Where a cheque has been misused falsely to change the name of the payee, then the piece of paper can not be termed as a cheque and an action for alteration against the collecting or paying bank will stand only as the nominal value of the paper and not as to the face value. As the material alteration was carried out with out assent of any one but the fraudster and under the bill is avoided save against a party consenting or making to the alteration. PRECAUTIONS TO BE OBSERVED WHILE WRITING A CHEQUE: Write clearly the name of person in whose favour your are writing a cheque with additional information like Dr, Er, his shop name or company name etc. From September 2006 on wards whenever you issue a cheque to UK building society or to a bank, add additional information other than the name of the bank or society like account no, bank branch name etc. To prevent fraudsters to add words in the empty blank space available in the written cheque, it is always better to draw a line through unused spaces. Don’t pre sign blank cheques and also try to fill all the details like full name, amount in figures and words and don’t issue undated cheques. Always issue ‘account payee only ‘crossed cheques’ to avoid any frauds. CREDIT CARD CHEQUES: These cheques have been issued as an additional facility on credit card accounts for the last 10 years in UK. These are similar to the normal bank account cheques and can be deployed for the same purpose. During 2004 , about 3.4m credit cheques have been issued which constitute a very little percentage (2%) as opposed to overall number of credit card in operation which totaled to 1.727 billion in the UK according to APACS , the UK payment association. The credit card cheques are likely to bounce in most of the cases if credit limit has been crossed. These credit card cheques are utilised for high value transactions ranging from  £ 850 as against  £ 58 for a UK credit card purchases and  £ 120 for payment of a personal cheque. In credit card cheques, the customer need not ask for the cheques from the credit card issuer but they are issued at the discretion of the card provider and there are different terms and conditions applicable to transaction done through credit cards cheques as compared with a credit card and this is being unaware by the most of the customers. One of the disadvantages is the fraud that is prevalent in the credit card cheques as the most of the issuer are forwarding it to their customers on discretionary basis. These credit card cheques are vulnerable to fraudulent activities as most of the customers do not aware that credit card cheques have been dispatched to them. In the case of these credit card frauds, lender has to bear the losses rather than customer. CREDIT CARD FRAUDS: Credit and debit card frauds cost  £ 400 m during 2004 and devise deployed by the fraudsters have become sophisticated.One of the remedy is to insure against the ID theft. Some insurance company offer it as free adds on with home insurance policy. One of the protection for the prevention of credit card frauds   is the introduction of new industry standard namely ‘Chip and Pin† which required implanting a microchip inside the credit and debit card and mandates that consumers key in a secrete four-digit personal identification number to complete a transaction using the card. As the result the consumers deceived by the fraudsters are on the decrease in UK. [i] Dan Evans, â€Å"Gang’s Pounds 50m stolen cheque racket ‘, Sunday Mirror, Jan, 12, 2003. [ii] â€Å"Banks put checks on Cheques in new bid to beat pounds 46 million fraud, The Birmingham post, December 8, 2005, page 24. Check Your Balance before the Match. The News Letter (Belfast, Northern Ireland) : 11 Cheques in the Post-Mortem. The Birmingham Post (England) 21 Jan. 2006: 27. Cheques to Be Stubbed Out. After 350 YEARS; Signed and Sealed. The Mirror (London, England) 10 Nov. 2004: 1. Fraud Bill Shock. Evening Gazette (Middlesbrough, England) 31 Jan. 2006: 2. Ghost Workers Help Fraud to Soar. Western Mail (Cardiff, Wales) 2 Feb. 2005: 6. King of the Cons. The Mirror (London, England) 11 Jan. 2005: 10. Postman Given Asylum Plundered [Pounds Sterling] 20million. The Daily Mail (London, England) 21 Dec. 2005: 17. Store Bans Slowcoach Cheques to Speed Checkouts. Western Mail (Cardiff, Wales) 3 Apr. 2006: 4. Sally Ramage Dabydeen, â€Å"Legal and Regulatory Frame work â€Å"iUniverse, 2004.

Friday, September 20, 2019

File management

File management Developing a File Management System A filing system is developed by a good plan. Planning establishes direction and control it also ensures that everyone involved has a common understanding of purpose, goals and provides guidelines. Plan files in logical order- Assign responsibility Obtain support Collect information Analyze records Develop a filing system Implement system Train users Monitor implementation, follow up and revise system Assign Responsibility One person should be assigned the task for developing and coordinating a new filing system. This task usually falls to the person that is responsible for the documents. This may include Administration, Payroll/Financial Managers or Human Resource Manager. However there must be a Gatekeeper to control access to the information contained in the files. The Gatekeeper may implement the system or may supervise others in its implementation. The first step in developing or improving a filing system is to gain the support of the staff that will use the system. The support will legitimize the system and ensure the cooperation of all the office staff. Every member of the office must understand the purpose and scope of the project. Everyone should be involved in the process. The creator of a file may provide important insight useful during the analysis of the records. Office members can help determine which features or aspects of the present system work well and should be retained. Office members can also help identify specific problems within the present system that must be changed. Most importantly, involving others in the process makes them more amenable to using the system once it is implemented. Analyze Files Once files have been inventoried, they can be analyzed. Before a filing system can be designed, a thorough understanding of WHAT files are created, WHY they are created and HOW they are used is a necessity. An analysis begins with a careful consideration of the following questions: who creates the records who uses the records how often are various types of files used how long do files remain current how many people need access to the files which files are confidential are there legal requirements for retaining the files There are no set answers to these questions. Effective analysis requires that a common-sense approach be taken. The goal is to make a new system work, not just look good on paper. Analysis is the process of reviewing all information which has been collected, manipulating that information within the functional and operational requirements of the office, and then drawing conclusions. The most efficient and economical filing system is one that works well for the office and is easily understood by its users. Very often the simplest method is best. Final factors to bear in mind when establishing a filing system: ready identification and retrieval of individual files. Tools of File Analysis Classification is a tool of analysis. It is a method of sorting information into like groups. Identifying classification within the office and sorting files identified is the first step in the development of a filing system. The file classifications that are found in most offices are: Administrative files-document the internal administration and operation of an office Organizational files -document the relationship of an office with other offices and departments within Hogg Fuels Retention of Files A major consideration in the development of a filing system is the retention of the files. Retention schedules clearly state how long a file must legally be kept and whether the file is archival. Retention schedules also provide guidelines for moving files to inactive storage and for purging obsolete files. Managing correspondence and email Although correspondence may comprise only a small percentage of the total volume of files, it poses the most problems for many offices. Correspondence consists of unique documents which are often difficult to classify. Correspondence may consist of incoming and/or outgoing letters and memoranda. Classically, correspondence has been filed in chronological order. Retrieval depended on remembering the date of receipt or of transmittal. For many people this is very difficult. Information is rarely retrieved on the basis of occurrence. Email is similar to correspondence in many ways. Emails are sent or received based on date and time, not on content. This is one of the characteristics that make email so difficult to manage. Each email is different than the one sent before and will be different than the email sent after. Managing emails by date is rarely effective. Like correspondence, it is much easier to manage emails based on content or creator. Information is most commonly retrieved on the basis of content or creator. It is, therefore, most logical to file correspondence or email either by subject (with related information); by creator; by department from which it is received; or by department to which it is directed. It must be kept in mind that each office function is different, and it is necessary to tailor the management of correspondence files and email to respond to individual requirements. Completing the analysis Once the analysis is complete, a filing system can be developed. A filing system should be developed on paper before it is physically implemented. Folders should be sorted, on paper, into the appropriate classification. Within each classification files are sorted. Information without a specific retention period can be destroyed or should be managed separately. Unsolicited material can be destroyed. Arrangement Within each individual file they are arranged in an order best suited for rapid retrieval and disposition. The most common arrangements are: Alphabetic arranging records in alphabetical order is most helpful when records are retrieved by name or topic. However, it must be remembered that even the simplest alphabetic system requires establishing consistent and uniform filing standards. Chronological a chronological system is most useful for records that are created and monitored on a daily basis. Folders are arranged by sequential date order. It is, however, recommended that chronological filing be avoided. Retrieval can be slow and difficult as few people tend to remember dates accurately. The date of occurrence is rarely the basis for retrieval of information. Implement System There is no easy way to implement a new filing system. It is a very labor intensive task. If at all possible, it is recommended that the filing system be implemented in stages, by classificationone file at a time. Steps in the implementation process include: sorting paper files into classification assigning a physical location within the filing system to each classification re-labeling folders or creating folders to reflect the new file system if necessary, the purchase of new filing supplies/equipment Monitor implementation, follow-up and revise system After a test period meet with users to identify problems. Work with users to resolve inconsistencies and formulate implementable solutions. Written filing policies and procedures are useful tools which help ensure the success of the new system. Written policies should include: a brief statement describing the chosen system and its arrangement detailed procedures for the creation, maintenance, and purging of files procedures for the retrieval and re-filing of paper folders staff duties and responsibilities Written policies help ensure that the new system will be understood by all and will succeed. Filing Policy and Procedures Although many of the files we currently create may be electronic, we will always have to cope with paper files. This section includes basic information regarding the maintenance of active files. Processing information for filing check to see that the material is complete file the item in the front of folder if a folder does not exist, create a label for a new folder integrate the file into the system Sign-out Rules users check out folders, never individual documents Sign-out sheets are used to monitor the removal of the file Information on the sign-out sheet should include: file folder name borrower name date signed out date returned For convenience keep several sign out sheets in the front of each file drawer or on top of each file cabinet. For greater convenience, sign out sheets can be personalized for individual users. Sign out sheets personalized for an individual need only contain file folder title, date charged out, and date returned. (Appendix~1.0 Sample Sign-Out Sheet) Filing Supplies After determining a filing system for managing your paper records, it is important to choose appropriate supplies. Hanging folders Hanging folders are used to bring order to a drawer. They are effective only when used in the right circumstance. As hanging folders take up 1/3 of the available drawer space, they should be used only for files with high retrieval activity. Labels are used to facilitate identification of a folder and its contents. Visibility on the folder and use as a visual retrieval aid should be major considerations when choosing labels. Color coding is a method of identifying file folders within a filing system. Color, when used appropriately, can make misfiles visible at a glance, facilitate retrieval, and facilitate weeding and purging. Color is used as a visual aid to highlight a record series or the date. It can also be used to highlight a specific folder. Naming and Labeling Files For files, identification and labeling allows an office to maintain physical control over current files as well as manage growth of new files. When working with files two levels of file identification and labeling help simplify and facilitate filing and retrieval: drawer or shelf labels file folder labels

Thursday, September 19, 2019

The Difficulty of Remembering Robert Browning :: Biography Biographies Essays

The Difficulty of Remembering Robert Browning      Ã‚  Ã‚   It is no great revelation that people primarily either want to be remembered or forgotten, they either want to be noticed or they want to disappear. And it's this binary that celebrities seem to struggle with all the time; constantly wanting to be in the spotlight and all the fame and glory that goes along with it. But once their integrity is compromised, they run and hide and declare their lives to be personal, out of view of the public eye. No one seems to contradict this binary of fame / seclusion more than poet Robert Browning. Although he wanted to be known and remembered, every conscious decision he made within his career seems to have prevented this.    Born in 1812, Robert Browning led a shielded suburban life, in the south of France (Damrosch, 1305). Both his parents were supportive and encouraging of his interests especially when, at the age of 14, he expressed an interest in poetry (Damrosch, 1305).   The poet that sparked Browning's interest in poetry was none other than Percy Bysshe Shelley. P.B. Shelley's poetry affected Browning greatly and even though Browning wasn't writing poetry yet at this time, Shelley was influencing him in other ways (Damrosch, 1305). Percy Shelley was a poet widely known for his radical ideas and beliefs; it was this recognition that most attracted Browning. Robert Browning's path to being a poet was not direct. It was because of Shelley that Browning found this path, but it would be years before he would begin writing (Damrosch, 1305). Browning tried many other career paths before publishing his first poem, among them art, music, law and business (Damrosch, 1305). He published his first poem anonymously at the age of 21 (Damrosch, 1305). It was titled Pauline and was poorly received (Damrosch, 1305). Publishing his first poem anonymously goes against Browning's desire to be well known. Over the next ten years, Browning published various plays and poems that were as poorly received as his first poem (Damrosch, 1305). But it was in 1842 that Browning would get much deserved recognition for his work

Wednesday, September 18, 2019

Blood, Violence And Gore As Entertainment :: essays research papers

Blood, Violence and Gore As Entertainment   Ã‚  Ã‚  Ã‚  Ã‚  The Texas Chainsaw massacre, Braineaters from outer space and Bloodfeast are all films were the title can speak for itself. The are films were violence, blood and gore play an important role. It is obvious that someone has to action, but who?   Ã‚  Ã‚  Ã‚  Ã‚  Since the dawn of man people have used violence for entertainment. In Rome they had the Colluseum, nowadays we have the cinema. Violent films are being produced all the time, no one seems to care. Even though there aren't many people who are harmed from these films, there are a lot of children who do. It is a question of separating reality and fiction, and that is a problem for many children. After the Superman films in the 1980's, there were a series of children jumping off tall buildings, because they though they were Superman. As you grow older, this doesn't seem to be a problem any longer, even though there have been incidents were adults have started to kill people after watching a violent film. An example of this is the controversial film Natural Born Killers. Over twenty people lost their lives because of this film. In this film murder and violence are justified, and it is these films that affect children the most.   Ã‚  Ã‚  Ã‚  Ã‚  Computer violence is a quite new phenomenon. It was introduced with the launch of Wolfenstein in 1990. In  «Wolfenstein » you are trapped in a maze among an army of nazis. You'll have to kill your way out. This kind of violence probably has a deeper influence on children, because they do the killings themselves. It is interactive violence. In several countries the follow-up game, Doom, was banned. The software company claimed that it didn't have a negative affect on children, because they killed mutants, not humans.

Tuesday, September 17, 2019

The Character Of Macbeth :: essays research papers

The character of Macbeth was a classic example of a tragic hero. Though many factors contributed to the degeneration of Macbeth, the one that stuck out most was his uncontrollable urge to attain and retain power. His over ambitious desire to acquire power was let loose by the witches, with their prophecies of Macbeth becoming the Thane of Glamis, Thane of Cawdor, and King of Scotland. At first Macbeth replied that such foreshadowing couldn't be taken seriously, because of the evil forces that lay behind them. However, when Macbeth was declared Thane of Cawdor, almost immediately after the witches' prophecies, he had private thoughts and ambitions that he could become King of Scotland. In an instant the witches had let loose Macbeth's over ambitious nature for imperial power. (An aside in I.iii.127-130 is a perfect example)   Ã‚  Ã‚  Ã‚  Ã‚  Now that Macbeth's uncontrollable desire to become king had surfaced, he became solely focused on obtaining this goal. This included the murder of King Duncan. Lady Macbeth, wanting to be queen of Scotland, provided her husband with a plan to assassinate King Duncan. At first Macbeth hesitated to murder Duncan. He was afraid of the aftereffects and didn't deem it right to kill a king who was just and of such high stature. Unfortunately for Duncan, Macbeth's ambitions slowly overpowered his morals and loyalty. Even though Macbeth was uncertain, his ambition for power was able to take over his mind, and provided him with a sufficient excuse to murder King Duncan.   Ã‚  Ã‚  Ã‚  Ã‚  Macbeth had now achieved his goal, being the King of Scotland. His urges should have diminished, but they didn't. Macbeth was now dead set on retaining his new power. He became paranoid and feared Banquo, whose integrity and loyalty could allow him to avenge Duncan's death. Even though Banquo thought it was quite odd that Macbeth quickly acquired the titles the witches hailed him, he did not think Macbeth was capable of murdering Duncan. However, what really was bothering Macbeth was Banquo's sons were prophesied to inherit the throne. Macbeth would do whatever he could to prevent anyone, even after his death, from taking the throne. Macbeth wasn't just satisfied with being king; he wanted to have his descendants share the title as well. Acting on these passions, Macbeth hired two assassins and tried to kill Banquo and his son Fleance. Even though Fleance escaped, the murder of Banquo calmed Macbeth's nerves because he was safe from being charged with the murder o f King Duncan.

Monday, September 16, 2019

Should Juvenile Be Charged as Adults in Criminal Cases

Should Juvenile Be Charged as Adults in Criminal Cases? Robert Horn Post University The purpose of the Adult Criminal Justice system is to punish offenders according to the severity of the crime committed. The juvenile justice system’s aim is to rehabilitate or mentor the juvenile offenders, in the hope that they can prevent further crimes, and to change their behavior. The motivating principle of the juvenile system is rehab. The reason for this is because juveniles are not fully developed, mentally or physically.Many Juvenile offenders come from broken homes, been abused, or come from bad neighborhoods. Juvenile offenders need a second chance, because they have not even received a first chance. Rehabilitation is the best option for them because of the way they would be exploited and turned into criminals if they were sent directly to prison. If given the chance, the Juvenile Justice System can aid in successfully rehabilitating youthful offenders so they are not inclined to commit future crimes. With this reasoning, juveniles cannot be blamed or accountable for their actions the same way adults are.The Justice System fulfills and important function by establishing standards of conduct. It defines what is right and wrong for people and removes them from the responsibility of taking vengeance out on those who wronged them, which deters the escalation of feuds in the community. The Justice System also protects the rights of citizens by establishing and honoring the principle that freedom shouldn’t be denied without a good reason. Rehabilitation does have its objective: to return offenders to their communities as cured members of the society. Efforts in the 1980’s and 1990’s were unsuccessful.There was no one program that was more effective in the effort to rehabilitate youthful offenders than any other program. Because of this, a large portion of released offenders continued to return (Murphy 49). This led many people to believe that the best alternative was to simply remove offenders from the community, preventing vexation and exploitation. Because criminals are more often considered to be inclined to commit crimes than those never convicted of a crime, it follows that some benefits will be derived from incarcerating convicted criminals.The potential of incarceration is great as a method of crime control if it is only a few hardened criminals who commit the most crimes. If those criminals can be identified, sentenced, and incarcerated for long periods of time, there would be a significant reduction in crime. Most supports of correctional reform have this view on the population of criminals. Blame for most of the crimes committed is most often place on a relatively few predatory, compulsive individuals thought to commit a large number of crimes each year (Newburn 54).The last and final goal of this reform movement is reestablishing retribution. Retribution is the most moral of all penal goals. There is an elemen t of rage included because the victim deserves the right to be repaid with pain for the harm suffered. Justice is achieved when the punished given to the offender is equal to the level of harm coming from the criminal act. Consequently, social balance is reestablished and maintained within the society. When it comes to juvenile offenders, the rules are thrown out the window.There is a separate legal system for them and they are also categorized differently. By federal standards, any juvenile who is under the age of 18 who has committed a crime is a juvenile delinquent. This is a decision that society has made. Society believes that there are important and serious differences between adults and juveniles. A one-size-fits-all approach is not wanted and will make the situation worse. Juvenile offenders are easiest to influence and are also the easiest to bend.It is believed that the actions a juvenile criminal might be influenced by outside sources such as neglect from parents, bad liv ing conditions, or poor relationships with the family. Because of these factors, rehabilitation is a popular and attractive option in dealing with juveniles. Many of the rehabilitation programs ask that juvenile offenders with behavior problems meet with adult tutors to produce a stable, trustworthy friendship, which is expected to influence juveniles and to reduce their anti-social behavior (Maruna and Ward 33). Such a change in behavior is ade possible due to the trust and friendship between juvenile and adult – who can listen and care about the problems the juveniles may have, a role model, good advice giver, etc. In such a way, these mentoring programs may play a part on juvenile crime reduction. The goal of rehabilitation is to create law-abiding behavior and to encourage juveniles to know the consequences of what they do and to become law-abiding citizens. It can be a challenging process because it requires the use of the proverbial carrot and stick. The use of coercion and socialization is seen in child rising.With young children, coercion is the only effective control. If a small child goes into the street, the child is disciplined and is told if he or she does it again, they will be punished again. These threats tend to be only effective when they are accepted; otherwise, people seek ways to bend the rules, or may blatantly disobey prohibitions. By sending such juveniles to prison my not prove to be an effective deterrent. Rather, it may be more effective to understand the socialization process of a juvenile, and try to re-wire it while the young person is still malleable.Vedder explains this: To use sociological lingo: the juvenile acquires the delinquent behavior as he does any other cultural trait of the cultural heritage passed on to him by his group conformist delinquency, stressing the fact the child becomes delinquent through conforming with the behavior pattern in his group† (9) Positive adult guidance, understanding, and support can divert young offenders and also criminals from involvement in crimes and acts of disobedience and also to help them join in on the rules of and behaviors of local communities (Murphy 53).To put it another way: what young offenders need are good adult role models. This can be found in quality rehabilitation programs. Most young offenders have started off on the wrong path, and they imitate the most irresponsible or abusive members of their social set or family. With proper guidance and role models, juveniles can begin to adjust their behavior. It is important to know that instead of looking at rehabilitation programs as a form of punishment, young offenders taking part of such programs should now that they are voluntary and consider them a positive opportunity to change their lives for the best. Such understanding does not come at once. The rehabilitation process can be a long, with juveniles provided with meetings, instructions, training and conferences. By providing juveniles w ith a positive adult role model, supervision, and continual training, mentoring programs aim to reduce the risk of a drift into numerous crimes. These of course, are not the exclusive means of rehabilitation.It may be suitable to mix a softer approach with detention in a Juvenile Center or to take similar action. The carrot and stick is again a key analogy. Detention applied to juvenile offenders has been debated for years. Its advocates argue that it would prevent crime by detaining those offenders that are likely to re-offend (Russel 85). Its adversaries claim that it is unfair because it allows a judge to make a choice about a person’s future behavior. Because no one can accurately predict behavior, particularly criminality, the chances of mistakes are large (Maruna and Ward 83).During the rehabilitation period, the type of sentencing most used is the indeterminate sentence. Legislatures have set wide ranges for sentencing, and judges measure out minimums and maximums that have a wide range. This allows personnel in corrections the discretion of releasing offenders once they are reformed. No one other than correctional authorities cared for this system. Inmates did not like it because their release depended on the whims of the parole board, and the inmates never knew for sure when they would be released (Russel 61).Judges and the public did not like it because the prison term served was never the same as the actual sentence and was almost always shorter. Juvenile laws stipulate that if a young criminal committed a serious crime, they could be â€Å"waived† to the adult court system. The number of â€Å"waived† juveniles each year comes out to be around 8,000 (Deitch). This â€Å"waiver† system is used in all states except for Nebraska, New York, and New Mexico. The only time in these states when the â€Å"waiver† is applied is crimes that include murders or intentional killing of several people.After examining the case, ju dges decided whether the juvenile should be tried as a juvenile or an adult. There are new laws specifying set lengths of sentences for juvenile offenses that allow for modification of the time served based on circumstances associated with a given incident (Russel 66). In some cases, a youth offender gets sentenced to five years, but he or she is only 15 at the time, he or she will not be transferred to the adult prison. Law states that a young offender should be detained in a special jail with other offenders until the age of 18 (Murphy).While most young offenders are worthy of rehabilitation, society states that some are not. There are criminals of all ages who should be imprisoned due to the nature of their crimes. To say that the best way to deal with juveniles is to rehabilitate them is not to say that this method is perfect or will it work in every case. It is the best choice, due to the consideration of issues at hand. Depending on the severity of the crime, and the history o f the offender, there are some instances where the age of the offender does not matter.In 2006, in Omaha Nebraska, Cameron Williams is facing up to 110 years in prison for second-degree murder attempts and also using a weapon to commit a felony. Cameron Williams is 16 years old, and is being charged in the adult courts due to his troublesome past and the â€Å"serious nature of his crime. † (Khan, 2010) In 1999, Lionel Tate, at the time 12, was the youngest juvenile offender in American history to be sentenced to life in prison without the possibility of parole. Tate was charged for the death of a 6 year old while practicing wrestling moves on her.Such instances of these arrests show that depending on the severity of the crime, being a youth doesn’t matter in sentencing. (Reaves, 2001) Rehabilitation is part of a policy for young offenders who have entered the criminal justice system. The policies and programs, which help juveniles to escape imprisonment, are parole an d probation. Restriction of the opportunity for parole and probation are often accompanied by new sentencing legislation. Many states have made it difficult to be placed on probation for certain offenses and impossible for serious ones.Parole, which is defined as the conditional early release from prison under supervision in the community, has been restricted in many states. A return to determinacy and the abandonment of rehabilitation eliminates the need for parole, which, in theory, was designed to help the young offender prepare to reenter the community (Murphy 71). However, parole serves as another important function in controlling inmates in prison, and is one of the few rewards that can be manipulated. Because of this reason, many states have retained it.The Administration of parole has been changed so that the sentence rather than the paroling authority determines the date of the parole hearing. Good Behavior Credit for time served-receiving extra credit for time served while maintaining good behavior-is another form of reward used in prison to control the inmates. Because of the way it reduces the amount of time an individual will serve, and modifies the original sentence; many states have considered eliminating it. However, heavy protesting against the legislation by correctional personnel has prevented its elimination.Young people are less responsible and more malleable than adults. Many juvenile offenders who break the law have come from broken homes and abusive families. Some have never received the support that they deserve. Because they are young, and have many years ahead of them, our society has chosen to separate them from adult criminals, and to make an effort to rehabilitate them. This makes senses, because the cost of retribution is simply too much in many of their cases, and the burden on the criminal justice system and our moral compass would be insupportable. ReferencesCrow, J. The Treatment and Rehabilitation of Offenders. Sage Publicat ions Ltd, 2001 Deitch, Michele, et. al. From Time Out to Hard Time: Young Children in the Adult Criminal Justice System, Austin, TX: The University of Texas at Austin, LBJ School of Public Affairs, 2009. Khan, K. (2010, July 12). Juvenile justice: Too young for life in prison?. Retrieved from http://abcnews. go. com/Politics/life-prison-juvenile-offenders-adult-courts/story? id=11129594 Maruna, S. , Ward, T. Rehabilitation (Key Ideas in Criminology). Routledge; New edition, 2007.Murphy, J. G. Punishment and Rehabilitation. Wadsworth Publishing Company, 1999. Newburn, T. Criminology. Willan Publishing, 2007. Reaves, J. (2001, May 17). Should the law treat kids and adults differently?. Retrieved from http://www. time. com/time/nation/article/0,8599,110232,00. html Russel, C. Alternatives to Prison: Rehabilitation and Other Programs (Incarceration Issues: Punishment, Reform, and Rehabilitation). Mason Crest Publishers; Library Binding edition, 2006. Vedder, C. B. The Juvenile Offender: Perspective and Readings. Random House, 2002.

Writing: Life Expectancy and Ancient Egyptians Life

King Tutu became king at age 9 and led his empire from 1333 to 1322 BC. Considering this, the young king had little time to train or plan for his leadership. Instead, he moved directly from childhood to adult responsibilities. Like other Ancient Egyptians, King Tutu married at a young age. Whereas the modern day search for a marriage partner may take decades. The ancient Egyptians had no such leisure to make prolonged marriage decisions. King Tutu and his wife had two children who died as babies. While such deaths would lead o shock and immeasurable grief today, they were common then.So, parents could not count on watching their children grow up. Unlike modern humans, few Egyptians would have ever dreamed of holding their grandchildren in their arms, though some city-dwellers may have achieved this goal, as they had a lower mortality rate compared to village residents. Other causes of a shorter life expectancy included tuberculosis, polio, and malnutrition. Diseases occasionally brok e out, causing utter devastation. Many of these diseases were fatal, and unlike today, few could be cured r even treated.Still, today's scholars dispute King Tutu died at an age that was considered young even then: 19. King Tutu possibly died from an infection that, even If It had been vigorously treated, would have required antibiotics not yet In existence. Ultimately, his doctors' techniques were limited because they lived before modern medicine. Since the time of the ancient Egyptians, humankind has made great strides prolonging life expectancy. In fact, by ancient Egyptian standards, modern longevity is truly awesome. The Egyptians would be shocked to know that, these days, mom people even discuss immortality as a future possibility.He continued his search for years, ultimately coming very close to Warm Mineral spring. Still popular today, the spring thousands of years. It is possible that Leon never whether the spring was the fountain he was seeking, because he (use) for (learn ) (lose) his life in battle there. People from many cultures and of years. Most recently, the well-known American magician, David Copperfield, claimed that he had discovered the true fountain amid islands in the Bahamas. Copperfield (report) that when dying bugs are out in contact with the water, they will fly again.Copperfield purchased the island group, and since then, scientists (conduct) experiments of the waters to determine their restorative powers. The island group visitors for the past several years. (close) to 5. Write a description of your current life, imagining that your life expectancy is only 30. * Write an interesting introduction. * Describe your imaginary life using sensory details of smell, sight, sound, taste, and touch. * Include figures of speech in your description * Include a clear conclusion. * Use the vocabulary and grammar from Unit 1

Sunday, September 15, 2019

Information technology for pims pumps Essay

Analysis section 1 – Background/to identification of problem Pims Pumps are an industrial pumping company which are involved in the distribution, installation and maintenance of industrial pumping units. The company has a large fleet of vans and many specialised tools and lots of equipment. Currently all of the equipment is logged in and out of the workshop and vans and this information is stored on paper. Analysis section 2 – identification of the prospective user(s) The prospective users are the managers of the business all of whom are computer literate and are already using a computer system for other aspects of the business. The company have a small network of computers installed and all involved are competent in opening and using Microsoft access 2000 Analysis section 3 – identification of user needs and acceptable limitations The system needs to be able to store large amounts of data about the whereabouts of equipment, it must be able to search through the data for any specified criteria, it must be able to be edited, it must be secure and user friendly. Interview Example documents from user Observation The proposed system can only be tested to a certain extent on being able to store large amounts of data. Analysis section 4 – realistic appraisal of the feasibility of potential solutions. Analysis section 5 – justification of chosen solution I have chosen to use this system because Analysis section 6 – description of current system & data sources and destinations The current system involves the user logging in and out equipment to vans and back into the warehouse. The user must enter his/her name, the date and time, the registration of the vehicle they are taking it to, the name of the piece of equipment and the serial number of the piece of equipment. At the end of each week the logbook except for the most recent page is taken to the admin office and stored in a filing cabinet in date order. When a piece of equipment is missing, needed of has been damaged the user can then refer back to the log book to find out who if anyone still has the piece of equipment and who else has used it recently. This can be very time consuming, as the user has to visually scan through the logbooks until he comes to the entry, which could be anything up to 15 pages. This could easily result in human error and is a big waste of time Analysis section 8 – data flow diagram of current system. At current there is no flow of data as the information is simply logged and referred to if needed in the future. Analysis section 7 – objectives of the project Input tasks (Data entry / Modification / View) The system will provide a user-friendly simple interface with the initial user allowing them to enter the same information as they usually do just on a keyboard. This should avoid all complications. The user interface for the initial user will be very secure to try and prevent accidental damage to the system however the management features will be able to be accessed by the management team through a password. There will be a user guide and a trouble shooting section to try and solve any potential problems. The system will be presented in form view with a main menu and various forms for different functions Output tasks (Reports) The system will be able to produce a report showing the location of any piece of equipment, or all the equipment one member of staff has recently used or all the equipment currently in a particular van. The system must be able to search through all the records for any criteria and produce a report for each one Processing tasks. The system must be able to process the information and sort it into any order that the user wishes. Quantitative performance considerations The system is going to be run over a long period of time and so will need to be able to store a very large amount of data. This s one thing I will not be able to test to its full extent however I can estimate through hardware performance whether the system is adequate or not. Qualitative evaluation criteria Data security of the new system The system will have security passwords and all obvious features that would allow the user to enter restricted areas of the system would be disabled. The system will prompt the user to save changes or automatically save changes on exit anyway. Analysis section 9 – Data flow diagram of new system Analysis section 10 – E-R Model Project stage 2 : design Design section 1 – Overall system design The system will involve a series of tables, queries, reports and forms all linked together to provide a user-friendly system capable of all of the system requirements. I will have tables for vans, equipment, warehouse and users and will link these together and display them on one form. There will be a menu form giving the user options and security passwords for management to access and edit existing data or to view existing data. All of the data entry will be validated and the tables will be set to certain data types to try and ensure the user is entering the correct information. There will be four main tables related to bookings, employees, equipment and vehicles. There will also be four forms based upon these tables and then a main menu form for easy navigation of my database system Design section 2 – Description of modular structure of system. The system will be based around 4 main tables. These are TblEmployees, which contains information about the employees that work at the company. TblEquipment, which lists equipment, details about it, its current location and a list of who has recently used it. TblVehicles will contain a list of all of the vans that Pims Pumps use and contain a list of all the equipment that is currently in each van. TblBookings will record all the bookings in an out that a piece of equipment makes and records the equipment and employee ID numbers. These tables will all be linked together in an entity relationship diagram. Design section 3 – Definition of data requirements The database will have to store relevant information about the employees using the booking system information about the company’s vehicles and equipment information. The fields I will store in my equipment table are as follows: 1. Equipment ID – A unique number assigned to each piece of equipment. 2. Description – a brief description of the piece of equipment 3. Service interval – The next date when the piece of equipment is due to be serviced The fields I will store in my employee table are as follows: 1. Employee name – full name of the employee 2. Employee ID – a unique number assigned to each employee The fields I will store in my vehicles table are as follows: 1. Registration – The registration number of my vehicle 2. Vehicle ID – A unique number assigned to each vehicle I will also have a bookings table, which will store the employee and equipment ID for each booking of equipment, and the date on which the booking was made. This will enable me to run a query to find out for example what equipment any employee has used or what equipment is currently in a certain van etc. Design section 4 – Identification of storage requirements and media Development hardware I can design my system on any hardware running Microsoft Windows 95 or later and that is capable of running Microsoft Access at speed. I do not require any additional specific hardware for designing my database. End-user hardware The end user already has hardware capable of running my database and all the staff are familiar with Microsoft based programs. Development software I will design the database in Microsoft Access as this is very flexible and powerful enough to undertake all or the required tasks End-user software The end user will also have to use Microsoft Access as that is the only program that my database will run on I will design the database to be user friendly and limit access to all of its functions to try and prevent accidental damage to the system. Design section 5 – Identification of suitable algorithms for data transformation Queries Macros Visual basic code Design section 6 – identification of any validation required I have several input masks throughout my tables however no validations are needed. The input masks that ii have used are simply in place to ensure that the user is entering the correct information or at least information that is in the correct format. Design section 7 – overall user interface design Here is a plan of the layout of my main menu; Design section 8 – Sample of planned data capture and entry (e. g. forms Design section 9 – sample of planned data validation Design section 8 – Description of record/database structure & normalisation Normalisation Tables design Design section 11 – Sample of planned valid output (e. g. reports). I will produce reports based on queries related to different things however the format will remain the same. Below is an example of what a report would look like if the user queried for what equipment an employee has recently used: Design section 12 – Database design including relations, foreign keys, and primary keys. Entity-relationship diagram List and describe all relations separately 1. There is a one to many relationship from Equipment ID in the Equipment table to Equipment ID in the booking table. This enables there to be many pieces of equipment logged in the bookings table. 2. There is a one to many relationship from Employee ID in the Employee’s table to Employee ID in the Bookings table. This enables there to be many employees listed in the bookings table of that one employee can have many bookings. Indicate all primary and foreign keys for each table TblEquipment’s primary key is Equipment ID and it contains no foreign keys TblBooking’s primary key is Booking ID and it contains Equipment ID and Employee ID as foreign keys TblVehicle’s primary key is Vehicle ID and it contains no foreign keys TblEmployee’s primary key is Employee ID and it contains no foreign keys Design section 13 – Planned measures for security and integrity of data Design section 14 – Planned measures for systems security Design section 15 – Overall test strategy Project stage 3 : Technical solution Project stage 4 : System testing Test section 1- Design of test plan & strategy Test section 2 – Minimal test data Test section 3 – Expected results for typical test data Test section 4 – Erroneous data (Check forms reject invalid data) Test section 5 – Expected results for extreme data. Check that data just within range is accepted and stored Check that calculations using extreme data works Test section 6 – Hard copy of representative samples of test runs Project stage 5 : Maintenance Maintenance section 1 – System overview Maintenance section 2 – Summary of features used Maintenance section 3 -Sample of detailed algorithm design using a recognised methodology Maintenance section 4 – Annotated listings of program code, macro code & tailoring Maintenance section 5 – Screenshots (Mainly from design view) Table screenshots. Reports screenshots Query screenshots Macro’s screenshots Visual basic code Maintenance section 6 – List/description of package items developed Project stage 6 : User manual User manual – Brief introduction User manual – Samples of actual screen displays in situ User manual – Samples of error messages and/or error recovery procedures Project stage 7 : Appraisal Appraisal section 1 – Comparison of project performance against objectives Evaluation of end-user requirements Evaluation of the qualitative criteria Evaluation of the quantitative criteria.